Volume 1 Number 1 June 2014

    
Sustaining a Student Information Assurance Club

Jeffrey A. Livermore

https://doi.org/

Abstract A number of schools that teach Information Assurance have formed student clubs to promote Information Assurance. Very little has been written on how to sustain a club. As the Information Assurance discipline matures, our approach to creating and sustaining student clubs should mature as well. This research project was a true “fishing expedition” of contacting existing student clubs and asking... Read More


Design Thinking Approach in Teaching Information Security

Wasim A. Al-Hamdani

https://doi.org/

Abstract The phrase “Design Thinking (DT) is increasingly used to mean the human-centered “open” problem solving procedure, it can be described as a discipline that uses the designer’s receptivity and methods to balance people’s needs with what is technologically feasible and what a viable business strategy can convert into customer value and market opportunity. It has been used wildly in the... Read More


Gamification of Information Systems and Security Training: Issues and Case Studies

David Thornton, Guillermo Francia III

https://doi.org/

Abstract This paper discusses gamification, the application of gaming elements in non-game contexts, with regard to information systems and information security training. The authors have developed gamification tools for use in the classroom as well as several educational games in order to explore the viability of gamified curricula in both high school and college environments. Early results indicate positive student attitudes... Read More


Hardware Components in Cyber Security Education

Dan Chia-Tien Lo, Max North, Sarah North

https://doi.org/

Abstract Hardware components have been designated as required academic content for colleges to be recognized as a center of academic excellence in cyber operations by the National Security Agency (NSA). To meet the hardware requirement, computer science and information technology programs must cover hardware concepts and design skills, topics which are less emphasized in existing programs. This paper describes a new... Read More


Towards a Model of Factors Affecting Resistance to Using Multi-Method Authentication Systems in Higher-Education Environments

Joseph W. Marnell, Yair Levy

https://doi.org/

Abstract Over the course of history, different means of object as well as person identification and verification have evolved for user authentication. In recent years, a new concern has emerged regarding the accuracy of authentication and of protection of personal identifying information (PII), because previous information systems (IS) misuses have resulted in significant financial loss. Such losses have escalated more noticeably... Read More


Instructional Perspective on Cyber Defense: From Collegiate Competition to Capstone Course

Michael E. Whitman, Herbert J. Mattord

https://doi.org/

Abstract The creation of an experiential capstone experience for Information Security and Assurance students has been a decade-long challenge. Not long after security-based programs began offering degrees and concentrations in the discipline, the faculty struggled to create an industry-focused, balanced approach for security students. While some programs embraced the “capture-the-flag” approach to learning security through both offensive and defensive exercises, the... Read More