Haku
Viitteet 1-10 / 13
Conversion of emerging ICT-technology into curriculum courses
(International Association of Technology Education and Development, 2020)
The aim of this paper is to describe the process of how to develop course content for a new challenging and emerging ICT technology in a higher education organization. The structure of the developed data analytics (DA) and ...
Authentic learning environment for in-service trainings of cyber security: a qualitative study
(Inderscience Enterprises Ltd.., 2023)
Today's rapidly digitalising world has led to business processes becoming digitalised, which necessitates paying attention to the cybersecurity issues inherent in those digital processes. The multi-disciplinary nature of ...
Learn to Train Like You Fight
(IGI Global, 2023)
This qualitative study includes nine semi-structured interviews with cybersecurity experts from different security-related organizations who are familiar with cybersecurity exercises. Its contribution to cybersecurity ...
Model Fooling Threats Against Medical Imaging
(Springer, 2022)
Cyber security exercise – literature review to pedagogical methodology
(International Association of Technology Education and Development, 2019)
Review of pedagogical principles of cyber security exercises
(2020)
Modern digitalized cyber domains are extremely complex ensemble. Cyber attacks or incidents against system may affect capricious effects for another system or even for physical devices. For understanding and training to ...
Pedagogical aspects of cyber security exercises
(Institute of Electrical and Electronics Engineers IEEE, 2019)
Cyber security exercises (CSE) are complex learning experiences aimed at developing expert knowledge and competence through simulation. In this paper we examine pedagogical issues relating to CES, from exercise design to ...
Comprehensive cyber arena; the next generation cyber range
(IEEE, 2020)
The cyber domain and all the interdependencies between networked systems form an extremely complex ensemble. Incidents in the cyber domain may have an abundance effect on the physical domain. For example, a cyber attack ...
A design model for a degree programme in cyber security
(Association for Computing Machinery, 2019)
The need for skillful cyber security workforce has increased dramatically during the last ten years. The contents of the degree programmmes have not been able to respond to this need adequately and the curriculum contents ...