The Proceedings of the Information Systems Education Conference 2001: §36a
Home
Papers/Indices
prev (§35c)
Next (§36b)
| Work in Progress
| Recommended Citation: Fundaburk, A and J Cannady. Developing an Information Security Curriculum for Educational Institutions: An Analysis of Goals, Objectives, and Competencies for the 21st Century. In The Proceedings of the Information Systems Education Conference 2001, v 18 (Cincinnati): §36a.
|
| |
Developing an Information Security Curriculum for Educational Institutions: An Analysis of Goals, Objectives, and Competencies for the 21st Century
Handout | | Albert Fundaburk [a1] [a2]
Business Education and Office Information Systems
Bloomsburg University [u1] [u2]
Bloomsburg, Pennsylvania, USA [c1] [c2]
James Cannady [a1] [a2]
Computer & Information Science
Nova Southeastern University [u1] [u2]
Fort Lauderdale, Florida, USA [c1] [c2]
|
In recent years, a dramatic shift has occurred in the way computers are used. The advances in computer security have not kept pace with the phenomenal advances in computers and networking. This rapidly evolving information systems environment requires up-to-date information security curriculum. The speed in which the information systems environment changes in regard to security makes it extremely difficult for a university curriculum to prepare students for working in the world of information security. Current engineering and computer science curriculum does not provide students with an understanding of the foundational concepts of information security. Existing undergraduate computer science curriculum focuses on the physical aspect of information security. The goal for developing a comprehensive information security curriculum is to teach the theoretical concepts of information security, and provide a means of applying the concepts to practical applications. This project focuses on rigorous research to define information security and the meaning of a security professional. From this definition, specific knowledge and skill attributes will be determined and a specific curriculum will be developed. This research will consist of three phases: Phase I - Identify Requirements; Phase II - Develop Curriculum Model; and Phase III - Model Implementation, Evaluation, and Review.
Keywords: information systems security, curriculum development, information security certification, information security curriculum mode
Read this presentation handout (non-refereed) in Adobe Portable Document (PDF) format. (85 K bytes)
Preview this presentation handout (non-refereed) in Plain Text (TXT) format. (13 K bytes)
Comments and corrections to
webmaster@isedj.org