Markets for cybercrime tools and stolen data: Hackers' bazaar, 2014. ,
, Curriculum Guidelines for Undergraduate Degree Programs in Computer Science, ACM: Computer Science Curricula, 2013.
Success to the successful: The use of systems thinking tools in teaching ob, Organization Management Journal, vol.1, issue.2, pp.112-124, 2004. ,
Momm's (motivations, opportunities, methods, means)-a taxonomy for computer related employee theft, Assets Protection, vol.6, issue.3, pp.33-36, 1981. ,
Global cybersecurity index 2017, pp.1-77, 2017. ,
The beer distribution game: using simulation to teach systems thinking, Journal of Management Development, vol.13, issue.8, pp.7-15, 1994. ,
Teaching game theory to improve adversarial thinking in cybersecurity students, IEEE Transactions on Education, vol.60, issue.3, pp.205-211, 2017. ,
, Joint Task Force on Cybersecurity Education: Cybersecurity curricula 2017 -curriculum guidelines for post-secondary degree programs in cybersecurity -csec2017 v. 0.95 draft, Tech. rep, 2017.
State-of-the-art simulation systems for information security education, training and awareness, Education Engineering (EDUCON), pp.1907-1916, 2010. ,
, Ponemon Institute: Flipping the economics of attacks, 2016.
A protection motivation theory of fear appeals and attitude change1, The journal of psychology, vol.91, issue.1, pp.93-114, 1975. ,
Cybersecurity education in universities, IEEE Security & Privacy, vol.11, issue.4, pp.3-4, 2013. ,
, Please tell us your gender: -Female -Male -Prefer not to answer
, What is the rationale behind your selection above?