skip to main content
research-article

The colloquium for information system security education (CISSE)--the adventure continues

Published:01 June 2014Publication History
First page image

References

  1. Association for Computing Machinery (ACM). "ACM History." http://www.acm.org/about/history. Accessed 2014 January 1.Google ScholarGoogle Scholar
  2. Burley, D. M. Bishop, P. Pusey. 2013. Implementation of Recommendations from the Summit on Education in Secure Software. Report prepared for National Science Foundation.Google ScholarGoogle Scholar
  3. CAE institutions. http://www.nsa.gov/ia/academic_outreach/nat_cae/index.shtml. Accessed 2014 April 27.Google ScholarGoogle Scholar
  4. CAE/IAE Program. http://www.nsa.gov/ia/academic_outreach/index.shtml. Accessed 2014 April 27.Google ScholarGoogle Scholar
  5. CISSE. http://cisse.info/. Accessed 2014 April 27.Google ScholarGoogle Scholar
  6. Committee on National Security Systems. https://www.cnss.gov/CNSS/index.cfm. Accessed 2014 January 1.Google ScholarGoogle Scholar
  7. Dubner, S. "Why Has There Been So Much Hacking Lately? Or Is It Just Reported More? A Freakonomics Quorum", Freakonomics July 19, 2011. http://freakonomics.com/2011/07/19/why-has-there-been-so-much-hacking-lately-or-is-it-just-reported-more-a-freakonomics-quorum/. Accessed 2014 January 1.Google ScholarGoogle Scholar
  8. National IA Education and Training Program, National Centers of Academic Excellence. (2009.) http://www.nsa.gov/ia/academic_outreach/nat_cae/index.shtml. Accessed 2014 January 1.Google ScholarGoogle Scholar
  9. PDD 63. http://www.fas.org/irp/offdocs/pdd/pdd-63.htm. Accessed 2014 April 27.Google ScholarGoogle Scholar
  10. Schou, C. and D. Shoemaker, "Information Assurance for the Enterprise" McGraw-Hill. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Zdravkovich, V. "NICE Meeting Designations of Excellence CAE2y and CDFAE" Presented at National Initiative for Cybersecurity Education Workshop. Gaithersburg, MD. 2013.Google ScholarGoogle Scholar

Index Terms

  1. The colloquium for information system security education (CISSE)--the adventure continues

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Inroads
        ACM Inroads  Volume 5, Issue 2
        June 2014
        50 pages
        ISSN:2153-2184
        EISSN:2153-2192
        DOI:10.1145/2614512
        Issue’s Table of Contents

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 June 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Popular
        • Refereed
      • Article Metrics

        • Downloads (Last 12 months)1
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format