Identifying Core Concepts of Cybersecurity: Results of Two Delphi Processes
暂无分享,去创建一个
Alan T. Sherman | Geoffrey L. Herman | Linda Oliva | Dhananjay Phatak | David DeLatte | Travis Scheponik | Geet Parekh | A. Sherman | D. Phatak | Travis Scheponik | Linda Oliva | D. DeLatte | Geet Parekh
[1] Mark Clayton. Delphi: a technique to harness expert opinion for critical decision‐making tasks in education , 1997 .
[2] R. Likert. “Technique for the Measurement of Attitudes, A” , 2022, The SAGE Encyclopedia of Research Design.
[3] A. Strauss,et al. The discovery of grounded theory: strategies for qualitative research aldine de gruyter , 1968 .
[4] Dhananjay S. Phatak,et al. How students reason about Cybersecurity concepts , 2016, 2016 IEEE Frontiers in Education Conference (FIE).
[5] Olaf Helmer,et al. ANALYSIS OF THE FUTURE: THE DELPHI METHOD , 1967 .
[6] Michael C. Loui,et al. AC2012-4637: IDENTIFYINGTHECORECONCEPTUALFRAMEWORK OF DIGITAL LOGIC , 2012 .
[7] Bryan R. Cole,et al. Stability of response characteristics of a Delphi panel: application of bootstrap data expansion , 2005, BMC medical research methodology.
[8] Edmund J. Hansen,et al. Idea-Based Learning: A Course Design Process to Promote Conceptual Understanding , 2011 .
[9] Mark Bullen,et al. What is Instructional Design , 2014 .
[10] Ivy Liu,et al. Analysis of Ordinal Categorical Data, 2nd edn by Alan Agresti , 2011 .
[11] Karl A. Smith,et al. Aligning Course Content, Assessment, and Delivery: Creating a Context for Outcome-Based Education , 2012 .
[12] Camille François,et al. Mozilla Cybersecurity Delphi 1.0: Towards a user-centric policy framework , 2015 .
[13] Rocco J. Perla,et al. Ten Common Misunderstandings, Misconceptions, Persistent Myths and Urban Legends about Likert Scales and Likert Response Formats and their Antidotes , 2007 .
[14] Michael C. Loui,et al. Setting the Scope of Concept Inventories for Introductory Computing Subjects , 2010, TOCE.
[15] Michael C. Loui,et al. A psychometric evaluation of the digital logic concept inventory , 2014, Comput. Sci. Educ..
[16] Bernice B Brown,et al. DELPHI PROCESS: A METHODOLOGY USED FOR THE ELICITATION OF OPINIONS OF EXPERTS , 1968 .
[17] B. Feldman,et al. Defining consensus: a systematic review recommends methodologic criteria for reporting of Delphi studies. , 2014, Journal of clinical epidemiology.
[18] Marsha C. Lovett,et al. How learning works , 2010 .
[19] P. McCullagh. Analysis of Ordinal Categorical Data , 1985 .
[20] F. Hasson,et al. Research guidelines for the Delphi survey technique. , 2000, Journal of advanced nursing.
[21] Juri Pill,et al. The Delphi method: Substance, context, a critique and an annotated bibliography , 1971 .
[22] David F. Feldon,et al. Cognitive task analysis , 2009 .
[23] Joint Task Force on Computing Curricula. Computer Science Curricula 2013: Curriculum Guidelines for Undergraduate Degree Programs in Computer Science , 2013 .
[24] Barbara M. Olds,et al. Rigorous Methodology for Concept Inventory Development: Using the 'Assessment Triangle' to Develop and Test the Thermal and Transport Science Concept Inventory (TTCI)* , 2011 .
[25] N. Dalkey,et al. An Experimental Application of the Delphi Method to the Use of Experts , 1963 .