Fifth World Conference on Information Security Education Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA /

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Futcher, Lynn (Editor), Dodge, Ronald (Editor)
Format: Electronic eBook
Language:English
Published: Boston, MA : Springer US, 2007.
Series:IFIP — International Federation for Information Processing, 237
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • Refereed Papers
  • An Analysis of Computer Forensic Practitioners Perspectives on Education and Training Requirements
  • Resubmit my Information Security Thesis? — You must be joking!
  • E-Voting as a Teaching Tool
  • Practical Assignments in IT Security for Contemporary Higher Education
  • Email Security Awareness — a Practical Assessment of Employee Behaviour
  • SecSDM: A Model for Integrating Security into the Software Development Life Cycle
  • A CBK for Information Security and Critical Infrastructure Protection
  • A Course on Computer and Network Security: Teaching Online Versus Face-to-Face
  • An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education
  • Experiences from Educating Practitioners in Vulnerability Analysis
  • Cyber Defense Exercise: A Service Provider Model
  • Information Security Specialist Training for the Banking Sphere
  • Learning Security through Computer Games: Studying user behavior in a real-world situation
  • Forensic Computing Training, Certification and Accreditation: An Australian Overview
  • Software Assignments for a Course in Secure E-Commerce
  • Teaching Cryptography to Continuing Education Students
  • The Role of Mathematics in Information Security Education
  • Invited Papers
  • The Role of Information Security Industry Training and Accreditation in Tertiary Education
  • How to Design Computer Security Experiments.