Toward a new meta-theory for designing information systems (IS) security training approaches

M Karjalainen, M Siponen - Journal of the Association for …, 2011 - aisel.aisnet.org
Employees' non-compliance with IS security procedures is a key concern for organizations.
To tackle this problem, there exist several training approaches aimed at changing …

Introduction of physics simulation in augmented reality

C Chae, K Ko - 2008 international symposium on ubiquitous …, 2008 - ieeexplore.ieee.org
In 3D computer graphics, it has been an important issue to describe a virtual object
realistically and show it in a physically correct manner. Unlike the virtual reality (VR), the …

Hands-on exercises for it security education

X Wang, Y Bai, GC Hembroff - … of the 16th Annual Conference on …, 2015 - dl.acm.org
We have developed a collection of instructional hands-on lab assignments that can be used
to help teach security courses or courses with a security component in information …

Improving employees' information systems (IS) security behavior: toward a meta-theory of IS security training and a new framework for understanding employees' IS …

M Karjalainen - 2011 - oulurepo.oulu.fi
Employee non-compliance with information systems (IS) security procedures is a key
concern for organizations. However, even though the importance of having effective IS …

Interactive teaching methods in information security course

J Li, Y Zhao, L Shi - 2009 International Conference on Scalable …, 2009 - ieeexplore.ieee.org
Information security course for undergraduate students is a growing activity in many
universities and colleges. One of the primary questions that all instructors face is how to …

An analysis of knowledge gain in youth cybersecurity education programs

LV Mangold - 2016 - search.proquest.com
The number of cybersecurity professionals in the US workforce does not meet the growing
demand for these specialists. Research has shown that this problem has not improved and …

Entrepreneurship at North Carolina State University

JM Pollack, SH Barr, TL Michaelis… - … and Pedagogy–2018, 2018 - elgaronline.com
14. Entrepreneurship at North Carolina State University Page 1 247 14. Entrepreneurship at
North Carolina State University Jeffrey M. Pollack, Steve H. Barr, Timothy L. Michaelis, MK …

Teaching reform of information security curriculum of distance learning

T Chen, W Hu, Q Shi - 2009 First International Workshop on …, 2009 - ieeexplore.ieee.org
Information security is becoming more and more important in recent years. It covers fruitful
contents and still in rapid continuous changes. How to teach information security is a …

Adaptive method for decreasing over-covered areas in wireless sensor networks

M Negahdar, M Ardebilipour… - 2008 The Fourth …, 2008 - ieeexplore.ieee.org
Sensor networks specifications are highly dependent on the application defined for the
network. In this paper we tried to achieve adaptive method for decreasing over-covered …

[PDF][PDF] Toward eliminating an unsupported statement in engineering education research and literature

K Holbert - 2009 Annual Conference & Exposition, 2009 - sftp.asee.org
What evidence exists to support the commonly used STATEMENT that people remember:
10% of what they read; 20% of what they hear; 30% of what they see; 50% of what they hear …