{"title":"Security Management at the University of Denver University College","authors":"John Hill","doi":"10.1300/J460V02N04_12","DOIUrl":"https://doi.org/10.1300/J460V02N04_12","url":null,"abstract":"ABSTRACT Security is a $100 billion annual business and is one of the fastest growing professions in the United States and worldwide. To obtain the skills and business training necessary to protect against new threats, security management professionals require higher education and advanced training. The University of Denver University College developed a robust security curriculum to meet the professional's needs by offering a Master of Applied Science in Security Management and a Certificate of Advanced Study in Security.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117164194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characteristics and Outcomes of Insurance Claims Involving Losses from Theft","authors":"Shaun L. Gabbidon, Lakiesha N. Marzette","doi":"10.1300/J460v02n04_03","DOIUrl":"https://doi.org/10.1300/J460v02n04_03","url":null,"abstract":"ABSTRACT This research examined state-level cases where businesses sued their insurance company in order to recoup losses related to theft. The study was based on 70 civil suits that provided the characteristics and outcomes of such litigation. In general, the cases revealed the following: Such legal suits were on the rise; males more than females were involved in the incidents in which the loss occurred; those in nonmanagerial positions were most often the employees who caused the loss; larceny, and embezzlement were most often the ways in which losses occurred; the cases involved significant losses; and, insurers were compelled to pay all or most of the claim in many of the cases.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114661013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Animal Cruelty and Violent Behavior","authors":"J. McClellan","doi":"10.1300/J460v02n04_04","DOIUrl":"https://doi.org/10.1300/J460v02n04_04","url":null,"abstract":"ABSTRACT During the 1960s a supposition emerged based on a few case studies from anecdotal presentations and varied observational reports that the presence of childhood abuse towards animals was likely a significant precursor or major predictive dynamic for later adult interpersonal violent behavior of violent murderers in particular. This connection was then further applied to the linkage of childhood generalized violent behavior with future adult interpersonal violence. From its earliest presentation coupled with a growing chorus of sociologists and criminologists asserting the linkage assumptions, the supposition rose in the popular consciousness as a key indicator of the violent propensities in children. In 1987 childhood animal cruelty first appeared in the American Psychiatric Association Diagnostic Statistical Manual (III-R) as one of a set of symptoms indicating the presence of conduct disorder and as a factor associated with adult antisocial behavior. This article explores the early history of the linkage between childhood animal abuse and subsequent violent adult behavior in contemporary research and examines the questions involved with whether or not there is a valid connection between the issues of childhood animal abuse and violent interpersonal adult criminal conduct.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121318474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Organized Crime and Technology","authors":"D. Angelini, S. Gibson","doi":"10.1300/J460v02n04_07","DOIUrl":"https://doi.org/10.1300/J460v02n04_07","url":null,"abstract":"ABSTRACT Organized crime is taking advantage of insufficient computer crime legislation in multiple jurisdictions and successfully perpetrating their crimes on the Internet. This article assesses how money laundering and other crimes are facilitated by technology. It concludes with a survey of some of the initiatives in both the European Union (EU) and the US that are aimed at combating this growing problem. It is suggested that in order to address these criminal issues effectively, the initiatives must include all stakeholders and be international in scope. Solutions must include legislative changes, education, and continual cooperation between all interested parties.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116092102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Why Computer Security Courses Are Failing in Community Colleges and the Pitfalls to Avoid","authors":"M. Basham","doi":"10.1300/J460V02N04_06","DOIUrl":"https://doi.org/10.1300/J460V02N04_06","url":null,"abstract":"ABSTRACT Many presentations on curriculum tend to focus upon the best practices. This article is not one of those. Instead this article is a collection of the pitfalls to avoid when building a computer security course, program, or degree. The intent is not to hope that programs fail but to give educators some guidance on the pitfalls to avoid when building computer security programs. This article results from more than seven years of managing, traveling, and lecturing on computer security program development issues.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125813975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ACADEMY OF SECURITY EDUCATORS AND TRAINERS NEWS","authors":"Richard W. Kobetz","doi":"10.1300/J460v02n04_01","DOIUrl":"https://doi.org/10.1300/J460v02n04_01","url":null,"abstract":"","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132553437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trans-System Ruptures and Wireless Solutions","authors":"Shreyas Pandit","doi":"10.1300/J460v02n04_02","DOIUrl":"https://doi.org/10.1300/J460v02n04_02","url":null,"abstract":"ABSTRACT August 14, 2003, a massive power outage cascades through the Northeastern region of North America becoming the largest blackout in the region's history affecting over 50 million people and costing an estimated 4–10 billion US dollars. December 26, 2004, a tsunami triggered by two undersea earthquakes on the Sumatra-Andaman fault-line results in an estimated 300,000 deaths across five regions. August 23 and 29, 2005, the southeastern coast of the United States was hit by Hurricane Katrina, labeled as the most destructive and expensive disasters in US history. The perceived increase in the frequency of disasters over the recent years has prompted increased focus in the development of disaster resilient telecommunication networks. This paper provides an overview of how current telecommunications infrastructure functions during disasters, specifically how it ruptures and the impact it has on post-disaster recovery efforts. Further, the paper investigates possible attempts with wireless technology to prepare the telecommunications infrastructure for crisis communications.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122011785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interview with David Brooks","authors":"John Kostanoski","doi":"10.1300/J460v02n04_10","DOIUrl":"https://doi.org/10.1300/J460v02n04_10","url":null,"abstract":"David Brooks is currently the Security Science Discipline Coordinator in the School of Engineering and Mathematics, Edith Cowan University, Perth, Western Australia. David’s research areas include the security body of knowledge, psychometric risk management and the application of security technology. General duties include the development, management and administration of four undergraduate security science courses, an honour’s, two Master’s courses and a PhD program.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130654200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interview with Michael W. Wanik, CPP, CBCP","authors":"John Kostanoski","doi":"10.1300/J460v02n04_11","DOIUrl":"https://doi.org/10.1300/J460v02n04_11","url":null,"abstract":"","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133016451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"System Hardening","authors":"Nick Clemente","doi":"10.1300/J460v02n04_09","DOIUrl":"https://doi.org/10.1300/J460v02n04_09","url":null,"abstract":"ABSTRACT The rise of sophisticated technology introduces us to the sophisticated adversary. These adversaries force us to increase our defense and security of today's information systems more than ever. The powerful process of system hardening is a good way to increase our defense and security. System hardening is a multilayered system of defense to enhance the security of an information system. My goal here is to fully define the term system hardening and explain its benefits, methods to accomplish it, the tools available to us to secure our systems, the challenges that stand in the way, and the goals of system hardening.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121061215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}