{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:09:58Z","timestamp":1764936598996,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":72,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,20]],"date-time":"2011-10-20T00:00:00Z","timestamp":1319068800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,20]]},"DOI":"10.1145\/2047594.2047628","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"113-122","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":65,"title":["The role of cyber-security in information technology education"],"prefix":"10.1145","author":[{"given":"Dale C.","family":"Rowe","sequence":"first","affiliation":[{"name":"Brigham Young University, Provo, UT, USA"}]},{"given":"Barry M.","family":"Lunt","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT, USA"}]},{"given":"Joseph J.","family":"Ekstrom","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Information Technology 2008: Curriculum Guidelines for Undergraduate Degree Programs in Information Technology","author":"Lunt B. M.","year":"2008","unstructured":"Lunt , B. M. , Ekstrom , J. J. , Gorka , S. , , Information Technology 2008: Curriculum Guidelines for Undergraduate Degree Programs in Information Technology . Association for Computing Machinery (ACM) ; IEEE Computer Society, November 2008 . Lunt, B. M., Ekstrom, J. J., Gorka, S., et al., Information Technology 2008: Curriculum Guidelines for Undergraduate Degree Programs in Information Technology. Association for Computing Machinery (ACM); IEEE Computer Society, November 2008."},{"key":"e_1_3_2_1_2_1","volume-title":"US Pentagon to treat cyber-attacks as 'acts of war","author":"BBC","year":"2011","unstructured":"BBC , US Pentagon to treat cyber-attacks as 'acts of war '. British Broadcasting Corporation , June 1, 2011 . http:\/\/www.bbc.co.uk\/news\/world-us-canada-13614125 (Last Accessed: June 1, 2011). BBC, US Pentagon to treat cyber-attacks as 'acts of war'. British Broadcasting Corporation, June 1, 2011. http:\/\/www.bbc.co.uk\/news\/world-us-canada-13614125 (Last Accessed: June 1, 2011)."},{"key":"e_1_3_2_1_3_1","volume-title":"UK beefs up cyber warfare plans","author":"BBC","year":"2011","unstructured":"BBC , UK beefs up cyber warfare plans . British Broadcasting Corporation , May 31, 2011 . http:\/\/www.bbc.co.uk\/news\/technology-13599916 (Last Accessed: June 1, 2011). BBC, UK beefs up cyber warfare plans. British Broadcasting Corporation, May 31, 2011. http:\/\/www.bbc.co.uk\/news\/technology-13599916 (Last Accessed: June 1, 2011)."},{"key":"e_1_3_2_1_4_1","volume-title":"Space War","author":"Spacewar","year":"2011","unstructured":"Spacewar . com, White House proposes new cybersecurity bill . Space War , May 12, 2011 . http:\/\/www.spacewar.com\/reports\/White_House_proposes_new_cybersecurity_bill_999.html (Last Accessed : June 1, 2011). Spacewar.com, White House proposes new cybersecurity bill. Space War, May 12, 2011. http:\/\/www.spacewar.com\/reports\/White_House_proposes_new_cybersecurity_bill_999.html (Last Accessed: June 1, 2011)."},{"key":"e_1_3_2_1_5_1","volume-title":"Washington DC","author":"Whitehouse","year":"2011","unstructured":"Whitehouse , Cyberspace Policy Review. Government Collaborative , Washington DC , 2011 . http:\/\/www.whitehouse.gov\/assets\/documents\/Cyberspace_Policy_Review_final.pdf ( Last Accessed : June 2, 2011). Whitehouse, Cyberspace Policy Review. Government Collaborative, Washington DC, 2011. http:\/\/www.whitehouse.gov\/assets\/documents\/Cyberspace_Policy_Review_final.pdf (Last Accessed: June 2, 2011)."},{"key":"e_1_3_2_1_6_1","first-page":"30","volume-title":"Cybersecurity Report","author":"Herrera-Flanigan J.","year":"2011","unstructured":"Herrera-Flanigan , J. , Cyber Attention : Why Now ? Cybersecurity Report , Nextgov , May 27, 2011 . http:\/\/cybersecurityreport.nextgov.com\/2011\/05\/cyber_attention_why_now.php (Last Accessed: May 30 , 2011). Herrera-Flanigan, J., Cyber Attention: Why Now? Cybersecurity Report, Nextgov, May 27, 2011. http:\/\/cybersecurityreport.nextgov.com\/2011\/05\/cyber_attention_why_now.php (Last Accessed: May 30, 2011)."