메뉴 건너뛰기




Volumn 24, Issue 1, 2013, Pages 31-40

Supporting case-based learning in information security with web-based technology

Author keywords

Case study; Computer security; Online communities; Online education; Online tools; Security; Web 2.0

Indexed keywords

DISTANCE EDUCATION; TEACHING; WORLD WIDE WEB;

EID: 84899888782     PISSN: 10553096     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (13)

References (67)
  • 2
    • 84859399967 scopus 로고    scopus 로고
    • Applying Cases to Solve Ethical Problems: The Significance of Positive and Process-Oriented Reflection
    • Antes, A., Thiel,C., Martin,L., Stenmark,C., Connelly,S., Devenport, L. & Mumford, M. (2012). Applying Cases to Solve Ethical Problems: The Significance of Positive and Process-Oriented Reflection. Ethics and Behavior, 22 (2), 113 - 130
    • (2012) Ethics and Behavior , vol.22 , Issue.2 , pp. 113-130
    • Antes, A.1    Thiel, C.2    Martin, L.3    Stenmark, C.4    Connelly, S.5    Devenport, L.6    Mumford, M.7
  • 3
    • 85001002559 scopus 로고    scopus 로고
    • Case Study in Information Security: Securing The Enterprise
    • GSEC Certification, Version 1.4c, Option 2, Retrieved October 27, 2012, from
    • Benton, R. (2005). Case Study in Information Security: Securing The Enterprise, GSEC Certification, Version 1.4c, Option 2, Retrieved October 27, 2012, from http://www.sans.org/reading_room/whitepapers/casestudies/case-study-information-security-securing-enterprise_1628
    • (2005)
    • Benton, R.1
  • 4
    • 0003921938 scopus 로고
    • Taxonomy of Educational Objectives. The classification of educational goals
    • Cognitive domain. New York: David McKay
    • Bloom, B. S. (1956). Taxonomy of Educational Objectives. The classification of educational goals. handbook I: Cognitive domain. New York: David McKay
    • (1956) handbook I
    • Bloom, B.S.1
  • 5
    • 77953768744 scopus 로고    scopus 로고
    • Usable security and privacy: a case study of developing privacy management tools
    • Proceedings of the symposium on Usable privacy and security (SOUPS)
    • Brodie, C., Karat, C., Karat, J. & Feng, J. (2005). Usable security and privacy: a case study of developing privacy management tools. Proceedings of the symposium on Usable privacy and security (SOUPS), pp. 35 - 43
    • (2005) , pp. 35-43
    • Brodie, C.1    Karat, C.2    Karat, J.3    Feng, J.4
  • 6
    • 79451471190 scopus 로고    scopus 로고
    • Effectiveness of Case-Based Learning Instruction on Epistemological Beliefs and Attitudes Toward Chemistry
    • Çam,A. & Geban, O. (2011). Effectiveness of Case-Based Learning Instruction on Epistemological Beliefs and Attitudes Toward Chemistry. Journal of Science Education and Technology, 20(1), pp. 26-32
    • (2011) Journal of Science Education and Technology , vol.20 , Issue.1 , pp. 26-32
    • Çam, A.1    Geban, O.2
  • 7
    • 27944432048 scopus 로고    scopus 로고
    • A case library for teaching usability engineering: design rationale, development, and classroom experience
    • Article 3
    • Carroll, J.M. & Rosson, M.B. (2005). A case library for teaching usability engineering: design rationale, development, and classroom experience. ACM Journal on Educational Resources in Computing, 5(1), Article #3
    • (2005) ACM Journal on Educational Resources in Computing , vol.5 , Issue.1
    • Carroll, J.M.1    Rosson, M.B.2
  • 8
    • 48749128329 scopus 로고    scopus 로고
    • Creating a Case-Based Reasoning Digital Library to Improve Learning in an Introductory Programming Course
    • San Diego, USA, October 28-31
    • Chen, W.F., & Yeh, K.C. (2006). Creating a Case-Based Reasoning Digital Library to Improve Learning in an Introductory Programming Course. Proceedings of IEEE Frontiers in Education 36th Annual Conference, San Diego, USA, October 28-31, pp. 21-22
    • (2006) Proceedings of IEEE Frontiers in Education 36th Annual Conference , pp. 21-22
    • Chen, W.F.1    Yeh, K.C.2
  • 9
    • 84899894396 scopus 로고    scopus 로고
    • Computing Curricula. The Overview Report. Retrieved October 27, 2012, from
