{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T23:01:05Z","timestamp":1765666865781,"version":"3.41.0"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2010,1,18]],"date-time":"2010-01-18T00:00:00Z","timestamp":1263772800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCSE Bull."],"published-print":{"date-parts":[[2010,1,18]]},"abstract":"<jats:p>Information Assurance and computer security are serious worldwide concerns of governments, industry, and academia. Computer security is one of the three new focal areas of the ACM\/IEEE's Computer Science Curriculum update in 2008. This ACM\/IEEE report describes, as the first of its three recent trends, \"the emergence of security as a major area of concern.\" The importance of Information Assurance and Information Assurance education is not limited to the United States. Other nations, including the United Kingdom, Australia, New Zealand, Canada, and other members from NATO countries and the EU, have inquired as to how they may be able to establish Information Assurance education programs in their own country.<\/jats:p>\n          <jats:p>The goal of this document is to explore the space of various existing Information Assurance educational standards and guidelines, and how they may serve as a basis for helping to define the field of Information Assurance. It was necessary for this working group to study what has been done for other areas of computing. For example, computer science (CS 2008 and associate-degree CS 2009), information technology (IT 2008), and software engineering (SE 2004), all have available curricular guidelines.<\/jats:p>\n          <jats:p>In its exploration of existing government, industry, and academic Information Assurance guidelines and standards, as well as in its discovery of what guidance is being provided for other areas of computing, the working group has developed this paper as a foundation, or a starting point, for creating an appropriate set of guidelines for Information Assurance education. In researching the space of existing guidelines and standards, several challenges and opportunities to Information Assurance education were discovered. These are briefly described and discussed, and some next steps suggested.<\/jats:p>","DOI":"10.1145\/1709424.1709457","type":"journal-article","created":{"date-parts":[[2010,1,26]],"date-time":"2010-01-26T14:01:38Z","timestamp":1264514498000},"page":"109-125","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["An exploration of the current state of information assurance education"],"prefix":"10.1145","volume":"41","author":[{"given":"Stephen","family":"Cooper","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]},{"given":"Christine","family":"Nickell","sequence":"additional","affiliation":[{"name":"Department of Defense, Ft. Meade, MD"}]},{"given":"Victor","family":"Piotrowski","sequence":"additional","affiliation":[{"name":"National Science Foundation, Arlington, VA"}]},{"given":"Brenda","family":"Oldfield","sequence":"additional","affiliation":[{"name":"Department of Homeland Security, NCSD, Washington DC"}]},{"given":"Ali","family":"Abdallah","sequence":"additional","affiliation":[{"name":"London South Bank University, London, England"}]},{"given":"Matt","family":"Bishop","sequence":"additional","affiliation":[{"name":"University of California, Davis, Davis, CA"}]},{"given":"Bill","family":"Caelli","sequence":"additional","affiliation":[{"name":"Queensland University of Tech., Brisbane Qld 4001 Australia"}]},{"given":"Melissa","family":"Dark","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]},{"given":"E. K.","family":"Hawthorne","sequence":"additional","affiliation":[{"name":"Union