Table of Contents
|
Information Security Education. Information Security in Action Lynette Drevin, Suné von Solms, Marianthi Theocharidou |
Front Matter |
Teaching Methods and Tools
|
Learning and Grading Cryptology via Automated Test Driven Software Development Konstantin Knorr |
3-17 |
An Institutional Risk Reduction Model for Teaching Cybersecurity Erik Moore, Daniel Likarish, Bobbie Bastian, Michael Brooks |
18-31 |
Education for the Multifaith Community of Cybersecurity Steven Furnell, Matt Bishop |
32-45 |
Quality Criteria for Cyber Security MOOCs Simone Fischer-Hübner, Matthias Beckerle, Alberto Lluch Lafuente, Antonio Ruiz Martínez, Karo Saharinen, Antonio Skarmeta, Pierantonia Sterlini |
46-60 |
An Analysis and Evaluation of Open Source Capture the Flag Platforms as Cybersecurity e-Learning Tools Stylianos Karagiannis, Elpidoforos Maragkos-Belmpas, Emmanouil Magkos |
61-77 |
Cybersecurity Knowledge Within the Organisation
|
Designing Competency Models for Cybersecurity Professionals for the Banking Sector Andrey Vybornov, Natalia Miloslavskaya, Alexander Tolstoy |
81-95 |
Exploring the Value of a Cyber Threat Intelligence Function in an Organization Jacques Ophoff, Anzel Berndt |
96-109 |
Automating the Communication of Cybersecurity Knowledge: Multi-case Study Alireza Shojaifar, Samuel Fricker, Martin Gwerder |
110-124 |
Gaming for Cybersecurity Training
|
A Serious Game-Based Peer-Instruction Digital Forensics Workshop Ludwig Englbrecht, Günther Pernul |
127-141 |
Threat Poker: Gamification of Secure Agile Audun Jøsang, Viktoria Stray, Hanne Rygge |
142-155 |
Teaching of Detection and Forensics
|
How to Teach the Undecidability of Malware Detection Problem and Halting Problem Matthieu Journault, Pascal Lafourcade, Malika More, Rémy Poulain, Léo Robert |
159-169 |
Enlivening Port Scanning Exercises with Capture the Flag and Deduction Frans Blauw |
170-183 |
Encouraging Equivocal Forensic Analysis Through the Use of Red Herrings Wai Leung |
184-197 |