    • Computing Curricula (2005). The Overview Report. Retrieved October 27, 2012, from http://www.acm.org/education/education/curric_vols/CC2005-March06Final.pdf
    • (2005)
  • 10
    • 79956289227 scopus 로고    scopus 로고
    • Towards Information Assurance Curricular Guidelines
    • Proceedings of the 15th Annual Conference on Innovation and Technology in Computer Science Education (ITiCSE)
    • Cooper, S., Nickell, C., Pérez, L., Oldfield, B., Brynielsson, J., Gencer Gökce, Asi{dotless}m, Hawthorne, E., Klee, K., Lawrence, A., & Wetzel, S. (2010). Towards Information Assurance Curricular Guidelines. Proceedings of the 15th Annual Conference on Innovation and Technology in Computer Science Education (ITiCSE), pp.49-64
    • (2010) , pp. 49-64
    • Cooper, S.1    Nickell, C.2    Pérez, L.3    Oldfield, B.4    Brynielsson, J.5    Gökce, G.6    Asim, H.E.7    Klee, K.8    Lawrence, A.9    Wetzel, S.10
  • 11
    • 84864538813 scopus 로고    scopus 로고
    • Business Intelligence for Enterprise Systems: a Survey
    • Duan, L., & Xu, L. (2012). Business Intelligence for Enterprise Systems: a Survey. IEEE Transactions on Industrial Informatics, Vol.8, No.3, pp.679-687
    • (2012) IEEE Transactions on Industrial Informatics , vol.8 , pp. 679-687
    • Duan, L.1    Xu, L.2
  • 12
    • 34948841662 scopus 로고    scopus 로고
    • The Use of Blogs, Wikis and RSS in Education
    • A Conversation of Possibilities. Proceedings of Online Learning and Teaching Conference 2006, Brisbane
    • Duffy, P.D. & Bruns, A. (2006). The Use of Blogs, Wikis and RSS in Education: A Conversation of Possibilities. Proceedings of Online Learning and Teaching Conference 2006, pp. 31-38, Brisbane
    • (2006) , pp. 31-38
    • Duffy, P.D.1    Bruns, A.2
  • 13
    • 0141953488 scopus 로고    scopus 로고
    • Implementing the case method of instruction in special education teacher preparation programs
    • Elksnin, L. (2001). Implementing the case method of instruction in special education teacher preparation programs. Teacher Education and Special Education, 24 (2), 95-107
    • (2001) Teacher Education and Special Education , vol.24 , Issue.2 , pp. 95-107
    • Elksnin, L.1
  • 14
    • 84890935327 scopus 로고    scopus 로고
    • An Integrated Approach to Snowmelt Flood Forecasting in Water Resource Management
    • in press Digital Object Identifier: 10.1109/TII.2013.2257807
    • Fang, S., Xu, L., Pei, H., Liu, Y., Liu, Z., Zhu, Y., Yan, J., & Zhang, H. (2013). An Integrated Approach to Snowmelt Flood Forecasting in Water Resource Management. IEEE Transactions on Industrial Informatics, in press Digital Object Identifier: 10.1109/TII.2013.2257807
    • (2013) IEEE Transactions on Industrial Informatics
    • Fang, S.1    Xu, L.2    Pei, H.3    Liu, Y.4    Liu, Z.5    Zhu, Y.6    Yan, J.7    Zhang, H.8
  • 15
    • 0033313897 scopus 로고    scopus 로고
    • Hybrid Artificial Intelligence Approach to Urban Planning
    • Feng, S., & Xu, L. (1999). Hybrid Artificial Intelligence Approach to Urban Planning. Expert Systems, Vol.16, No.4, pp.248-261
    • (1999) Expert Systems , vol.16 , pp. 248-261
    • Feng, S.1    Xu, L.2
  • 16
    • 74049147592 scopus 로고    scopus 로고
    • Formalizing information security knowledge. In ASIACCS '09
    • Computer, and Communications Security, New York, NY, USA, ACM
    • Fenz, S. & Ekelhart, A.(2009). Formalizing information security knowledge. In ASIACCS '09: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 183-194, New York, NY, USA, ACM
    • (2009) Proceedings of the 4th International Symposium on Information , pp. 183-194
    • Fenz, S.1    Ekelhart, A.2
  • 17
    • 0242307415 scopus 로고    scopus 로고
    • Creating significant learning experiences: An integrated approach to designing college courses
    • San Francisco: Jossey-Bass
    • Fink, L. D. (2003). Creating significant learning experiences: An integrated approach to designing college courses. San Francisco: Jossey-Bass
    • (2003)
    • Fink, L.D.1
  • 18
    • 84899893382 scopus 로고    scopus 로고
    • Multimedia Cases and Situated Learning: What Works?