},{"key":"e_1_3_2_1_7_1","volume-title":"March 1","author":"Singel R.","year":"2010","unstructured":"Singel , R. , Cyberwar Hype Intended to Destroy the Open Internet. Wired , March 1 , 2010 . http:\/\/www.wired.com\/threatlevel\/2010\/03\/cyber-war-hype\/ ( Last Accessed : May 30, 2011). Singel, R., Cyberwar Hype Intended to Destroy the Open Internet. Wired, March 1, 2010. http:\/\/www.wired.com\/threatlevel\/2010\/03\/cyber-war-hype\/ (Last Accessed: May 30, 2011)."},{"key":"e_1_3_2_1_8_1","volume-title":"The Cyber War Threat Has Been Grossly Exaggerated","author":"Intelligence","year":"2010","unstructured":"Intelligence 2 , The Cyber War Threat Has Been Grossly Exaggerated . June 8, 2010 . http:\/\/intelligencesquaredus.org\/index.php\/past-debates\/cyber-war-threat-has-been-grossly-exaggerated\/ ( Last Accessed : May 30, 2011). Intelligence2, The Cyber War Threat Has Been Grossly Exaggerated. June 8, 2010. http:\/\/intelligencesquaredus.org\/index.php\/past-debates\/cyber-war-threat-has-been-grossly-exaggerated\/ (Last Accessed: May 30, 2011)."},{"key":"e_1_3_2_1_9_1","volume-title":"15 Apr, 2010. http:\/\/www.technewsworld.com\/story\/69780","author":"Mello J. P., NSA","year":"2011","unstructured":"Mello , J. P., NSA Chief : Cyberwar Rules of Engagement a Policy Minefield . 15 Apr, 2010. http:\/\/www.technewsworld.com\/story\/69780 .html?wlc=1279739450&wlc=1306808884 (Last Accessed : May 30, 2011 ). Mello, J. P., NSA Chief: Cyberwar Rules of Engagement a Policy Minefield. 15 Apr, 2010. http:\/\/www.technewsworld.com\/story\/69780.html?wlc=1279739450&wlc=1306808884 (Last Accessed: May 30, 2011)."},{"key":"e_1_3_2_1_10_1","volume-title":"Forbes","author":"Lawson S.","year":"2010","unstructured":"Lawson , S. , Sow \"Cyberwar\" Rhetoric , Reap The NSA's \"Big Brother\". The Firewall - The World of Security , Forbes , July 8, 2010 . http:\/\/blogs.forbes.com\/firewall\/2010\/07\/08\/sew-cyberwar-rhetoric-reap-the-nsas-big-brother\/ ( Last Accessed : May 31, 2011). Lawson, S., Sow \"Cyberwar\" Rhetoric, Reap The NSA's \"Big Brother\". The Firewall - The World of Security, Forbes, July 8, 2010. http:\/\/blogs.forbes.com\/firewall\/2010\/07\/08\/sew-cyberwar-rhetoric-reap-the-nsas-big-brother\/ (Last Accessed: May 31, 2011)."},{"key":"e_1_3_2_1_11_1","volume-title":"May 13, 2010. http:\/\/www.schneier.com\/blog\/archives\/2010\/05\/worst-case_thin.html (Last Accessed","author":"Schneier B.","year":"2011","unstructured":"Schneier , B. , Worst-Case Thinking . Schneier on Security , May 13, 2010. http:\/\/www.schneier.com\/blog\/archives\/2010\/05\/worst-case_thin.html (Last Accessed : May 30, 2011 ). Schneier, B., Worst-Case Thinking. Schneier on Security, May 13, 2010. http:\/\/www.schneier.com\/blog\/archives\/2010\/05\/worst-case_thin.html (Last Accessed: May 30, 2011)."},{"key":"e_1_3_2_1_12_1","volume-title":"12 Dec, 2009. http:\/\/www.schneier.com\/blog\/archives\/2009\/12\/cyberwarfare_po.html (Last Accessed","author":"Schneier B.","year":"2011","unstructured":"Schneier , B. , Cyberwarfare Policy . Schneier on Security , 12 Dec, 2009. http:\/\/www.schneier.com\/blog\/archives\/2009\/12\/cyberwarfare_po.html (Last Accessed : May 30, 2011 ). Schneier, B., Cyberwarfare Policy. Schneier on Security, 12 Dec, 2009. http:\/\/www.schneier.com\/blog\/archives\/2009\/12\/cyberwarfare_po.html (Last Accessed: May 30, 2011)."},{"key":"e_1_3_2_1_13_1","volume-title":"CNN","author":"Schneier B., U.S.","year":"2010","unstructured":"Schneier , B., U.S. Enables Chinese Hacking of Google . CNN , Jan 23, 2010 . http:\/\/www.cnn.com\/2010\/OPINION\/01\/23\/schneier.google.hacking\/index.html (Last Accessed : May 30, 2011). Schneier, B., U.S. Enables Chinese Hacking of Google. CNN, Jan 23, 2010. http:\/\/www.cnn.com\/2010\/OPINION\/01\/23\/schneier.google.hacking\/index.html (Last Accessed: May 30, 2011)."},{"key":"e_1_3_2_1_14_1","volume-title":"Schneier on Security","author":"Schneier B.","year":"2005","unstructured":"Schneier , B. , Crypto-Gram Newsletter : Cyberwar . Schneier on Security , 15 Jan , 2005 . http:\/\/www.schneier.com\/crypto-gram-0501.html#10 (Last Accessed : May 30, 2011). Schneier, B., Crypto-Gram Newsletter: Cyberwar. Schneier on Security, 15 Jan, 2005. http:\/\/www.schneier.com\/crypto-gram-0501.html#10 (Last Accessed: May 30, 2011)."},{"key":"e_1_3_2_1_15_1","volume-title":"July 13, 2009. http:\/\/www.schneier.com\/blog\/archives\/2009\/07\/north_korean_cy.html (Last Accessed","author":"Schneier B.","year":"2011","unstructured":"Schneier , B. , North Korea Cyberattacks . Schneier on Security , July 13, 2009. http:\/\/www.schneier.com\/blog\/archives\/2009\/07\/north_korean_cy.html (Last Accessed : May 30, 2011 ). Schneier, B., North Korea Cyberattacks. Schneier on Security, July 13, 2009. http:\/\/www.schneier.com\/blog\/archives\/2009\/07\/north_korean_cy.html (Last Accessed: May 30, 2011)."},{"key":"e_1_3_2_1_16_1","volume-title":"Planning for the Future of Cyber Attack Attribution","author":"Committee on Science and Technology","year":"2010","unstructured":"Committee on Science and Technology , Planning for the Future of Cyber Attack Attribution . U.S. House of Representatives , Washington DC , 2010 . http:\/\/epic.org\/privacy\/cybersecurity\/EPIC_HouseSci_Testimony_2010-07--15.pdf (Last Accessed: May 30, 2011). Committee on Science and Technology, Planning for the Future of Cyber Attack Attribution. U.S. House of Representatives, Washington DC, 2010. http:\/\/epic.org\/privacy\/cybersecurity\/EPIC_HouseSci_Testimony_2010-07--15.pdf (Last Accessed: May 30, 2011)."},{"key":"e_1_3_2_1_17_1","volume-title":"Wayne Crewes","author":"Crews C. W.","year":"2011","unstructured":"Crews , C. W. , Cybersecurity Theater vs. The Real Thing . Wayne Crewes , Forbes , Mar 16, 2011 . http:\/\/blogs.forbes.com\/firewall\/2010\/07\/08\/sew-cyberwar-rhetoric-reap-the-nsas-big-brother\/ (Last Accessed: May 31, 2011). Crews, C. W., Cybersecurity Theater vs. The Real Thing. Wayne Crewes, Forbes, Mar 16, 2011. http:\/\/blogs.forbes.com\/firewall\/2010\/07\/08\/sew-cyberwar-rhetoric-reap-the-nsas-big-brother\/ (Last Accessed: May 31, 2011)."},{"key":"e_1_3_2_1_18_1","volume-title":"D. C., Ali, A., et al.","author":"Souza P.","year":"2011","unstructured":"Souza , P. d., Rowe , D. C., Ali, A., et al. , Cyber Dawn : Libya. Cyber Security Forum Initiative (CSFI) , May 2011 . Souza, P. d., Rowe, D. C., Ali, A., et al., Cyber Dawn: Libya. Cyber Security Forum Initiative (CSFI), May 2011."},{"key":"e_1_3_2_1_19_1","volume-title":"Symantec","author":"Falliere N.","year":"2011","unstructured":"Falliere , N. , Murchu , L. O. and Chien , E ., W32.Stuxnet Dossier . Symantec , February 2011 . Falliere, N., Murchu, L. O. and Chien, E., W32.Stuxnet Dossier. Symantec, February 2011."},{"key":"e_1_3_2_1_20_1","volume-title":"May 19","author":"Rashid F.","year":"2011","unstructured":"Rashid , F. , Siemens , DHS Ask Researcher to Cancel SCADA Vulnerabilities. eWeek , May 19 , 2011 . http:\/\/securitywatch.eweek.com\/scada\/siemens_dhs_ask_researcher_to_cancel_scada_vulnerabilities_talk.html ( Last Accessed : May 30, 2011). Rashid, F., Siemens, DHS Ask Researcher to Cancel SCADA Vulnerabilities. eWeek, May 19, 2011. http:\/\/securitywatch.eweek.com\/scada\/siemens_dhs_ask_researcher_to_cancel_scada_vulnerabilities_talk.html (Last Accessed: May 30, 2011)."},{"key":"e_1_3_2_1_21_1","volume-title":"CNET","author":"Mills E.","year":"2011","unstructured":"Mills , E. , SCADA hack talk canceled after U.S., Siemens request . CNET , May 18, 2011 . http:\/\/news.cnet.com\/8301--27080_3--20064112--245.html (Last Accessed : May 30, 2011). Mills, E., SCADA hack talk canceled after U.S., Siemens request. CNET, May 18, 2011. http:\/\/news.cnet.com\/8301--27080_3--20064112--245.html (Last Accessed: May 30, 2011)."