Vol. 9 No. 1 (2022): Journal of The Colloquium for Information Systems Security Education
Journal of The Colloquium for Information Systems Security Education

The Journal of the 25th Colloquium for Information Systems Security Education (CISSE) marks a quarter century of contribution by leaders in cybersecurity from education, government, and industry. This edition embodies contributions of international authors, as we collaborate to enhance the cyber resilience of society. Contributing papers were aligned to the conference theme: Challenges in Teaching Cybersecurity: Ethics, Legal Issues, Adversarial Behavior, Risk Management, Pedagogy, and Governance. Papers presented are clustered into interest areas of K12, Education Theory, Interactive Engagement, Cyber Warfare, Cyber Industry Analysis & Theory, Teaching Tools for Cybersecurity, and Cybersecurity Laboratory Innovation. In addition, several papers analyzing specific cybersecurity courses included subjects like Cyber Warfare, Security Operations Centers, and Applied Cryptography.

CISSE is a key forum for many of the leaders of the National Centers for Academic Excellence in Cybersecurity. The annual meeting has been continuous for 25 years whether in-person or virtual conference, and offers an opportunity for all educators to see the advances in the field of cybersecurity education. In addition, CISSE offers a particular welcome to young cybersecurity educators as a way of connecting with leaders in the field and connecting with those in topics of interest. In addition, CISSE offers a workshop for those interested in expanding the impact of their research on the field.

This year, 22 Papers were accepted from a pool of submissions that came from across the US and internationally from countries as far away as Oman. The journal's practice is to publish all papers of significant value to the Colloquium members and the field. All accepted papers passed a peer review process and were also reviewed by the Editorial Board.

Upon reflection, the qualities of papers submitted this year exemplify the continued innovations occurring in cybersecurity education. We see significant advances in the body of knowledge, particularly in teaching emerging topics in cybersecurity education like quantum computing, visualization of data, and cyber warfare. We also see significant advancement in core cybersecurity disciplines such as forensics, malware analysis, and penetration testing. This year, there is an emerging interest in our authors to also publish on digital instructional methods that provide advances in online learning, immersive learning environments, and engaging experiences.

This is the first year we are registering the journal and the individual papers through Crossref with individual DOI numbers. This will allow for availability of our content to a broad range of commercial indexing services, thus increasing the potential impact of our author’s work. The journal papers will continue to be indexed on Google Scholar, with the color hard copy available through Amazon. Copyright of the content remains in the hands of the authors, with free distribution encouraged. Usage requests in publication should be made directly to the authors.

The Editorial Board would like to thank all those who participated, in particular the journal’s Program Committee members who participated in the peer review process. This allowed us to maintain the high standards of the journal and significantly eased the Editorial Board’s review process. Especially we thank Erik Fretheim for organizing the conference again this year. And thank you to the Board of Directors and Officers of the Colloquium, who provided essential leadership and guidance under Chairman & Co-founder William “Vic” Maconachy.

The Editorial Board:

Erik Moore, Editor-in-Chief
Dan Likarish, Associate Editor
Denise Kinsey, Associate Editor
John Girard, Associate Editor
Abhishek Parakh, Associate Editor
Andrew Belón, Production Editor