    • In C. Montgomerie & J. Seale (Eds.), Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications 2007. Chesapeake, VA: AACE
    • Fitzgerald, G., Mitchem, K., Hollingsead, C., Miller, K., Koury, K. & Tsai, H.H. (2007). Multimedia Cases and Situated Learning: What Works?. In C. Montgomerie & J. Seale (Eds.), Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications 2007 (pp. 3884-3892). Chesapeake, VA: AACE
    • (2007) , pp. 3884-3892
    • Fitzgerald, G.1    Mitchem, K.2    Hollingsead, C.3    Miller, K.4    Koury, K.5    Tsai, H.H.6
  • 19
    • 53149139024 scopus 로고    scopus 로고
    • Retrieved May 18th, 2013, from
    • Forehand, M. (2013). Bloom's Taxonomy. Retrieved May 18th, 2013, from http://projects.coe.uga.edu/epltt/index.php?title=Bloom%27s_Taxonomy
    • (2013) Bloom's Taxonomy
    • Forehand, M.1
  • 20
    • 33646390965 scopus 로고    scopus 로고
    • Emerging technologies: tag clouds in the blogosphere: electronic literacy and social networking
    • Godwin-Jones, R. (2006). Emerging technologies: tag clouds in the blogosphere: electronic literacy and social networking. Language, Learning & Technology, Vol. 10 No. 2, pp. 8-15
    • (2006) Language, Learning & Technology , vol.10 , Issue.2 , pp. 8-15
    • Godwin-Jones, R.1
  • 21
    • 84868666857 scopus 로고    scopus 로고
    • Using Wikis to Facilitate Collaborative Website Peer Evaluation in an Online Web Development Course: An Exploratory Study
    • He, W. (2011). Using Wikis to Facilitate Collaborative Website Peer Evaluation in an Online Web Development Course: An Exploratory Study. Journal of Information Technology Education, volume 10, pp. 235-247
    • (2011) Journal of Information Technology Education , vol.10 , pp. 235-247
    • He, W.1
  • 22
    • 79952455870 scopus 로고    scopus 로고
    • A Supporting Framework of Online Technology Resources for Lesson Planning
    • He, W., & Hartley, K. (2010). A Supporting Framework of Online Technology Resources for Lesson Planning. Journal of Educational Multimedia and Hypermedia, 19(1), 23-37
    • (2010) Journal of Educational Multimedia and Hypermedia , vol.19 , Issue.1 , pp. 23-37
    • He, W.1    Hartley, K.2
  • 24
    • 58349108259 scopus 로고    scopus 로고
    • Insight into Interface Design of Web-based Case-based Reasoning Retrieval Systems
    • He, W., Wang, F., Means, T., & Xu, L. (2009). Insight into Interface Design of Web-based Case-based Reasoning Retrieval Systems. Expert Systems With Applications, Vol.36, No. 3, pp.7280-7287
    • (2009) Expert Systems With Applications , vol.36 , Issue.3 , pp. 7280-7287
    • He, W.1    Wang, F.2    Means, T.3    Xu, L.4
  • 25
    • 79952446585 scopus 로고    scopus 로고
    • Integrating both Wikis and XML with Case Bases to Facilitate Case Base Development and Maintenance
    • He, W., & Xu, L. (2011). Integrating both Wikis and XML with Case Bases to Facilitate Case Base Development and Maintenance. Expert Systems With Applications, Vol.38, No.7, pp.8632-8638
    • (2011) Expert Systems With Applications , vol.38 , pp. 8632-8638
    • He, W.1    Xu, L.2
  • 26
    • 84867690865 scopus 로고    scopus 로고
    • Improving User Experience with Case-based Reasoning Systems Using Text Mining and Web 2 0
    • He, W. (2013). Improving User Experience with Case-based Reasoning Systems Using Text Mining and Web 2.0. Expert Systems with Applications, 40(2), pp. 500-507
    • (2013) Expert Systems with Applications , vol.40 , Issue.2 , pp. 500-507