County College, Cranford, NJ"}]},{"given":"Lance","family":"Hoffman","sequence":"additional","affiliation":[{"name":"George Washington University, Washington, DC"}]},{"given":"Lance C.","family":"P\u00e9rez","sequence":"additional","affiliation":[{"name":"University of Nebraska, Lincoln, Lincoln, NE"}]},{"given":"Charles","family":"Pfleeger","sequence":"additional","affiliation":[{"name":"Pfleeger Consulting Group, Washington, DC"}]},{"given":"Richard","family":"Raines","sequence":"additional","affiliation":[{"name":"Air Force Institute of Technology, Wright Patterson AFB, OH"}]},{"given":"Corey","family":"Schou","sequence":"additional","affiliation":[{"name":"Idaho State University, Pocatello, ID"}]},{"given":"Joel","family":"Brynielsson","sequence":"additional","affiliation":[{"name":"Royal Inst. of Technology, Stockholm, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2010,1,18]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Computing Curricula 2005 The Overview Report (http:\/\/www.acm.org\/education\/education\/curric_vols\/CC2005-March06Final.pdf)  Computing Curricula 2005 The Overview Report (http:\/\/www.acm.org\/education\/education\/curric_vols\/CC2005-March06Final.pdf)"},{"key":"e_1_2_1_2_1","unstructured":"Information Technology 2008 Curriculum Guidelines for Undergraduate Degree Programs in Information Technology (http:\/\/www.acm.org\/\/education\/curricula\/IT2008%20Curriculum.pdf)  Information Technology 2008 Curriculum Guidelines for Undergraduate Degree Programs in Information Technology (http:\/\/www.acm.org\/\/education\/curricula\/IT2008%20Curriculum.pdf)"},{"key":"e_1_2_1_3_1","volume-title":"An Interim Revision of CS 2001 (http:\/\/www.acm.org\/\/education\/curricula\/ComputerScience2008","author":"Science Computer","year":"2008","unstructured":"Computer Science 2008 , An Interim Revision of CS 2001 (http:\/\/www.acm.org\/\/education\/curricula\/ComputerScience2008 .pdf) Computer Science 2008, An Interim Revision of CS 2001 (http:\/\/www.acm.org\/\/education\/curricula\/ComputerScience2008.pdf)"},{"key":"e_1_2_1_4_1","unstructured":"Software Engineering 2004 Curriculum Guidelines of Undergraduate Degree Programs in Software Engineering (http:\/\/sites.computer.org\/ccse)  Software Engineering 2004 Curriculum Guidelines of Undergraduate Degree Programs in Software Engineering (http:\/\/sites.computer.org\/ccse)"},{"key":"e_1_2_1_5_1","unstructured":"Computing Curriculum 2001 (http:\/\/www.acm.org\/education\/curric_vols\/cc2001.pdf).  Computing Curriculum 2001 (http:\/\/www.acm.org\/education\/curric_vols\/cc2001.pdf)."},{"key":"e_1_2_1_6_1","volume-title":"May.","author":"Redwine Samuel T.","year":"2006","unstructured":"Samuel T. Redwine , Jr. , Editor. ( 2006 ). Software Assurance: A Guide to the Common Body of Knowledge to Produce, Acquire, and Sustain Secure Software Version 1.0. US Department of Homeland Security , May. Samuel T. Redwine, Jr., Editor. (2006). Software Assurance: A Guide to the Common Body of Knowledge to Produce, Acquire, and Sustain Secure Software Version 1.0. US Department of Homeland Security, May."},{"key":"e_1_2_1_7_1","unstructured":"http:\/\/www.swebok.org  http:\/\/www.swebok.org"},{"key":"e_1_2_1_8_1","unstructured":"The \"CORE Body of Knowledge for Information Technology Professionals\" (http:\/\/www.acs.org.au\/ictcareers\/index.cfm?action=show&conID=cbok3)  The \"CORE Body of Knowledge for Information Technology Professionals\" (http:\/\/www.acs.org.au\/ictcareers\/index.cfm?action=show&conID=cbok3)"},{"key":"e_1_2_1_9_1","volume-title":"Australian Computer Society","author":"Task Report","year":"1992","unstructured":"Report of the Task Force on the ACS Towards 2000 , Australian Computer Society , November 1992 . Report of the Task Force on the ACS Towards 2000, Australian Computer Society, November 1992."