
333
Pre-International Conference of Information Systems
(ICIS) SIGSEC-Workshop on Information Security and
Privacy (WISP) 2015.
Chao, R.-J., & Chen, Y.-H. (2009, 2009/09/01/). Evaluation of
the criteria and effectiveness of distance e-learning with
consistent fuzzy preference relations. Expert Systems
with Applications, 36(7), 10657-10662.
https://doi.org/https://doi.org/10.1016/j.eswa.2009.02.047
Chi, M. T. (2006). Two approaches to the study of experts’
characteristics. The Cambridge handbook of expertise
and expert performance, 21-30.
Chicioreanu, T. D., & Amza, C. G. (2018). Adapting your
teaching to accommodate the Net Generation/Z-
Generation of learners. The International Scientific
Conference eLearning and Software for Education.
Choi, M., Levy, Y., & Hovav, A. (2013). The role of user
computer self-efficacy, cybersecurity countermeasures
awareness, and cybersecurity skills influence on
computer misuse. Proceedings of the Pre-International
Conference of Information Systems (ICIS) SIGSEC–
Workshop on Information Security and Privacy (WISP).
Chudowsky, N., Glaser, R., & Pellegrino, J. W. (2001).
Knowing what students know: The science and design
of educational assessment. National Academy Press.
Creswell, J. W., & Creswell, J. D. (2017). Research design:
Qualitative, quantitative, and mixed methods
approaches. Sage publications.
Daum, O. (2019). Cyber security in the maritime sector. J.
Mar. L. & Com., 50, 1.
Davis, B., Carmean, C., & Wagner, E. D. (2009). The
evolution of the LMS: From management to learning.
Santa Rosa, CA: e-Learning Guild.
deLeon, L., & Killian, J. (2000, 2000/01/01). Comparing
Modes of Delivery: Classroom and On-Line (and Other)
Learning. Journal of Public Affairs Education, 6(1), 5-18.
https://doi.org/10.1080/15236803.2000.12022092
Dillon, H., & VanDeGrift, T. (2021, 2021/07/26). Creating an
Inclusive Engineering Student Culture Through Diverse
Teams: Instructor-led and Student-led Approaches
Virtual Conference. https://peer.asee.org/36871
Fisher, D., & Muirhead, P. (2005). Practical teaching skills
for maritime instructors. WMU publications.
Flick, U. (2018). Doing Triangulation and Mixed Methods.
In. SAGE Publications Ltd.
https://doi.org/10.4135/9781529716634
Fry, H., Ketteridge, S., & Marshall, S. (2008). A handbook
for teaching and learning in higher education:
Enhancing academic practice. Routledge.
Furnell, S. (2021, 2021/01/01/). The cybersecurity workforce
and skills. Computers & Security, 100, 102080.
https://doi.org/https://doi.org/10.1016/j.cose.2020.102080
Ha, E.-H., & Lim, E. J. (2018, 2018/05/01/). Peer-Led Written
Debriefing Versus Instructor-Led Oral Debriefing: Using
Multimode Simulation. Clinical Simulation in Nursing,
18, 38-46.
https://doi.org/https://doi.org/10.1016/j.ecns.2018.02.002
Heering, D., Maennel, O., & Venables, A. (2021).
Shortcomings in cybersecurity education for seafarers. In
Developments in Maritime Technology and Engineering
(pp. 49-61). CRC Press.
Hmelo-Silver, C. E., Duncan, R. G., & Chinn, C. A. (2007,
2007/04/26). Scaffolding and Achievement in Problem-
Based and Inquiry Learning: A Response to Kirschner,
Sweller, and. Educational Psychologist, 42(2), 99-107.
https://doi.org/10.1080/00461520701263368
STCW Inc. 2010 Manila Amendments, (2017).
Irons, A. (2019). Delivering cybersecurity education
effectively. In Cybersecurity Education for Awareness
and Compliance (pp. 135-157). IGI Global.
Johnson, R. B., & Christensen, L. (2019). Educational
research: Quantitative, qualitative, and mixed
approaches. Sage publications.