},{"key":"e_1_3_2_1_22_1","volume-title":"Utilities IT","author":"Posposil R.","year":"2000","unstructured":"Posposil , R. , The Next Y2K , Utilities IT , 2000 . Posposil, R., The Next Y2K, Utilities IT, 2000."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/647399.724849"},{"key":"e_1_3_2_1_24_1","volume-title":"Understanding SCADA System Security Vulnerabilities","author":"Riptech","year":"2001","unstructured":"Riptech , Understanding SCADA System Security Vulnerabilities . Riptech Inc , 2001 . Riptech, Understanding SCADA System Security Vulnerabilities. Riptech Inc, 2001."},{"key":"e_1_3_2_1_25_1","volume-title":"USA","author":"Kroll","year":"2010","unstructured":"Kroll , Global Fraud Report. Kroll Consulting , USA , Fall 2010 . Kroll, Global Fraud Report. Kroll Consulting, USA, Fall 2010."},{"key":"e_1_3_2_1_26_1","volume-title":"Federal Plan for Cyber Security and Information Assurance Research and Development","author":"NSTC","year":"2006","unstructured":"NSTC , Federal Plan for Cyber Security and Information Assurance Research and Development . National Science and Technology Council , Washington DC , 2006 . http:\/\/www.au.af.mil\/au\/awc\/awcgate\/nitrd\/fed_plan_csia_rese.pdf (Last Accessed: May 30, 2011). NSTC, Federal Plan for Cyber Security and Information Assurance Research and Development. National Science and Technology Council, Washington DC, 2006. http:\/\/www.au.af.mil\/au\/awc\/awcgate\/nitrd\/fed_plan_csia_rese.pdf (Last Accessed: May 30, 2011)."},{"volume-title":"Cyber Security and Monitoring. National Security Presidential Directive 54","year":"2008","key":"e_1_3_2_1_27_1","unstructured":"NSPD-54 , Cyber Security and Monitoring. National Security Presidential Directive 54 , 8 Jan 2008 . NSPD-54, Cyber Security and Monitoring. National Security Presidential Directive 54, 8 Jan 2008."},{"volume-title":"Cyber Security and Monitoring. Homeland Security Presidential Directive 23","year":"2008","key":"e_1_3_2_1_28_1","unstructured":"HSPD-23 , Cyber Security and Monitoring. Homeland Security Presidential Directive 23 , 8 Jan 2008 . HSPD-23, Cyber Security and Monitoring. Homeland Security Presidential Directive 23, 8 Jan 2008."},{"volume-title":"Comprehensive National Cybersecurity Initiative (CNCI)","author":"NSC","key":"e_1_3_2_1_29_1","unstructured":"NSC , Comprehensive National Cybersecurity Initiative (CNCI) . National Security Council , http:\/\/www.whitehouse.gov\/cybersecurity\/comprehensive-national-cybersecurity-initiative (Last Accessed: May 30, 2011). NSC, Comprehensive National Cybersecurity Initiative (CNCI). National Security Council, http:\/\/www.whitehouse.gov\/cybersecurity\/comprehensive-national-cybersecurity-initiative (Last Accessed: May 30, 2011)."},{"volume-title":"A Roadmap for Cybersecurity Research. US Department of Homeland Security","year":"2009","key":"e_1_3_2_1_30_1","unstructured":"US-DHS , A Roadmap for Cybersecurity Research. US Department of Homeland Security , 2009 . US-DHS, A Roadmap for Cybersecurity Research. US Department of Homeland Security, 2009."},{"key":"e_1_3_2_1_31_1","volume-title":"Hard Problem List","author":"IRC","year":"2005","unstructured":"IRC , Hard Problem List . INFOSEC Research Council (IRC) , 2005 . IRC, Hard Problem List. INFOSEC Research Council (IRC), 2005."},{"key":"e_1_3_2_1_32_1","volume-title":"Reducing Systemic Cybersecurity Risk","author":"Sommer P.","year":"2011","unstructured":"Sommer , P. and Brown , I. , Reducing Systemic Cybersecurity Risk . Organization for Economic Co-Operation and Development (OECD) , 2011 . Sommer, P. and Brown, I., Reducing Systemic Cybersecurity Risk. Organization for Economic Co-Operation and Development (OECD), 2011."},{"key":"e_1_3_2_1_33_1","volume-title":"Jan 30","author":"Sterling B.","year":"2010","unstructured":"Sterling , B. , The Advanced Persistent Threat Attack. Wired , Jan 30 , 2010 . http:\/\/www.wired.com\/beyond_the_beyond\/2010\/01\/the-advanced-persistent-threat-attack\/ ( Last Accessed : May 30, 2011). Sterling, B., The Advanced Persistent Threat Attack. Wired, Jan 30, 2010. http:\/\/www.wired.com\/beyond_the_beyond\/2010\/01\/the-advanced-persistent-threat-attack\/ (Last Accessed: May 30, 2011)."