{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:24:38Z","timestamp":1725747878239},"publisher-location":"Berlin, Heidelberg","reference-count":41,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642411748"},{"type":"electronic","value":"9783642411755"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41175-5_10","type":"book-chapter","created":{"date-parts":[[2013,9,7]],"date-time":"2013-09-07T15:31:13Z","timestamp":1378567873000},"page":"89-100","source":"Crossref","is-referenced-by-count":2,"title":["Initial Design Principles for an Educational, On-line Information Security Laboratory"],"prefix":"10.1007","author":[{"given":"Sarfraz","family":"Iqbal","sequence":"first","affiliation":[]},{"given":"Devinder","family":"Thapa","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1108\/00197850210417528","volume":"34","author":"A. Gunasekaran","year":"2002","unstructured":"Gunasekaran, A., Mcneil, R.D., Shaul, D.: E-learning: research and applications. Industrial and Commercial Training\u00a034, 44\u201353 (2002)","journal-title":"Industrial and Commercial Training"},{"key":"10_CR2","unstructured":"Crawford, E., Hu, Y.: A Multi-User Adaptive Security Application for Educational Hacking. In: Proceedings of the World Congress on Engineering and Computer Science, WCECS 2011, San Francisco, USA, October 19-21, vol.\u00a0I (2011)"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Lahoud, H.A., Tang, X.: Information Security Labs in IDS\/IPS for Distance Education. In: SIGITE 2006, Minneapolis, Minnesota, USA, October 19-21, pp. 47\u201352. ACM (2006)","DOI":"10.1145\/1168812.1168826"},{"key":"10_CR4","first-page":"25","volume":"1","author":"N. Dabbagh","year":"2005","unstructured":"Dabbagh, N.: Pedagogical models for E-Learning: A theory-based design framework. International Journal of Technology in Teaching and Learning\u00a01, 25\u201344 (2005)","journal-title":"International Journal of Technology in Teaching and Learning"},{"key":"10_CR5","unstructured":"Bednar, A.K., Cunningham, D., Duffy, T.M., Perry, J.D.: Theory into practice: How do we link. Constructivism and the Technology of Instruction: A Conversation, 17\u201334 (1992)"},{"key":"10_CR6","volume-title":"Instructional Technology: Past, Present and Future","author":"A.K. Bednar","year":"1991","unstructured":"Bednar, A.K., Cunningham, D., Duffy, T.M., Perry, J.D.: Theory into practice: How do we link? In: Anglin, G.J. (ed.) Instructional Technology: Past, Present and Future. Libraries Unlimited, Englewood (1991)"},{"issue":"4","key":"10_CR7","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/BF02504682","volume":"53","author":"F. Wang","year":"2005","unstructured":"Wang, F., Hannafin, M.J.: Design-based research and technology-enhanced learning environments. Educational Technology Research & Development\u00a053(4), 5\u201323 (2005)","journal-title":"Educational Technology Research & Development"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/978-3-642-33642-3_32","volume-title":"Advances in Web-Based Learning - ICWL 2012","author":"S. Iqbal","year":"2012","unstructured":"Iqbal, S., P\u00e4iv\u00e4rinta, T.: Towards a design theory for educational on-line information security laboratories. In: Popescu, E., Li, Q., Klamma, R., Leung, H., Specht, M. (eds.) ICWL 2012. LNCS, vol.\u00a07558, pp. 295\u2013306. Springer, Heidelberg (2012)"},{"key":"10_CR9","first-page":"415","volume":"3","author":"B. Hilgarth","year":"2011","unstructured":"Hilgarth, B.: E-Learning Success in Action! From Case Study Research to the creation of the Cybernetic e-Learning Management Model. IJCISIM Journal\u00a03, 415\u2013426 (2011)","journal-title":"IJCISIM Journal"},{"key":"10_CR10","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-642-23471-2_3","volume-title":"S-BPM ONE - Learning by Doing - Doing by Learning","author":"J. Kr\u00f6ckel","year":"2011","unstructured":"Kr\u00f6ckel, J., Hilgarth, B.: BPM @ KMU \u2013 Designing e-Learning for the Introduction of BPM in Small- and Medium \u2013Sized Enterprises. In: Schmidt, W. (ed.) S-BPM ONE 2011. CCIS, vol.\u00a0213, pp. 34\u201347. Springer, Heidelberg (2011)"},{"issue":"5","key":"10_CR11","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1504\/IJNVO.2009.027393","volume":"6","author":"B. Thoms","year":"2009","unstructured":"Thoms, B., Garrett, N., Ryan, T.: Online learning communities in the new \u201cU\u201d. International Journal of Networking and Virtual Organisations\u00a06(5), 499\u2013517 (2009)","journal-title":"International Journal of Networking and Virtual Organisations"},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1016\/j.compedu.2010.02.025","volume":"55","author":"S. Hrastinski","year":"2010","unstructured":"Hrastinski, S., Keller, C., Carlsson, S.A.: Design exemplars for synchronous e-learning: A design theory approach. Computers & Education\u00a055, 652\u2013662 (2010)","journal-title":"Computers & Education"},{"issue":"2-3","key":"10_CR13","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1080\/1358165032000165653","volume":"28","author":"M. Kerres","year":"2003","unstructured":"Kerres, M., De Witt, C.: A Didactical Framework for the Design of Blended Learning Arrangements. Journal of Educational Media\u00a028(2-3), 101\u2013113 (2003)","journal-title":"Journal of Educational Media"},{"issue":"4","key":"10_CR14","first-page":"29","volume":"11","author":"T. Amiel","year":"2008","unstructured":"Amiel, T., Reeves, T.C.: Design-Based Research and Educational Technology: Rethinking Technology and the Research Agenda. Educational Technology & Society\u00a011(4), 29\u201340 (2008)","journal-title":"Educational Technology & Society"},{"issue":"1","key":"10_CR15","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1287\/isre.7.1.63","volume":"7","author":"W.J. Orlikowski","year":"1996","unstructured":"Orlikowski, W.J.: Improvising Organizational Transformation Over Time: A Situated Change Perspective. Information Systems Research\u00a07(1), 63\u201392 (1996)","journal-title":"Information Systems Research"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1007\/978-3-642-38827-9_40","volume-title":"Design Science at the Intersection of Physical and Virtual Design","author":"D. Harnesk","year":"2013","unstructured":"Harnesk, D., Thapa, D.: A Framework for Classifying Design Research Methods. In: vom Brocke, J., Hekkala, R., Ram, S., Rossi, M. (eds.) DESRIST 2013. LNCS, vol.\u00a07939, pp. 479\u2013485. Springer, Heidelberg (2013)"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Sein, M., Henfridsson, O., Purao, S., Rossi, M., Lindgren, R.: Action design research. MIS Quarterly\u00a035(2) (2011)","DOI":"10.2307\/23043488"},{"key":"10_CR18","doi-asserted-by":"crossref","first-page":"312","DOI":"10.17705\/1jais.00129","volume":"8","author":"S. Gregor","year":"2007","unstructured":"Gregor, S., Jones, D.: The anatomy of a design theory. Journal of the Association for Information Systems\u00a08, 312\u2013335 (2007)","journal-title":"Journal of the Association for Information Systems"},{"issue":"1","key":"10_CR19","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"A.R. Hevner","year":"2004","unstructured":"Hevner, A.R., March, S.T., Park, J., Ram, S.: Design Science In Information Systems Research. MIS Quarterly\u00a028(1), 75\u2013105 (2004)","journal-title":"MIS Quarterly"},{"key":"10_CR20","unstructured":"Pries-Heje, J., Venable, J., Baskerville, R.: Strategies for Design Science Research Evaluation. In: Proceedings of the 16th European Conference on Information Systems Galway, Ireland, June 9-11 (2008)"},{"key":"10_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/978-3-642-29863-9_31","volume-title":"Design Science Research in Information Systems. Advances in Theory and Practice","author":"J. Venable","year":"2012","unstructured":"Venable, J., Pries-Heje, J., Baskerville, R.: A Comprehensive Framework for Evaluation in Design Science Research. In: Peffers, K., Rothenberger, M., Kuechler, B. (eds.) DESRIST 2012. LNCS, vol.\u00a07286, pp. 423\u2013438. Springer, Heidelberg (2012)"},{"key":"10_CR22","volume-title":"Soft Systems Methodology in Practice","author":"P. Checkland","year":"1990","unstructured":"Checkland, P., Scholes, J.: Soft Systems Methodology in Practice. J. Wiley, Chichester (1990)"},{"key":"10_CR23","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0167-9236(94)00041-2","volume":"15","author":"S.T. March","year":"1995","unstructured":"March, S.T., Smith, G.F.: Design and natural science research on information technology. Decision Support Systems\u00a015, 251\u2013266 (1995)","journal-title":"Decision Support Systems"},{"key":"10_CR24","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1287\/isre.3.1.36","volume":"3","author":"J.G. Walls","year":"1992","unstructured":"Walls, J.G., Widmeyer, G.R., El Sawy, O.A.: Building an information system design theory for vigilant EIS. Information Systems Research\u00a03, 36\u201359 (1992)","journal-title":"Information Systems Research"},{"key":"10_CR25","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-23357-9_44","volume-title":"Advances in Computer Science, Environment, Ecoinformatics, and Education","author":"F.-G. Chen","year":"2011","unstructured":"Chen, F.-G., Chen, R.-M., Chen, J. -S.: A Portable Virtual Laboratory for Information Security Courses. In: Lin, S., Huang, X. (eds.) CSEE 2011, Part V. CCIS, vol.