LEADER 06039nam 22007695 450 001 9910437565503321 005 20230810211113.0 010 $a3-642-39377-2 024 7 $a10.1007/978-3-642-39377-8 035 $a(CKB)3710000000002632 035 $a(DE-He213)978-3-642-39377-8 035 $a(SSID)ssj0000960667 035 $a(PQKBManifestationID)11516487 035 $a(PQKBTitleCode)TC0000960667 035 $a(PQKBWorkID)10958768 035 $a(PQKB)10398342 035 $a(MiAaPQ)EBC3092051 035 $a(PPN)17242819X 035 $a(EXLCZ)993710000000002632 100 $a20130703d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Assurance and Security Education and Training $e8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne, Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers /$fedited by Ronald C. Dodge, Lynn Futcher 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XII, 297 p. 46 illus.) 225 1 $aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v406 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-39376-4 320 $aIncludes bibliographical references and index. 327 $aBack to Basics: Information Security Education for the Youth via Gameplay -- Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders -- Developing Cyber Competition Infrastructure Using the SCRUM Framework -- Security Education: The Challenge beyond the Classroom -- Background to the Development of a Curriculum for the History of ?Cyber? and ?Communications? Security -- Information Assurance and Security in the ACM/IEEE CS2013 -- Fostering Content Relevant Information Security Awareness through Browser Extensions -- PKI Interoperability: Still an Issue? A Solution in the X.509 Realm -- The Power of Hands-On Exercises in SCADA Cyber Security Education -- ?Business Continuity and Information Security Maintenance? Masters? Training Program -- Cyber Safety for School Children: A Case Study in the Nelson Mandela Metropolis -- A Review of IFIP TC 11 WG 11.8 Publications through the Ages -- Preparing Our Undergraduates to Enter a Cyber World -- How to Secure the Cloud Based Enterprise Information System ? A Case Study on Security Education as the Critical Foundation for a MS-EIS Program -- Robust Programming by Example -- An Approach to Visualising Information Security Knowledge -- Creating Shareable Security Modules -- Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula -- Two Approaches to Information Security Doctoral Research -- Towards Information Security Education 3.0: A Call for Information Security Educational Ontologies -- The Use of Second Life ® to Teach Physical Security across Different Teaching Modes -- An Enterprise Anti-phishing Framework -- Teaching Computer Security with a Hands-On Component -- The Strengths and Challenges of Analogical Approaches to Computer Security Education -- Reaching Today?s Information Security Students -- Some ?Secure Programming? Exercises for an Introductory Programming Class -- A SWOT Analysis of Virtual Laboratories for Security Education -- Determinants of Password Security: Some Educational Aspects -- Improving Awareness of Social Engineering Attacks -- A Risk-Based Approach to Formalise Information Security Requirements for Software Development -- Two Case Studies in Using Chatbots for Security Training -- Information Security Specialist Training on the Basis of ISO/IEC 27002 -- Using Bloom?s Taxonomy for Information Security Education -- Advancing Digital Forensics. 330 $aThis book constitutes the refereed proceedings of the 8th IFIP WG 11.8 World Conference on Security Education, WISE 8, held in Auckland, New Zealand, in July 2013. It also includes papers from WISE 6, held in Bento Gonçalves, Brazil, in July 2009 and WISE 7, held in Lucerne, Switzerland in June 2011. The 34 revised papers presented were carefully reviewed and selected for inclusion in this volume. They represent a cross section of applicable research as well as case studies in security education. 410 0$aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v406 606 $aData protection 606 $aElectronic data processing$xManagement 606 $aComputer networks 606 $aApplication software 606 $aEducational technology 606 $aTeachers$xTraining of 606 $aData and Information Security 606 $aIT Operations 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 606 $aDigital Education and Educational Technology 606 $aTeaching and Teacher Education 615 0$aData protection. 615 0$aElectronic data processing$xManagement. 615 0$aComputer networks. 615 0$aApplication software. 615 0$aEducational technology. 615 0$aTeachers$xTraining of. 615 14$aData and Information Security. 615 24$aIT Operations. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 615 24$aDigital Education and Educational Technology. 615 24$aTeaching and Teacher Education. 676 $a005.8 702 $aDodge$b Ronald C$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFutcher$b Lynn$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910437565503321 996 $aInformation Assurance and Security Education and Training$92532009 997 $aUNINA