


default search action
10th World Conference on Information Security Education 2017: Rome, Italy
- Matt Bishop
, Lynn Futcher, Natalia G. Miloslavskaya
, Marianthi Theocharidou
:
Information Security Education for a Global Digital Society - 10th IFIP WG 11.8 World Conference, WISE 10, Rome, Italy, May 29-31, 2017, Proceedings. IFIP Advances in Information and Communication Technology 503, Springer 2017, ISBN 978-3-319-58552-9
Information Security Education
- Matt Bishop
, Diana L. Burley, Scott Buck, Joseph J. Ekstrom, Lynn Futcher, David S. Gibson, Elizabeth K. Hawthorne, Siddharth Kaza, Yair Levy
, Herbert J. Mattord, Allen Parrish:
Cybersecurity Curricular Guidelines. 3-13 - Natalia G. Miloslavskaya
, Alexander I. Tolstoy
:
Designing Degree Programmes for Bachelors and Masters in Information Security. 14-26 - Odwa Yekela, Kerry-Lynn Thomson
, Johan Van Niekerk:
Assessing the Effectiveness of the Cisco Networking Academy Program in Developing Countries. 27-38 - Susanne Wetzel:
Pathways in Cybersecurity: Translating Theory into Practice. 39-48
Teaching Information Security
- Matt Bishop
, Jun Dai, Melissa Dark, Ida Ngambeki, Phillip Nico, Minghua Zhu:
Evaluating Secure Programming Knowledge. 51-62 - Konstantin G. Kogos
, Sergey V. Zapechnikov:
Studying Formal Security Proofs for Cryptographic Protocols. 63-73 - Stig Fr. Mjølsnes
, Ruxandra F. Olimid
:
Introducing Mobile Network Security Experiments to Communication Technology Education. 74-83
Information Security Awareness and Culture
- Lynette Drevin
, Hennie A. Kruger, Anna-Marie Bell, Tjaart Steyn:
A Linguistic Approach to Information Security Awareness Education in a Healthcare Environment. 87-97 - Noluxolo Gcaza, Rossouw von Solms:
Cybersecurity Culture: An Ill-Defined Problem. 98-109 - Elmarie Kritzinger
, Maria Bada, Jason R. C. Nurse:
A Study into the Cybersecurity Awareness Initiatives for School Learners in South Africa and the UK. 110-120 - Thandolwethu Mabece, Lynn Futcher, Kerry-Lynn Thomson
:
South African Computing Educators' Perspectives on Information Security Behaviour. 121-132
Training Information Security Professionals
- Natalia G. Miloslavskaya
, Alexander I. Tolstoy
:
ISO/IEC Competence Requirements for Information Security Professionals. 135-146 - Erik L. Moore
, Steven Fulton, Daniel M. Likarish:
Evaluating a Multi Agency Cyber Security Training Program Using Pre-post Event Assessment and Longitudinal Analysis. 147-156 - Natalia G. Miloslavskaya
, Alexander I. Tolstoy
, Anton Migalin:
"Network Security Intelligence" Educational and Research Center. 157-168

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.