ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
5
views
2
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,006
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Realism in Teaching Cybersecurity Research: The Agile Research Process
other
Author(s):
Melissa Dark
,
Matt Bishop
,
Richard Linger
,
Luanne Goldrich
Publication date
(Print):
2015
Publisher:
Springer International Publishing
Read this book at
Publisher
Further versions
open (via free pdf)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH title and first author match)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Teaching and learning evolution
Most cited references
2
Record
: found
Abstract
: not found
Article
: not found
Cybersecurity: From Months to Milliseconds
Peter Fonash
,
Phyllis Schneck
(2015)
0
comments
Cited
3
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
The need for a national cybersecurity research and development agenda
Douglas Maughan
(2010)
0
comments
Cited
2
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2015
Pages
: 3-14
DOI:
10.1007/978-3-319-18500-2_1
SO-VID:
ca5d7d42-b571-410a-bd63-26cbae27dbeb
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Realism in Teaching Cybersecurity Research: The Agile Research Process
pp. 15
Assurance Cases as a Didactic Tool for Information Security
pp. 27
Cognitive Task Analysis Based Training for Cyber Situation Awareness
pp. 41
A Cyber Security Multi Agency Collaboration for Rapid Response that Uses AGILE Methods on an Education Infrastructure
pp. 53
Cybersecurity Through Secure Software Development
pp. 64
Security Injections 2.0: Increasing Engagement and Faculty Adoption Using Enhanced Secure Coding Modules for Lower-Level Programming Courses
pp. 75
The Use of Software Design Patterns to Teach Secure Software Design: An Integrated Approach
pp. 87
Learn to Spot Phishing URLs with the Android NoPhish App
pp. 101
An Innovative Approach in Digital Forensic Education and Training
pp. 111
On Experience of Using Distance Learning Technologies for Teaching Cryptology
pp. 125
Reflections on the Ethical Content of the IT Honours Program Project Module
pp. 135
Professional Competencies Level Assessment for Training of Masters in Information Security
pp. 146
History of Cryptography in Syllabus on Information Security Training
Similar content
4,006
Controller Required? The Impact of Natural Mapping on Interactivity, Realism, Presence, and Enjoyment in Motion-Based Video Games
Authors:
Corey Carbonara
,
Daniel M. Shafer
,
Lucy Popova
How Real Is Too Real? User-Testing the Effects of Realism as a Risk Communication Strategy in Sea Level Rise Visualizations
Authors:
Daniel Richards
,
Erin E. Jacobson
Sequentiality as Realism
Authors:
Hannah Miodrag
See all similar
Cited by
2
The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber Performance
Authors:
Jessica Dawson
,
Robert Thomson
The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity Research
Authors:
Alan Sherman
,
Paul Dark
,
Marcia A Chan
…
See all cited by