[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2078856.2078860acmconferencesArticle/Chapter ViewAbstractPublication PagesiticseConference Proceedingsconference-collections
research-article

Information assurance education in two- and four-year institutions

Published: 27 June 2011 Publication History

Abstract

The 2011 ITiCSE working group on information assurance (IA) education examined undergraduate curricula at the two- and four-year levels, both within and outside the United States (US). A broad set of two-year IA degree programs were examined in order to get a sense of similarities and differences between them. A broad set of four-year IA degree programs were also examined to explore their similarities and differences. A comparison between the two-year and fourfour-year degree programs revealed that the common challenge of articulation between two- and four-year programs exists in IA as well. The challenge of articulation was explored in some depth in order to understand what remedies might be available. Finally, a number of IA programs at international institutions were examined in order to gain insight into differences between US and non-US IA programs.

References

[1]
http://www.nsa.gov/ia/academic_outreach/nat_cae/index.shtml. Accessed 6/25/2011.
[2]
http://www.nsa.gov/ia/academic_outreach/nat_cae/cae_r_program_ criteria.shtml. Accessed 6/25/2011.
[3]
http://www.nsa.gov/ia/academic_outreach/nat_cae/cae_iae_program_ criteria.shtml. Accessed 6/25/2011.
[4]
http://www.cnss.gov/instructions.html. Accessed 6/25/2011.
[5]
American Association of Community Colleges (2002). Protecting Information: The Role of Community Colleges in Cybersecurity Education. Workshop Report, June 2002.
[6]
Bordogna, J., "Remarks and Introduction of the Honorable Howard A. Schmidt AACC/NSF Workshop on the Role of Community Colleges in Cybersecurity Education." June 26, 2002. WWW Document. Accessed 6/25/2011.
[7]
http://www.cssia.org/. Accessed 6/25/2011.
[8]
http://www.cseconline.org/. Accessed 6/25/2011.
[9]
http://www.cyberwatchcenter.org/. Accessed 6/25/2011.
[10]
National IA Education Designation of Academic Excellence Program for 2 year Institutions, October 2009. http://academic.pgcc.edu/cios/CAE2Y_PGCC.pdf. Accessed 6/25/2011.
[11]
Cooper, S., Nickell, C., Piotrowski, V., Oldfield, B., Abdallah, A., Bishop, M., Caelli, B., Dark, M., Hawthorne, E. K., Hoffman, L., Pérez, L. C., Pfleeger, C., Raines, R., Schou, C., and Brynielsson., J., An exploration of the current state of information assurance education. SIGCSE Bull. 41, 4 (January 2010), 109--125.
[12]
Cooper, S., Nickell, C., Pérez, L. C., Oldfield, B., Brynielsson, J., Gökce, A. G., Hawthorne, E. K., Klee, K. J., Lawrence, A., and Wetzel, S., Towards information assurance (IA) curricular guidelines. In Proceedings of the 2010 ITiCSE working group reports on Working group reports (ITiCSE-WGR '10), Alison Clear and Lori Russell Dag (Eds.). ACM, New York, NY, USA, 49--64. http://www.nsf.gov/od/lpa/forum/bordogna/jb020626aaccnsccyber.html.
[13]
http://www.aacc.nche.edu/About/Positions/Pages/ps08011998.aspx, Accessed 7/31/2011.
[14]
https://secure.wikimedia.org/wikipedia/en/wiki/Associate_degree. Accessed 6/26/2011.
[15]
https://secure.wikimedia.org/wikipedia/en/wiki/Bachelor_of_Arts_degree. Accessed 6/26/2011.
[16]
http://www.britannica.com/EBchecked/topic/339020/liberal-arts. Accessed 6/26/2011.
[17]
https://secure.wikimedia.org/wikipedia/en/wiki/Bachelor_of_science_degree. Accessed 6/26/2011.
[18]
http://nces.ed.gov/programs/digest/d10/tables/dt10_282.asp. Accessed 6/26/2011.
[19]
https://secure.wikimedia.org/wikipedia/en/wiki/Bachelor_of_Technology. Accessed 6/26/2011.
[20]
https://secure.wikimedia.org/wikipedia/en/wiki/Bachelor_of_Information_Technology. Accessed 6/26/2011.
[21]
https://secure.wikimedia.org/wikipedia/en/wiki/Bachelor_of_Science_in_Information_Technology. Accessed 6/26/2011.
[22]
https://secure.wikimedia.org/wikipedia/en/wiki/Bachelor_of_Information_Science. Accessed 6/26/2011.
[23]
https://secure.wikimedia.org/wikipedia/en/wiki/Bachelor_of_business_administration. Accessed 6/26/2011.
[24]
http://www.midland.edu/bachelor/bat-faq.php. Accessed 6/26/2011.
[25]
Bragg, D. D., & Rudd, C. M. (2011). The adult learner and the applied baccalaureate: Lessons from six states. Office of Community College Research and Leadership, University of Illinois at Urbana-Champaign. http://occrl.illinois.edu/projects/nsf_applied_baccalaureate. Accessed 6/26/2011. {26} http://bis.gmu.edu/. Accessed 6/26/2011.
[26]
http://wilmu.edu/transfer/ccbc.aspx. Accessed 6/26/2011.
[27]
http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf.
[28]
http://www.communitycollegereview.com/articles/58. Accessed 6/26/2011.
[29]
Final Report from the Summit on Education in Secure Software, http://nob.cs.ucdavis.edu/bishop/notes/2010-sess/2010-sess.pdf. Accessed 6/29/2011.
[30]
http://www.acm.org/education/curricula-recommendations Accessed 8/1/2011.