    • He, W.1
  • 28
    • 0036018575 scopus 로고    scopus 로고
    • Case-based reasoning and instructional design: using stories to support problem solving
    • Jonassen, D., & Hernandez-Serrano, J. (2002). Case-based reasoning and instructional design: using stories to support problem solving, Educational Technology Research & Development, 50(2), 65-77
    • (2002) Educational Technology Research & Development , vol.50 , Issue.2 , pp. 65-77
    • Jonassen, D.1    Hernandez-Serrano, J.2
  • 29
    • 1242265180 scopus 로고    scopus 로고
    • Information security considerations in IS/IT outsourcing projects: a descriptive case study of two sectors
    • February 2004
    • Khalfan A. M. (2004). Information security considerations in IS/IT outsourcing projects: a descriptive case study of two sectors. International Journal of Information Management, Volume 24, Issue 1, February 2004, pp. 29-42
    • (2004) International Journal of Information Management , vol.24 , Issue.1 , pp. 29-42
    • Khalfan, A.M.1
  • 31
    • 33747632112 scopus 로고    scopus 로고
    • A conceptual framework for developing teaching cases: A review and synthesis of the literature across disciplines
    • Kim, S., Phillips, W., Pinsky, L., Brock, D., Phillips, K., & Keary, J. (2006). A conceptual framework for developing teaching cases: A review and synthesis of the literature across disciplines. Medical Education, 40(9), 867-876
    • (2006) Medical Education , vol.40 , Issue.9 , pp. 867-876
    • Kim, S.1    Phillips, W.2    Pinsky, L.3    Brock, D.4    Phillips, K.5    Keary, J.6
  • 33
    • 69749096710 scopus 로고    scopus 로고
    • WEB 2.0 implications on knowledge management
    • Levy,M. (2009). WEB 2.0 implications on knowledge management. Journal of Knowledge Management, Vol. 13 Iss: 1, pp.120 - 134
    • (2009) Journal of Knowledge Management , vol.13 , Issue.1 , pp. 120-134
    • Levy, M.1
  • 34
    • 84884497347 scopus 로고    scopus 로고
    • An Efficient Recommendation Method for Improving Business Process Modeling
    • in press Digital Object Identifier: 10.1109/TII.2013.2258677
    • Li, Y., Cao, B., Xu, L., Yin, J., Deng, S., Yin, Y., & Wu, Z. (2013). An Efficient Recommendation Method for Improving Business Process Modeling. IEEE Transactions on Industrial Informatics, in press Digital Object Identifier: 10.1109/TII.2013.2258677
    • (2013) IEEE Transactions on Industrial Informatics
    • Li, Y.1    Cao, B.2    Xu, L.3    Yin, J.4    Deng, S.5    Yin, Y.6    Wu, Z.7
  • 35
    • 84869191161 scopus 로고    scopus 로고
    • the health first case study Proceedings of SIGITE Conference 2012
    • Lincke, S. J. (2012). Planning organizational security: the health first case study Proceedings of SIGITE Conference 2012, pp. 3-8
    • (2012) Planning organizational security , pp. 3-8
    • Lincke, S.J.1
  • 37
    • 58349114125 scopus 로고    scopus 로고
    • Retrieval from a Case-Based Reasoning Database
    • Moore, J., Erdelez, S., & He, W. (2006). Retrieval from a Case-Based Reasoning Database. Academic Exchange Quarterly, 10(4), 65-68
    • (2006) Academic Exchange Quarterly , vol.10 , Issue.4 , pp. 65-68
    • Moore, J.1    Erdelez, S.2    He, W.3
  • 38
    • 84899828378 scopus 로고    scopus 로고
    • Teaching Security Management
    • A Case Study Approach. North Carolina Agricultural and Technical State University, Greensboro, NC
    • Murthy, S. (2010). Teaching Security Management: A Case Study Approach. North Carolina Agricultural and Technical State University, Greensboro, NC
