TY - BOOK AU - Drevin,Lynette AU - Miloslavskaya,Natalia AU - Leung,Wai Sze AU - von Solms,Suné TI - Information Security Education - Adapting to the Fourth Industrial Revolution: 15th IFIP WG 11.8 World Conference, WISE 2022, Copenhagen, Denmark, June 13-15, 2022, Proceedings T2 - IFIP Advances in Information and Communication Technology, SN - 9783031081729 U1 - 371.334 23 PY - 2022/// CY - Cham PB - Springer International Publishing, Imprint: Springer KW - Education-Data processing KW - Application software KW - Computer engineering KW - Computer networks  KW - Data protection KW - Computers and Education KW - Computer and Information Systems Applications KW - Computer Engineering and Networks KW - Data and Information Security N1 - Securing the Fourth Industrial Revolution through Programming -- Analyzing Error Rates in Cryptological Programming Assignments -- SecTutor: An Intelligent Tutoring System For Secure Programming -- Cybersecurity in the Fourth Industrial Revolution: Charting the Way Forward in Education -- How to Overcome Staff Shortage in Professionals for SOCs and NSICs -- Collaborative Cybersecurity Learning: Establishing Educator and Learner Expectations and Requirements -- A Maturity Assessment Model for Cyber Security Education in Europe -- Real-World Cybersecurity-Inspired Capacity Building -- ForCyRange: An Educational IoT Cyber Range for Live Digital Forensics -- South Africa's taxi industry as a cybersecurity-awareness game changer: why and how? -- Maritime Cyber Threats Detection Framework: Building Capabilities. N2 - This book constitutes the refereed proceedings of the 15th IFIP WG 11.8 World Conference on Information Security Education, WISE 2022, held in Copenhagen, Denmark, in June 2021. The 8 papers presented were carefully reviewed and selected from 17 submissions. The papers are categorized into the following topical sub-headings: Securing the Fourth Industrial Revolution through Programming; Cybersecurity in the Fourth Industrial Revolution: Charting the Way Forward in Education; and Real-World Cybersecurity-Inspired Capacity Building UR - https://doi.org/10.1007/978-3-031-08172-9 ER -