Computer security and impact on computer science education
CCSC '01 Proceedings of the sixth annual CCSC northeastern conference on The journal of computing in small colleges
Information system security curricula development
CITC4 '03 Proceedings of the 4th conference on Information technology curriculum
Security education within the IT curriculum
CITC4 '03 Proceedings of the 4th conference on Information technology curriculum
An undergraduate track in computer security
Proceedings of the 8th annual conference on Innovation and technology in computer science education
A laboratory based capstone course in computer security for undergraduates
Proceedings of the 37th SIGCSE technical symposium on Computer science education
A computer forensics minor curriculum proposal
Journal of Computing Sciences in Colleges
Information security across disciplines
SIGITE '08 Proceedings of the 9th ACM SIGITE conference on Information technology education
Designing and implementing an undergraduate program in information systems security
Education and Information Technologies
Expanding security awareness in introductory computer science courses
2009 Information Security Curriculum Development Conference
Security in computer literacy: a model for design, dissemination, and assessment
Proceedings of the 42nd ACM technical symposium on Computer science education
Security teaching modules for computer science courses
Journal of Computing Sciences in Colleges
Hi-index | 0.00 |
Information Security is a critical part of the technology infrastructure. A survey of undergraduate degree programs in Computer Science, Information Technology, Management Information Science, and others show a lack of emphasis on security issues in their curriculum. The purpose of this paper is to present a case study on our approach to creating an undergraduate curriculum that will enhance existing degree programs in Computer Science and Information Technology to provide an increased awareness of Information Security concepts. Our rationale includes: research on existing Information Security programs, review of other Information Security curriculum development efforts, assessments and surveys of workforce needs in Information Technology pertaining to security, applying government directives, and the process of creating a curriculum to address the discovered gaps. Our approach is unique in its usage of surveys of Information Technology professionals, interviews with professionals, and a comprehensive survey of workforce needs in Information Security along with a review of other curriculum development efforts. From this case study, we will be able to suggest and define an Information Security curriculum that will best answer today's security challenges.