A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Control-Alt-Hack
2013
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13
We scoped, designed, produced, and evaluated the effectiveness of a recreational tabletop card game created to raise awareness of-and alter perceptions regarding-computer security. ...
As of May 2013, we have shipped approximately 800 free copies to 150 educators. ...
Given our target audience (Section 2.3), our goal of creating enthusiasm for computer security and computer science (Perception Goals), and our desire to reach a broad audience (Exposure Goal), we needed ...
doi:10.1145/2508859.2516753
dblp:conf/ccs/DenningLSK13
fatcat:6dvvkgd3cnfzrnxzaovoxqvffi
Teaching secure coding
2012
Proceedings of the 43rd ACM technical symposium on Computer Science Education - SIGCSE '12
Require at least one computer security course for all college students: a. ...
Ron
is the vice-chair for the Colloquium for Information Systems
Security Education (CISSE), Secretary for the IFIP TC 11.8
working group on Information Security Education, and on the
executive committee ...
doi:10.1145/2157136.2157304
dblp:conf/sigcse/TaylorBBCDS12
fatcat:zic3fo7csjgdzircqw5scvtr4e
Computer security education: training, scholarship, and research
2002
Computer
Computer Security Education: Training, Scholarship, and Research S ince 9/11, we are increasingly aware of threats to security and computer system vulnerabilities. ...
We are also more aware of the need to educate the workforce quickly and effectively. Traditionally, computer security education falls into two distinct classes. ...
The goal is to go beyond existing technologies to find new ways and new mechanisms to improve the state of computer security. ...
doi:10.1109/mc.2002.1012429
fatcat:vp6kdt4b65g5vkoppxmk4afi6m
Integrating security into the curriculum
1998
Computer
Cybersquare Computer security can be used as a vehicle to achieve accreditation goals for computer science and engineering programs, while at the same time engaging students with relevant, exciting topics ...
The authors' approach, based on educational outcomes, illustrates that security topics can contribute to an engineering program by fostering all skills required to produce graduates capable of critical ...
COMPUTER SECURITY IN EDUCATION Two important criteria for selecting outcomes for information security education are as follows: • The education must result in graduates prepared for the security challenges ...
doi:10.1109/2.735847
fatcat:pf56lz3ksvet5hmkoiooiuezc4
Panel on integrating security concepts into existing computer courses
2002
Proceedings of the 33rd SIGCSE technical symposium on Computer science education - SIGCSE '02
Additional goals include development of modules related to security for CS core courses, and an interdisciplinary minor for Computer Science and Criminology majors. ...
On the other hand, security consciousness, as part of good citizenship, can be recognized as an important goal for an introductory course in computer science. ...
doi:10.1145/563340.563480
dblp:conf/sigcse/MullinsWFWCMO02
fatcat:n7hltwqyxna3rmpuyalpbzjqqa
Secure comics: an interactive comic series for improving cyber security and privacy
2017
HCI 2017
We designed, illustrated, and developed Secure Comics, an online educational interactive comic series about cyber security and privacy. ...
The three-part comic was evaluated with adults and children, and had positive effects on users understanding of security and privacy information, and improved their secure and privacy-aware behaviour. ...
ABOUT SECURE COMICS Secure Comics is an educational three-part digital interactive comic series created by us. Figure 1 shows four individual screens. ...
doi:10.14236/ewic/hci2017.65
dblp:conf/bcshci/Zhang-KennedyBC17a
fatcat:6pvbd5erp5ctpksnfa73viifbm
Information system security curricula development
2003
Proceeding of the 4th conference on Information technology education - CITC '03
This paper also describes current Information System Security Training and Education dynamics. ...
In this paper, we survey current literature concerning Information Systems Security Training and Education. ...
The stated goal is to produce a document similar to the Joint IEEE Computer Society/ACM Task Force document "Model Curricula for Computing". ...
doi:10.1145/947121.947178
dblp:conf/sigite/Crowley03
fatcat:7swyetqu2rauxkv5ysvmafpw3a
A Model Curriculum for Security Aspects in IT Education
ENGLISH
2005
DESIDOC Bulletin of Information Technology
ENGLISH
computers with virtual machines. ...
