Discovery learning in computer science
SIGCSE '96 Proceedings of the twenty-seventh SIGCSE technical symposium on Computer science education
An approach to usable security based on event monitoring and visualization
Proceedings of the 2002 workshop on New security paradigms
Moving from the design of usable security technologies to the design of useful secure applications
Proceedings of the 2002 workshop on New security paradigms
Who Watches the Security Educators?
IEEE Security and Privacy
A comprehensive undergraduate information assurance program
Security education and critical infrastructures
Threat Modeling
Use of Honeynets in Computer Security Education
Proceedings of the Fourth Annual ACIS International Conference on Computer and Information Science
An ethics and security course for students in computer science and information technology
Proceedings of the 37th SIGCSE technical symposium on Computer science education
Information Security: Principles and Practice
Information Security: Principles and Practice
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Educating Students to Create Trustworthy Systems
IEEE Security and Privacy
How the Cyber Defense Exercise Shaped an Information-Assurance Curriculum
IEEE Security and Privacy
Hacker Curriculum: How We Can Use It in Teaching
IEEE Distributed Systems Online
Designing an Undergraduate Software Security Course
SECURWARE '08 Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies
An information assurance curriculum for commanding officers using hands-on experiments
Proceedings of the 40th ACM technical symposium on Computer science education
Teach Them When They Aren't Looking: Introducing Security in CS1
IEEE Security and Privacy
Visualization Tools for Teaching Computer Security
ACM Transactions on Computing Education (TOCE)
IEEE Security and Privacy
The blunderdome: an offensive exercise for building network, systems, and web security awareness
CSET'10 Proceedings of the 3rd international conference on Cyber security experimentation and test
Security Education Using Second Life
IEEE Security and Privacy
Hi-index | 0.00 |
Since human factor security exploits are on the rise, ensuring Usable Security has become extremely important for the overall security of computer systems. However, traditional undergraduate computer security curriculum focuses heavily on technical aspects of security and generally ignores Usable Security. To address this problem, we developed a new 3P Learning Method that encourages students to view security problems from three different perspectives (i.e. 3P), namely: Defense, Offense, and Use. The 3P Method lets us incorporate Usable Security into the existing curriculum and helps students to consider Usable Security as an integral part of secure system design rather than an optional add-on.