Abstract
This paper reports a preliminary framework that supports stakeholder evaluation, comparison and selection of IT Security Certification schemes. The framework may assist users in the selection of the most appropriate scheme to meet their particular needs.
Please use the following format when citing this chapter: Tate, N., Lichtenstein, S., and Warren, M, 2007, in IFIP International Federation for information Processing, Volume 232, New Approaches for Security, Privacy and Trust in Complex Environments, eds. Venter, H., Eloff, M., Labuschagne, L., Eloff, 1., von Solms, R., (Boston: Springer), pp. 473–478.
Chapter PDF
Similar content being viewed by others
Keywords
- Information Security
- Certification Scheme
- Information Security Management
- Preliminary Framework
- Security Professional
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
M. Hentea, and H.S. Dhillon, Towards Changes in Information Security Education, Journal of Information Technology Education 5, 221–223 (2006).
E. Tittel and K. Lindros, Analysis: The Vendor-neutral Security Certification Landscape, SearchSecurity.com, 26 September (2006).
APECTEL, IT Skills Report, Asia-Pacific Economic Cooperation Telecommunications & Information Working Group e-Security Task Group, (March 2004); http://www.apectelwg.org Document number:telwg29/ESTG/05.
E. Tittel, Building a Career in Information Security, Certification Magazine April (2004).
M. Bean, The Quest for the IT Security Professional, Certification Magazine November (2004).
E. Tittel, Security Certification: A Marketplace Overview, Certification Magazine February (2003).
M.E. Whitman, and H.J. Mattord, A Draft Model Curriculum for Programs of Study in Information Security and Assurance, Kennesaw State University, Georgia, 1–83 (2003).
M. Bishop and D. Frincke, Academic Degrees and Professional Certification, IEEE Security & Privacy Magazine November, 2(6), 56–58 (2004).
K.L. Bledsoe and J.A. Graham, The Use of Multiple Evaluation Approaches in Program Evaluation, American Journal of Evaluation 26(3), 302–319 (2005).
T. Claburn, Security Pros get their Due, Information Week, 16 January, (2006).
B. Endicott-Popovsky, Ethics and Teaching Information Assurance, IEEE Security & Privacy Magazine, July/August, 65–67 (2003).
T. Facklam, Certification of Persons — ISO/IEC DIS 17024, ISO Bulletin October, 31–34(2002).
D. Frincke, Who Watches the Security Educators? IEEE Security & Privacy Magazine, May/June, 56–58 (2003).
P.Y. Logan and A. Clarkson, Teaching Students to Hack: Curriculum Issues in Information Security, ACM SIGCSE Bulletin, Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education SIGCSE’ 05 37(1), 157–161 (2005).
E. Schultz, Infosec Certification: Which way do we turn from here? Computers & Security 24(8), 587–588 (2005).
ISO/IEC 17024, Conformity Assessment—General Requirements for Bodies Operating Certification of Persons, 1–10 (2003).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 International Federation for Information Processing
About this paper
Cite this paper
Tate, N., Lichtenstein, S., Warren, M.J. (2007). Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds) New Approaches for Security, Privacy and Trust in Complex Environments. SEC 2007. IFIP International Federation for Information Processing, vol 232. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-72367-9_43
Download citation
DOI: https://doi.org/10.1007/978-0-387-72367-9_43
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-72366-2
Online ISBN: 978-0-387-72367-9
eBook Packages: Computer ScienceComputer Science (R0)