THE 发表于 2025-3-25 04:34:36

http://reply.papertrans.cn/47/4654/465306/465306_21.png

Picks-Disease 发表于 2025-3-25 07:53:21

The Feasibility of Raising Information Security Awareness in an Academic Environment Using SNAve shown that a balanced approach combining technology and security awareness is needed in order to maintain the integrity of an organisation’s security. At present, one of the methods most often used to address InfoSec awareness is to develop security awareness programmes that can be used to educat

ERUPT 发表于 2025-3-25 15:04:00

http://reply.papertrans.cn/47/4654/465306/465306_23.png

Default 发表于 2025-3-25 17:03:44

A MOOC on Privacy by Design and the GDPR principles and requirements in . engineering and management. This . aims at educating both professionals and undergraduate students, i.e., target groups with distinct educational needs and requirements, within a single course structure. We discuss why developing and publishing such a course is a ti

蚀刻 发表于 2025-3-25 23:40:28

http://reply.papertrans.cn/47/4654/465306/465306_25.png

投射 发表于 2025-3-26 02:02:13

Identifying the Cybersecurity Body of Knowledge for a Postgraduate Module in Systems Engineeringhysical systems. The high interconnectivity of these systems make these systems more susceptible to cyberattacks. In South Africa, the engineering education space does not traditionally cater for cybersecurity training in undergraduate or post-graduate studies. The lack of cybersecurity education in

Subjugate 发表于 2025-3-26 04:46:06

http://reply.papertrans.cn/47/4654/465306/465306_27.png

Cougar 发表于 2025-3-26 10:41:05

http://reply.papertrans.cn/47/4654/465306/465306_28.png

神经 发表于 2025-3-26 12:38:33

ts development and, above all, little with his family and the impact of detention on them. Especially if the perpetrator still has young children, their development can be significantly negatively affected by the detention of a parent, usually the father. In the last few years, more and more institu

字形刻痕 发表于 2025-3-26 19:41:27

Matt Bishopn crime. This chapter explores how simulation methods, specifically computational agent-based models, can aid in the specification, testing and refinement of crime event theories that underlie prospective situational crime prevention efforts before resource intensive implementation and evaluation ar
页: 1 2 [3] 4 5
查看完整版本: Titlebook: Information Security Education – Towards a Cybersecure Society; 11th IFIP WG 11.8 Wo Lynette Drevin,Marianthi Theocharidou Conference proce