cart

Membership Portal

Join Login

Membership and collaboration facilitated by Member 365.

Membership Portal

Join Login

Membership and collaboration facilitated by Member 365.

Papers

A Case Study on the Standardization and Virtualization Efforts for Effective Computer Security Education: A Layered Community Driven Approach
Author:
S. Acharya, Jungwoo Ryoo
Date:
01 July 2011
A Concept Focused Security Lab Environment
Author:
Steven Fulton, Dino Schweitzer
Date:
01 July 2011
A Tool for IAS Curriculum Development, Management, and Accreditation
Author:
Dr. Sandra Gorka, Dr. Jacob Miller, Daniel Yoas
Date:
01 July 2011
An Online Learning Approach to Information Systems Security Education
Author:
Norman Bier, Marsha Lovett, Robert Seacord
Date:
01 July 2011
Creation of a Collegiate Cyber Security Championship Cup
Author:
Gregory B. White, Ph.D., Dwayne Williams
Date:
01 July 2011
CyberSecurity as General Education
Author:
Rajendra K. Raj, Sumita Mishra, Carol J. Romanowski, Trudy M. Howles
Date:
01 July 2011
Design of a SCADA Laboratory to Support IT Classes
Author:
Wm. Arthur Conklin, Jonathan Pollet, Joe Cummins
Date:
01 July 2011
Digital Battlefield Forensics
Author:
Eric Imsand, John A. Hamilton, Jr.
Date:
01 July 2011
Game-based InfoSec Education Using OpenSim
Author:
Jungwoo Ryoo, Angsana Techatassanasoontorn, Dongwon Lee, Jeremy Lothian
Date:
01 July 2011
Increasing Awareness of the Multijurisdictional Nature of Cloud Computing
Author:
Kara Nance, Amelia Phillips
Date:
01 July 2011
Information Security Education: A Competency Based Approach and Exemplification
Author:
Timothy J. Perez
Date:
01 July 2011
Learning Snort Rules by Capturing Intrusions in Live Network Traffic Replay
Author:
Jinsheng Xu, Jinghua Zhang, Triveni Gadipalli, Xiaohong Yuan, Huiming Yu
Date:
01 July 2011
National C3 Baseline Study: State of Cyberethics, Safety and Security Awareness in US Schools
Author:
Davina Pruitt-Mentle
Date:
01 July 2011
Phishing Awareness Exercises
Author:
Ronald Dodge, Ericka Rovira, Radwick Zachary, Shevchik Joseph
Date:
01 July 2011
Scenario Based Exercises in IA Courses
Author:
Nanette S. Poulios, Dipesh Pradhan
Date:
01 July 2011
Screening IA Students for Criminal Backgrounds
Author:
Jeffrey A. Livermore
Date:
01 July 2011
Service Learning in Security
Author:
Susan J. Lincke
Date:
01 July 2011
Software Reengineering Approach to Teaching Secure Coding Practices
Author:
Leo Hansel, Sam Chung, Barbara Endicott-Popovsky
Date:
01 July 2011
Teaching Cryptology At All Levels Using CrypTool
Author:
Rong Yang, Layne Wallace, Ian Burchett
Date:
01 July 2011
Teaching Cybersecurity at the “Seams”
Author:
Steven Rigby, Amjad Ali
Date:
01 July 2011
The Enemy at the Gates II: The Enemy Within
Author:
Michael E. Whitman, Herbert J. Mattord
Date:
01 July 2011
The Impact of Regional Cyber Defense Competitions on Student Motivation, Engagement, and Curriculum at Champlain College
Author:
Jim Hoag, Zachariah Tanko
Date:
01 July 2011
Using DoDAF as A Penetration Testing Tool
Author:
C. W. Perr, Christopher Harrison, Daniel Compton, J. A. Hamilton, Jr., Ph.D.
Date:
01 July 2011
What is the Student Recruitment Value of the CAE Designation?
Author:
Jeffrey Livermore, Anastasia Salter
Date:
01 July 2011
 
 
Powered by Phoca Download

The Colloquium recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information is vital to business continuity and security. The Colloquium's goal is to work together to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula, especially at the graduate and undergraduate levels.


giving

Save money and support the Colloquium for Information Systems Security Education.


Recent Posts