IFIP TC6 Open Digital Library

5. World Conference on Information Security Education 2007: West Point, New York, USA

Fifth World Conference on Information Security Education, Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA

Lynn Futcher, Ronald Dodge

Springer, IFIP 237, ISBN: 978-0-387-73268-8


Refereed Papers

An Analysis of Computer Forensic Practitioners Perspectives on Education and Training Requirements.

Colin J. Armstrong


Resubmit my Information Security Thesis? - You must be joking!

Helen Armstrong, Louise Yngström


E-Voting as a Teaching Tool.

Matt Bishop


Practical Assignments in IT Security for Contemporary Higher Education.

Alan Davidson, Kjell Näckros


Email Security Awareness - a Practical Assessment of Employee Behaviour.

Hennie A. Kruger, Lynette Drevin, Tjaart Steyn


SecSDM: A Model for Integrating Security into the Software Development Life Cycle.

Lynn Futcher, Rossouw von Solms


A CBK for Information Security and Critical Infrastructure Protection.

Marianthi Theoharidou, Eleftheria Stougiannou, Dimitris Gritzalis


A Course on Computer and Network Security: Teaching Online Versus Face-to-Face.

Suresh Kalathur, Lubomir T. Chitkushev, Stuart Jacobs, Tanya Zlateva, Anatoly Temkin


An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education.

Clare Wilson, Vasilios Katos, Caroline Strevens


Experiences from Educating Practitioners in Vulnerability Analysis.

Stefan Lindskog, Hans Hedbom, Leonardo A. Martucci, Simone Fischer-Hübner


Cyber Defense Exercise: A Service Provider Model.

Jeffrey A. Mattson


Information Security Specialist Training for the Banking Sphere.

Andrey P. Kurilo, Natalia G. Miloslavskaya, Alexander I. Tolstoy


Learning Security through Computer Games: Studying user behavior in a real-world situation.

Kjell Näckros


Forensic Computing Training, Certification and Accreditation: An Australian Overview.

Matthew Simon, Jill Slay


Software Assignments for a Course in Secure E-Commerce.

Chris Steketee, Phillip Lock


Teaching Cryptography to Continuing Education Students.

Anatoly Temkin


The Role of Mathematics in Information Security Education.

Stephen D. Wolthusen


Invited Papers

The Role of Information Security Industry Training and Accreditation in Tertiary Education.

Helen Armstrong, Colin J. Armstrong


How to Design Computer Security Experiments.

Sean Peisert, Matt Bishop