{"id":"https://openalex.org/W2084983150","doi":"https://doi.org/10.1108/imcs-11-2011-0056","title":"A framework for teaching network security in academic environments","display_name":"A framework for teaching network security in academic environments","publication_year":2013,"publication_date":"2013-10-07","ids":{"openalex":"https://openalex.org/W2084983150","doi":"https://doi.org/10.1108/imcs-11-2011-0056","mag":"2084983150"},"language":"en","primary_location":{"id":"doi:10.1108/imcs-11-2011-0056","is_oa":false,"landing_page_url":"https://doi.org/10.1108/imcs-11-2011-0056","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053167561","display_name":"\u0391\u03bb\u03ad\u03be\u03b1\u03bd\u03b4\u03c1\u03bf\u03c2 \u03a0\u03b1\u03c0\u03b1\u03bd\u03b9\u03ba\u03bf\u03bb\u03ac\u03bf\u03c5","orcid":"https://orcid.org/0000-0002-0251-0990"},"institutions":[{"id":"https://openalex.org/I51955386","display_name":"Technological Educational Institute of Thessaly","ror":"https://ror.org/04056ja87","country_code":"GR","type":"education","lineage":["https://openalex.org/I51955386"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Alexandros Papanikolaou","raw_affiliation_strings":["Department of Computer Science and Telecommunications, Technological Educational Institute of Larissa, Larissa, Greece"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Telecommunications, Technological Educational Institute of Larissa, Larissa, Greece","institution_ids":["https://openalex.org/I51955386"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070633338","display_name":"Vasileios Vlachos","orcid":"https://orcid.org/0000-0003-3151-682X"},"institutions":[{"id":"https://openalex.org/I51955386","display_name":"Technological Educational Institute of Thessaly","ror":"https://ror.org/04056ja87","country_code":"GR","type":"education","lineage":["https://openalex.org/I51955386"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Vasileios Vlachos","raw_affiliation_strings":["Computer Science and Telecommunications, Technological Educational Institute of Larissa, Larissa, Greece"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Science and Telecommunications, Technological Educational Institute of Larissa, Larissa, Greece","institution_ids":["https://openalex.org/I51955386"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086440930","display_name":"Andreas Venieris","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Andreas Venieris","raw_affiliation_strings":["Care Direct SA, Athens, Greece"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Care Direct SA, Athens, Greece","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019557941","display_name":"Christos Ilioudis","orcid":"https://orcid.org/0000-0002-8084-4339"},"institutions":[{"id":"https://openalex.org/I77990126","display_name":"Alexander Technological Educational Institute of Thessaloniki","ror":"https://ror.org/04h36ea57","country_code":"GR","type":"education","lineage":["https://openalex.org/I77990126"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Christos Ilioudis","raw_affiliation_strings":["Department of Information Technology, Technological Educational Institute of Thessaloniki, Thessaloniki, Greece"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Technological Educational Institute of Thessaloniki, Thessaloniki, Greece","institution_ids":["https://openalex.org/I77990126"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055656374","display_name":"\u039a\u03c9\u03bd\u03c3\u03c4\u03b1\u03bd\u03c4\u03af\u03bd\u03bf\u03c2 \u03a0\u03b1\u03c0\u03b1\u03c0\u03b1\u03bd\u03b1\u03b3\u03b9\u03ce\u03c4\u03bf\u03c5","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Konstantinos Papapanagiotou","raw_affiliation_strings":["OWASP Greek Chapter, Athens, Greece"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"OWASP Greek Chapter, Athens, Greece","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064844207","display_name":"Anastasios Stasinopoulos","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Anastasios Stasinopoulos","raw_affiliation_strings":["OWASP Greek Chapter, Athens, Greece"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"OWASP Greek Chapter, Athens, Greece","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5053167561"],"corresponding_institution_ids":["https://openalex.org/I51955386"],"apc_list":null,"apc_paid":null,"fwci":0.8361,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.83498022,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"21","issue":"4","first_page":"315","last_page":"338"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.987500011920929,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7780766487121582},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.7408734560012817},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7151514887809753},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.7009040117263794},{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.6779782772064209},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.5730686187744141},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.5195977091789246},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.47379180788993835},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45639464259147644},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4270067811012268},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.355372816324234},{"id":"https://openalex.org/keywords/engineering-management","display_name":"Engineering