


default search action
6.-8. World Conference on Information Security Education 2009/2011/2013
- Ronald C. Dodge Jr., Lynn Futcher:
Information Assurance and Security Education and Training - 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers. IFIP Advances in Information and Communication Technology 406, Springer 2013, ISBN 978-3-642-39376-1
WISE 8, 2013
- Rayne Reid, Johan Van Niekerk:
Back to Basics: Information Security Education for the Youth via Gameplay. 1-10 - Helen Armstrong, Matt Bishop
, Colin J. Armstrong:
Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders. 11-19 - Heath Novak, Daniel M. Likarish, Erik Moore
:
Developing Cyber Competition Infrastructure Using the SCRUM Framework. 20-31 - Steven M. Furnell
:
Security Education: The Challenge beyond the Classroom. 32-38 - William J. Caelli, Vicky Liu, Dennis Longley:
Background to the Development of a Curriculum for the History of "Cyber" and "Communications" Security. 39-47 - Ronald C. Dodge:
Information Assurance and Security in the ACM/IEEE CS2013. 48-57 - Marius Potgieter, Craig Marais, Mariana Gerber:
Fostering Content Relevant Information Security Awareness through Browser Extensions. 58-67 - Ahmad Samer Wazan, Romain Laborde
, François Barrère, Abdelmalek Benzekri, David W. Chadwick
:
PKI Interoperability: Still an Issue? A Solution in the X.509 Realm. 68-82 - Elena Sitnikova
, Ernest Foo
, Rayford B. Vaughn:
The Power of Hands-On Exercises in SCADA Cyber Security Education. 83-94 - Natalia G. Miloslavskaya
, Mikhail Senatorov, Alexander I. Tolstoy
, Sergei Zapechnikov
:
"Business Continuity and Information Security Maintenance" Masters' Training Program. 95-102 - Johan Van Niekerk, Kerry-Lynn Thomson
, Rayne Reid:
Cyber Safety for School Children - A Case Study in the Nelson Mandela Metropolis. 103-112 - Lynn Futcher, Louise Yngström:
A Review of IFIP TC 11 WG 11.8 Publications through the Ages. 113-122
WISE 7, 2011
- Dino Schweitzer, David Gibson, David Bibighaus, Jeff Boleng:
Preparing Our Undergraduates to Enter a Cyber World. 123-130 - Yanzhen Qu:
How to Secure the Cloud Based Enterprise Information System - - A Case Study on Security Education as the Critical Foundation for a MS-EIS Program. 131-139 - Matt Bishop
, Chip Elliott:
Robust Programming by Example. 140-147 - Colin J. Armstrong:
An Approach to Visualising Information Security Knowledge. 148-155 - Kara L. Nance, Blair Taylor, Ronald Dodge, Brian Hay:
Creating Shareable Security Modules. 156-163 - Lynn Futcher, Johan Van Niekerk:
Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula. 164-171 - Helen Armstrong:
Two Approaches to Information Security Doctoral Research. 172-179 - Johan Van Niekerk, Ryan G. Goss:
Towards Information Security Education 3.0 - A Call for Information Security Educational Ontologies. 180-187 - Vincent Nestler, Erik L. Moore
, Kai-Yi Clark Huang, Devshikha Bose:
The Use of Second Life® to Teach Physical Security across Different Teaching Modes. 188-195 - Edwin Donald Frauenstein
, Rossouw von Solms:
An Enterprise Anti-phishing Framework. 196-203 - Narayan Murthy:
Teaching Computer Security with a Hands-On Component. 204-210 - Matt Bishop, Kara L. Nance:
The Strengths and Challenges of Analogical Approaches to Computer Security Education. 211-217
WISE 6, 2009
- Helen Armstrong, Ronald C. Dodge, Colin J. Armstrong:
Reaching Today's Information Security Students. 218-225 - Matt Bishop
:
Some "Secure Programming" Exercises for an Introductory Programming Class. 226-232 - Alan Davidson, Javier de La Puente Martinez, Markus Huber:
A SWOT Analysis of Virtual Laboratories for Security Education. 233-240 - Lynette Drevin
, Hennie A. Kruger, Tjaart Steyn:
Determinants of Password Security: Some Educational Aspects. 241-248 - Aaron Smith, Maria Papadaki
, Steven M. Furnell
:
Improving Awareness of Social Engineering Attacks. 249-256 - Lynn Futcher, Rossouw von Solms:
A Risk-Based Approach to Formalise Information Security Requirements for Software Development. 257-264 - Stewart Kowalski, Katarina Pavlovska, Mikael Goldstein:
Two Case Studies in Using Chatbots for Security Training. 265-272 - Natalia G. Miloslavskaya
, Alexander I. Tolstoy
:
Information Security Specialist Training on the Basis of ISO/IEC 27002. 273-279 - Johan Van Niekerk, Rossouw von Solms:
Using Bloom's Taxonomy for Information Security Education. 280-287 - Katrin Franke, Erik Hjelmås, Stephen D. Wolthusen:
Advancing Digital Forensics. 288-295

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.