{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T07:27:01Z","timestamp":1749799621612,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642336416"},{"type":"electronic","value":"9783642336423"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33642-3_32","type":"book-chapter","created":{"date-parts":[[2012,8,23]],"date-time":"2012-08-23T05:59:54Z","timestamp":1345701594000},"page":"295-306","source":"Crossref","is-referenced-by-count":3,"title":["Towards a Design Theory for Educational On-line Information Security Laboratories"],"prefix":"10.1007","author":[{"given":"Sarfraz","family":"Iqbal","sequence":"first","affiliation":[]},{"given":"Tero","family":"P\u00e4iv\u00e4rinta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","unstructured":"Yurcik, W., Doss, D.: Different Approaches in the Teaching of Information Systems Security. In: Information Systems Education Conference, Cincinnati OH, USA, ISECON (2001)"},{"key":"32_CR2","first-page":"1","volume":"5","author":"B.S. Woodward","year":"2007","unstructured":"Woodward, B.S., Young, T.: Redesigning an Information System Security Curriculum through Application of Traditional Pedagogy and Modern Business Trends. Information Systems Education Journal\u00a05, 1\u201311 (2007)","journal-title":"Information Systems Education Journal"},{"key":"32_CR3","unstructured":"Yngstrom, L., Bjorck, F.: The Value and Assessment of Information Security Education and Training. In: Proceedings of the IFIP TC11 WG 11.8 First World Conference on Information Security Education, Stockholm, Sweden, pp. 271\u2013292 (1998)"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Crowley, E.: Information System Security Curricula Development. In: Proceeding of the 4th Conference on Information Technology Curriculum on Information Technology Education, pp. 249\u2013255 (2003)","DOI":"10.1145\/947121.947178"},{"key":"32_CR5","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/978-3-642-15378-5_40","volume-title":"Key Competencies in the Knowledge Society","author":"J.F. van Niekerk","year":"2010","unstructured":"van Niekerk, J.F., Thomson, K.-L.: Evaluating the Cisco Networking Academy Program\u2019s Instructional Model against Bloom\u2019s Taxonomy for the Purpose of Information Security Education for Organizational End-Users. In: Reynolds, N., Turcs\u00e1nyi-Szab\u00f3, M. (eds.) KCKS 2010. IFIP AICT, vol.\u00a0324, pp. 412\u2013423. Springer, Heidelberg (2010)"},{"key":"32_CR6","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1080\/0952398980350202","volume":"35","author":"B.H. Khan","year":"1998","unstructured":"Khan, B.H.: Web\u2010Based Instruction (WBI): An Introduction. Educational Media International\u00a035, 63\u201371 (1998)","journal-title":"Educational Media International"},{"key":"32_CR7","first-page":"1","volume":"7","author":"L. Kosak","year":"2004","unstructured":"Kosak, L., Manning, D., Dobson, E., et al.: Prepared to Teach Online? Perspectives of Faculty in the University of North Carolina System. Online Journal of Distance Learning Administration\u00a07, 1\u201313 (2004)","journal-title":"Online Journal of Distance Learning Administration"},{"key":"32_CR8","doi-asserted-by":"crossref","first-page":"221","DOI":"10.28945\/244","volume":"5","author":"M. Hentea","year":"2006","unstructured":"Hentea, M., Dhillon, H.S., Dhillon, M.: Towards Changes in Information Security Education. Journal of Information Technology Education\u00a05, 221\u2013233 (2006)","journal-title":"Journal of Information Technology Education"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"McDermott, J., Fox, C.: Using Abuse Case Models for Security Requirements Analysis. In: Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), Phoenix, Arizona, pp. 55\u201364 (1999)","DOI":"10.1109\/CSAC.1999.816013"},{"key":"32_CR10","unstructured":"Stewart, K.E., Humphries, J.W., Andel, T.R.: Developing a Virtualization Platform for Courses in Networking, Systems Administration and Cyber Security Education. In: Proceedings of the Spring Simulation Multi-Conference. Society for Computer Simulation International, San Diego (2009)"},{"key":"32_CR11","doi-asserted-by":"crossref","first-page":"312","DOI":"10.17705\/1jais.00129","volume":"8","author":"S. Gregor","year":"2007","unstructured":"Gregor, S., Jones, D.: The Anatomy of a Design Theory. Journal of the Association for Information Systems\u00a08, 312\u2013335 (2007)","journal-title":"Journal of the Association for Information Systems"},{"key":"32_CR12","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1016\/j.compedu.2010.02.025","volume":"55","author":"S. Hrastinski","year":"2010","unstructured":"Hrastinski, S., Keller, C., Carlsson, S.A.: Design Exemplars for Synchronous e-Learning: A Design Theory Approach. Comput. Educ.\u00a055, 652\u2013662 (2010)","journal-title":"Comput. Educ."