management","score":0.33858588337898254},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3347417116165161},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12508425116539001},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11787194013595581},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.11499449610710144},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.09449514746665955}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7780766487121582},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.7408734560012817},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7151514887809753},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.7009040117263794},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.6779782772064209},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.5730686187744141},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.5195977091789246},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.47379180788993835},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45639464259147644},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4270067811012268},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.355372816324234},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.33858588337898254},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3347417116165161},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12508425116539001},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11787194013595581},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.11499449610710144},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.09449514746665955},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/imcs-11-2011-0056","is_oa":false,"landing_page_url":"https://doi.org/10.1108/imcs-11-2011-0056","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320316785","display_name":"VMware","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W23392749","https://openalex.org/W1442323271","https://openalex.org/W1831161261","https://openalex.org/W1949415606","https://openalex.org/W1966241971","https://openalex.org/W1979807069","https://openalex.org/W2007288669","https://openalex.org/W2022634938","https://openalex.org/W2023288625","https://openalex.org/W2035835094","https://openalex.org/W2050498734","https://openalex.org/W2080775715","https://openalex.org/W2095108148","https://openalex.org/W2142520924","https://openalex.org/W2142658207","https://openalex.org/W2147901100","https://openalex.org/W2149920540","https://openalex.org/W2163847589","https://openalex.org/W2536988621","https://openalex.org/W2618452333","https://openalex.org/W3092824551","https://openalex.org/W4247223839","https://openalex.org/W4252195230"],"related_works":["https://openalex.org/W2041415459","https://openalex.org/W2593155302","https://openalex.org/W2072812638","https://openalex.org/W3126095231","https://openalex.org/W2352855287","https://openalex.org/W4200071106","https://openalex.org/W2378906650","https://openalex.org/W2384288445","https://openalex.org/W2382526412","https://openalex.org/W2347474189"],"abstract_inverted_index":{"Purpose":[0],"\u2013":[1,57,158,178],"Teaching":[2],"information":[3],"systems":[4,22],"security":[5,101],"features":[6],"some":[7],"peculiarities,":[8],"compared":[9],"to":[10,18,44,52,82,132,140,188],"other":[11,189],"scientific":[12],"fields,":[13],"as":[14,39],"the":[15,30,36,59,69,84,88,93,99,106,129,143,147,163],"trainees":[16],"have":[17,169],"design":[19],"and":[20,26,42,92,134,168],"protect":[21],"against":[23],"both":[24],"known":[25],"unknown":[27],"attacks.":[28],"Moreover,":[29],"so":[31],"far":[32],"established":[33],"stereotypes":[34],"present":[35],"potential":[37],"intruders":[38,86],"being":[40],"ingenious":[41],"able":[43],"penetrate":[45],"almost":[46],"every":[47],"system.":[48],"The":[49,159,179],"paper":[50],"aims":[51],"discuss":[53],"these":[54,175],"issues.":[55],"Design/methodology/approach":[56],"Within":[58],"scope":[60],"of":[61,102,125,146,182],"two":[62],"different":[63],"modules":[64],"in":[65,78,138],"higher":[66],"education":[67],"institutes,":[68],"students'":[70],"involvement":[71],"into":[72],"practical":[73],"pre-designed":[74],"scenarios":[75],"was":[76,116,150],"attempted,":[77],"order":[79,139],"for":[80,98],"them":[81],"understand":[83],"way":[85],"think,":[87],"methodologies":[89],"they":[90],"follow":[91],"liabilities":[94],"one":[95],"may":[96,185],"face":[97],"flawed":[100],"network":[103],"applications":[104],"and/or":[105],"supporting":[107],"infrastructure.":[108],"For":[109],"this":[110,166],"reason,":[111],"an":[112,153],"educational":[113],"software":[114],"tool":[115,149],"developed":[117,148],"(named":[118],"\u201cHackademic":[119],"Challenges\u201d),":[120],"which":[121],"comprised":[122],"a":[123],"variety":[124],"realistic":[126],"scenarios,":[127],"where":[128],"student":[130],"had":[131],"locate":[133],"exploit":[135],"various":[136],"vulnerabilities,":[137],"successfully":[141],"complete":[142],"challenge.":[144],"Evaluation":[145],"attempted":[151],"through":[152,174],"online,":[154],"anonymous":[155],"questionnaire.":[156],"Findings":[157],"results":[160],"show":[161],"that":[162,184],"students":[164],"embraced":[165],"approach":[167],"benefited":[170],"significantly":[171],"from":[172],"going":[173],"exercises.":[176],"Originality/value":[177],"contribution":[180],"consists":[181],"findings":[183],"be":[186],"useful":[187],"instructors":[190],"teaching":[191],"similar":[192],"subjects.":[193]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2026-05-21T09:19:25.381259","created_date":"2025-10-10T00:00:00"}
