Matches in SemOpenAlex for { <https://semopenalex.org/work/W762017089> ?p ?o ?g. }
- W762017089 endingPage "210" @default.
- W762017089 startingPage "201" @default.
- W762017089 abstract "1. INTRODUCTION Nowadays, information security is becoming more and more important to organizations across a variety of industries. In information security education, it has been observed that students learn best with hands-on real-life examples (Sharma and Sefchek, 2007). Teaching using case studies to simulate real-life scenarios has been considered an effective method that actively engages students. Researchers (He et al., 2013) point out that using a case study-based approach in information security courses can provide several key advantages, such as the ability to focus on the practical aspects of information security in the real world, the ability to ensure a high level of student involvement, and the ability to teach security concepts with a minimum requirement for equipment. In recent years, many hands-on projects, including simulating virus and spyware mechanisms (Katz, 2006), breaking ciphers (Schweitzer and Baird, 2006), attacking/defending a system (Chen et al., 2011), detecting intrusion (Roschke et al., 2010), and analyzing penetration (Antunes and Vieira, 2012), have been developed and have been widely used in the information security education curriculum. However, most of these hands-on projects are relatively simple and can be carried out in isolated or virtualized lab environments, which usually do not fully reflect the complexity of real-life situations. Moreover, most of these projects require students to have strong technical skills in system/network administration and often involve heavy computer programming. These requirements might make the study of information system security difficult for students with less background in computer science. In information security education practice, there is a great need for students to study more complicated cases that are more similar to real-life scenarios in order to better understand important security issues and techniques. Ideally, each case study should simulate a complex real-life scenario. These case studies should enable students to visualize concepts at a high level in order to facilitate analysis and discussion. Moreover, in order to engage students and to sustain students' interest in learning information security concepts, difficult technical details should be temporarily hidden, particularly until students with less computer science background can become familiar with these concepts. In this paper, we describe a new approach of using workflow technology to enhance information security education (van der Aalst and van Hee, 2004) by simulating complex real-life scenarios within a laboratory setting. The use of workflow technology provides interactive graphical interfaces to build sophisticated information security cases without the need for low-level programming or command-line interactions and allows for collaboration among students with different educational backgrounds. Moreover, workflow technology enables seamless integration of distributed and local services to support the composition of complex case studies. Two case studies using the Kepler scientific workflow system (Ilkay et al., 2004) are presented in this paper to show how workflows for real-life scenarios can be created and enacted. The first case study simulates the scenario of an attack on a bank account and is based on a real security incident described in the Daily Record magazine (Mann, 2012). The second case study models the situation of a coordinated attack that compromises an online course management system. The workflows for both case studies were developed by students in Computer Science and were then used to support teaching in Information Technology (IT) security courses. Feedback from students regarding the use of workflow technology in teaching information security principles and techniques is also discussed and analyzed. 2. WORKFLOW TECHNOLOGY AND ITS APPLICATIONS IN EDUCATION Workflow is originally an administrative concept used in business operation management; it describes a business process that delivers services from one participant agent to another. …" @default.
- W762017089 created "2016-06-24" @default.
- W762017089 creator A5071057106 @default.
- W762017089 creator A5077830996 @default.
- W762017089 creator A5079316675 @default.
- W762017089 creator A5082039703 @default.
- W762017089 date "2014-08-01" @default.
- W762017089 modified "2023-09-27" @default.
- W762017089 title "Teaching Information Security with Workflow Technology - A Case Study Approach" @default.
- W762017089 cites W1519967721 @default.
- W762017089 cites W1562375798 @default.
- W762017089 cites W1597982698 @default.
- W762017089 cites W1742813727 @default.
- W762017089 cites W1970799258 @default.
- W762017089 cites W1987051045 @default.
- W762017089 cites W2001580943 @default.
- W762017089 cites W2012891388 @default.
- W762017089 cites W2013207106 @default.
- W762017089 cites W2025318665 @default.
- W762017089 cites W2025577327 @default.
- W762017089 cites W2029815481 @default.
- W762017089 cites W2041530580 @default.
- W762017089 cites W2098886869 @default.
