592
Views
4
CrossRef citations to date
0
Altmetric
Articles

Teaching Cybersecurity to Criminal Justice Majors

References

  • Belshaw, S. H. (2012). Private investigation programs as an emerging trend in criminal justice education? A case study of Texas. Journal of Criminal Justice Education, 23(4), 462–480.10.1080/10511253.2012.683876
  • Boleng, J., Schweitzer, D., & Gibson, D. S. (2007). Developing cyber warriors. Third International Conference on i-Warfare and Security, US Air Force Academy, Colorado Springs, CO.
  • Brown, C., Crabbe, F., Doerr, R., Greenlaw, R., Hoffmeister, C., Monroe, J., … Standard, S. (2012). Anatomy, dissection, and mechanics of an introductory cyber-security course’s curriculum at the United States Naval Academy. Paper presented at the Proceedings of the 17th ACM annual conference on innovation and technology in computer science education.
  • Cheung, R. S., Cohen, J. P., Lo, H. Z., & Elia, F. (2011). Challenge based learning in cybersecurity education. Paper presented at the Proceedings of the 2011 International Conference on Security & Management.
  • Chin, S. K., & Older, S. (2006). A rigorous approach to teaching access control. Paper presented at Proceedings of the First Annual Conference on Education in Information Security, New York, NY.
  • Cone, B. D., Irvine, C. E., Thompson, M. F., & Nguyen, T. D. (2007). A video game for cyber security training and awareness. Computers & Security, 26, 63–72.10.1016/j.cose.2006.10.005
  • Conklin, A. (2006). Cyber defense competitions and information security education: An active learning solution for a capstone course. Paper presented at the Proceedings of the 39th Hawaii International Conference on System Science, Hawaii.
  • Cybersecurity Education & Career Development. (n.d.). Official website of the Department of Homeland Security. Retrieved March 2, 2017, from https://www.dhs.gov/topic/cybersecurity-education-career-development
  • Dhillon, H., & Hentea, M. (2005). Getting a cybersecurity program started on low budget. Paper presented at Proceedings of the 43rd ACM Southeast Conference, Kennesaw, GA.
  • Explore Terms: A Glossary of Common Cybersecurity Terminology. (n.d.). National Initiative for Cybersecurity Careers and Studies. Retrieved March 23, 2017, from https://niccs.us-cert.gov/glossary
  • Gabbidon, S. L. (2002). Teaching security administration in criminal justice programs: Getting them in the classroom is the key. Journal of Security Administration, 25(1), 17–21.
  • Hentea, M., Dhillon, H. S., & Dillon, M. (2006). Towards changes in information security education. Journal of Information Technology Education: Research, 5, 221–233.
  • Hoffman, L. J., Rosenberg, T., Dodge, R., & Ragsdale, D. (2005). Exploring a national cybersecurity exercise for universities. IEEE Security and Privacy Magazine, 3(5), 27–33.10.1109/MSP.2005.120
  • Jensen, B. K., Cline, M., & Guynes, C. S. (2006). Teaching the undergraduate CS information security course. ACM SIGCSE Bulletin, 38(2), 61–63.10.1145/1138403
  • Katz, F. H. (2010). Curriculum and pedagogical effects of the creation of a minor in cyber security (pp. 49–51). 2010 Information Security Curriculum Development Conference, ACM.10.1145/1940941
  • Kessler, G. C., & Ramsay, J. (2013). Paradigms for cybersecurity education in a homeland security program. Journal of Homeland Security Education, 2, 35–44.
  • Kooi, B., & Hinduja, S. (2008). Teaching security courses experientially. Journal of Criminal Justice Education, 19(2), 290–307.10.1080/10511250802137804
  • LeClair, J., Abraham, S., & Shih, L. (2013, October). An interdisciplinary approach to educating an effective cyber security workforce. In Proceedings of the 2013 on InfoSecCD'13: Information Security Curriculum Development Conference (p. 71). New York, NY: ACM.
  • Li, J., Zhao, Y., & Shi, L. (2009). Interactive teaching methods in information security course. Paper presented at Scalable Computing and Communications; Eighth International Conference on Embedded Computing, 3009. SCALCOM-EMBEDDEDCOM’09. International Conference.
