M. Kenney and . Cyber, Terrorism in a Post-Stuxnet World, Orbis, pp.111-128, 2015.

H. Novak, E. Moore, and D. Likarish, A Cyber Security Multi Agency, Collaboration for Rapid Response that Uses AGILE Methods on an Education Infrastructure, Information Security Education Across the Curriculum, pp.41-50, 2015.

J. H. Saunders, Simulation approaches in information security education, Proc. 6th National Colloquium for Information System Security Education, 2002.

R. W. Perry, Disaster Exercise Outcomes for Professional Emergency Personnel and Citizen Volunteers, Journal of Contingencies and Crisis Management, vol.5, issue.4, pp.64-75, 2004.
DOI : 10.1007/978-94-011-3398-2

URL : http://higheredbcs.wiley.com/legacy/college/perry/0471920770/chap_resource/ch04/disaster_exercise_citizens.pdf

K. Petress, What is meant by" active learning, p.566, 2008.

R. S. Cheung, J. P. Cohen, H. Z. Lo, and F. Elia, Challenge based learning in cybersecurity education, Proceedings of the 2011 International Conference on Security & Management, 2011.

A. P. Bartel, Measuring the Employer's Return on Investments in Training: Evidence from the Literature, Industrial Relations, vol.39, issue.3, p.502, 2000.
DOI : 10.1111/0019-8676.00178

J. W. Creswell and V. L. Clark, Designing and conducting mixed methods research, 2007.

W. W. Eckerson, Performance dashboards: measuring, monitoring, and managing your business, 2010.
DOI : 10.1002/9781119199984