cart

Membership Portal

Join Login

Membership and collaboration facilitated by Member 365.

Membership Portal

Join Login

Membership and collaboration facilitated by Member 365.

Papers

A Perceptual Taxonomy of Contextual Cues for Cyber Trust
Date:
01 July 2014
Analysis of Management VS. Technical Personnel Perceptions of the Effectiveness of DodD 8570M Mandated IA Certification Training
Author:
Peter J. Starland
Date:
01 July 2014
Are Cybersecurity Laboratory Exercises Constructivist in Use?
Date:
01 July 2014
Cyber Security Training: ANN as an Evaluator and Informant
Author:
Liang Kong, Michael Haney, Carolina L., David G.
Date:
01 July 2014
Cyber Threats to the Supply Chain: How Cyber Intelligence Informs Best Practices for Operational Security
Author:
Cherine S. Abdalla
Date:
01 July 2014
Cybersecurity Education: The Emergence of an Accredited Academic Discipline?
Author:
Charles E. Wilson
Date:
01 July 2014
CySGS: Cyberlearning Environment about Smart Grid Security
Author:
Summer Prince, Ambareen Siraj
Date:
01 July 2014
Factors of Success - The Potential Relationship Between CLI Commands and Cybersecurity Competitions
Author:
Warren Lerner
Date:
01 July 2014
Review on Building Security in a Secure Software Development Model
Author:
Kenneth Sigler
Date:
01 July 2014
Strategic Communications Planning for a CISO: Strength in Weak Ties
Date:
01 July 2014
 
 
Powered by Phoca Download

The Colloquium recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information is vital to business continuity and security. The Colloquium's goal is to work together to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula, especially at the graduate and undergraduate levels.


giving

Save money and support the Colloquium for Information Systems Security Education.


Recent Posts