


default search action
11th World Conference on Information Security Education 2018: Poznan, Poland
- Lynette Drevin, Marianthi Theocharidou
:
Information Security Education - Towards a Cybersecure Society - 11th IFIP WG 11.8 World Conference, WISE 11, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings. IFIP Advances in Information and Communication Technology 531, Springer 2018, ISBN 978-3-319-99733-9
Information Security Learning Techniques
- Matt Bishop
:
A Design for a Collaborative Make-the-Flag Exercise. 3-14 - Frans F. Blauw
, Wai Sze Leung
:
ForenCity: A Playground for Self-Motivated Learning in Computer Forensics. 15-27 - Natalia G. Miloslavskaya
, Alexander I. Tolstoy:
Developing Hands-On Laboratory Works for the "Information Security Incident Management" Discipline. 28-39 - Erjon Zoto
, Stewart Kowalski, Christopher Frantz
, Edgar A. Lopez-Rojas
, Basel Katt:
A Pilot Study in Cyber Security Education Using CyberAIMs: A Simulation-Based Experiment. 40-54
Information Security Training and Awareness
- Suné von Solms
, Annlizé Marnewick:
Towards Educational Guidelines for the Security Systems Engineer. 57-68 - Rudi Serfontein
, Lynette Drevin
, Hennie A. Kruger
:
The Feasibility of Raising Information Security Awareness in an Academic Environment Using SNA. 69-80 - Wiehan Janse Van Rensburg
, Kerry-Lynn Thomson
, Lynn Futcher
:
Factors Influencing Smartphone Application Downloads. 81-92
Information Security Courses and Curricula
- Simone Fischer-Hübner, Leonardo A. Martucci, Lothar Fritsch, Tobias Pulls, Sebastian Herold
, Leonardo H. Iwaya, Stefan Alfredsson, Albin Zuccato:
A MOOC on Privacy by Design and the GDPR. 95-107 - Vladimir Budzko, Natalia G. Miloslavskaya
, Alexander I. Tolstoy:
Forming the Abilities of Designing Information Security Maintenance Systems in the Implementation of Educational Programmes in Information Security. 108-120 - Suné von Solms
, Lynn Futcher
:
Identifying the Cybersecurity Body of Knowledge for a Postgraduate Module in Systems Engineering. 121-132 - Steven Furnell, Michael K, Fred Piper, Chris E, Catherine H, Chris Ensor:
A National Certification Programme for Academic Degrees in Cyber Security. 133-145

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.