cart

Membership Portal

Join Login

Membership and collaboration facilitated by Member 365.

Membership Portal

Join Login

Membership and collaboration facilitated by Member 365.

Papers

A Qualitative Analysis of Best Practices in IA Online Synchronous Instruction
Author:
Helen G. Barker, Jason M. Pittman
Date:
01 July 2012
Certifying a Textbook Under NSTISSI 4011
Author:
Richard E. Smith
Date:
01 July 2012
Cyber-Security, IAS and the Cyber Warrior
Author:
Dale C. Rowe, J. J. Ekstrom, Barry Lunt
Date:
01 July 2012
Cyberattacks on SCADA Systems
Author:
Guillermo Francia, III, David Thornton, Thomas Brookshire
Date:
01 July 2012
Defining a Framework for Teaching Privacy in Information Assurance Curriculum
Author:
Svetlana Peltsverger, Guangzhi Zheng
Date:
01 July 2012
Developing a Blended Computer Security Course
Author:
William D. Young
Date:
01 July 2012
Developing the Next Generation of Cyber Leaders
Author:
Dr. Erich Devendorf, Dr. Sarah Muccio, Col Fred Wieners
Date:
01 July 2012
Enabling Constructivist Learning in a Graduate Information Security Course
Author:
Yu “Andy” Wu
Date:
01 July 2012
Engaging Students through Reflective Practice Assessment within a Software Security Lifecycle
Author:
Elena Sitnikova, Ray Hunt
Date:
01 July 2012
Formal Verification for Mission Assurance in Cyberspace: Education, Tools, and Results
Author:
Shiu-Kai Chin, Erich Devendorf, Sarah Muccio, Susan Older, James Royer
Date:
01 July 2012
Hands-on Laboratory Exercises for Teaching Software Security
Author:
Xiaohong Yuan, Joaquin Hernandez, India Waddell, Bill Chu, Huiming Yu
Date:
01 July 2012
High School 12-Week Cybersecurity eLearning Pilot
Author:
Myoki Spencer, Duke Ayers
Date:
01 July 2012
HIPAA Compliance: How do we get there? A Standardized Framework for Enabling Healthcare Information Security & Privacy
Author:
B. Coats, S. Acharya, A. Saluja, D. Fuller
Date:
01 July 2012
Integrating IT Security Auditing to IA Curriculum
Author:
Zhixiong Chen, John Yoon, David Wang
Date:
01 July 2012
Provisioning Secure Coding Curricular Resources: Toward Robust Software
Author:
Barbara Endicott-Popovsky, Sam Chung, Viatcheslav Popovsky
Date:
01 July 2012
Real-World Security Lab Environment
Author:
Ben Eckart
Date:
01 July 2012
Secure Coding Education: Are We Making Progress?
Author:
Kara Nance, Brian Hay, Matt Bishop
Date:
01 July 2012
Security Vulnerabilities in the open source Moodle eLearning System
Author:
Colton Floyd, Tyler Schultz, Steven Fulton
Date:
01 July 2012
Small-Scale Cyber Security Competitions
Author:
Mike O'Leary
Date:
01 July 2012
Teaching High School Students to Code Responsibly
Author:
Kara Nance, Blair Taylor
Date:
01 July 2012
Teaching Network Security Using VITAL
Author:
Efstratios Gavas, Keith O’Brien
Date:
01 July 2012
Teaching Stateless and Stateful Firewall Packet Filtering: A Hands-on Approach
Author:
Zouheir Trabelsi
Date:
01 July 2012
The Health First Case Study: Teaching HIPAA Regulation with Security Planning
Author:
S. J. Lincke
Date:
01 July 2012
When Good Ninjas Turn Bad: Preventing Your Students from Becoming the Threat
Author:
Thomas Cook, Gregory Conti, David Raymond
Date:
01 July 2012
 
 
Powered by Phoca Download

The Colloquium recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information is vital to business continuity and security. The Colloquium's goal is to work together to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula, especially at the graduate and undergraduate levels.


giving

Save money and support the Colloquium for Information Systems Security Education.


Recent Posts