Vol. 8 No. 1 (2020): Journal of The Colloquium for Information Systems Security Education
Journal of The Colloquium for Information Systems Security Education

Privacy, Ethics and APTS (Asymmetric and Persistent Threats)

In this volume, contributing authors address key and emerging issues in cybersecurity, cybersecurity education, and related fields. The commitment of The Colloquium to forwarding the field of cybersecurity education has been consistent since 1996, working to bring together government, industry, and academic sectors. The goal of these efforts is to ensure the resilience of our society as we increasingly rely on digital technologies that enable, automate, and enhance so many essential services that we have come to rely on for our way of life. The significance of this work is perhaps becoming clearer to citizens as popular media increases awareness of cyber threats in a time when many have moved to digitally enabled remote work and learning environments to reduce the impact of the COVID-19 Pandemic. This situation has also caused The Colloquium to adapt to a virtual format this year, ensuring an uninterrupted contribution to the cyber resilience of society.

The CISSE community, at its core, is composed of many leaders of the National Centers for Academic Excellence in Cybersecurity. The community meets annually to discuss developments in cybersecurity education and share ways to advance the body of knowledge in this field. The goal of the community is to further research and collaboration that forwards the discipline and yields graduates that are well prepared to assure resilience, stability, and the advancement of our cyber dependant society.

Papers for this Journal were peer reviewed with 24 submissions from across the United States. Each paper was reviewed by at least two Program Committee members and the Editorial Board. The Journal accepted 14 papers, with an acceptance rate of 58%.

The papers presented herein, contribute to knowledge at the forefront of a range of research areas in cybersecurity and cybersecurity education. These include authentication and passwords, interdisciplinary and systems thinking, advances in cybersecurity education as influenced by innovations in physics and mathematics, assessment and process improvement of cybersecurity education programs, new methods for engaging students in risk management and social engineering, and new paradigms for understanding cybersecurity.

This Journal was created with support and guidance from many individuals. We would like to thank the Program Committee members for taking significant time to complete the peer review process. Thank you Erik Fretheim for organizing the conference this year. And thanks to the Board of Directors and Officers of the Colloquium, who provided essential leadership and guidance under Chairman & Co-founder William “Vic” Maconachy.

CISSE is granted a non-exclusive right to publish and disseminate the work. All articles are © their authors and licensed under CC BY 4.0. Usage and publication requests should be made directly to the authors.

The Editorial Board:

Erik Moore, Editor-in-Chief
Dan Likarish, Associate Editor
Denise Kinsey, Associate Editor
Andrew Belón, Design & Production Editor

Articles

Michael Whitman, Robert Chaput
pp. 1-8 Art. 119
Experiential Activities for Risk Management Education

DOI: 10.53735/cisse.v8i1.119

PDF
Nelbert St. Clair, John Girard
pp. 1-10 Art. 120
Judging Competencies in Recent Cybersecurity Graduates

DOI: 10.53735/cisse.v8i1.120

PDF
Dominicia Williams, Yen-Hung Hu, Mary Ann Hoppa
pp. 1-11 Art. 121
Follow the Money Through Apple Pay

DOI: 10.53735/cisse.v8i1.121

PDF
Esther Enright, Connie Justice, Sin Ming Loo, Eleanor Taylor, Char Sample, D. Cragin Shelton
pp. 1-8 Art. 122
Building Capacity for Systems Thinking in Higher Education Cybersecurity Programs

DOI: 10.53735/cisse.v8i1.122

PDF
Jason Pittman, Nikki Robinson
pp. 1-6 Art. 123
Do Users Correctly Identify Password Strength?

DOI: 10.53735/cisse.v8i1.123

PDF
Binh An Pham, Vinitha Hannah Subburaj
pp. 1-5 Art. 124
An Experimental setup for Detecting SQLi Attacks using Machine Learning Algorithms

DOI: 10.53735/cisse.v8i1.124

PDF
Tobi West
pp. 1-8 Art. 125
Weak Password Policies: A Lack of Corporate Social Responsibility

DOI: 10.53735/cisse.v8i1.125

PDF
Thai Nguyen, Sajal Bhatia
pp. 1-8 Art. 126
Higher Education Social Engineering Attack Scenario, Awareness & Training Model

DOI: 10.53735/cisse.v8i1.126

PDF
Yulia Cherdantseva, Phil Smart
pp. 1-7 Art. 127
Applied Cyber Security for Applied Software Engineering Undergraduate Program

DOI: 10.53735/cisse.v8i1.127

PDF
Abhishek Parakh, Vidya Bommanapally, Parvathi Chundi, Mahadevan Subramaniam
pp. 1-8 Art. 128
Quantum Cryptography Exercise Schedules with Concept Dependencies

DOI: 10.53735/cisse.v8i1.128

PDF
Fikirte Demmese, Xiaohong Yuan, Darina Dicheva
pp. 1-6 Art. 129
Evaluating the Effectiveness of Gamification on Students’ Performance in a Cybersecurity Course

DOI: 10.53735/cisse.v8i1.129

PDF
Tristen Amador, Roberta Mancuso, Erik Moore, Steven Fulton, Daniel Likarish
pp. 1-6 Art. 130
Enhancing Cyber Defense Preparation Through Interdisciplinary Collaboration, Training, and Incident Response

DOI: 10.53735/cisse.v8i1.130

PDF
Sandra Gorka, Alicia McNett, Jacob Miller, Bradley Webb
pp. 1-4 Art. 131
Tempting High School Students into Cybersecurity with a Slice of Raspberry Pi

DOI: 10.53735/cisse.v8i1.131

PDF
Eric Sakk, Shuangbao Paul Wang
pp. 1-5 Art. 132
Integration of Blockchain Concepts into Computer Science Curriculum

DOI: 10.53735/cisse.v8i1.132

PDF