Articles

Geoffrey Elliott, Mazhar Hussain Malik
pp. 5
Roadmap to overcoming the Challenges of Cyber Security and Forensics Education in the age of distance learning and the COVID-19 pandemic
https://doi.org/10.53735/cisse.v9i1.133
PDF
Yelena Arishina, Yen-Hung (Frank) Hu, Mary Ann Hoppa
pp. 10
A Study of Video Conferencing Software Risks and Mitigation Strategies
https://doi.org/10.53735/cisse.v9i1.134
PDF
Sean McBride, Corey Schou, Jill Slay
pp. 8
A Vertically Integrated Pathway for Infusing Engineering Technicians with Industrial Cybersecurity Competencies
https://doi.org/10.53735/cisse.v9i1.135
PDF
Olatunji Osunji
pp. 6
Bridging the disconnect within Cybersecurity Workforce Supply Chain
https://doi.org/10.53735/cisse.v9i1.136
PDF
Ben Scott, Raina Mason
pp. 6
Cyber as a Second Language? A Challenge to Cybersecurity Education
https://doi.org/10.53735/cisse.v9i1.137
PDF
W. V. Maconachy, D. Kinsey
pp. 4
Cybersecurity Education: A Mandate to Update
https://doi.org/10.53735/cisse.v9i1.138
PDF
Jason M. Pittman, Reilly Kobbe, Taylor Lynch, Helen G. Barker
pp. 6
Cybersecurity Laboratory Education Research: A Lush Ecosystem or Elephant Graveyard?
https://doi.org/10.53735/cisse.v9i1.139
PDF
Hongmei Chi, Jinwei Liu, Weifeng Xu, Mingming Peng, Jon deGoicoechea
pp. 8
Design Hands-on Lab Exercises for Cyber-physical Systems Security Education
https://doi.org/10.53735/cisse.v9i1.140
PDF
Erik Akeyson, Harini Ramaprasad, Meera Sridhar
pp. 8
DISSAV: A Dynamic, Interactive Stack- Smashing Attack Visualization Tool
https://doi.org/10.53735/cisse.v9i1.141
PDF
Abhishek Parakh, Mahadevan Subramaniam
pp. 8
Galore: A Platform for Experiential Learning
https://doi.org/10.53735/cisse.v9i1.142
PDF
Yuming He, Wu He, Lida Xu, Xin Tian, Xiaohong Yuan, Li Yang, Jennifer T. Ellis
pp. 5
Guided Inquiry Collaborative Learning (GICL) for Online Teaching in Cybersecurity: Challenges and Recommendations
https://doi.org/10.53735/cisse.v9i1.143
PDF
Animesh Pattanayak, Stu Steiner, Daniel Conte de Leon
pp. 8
Hands-on Educational Labs for Cyber Defense Competition Training
https://doi.org/10.53735/cisse.v9i1.144
PDF
Susan Helser
pp. 5
Healthcare in the Balance: A Consequence of Cybersecurity
https://doi.org/10.53735/cisse.v9i1.145
PDF
J. D. Chase, Prem Uppuluri
pp. 6
High School Cybersecurity? Challenge Accepted – Radford University’s RUSecure CTF Contest for High School Students
https://doi.org/10.53735/cisse.v9i1.146
PDF
James Gregory Surber, Morgan Zantua
pp. 5
Intelligent Interaction Honeypots for Threat Hunting within the Internet of Things
https://doi.org/10.53735/cisse.v9i1.147
PDF
Xinli Wang, Yan Bai
pp. 6
Introducing Penetration Test with Case Study and Course Project in Cybersecurity Education
https://doi.org/10.53735/cisse.v9i1.148
PDF
Ida Ngambeki, Sean McBride, Jill Slay
pp. 6
Knowledge Gaps in Curricular Guidance for ICS Security
https://doi.org/10.53735/cisse.v9i1.149
PDF
Matt Ruff, Nicklaus A. Giacobe
pp. 7
Leveraging Browser-Based Virtual Machines to Teach Operating System Fundamentals
https://doi.org/10.53735/cisse.v9i1.150
PDF
Claude Turner, Dwight Richards, Ruth Agada, Jie Yan, Rolston Jeremiah, Thomas Chapman
pp. 8
LUCID Network Monitoring and Visualization Application
https://doi.org/10.53735/cisse.v9i1.151
PDF
Lan Luo, Cliff Zou, Sashan Narain, Xinwen Fu
pp. 7
On Teaching Malware Analysis on Latest Windows
https://doi.org/10.53735/cisse.v9i1.152
PDF
Yen-Hung (Frank) Hu
pp. 13
Providing A Hands-on Advanced Persistent Threat Learning Experience Through Ethical Hacking Labs
https://doi.org/10.53735/cisse.v9i1.153
PDF
Holly Hanna, Jane Blanken-Webb
pp. 6
Using Complexity Theory to Identify K-12+ Pedagogical Misalignment With a Security Mindset
https://doi.org/10.53735/cisse.v9i1.154
PDF