
333 
Pre-International Conference of Information Systems 
(ICIS) SIGSEC-Workshop on Information Security and 
Privacy (WISP) 2015.   
Chao, R.-J., & Chen, Y.-H. (2009, 2009/09/01/). Evaluation of 
the criteria and effectiveness of distance e-learning with 
consistent fuzzy preference relations. Expert Systems 
with Applications, 36(7), 10657-10662. 
https://doi.org/https://doi.org/10.1016/j.eswa.2009.02.047   
Chi, M. T. (2006). Two approaches to the study of experts’ 
characteristics.  The Cambridge handbook of expertise 
and expert performance, 21-30.   
Chicioreanu, T. D., & Amza, C. G. (2018). Adapting your 
teaching to accommodate the Net Generation/Z-
Generation of learners. The International Scientific 
Conference eLearning and Software for Education.   
Choi, M., Levy, Y., & Hovav, A. (2013). The role of user 
computer self-efficacy, cybersecurity countermeasures 
awareness, and cybersecurity skills influence on 
computer misuse. Proceedings of the Pre-International 
Conference of Information Systems (ICIS) SIGSEC–
Workshop on Information Security and Privacy (WISP).   
Chudowsky, N., Glaser, R., & Pellegrino, J. W. (2001). 
Knowing what students know: The science and design 
of educational assessment. National Academy Press.   
Creswell, J. W., & Creswell, J. D. (2017). Research design: 
Qualitative, quantitative, and mixed methods 
approaches. Sage publications.   
Daum, O. (2019). Cyber security in the maritime sector. J. 
Mar. L. & Com., 50, 1.   
Davis, B., Carmean, C., & Wagner, E. D. (2009). The 
evolution of the LMS: From management to learning. 
Santa Rosa, CA: e-Learning Guild.   
deLeon, L., & Killian, J. (2000, 2000/01/01). Comparing 
Modes of Delivery: Classroom and On-Line (and Other) 
Learning. Journal of Public Affairs Education, 6(1), 5-18. 
https://doi.org/10.1080/15236803.2000.12022092   
Dillon, H., & VanDeGrift, T. (2021, 2021/07/26). Creating an 
Inclusive Engineering Student Culture Through Diverse 
Teams: Instructor-led and Student-led Approaches 
Virtual Conference. https://peer.asee.org/36871 
Fisher, D., & Muirhead, P. (2005). Practical teaching skills 
for maritime instructors. WMU publications.   
Flick, U. (2018). Doing Triangulation and Mixed Methods. 
In. SAGE Publications Ltd. 
https://doi.org/10.4135/9781529716634   
Fry, H., Ketteridge, S., & Marshall, S. (2008). A handbook 
for teaching and learning in higher education: 
Enhancing academic practice. Routledge.   
Furnell, S. (2021, 2021/01/01/). The cybersecurity workforce 
and skills. Computers & Security, 100, 102080. 
https://doi.org/https://doi.org/10.1016/j.cose.2020.102080   
Ha, E.-H., & Lim, E. J. (2018, 2018/05/01/). Peer-Led Written 
Debriefing Versus Instructor-Led Oral Debriefing: Using 
Multimode Simulation. Clinical Simulation in Nursing, 
18, 38-46. 
https://doi.org/https://doi.org/10.1016/j.ecns.2018.02.002   
Heering, D., Maennel, O., & Venables, A. (2021). 
Shortcomings in cybersecurity education for seafarers. In 
Developments in Maritime Technology and Engineering 
(pp. 49-61). CRC Press.   
Hmelo-Silver, C. E., Duncan, R. G., & Chinn, C. A. (2007, 
2007/04/26). Scaffolding and Achievement in Problem-
Based and Inquiry Learning: A Response to Kirschner, 
Sweller, and. Educational Psychologist, 42(2), 99-107. 
https://doi.org/10.1080/00461520701263368   
STCW Inc. 2010 Manila Amendments, (2017).   
Irons, A.  (2019). Delivering cybersecurity education 
effectively. In Cybersecurity Education for Awareness 
and Compliance (pp. 135-157). IGI Global.   
Johnson, R. B., & Christensen, L. (2019). Educational 
research: Quantitative, qualitative, and mixed 
approaches. Sage publications.   
Kala, N., & Balakrishnan, M. (2019). Cyber Preparedness in 
Maritime Industry. Int. J. Sci. Technol. Adv, 5, 19-28.   
Karahalios, H. (2020, 2020/12/01). Appraisal of a Ship’s 
Cybersecurity efficiency: the case of piracy. Journal of 
Transportation Security, 13(3), 179-201. 
https://doi.org/10.1007/s12198-020-00223-1   
Kirschner, P., Sweller, J., & Clark, R. E. (2006). Why 
unguided learning does not work: An analysis of the 
failure of discovery learning, problem-based learning, 
experiential learning and inquiry-based learning. 
Educational Psychologist, 41(2), 75-86.   
Läänemets, U., & Kalamees-Ruubel, K. (2013). The taba-
tyler rationales. Journal of the American Association for 
the Advancement of Curriculum Studies (JAAACS), 9(2).   
Levy, Y. (2005). A case study of management skills 
comparison in online and on-campus MBA programs. 
International Journal of Information and 
Communication Technology Education (IJICTE), 1(3), 1-
20.   
Light, G., Calkins, S., & Cox, R. (2009). Learning and 
teaching in higher education: The reflective professional. 
Sage.   
Malik, M., Fatima, G., & Sarwar, A. (2017). E-Learning: 
Students' Perspectives about Asynchronous and 
Synchronous Resources at Higher Education Level. 
Bulletin of Education and Research, 39(2), 183-195.   
Morgan, S. (2020). Cybercrime to cost the world $10.5 
trillion annually by 2025. Cybercrime Magazine, 13(11).   
Mraković, I., & Vojinović, R. (2019). Maritime cyber security 
analysis–how to reduce threats? Transactions on 
maritime science, 8(01), 132-139.   
Murati, R., & Ceka, A. (2017). The use of technology in 
educational teaching. Journal of Education and Practice, 
8(6), 197-199.   
Palupi, D. (2018). What Type of Curriculum Development 
Models Do We Follow? An Indonesia’s 2013 Curriculum 
Case. Indonesian Journal of Curriculum and Educational 
Technology Studies, 6(2), 98-105.   
Print, M. (1993). Curriculum development and design / 
Murray Print. Allen & Unwin.   
Ramsden, P. (2003). Learning to teach in higher education. 
Routledge.   
Rashid, A., Danezis, G., Chivers, H., Lupu, E., Martin, A., 
Lewis, M., & Peersman, C. (2018). Scoping the Cyber 
Security Body of Knowledge. IEEE Security & Privacy, 
16(3), 96-102. https://doi.org/10.1109/MSP.2018.2701150   
Robson, C. (2002). Real world research: A resource for social 
scientists and practitioner-researchers. Wiley-Blackwell.   
Robson, C., & McCartan, K. (2016). Real world research : a 
resource for users of social research methods in applied 
settings : fourth edition. John Wiley & Sons.   
Salah, K., Hammoud, M., & Zeadally, S. (2015). Teaching 
Cybersecurity Using the Cloud. IEEE Transactions on 
Learning Technologies, 8(4), 383-392. 
https://doi.org/10.1109/TLT.2015.2424692   
Schlesinger, S. L., Heuwieser, W., & Schüller, L.-K. (2021). 
Comparison of Self-Directed and Instructor-Led Practice 
Sessions for Teaching Clinical Skills in Food Animal 
Reproductive Medicine. Journal of Veterinary Medical 
Education, 48(3), 310-318.   
Scruggs, T. E., & Mastropieri, M. A. (2007, 2007/05/15). 
Science Learning in Special Education: The Case for 
Constructed Versus Instructed Learning. Exceptionality, 
15(2), 57-74. https://doi.org/10.1080/09362830701294144   
Smith, A., Ling, P., & Hill, D. (2006). The adoption of 
multiple modes of delivery in Australian universities. 
Journal of University Teaching & Learning Practice, 3(2), 
4-19.   
Stassen, M., Doherty, K., & Poe, M. (2001). Course-based 
review and assessment:  Methods for understanding 
student  learning   
www.umass.edu/oapa/sites/default/files/pdf/handbooks
/course_based_assessment_handbook.pdf   
Tadlaoui, M. A., & Chekou, M. (2021). A blended learning 
approach for teaching python programming language: 
towards a post pandemic pedagogy. International 
Journal of Advanced Computer Research, 11(52), 13.