    • (2010)
    • Murthy, S.1
  • 39
    • 84899794011 scopus 로고    scopus 로고
    • Computer Security Incident Handling Guide
    • National Institute of Standards and Technology (NIST), The NIST Handbook SP 800-61, Retrieved May 18, 2013, from
    • National Institute of Standards and Technology (NIST). (2013). Computer Security Incident Handling Guide, The NIST Handbook SP 800-61, Retrieved May 18, 2013, from: http://www.nist.org/nist_plugins/content/content.php?content.42
    • (2013)
  • 40
    • 84899863176 scopus 로고    scopus 로고
    • Case Studies for Teaching Information Security
    • NCAT. Retrieved January 18, 2013 from
    • NCAT. (2013). Case Studies for Teaching Information Security: Incident Response Planning Case Study. Retrieved January 18, 2013,from: http://williams.comp.ncat.edu/IA_visualization_labs/Case%20Studies/security_management/incident_response.html
    • (2013) Incident Response Planning Case Study
  • 41
    • 84907599601 scopus 로고    scopus 로고
    • Analysis of Architecturally Significant Requirements for Enterprise Systems
    • Identifier: 10.1109/JSYST.2013.2249892
    • Niu, N., Xu, L., Cheng, J., & Niu, Z. (2013). Analysis of Architecturally Significant Requirements for Enterprise Systems. IEEE Systems Journal, in press Digital Object Identifier: 10.1109/JSYST.2013.2249892
    • (2013) IEEE Systems Journal, in press Digital Object
    • Niu, N.1    Xu, L.2    Cheng, J.3    Niu, Z.4
  • 42
    • 77954317608 scopus 로고
    • National Training Standard for Information Systems Security (INFOSEC) Professionals
    • NSTISS. Retrieved January 18, 2013, from
    • NSTISS (1994). National Training Standard for Information Systems Security (INFOSEC) Professionals. Retrieved January 18, 2013, from www.cnss.gov/Assets/pdf/nstissi_4011.pdf
    • (1994)
  • 43
    • 84870752364 scopus 로고    scopus 로고
    • Supporting beginning teachers' case-based learning in a technology-mediated learning environment
    • In C. H. Steel, M. J. Keppell, P. Gerbic & S. Housego (Eds. ), Curriculum, technology & transformation for an unknown future. Proceedings ascilite Sydney 2010
    • Quek, C.L.G., & Wang, Q. (2010). Supporting beginning teachers' case-based learning in a technology-mediated learning environment. In C.H. Steel, M.J. Keppell, P. Gerbic & S. Housego (Eds.), Curriculum, technology & transformation for an unknown future. Proceedings ascilite Sydney 2010, pp.783-786
    • (2010) , pp. 783-786
    • Quek, C.L.G.1    Wang, Q.2
  • 44
    • 19944378842 scopus 로고    scopus 로고
    • Imparting knowledge through storytelling
    • Part 1& 2, KM World. Retrieved January 18, 2011, from
    • Reamy, T. (2002). Imparting knowledge through storytelling. Part 1& 2, KM World, Vol. 11 No. 6. Retrieved January 18, 2011, from www.kmworld.com
    • (2002) , vol.11 , Issue.6
    • Reamy, T.1
  • 46
    • 84899841322 scopus 로고    scopus 로고
    • Special Considerations in Using the Case-study Method in Teaching Information Security
    • 2011 Conference for Young Professionals in the Field of Information Security. Retrieved January 18, 2013, from
    • Savelyeva, A. (2011). Special Considerations in Using the Case-study Method in Teaching Information Security. 2011 Conference for Young Professionals in the Field of Information Security. Retrieved January 18, 2013, from: http://www.kaspersky.com/images/papers_international_2011-10-95005.pdf
    • (2011)
    • Savelyeva, A.1
