1 |
D. S. Lee, "A Study on Impact on Affect Students by Problem Solving Centric Lecture," Korean College Composition and Communication, Vol.9, pp.229-247, 2014.
|
2 |
S. W. Seo, W. J. Oh, and H. G. Kim, "Research on cyber Warfare Manpower Training Strategy for Securing Defense Information System Using AHP Analysis," Journal of Security Engineering, Vol.12, No.2, pp.109-120, 2015.
DOI
|
3 |
H. W. Lim, "Security Education and Research in Accordance with the Paradigm Shift in the Industry Security," Journal of Security Engineering, Vol. 12, No. 6, pp.597-608, 2015
DOI
|
4 |
H. M. Na, "Comparative Analysis on the Curriculums of Information Systems Security," Journal of The Korean Assocaition of Information Ecucation, Vol.9, No.4, pp.661-671, 2005.
|
5 |
J. Y. Park, "An Analysis on Training Curriculum for Educating Information Security Experts," Korea Journal of Business Administration, Vol. 31, No.1, pp.149-165, 2012.
|
6 |
C. Paulsen and E. McDuffie, "NICE: Creating a Cybersecurity Workforce and Aware Public," IEEE Security & Privacy, Vol. 10, No.3, pp.76-79, 2012.
|
7 |
D. Manson and R. Pike "The Case for depth in cyber security education," ACM Inroads, Vol.5, No.1, pp.47-52, 2014.
DOI
|
8 |
C. Paulsen and E. Mcduffie, "NICE: Creating a Cybersecurity Workforce and Aware Public," IEEE Security & Privacy, Vol.10, No.3, pp.76-70, 2012.
|
9 |
S. L. Pfleeger and D. D. Caputo, "Leveraging behavioral science to mitigate cyber security risk," Computers & Security, Vol.31, No.4, pp.597-611, 2012.
DOI
|
10 |
Y. Yasinsac, R. F. Erbacher, and D. G. Marks, "Computer forensics education," IEEE Security & Privacy, Vol.99, No.4, pp.15-23, 2003.
DOI
|