Colin J. Armstrong An Analysis of Computer Forensic Practitioners Perspectives on Education and Training Requirements. [Citation Graph (0, 0)][DBLP] World Conference on Information Security Education, 2007, pp:1-8 [Conf]
Matt Bishop E-Voting as a Teaching Tool. [Citation Graph (0, 0)][DBLP] World Conference on Information Security Education, 2007, pp:17-24 [Conf]
Alan Davidson, Kjell Näckros Practical Assignments in IT Security for Contemporary Higher Education. [Citation Graph (0, 0)][DBLP] World Conference on Information Security Education, 2007, pp:25-32 [Conf]
Lynn Futcher, Rossouw von Solms SecSDM: A Model for Integrating Security into the Software Development Life Cycle. [Citation Graph (0, 0)][DBLP] World Conference on Information Security Education, 2007, pp:41-48 [Conf]
Jeffrey A. Mattson Cyber Defense Exercise: A Service Provider Model. [Citation Graph (0, 0)][DBLP] World Conference on Information Security Education, 2007, pp:81-86 [Conf]
Kjell Näckros Learning Security through Computer Games: Studying user behavior in a real-world situation. [Citation Graph (0, 0)][DBLP] World Conference on Information Security Education, 2007, pp:95-103 [Conf]
Matthew Simon, Jill Slay Forensic Computing Training, Certification and Accreditation: An Australian Overview. [Citation Graph (0, 0)][DBLP] World Conference on Information Security Education, 2007, pp:105-112 [Conf]
Anatoly Temkin Teaching Cryptography to Continuing Education Students. [Citation Graph (0, 0)][DBLP] World Conference on Information Security Education, 2007, pp:121-128 [Conf]
Stephen D. Wolthusen The Role of Mathematics in Information Security Education. [Citation Graph (0, 0)][DBLP] World Conference on Information Security Education, 2007, pp:129-136 [Conf]
Helen Armstrong, Colin J. Armstrong The Role of Information Security Industry Training and Accreditation in Tertiary Education. [Citation Graph (0, 0)][DBLP] World Conference on Information Security Education, 2007, pp:137-140 [Conf]