Abstract is missing.
- Realism in Teaching Cybersecurity Research: The Agile Research ProcessMelissa Dark, Matt Bishop, Richard C. Linger, Luanne Goldrich. 3-14 [doi]
- Assurance Cases as a Didactic Tool for Information SecurityRoberto Gallo, Ricardo Dahab. 15-26 [doi]
- Cognitive Task Analysis Based Training for Cyber Situation AwarenessZequn Huang, Chien-Chung Shen, Sheetal Doshi, Nimmi Thomas, Ha Duong. 27-40 [doi]
- A Cyber Security Multi Agency Collaboration for Rapid Response that Uses AGILE Methods on an Education InfrastructureErik Moore, Daniel M. Likarish. 41-50 [doi]
- Cybersecurity Through Secure Software DevelopmentAudun Jøsang, Marte Ødegaard, Erlend Oftedal. 53-63 [doi]
- Security Injections 2.0: Increasing Engagement and Faculty Adoption Using Enhanced Secure Coding Modules for Lower-Level Programming CoursesSagar Raina, Blair Taylor, Siddharth Kaza. 64-74 [doi]
- The Use of Software Design Patterns to Teach Secure Software Design: An Integrated ApproachJohan Van Niekerk, Lynn Futcher. 75-83 [doi]
- Learn to Spot Phishing URLs with the Android NoPhish AppGamze Canova, Melanie Volkamer, Clemens Bergmann, Roland Borza, Benjamin Reinheimer, Simon Stockhardt, Ralf Tenberg. 87-100 [doi]
- An Innovative Approach in Digital Forensic Education and TrainingPrimoz Cigoj, Borka Jerman-Blazic. 101-110 [doi]
- On Experience of Using Distance Learning Technologies for Teaching CryptologySergey Zapechnikov, Natalia G. Miloslavskaya, Vladimir Budzko. 111-121 [doi]
- Reflections on the Ethical Content of the IT Honours Program Project ModuleLynette Drevin, Günther Drevin. 125-134 [doi]
- Professional Competencies Level Assessment for Training of Masters in Information SecurityNatalia G. Miloslavskaya, Alexander I. Tolstoy. 135-145 [doi]
- History of Cryptography in Syllabus on Information Security TrainingSergey Zapechnikov, Alexander I. Tolstoy, Sergey Nagibin. 146-157 [doi]