},{"key":"e_1_3_2_1_34_1","volume-title":"Guidelines for Cybersecurity","author":"ISO","year":"2011","unstructured":"ISO , Guidelines for Cybersecurity . International Standards Organization . 2011 . http:\/\/www.iso27001security.com\/html\/27032.html. ISO, Guidelines for Cybersecurity. International Standards Organization. 2011. http:\/\/www.iso27001security.com\/html\/27032.html."},{"key":"e_1_3_2_1_35_1","volume-title":"CRN","author":"Hoffman S.","year":"2009","unstructured":"Hoffman , S. , Lack of Cybersecurity Talent Could Leave U.S. Vulnerable : Study . The Channel Wire , CRN , July 22, 2009 . http:\/\/www.crn.com\/blogs-op-ed\/the-channel-wire\/218600240\/lack-of-cybersecurity-talent-could-leave-u-s-vulnerable-study.htm (Last Accessed : May 30, 2011). Hoffman, S., Lack of Cybersecurity Talent Could Leave U.S. Vulnerable: Study. The Channel Wire, CRN, July 22, 2009. http:\/\/www.crn.com\/blogs-op-ed\/the-channel-wire\/218600240\/lack-of-cybersecurity-talent-could-leave-u-s-vulnerable-study.htm (Last Accessed: May 30, 2011)."},{"key":"e_1_3_2_1_36_1","volume-title":"Feds Say Cybersecurity Staffing Needs to Double by","author":"Cacas M.","year":"2015","unstructured":"Cacas , M. , Feds Say Cybersecurity Staffing Needs to Double by 2015 . Armed Forces Communications and Electronics Association (AFCEA) , May 11, 2011. http:\/\/www.afcea.org\/signal\/articles\/templates\/SIGNAL_Article_Template.asp?articleid=2615&zoneid=280 (Last Accessed: May 30, 2011). Cacas, M., Feds Say Cybersecurity Staffing Needs to Double by 2015. Armed Forces Communications and Electronics Association (AFCEA), May 11, 2011. http:\/\/www.afcea.org\/signal\/articles\/templates\/SIGNAL_Article_Template.asp?articleid=2615&zoneid=280 (Last Accessed: May 30, 2011)."},{"key":"e_1_3_2_1_37_1","volume-title":"The 2011 (ISC)2 Global Information Security Workforce Study. (ISC)2","author":"Auoub R.","year":"2011","unstructured":"Auoub , R. , The 2011 (ISC)2 Global Information Security Workforce Study. (ISC)2 , 2011 . Auoub, R., The 2011 (ISC)2 Global Information Security Workforce Study. (ISC)2, 2011."},{"key":"e_1_3_2_1_38_1","volume-title":"Sept 19","author":"Tucci L.","year":"2007","unstructured":"Tucci , L. , Fewer Security Breaches Blamed on Human Error. TechTarget , Sept 19 , 2007 . http:\/\/searchcio.techtarget.com\/news\/1273058\/Fewer-security-breaches-blamed-on-human-error ( Last Accessed : 30 May 2011). Tucci, L., Fewer Security Breaches Blamed on Human Error. TechTarget, Sept 19, 2007. http:\/\/searchcio.techtarget.com\/news\/1273058\/Fewer-security-breaches-blamed-on-human-error (Last Accessed: 30 May 2011)."},{"key":"e_1_3_2_1_39_1","volume-title":"Readings and Case Studies in the Management of Information Security","author":"Dark M.","year":"2007","unstructured":"Dark , M. , Security Education , Training, and Awareness from a Human Performance Technology Point of View , Readings and Case Studies in the Management of Information Security , 2007 . Dark, M., Security Education, Training, and Awareness from a Human Performance Technology Point of View, Readings and Case Studies in the Management of Information Security, 2007."},{"key":"e_1_3_2_1_40_1","volume-title":"Jan 11","author":"Savage M.","year":"2010","unstructured":"Savage , M. , Malicious Attacks Behind More Data Security Breaches than Human Error. TechTarget , Jan 11 , 2010 . http:\/\/searchfinancialsecurity.techtarget.com\/news\/1378614\/Malicious-attacks-behind-more-data-security-breaches-than-human-error ( Last Accessed : May 30, 2011). Savage, M., Malicious Attacks Behind More Data Security Breaches than Human Error. TechTarget, Jan 11, 2010. http:\/\/searchfinancialsecurity.techtarget.com\/news\/1378614\/Malicious-attacks-behind-more-data-security-breaches-than-human-error (Last Accessed: May 30, 2011)."