An approach to visualising information security knowledge
This paper discusses the application of international standards and guidelines together with vendor sponsored accreditation programs in the development of information security curriculum and an approach for visualising that knowledge
| Main Author: | Armstrong, Colin |
|---|---|
| Other Authors: | Lynn Futcher |
| Format: | Conference Paper |
| Published: |
IFIP TC11.8
2011
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/42637 |
Similar Items
Visualising Career Progression for ICT Professionals and the implications for ICT Curriculum Design in Higher Education
by: Von Konsky, Brian, et al.
Published: (2013)
by: Von Konsky, Brian, et al.
Published: (2013)
A soft approach to management of information security.
by: Armstrong, Helen
Published: (1999)
by: Armstrong, Helen
Published: (1999)
Two Approaches to Information Security Doctoral Research
by: Armstrong, Helen
Published: (2011)
by: Armstrong, Helen
Published: (2011)
Governance of flood disaster management: Malaysian case study
by: J., Saifulsyahira, et al.
Published: (2016)
by: J., Saifulsyahira, et al.
Published: (2016)
Reaching today's information security students
by: Armstrong, Helen, et al.
Published: (2009)
by: Armstrong, Helen, et al.
Published: (2009)
A Course Applying Network Analysis to Organizational Risk in Information Security
by: Armstrong, Helen, et al.
Published: (2010)
by: Armstrong, Helen, et al.
Published: (2010)
Uncovering Assumptions in Information Security
by: Armstrong, Helen, et al.
Published: (2005)
by: Armstrong, Helen, et al.
Published: (2005)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
A web service service for the dynamic linkage and visualisation of multivariate spatiotemporal information
by: Moncrieff, Simon, et al.
Published: (2013)
by: Moncrieff, Simon, et al.
Published: (2013)
Embedding Professional Skills in the ICT Curriculum
by: Von Konsky, Brian, et al.
Published: (2013)
by: Von Konsky, Brian, et al.
Published: (2013)
Visualisation of electronic health records
by: Wang, Qiru
Published: (2025)
by: Wang, Qiru
Published: (2025)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
Radar interferometry based settlement monitoring in tunnelling: visualisation and accuracy analyses
by: Schindler, Steffen, et al.
Published: (2016)
by: Schindler, Steffen, et al.
Published: (2016)
Development of Quality Management in India
(An evaluation of Implementation of ISO in a SME in India)
by: Kachapilly Joseph, Jackson
Published: (2011)
by: Kachapilly Joseph, Jackson
Published: (2011)
Visualization for New Generation Users in the Age of the Electronic Book
by: Green, Peter
Published: (2012)
by: Green, Peter
Published: (2012)
Digital energy visualisations in the workplace: the e-Genie tool
by: Spence, Alexa, et al.
Published: (2017)
by: Spence, Alexa, et al.
Published: (2017)
The Power of Supply Chain Visualisation: Developing a framework for visualising the supply chain
by: Ahmed, Wafaa Ahmed Hamed
Published: (2017)
by: Ahmed, Wafaa Ahmed Hamed
Published: (2017)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Application of a large-screen immersive visualisation system to demonstrate sustainable mining practices principles
by: Stothard, Phillip, et al.
Published: (2014)
by: Stothard, Phillip, et al.
Published: (2014)
The Motives for ISO 9000 Certification in the Malaysian Manufacturing Companies
by: A. Gader, Abdalsalam Mohamed
Published: (2004)
by: A. Gader, Abdalsalam Mohamed
Published: (2004)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Security and quality issues in IT projects
by: El Desouki, Hassan, et al.
Published: (2010)
by: El Desouki, Hassan, et al.
Published: (2010)
ISO 9001 & 14001: A Relationship with GDP?
by: Mills, T
Published: (2011)
by: Mills, T
Published: (2011)
Critical Success Factors For Iso 9000 Certification In The Malaysian Manufacturing Industry
by: Mohd Hussin, Rosminah
Published: (2003)
by: Mohd Hussin, Rosminah
Published: (2003)
Evaluating the Effectiveness of ISO 9001:2000 Training in Certified Manufacturing Companies in Malaysia
by: Saleh, Moftah Farag
Published: (2004)
by: Saleh, Moftah Farag
Published: (2004)
Multislice CT angiography in abdominal aortic aneurysm treated with endovascular stent grafts: evaluation of 2D and 3D visualisations
by: Sun, Zhonghua
Published: (2007)
by: Sun, Zhonghua
Published: (2007)
Library data visualisation transformations: global patterns for research evaluation metrics in China
by: Wu, Cocoa, et al.
Published: (2019)
by: Wu, Cocoa, et al.
Published: (2019)
Factors Influencing the Implementation and Maintenance of ISO 9001:2000 Standard in Selected Organisations in Malaysia
by: Othman, Roziana
Published: (2006)
by: Othman, Roziana
Published: (2006)
Imagining technology-enhanced learning with heritage artefacts: teacher-perceived potential of 2D and 3D heritage site visualisations
by: Lackovic, Natasa, et al.
Published: (2015)
by: Lackovic, Natasa, et al.
Published: (2015)
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
A technique based on trade-off maps to visualise and analyse relationships between objectives in optimisation problems
by: Pinheiro, Rodrigo Lankaites, et al.
Published: (2017)
by: Pinheiro, Rodrigo Lankaites, et al.
Published: (2017)
Two level security approaches for secure XML database centric web services against xpath injections
by: Asmawi, Aziah
Published: (2016)
by: Asmawi, Aziah
Published: (2016)
Development of an Expert System for ISO 14001
by: Muhammad Ghazi, Sri Ikarostika Rahayu
Published: (1999)
by: Muhammad Ghazi, Sri Ikarostika Rahayu
Published: (1999)
Use of online video in a first year tertiary mathematics unit
by: Dawson, Vaille, et al.
Published: (2012)
by: Dawson, Vaille, et al.
Published: (2012)
A conceptual framework for information privacy and security in collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Incident-centered information security: Managing a strategic balance between prevention and response
by: Baskerville, Richard, et al.
Published: (2014)
by: Baskerville, Richard, et al.
Published: (2014)
Building a performance measurement internal auditing framework for the ISO 9001 quality management system
by: Gutierrez Alcantara, Flor Monica
Published: (2013)
by: Gutierrez Alcantara, Flor Monica
Published: (2013)
Resubmit my Information Security Thesis? - You must be joking!
by: Armstrong, Helen, et al.
Published: (2007)
by: Armstrong, Helen, et al.
Published: (2007)
A taxonomy for information privacy in virtual collaborations
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Similar Items
-
Visualising Career Progression for ICT Professionals and the implications for ICT Curriculum Design in Higher Education
by: Von Konsky, Brian, et al.
Published: (2013) -
A soft approach to management of information security.
by: Armstrong, Helen
Published: (1999) -
Two Approaches to Information Security Doctoral Research
by: Armstrong, Helen
Published: (2011) -
Governance of flood disaster management: Malaysian case study
by: J., Saifulsyahira, et al.
Published: (2016) -
Reaching today's information security students
by: Armstrong, Helen, et al.
Published: (2009)