  • Logan, P. Y. (2002). Crafting an undergraduate information security emphasis within information technology. Journal of Information Systems Education, 13(3), 177–182.
  • McGettrick, A. (2013). Toward effective cybersecurity education. IEEE Security & Privacy, 11(6), 66–68.10.1109/MSP.2013.155
  • McGuire, T. J., & Murff, K. N. (2006). Issues in the development of a digital forensics curriculum. Journal of Computing Sciences in Colleges, 22(2), 274–280.
  • Micco, M., & Rossman, H. (2002, February). Building a cyberwar lab: Lessons learned. ACM SIGCSE Bulletin, 34(1), 23–27.10.1145/563517
  • Mink, M., & Freiling, F. C. (2006). Is attack better than defense?: Teaching information security the right way. Paper presented at Proceedings of the 3rd annual conference on Information Security curriculum development.
  • Mirkovic, J., & Benzel, T. (2012). teaching cybersecurity with DeterLab. IEEE Security & Privacy Magazine, 10(1), 73–76.10.1109/MSP.2012.23
  • Namin, A. S., Aguirre-Muñoz, Z., & Jones, K. S. (2016). Teaching cybersecurity through competition. Paper presented at Annual International Conference On Computer Science Education: Innovation & Technology.
  • O’Leary, M. (2006). A laboratory based capstone course in computer security for undergraduates. ACM SIGCSE Bulletin, 38(1), 2–6.10.1145/1124706
  • Online Cybersecurity Bachelor’s Degree. (n.d.). U.S. News and World Report. Retrieved March 2, 2017, from https://www.usnews.com/education/online-education/cybersecuritybachelors%20degree#coursework
  • Patriciu, V. V., & Furtuna, A. C. (2009). Guide for designing cybersecurity exercises (pp. 172–177). Proceedings of the 8th WSEAS International Conference on E-Activities and information security and privacy, World Scientific and Engineering Academy and Society (WSEAS).
  • Reuters. (2017, May 24). Target settles 2013 hacked customer data breach for $18.5 million. NBCNews, NBC. Retrieved January 2, 2018, from https://www.nbcnews.com/business/business-news/target-settles-2013-hacked-customer-data-breach-18-5-million-n764031
  • Rowe, D. C., Lunt, B. M., & Ekstrom, J. J. (2011). The role of cyber-security in informationtechnology education. Paper presented at Proceedings of the 2011 conference on Information technology education.
  • Sadiku, M. N., Tembely, M., & Musa, S. M. (2017). Identity theft. International Journal of Engineering Research, 6(9), 422–424.10.5958/2319-6890.2017.00052.6
  • Salah, K., Hammoud, M., & Zeadally, S. (2015). Teaching cybersecurity using the cloud. IEEE Transactions on Learning Technologies, 8(4), 383–392.10.1109/TLT.2015.2424692
  • Schneider, F. B. (2013). Cybersecurity education in universities. IEEE Security & Privacy, 11(4), 3–4.
  • Sharma, S. K., & Sefchek, J. (2007). Teaching information systems security courses: A hands-on approach. Computers & Security, 26, 290–299.10.1016/j.cose.2006.11.005
  • Shumba, R. (2004). Towards a more effective way of teaching a cybersecurity basics course. ACM SIGCSE Bulletin, 36(4), 108–111.10.1145/1041624
  • Smith, C. F., & Choo, T. (2016). Revisiting security administration in the classroom: A decade later. Security Journal, 29(2), 198–212.10.1057/sj.2013.7
  • Sohn, S. Y., Park, H. Y., & Chang, I. S. (2009). Assessment of a complementary cyber learning system to offline teaching. Expert Systems with Applications, 36, 6485–6491.10.1016/j.eswa.2008.07.075
  • Stewart, K. E., Humphries, J. W., & Andel, T. R. (2009). Developing a virtualization platform for courses in networking, systems administration and cybersecurity education. Paper presented at Proceedings of the 2009 Spring Simulation Multiconference.
  • Swart, S. L. (2000). Security between two worlds: Why college-level security courses don't fly. Journal of Security Administration, 23(1), 37.
  • Williams, F. P., III, McShane, M., & Karson, L. (2007). Security in the evolution of the criminal justice curriculum. Criminal Justice Studies, 20(2), 161–173.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.