Skip to main content

Advertisement

Log in

Improving Information Assurance Education Key to Improving Secure(ity) Management

  • Thresholds
  • Published:
Journal of Network and Systems Management Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. D. Davis, To copy or Not to Copy—That is the Question, 2003. (http://www.aea2.k12.ia.us/Tutorials/Copyright/Copyright_.html)

  2. E. Felten, Security tradeoffs: Java vs. ActiveX, 1997. (http://www.cs.princeton.edu/sip/java-vs-activex.html)

  3. M. E. Donaldson, Inside the buffer overflow attack: Mechanism, method & prevention, 2002. (http://www.sans.org/rr/whitepapers/securecode/386.php)

  4. F. Langa, Rethinking ‘Software Bloat’. Information Week, Dec. 17, 2001. (http://www.informationweek.com/story/IWK20011212S0003)

  5. L. L. Gremillion, Determinants of program repair maintenance requirements, Communications of the ACM, Vol. 27, No. 8, pp. 826–832, 1984; R. Lind and K. Vairavan, An experimental investigation of software metrics and their relationship to software development effort, IEEE Transactions on Software Engineering, Vol. 15, No. 5, pp. 649–653, 1989; R. D. Banker, S. M. Datar, C. F. Kemerer, and D. Zweig, Software errors and software maintenance management, Information Technology and Management, Vol. 3, pp. 25–41, 2002 (both cited on page 27). (http://www.pitt.edu/~ckemerer/CK%20research%20papers/SoftwareErrors&Maintenance_Banker2002.pdf)

  6. E. Spafford, Professor Gene ‘Spaf’ Spafford: Exclusive interview, 2003. (http://www.pkiforum.com/books/interview_spafford_1b.html)

  7. M. E. Kabay, Cyber-Safety for Everyone: From Kids to Elders, 2002. Available for unlimited non-commercial duplication from (http://www2.norwich.edu/mkabay/cyberwatch/cybersafety.pdf)

  8. M. E. Kabay, Stop preaching to the choir, in Network World Fusion (originally published), 2000. Available in an updated version from (http://www2.norwich.edu/mkabay/opinion/choir.htm) and (http://www2.norwich.edu/mkabay/opinion/choir.pdf)

  9. P. Lindstrom, Downstream liability makes the case for security spending, 2004. (http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci952103,00.html)

  10. M. E. Kabay, Programming for security, 2004. (http://www2.norwich.edu/mkabay/overviews/programming.htm) and (http://www2.norwich.edu/mkabay/overviews/programming.pdf)

  11. M. E. Kabay, Time for industry to support academic INFOSEC, 2001. (http://www2.norwich.edu/mkabay/opinion/endowed_chairs.htm) and (http://www2.norwich.edu/mkabay/opinion/endowed_chairs.pdf)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. E. Kabay.

Additional information

M. E. Kabay (PhD, CISSP) began programming in assembly language in 1965. He has lectured on security at NATO headquarters, NATO counterintelligence school and the US Army War College. He is the Director of the master’s and bachelor’s programs in information assurance at Norwich University. He writes the Network World Fusion Security Newsletter

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kabay, M.E. Improving Information Assurance Education Key to Improving Secure(ity) Management. J Netw Syst Manage 13, 247–251 (2005). https://doi.org/10.1007/s10922-005-6262-3

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10922-005-6262-3

Keywords