J. Boleng and D. Schweitzer, A Hands-on Approach to Information Operations Education and Training, 14th Colloquium for Information Systems Security Education, pp.7-9, 2010.

L. Chen and C. Lin, Combining Theory with Practice in Information Security Education, 11th Colloquium for Information Systems Security Education, pp.4-7, 2007.

C. Lin and L. Chen, Development of an Interdisciplinary Information Technology Auditing Program, 13th Colloquium for Information Systems Security Education, pp.1-3, 2009.

V. V. Riabov and B. J. Higgs, Running a Computer Security Course: Challenges, Tools and Projects, River Academic Journal, vol.61, 2010.

S. K. Sharma and J. Sefchek, Teaching information systems security courses: A hands-on??approach, Computers & Security, vol.26, issue.4, pp.290-99, 2007.
DOI : 10.1016/j.cose.2006.11.005

V. Business, Anatomy of a Data Breach, http://www.govinfosecurity.com/external/rp_2009-data-breach-investigations- supplemental-report_en_xg.pdf (3 Feb, 2011.