},{"key":"32_CR13","unstructured":"Crawford, E., Hu, Y.: A Multi-User Adaptive Security Application for Educational Hacking. In: Proceedings of the World Congress on Engineering and Computer Science, WCECS 2011, vol. I, San Francisco, USA, October 19-21 (2011)"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Lahoud, H.A., Tang, X.: Information Security Labs in IDS\/IPS for Distance Education. In: SIGITE 2006, Minneapolis, Minnesota, USA, October 19\u201321, pp. 47\u201352. ACM (2006)","DOI":"10.1145\/1168812.1168826"},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"Li, P., Toderick, L.W., Lunsford, P.J.: Experiencing Virtual Computing Lab in Information Technology Education. In: Proceedings of the 10th ACM Conference on SIG-Information Technology Education, SIGITE 2009, Fairfax, Virginia, USA, October 22\u201324, pp. 55\u201359. ACM (2009)","DOI":"10.1145\/1631728.1631747"},{"key":"32_CR16","doi-asserted-by":"crossref","unstructured":"Choi, Y.B., Lim, S., Oh, T.H.: Feasibility of Virtual Security Laboratory for Three-Tiered Distance Education. In: Proceedings of the ACM Conference on Information Technology Education, pp. 53\u201358 (2010)","DOI":"10.1145\/1867651.1867666"},{"key":"32_CR17","doi-asserted-by":"crossref","unstructured":"Burd, S.D., Gaillard, G., Rooney, E., et al.: Virtual Computing Laboratories using VMware Lab Manager. In: Proceedings of the 44th Hawaii International Conference on System Sciences, pp. 1\u20139. IEEE (2011)","DOI":"10.1109\/HICSS.2011.482"},{"key":"32_CR18","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/1107622.1107641","volume-title":"Proceedings of the 2nd Annual Conference on Information Security Curriculum Development","author":"W.C. Summers","year":"2005","unstructured":"Summers, W.C., Martin, C.: Using a Virtual Lab to Teach an Online Information Assurance Program. In: Proceedings of the 2nd Annual Conference on Information Security Curriculum Development, pp. 84\u201387. ACM, New York (2005)"},{"key":"32_CR19","first-page":"24","volume":"8","author":"S.D. Burd","year":"2009","unstructured":"Burd, S.D., Seazzu, A.F., Conway, C., et al.: Virtual Computing Laboratories: A Case Study with Comparisons to Physical Computing Laboratories. Journal of Information Technology Education\u00a08, 24 (2009)","journal-title":"Journal of Information Technology Education"},{"key":"32_CR20","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1145\/1352135.1352181","volume-title":"Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education","author":"A. Gaspar","year":"2008","unstructured":"Gaspar, A., Langevin, S., Armitage, W., et al.: The Role of Virtualization in Computing Education. In: Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, pp. 131\u2013132. ACM, New York (2008)"},{"key":"32_CR21","first-page":"39","volume":"24","author":"C. Li","year":"2009","unstructured":"Li, C.: Blur the Boundary between the Virtual and the Real. Journal of Computing Sciences in Colleges\u00a024, 39\u201345 (2009)","journal-title":"Journal of Computing Sciences in Colleges"},{"key":"32_CR22","unstructured":"Krishna, K., Sun, W., Rana, P., et al.: V-NetLab: A Cost-Effective Platform to Support Course Projects in Computer Security. In: Proceedings of the 9th Annual Colloquium for Information Systems Security Education (CISSE 2005), Atlanta, GA, June 6-9 (2005)"},{"key":"32_CR23","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-23357-9_44","volume-title":"Advances in Computer Science, Environment, Ecoinformatics, and Education","author":"F.-G. Chen","year":"2011","unstructured":"Chen, F.-G., Chen, R.-M., Chen, J. -S.: A Portable Virtual Laboratory for Information Security Courses. In: Lin, S., Huang, X. (eds.) CSEE 2011, Part V. CCIS, vol.\u00a0218, pp. 245\u2013250. Springer, Heidelberg (2011)"},{"key":"32_CR24","doi-asserted-by":"crossref","unstructured":"Wang, X., Hembroff, G.C., Yedica, R.: Using VMware VCenter Lab Manager in Undergraduate Education for System Administration and Network Security. In: Proceedings of the 2010 ACM Conference on Information Technology Education, pp. 43\u201352 (2010)","DOI":"10.1145\/1867651.1867665"},{"key":"32_CR25","doi-asserted-by":"crossref","unstructured":"Aboutabl, M.S.: The Cyberdefense Laboratory: A Framework for Information Security Education. In: Proceedings of the 2006 IEEE Workshop on Information Assurance United States Military Academy, West Point, NY, pp. 55\u201360 (2006)","DOI":"10.1109\/IAW.2006.1652077"},{"key":"32_CR26","unstructured":"Jones, D., Gregor, S.: An Information Systems Design Theory for e-Learning. In: Proceedings, Australasian Conference on Information Systems: 15th Annual ACIS Conference, pp. 51\u201361. University of Tasmania, Hobart, Tasmania (2004)"},{"key":"32_CR27","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1287\/isre.3.1.36","volume":"3","author":"J.G. Walls","year":"1992","unstructured":"Walls, J.G., Widmeyer, G.R., El Sawy, O.A.: Building an Information System Design Theory for Vigilant EIS. Information Systems Research\u00a03, 36\u201359 (1992)","journal-title":"Information Systems Research"},{"issue":"4","key":"32_CR28","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1109\/TEM.2003.819650","volume":"50","author":"R.S. Friedman","year":"2003","unstructured":"Friedman, R.S., Deek, F.P.: Innovation and Education in the Digital Age: Reconciling the Roles of Pedagogy, Technology, and the Business of Learning. IEEE Transactions on Engineering Management\u00a050(4), 403\u2013412 (2003)","journal-title":"IEEE Transactions on Engineering Management"}],"container-title":["Lecture Notes in Computer Science","Advances in Web-Based Learning - ICWL 2012"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33642-3_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T03:47:55Z","timestamp":1743997675000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-33642-3_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642336416","9783642336423"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33642-3_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}