},{"key":"e_1_3_2_1_41_1","volume-title":"Identity Theft Resource Center 2009 Breach List","author":"ITRC","year":"2010","unstructured":"ITRC , Identity Theft Resource Center 2009 Breach List . Identity Theft Resource Center , June 1, 2010 . ITRC, Identity Theft Resource Center 2009 Breach List. Identity Theft Resource Center, June 1, 2010."},{"key":"e_1_3_2_1_42_1","volume-title":"CWE","author":"Christey S.","year":"2010","unstructured":"Christey , S. , Martin , B. , Brown , M. , , 2010 CWE\/SANS Top 25 Most Dangerous Software Errors v1.08 . CWE , 2010. Christey, S., Martin, B., Brown, M., et al., 2010 CWE\/SANS Top 25 Most Dangerous Software Errors v1.08. CWE, 2010."},{"key":"e_1_3_2_1_43_1","volume-title":"SANS","author":"Lam J.","year":"2010","unstructured":"Lam , J. , Top 25 series - Rank 1 - Cross Site Scripting. SANS Software Security , SANS , Feb 22, 2010 . http:\/\/software-security.sans.org\/blog\/2010\/02\/22\/top-25-series-rank-1-cross-site-scripting\/ (Last Accessed : June 2, 2011). Lam, J., Top 25 series - Rank 1 - Cross Site Scripting. SANS Software Security, SANS, Feb 22, 2010. http:\/\/software-security.sans.org\/blog\/2010\/02\/22\/top-25-series-rank-1-cross-site-scripting\/ (Last Accessed: June 2, 2011)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/947121.947178"},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the American Society of Engineering Education North Midwest Conference, (North Midwest), ASEE","author":"Dark M.","year":"2003","unstructured":"Dark , M. and Davis , J ., A Curriculum Framework for the Emerging Discipline of Information Assurance . In Proceedings of the American Society of Engineering Education North Midwest Conference, (North Midwest), ASEE , 2003 . Dark, M. and Davis, J., A Curriculum Framework for the Emerging Discipline of Information Assurance. In Proceedings of the American Society of Engineering Education North Midwest Conference, (North Midwest), ASEE, 2003."},{"key":"e_1_3_2_1_46_1","volume-title":"Teaching the Big Picture of INFOSEC. In Proceedings of the 2nd National Colloquium for Information Systems Security Education (NCISSE)","author":"Spafford E.","year":"1998","unstructured":"Spafford , E. , Teaching the Big Picture of INFOSEC. In Proceedings of the 2nd National Colloquium for Information Systems Security Education (NCISSE) , ( James Madison University, VA) , 1998 . Spafford, E., Teaching the Big Picture of INFOSEC. In Proceedings of the 2nd National Colloquium for Information Systems Security Education (NCISSE), (James Madison University, VA), 1998."},{"key":"e_1_3_2_1_47_1","volume-title":"Think Outside the Box. Mooresetx2","author":"YouTube","year":"2007","unstructured":"YouTube , Think Outside the Box. Mooresetx2 , 2007 . http:\/\/www.youtube.com\/watch?v=C1yYB85ArHE ( Last Accessed : 30 May, 2011). YouTube, Think Outside the Box. Mooresetx2, 2007. http:\/\/www.youtube.com\/watch?v=C1yYB85ArHE (Last Accessed: 30 May, 2011)."},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the National Information Systems Security Conference, NISSC","author":"White G.","year":"1996","unstructured":"White , G. and Nordstrom , G ., Security Across the Curriculum: Using Computer Security to Teach Computer Science Principles . In Proceedings of the National Information Systems Security Conference, NISSC , 1996 . White, G. and Nordstrom, G., Security Across the Curriculum: Using Computer Security to Teach Computer Science Principles. In Proceedings of the National Information Systems Security Conference, NISSC, 1996."},{"key":"e_1_3_2_1_49_1","volume-title":"A Framework for Information Security Ethics. In Proceedings of the 10th Colloquium for Information Systems Security Education","author":"Dark M. J.","year":"2006","unstructured":"Dark , M. J. , Epstein , R. , Morales , L. , , A Framework for Information Security Ethics. In Proceedings of the 10th Colloquium for Information Systems Security Education ( Adelphi, MD), June 5--8 , 2006 . Dark, M. J., Epstein, R., Morales, L., et al., A Framework for Information Security Ethics. In Proceedings of the 10th Colloquium for Information Systems Security Education (Adelphi, MD), June 5--8, 2006."