\u00a0218, pp. 245\u2013250. Springer, Heidelberg (2011)"},{"key":"10_CR26","unstructured":"Aboutabl, M.S.: The Cyberdefense Laboratory: A Framework for Information Security Education. In: Proceedings of the IEEE Workshop on Information Assurance United States Military Academy, West Point, NY, pp. 55\u201360 (2006)"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Wang, X., Hembroff, G.C., Yedica, R.: Using VMware VCenter Lab Manager in Undergraduate Education for System Administration and Network Security. In: Proceedings of the ACM Conference on Information Technology Education, pp. 43\u201352 (2010)","DOI":"10.1145\/1867651.1867665"},{"key":"10_CR28","unstructured":"Krishna, K., Sun, W., Rana, P., et al.: V-NetLab: A Cost-Effective Platform to Support Course Projects in Computer security. In: Proceedings of the 9th Annual Colloquium for Information Systems Security Education (CISSE 2005), Atlanta, GA, June 6-9 (2005)"},{"key":"10_CR29","first-page":"39","volume":"24","author":"C. Li","year":"2009","unstructured":"Li, C.: Blur the Boundary between the Virtual and the Real. Journal of Computing Sciences in Colleges\u00a024, 39\u201345 (2009)","journal-title":"Journal of Computing Sciences in Colleges"},{"key":"10_CR30","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1145\/1352135.1352181","volume-title":"Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education","author":"A. Gaspar","year":"2008","unstructured":"Gaspar, A., Langevin, S., Armitage, W., et al.: The Role of Virtualization in Computing Education. In: Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, pp. 131\u2013132. ACM, New York (2008)"},{"key":"10_CR31","unstructured":"Sun, W., Katta, V., Krishna, K., Sekar, R.: V-netlab: an approach for realizing logically isolated networks for security experiments. In: Proceedings of the Conference on Cyber Security Experimentation and Test, Berkeley, CA, USA, pp. 1\u20136 (2008)"},{"key":"10_CR32","first-page":"24","volume":"8","author":"S.D. Burd","year":"2009","unstructured":"Burd, S.D., Seazzu, A.F., Conway, C., et al.: Virtual Computing Laboratories: A Case Study with Comparisons to Physical Computing Laboratories. Journal of Information Technology Education\u00a08, 24 (2009)","journal-title":"Journal of Information Technology Education"},{"key":"10_CR33","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/1107622.1107641","volume-title":"Proceedings of the 2nd Annual Conference on Information Security Curriculum Development","author":"W.C. Summers","year":"2005","unstructured":"Summers, W.C., Martin, C.: Using a Virtual Lab to Teach an Online Information Assurance Program. In: Proceedings of the 2nd Annual Conference on Information Security Curriculum Development, pp. 84\u201387. ACM, New York (2005)"},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Burd, S.D., Gaillard, G., Rooney, E., et al.: Virtual Computing Laboratories using VMware Lab Manager. In: Proceedings of the 44th Hawaii International Conference on System Sciences, pp. 1\u20139. IEEE (2011)","DOI":"10.1109\/HICSS.2011.482"},{"key":"10_CR35","doi-asserted-by":"crossref","unstructured":"Choi, Y.B., Lim, S., Oh, T.H.: Feasibility of Virtual Security Laboratory for Three-Tiered Distance Education. In: Proceedings of the ACM Conference on Information Technology Education, pp. 53\u201358 (2010)","DOI":"10.1145\/1867651.1867666"},{"key":"10_CR36","doi-asserted-by":"crossref","unstructured":"Li, P., Toderick, L.W., Lunsford, P.J.: Experiencing Virtual Computing Lab in Information Technology Education. In: Proceedings of the 10th ACM Conference on SIG-Information Technology Education, SIGITE 2009, Fairfax, Virginia, USA, October 22-24, pp. 55\u201359. ACM (2009)","DOI":"10.1145\/1631728.1631747"},{"issue":"1","key":"10_CR37","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1901\/jaba.1968.1-79","volume":"1","author":"F.S. Keller","year":"1968","unstructured":"Keller, F.S.: Good-bye, teacher. Journal of Applied Behavior Analysis\u00a01(1), 79 (1968)","journal-title":"Journal of Applied Behavior Analysis"},{"issue":"1","key":"10_CR38","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1207\/s15327809jls1301_2","volume":"13","author":"A. Collins","year":"2004","unstructured":"Collins, A., Joseph, D., Bielaczyc, K.: Design research: Theoretical and methodological issues. Journal of the Learning Sciences\u00a013(1), 15\u201342 (2004)","journal-title":"Journal of the Learning Sciences"},{"key":"10_CR39","unstructured":"Saarinen, L.: Enhancing ICT Supported Distributed Learning through Action Design Research. Doctoral Dissertations, Aalto University, School of Economics (2012)"},{"key":"10_CR40","doi-asserted-by":"crossref","unstructured":"Iivari, J.: The IS core-VII: Towards information systems as a science of meta-artifacts. Communication of the association for Information Systems\u00a012(1) (2003)","DOI":"10.17705\/1CAIS.01237"},{"key":"10_CR41","unstructured":"Matti, R., Sandeep, P., Maung, K.S.: Generalizating from design research. In: International Workshop on IT Artefact Design & Workpractice Intervention, Barcelona (2012)"}],"container-title":["Lecture Notes in Computer Science","Advances in Web-Based Learning \u2013 ICWL 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41175-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,4]],"date-time":"2023-07-04T11:14:29Z","timestamp":1688469269000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41175-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642411748","9783642411755"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41175-5_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}