Writing requirements in computer security
Abstract
References
Index Terms
- Writing requirements in computer security
Recommendations
Two models of a cryptography and computer security class in a liberal arts context
SIGCSE '13: Proceeding of the 44th ACM technical symposium on Computer science educationThe critical need for computer security concepts to be taught in the undergraduate computer science curriculum is evident from current news stories, curricular guidelines, and government initiatives. Beginning to teach a standalone computer security ...
A technical writing class for computer science majors: measuring student perceptions of learning
SIGCSE '03: Proceedings of the 34th SIGCSE technical symposium on Computer science educationWriting skills need to be integrated into the Computer Science (CS) curriculum, and there is little empirical evidence on how best to do so. This paper first describes a technical writing class for CS undergraduates. Then it presents the results of a ...
Science fiction prototyping and security education: cultivating contextual and societal thinking in computer security education and beyond
SIGCSE '11: Proceedings of the 42nd ACM technical symposium on Computer science educationComputer security courses typically cover a breadth of technical topics, including threat modeling, applied cryptography, software security, and Web security. The technical artifacts of computer systems - and their associated computer security risks and ...
Comments
Information & Contributors
Information
Published In

Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 393Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in