Table of Contents
|
Information Assurance and Security Education and Training Ronald C. Dodge Jr., Lynn Futcher (Eds.)
|
Front Matter |
WISE 8
|
Back to Basics: Information Security Education for the Youth via Gameplay Rayne Reid, Johan Niekerk |
1-10 |
Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders Helen Armstrong, Matt Bishop, Colin Armstrong |
11-19 |
Developing Cyber Competition Infrastructure Using the SCRUM Framework Heath Novak, Daniel Likarish, Erik Moore |
20-31 |
Security Education: The Challenge beyond the Classroom Steven Furnell |
32-38 |
Background to the Development of a Curriculum for the History of “Cyber” and “Communications” Security William Caelli, Vicky Liu, Dennis Longley |
39-47 |
Information Assurance and Security in the ACM/IEEE CS2013 Ronald Dodge |
48-57 |
Fostering Content Relevant Information Security Awareness through Browser Extensions Marius Potgieter, Craig Marais, Mariana Gerber |
58-67 |
PKI Interoperability: Still an Issue? A Solution in the X.509 Realm Ahmad Wazan, Romain Laborde, François Barrere, Abdelmalek Benzekri, David Chadwick |
68-82 |
The Power of Hands-On Exercises in SCADA Cyber Security Education Elena Sitnikova, Ernest Foo, Rayford Vaughn |
83-94 |
Business Continuity and Information Security Maintenance" Masters’ Training Program Natalia Miloslavskaya, Mikhail Senatorov, Alexandr Tolstoy, Sergei Zapechnikov |
95-102 |
Cyber Safety for School Children Johan Niekerk, Kerry-Lynn Thomson, Rayne Reid |
103-112 |
A Review of IFIP TC 11 WG 11.8 Publications through the Ages Lynn Futcher, Louise Yngström |
113-122 |
WISE 7
|
Preparing Our Undergraduates to Enter a Cyber World Dino Schweitzer, David Gibson, David Bibighaus, Jeff Boleng |
123-130 |
How to Secure the Cloud Based Enterprise Information System Yanzhen Qu |
131-139 |
Robust Programming by Example Matt Bishop, Chip Elliott |
140-147 |
An Approach to Visualising Information Security Knowledge Colin Armstrong |
148-155 |
Creating Shareable Security Modules Kara Nance, Blair Taylor, Ronald Dodge, Brian Hay |
156-163 |
Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula Lynn Futcher, Johan Niekerk |
164-171 |
Two Approaches to Information Security Doctoral Research Helen Armstrong |
172-179 |
Towards Information Security Education 3.0 Johan Niekerk, Ryan Goss |
180-187 |
The Use of Second Life® to Teach Physical Security across Different Teaching Modes Vincent Nestler, Erik Moore, Kai-Yi Huang, Devshikha Bose |
188-195 |
An Enterprise Anti-phishing Framework Edwin Frauenstein, Rossouw Solms |
196-203 |
Teaching Computer Security with a Hands-On Component Narayan Murthy |
204-210 |
The Strengths and Challenges of Analogical Approaches to Computer Security Education Matt Bishop, Kara Nance |
211-217 |
WISE 6
|
Reaching Today’s Information Security Students Helen Armstrong, Ron Dodge, Colin Armstrong |
218-225 |
Some “Secure Programming” Exercises for an Introductory Programming Class Matt Bishop |
226-232 |
A SWOT Analysis of Virtual Laboratories for Security Education Alan Davidson, Javier Puente Martinez, Markus Huber |
233-240 |
Determinants of Password Security: Some Educational Aspects Lynette Drevin, Hennie Kruger, Tjaart Steyn |
241-248 |
Improving Awareness of Social Engineering Attacks Aaron Smith, Maria Papadaki, Steven Furnell |
249-256 |
A Risk-Based Approach to Formalise Information Security Requirements for Software Development Lynn Futcher, Rossouw Solms |
257-264 |
Two Case Studies in Using Chatbots for Security Training Stewart Kowalski, Katarina Pavlovska, Mikael Goldstein |
265-272 |
Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy |
273-279 |
Using Bloom’s Taxonomy for Information Security Education Johan Niekerk, Rossouw Solms |
280-287 |
Advancing Digital Forensics Katrin Franke, Erik Hjelmås, Stephen Wolthusen |
288-295 |