Applications of schema theory in information security teaching.
Chunyan QiuWei ZhaoPublished in: ICDIP (2012)
Keyphrases
- information security
- countermeasures
- design theory
- security issues
- information systems
- intrusion detection
- smart card
- security requirements
- information security management
- network security
- information assurance
- cyber defense
- theoretical framework
- data model
- learning environment
- smart grid
- databases
- risk assessment
- privacy concerns
- e government
- e learning
- database
- sensitive data
- critical infrastructure
- iso iec
- security level
- security risks
- feature selection