},{"key":"e_1_2_1_10_1","unstructured":"Computing Curricula 2009: Guidelines for Associate-Degree Transfer Curriculum in Computer Science. http:\/\/www.acmtyc.org\/WebReports\/CSreport\/  Computing Curricula 2009: Guidelines for Associate-Degree Transfer Curriculum in Computer Science. http:\/\/www.acmtyc.org\/WebReports\/CSreport\/"},{"key":"e_1_2_1_11_1","unstructured":"ACM Education Curriculum Recommendations. http:\/\/www.acm.org\/education\/curricula-recommendations  ACM Education Curriculum Recommendations. http:\/\/www.acm.org\/education\/curricula-recommendations"},{"key":"e_1_2_1_12_1","unstructured":"ACM TYCEC Curriculum Assessment and Pedagogy repository. http:\/\/www.capspace.org\/  ACM TYCEC Curriculum Assessment and Pedagogy repository. http:\/\/www.capspace.org\/"},{"key":"e_1_2_1_13_1","unstructured":"NSA list of CSEs http:\/\/www.nsa.gov\/ia\/academic_outreach\/nat_cae\/index.shtml  NSA list of CSEs http:\/\/www.nsa.gov\/ia\/academic_outreach\/nat_cae\/index.shtml"},{"key":"e_1_2_1_14_1","unstructured":"SFS program solicitation http:\/\/www.nsf.gov\/funding\/pgm_summ.jsp?pims_id=5228  SFS program solicitation http:\/\/www.nsf.gov\/funding\/pgm_summ.jsp?pims_id=5228"},{"key":"e_1_2_1_15_1","unstructured":"IASP program description http:\/\/www.defenselink.mil\/cionii\/sites\/iasp\/  IASP program description http:\/\/www.defenselink.mil\/cionii\/sites\/iasp\/"},{"key":"e_1_2_1_16_1","unstructured":"NSA IASP program requirements http:\/\/www.nsa.gov\/ia\/academic_outreach\/nat_cae\/cae_iae_program_criteria.shtml  NSA IASP program requirements http:\/\/www.nsa.gov\/ia\/academic_outreach\/nat_cae\/cae_iae_program_criteria.shtml"},{"key":"e_1_2_1_17_1","unstructured":"National Training Standard for Information Systems Security Professionals http:\/\/www.cnss.gov\/Assets\/pdf\/nstissi_4011.pdf  National Training Standard for Information Systems Security Professionals http:\/\/www.cnss.gov\/Assets\/pdf\/nstissi_4011.pdf"},{"key":"e_1_2_1_18_1","unstructured":"NIST 800-16 Standard http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-16\/800-16.pdf  NIST 800-16 Standard http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-16\/800-16.pdf"},{"key":"e_1_2_1_19_1","unstructured":"DoD 8570 Directive http:\/\/www.dtic.mil\/whs\/directives\/corres\/pdf\/857001m.pdf  DoD 8570 Directive http:\/\/www.dtic.mil\/whs\/directives\/corres\/pdf\/857001m.pdf"},{"key":"e_1_2_1_20_1","unstructured":"DHS EBK http:\/\/www.us-cert.gov\/ITSecurityEBK\/EBK2008.pdf  DHS EBK http:\/\/www.us-cert.gov\/ITSecurityEBK\/EBK2008.pdf"},{"key":"e_1_2_1_21_1","unstructured":"ISO 17024 Standard http:\/\/www.iso.org\/iso\/iso_catalogue\/catalogue_tc\/catalogue_detail.htm?csnumber=29346  ISO 17024 Standard http:\/\/www.iso.org\/iso\/iso_catalogue\/catalogue_tc\/catalogue_detail.htm?csnumber=29346"},{"key":"e_1_2_1_22_1","unstructured":"IFIP WG 11.8 homepage http:\/\/www.118.ifip.info\/  IFIP WG 11.8 homepage http:\/\/www.118.ifip.info\/"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings WISE 2, 2nd World Conference Information Security Education","author":"IFIP","year":"2001","unstructured":"IFIP TC11 WB 11. 