Kala, N., & Balakrishnan, M. (2019). Cyber Preparedness in
Maritime Industry. Int. J. Sci. Technol. Adv, 5, 19-28.
Karahalios, H. (2020, 2020/12/01). Appraisal of a Ship’s
Cybersecurity efficiency: the case of piracy. Journal of
Transportation Security, 13(3), 179-201.
https://doi.org/10.1007/s12198-020-00223-1
Kirschner, P., Sweller, J., & Clark, R. E. (2006). Why
unguided learning does not work: An analysis of the
failure of discovery learning, problem-based learning,
experiential learning and inquiry-based learning.
Educational Psychologist, 41(2), 75-86.
Läänemets, U., & Kalamees-Ruubel, K. (2013). The taba-
tyler rationales. Journal of the American Association for
the Advancement of Curriculum Studies (JAAACS), 9(2).
Levy, Y. (2005). A case study of management skills
comparison in online and on-campus MBA programs.
International Journal of Information and
Communication Technology Education (IJICTE), 1(3), 1-
20.
Light, G., Calkins, S., & Cox, R. (2009). Learning and
teaching in higher education: The reflective professional.
Sage.
Malik, M., Fatima, G., & Sarwar, A. (2017). E-Learning:
Students' Perspectives about Asynchronous and
Synchronous Resources at Higher Education Level.
Bulletin of Education and Research, 39(2), 183-195.
Morgan, S. (2020). Cybercrime to cost the world $10.5
trillion annually by 2025. Cybercrime Magazine, 13(11).
Mraković, I., & Vojinović, R. (2019). Maritime cyber security
analysis–how to reduce threats? Transactions on
maritime science, 8(01), 132-139.
Murati, R., & Ceka, A. (2017). The use of technology in
educational teaching. Journal of Education and Practice,
8(6), 197-199.
Palupi, D. (2018). What Type of Curriculum Development
Models Do We Follow? An Indonesia’s 2013 Curriculum
Case. Indonesian Journal of Curriculum and Educational
Technology Studies, 6(2), 98-105.
Print, M. (1993). Curriculum development and design /
Murray Print. Allen & Unwin.
Ramsden, P. (2003). Learning to teach in higher education.
Routledge.
Rashid, A., Danezis, G., Chivers, H., Lupu, E., Martin, A.,
Lewis, M., & Peersman, C. (2018). Scoping the Cyber
Security Body of Knowledge. IEEE Security & Privacy,
16(3), 96-102. https://doi.org/10.1109/MSP.2018.2701150
Robson, C. (2002). Real world research: A resource for social
scientists and practitioner-researchers. Wiley-Blackwell.
Robson, C., & McCartan, K. (2016). Real world research : a
resource for users of social research methods in applied
settings : fourth edition. John Wiley & Sons.
Salah, K., Hammoud, M., & Zeadally, S. (2015). Teaching
Cybersecurity Using the Cloud. IEEE Transactions on
Learning Technologies, 8(4), 383-392.
https://doi.org/10.1109/TLT.2015.2424692
Schlesinger, S. L., Heuwieser, W., & Schüller, L.-K. (2021).
Comparison of Self-Directed and Instructor-Led Practice
Sessions for Teaching Clinical Skills in Food Animal
Reproductive Medicine. Journal of Veterinary Medical
Education, 48(3), 310-318.
Scruggs, T. E., & Mastropieri, M. A. (2007, 2007/05/15).
Science Learning in Special Education: The Case for
Constructed Versus Instructed Learning. Exceptionality,
15(2), 57-74. https://doi.org/10.1080/09362830701294144
Smith, A., Ling, P., & Hill, D. (2006). The adoption of
multiple modes of delivery in Australian universities.
Journal of University Teaching & Learning Practice, 3(2),
4-19.
Stassen, M., Doherty, K., & Poe, M. (2001). Course-based
review and assessment: Methods for understanding
student learning
www.umass.edu/oapa/sites/default/files/pdf/handbooks
/course_based_assessment_handbook.pdf
Tadlaoui, M. A., & Chekou, M. (2021). A blended learning
approach for teaching python programming language:
towards a post pandemic pedagogy. International
Journal of Advanced Computer Research, 11(52), 13.