Cited By

View all
  • (2024)Cybersecurity Education within a Computing Science Program - A Literature ReviewProceedings of the 26th Western Canadian Conference on Computing Education10.1145/3660650.3660666(1-5)Online publication date: 2-May-2024
  • (2023)SSDTutor: A feedback-driven intelligent tutoring system for secure software developmentScience of Computer Programming10.1016/j.scico.2023.102933227(102933)Online publication date: Apr-2023
  • (2020)CryptoTutorProceedings of the 21st Annual Conference on Information Technology Education10.1145/3368308.3415419(403-408)Online publication date: 7-Oct-2020
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ITiCSE-WGR '11: Proceedings of the 16th annual conference reports on Innovation and technology in computer science education - working group reports
June 2011
58 pages
ISBN:9781450311229
DOI:10.1145/2078856
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 June 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. IA
  2. degrees
  3. education
  4. information assurance

Qualifiers

  • Research-article

Conference

ITiCSE '11
Sponsor:

Acceptance Rates

Overall Acceptance Rate 552 of 1,613 submissions, 34%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)2
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Cybersecurity Education within a Computing Science Program - A Literature ReviewProceedings of the 26th Western Canadian Conference on Computing Education10.1145/3660650.3660666(1-5)Online publication date: 2-May-2024
  • (2023)SSDTutor: A feedback-driven intelligent tutoring system for secure software developmentScience of Computer Programming10.1016/j.scico.2023.102933227(102933)Online publication date: Apr-2023
  • (2020)CryptoTutorProceedings of the 21st Annual Conference on Information Technology Education10.1145/3368308.3415419(403-408)Online publication date: 7-Oct-2020
  • (2020)A Case Study of a Cybersecurity ProgrammeProceedings of the 51st ACM Technical Symposium on Computer Science Education10.1145/3328778.3366918(16-22)Online publication date: 26-Feb-2020
  • (2019)Vulnerability in Information Technology and Computing- A Study in Technological Information AssuranceInternational Journal of Management, Technology, and Social Sciences10.47992/IJMTS.2581.6012.0074(87-94)Online publication date: 19-Nov-2019
  • (2019)Securing the HumanProceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science Education10.1145/3304221.3325537(251-252)Online publication date: 2-Jul-2019
  • (2018)Global perspectives on cybersecurity educationProceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education10.1145/3197091.3205840(340-341)Online publication date: 2-Jul-2018
  • (2017)Pathways in Cybersecurity: Translating Theory into PracticeInformation Security Education for a Global Digital Society10.1007/978-3-319-58553-6_4(39-48)Online publication date: 4-May-2017
  • (2016)Security Injections@TowsonACM Transactions on Computing Education10.1145/289744116:4(1-20)Online publication date: 9-Jun-2016
  • (2015)A quantitative examination of the intellectual profile and evolution of information security from 1965 to 2015Scientometrics10.1007/s11192-015-1708-1105:2(883-904)Online publication date: 1-Nov-2015
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media