The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March/April (2012 vol.10)
pp: 19-23
Shari Lawrence Pfleeger , Dartmouth College
Cynthia Irvine , Naval Postgraduate School
Mischel Kwon , Mischel Kwon and Associates
ABSTRACT
From confusing online terms of use to changing forms of data collection, users must make difficult decisions about protecting their work and themselves online. The average citizen is repeatedly asked to make decisions at home and on the job for which answers require significant understanding of key cybersecurity issues. This special issue addresses key issues in providing effective training and education to users of all kinds.
INDEX TERMS
training, education, personnel, skills, abilities, security
CITATION
Shari Lawrence Pfleeger, Cynthia Irvine, Mischel Kwon, "Guest Editors' Introduction", IEEE Security & Privacy, vol.10, no. 2, pp. 19-23, March/April 2012, doi:10.1109/MSP.2012.38
REFERENCES
1. C.R. Rogers, Freedom to Learn, Merrill, 1969.
2. A. Newell and H. Simon, Human Problem Solving, Prentice-Hall, 1972.
3. G.A. Miller, "The Magical Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing Information," Psychological Rev., vol. 63, no. 2, 1956, pp. 81–97.
4. E. DeBono, New Think: The Use of Lateral Thinking in the Generation of New Ideas, Basic Books, 1967.
5. D. Rumelhart and D. Norman, "Analogical Processes in Learning," Cognitive Skills and Their Acquisition, J.R. Anderson ed., Erlbaum, 1981.
6. S.L. Pfleeger, and R.K. Cunningham, "Why Measuring Security Is Hard," IEEE Security & Privacy, vol. 8, no. 4, 2010, pp. 46–54.
7. Institute for Information Infrastructure Protection, "Workforce Development: Understanding the Demand," Apr. 2011; www.thei3p.org/docs/publications432.pdf.
29 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool