IFIP TC6 Open Digital Library

5. World Conference on Information Security Education 2007: West Point, New York, USA

Fifth World Conference on Information Security Education, Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA

Lynn Futcher, Ronald Dodge

Springer, IFIP 237, ISBN: 978-0-387-73268-8



Contents

Refereed Papers

An Analysis of Computer Forensic Practitioners Perspectives on Education and Training Requirements.

Colin J. Armstrong

 1-8

Resubmit my Information Security Thesis? - You must be joking!

Helen Armstrong, Louise Yngström

 9-16

E-Voting as a Teaching Tool.

Matt Bishop

 17-24

Practical Assignments in IT Security for Contemporary Higher Education.

Alan Davidson, Kjell Näckros

 25-32

Email Security Awareness - a Practical Assessment of Employee Behaviour.

Hennie A. Kruger, Lynette Drevin, Tjaart Steyn

 33-40

SecSDM: A Model for Integrating Security into the Software Development Life Cycle.

Lynn Futcher, Rossouw von Solms

 41-48

A CBK for Information Security and Critical Infrastructure Protection.

Marianthi Theoharidou, Eleftheria Stougiannou, Dimitris Gritzalis

 49-56

A Course on Computer and Network Security: Teaching Online Versus Face-to-Face.

Suresh Kalathur, Lubomir T. Chitkushev, Stuart Jacobs, Tanya Zlateva, Anatoly Temkin

 57-64

An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education.

Clare Wilson, Vasilios Katos, Caroline Strevens

 65-71

Experiences from Educating Practitioners in Vulnerability Analysis.

Stefan Lindskog, Hans Hedbom, Leonardo A. Martucci, Simone Fischer-Hübner

 73-80

Cyber Defense Exercise: A Service Provider Model.

Jeffrey A. Mattson

 81-86

Information Security Specialist Training for the Banking Sphere.

Andrey P. Kurilo, Natalia G. Miloslavskaya, Alexander I. Tolstoy

 87-93

Learning Security through Computer Games: Studying user behavior in a real-world situation.

Kjell Näckros

 95-103

Forensic Computing Training, Certification and Accreditation: An Australian Overview.

Matthew Simon, Jill Slay

 105-112

Software Assignments for a Course in Secure E-Commerce.

Chris Steketee, Phillip Lock

 113-120

Teaching Cryptography to Continuing Education Students.

Anatoly Temkin

 121-128

The Role of Mathematics in Information Security Education.

Stephen D. Wolthusen

 129-136

Invited Papers

The Role of Information Security Industry Training and Accreditation in Tertiary Education.

Helen Armstrong, Colin J. Armstrong

 137-140

How to Design Computer Security Experiments.

Sean Peisert, Matt Bishop

 141-148