- W762017089 cites W2103716709 @default.
- W762017089 cites W2107221771 @default.
- W762017089 cites W2116817443 @default.
- W762017089 cites W2119381135 @default.
- W762017089 cites W2120639391 @default.
- W762017089 cites W2123663722 @default.
- W762017089 cites W2128548442 @default.
- W762017089 cites W2132347265 @default.
- W762017089 cites W2150947329 @default.
- W762017089 cites W2154513453 @default.
- W762017089 cites W2155878676 @default.
- W762017089 cites W2163579706 @default.
- W762017089 cites W2168103533 @default.
- W762017089 cites W2227951926 @default.
- W762017089 cites W271266062 @default.
- W762017089 cites W50797797 @default.
- W762017089 cites W85899021 @default.
- W762017089 cites W2024847998 @default.
- W762017089 cites W2568081765 @default.
- W762017089 cites W2619540620 @default.
- W762017089 hasPublicationYear "2014" @default.
- W762017089 type Work @default.
- W762017089 sameAs 762017089 @default.
- W762017089 citedByCount "1" @default.
- W762017089 countsByYear W7620170892015 @default.
- W762017089 crossrefType "journal-article" @default.
- W762017089 hasAuthorship W762017089A5071057106 @default.
- W762017089 hasAuthorship W762017089A5077830996 @default.
- W762017089 hasAuthorship W762017089A5079316675 @default.
- W762017089 hasAuthorship W762017089A5082039703 @default.
- W762017089 hasConcept C103377522 @default.
- W762017089 hasConcept C111919701 @default.
- W762017089 hasConcept C121017731 @default.
- W762017089 hasConcept C136197465 @default.
- W762017089 hasConcept C148976360 @default.
- W762017089 hasConcept C154945302 @default.
- W762017089 hasConcept C15744967 @default.
- W762017089 hasConcept C177212765 @default.
- W762017089 hasConcept C184842701 @default.
- W762017089 hasConcept C19417346 @default.
- W762017089 hasConcept C38652104 @default.
- W762017089 hasConcept C41008148 @default.
- W762017089 hasConcept C47177190 @default.
- W762017089 hasConcept C527648132 @default.
- W762017089 hasConcept C77088390 @default.
- W762017089 hasConcept C79974875 @default.
- W762017089 hasConceptScore W762017089C103377522 @default.
- W762017089 hasConceptScore W762017089C111919701 @default.
- W762017089 hasConceptScore W762017089C121017731 @default.
- W762017089 hasConceptScore W762017089C136197465 @default.
- W762017089 hasConceptScore W762017089C148976360 @default.
- W762017089 hasConceptScore W762017089C154945302 @default.
- W762017089 hasConceptScore W762017089C15744967 @default.
- W762017089 hasConceptScore W762017089C177212765 @default.
- W762017089 hasConceptScore W762017089C184842701 @default.
- W762017089 hasConceptScore W762017089C19417346 @default.
- W762017089 hasConceptScore W762017089C38652104 @default.
- W762017089 hasConceptScore W762017089C41008148 @default.
- W762017089 hasConceptScore W762017089C47177190 @default.
- W762017089 hasConceptScore W762017089C527648132 @default.
- W762017089 hasConceptScore W762017089C77088390 @default.
- W762017089 hasConceptScore W762017089C79974875 @default.
- W762017089 hasIssue "3" @default.
- W762017089 hasLocation W7620170891 @default.
- W762017089 hasOpenAccess W762017089 @default.
- W762017089 hasPrimaryLocation W7620170891 @default.
- W762017089 hasRelatedWork W130272739 @default.
- W762017089 hasRelatedWork W1811408504 @default.
- W762017089 hasRelatedWork W184661108 @default.
- W762017089 hasRelatedWork W2000802332 @default.
- W762017089 hasRelatedWork W2016927900 @default.
- W762017089 hasRelatedWork W2031167390 @default.
- W762017089 hasRelatedWork W2041189997 @default.
- W762017089 hasRelatedWork W2067324358 @default.
- W762017089 hasRelatedWork W2095396991 @default.