Table of Contents
|
Information Security Education Matt Bishop, Lynn Futcher, Natalia Miloslavskaya, Marianthi Theocharidou |
Front Matter |
Information Security Education
|
Cybersecurity Curricular Guidelines Matt Bishop, Diana Burley, Scott Buck, Joseph Ekstrom, Lynn Futcher, David Gibson, Elizabeth Hawthorne, Siddharth Kaza, Yair Levy, Herbert Mattord, Allen Parrish |
3-13 |
Designing Degree Programmes for Bachelors and Masters in Information Security Natalia Miloslavskaya, Alexander Tolstoy |
14-26 |
Assessing the Effectiveness of the Cisco Networking Academy Program in Developing Countries Odwa Yekela, Kerry-Lynn Thomson, Johan Niekerk |
27-38 |
Pathways in Cybersecurity: Translating Theory into Practice Susanne Wetzel |
39-48 |
Teaching Information Security
|
Evaluating Secure Programming Knowledge Matt Bishop, Jun Dai, Melissa Dark, Ida Ngambeki, Phillip Nico, Minghua Zhu |
51-62 |
Studying Formal Security Proofs for Cryptographic Protocols Konstantin Kogos, Sergey Zapechnikov |
63-73 |
Introducing Mobile Network Security Experiments to Communication Technology Education Stig Mjølsnes, Ruxandra Olimid |
74-83 |
Information Security Awareness and Culture
|
A Linguistic Approach to Information Security Awareness Education in a Healthcare Environment Lynette Drevin, Hennie Kruger, Anna-Marie Bell, Tjaart Steyn |
87-97 |
Cybersecurity Culture: An Ill-Defined Problem Noluxolo Gcaza, Rossouw Solms |
98-109 |
A Study into the Cybersecurity Awareness Initiatives for School Learners in South Africa and the UK Elmarie Kritzinger, Maria Bada, Jason Nurse |
110-120 |
South African Computing Educators’ Perspectives on Information Security Behaviour Thandolwethu Mabece, Lynn Futcher, Kerry-Lynn Thomson |
121-132 |
Training Information Security Professionals
|
ISO/IEC Competence Requirements for Information Security Professionals Natalia Miloslavskaya, Alexander Tolstoy |
135-146 |
Evaluating a Multi Agency Cyber Security Training Program Using Pre-post Event Assessment and Longitudinal Analysis Erik Moore, Steven Fulton, Dan Likarish |
147-156 |
“Network Security Intelligence” Educational and Research Center Natalia Miloslavskaya, Alexander Tolstoy, Anton Migalin |
157-168 |