default search action
9. World Conference on Information Security Education 2015: Hamburg, Germany
- Matt Bishop, Natalia G. Miloslavskaya, Marianthi Theocharidou:
Information Security Education Across the Curriculum - 9th IFIP WG 11.8 World Conference, WISE9, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology 453, Springer 2015, ISBN 978-3-319-18499-9
Innovative Methods
- Melissa Dark, Matt Bishop, Richard C. Linger, Luanne Goldrich:
Realism in Teaching Cybersecurity Research: The Agile Research Process. 3-14 - Roberto Gallo, Ricardo Dahab:
Assurance Cases as a Didactic Tool for Information Security. 15-26 - Zequn Huang, Chien-Chung Shen, Sheetal Doshi, Nimmi Thomas, Ha Duong:
Cognitive Task Analysis Based Training for Cyber Situation Awareness. 27-40 - Erik Moore, Daniel M. Likarish:
A Cyber Security Multi Agency Collaboration for Rapid Response that Uses AGILE Methods on an Education Infrastructure. 41-50
Software Security Education
- Audun Jøsang, Marte Ødegaard, Erlend Oftedal:
Cybersecurity Through Secure Software Development. 53-63 - Sagar Raina, Blair Taylor, Siddharth Kaza:
Security Injections 2.0: Increasing Engagement and Faculty Adoption Using Enhanced Secure Coding Modules for Lower-Level Programming Courses. 64-74 - Johan Van Niekerk, Lynn Futcher:
The Use of Software Design Patterns to Teach Secure Software Design: An Integrated Approach. 75-83
Tools and Applications for Teaching
- Gamze Canova, Melanie Volkamer, Clemens Bergmann, Roland Borza, Benjamin Reinheimer, Simon Stockhardt, Ralf Tenberg:
Learn to Spot Phishing URLs with the Android NoPhish App. 87-100 - Primoz Cigoj, Borka Jerman Blazic:
An Innovative Approach in Digital Forensic Education and Training. 101-110 - Sergey Zapechnikov, Natalia G. Miloslavskaya, Vladimir Budzko:
On Experience of Using Distance Learning Technologies for Teaching Cryptology. 111-121
Syllabus Design
- Lynette Drevin, Günther Drevin:
Reflections on the Ethical Content of the IT Honours Program Project Module. 125-134 - Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Professional Competencies Level Assessment for Training of Masters in Information Security. 135-145 - Sergey Zapechnikov, Alexander I. Tolstoy, Sergey Nagibin:
History of Cryptography in Syllabus on Information Security Training. 146-157
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.