  • 48
    • 0001809567 scopus 로고
    • Toward a pedagogy of cases
    • Using Case Methods in Teacher Education (1-30). New York: Teacher college press
    • Shulman, L. S. (1992). Toward a pedagogy of cases, Using Case Methods in Teacher Education (pp. 1-30). New York: Teacher college press
    • (1992)
    • Shulman, L.S.1
  • 49
    • 0037929389 scopus 로고    scopus 로고
    • Scenario-based Knowledge Representation in Case-based Reasoning Systems
    • Sun, B., Xu, L., Pei, X., & Li, H. (2003). Scenario-based Knowledge Representation in Case-based Reasoning Systems. Expert Systems, Vol.20, No.2, pp.92-99
    • (2003) Expert Systems , vol.20 , Issue.2 , pp. 92-99
    • Sun, B.1    Xu, L.2    Pei, X.3    Li, H.4
  • 52
    • 84986099496 scopus 로고    scopus 로고
    • Designing a case-based e-learning system: what, how, and why
    • Wang, F. K. (2002). Designing a case-based e-learning system: what, how, and why. Journal of Workplace Learning, 14(1), 30-43
    • (2002) Journal of Workplace Learning , vol.14 , Issue.1 , pp. 30-43
    • Wang, F.K.1
  • 53
    • 0344197643 scopus 로고    scopus 로고
    • Developing a case-based reasoning knowledge repository to support a learning community - An example from the technology integration community
    • Wang, F., Moore, J. L., Wedman, J., & Shyu, C. (2003). Developing a case-based reasoning knowledge repository to support a learning community - An example from the technology integration community. Educational Technology Research and Development, 51(3), 45-62
    • (2003) Educational Technology Research and Development , vol.51 , Issue.3 , pp. 45-62
    • Wang, F.1    Moore, J.L.2    Wedman, J.3    Shyu, C.4
  • 54
    • 84868027022 scopus 로고    scopus 로고
    • Using storytelling to elicit tacit knowledge from SMEs
    • Whyte,G. & Classen, S. (2012). Using storytelling to elicit tacit knowledge from SMEs. Journal of Knowledge Management, Vol. 16 Iss: 6, pp. 950-962
    • (2012) Journal of Knowledge Management , vol.16 , Issue.6 , pp. 950-962
    • Whyte, G.1    Classen, S.2
  • 55
    • 22544460636 scopus 로고    scopus 로고
    • Exploring the use of blogs as learning spaces in the higher education sector
    • Williams, J. B., & Jacobs, J.S. (2004). Exploring the use of blogs as learning spaces in the higher education sector. Australasian Journal of Educational Technology, 20(2), pp. 232-247
    • (2004) Australasian Journal of Educational Technology , vol.20 , Issue.2 , pp. 232-247
    • Williams, J.B.1    Jacobs, J.S.2
  • 56
    • 0028547161 scopus 로고
    • Developing a Case-based Knowledge System for AIDS Prevention
    • Xu, L. (1994). Developing a Case-based Knowledge System for AIDS Prevention. Expert Systems, Vol.11,No.4, pp.237-244
    • (1994) Expert Systems , vol.11 , Issue.4 , pp. 237-244
    • Xu, L.1
  • 57
    • 0028752697 scopus 로고
    • Case-based Reasoning--A Major Paradigm of Artificial Intelligence
    • Xu, L. (1995a). Case-based Reasoning--A Major Paradigm of Artificial Intelligence. IEEE Potentials, Vol.13, No.5, pp.10-13
    • (1995) IEEE Potentials , vol.13 , Issue.5 , pp. 10-13
    • Xu, L.1
  • 58
    • 0029256187 scopus 로고
    • Case-based Reasoning for AIDS Initial Assessment
    • Xu, L. (1995b). Case-based Reasoning for AIDS Initial Assessment. Knowledge-Based Systems, Vol.8, No.1, pp.32-38
    • (1995) Knowledge-Based Systems , vol.8 , Issue.1 , pp. 32-38
    • Xu, L.1
  • 59
    • 0029932553 scopus 로고    scopus 로고