General community expects solution from trained IT-professionals with respect to planning, configuration, implementation and maintenance of secure system for data transmission. ...
The training curriculum for computer security course should include awareness, education, training and certification. ...
doi:10.14429/dbit.25.5.3667
fatcat:gqpsa5ck3jel7i2dpkwl3kwz3y
Computer Science Programs, Goals, Student Learning Outcomes and their Assessment
[article]
2016
arXiv
pre-print
In this paper we describe the process used by MET Computer Science to identify programs, goals, and student learning outcomes for all our programs and graduate certificates. ...
We illustrate how we started the process of assessing learning outcomes for our programs and present actual assessment results from the data collected for two programs that went through accreditation-- ...
Within this context we identified the program goals for all our degrees. See the program goal for the security concentration below. 1. ...
arXiv:1601.07793v1
fatcat:mawa7viwdfeqxhbpz3uva3itom
COMMUNITY COLLEGE CORNERUpdating the ACM associate-degree curricular guidance in computer science
2016
ACM inroads
A s a standing committee of the Association for Computing Machinery Education Board, the Committee for Computing Education in Community Colleges (ACM CCECC) has produced, through the decades, associate-degree ...
outcomes in information assurance and security will serve as resources for the development of this new security-infused programming course intended for community colleges. ...
doi:10.1145/2884039
fatcat:g4hbu3hpxfb5bgnaei7jfadsvq
E-GOVERNMENT AND SECURITY OF INFORMATION INTERNET SOURCES
2004
Information & Security An International Journal
The E-Gov Institute http://www.e-gov.com/ E-Gov is an accomplished organization of marketing and education professionals who have worked with technology leaders from government and industry for more than ...
Founded in 1994, the IEG focuses on issues including public policy as it relates to technology strategy and execution, economic development and education, online citizen and business services, and e-democracy ...
education in areas of information security that are crucial to the protection of critical computing and communication infrastructure. ...
doi:10.11610/isij.1508
fatcat:h7skds74xvcwvjs5dwfzm7yxfi
What is computer security?
2003
IEEE Security and Privacy
(on the job and in education) • Trends in employment • Tutorials of different aspects of security problems Our goal is to make computer security less mysterious and better understood. ...
Requirements define security goals. They answer the question, "What do you expect security to do for you?" Policy defines the meaning of security. ...
doi:10.1109/msecp.2003.1176998
fatcat:w57vok2yebffrmzhx7mpragaym
Exploration and practice of curriculum ideological and Political Construction Reform ——Take "information security" course as an example
2021
ASP Transactions on Computers
According to the goal of " Curriculum ideological and politics", taking information security course as an example, focusing on the leading ideology facing the frontier of international scientific application ...
the teaching cases in the information security course are excavated, and a set of Curriculum System Integrating Ideological and political and curriculum content is formed. ...
Therefore, starting from the overall professional courses, considering the goal of ideological and political education for each course, the integration of ideological and political elements forms a part ...
doi:10.52810/tc.2021.100020
fatcat:zipsxhslrbdh7aj5ylnjw7kfpe
Joining the security education community
2004
IEEE Security and Privacy
Workshop on Education in Computer Security Led by Cynthia Irvine of the computer and network security faculty at the Naval Postgraduate School in Monterey, California, the Workshop on Education in Computer ...
Recent meeting discussions emphasize methods for achieving educational goals, and focus on growing centers of excellence in information assurance education. ...
doi:10.1109/msp.2004.75
fatcat:afo2fibryfa7bi4cgfe2d5nk7a
Secure Cloud Architecture based on YAK and ECC
2014
International Journal of Computer Applications
cloud architecture for enhancement of security measures General Terms ...
In the present scenario security is biggest issue over internet cloud computing acronym is served everywhere in fast and growing computer generation. ...
This paper focuses on security for education system including all security goals. ...
doi:10.5120/15831-4706
fatcat:bjwudjdgdbgx5hzpwgnct5673e
« Previous
Showing results 1 — 15 out of 272,418 results