Overcoming the Challenges of Teaching Cybersecurity in UK Computer Science Degree Programmes
暂无分享,去创建一个
Alastair Irons | Tom Prickett | Tom Crick | James H. Davenport | Paul Hanna | J. Davenport | T. Crick | T. Prickett | Paulette Hanna | Alastair Irons
[1] Henry L. Owen,et al. Georgia tech information security center hands-on network security laboratory , 2006, IEEE Transactions on Education.
[2] Rajendra K. Raj,et al. Infusing Principles and Practices for Secure Computing Throughout an Undergraduate Computer Science Curriculum , 2020, ITiCSE.
[3] James H. Davenport,et al. A UK Case Study on Cybersecurity Education and Accreditation , 2019, 2019 IEEE Frontiers in Education Conference (FIE).
[4] Min-Seok Pang,et al. Security Breaches in the U.S. Federal Government , 2017 .
[5] Evon M. O. Abu-Taieh. Cyber Security Body of Knowledge , 2017, 2017 IEEE 7th International Symposium on Cloud and Service Computing (SC2).
[6] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[7] Steven Bradley. Managing plagiarism in programming assignments with blended assessment and randomisation , 2016, Koli Calling.
[8] James H. Davenport,et al. Language Choice in Introductory Programming Courses at Australasian and UK Universities , 2018, SIGCSE.
[9] Gregory J. Conti,et al. Cyber Education: A Multi-Level, Multi-Discipline Approach , 2015, SIGITE.
[10] Shrikant Palkar. Industry-academia collaboration, expectations, and experiences , 2013, INROADS.
[12] James H. Davenport,et al. An Analysis of Introductory Programming Courses at UK Universities , 2017, Art Sci. Eng. Program..
[13] James H. Davenport,et al. Innovative Pedagogical Practices in the Craft of Computing , 2016, 2016 International Conference on Learning and Teaching in Computing and Engineering (LaTICE).
[14] Fred B. Schneider,et al. Cybersecurity Education in Universities , 2013, IEEE Secur. Priv..
[15] Steven Bradley,et al. Creative Assessment in Programming: Diversity and Divergence , 2020, CEP.
[16] Khaled Salah,et al. Harnessing the cloud for teaching cybersecurity , 2014, SIGCSE.
[17] Paul Hanna,et al. Computer Science Degree Accreditation in the UK: A Post-Shadbolt Review Update , 2020, CEP.
[18] Tom Crick,et al. The ICT Steering Group’s Report to the Welsh Government , 2013 .
[19] Mark Stockman. Infusing social science into cybersecurity education , 2013, SIGITE Conference.
[20] Theodore Tryfonas,et al. Public Policy and Skills for Smart Cities: The UK Outlook , 2018, PETRA.
[22] Jens Mache,et al. Top 10 hands-on cybersecurity exercises , 2013 .
[23] A. Irons,et al. Delivering Cybersecurity Education Effectively , 2019, Cybersecurity Education for Awareness and Compliance.
[24] Matthew Smith,et al. Why Do Developers Get Password Storage Wrong?: A Qualitative Usability Study , 2017, CCS.
[25] Cynthia Taylor,et al. ');DROP TABLE textbooks;--: An Argument for SQL Injection Coverage in Database Textbooks , 2019, SIGCSE.
[26] Ray A. Perlner,et al. Digital Identity Guidelines: Authentication and Lifecycle Management , 2017 .
[27] Sergey Bratus,et al. Teaching the principles of the hacker curriculum to undergraduates , 2010, SIGCSE.
[28] NEIL C. C. BROWN,et al. Restart: The Resurgence of Computer Science in UK Schools , 2014, TOCE.
[29] Faron Moller,et al. A university-based model for supporting computer science curriculum reform , 2018, Journal of Computers in Education.
[30] James H. Davenport,et al. The Institute of Coding: A University-Industry Collaboration to Address the UK’s Digital Skills Crisis , 2019, 2020 IEEE Global Engineering Education Conference (EDUCON).
[31] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[32] M. Angela Sasse,et al. The true cost of unusable password policies: password use in the wild , 2010, CHI.
[33] Tom Crick,et al. Resilience and Effective Learning in First-Year Undergraduate Computer Science , 2020, ITiCSE.
[34] Audun Jøsang,et al. Global perspectives on cybersecurity education for 2030: a case for a meta-discipline , 2018, ITiCSE.