    • An Integrated Rule- and Case-based Approach to AIDS Initial Assessment
    • Xu, L. (1996). An Integrated Rule- and Case-based Approach to AIDS Initial Assessment. International Journal of Bio-Medical Computing, Vol.40, No.3, pp.197-207
    • (1996) International Journal of Bio-Medical Computing , vol.40 , Issue.3 , pp. 197-207
    • Xu, L.1
  • 60
    • 0034187538 scopus 로고    scopus 로고
    • A Hybrid System Applied to Epidemic Screening
    • Xu, L., & Li, L. (2000). A Hybrid System Applied to Epidemic Screening. Expert Systems, Vol.17, pp.81-89
    • (2000) Expert Systems , vol.17 , pp. 81-89
    • Xu, L.1    Li, L.2
  • 61
    • 0035422468 scopus 로고    scopus 로고
    • An Integrated Knowledge-based System for Grasslands Ecosystems
    • Xu, L., Liang, N., & Gao, Q. (2001). An Integrated Knowledge-based System for Grasslands Ecosystems. Knowledge-Based Systems, Vol.14, pp.271-280
    • (2001) Knowledge-Based Systems , vol.14 , pp. 271-280
    • Xu, L.1    Liang, N.2    Gao, Q.3
  • 62
    • 33646508788 scopus 로고    scopus 로고
    • Integrating Knowledge Management and ERP in Enterprise Information Systems
    • Xu, L., Wang, C., Luo, X., & Shi, Z. (2006). Integrating Knowledge Management and ERP in Enterprise Information Systems. Systems Research and Behavioral Science, Vol.23, No. 2, pp.147-156
    • (2006) Systems Research and Behavioral Science , vol.23 , Issue.2 , pp. 147-156
    • Xu, L.1    Wang, C.2    Luo, X.3    Shi, Z.4
  • 63
    • 70350124630 scopus 로고    scopus 로고
    • Towards A Comprehensive Learning Object Metadata: Incorporation of Context to Stipulate Meaningful Learning and Enhance Learning Object Reusability
    • Yahya, Y. & Yusoff, M. (2008). Towards A Comprehensive Learning Object Metadata: Incorporation of Context to Stipulate Meaningful Learning and Enhance Learning Object Reusability. Interdisciplinary Journal of E-Learning and Learning Objects, Volume 4, pp. 13-48
    • (2008) Interdisciplinary Journal of E-Learning and Learning Objects , vol.4 , pp. 13-48
    • Yahya, Y.1    Yusoff, M.2
  • 64
    • 84899810457 scopus 로고    scopus 로고
    • Teaching security management with case studies: experiences and evaluation, Journal on Education
    • Yuan, X., Jiang, K., Murthy, S., Jones, J., & Yu, H. (2010a). Teaching security management with case studies: experiences and evaluation, Journal on Education, Informatics and Cybernetics (JEIC), Vol. 2, No. 2, pp. 25-30
    • (2010) Informatics and Cybernetics (JEIC) , vol.2 , Issue.2 , pp. 25-30
    • Yuan, X.1    Jiang, K.2    Murthy, S.3    Jones, J.4    Yu, H.5
  • 66
    • 79952497230 scopus 로고    scopus 로고
    • Case studies for teaching physical security and security policy
    • Proceedings of the 2010 Information Security Curriculum Development Conference (InfoSecCD2010), October, 2010, 21-26
    • Yuan, X., Murthy, S., Xu, J. & Yu, H. (2010). Case studies for teaching physical security and security policy. Proceedings of the 2010 Information Security Curriculum Development Conference (InfoSecCD2010), October, 2010, pp. 21-26
    • (2010)
    • Yuan, X.1    Murthy, S.2    Xu, J.3    Yu, H.4
  • 67
    • 76649102421 scopus 로고    scopus 로고
    • The impact of Social Networking 2
    • Zyl, A.S. (2009). The impact of Social Networking 2.0 on organizations. The Electronic Library, Vol. 27 Iss: 6, pp.906 - 918
    • (2009) 0 on organizations. The Electronic Library , vol.27 , Issue.6 , pp. 906-918
    • Zyl, A.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.