{"title":"为IT专业人员提供安全培训和教育","authors":"Louise Yngström","doi":"10.1016/S0020-7101(96)01235-4","DOIUrl":null,"url":null,"abstract":"<div><p>This paper presents some of the difficulties inherent in understanding IT security as a context oriented area when it comes to practicalities. Such attributes have to be included in education and training; here presented through demands put forward by some official international bodies. A short state-of-the-art report is given and an approach to meet stated demands is presented including evaluations performed. Finally there are remarks on future work needed.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 105-113"},"PeriodicalIF":0.0000,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01235-4","citationCount":"3","resultStr":"{\"title\":\"Security training and education for IT professionals\",\"authors\":\"Louise Yngström\",\"doi\":\"10.1016/S0020-7101(96)01235-4\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>This paper presents some of the difficulties inherent in understanding IT security as a context oriented area when it comes to practicalities. Such attributes have to be included in education and training; here presented through demands put forward by some official international bodies. A short state-of-the-art report is given and an approach to meet stated demands is presented including evaluations performed. Finally there are remarks on future work needed.</p></div>\",\"PeriodicalId\":75935,\"journal\":{\"name\":\"International journal of bio-medical computing\",\"volume\":\"43 1\",\"pages\":\"Pages 105-113\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1996-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01235-4\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International journal of bio-medical computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0020710196012354\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International journal of bio-medical computing","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0020710196012354","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security training and education for IT professionals
This paper presents some of the difficulties inherent in understanding IT security as a context oriented area when it comes to practicalities. Such attributes have to be included in education and training; here presented through demands put forward by some official international bodies. A short state-of-the-art report is given and an approach to meet stated demands is presented including evaluations performed. Finally there are remarks on future work needed.