index - Information Security Education for a Global Digital Society
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Information Security Education
Matt Bishop, Lynn Futcher, Natalia Miloslavskaya, Marianthi Theocharidou
Front Matter

Information Security Education


Cybersecurity Curricular Guidelines
Matt Bishop, Diana Burley, Scott Buck, Joseph Ekstrom, Lynn Futcher, David Gibson, Elizabeth Hawthorne, Siddharth Kaza, Yair Levy, Herbert Mattord, Allen Parrish
3-13
Designing Degree Programmes for Bachelors and Masters in Information Security
Natalia Miloslavskaya, Alexander Tolstoy
14-26
Assessing the Effectiveness of the Cisco Networking Academy Program in Developing Countries
Odwa Yekela, Kerry-Lynn Thomson, Johan Niekerk
27-38
Pathways in Cybersecurity: Translating Theory into Practice
Susanne Wetzel
39-48

Teaching Information Security


Evaluating Secure Programming Knowledge
Matt Bishop, Jun Dai, Melissa Dark, Ida Ngambeki, Phillip Nico, Minghua Zhu
51-62
Studying Formal Security Proofs for Cryptographic Protocols
Konstantin Kogos, Sergey Zapechnikov
63-73
Introducing Mobile Network Security Experiments to Communication Technology Education
Stig Mjølsnes, Ruxandra Olimid
74-83

Information Security Awareness and Culture


A Linguistic Approach to Information Security Awareness Education in a Healthcare Environment
Lynette Drevin, Hennie Kruger, Anna-Marie Bell, Tjaart Steyn
87-97
Cybersecurity Culture: An Ill-Defined Problem
Noluxolo Gcaza, Rossouw Solms
98-109
A Study into the Cybersecurity Awareness Initiatives for School Learners in South Africa and the UK
Elmarie Kritzinger, Maria Bada, Jason Nurse
110-120
South African Computing Educators’ Perspectives on Information Security Behaviour
Thandolwethu Mabece, Lynn Futcher, Kerry-Lynn Thomson
121-132

Training Information Security Professionals


ISO/IEC Competence Requirements for Information Security Professionals
Natalia Miloslavskaya, Alexander Tolstoy
135-146
Evaluating a Multi Agency Cyber Security Training Program Using Pre-post Event Assessment and Longitudinal Analysis
Erik Moore, Steven Fulton, Dan Likarish
147-156
“Network Security Intelligence” Educational and Research Center
Natalia Miloslavskaya, Alexander Tolstoy, Anton Migalin
157-168

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/