In this paper, we reported an online InfoSec Lab based on initial design principles derived from kernel theories such as Conversational Framework (CF), Constructive Alignment (CA), and Personalized System of Instruction (PSI). The overall research was conducted using the action design research approach. In doing so, the iterative cycles and critical reflections during the process helped to refine a set of existing design principles. The study contributes to the IS community by providing design principles for an online InfoSec Lab that utilizes state-of-the art technology for mixed classrooms.Godkänd; 2015; Bibliografisk uppgift: NR.5(2014): IRIS 37 Issue Theme "Designing Human Technologies ISSN 2387-3353; 20140925 (sariqb
Distance education in information security has unique requirements in comparison to on-campus educat...
Distance education in information security has unique requirements in comparison to on-campus educat...
Security education is critical in today’s cyber-threat environment. Many schools have investigated d...
In this paper, we reported an online InfoSec Lab based on initial design principles derived from ker...
In this paper, we reported an online InfoSec Lab based on initial design principles derived from ker...
In this paper, we reported an online InfoSec Lab based on initial design principles derived from ker...
Distance education and e-learning in the field of information security is gaining popularity. In the...
Distance education and e-learning in the field of information security is gaining popularity. In the...
Distance education and e-learning in the field of information security is gaining popularity. In the...
Distance education and e-learning in the field of information security is gaining popularity. In the...
Distance education and e-learning in the field of information security is gaining popularity. An onl...
Distance education and e-learning in the field of information security is gaining popularity. An onl...
Distance education and e-learning in the field of information security is gaining popularity. An onl...
<p>Abstract</p> <p><br>Information Security education benefits greatly from hands-on laboratory orie...
Distance education in information security has unique requirements in comparison to on-campus educat...
Distance education in information security has unique requirements in comparison to on-campus educat...
Distance education in information security has unique requirements in comparison to on-campus educat...
Security education is critical in today’s cyber-threat environment. Many schools have investigated d...
In this paper, we reported an online InfoSec Lab based on initial design principles derived from ker...
In this paper, we reported an online InfoSec Lab based on initial design principles derived from ker...
In this paper, we reported an online InfoSec Lab based on initial design principles derived from ker...
Distance education and e-learning in the field of information security is gaining popularity. In the...
Distance education and e-learning in the field of information security is gaining popularity. In the...
Distance education and e-learning in the field of information security is gaining popularity. In the...
Distance education and e-learning in the field of information security is gaining popularity. In the...
Distance education and e-learning in the field of information security is gaining popularity. An onl...
Distance education and e-learning in the field of information security is gaining popularity. An onl...
Distance education and e-learning in the field of information security is gaining popularity. An onl...
<p>Abstract</p> <p><br>Information Security education benefits greatly from hands-on laboratory orie...
Distance education in information security has unique requirements in comparison to on-campus educat...
Distance education in information security has unique requirements in comparison to on-campus educat...
Distance education in information security has unique requirements in comparison to on-campus educat...
Security education is critical in today’s cyber-threat environment. Many schools have investigated d...