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.735847"},{"key":"e_1_3_2_1_51_1","volume-title":"Journal of Informations Education Research (SIG-ED JIER), Vol 9, Iss. 1","author":"Trimmer K.","year":"2007","unstructured":"Trimmer , K. , Schou , C. and Parker , K. , Enforcing Early Implementation of Information Assurance Precepts Throughout the Design Phase , Journal of Informations Education Research (SIG-ED JIER), Vol 9, Iss. 1 , 2007 . Trimmer, K., Schou, C. and Parker, K., Enforcing Early Implementation of Information Assurance Precepts Throughout the Design Phase, Journal of Informations Education Research (SIG-ED JIER), Vol 9, Iss. 1, 2007."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.28945\/244"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.28945\/255"},{"issue":"5","key":"e_1_3_2_1_54_1","first-page":"170","volume":"19","author":"Null L.","year":"2004","unstructured":"Null , L. , Integrating Security Across the Computer Science Curriculum , Journal of Computer Sciences in Colleges , Vol 19 , Iss. 5 , pp 170 -- 178 , 2004 . Null, L., Integrating Security Across the Computer Science Curriculum, Journal of Computer Sciences in Colleges, Vol 19, Iss. 5, pp 170--178, 2004.","journal-title":"Journal of Computer Sciences in Colleges"},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the Third Security Conference","author":"Shoemaker D.","year":"2004","unstructured":"Shoemaker , D. , Bawol , J. , Drommi , A. , Delivery Model for an Information Security Curriculum . In Proceedings of the Third Security Conference , ( Las Vegas, Nevada, USA), Information Institute , 2004 . Shoemaker, D., Bawol, J., Drommi, A., et al., A Delivery Model for an Information Security Curriculum. In Proceedings of the Third Security Conference, (Las Vegas, Nevada, USA), Information Institute, 2004."},{"key":"e_1_3_2_1_56_1","volume-title":"National Training Standard for Information Systems Security (INFOSEC) Professionals. Committee on National Security Systems (CNSS)","author":"NSTISS","year":"1994","unstructured":"NSTISS , National Training Standard for Information Systems Security (INFOSEC) Professionals. Committee on National Security Systems (CNSS) , 1994 . http:\/\/www.cnss.gov\/Assets\/pdf\/nstissi_4011.pdf. NSTISS, National Training Standard for Information Systems Security (INFOSEC) Professionals. Committee on National Security Systems (CNSS), 1994. http:\/\/www.cnss.gov\/Assets\/pdf\/nstissi_4011.pdf."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/947121.947165"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1414558.1414560"},{"key":"e_1_3_2_1_59_1","volume-title":"http:\/\/www.britannica.com\/EBchecked\/topic\/424706\/Ockhams-razor (Last Accessed","author":"Ockham's Razor","year":"2011","unstructured":"Ockham's Razor . Encyclopaedia Britannica. 2011. http:\/\/www.britannica.com\/EBchecked\/topic\/424706\/Ockhams-razor (Last Accessed : May 30, 2011 ). Ockham's Razor. Encyclopaedia Britannica. 2011. http:\/\/www.britannica.com\/EBchecked\/topic\/424706\/Ockhams-razor (Last Accessed: May 30, 2011)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1098-2736(199601)33:1<101::AID-TEA6>3.0.CO;2-Z"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00869953"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132960.1132961"},{"key":"e_1_3_2_1_63_1","volume-title":"Proceedings of the 12th Colloquium for Information Systems Security Education","author":"Dittrich D.","year":"2008","unstructured":"Dittrich , D. , On Developing Tomorrow's \"Cyber Warriors\". In Proceedings of the 12th Colloquium for Information Systems Security Education ( Dallas, Texas, USA), June 2--4 , 2008 . Dittrich, D., On Developing Tomorrow's \"Cyber Warriors\". In Proceedings of the 12th Colloquium for Information Systems Security Education (Dallas, Texas, USA), June 2--4, 2008."