Preschool information assurance curriculum development
Abstract
References
Index Terms
- Preschool information assurance curriculum development
Recommendations
Information security curriculum creation: a case study
InfoSecCD '04: Proceedings of the 1st annual conference on Information security curriculum developmentInformation Security is a critical part of the technology infrastructure. A survey of undergraduate degree programs in Computer Science, Information Technology, Management Information Science, and others show a lack of emphasis on security issues in ...
Designing and teaching information security curriculum
InfoSecCD '04: Proceedings of the 1st annual conference on Information security curriculum developmentWith increasing interest by students and faculty in Information Security Curriculum, and increasing demand for information security professionals from industry, many institutions are beginning the task of creating a meaningful information security ...
Planning, building and operating the information security and assurance laboratory
InfoSecCD '04: Proceedings of the 1st annual conference on Information security curriculum developmentWith increasing interest by students and faculty in Information Security (InfoSec) Curriculum, and increasing demand for information security professionals from industry, many institutions are beginning the task of creating an information security ...
Comments
Information & Contributors
Information
Published In
Sponsors
- KSU - CISE: KSU Center for InfoSec Education
- ISSA: The Metro Atlanta Information Systems Security Association
In-Cooperation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
- KSU - CISE
- ISSA
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 164Total Downloads
- Downloads (Last 12 months)3
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in