The Colloquium for Information Systems Security Education (CISSE) maintains the highest standard of excellence in cybersecurity scholarship. CISSE has been the voice of cybersecurity education for over two decades. In that respect, the CISSE Community provides a single authoritative forum; where academics can present and discuss novel ideas for the protection of the Nation's information and communication technology infrastructure.
All scholarly work undergoes a rigorous review process. During that process an Editorial Board selects a small number of submissions; which embody ideas and concepts that we view as important to the community at-large. These are presented in this Journal, which the Colloquium publishes bi-annually. The articles presented in this Journal reflect the most advanced thinking in the field of cybersecurity education. It is our aim to offer only the most outstanding ideas available. The editors and publishers work with the authors to help them achieve publishable standards.
The thoughts, recommendations and concepts that are embodied in this Journal represent the most effective methods for integrating cybersecurity educational practice into conventional curricular settings. Cybersecurity is an emerging discipline. Thus, it is critical to publicize the broadest and most comprehensive collection of emerging new ideas about the discipline going forward.
We encourage fresh and creative thinking. So, the ideas presented here are not constrained by preconceived notions about what constitutes appropriate policy for the field. Instead we focus the selection process on popularizing the most innovative and effective new approaches to the many and varied problems that exist in the current cyber eco-system.
The articles in this Journal address ways to more effectively leverage knowledge and disciplined practice in the defense of information assets. Effective strategies for protecting the organization against all meaningful electronic, human and physical threat require a deep understanding the current state of the practice. This applied both in cybersecurity professional work; as well as within the educational landscape. Because the cultures of the various relevant communities of practice are so different, effective awareness, training and education practices necessarily vary. The contents of this Journal focus on the full range of new, and innovative approaches to the wide range of threats and risks in the everyday practice of information and communication technology operation.
The articles provide solutions in the form of up-to-date methods for monitoring and control of cyberattacks as well as the means for ensuring a continuously capable response. They also present a selected array of best practices for the enhancement of practical education and training activities within modem cybersecurity awareness, training and education functions.
It is our considered opinion that encouragement of wide-ranging dialogue and commentary constitutes the first step in effective cybersecurity scholarship. Consequently, we are dedicated to the assurance of vigorous discussion about practical ways that cybersecurity education can be made an integral part of the profession at-large. That discussion begins with the ideas presented here, in this Journal. We urge the cybersecurity education community to read these thoughts, consider them, and provide your feedback.
Finally, we would not have been able to do this alone. We would like to particularly acknowledge Tamara Shoemaker for her outstanding work in managing the review and production process and our colleagues who served as reviewers for this issue.
Dan Shoemaker, Ph.D., Professor