Development of serious games for teaching information security courses

M Mostafa, OS Faragallah - IEEE Access, 2019 - ieeexplore.ieee.org
Serious games have been used effectively in many educational domains. Games may be
utilized efficiently to attract students to information security track. Learning practical …

Using visualization to teach security

D Schweitzer, W Brown - Journal of Computing Sciences in Colleges, 2009 - dl.acm.org
Interactive visualization tools have been shown to be an effective means for engaging
students in the learning process. Information security is a complex topic that can benefit from …

Security in computer literacy: a model for design, dissemination, and assessment

CF Turner, B Taylor, S Kaza - Proceedings of the 42nd ACM technical …, 2011 - dl.acm.org
While many colleges offer specialized security courses and tracks for students in computing
majors, there are few offerings in information security for the non-computing majors …

Designing web labs for teaching security concepts

D Schweitzer, J Boleng - Journal of Computing Sciences in Colleges, 2009 - dl.acm.org
Security education is critical in today's cyber-threat environment. Many schools have
investigated different approaches to teaching fundamental security concepts through …

[PDF][PDF] Meeting the criteria for a Center of Academic Excellence (CAE) in information assurance education

D Schweitzer, J Humphries, L Baird - Journal of Computing Sciences in …, 2006 - Citeseer
Information assurance is a critical topic in computer science curricula. Several publications
in the educational literature address the development of curriculum and integration of …

Development of a Small Cybersecurity Program at a Community College.

P Ward - Information Systems Education Journal, 2021 - ERIC
This paper introduces the problem of constructing a methodology to develop a cybersecurity
program. The goal of the program is to prepare students graduating from an accredited two …

Anatomy of the information security workforce

JK Lee, S Bagchi-Sen, HR Rao… - IT professional, 2010 - ieeexplore.ieee.org
Survey results indicate that the information security workforce, one of the fastest growing
subgroups in IT, is a unique professional niche with distinctive task responsibilities, job …

Embedding information security curricula in existing programmes

K Petrova, A Philpott, P Kaskenpalo… - Proceedings of the 1st …, 2004 - dl.acm.org
There is a need for educators of information technology professionals to monitor the
demands of the market and to adjust their programmes and curriculum accordingly. A …

Constructing a methodology for developing a cybersecurity program

P Ward - 2021 - aisel.aisnet.org
This paper serves to introduce the problem of constructing a methodology to develop a
cybersecurity program. The goal of the program is to prepare students graduating from an …

The challenges of designing lab exercises for a curriculum in computer security

R Tikekar, T Bacon - Journal of Computing Sciences in Colleges, 2003 - dl.acm.org
Increasing awareness of the vulnerabilities of computer systems has led to the introduction
of several programs in computer security. Most of these programs are meant to attract …