Abstract is missing.
- Learning and Grading Cryptology via Automated Test Driven Software DevelopmentKonstantin Knorr. 3-17 [doi]
- An Institutional Risk Reduction Model for Teaching CybersecurityErik Moore, Daniel M. Likarish, Bobbie Bastian, Michael Brooks. 18-31 [doi]
- Education for the Multifaith Community of CybersecuritySteven Furnell, Matt Bishop. 32-45 [doi]
- Quality Criteria for Cyber Security MOOCsSimone Fischer-Hübner, Matthias Beckerle, Alberto Lluch-Lafuente, Antonio Ruiz-Martínez, Karo Saharinen, Antonio F. Skarmeta, Pierantonia Sterlini. 46-60 [doi]
- An Analysis and Evaluation of Open Source Capture the Flag Platforms as Cybersecurity e-Learning ToolsStylianos Karagiannis, Elpidoforos Maragkos-Belmpas, Emmanouil Magkos. 61-77 [doi]
- Designing Competency Models for Cybersecurity Professionals for the Banking SectorAndrey Vybornov, Natalia G. Miloslavskaya, Alexander I. Tolstoy. 81-95 [doi]
- Exploring the Value of a Cyber Threat Intelligence Function in an OrganizationAnzel Berndt, Jacques Ophoff. 96-109 [doi]
- Automating the Communication of Cybersecurity Knowledge: Multi-case StudyAlireza Shojaifar, Samuel A. Fricker, Martin Gwerder. 110-124 [doi]
- A Serious Game-Based Peer-Instruction Digital Forensics WorkshopLudwig Englbrecht, Günther Pernul. 127-141 [doi]
- Threat Poker: Gamification of Secure AgileAudun Jøsang, Viktoria Stray, Hanne Rygge. 142-155 [doi]
- How to Teach the Undecidability of Malware Detection Problem and Halting ProblemMatthieu Journault, Pascal Lafourcade 0001, Malika More, Rémy Poulain, Léo Robert. 159-169 [doi]
- Enlivening Port Scanning Exercises with Capture the Flag and DeductionFrans F. Blauw. 170-183 [doi]
- Encouraging Equivocal Forensic Analysis Through the Use of Red HerringsWai Sze Leung. 184-197 [doi]