6.-8. World Conference on Information Security Education 2009/2011/2013
Information Assurance and Security Education and Training - 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers
Ronald C. Dodge Jr., Lynn Futcher
Springer, IFIP Advances in Information and Communication Technology 406, ISBN: 978-3-642-39376-1
Contents
WISE 8, 2013
Back to Basics: Information Security Education for the Youth via Gameplay.
Rayne Reid, Johan Van Niekerk
1-10
Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders.
Helen Armstrong, Matt Bishop, Colin J. Armstrong
11-19
Developing Cyber Competition Infrastructure Using the SCRUM Framework.
Heath Novak, Daniel M. Likarish, Erik Moore
20-31
William J. Caelli, Vicky Liu, Dennis Longley
39-47
Fostering Content Relevant Information Security Awareness through Browser Extensions.
Marius Potgieter, Craig Marais, Mariana Gerber
58-67
PKI Interoperability: Still an Issue? A Solution in the X.509 Realm.
Ahmad Samer Wazan, Romain Laborde, François Barrère, Abdelmalek Benzekri, David W. Chadwick
68-82
The Power of Hands-On Exercises in SCADA Cyber Security Education.
Elena Sitnikova, Ernest Foo, Rayford B. Vaughn
83-94
"Business Continuity and Information Security Maintenance" Masters' Training Program.
Natalia G. Miloslavskaya, Mikhail Senatorov, Alexander I. Tolstoy, Sergei Zapechnikov
95-102
Cyber Safety for School Children - A Case Study in the Nelson Mandela Metropolis.
Johan Van Niekerk, Kerry-Lynn Thomson, Rayne Reid
103-112
WISE 7, 2011
Preparing Our Undergraduates to Enter a Cyber World.
Dino Schweitzer, David Gibson, David Bibighaus, Jeff Boleng
123-130
Yanzhen Qu
131-139
Lynn Futcher, Johan Van Niekerk
164-171
Towards Information Security Education 3.0 - A Call for Information Security Educational Ontologies.
Johan Van Niekerk, Ryan Goss
180-187
The Use of Second Life® to Teach Physical Security across Different Teaching Modes.
Vincent Nestler, Erik L. Moore, Kai-Yi Clark Huang, Devshikha Bose
188-195
The Strengths and Challenges of Analogical Approaches to Computer Security Education.
Matt Bishop, Kara L. Nance
211-217
WISE 6, 2009
Reaching Today's Information Security Students.
Helen Armstrong, Ronald C. Dodge, Colin J. Armstrong
218-225
A SWOT Analysis of Virtual Laboratories for Security Education.
Alan Davidson, Javier de La Puente Martinez, Markus Huber
233-240
Determinants of Password Security: Some Educational Aspects.
Lynette Drevin, Hennie A. Kruger, Tjaart Steyn
241-248
Improving Awareness of Social Engineering Attacks.
Aaron Smith, Maria Papadaki, Steven M. Furnell
249-256
A Risk-Based Approach to Formalise Information Security Requirements for Software Development.
Lynn Futcher, Rossouw von Solms
257-264
Two Case Studies in Using Chatbots for Security Training.
Stewart Kowalski, Katarina Pavlovska, Mikael Goldstein
265-272
Information Security Specialist Training on the Basis of ISO/IEC 27002.
Natalia G. Miloslavskaya, Alexander I. Tolstoy
273-279
Using Bloom's Taxonomy for Information Security Education.
Johan Van Niekerk, Rossouw von Solms
280-287