},{"key":"e_1_3_2_1_64_1","volume-title":"Proceedings of the Ninth Colloquium for Information Systems Security Education","author":"White G. B.","year":"2005","unstructured":"White , G. B. and Williams , D ., Collegiate Cyber Defense Competitions . In Proceedings of the Ninth Colloquium for Information Systems Security Education ( Atlanta, Georgia), The ISSA Journal , October 2005 . White, G. B. and Williams, D., Collegiate Cyber Defense Competitions. In Proceedings of the Ninth Colloquium for Information Systems Security Education (Atlanta, Georgia), The ISSA Journal, October 2005."},{"key":"e_1_3_2_1_65_1","volume-title":"Proceedings of the Tenth Colloquium for Information Systems Security Education","author":"White G. B.","year":"2006","unstructured":"White , G. B. and Williams , D ., The National Collegiate Cyber Defense Competition . In Proceedings of the Tenth Colloquium for Information Systems Security Education ( Baltimore, MD ), June 2006 . White, G. B. and Williams, D., The National Collegiate Cyber Defense Competition. In Proceedings of the Tenth Colloquium for Information Systems Security Education (Baltimore, MD), June 2006."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.169"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.320"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2010.3"},{"key":"e_1_3_2_1_69_1","volume-title":"May 26","author":"Lah K.","year":"2011","unstructured":"Lah , K. , Sony Loses Billions Amid Consumer Rage. CNN , May 26 , 2011 . http:\/\/www.cnn.com\/video\/?\/video\/business\/2011\/05\/26\/lah.japan.sony.woes.cnn ( Last Accessed : June 2, 2011). Lah, K., Sony Loses Billions Amid Consumer Rage. CNN, May 26, 2011. http:\/\/www.cnn.com\/video\/?\/video\/business\/2011\/05\/26\/lah.japan.sony.woes.cnn (Last Accessed: June 2, 2011)."},{"key":"e_1_3_2_1_70_1","volume-title":"June 2","author":"Aamoth D.","year":"2011","unstructured":"Aamoth , D. , New Sony Hack Claims Over a Million User Passwords. Time , June 2 , 2011 . http:\/\/techland.time.com\/2011\/06\/02\/new-sony-hack-claims-one-million-user-passwords\/ ( Last Accessed : June 2, 2011). Aamoth, D., New Sony Hack Claims Over a Million User Passwords. Time, June 2, 2011. http:\/\/techland.time.com\/2011\/06\/02\/new-sony-hack-claims-one-million-user-passwords\/ (Last Accessed: June 2, 2011)."},{"key":"e_1_3_2_1_71_1","volume-title":"US defence firm Lockheed Martin hit by cyber-attack","author":"BBC","year":"2011","unstructured":"BBC , US defence firm Lockheed Martin hit by cyber-attack . British Broadcasting Corporation , May 30, 2011 . http:\/\/www.bbc.co.uk\/news\/world-us-canada-13587785 (Last Accessed: May 30, 2011). BBC, US defence firm Lockheed Martin hit by cyber-attack. British Broadcasting Corporation, May 30, 2011. http:\/\/www.bbc.co.uk\/news\/world-us-canada-13587785 (Last Accessed: May 30, 2011)."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.51"}],"event":{"name":"SIGITE' 11: ACM Special Interest Group for Information Technology Education Conference","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"location":"West Point New York USA","acronym":"SIGITE' 11"},"container-title":["Proceedings of the 2011 conference on Information technology education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2047594.2047628","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2047594.2047628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:55Z","timestamp":1750240135000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2047594.2047628"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,20]]},"references-count":72,"alternative-id":["10.1145\/2047594.2047628","10.1145\/2047594"],"URL":"https:\/\/doi.org\/10.1145\/2047594.2047628","relation":{},"subject":[],"published":{"date-parts":[[2011,10,20]]},"assertion":[{"value":"2011-10-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}