Show simple item record

dc.contributor.authorWen, Shao-Fang
dc.contributor.authorKatt, Basel
dc.date.accessioned2020-02-03T12:53:34Z
dc.date.available2020-02-03T12:53:34Z
dc.date.created2019-02-18T09:52:21Z
dc.date.issued2019
dc.identifier.citationJournal of Advances in Information Technology. 2019, 10 (3), 81-90.nb_NO
dc.identifier.issn1798-2340
dc.identifier.urihttp://hdl.handle.net/11250/2639311
dc.description.abstractLearning software security is one of the most challenging tasks in the information technology sector due to the vast amount of security knowledge and the difficulties in understanding the practical applications. The traditional teaching and learning materials, which are usually organized topically and security-centric, have fewer linkages with learners’ experience and prior knowledge that they bring to the learning sessions. Learners often do not associate vulnerabilities or coding practices with programs similar to what they were writing in their previous time. Consequently, their motivation for learning is not touched by conventional methods. Therefore, it is necessary to develop learning tools that can improve learner’ ability of application-scenarios connections by using a meaningful learning approach. In this paper, we present a softwaresecurity learning system based on ontologies that facilitates the contextual learning process by providing contextualized access to security knowledge via real software application scenarios, in which learners can explore and relate the security knowledge to the context they are already familiar with.nb_NO
dc.language.isoengnb_NO
dc.publisherEngineering and Technology Publishingnb_NO
dc.relation.urihttp://www.jait.us/uploadfile/2019/0823/20190823114050399.pdf
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/deed.no*
dc.titleDevelopment of Ontology-Based Software Security Learning System with Contextualized Learning Approachnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionpublishedVersionnb_NO
dc.source.pagenumber81-90nb_NO
dc.source.volume10nb_NO
dc.source.journalJournal of Advances in Information Technologynb_NO
dc.source.issue3nb_NO
dc.identifier.doi10.12720/jait.10.3.81-90
dc.identifier.cristin1678153
dc.description.localcodeCopyright © 2019 the Author(s). Published by Engineering and Technology Publishing. This open access article is distributed under Creative Commons Attribution-NonCommercial-NoDerivatives License 4.0 (CC BY-NC-ND).nb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode0


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal
Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal