cart

Membership Portal

Join Login

Membership and collaboration facilitated by Member 365.

Membership Portal

Join Login

Membership and collaboration facilitated by Member 365.

Papers

A Cross-Institutional Faculty Research Mentorship Program in Information Security and Assurance
Author:
Claude Turner, Jidé Odubiyi, Mike O’Leary
Date:
01 July 2010
A Hands-on Approach to Information Operations Education and Training
Author:
Jeff Boleng, Dino Schweitzer
Date:
01 July 2010
A Study of the Current Use of Information Security Plans at Colleges and Universities
Author:
W.V. Maconachy, Ph.D., Peter Starland
Date:
01 July 2010
A Systematic Approach to Information Systems Security Education
Author:
Joseph J. Simpson, Dr. Barbara Endicott-Popovsky
Date:
01 July 2010
A Tool for Teaching Web Application Security
Author:
Li-Chiou Chen, Lixin Tao, Chienting Lin, Xiangdong Li
Date:
01 July 2010
All the News That’s Fit to Blog
Author:
Richard G. Epstein, Dafan Zhang
Date:
01 July 2010
An Active Learning Approach for Coursework in Information Assurance Ethics and Law
Author:
N. Paul Schembari
Date:
01 July 2010
Approaching Identity Theft in Education from an Interdisciplinary Perspective
Author:
Susan Helser, Denise McKernan
Date:
01 July 2010
Designing a Virtual Lab for Computer Forensics
Author:
Wen Yao, Chao-Hsien Chu, Bing Liu, Zang Li
Date:
01 July 2010
Developing a National High School Cyber Defense Competition
Author:
Gregory B.White, Ph.D., Dwayne Williams, Keith Harrison
Date:
01 July 2010
Developing a Strategic Security Planning Module for Multidisciplinary Policies Courses
Author:
Jeffrey P. Landry
Date:
01 July 2010
Expanding the Educational Boundaries of Cyber Defense Exercises
Author:
Kara Nance, Brian Hay, Amelia Phillips
Date:
01 July 2010
Experiences in Designing and Implementing an Undergraduate Certificate in Information Security
Author:
Prem Uppuluri, Jeff Pittges, Robert Phillips
Date:
01 July 2010
Harsh Realities 101 - Augmenting Information Assurance with Legal Curricula
Author:
Alan Katerinsky, H. Raghav Rao, Ph.D., Shambhu Upadhyaya, Ph.D.
Date:
01 July 2010
Implementing a CNSS 4012 Certification in an Information Systems Curriculum
Author:
Nary Subramanian, George Whitson
Date:
01 July 2010
Increasing Information Security Awareness in Non-security Courses: A Virtual Team Approach
Author:
Judith C. Simon, Aaron K. Smith, Charles J. Campbell, Euntae Ted Lee
Date:
01 July 2010
Industry Based Information Assurance: a new role for user awareness training?
Author:
Steven Fulton, Stella Porto
Date:
01 July 2010
Injecting Security in the Curriculum – Experiences in Effective Dissemination and Assessment Design
Author:
Siddharth Kaza, Blair Taylor, Harry Hochheiser, Shiva Azadegan, Mike O’Leary, Claude F. Turner
Date:
01 July 2010
Instruction, Exercise, Competition and Certification: The Cyber Defense Training Continuum
Author:
Duke Ayers
Date:
01 July 2010
Laboratory Exercises for Wireless Network Attacks and Defenses
Author:
Xiaohong Yuan, David Matthews, Omari Wright, Jinsheng Xu, Huiming Yu
Date:
01 July 2010
NSA/DHS CAE Application Lessons Learned
Author:
Thomas A. Augustine, Patrick Vincent, Donald M. Needham
Date:
01 July 2010
PRISM: A Public Repository for Information Security Material
Author:
Vincent Garramone, Dino Schweitzer
Date:
01 July 2010
Promoting Skepticism in the Security Classroom
Author:
Martin C. Carlisle, Dino Schweitzer
Date:
01 July 2010
Putting It All Together: Theory and Practice in Courses on Cryptography
Author:
Philip Scheffler, Michael Hylkema, Anatoly Temkin
Date:
01 July 2010
Standardization of Virtualization Efforts in Information Assurance Education for Intrusion Detection/Prevention Learning Modules
Author:
Subrata Acharya, Jungyoo Ryoo
Date:
01 July 2010
TCP Three-way Handshake as a Pedagogical Tool
Author:
Yu “Andy” Wu
Date:
01 July 2010
The Impact of a Structured Application Development Framework on Web Application Security
Author:
Heather Richter Lipford, Jing Xie, Will Stranathan, Daniel Oakley, Bei-Tseng Chu
Date:
01 July 2010
Use of Spear Phishing Exercises to Increase Security Awareness
Author:
Allen M. Smith, Nancy Y. Toppel
Date:
01 July 2010
Using the Workflow Technology in Secure Software Engineering Education
Author:
India Waddell, Nadia Jones, Crystal Steed, Xiaohong Yuan, Yaohang Li
Date:
01 July 2010
Using Virtualization for Cyber Security Education and Experimentation
Author:
Todd R. Andel, Kyle E. Stewart, Jeffrey W. Humphries
Date:
01 July 2010
Virtual Lab for Information Assurance Education
Author:
Azene Zenebe, David Anyiwo
Date:
01 July 2010
Virtual Laboratories for Learning Real World Security - Operating Systems
Date:
01 July 2010
 
 
Powered by Phoca Download

The Colloquium recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information is vital to business continuity and security. The Colloquium's goal is to work together to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula, especially at the graduate and undergraduate levels.


giving

Save money and support the Colloquium for Information Systems Security Education.


Recent Posts