8 Information Security Education , Proceedings WISE 2, 2nd World Conference Information Security Education , Edith Cowan University, Perth, Western Australia , July 12-14, 2001 . IFIP TC11 WB 11.8 Information Security Education, Proceedings WISE 2, 2nd World Conference Information Security Education, Edith Cowan University, Perth, Western Australia, July 12-14, 2001."},{"key":"e_1_2_1_24_1","unstructured":"http:\/\/ftp.fas.org\/irp\/offdocs\/pdd\/pdd-63.htm  http:\/\/ftp.fas.org\/irp\/offdocs\/pdd\/pdd-63.htm"},{"key":"e_1_2_1_25_1","unstructured":"http:\/\/www.cnss.gov\/  http:\/\/www.cnss.gov\/"},{"key":"e_1_2_1_26_1","volume-title":"On Security Education, Training and Certifications. Information Systems Control Journal","author":"Ryan J.","year":"2004","unstructured":"J. Ryan and C Schou ( 2004 ) On Security Education, Training and Certifications. Information Systems Control Journal . Volume 6 . J. Ryan and C Schou (2004) On Security Education, Training and Certifications. Information Systems Control Journal. Volume 6."},{"key":"e_1_2_1_27_1","unstructured":"http:\/\/www.sans.org  http:\/\/www.sans.org"},{"key":"e_1_2_1_28_1","unstructured":"http:\/\/www.isc2.org  http:\/\/www.isc2.org"},{"key":"e_1_2_1_29_1","unstructured":"http:\/\/www.abet.org  http:\/\/www.abet.org"},{"key":"e_1_2_1_30_1","unstructured":"http:\/\/www.qaa.ac.uk\/reviews\/ELIR\/GoodPractice\/InternalSubjectELIR.pdf  http:\/\/www.qaa.ac.uk\/reviews\/ELIR\/GoodPractice\/InternalSubjectELIR.pdf"},{"key":"e_1_2_1_31_1","unstructured":"http:\/\/www.qaa.ac.uk  http:\/\/www.qaa.ac.uk"},{"key":"e_1_2_1_32_1","unstructured":"http:\/\/www.ed.gov  http:\/\/www.ed.gov"},{"key":"e_1_2_1_33_1","unstructured":"http:\/\/www\/auqa.edu.au\/  http:\/\/www\/auqa.edu.au\/"},{"key":"e_1_2_1_34_1","unstructured":"http:\/\/www.aacsb.edu\/accreditation\/  http:\/\/www.aacsb.edu\/accreditation\/"},{"key":"e_1_2_1_35_1","unstructured":"http:\/\/www.csab.org\/  http:\/\/www.csab.org\/"},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of the Ninth International Computer Security Symposium","author":"Schou C.","year":"1993","unstructured":"C. Schou , W. Maconachy , ( 1993 ). Organizational Information Security: Awareness, Training and Education to Maintain System Integrity . In Proceedings of the Ninth International Computer Security Symposium . Toronto, Canada. C. Schou, W. Maconachy, et al. (1993). Organizational Information Security: Awareness, Training and Education to Maintain System Integrity. In Proceedings of the Ninth International Computer Security Symposium. Toronto, Canada."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.111"},{"key":"e_1_2_1_38_1","unstructured":"http:\/\/www.hsv.se\/  http:\/\/www.hsv.se\/"},{"key":"e_1_2_1_39_1","unstructured":"http:\/\/csrc.nist.gov\/groups\/SMA\/fisma\/index.html  http:\/\/csrc.nist.gov\/groups\/SMA\/fisma\/index.html"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/988881.988883"}],"container-title":["ACM SIGCSE Bulletin"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1709424.1709457","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1709424.1709457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:10Z","timestamp":1750278130000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1709424.1709457"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1,18]]},"references-count":40,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,1,18]]}},"alternative-id":["10.1145\/1709424.1709457"],"URL":"https:\/\/doi.org\/10.1145\/1709424.1709457","relation":{},"ISSN":["0097-8418"],"issn-type":[{"type":"print","value":"0097-8418"}],"subject":[],"published":{"date-parts":[[2010,1,18]]},"assertion":[{"value":"2010-01-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}