Vol. 4 No. 1 (2016): Journal of The Colloquium for Information Systems Security Education
Journal of The Colloquium for Information Systems Security Education

Since 1996 the Colloquium for Information Systems Security Education (CISSE) has been the voice of the academic element of the field of cybersecurity education. CISSE was established to provide the single authoritative forum for conducting meaningful dialogue between the wide range of government, industry, and academic entities involved in the protection of our nation’s information and its information and communication technology assets.

The Community meets every year at a different part of the Country in order to elaborate and further discuss the most effective means of maintaining a high standard of excellence in practice in cybersecurity education. In order to have any credibility as a source of new and evolving knowledge it is important that the highest academic standards apply to the presentation of new knowledge to the membership.

Thus the papers submitted to the conference undergo double blind refereeing process and a percentage are presented in individual sessions at the Conference. Once the Conference is ended an Editorial Board selects a small set of papers that are considered to be important to the community at-large. These are then processed as Journal publications. And that is what we are presenting to you here.

These publications reflect the best possible scholarship in the field of cybersecurity and their selection is highly competitive. It is the aim of this Journal to offer only the most outstanding scholarship available to it. However, the editors and publishers also work with new authors in order to help them to bring their work to publishable standards.

Given that background it should be understood that the ideas contained in this Journal represent the best thinking in the methods and practices for integrating cybersecurity education into conventional curricula. Cybersecurity is an emerging discipline. And make no mistake, it IS a separate discipline from any of the conventional computer studies. Thus it is critical to publicize the broadest and most comprehensive range of meaningful new ideas about where the discipline will evolve going forward.

The idea almost might be too obvious of offering a forum to present and discuss revolutionary ideas separate from the present monolithic vision of the field. Nonetheless, that has not been the case in the past. That is true because there are a number of systemic and cultural challenges that have to be overcome before we can get a holistic understanding of this critical field. Therefore, the ideas presented here are not constrained by any preconceived notions of what the field ought to be like. Instead we are focusing on their merit as a means of solving difficult problems that exist in our modern society.

The articles in this Journal address ways to more effectively leverage the range of sub-disciplines in the defense of information. Spreading the net as wide as possible is a particularly obvious and justifiable way to address threat. And that is our mandate and challenge to the researchers, and cybersecurity professionals of the future.

Effective strategies for protecting the organization against relevant electronic, human and physical threat requires understanding the state of the various existing common communities of within the educational landscape. Because the cultures of each of these communities of practice are so different, the awareness, training and education approach needs vary. The contents of this Journal focus on developing and maintaining responses to every legitimate threat. It will present the wide range of these threats and provide solutions in the form of up-to-date approaches to ensuring a continuously capable response. It will focus on best practices for practical education and training for the modem cybersecurity profession.

What you will find in this issue are fourteen carefully selected articles that discuss aspects of existing threats or new issues that are arising. The articles here represent many avenues of thought. It is our considered opinion that this sort of wide-ranging dialogue constitutes the first steps in overcoming existing biases and lack of knowledge and it takes the first steps in ensuring that cybersecurity education will evolve into the kind of main tent profession that we all want it to be. We would not have been able to do this alone, and so we would like to acknowledge Tamara Shoemaker for her outstanding work in managing the review and production process, and our colleagues who served as reviewers for this issue: Glenn Dietrich, Joseph Ekstrom, Andy Green, Ye-Hung Hu, Herbert Mattord, Julian Rrushi, Dale Rowe, Ken Sigler, Zouheir Trabelsi, and Weichao Wang.

Editor
Dan Shoemaker, Ph.D.

Articles

Anne Kohnke
pp. 20
A Holistic Approach to Cybersecurity: Mapping the NICE Workforce Framework to the Critical Infrastructure Cybersecurity Framework
PDF
Swarupa N. Dholam
pp. 15
Cyber law in developing countries: An Indian Perspective
PDF
William W. Agresti
pp. 20
Cybersecurity for MBAs: Pi-shaped Course Design
PDF
Melissa Dark, Lauren Stuart, Ida Ngambeki, Matt Bishop
pp. 18
Effect of the Secure Programming Clinic on Learners' Secure Programming Practices
PDF
Waldemar Pabon
pp. 20
Encryption at Birth through Trusted Platform Modules
PDF
Gregory Laidlaw, Charles E. Wilson
pp. 14
Enhancing Cybersecurity: Applying Advanced Analytic Techniques
PDF
Bel G. Raggad, Alyssa Akermi
pp. 19
Evidential Reasoning in Real-time Monitoring of Computing Systems
PDF
Bob Duhainy
pp. 13
Implications of Traffic Analysis to Homeland Security
PDF
Monique Jethwani, Nasir Memon, Ariel Richer, Won Seo
pp. 16
It's hard to be the only girl: Obstacles facing adolescent girls in computer science contexts
PDF
Nan (Peter) Liang, David Biros
pp. 18
Malicious Insiders: Who Might Be the Ephialtes in Your Organization?
PDF
James Palmer, Brea Llorens, Sarah Kaufman, Christopher Gibbons, MdGayas Chowdhury, Cindy Chen, Xinwen Fu
pp. 23
Modeling Cyber Crimes and Investigations for Digital Forensics Education
PDF
Yesem Kurt Peker, Lydia Ray, Stephanie Da Silva, Nathaniel Gibson, Christopher Lamberson
pp. 17
Raising Cybersecurity Awareness among College Students
PDF
Seth T. Hamman, Kenneth M. Hopkinson
pp. 19
Teaching Adversarial Thinking for Cybersecurity
PDF
Mark Shaneck, Gwen Shaneck
pp. 15
Teaching Students to be Internet Stalkers: Experiences from an Open Source Intelligence Class Project
PDF