Many universities have started to educate students on how to develop secure software and systems. One challenge of teaching information security is that the curriculum can easily be outdated, because new attacks and mitigation approaches arise. It is therefore necessary to provide software developers with methods and tools that are attractive (e.g., computer games) for self-study and up-to-date information security knowledge during and after the university education. This paper presents an on-going study to develop an educational game to facilitate information security education. The game is developed as a single player Tower Defense (TD) game. The educational goal of the game is to teach developers, who are not security experts, how to cho...
[[abstract]]In recent years, with the rapid growth of the Internet applications and services, how to...
In this paper, we propose an educational game framework allowing instructors to customise the game’s...
The purpose of this study is to determine the possibility of addressing the shortcoming of Security ...
Many universities have started to educate students on how to develop secure software and systems. On...
In this day and age, the field of information security is becoming more and more important. Develope...
Information is necessary for any business to function. However, if one does not manage one’s informa...
Abstract-Computer security has become vital for protecting users, applications and data, yet the fie...
A major portion of government and business organizations ’ attempts to counteract information securi...
Reports of software related security breaches are becoming weekly occurrences. With newer high-profi...
Reports of software related security breaches are becoming weekly occurrences. With newer high-profi...
© 2017 Elsevier B.V. Context: Security, in digitally connected organizational environments of today,...
One of the emerging requirements for learning in the enterprise is finding new ways to keep the lear...
Information security attacks targeting human nature, such as phishing, are rising rapidly. Informati...
Part 4: EducationInternational audienceSerious games are becoming more popular because they provide ...
This paper describes a computer simulation game being developed to teach computer security principle...
[[abstract]]In recent years, with the rapid growth of the Internet applications and services, how to...
In this paper, we propose an educational game framework allowing instructors to customise the game’s...
The purpose of this study is to determine the possibility of addressing the shortcoming of Security ...
Many universities have started to educate students on how to develop secure software and systems. On...
In this day and age, the field of information security is becoming more and more important. Develope...
Information is necessary for any business to function. However, if one does not manage one’s informa...
Abstract-Computer security has become vital for protecting users, applications and data, yet the fie...
A major portion of government and business organizations ’ attempts to counteract information securi...
Reports of software related security breaches are becoming weekly occurrences. With newer high-profi...
Reports of software related security breaches are becoming weekly occurrences. With newer high-profi...
© 2017 Elsevier B.V. Context: Security, in digitally connected organizational environments of today,...
One of the emerging requirements for learning in the enterprise is finding new ways to keep the lear...
Information security attacks targeting human nature, such as phishing, are rising rapidly. Informati...
Part 4: EducationInternational audienceSerious games are becoming more popular because they provide ...
This paper describes a computer simulation game being developed to teach computer security principle...
[[abstract]]In recent years, with the rapid growth of the Internet applications and services, how to...
In this paper, we propose an educational game framework allowing instructors to customise the game’s...
The purpose of this study is to determine the possibility of addressing the shortcoming of Security ...