skip to main content
10.1145/2078856.2078860acmconferencesArticle/Chapter ViewAbstractPublication PagesiticseConference Proceedingsconference-collections
research-article

Information assurance education in two- and four-year institutions

Authors Info & Claims
Published:27 June 2011Publication History

ABSTRACT

The 2011 ITiCSE working group on information assurance (IA) education examined undergraduate curricula at the two- and four-year levels, both within and outside the United States (US). A broad set of two-year IA degree programs were examined in order to get a sense of similarities and differences between them. A broad set of four-year IA degree programs were also examined to explore their similarities and differences. A comparison between the two-year and fourfour-year degree programs revealed that the common challenge of articulation between two- and four-year programs exists in IA as well. The challenge of articulation was explored in some depth in order to understand what remedies might be available. Finally, a number of IA programs at international institutions were examined in order to gain insight into differences between US and non-US IA programs.

References

  1. http://www.nsa.gov/ia/academic_outreach/nat_cae/index.shtml. Accessed 6/25/2011.Google ScholarGoogle Scholar
  2. http://www.nsa.gov/ia/academic_outreach/nat_cae/cae_r_program_ criteria.shtml. Accessed 6/25/2011.Google ScholarGoogle Scholar
  3. http://www.nsa.gov/ia/academic_outreach/nat_cae/cae_iae_program_ criteria.shtml. Accessed 6/25/2011.Google ScholarGoogle Scholar
  4. http://www.cnss.gov/instructions.html. Accessed 6/25/2011.Google ScholarGoogle Scholar
  5. American Association of Community Colleges (2002). Protecting Information: The Role of Community Colleges in Cybersecurity Education. Workshop Report, June 2002.Google ScholarGoogle Scholar
  6. Bordogna, J., "Remarks and Introduction of the Honorable Howard A. Schmidt AACC/NSF Workshop on the Role of Community Colleges in Cybersecurity Education." June 26, 2002. WWW Document. Accessed 6/25/2011.Google ScholarGoogle Scholar
  7. http://www.cssia.org/. Accessed 6/25/2011.Google ScholarGoogle Scholar
  8. http://www.cseconline.org/. Accessed 6/25/2011.Google ScholarGoogle Scholar
  9. http://www.cyberwatchcenter.org/. Accessed 6/25/2011.Google ScholarGoogle Scholar
  10. National IA Education Designation of Academic Excellence Program for 2 year Institutions, October 2009. http://academic.pgcc.edu/cios/CAE2Y_PGCC.pdf. Accessed 6/25/2011.Google ScholarGoogle Scholar
  11. Cooper, S., Nickell, C., Piotrowski, V., Oldfield, B., Abdallah, A., Bishop, M., Caelli, B., Dark, M., Hawthorne, E. K., Hoffman, L., Pérez, L. C., Pfleeger, C., Raines, R., Schou, C., and Brynielsson., J., An exploration of the current state of information assurance education. SIGCSE Bull. 41, 4 (January 2010), 109--125. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Cooper, S., Nickell, C., Pérez, L. C., Oldfield, B., Brynielsson, J., Gökce, A. G., Hawthorne, E. K., Klee, K. J., Lawrence, A., and Wetzel, S., Towards information assurance (IA) curricular guidelines. In Proceedings of the 2010 ITiCSE working group reports on Working group reports (ITiCSE-WGR '10), Alison Clear and Lori Russell Dag (Eds.). ACM, New York, NY, USA, 49--64. http://www.nsf.gov/od/lpa/forum/bordogna/jb020626aaccnsccyber.html. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. http://www.aacc.nche.edu/About/Positions/Pages/ps08011998.aspx, Accessed 7/31/2011.Google ScholarGoogle Scholar
  14. https://secure.wikimedia.org/wikipedia/en/wiki/Associate_degree. Accessed 6/26/2011.Google ScholarGoogle Scholar
  15. https://secure.wikimedia.org/wikipedia/en/wiki/Bachelor_of_Arts_degree. Accessed 6/26/2011.Google ScholarGoogle Scholar
  16. http://www.britannica.com/EBchecked/topic/339020/liberal-arts. Accessed 6/26/2011.Google ScholarGoogle Scholar
  17. https://secure.wikimedia.org/wikipedia/en/wiki/Bachelor_of_science_degree. Accessed 6/26/2011.Google ScholarGoogle Scholar
  18. http://nces.ed.gov/programs/digest/d10/tables/dt10_282.asp. Accessed 6/26/2011.Google ScholarGoogle Scholar
  19. https://secure.wikimedia.org/wikipedia/en/wiki/Bachelor_of_Technology. Accessed 6/26/2011.Google ScholarGoogle Scholar
  20. https://secure.wikimedia.org/wikipedia/en/wiki/Bachelor_of_Information_Technology. Accessed 6/26/2011.Google ScholarGoogle Scholar
  21. https://secure.wikimedia.org/wikipedia/en/wiki/Bachelor_of_Science_in_Information_Technology. Accessed 6/26/2011.Google ScholarGoogle Scholar
  22. https://secure.wikimedia.org/wikipedia/en/wiki/Bachelor_of_Information_Science. Accessed 6/26/2011.Google ScholarGoogle Scholar
  23. https://secure.wikimedia.org/wikipedia/en/wiki/Bachelor_of_business_administration. Accessed 6/26/2011.Google ScholarGoogle Scholar
  24. http://www.midland.edu/bachelor/bat-faq.php. Accessed 6/26/2011.Google ScholarGoogle Scholar
  25. Bragg, D. D., & Rudd, C. M. (2011). The adult learner and the applied baccalaureate: Lessons from six states. Office of Community College Research and Leadership, University of Illinois at Urbana-Champaign. http://occrl.illinois.edu/projects/nsf_applied_baccalaureate. Accessed 6/26/2011. {26} http://bis.gmu.edu/. Accessed 6/26/2011.Google ScholarGoogle Scholar
  26. http://wilmu.edu/transfer/ccbc.aspx. Accessed 6/26/2011.Google ScholarGoogle Scholar
  27. http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf.Google ScholarGoogle Scholar
  28. http://www.communitycollegereview.com/articles/58. Accessed 6/26/2011.Google ScholarGoogle Scholar
  29. Final Report from the Summit on Education in Secure Software, http://nob.cs.ucdavis.edu/bishop/notes/2010-sess/2010-sess.pdf. Accessed 6/29/2011.Google ScholarGoogle Scholar
  30. http://www.acm.org/education/curricula-recommendations Accessed 8/1/2011.Google ScholarGoogle Scholar

Index Terms

  1. Information assurance education in two- and four-year institutions

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ITiCSE-WGR '11: Proceedings of the 16th annual conference reports on Innovation and technology in computer science education - working group reports
        June 2011
        58 pages
        ISBN:9781450311229
        DOI:10.1145/2078856

        Copyright © 2011 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 27 June 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate552of1,613submissions,34%

        Upcoming Conference

        ITiCSE 2024

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader