Abstract is missing.
- Back to Basics: Information Security Education for the Youth via GameplayRayne Reid, Johan Van Niekerk. 1-10 [doi]
- Virtual Penetration Testing: A Joint Education Exercise across Geographic BordersHelen Armstrong, Matt Bishop, Colin J. Armstrong. 11-19 [doi]
- Developing Cyber Competition Infrastructure Using the SCRUM FrameworkHeath Novak, Daniel M. Likarish, Erik Moore. 20-31 [doi]
- Security Education: The Challenge beyond the ClassroomSteven M. Furnell. 32-38 [doi]
- Background to the Development of a Curriculum for the History of "Cyber" and "Communications" SecurityWilliam J. Caelli, Vicky Liu, Dennis Longley. 39-47 [doi]
- Information Assurance and Security in the ACM/IEEE CS2013Ronald C. Dodge. 48-57 [doi]
- Fostering Content Relevant Information Security Awareness through Browser ExtensionsMarius Potgieter, Craig Marais, Mariana Gerber. 58-67 [doi]
- PKI Interoperability: Still an Issue? A Solution in the X.509 RealmAhmad Samer Wazan, Romain Laborde, François Barrère, Abdelmalek Benzekri, David W. Chadwick. 68-82 [doi]
- The Power of Hands-On Exercises in SCADA Cyber Security EducationElena Sitnikova, Ernest Foo, Rayford B. Vaughn. 83-94 [doi]
- "Business Continuity and Information Security Maintenance" Masters' Training ProgramNatalia G. Miloslavskaya, Mikhail Senatorov, Alexander I. Tolstoy, Sergei Zapechnikov. 95-102 [doi]
- Cyber Safety for School Children - A Case Study in the Nelson Mandela MetropolisJohan Van Niekerk, Kerry-Lynn Thomson, Rayne Reid. 103-112 [doi]
- A Review of IFIP TC 11 WG 11.8 Publications through the AgesLynn Futcher, Louise Yngström. 113-122 [doi]
- Preparing Our Undergraduates to Enter a Cyber WorldDino Schweitzer, David Gibson, David Bibighaus, Jeff Boleng. 123-130 [doi]
- How to Secure the Cloud Based Enterprise Information System - - A Case Study on Security Education as the Critical Foundation for a MS-EIS ProgramYanzhen Qu. 131-139 [doi]
- Robust Programming by ExampleMatt Bishop, Chip Elliott. 140-147 [doi]
- An Approach to Visualising Information Security KnowledgeColin J. Armstrong. 148-155 [doi]
- Creating Shareable Security ModulesKara L. Nance, Blair Taylor, Ronald Dodge, Brian Hay. 156-163 [doi]
- Towards a Pervasive Information Assurance Security Educational Model for Information Technology CurriculaLynn Futcher, Johan Van Niekerk. 164-171 [doi]
- Two Approaches to Information Security Doctoral ResearchHelen Armstrong. 172-179 [doi]
- Towards Information Security Education 3.0 - A Call for Information Security Educational OntologiesJohan Van Niekerk, Ryan Goss. 180-187 [doi]
- The Use of Second Life® to Teach Physical Security across Different Teaching ModesVincent Nestler, Erik L. Moore, Kai-Yi Clark Huang, Devshikha Bose. 188-195 [doi]
- An Enterprise Anti-phishing FrameworkEdwin Donald Frauenstein, Rossouw von Solms. 196-203 [doi]
- Teaching Computer Security with a Hands-On ComponentNarayan Murthy. 204-210 [doi]
- The Strengths and Challenges of Analogical Approaches to Computer Security EducationMatt Bishop, Kara L. Nance. 211-217 [doi]
- Reaching Today's Information Security StudentsHelen Armstrong, Ronald C. Dodge, Colin J. Armstrong. 218-225 [doi]
- Some "Secure Programming" Exercises for an Introductory Programming ClassMatt Bishop. 226-232 [doi]
- A SWOT Analysis of Virtual Laboratories for Security EducationAlan Davidson, Javier de La Puente Martinez, Markus Huber. 233-240 [doi]
- Determinants of Password Security: Some Educational AspectsLynette Drevin, Hennie A. Kruger, Tjaart Steyn. 241-248 [doi]
- Improving Awareness of Social Engineering AttacksAaron Smith, Maria Papadaki, Steven M. Furnell. 249-256 [doi]
- A Risk-Based Approach to Formalise Information Security Requirements for Software DevelopmentLynn Futcher, Rossouw von Solms. 257-264 [doi]
- Two Case Studies in Using Chatbots for Security TrainingStewart Kowalski, Katarina Pavlovska, Mikael Goldstein. 265-272 [doi]
- Information Security Specialist Training on the Basis of ISO/IEC 27002Natalia G. Miloslavskaya, Alexander I. Tolstoy. 273-279 [doi]
- Using Bloom's Taxonomy for Information Security EducationJohan Van Niekerk, Rossouw von Solms. 280-287 [doi]
- Advancing Digital ForensicsKatrin Franke, Erik Hjelmås, Stephen D. Wolthusen. 288-295 [doi]