World Conference on Information Security Education 2009/2011/2013" /> IFIP TC6 Open Digital Library

6.-8. World Conference on Information Security Education 2009/2011/2013

Information Assurance and Security Education and Training - 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers

Ronald C. Dodge Jr., Lynn Futcher

Springer, IFIP Advances in Information and Communication Technology 406, ISBN: 978-3-642-39376-1


WISE 8, 2013

Back to Basics: Information Security Education for the Youth via Gameplay.

Rayne Reid, Johan Van Niekerk


Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders.

Helen Armstrong, Matt Bishop, Colin J. Armstrong


Developing Cyber Competition Infrastructure Using the SCRUM Framework.

Heath Novak, Daniel M. Likarish, Erik Moore


Security Education: The Challenge beyond the Classroom.

Steven M. Furnell


Background to the Development of a Curriculum for the History of "Cyber" and "Communications" Security.

William J. Caelli, Vicky Liu, Dennis Longley


Information Assurance and Security in the ACM/IEEE CS2013.

Ronald C. Dodge


Fostering Content Relevant Information Security Awareness through Browser Extensions.

Marius Potgieter, Craig Marais, Mariana Gerber


PKI Interoperability: Still an Issue? A Solution in the X.509 Realm.

Ahmad Samer Wazan, Romain Laborde, François Barrère, Abdelmalek Benzekri, David W. Chadwick


The Power of Hands-On Exercises in SCADA Cyber Security Education.

Elena Sitnikova, Ernest Foo, Rayford B. Vaughn


"Business Continuity and Information Security Maintenance" Masters' Training Program.

Natalia G. Miloslavskaya, Mikhail Senatorov, Alexander I. Tolstoy, Sergei Zapechnikov


Cyber Safety for School Children - A Case Study in the Nelson Mandela Metropolis.

Johan Van Niekerk, Kerry-Lynn Thomson, Rayne Reid


A Review of IFIP TC 11 WG 11.8 Publications through the Ages.

Lynn Futcher, Louise Yngström


WISE 7, 2011

Preparing Our Undergraduates to Enter a Cyber World.

Dino Schweitzer, David Gibson, David Bibighaus, Jeff Boleng


How to Secure the Cloud Based Enterprise Information System - - A Case Study on Security Education as the Critical Foundation for a MS-EIS Program.

Yanzhen Qu


Robust Programming by Example.

Matt Bishop, Chip Elliott


An Approach to Visualising Information Security Knowledge.

Colin J. Armstrong


Creating Shareable Security Modules.

Kara L. Nance, Blair Taylor, Ronald Dodge, Brian Hay


Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula.

Lynn Futcher, Johan Van Niekerk


Two Approaches to Information Security Doctoral Research.

Helen Armstrong


Towards Information Security Education 3.0 - A Call for Information Security Educational Ontologies.

Johan Van Niekerk, Ryan Goss


The Use of Second Life® to Teach Physical Security across Different Teaching Modes.

Vincent Nestler, Erik L. Moore, Kai-Yi Clark Huang, Devshikha Bose


An Enterprise Anti-phishing Framework.

Edwin Donald Frauenstein, Rossouw von Solms


Teaching Computer Security with a Hands-On Component.

Narayan Murthy


The Strengths and Challenges of Analogical Approaches to Computer Security Education.

Matt Bishop, Kara L. Nance


WISE 6, 2009

Reaching Today's Information Security Students.

Helen Armstrong, Ronald C. Dodge, Colin J. Armstrong


Some "Secure Programming" Exercises for an Introductory Programming Class.

Matt Bishop


A SWOT Analysis of Virtual Laboratories for Security Education.

Alan Davidson, Javier de La Puente Martinez, Markus Huber


Determinants of Password Security: Some Educational Aspects.

Lynette Drevin, Hennie A. Kruger, Tjaart Steyn


Improving Awareness of Social Engineering Attacks.

Aaron Smith, Maria Papadaki, Steven M. Furnell


A Risk-Based Approach to Formalise Information Security Requirements for Software Development.

Lynn Futcher, Rossouw von Solms


Two Case Studies in Using Chatbots for Security Training.

Stewart Kowalski, Katarina Pavlovska, Mikael Goldstein


Information Security Specialist Training on the Basis of ISO/IEC 27002.

Natalia G. Miloslavskaya, Alexander I. Tolstoy


Using Bloom's Taxonomy for Information Security Education.

Johan Van Niekerk, Rossouw von Solms


Advancing Digital Forensics.

Katrin Franke, Erik Hjelmås, Stephen D. Wolthusen