


default search action
3. InfoSecCD 2006: Kennesaw, Georgia, USA
- Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006. ACM 2006, ISBN 1-59593-437-5

Pedagogy
- Frank H. Katz:

Campus-wide spyware and virus removal as a method of teaching information security. 1-4 - Erik Hjelmås, Stephen D. Wolthusen:

Full-spectrum information security education: integrating B.Sc., M.Sc., and Ph.D. programs. 5-12 - Robin M. Snyder:

Ethical hacking and password cracking: a pattern for individualized security exercises. 13-18 - James Walden

, Charles E. Frank:
Secure software engineering teaching modules. 19-23 - Blair Taylor, Shiva Azadegan:

Threading secure coding principles and risk analysis into the undergraduate computer science and information systems curriculum. 24-29 - Janine DeWitt, Cynthia Della Torre Cicalese:

Contextual integration: a framework for presenting social, legal, and ethical content across the computer security and information assurance curriculum. 30-40 - Gerald Clevenger:

Incorporating certification and accreditation coursework into network security curriculum. 41-43 - Martin Mink, Felix C. Freiling:

Is attack better than defense?: teaching information security the right way. 44-48 - Michael E. Whitman, Herbert J. Mattord:

Developing the BS-ISA: lessons learned and future directions - sponsored by NSF grant # DUE-0516192. 49-51 - Wasim A. Al-Hamdani:

Knowledge flow with information assurance track. 52-57 - Mark A. Holliday, William C. Kreahling:

Information security and computer systems: an integrated approach. 58-63 - Mário Guimarães:

New challenges in teaching database security. 64-67 - John B. Bowles, Caroline M. Eastman, Csilla Farkas:

Engaging undergraduates in computer security research. 184-190 - Douglas P. Twitchell

:
Social engineering in information assurance curricula. 191-193
Practice
- Robert C. Newman:

Cybercrime, identity theft, and fraud: practicing safe internet - network security threats and vulnerabilities. 68-78 - Robin M. Snyder:

Some security alternatives for encrypting information on storage devices. 79-84 - Guillermo A. Francia III

, Tyler S. Gomez:
Steganography obliterator: an attack on the least significant bits. 85-91 - Robin M. Snyder:

Combining an e-commerce simulation with a cyber-survivor exercise. 92-95 - Guillermo A. Francia III

, Monica Trifas, Dorothy Brown, Rahjima R. Francia, Chrissy Scott:
Visualization and management of digital forensics data. 96-101 - Wasim A. Al-Hamdani:

Assessment of need and method of delivery for information security awareness program. 102-108 - Chlotia Posey Garrison:

Encouraging good passwords. 109-112 - Tammy Alexander:

Domain name registrars: are they part of the domain name fraud problem? 113-117 - Thomas Baxley, Jinsheng Xu

, Huiming Yu, Jinghua Zhang, Xiaohong Yuan, Joseph Brickhouse:
LAN attacker: a visual education tool. 118-123 - John C. Beachboard, Alma Cole, Mike Mellor, Steven Hernandez, Kregg Aytes, Nelson Massad:

A tentative proposal: improving information assurance risk analysis models for small- and medium-sized enterprises through adoption of an open development model. 194-196
Student papers
- Robert E. Crossler

, France Bélanger:
The effect of computer self-efficacy on security training effectiveness. 124-129 - Laurence Holt:

A year affair with security: the development of a security program and manager. 130-135 - Anne M. Payton:

A review of spyware campaigns and strategies to combat them. 136-141 - Peter Phuong Vo, Chau Maggie Vo:

FMS and FMSE encryption/decryption algorithms using flipping, mapping, and shifting operations. 142-146 - Jason Hill:

The storm ahead: how CALEA will turn VoIP on its head. 147-150 - Cameron Jordan:

Law and privacy: the debate over Radio Frequency Identification (RFID) legislation. 151 - Kim Luong:

The other side of identity theft: not just a financial concern. 152-155 - Michael D. Carroll:

Information security: examining and managing the insider threat. 156-158 - Charles Ohaya:

Managing phishing threats in an organization. 159-161 - Anne M. Payton:

Data security breach: seeking a prescription for adequate remedy. 162-167 - Ray Yeager:

Criminal computer forensics management. 168-174 - James William Rust:

Corporate management of computer forensics evidence. 175-178 - Errol A. Blake:

The management of access controls/biometrics in organizations. 179-183 - Brian A. Pashel:

Teaching students to hack: ethical implications in teaching students to hack at the university level. 197-200 - Syed A. Saleem:

Ethical hacking as a risk management technique. 201-203

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














