Journal of Security Education最新文献

筛选
英文 中文
Security Management at the University of Denver University College 丹佛大学学院安全管理专业
Journal of Security Education Pub Date : 2007-12-18 DOI: 10.1300/J460V02N04_12
John Hill
{"title":"Security Management at the University of Denver University College","authors":"John Hill","doi":"10.1300/J460V02N04_12","DOIUrl":"https://doi.org/10.1300/J460V02N04_12","url":null,"abstract":"ABSTRACT Security is a $100 billion annual business and is one of the fastest growing professions in the United States and worldwide. To obtain the skills and business training necessary to protect against new threats, security management professionals require higher education and advanced training. The University of Denver University College developed a robust security curriculum to meet the professional's needs by offering a Master of Applied Science in Security Management and a Certificate of Advanced Study in Security.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117164194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Characteristics and Outcomes of Insurance Claims Involving Losses from Theft 盗窃损失保险索赔的特点与结果
Journal of Security Education Pub Date : 2007-12-18 DOI: 10.1300/J460v02n04_03
Shaun L. Gabbidon, Lakiesha N. Marzette
{"title":"Characteristics and Outcomes of Insurance Claims Involving Losses from Theft","authors":"Shaun L. Gabbidon, Lakiesha N. Marzette","doi":"10.1300/J460v02n04_03","DOIUrl":"https://doi.org/10.1300/J460v02n04_03","url":null,"abstract":"ABSTRACT This research examined state-level cases where businesses sued their insurance company in order to recoup losses related to theft. The study was based on 70 civil suits that provided the characteristics and outcomes of such litigation. In general, the cases revealed the following: Such legal suits were on the rise; males more than females were involved in the incidents in which the loss occurred; those in nonmanagerial positions were most often the employees who caused the loss; larceny, and embezzlement were most often the ways in which losses occurred; the cases involved significant losses; and, insurers were compelled to pay all or most of the claim in many of the cases.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114661013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Animal Cruelty and Violent Behavior 虐待动物和暴力行为
Journal of Security Education Pub Date : 2007-12-18 DOI: 10.1300/J460v02n04_04
J. McClellan
{"title":"Animal Cruelty and Violent Behavior","authors":"J. McClellan","doi":"10.1300/J460v02n04_04","DOIUrl":"https://doi.org/10.1300/J460v02n04_04","url":null,"abstract":"ABSTRACT During the 1960s a supposition emerged based on a few case studies from anecdotal presentations and varied observational reports that the presence of childhood abuse towards animals was likely a significant precursor or major predictive dynamic for later adult interpersonal violent behavior of violent murderers in particular. This connection was then further applied to the linkage of childhood generalized violent behavior with future adult interpersonal violence. From its earliest presentation coupled with a growing chorus of sociologists and criminologists asserting the linkage assumptions, the supposition rose in the popular consciousness as a key indicator of the violent propensities in children. In 1987 childhood animal cruelty first appeared in the American Psychiatric Association Diagnostic Statistical Manual (III-R) as one of a set of symptoms indicating the presence of conduct disorder and as a factor associated with adult antisocial behavior. This article explores the early history of the linkage between childhood animal abuse and subsequent violent adult behavior in contemporary research and examines the questions involved with whether or not there is a valid connection between the issues of childhood animal abuse and violent interpersonal adult criminal conduct.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121318474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Organized Crime and Technology 有组织罪案及科技
Journal of Security Education Pub Date : 2007-12-18 DOI: 10.1300/J460v02n04_07
D. Angelini, S. Gibson
{"title":"Organized Crime and Technology","authors":"D. Angelini, S. Gibson","doi":"10.1300/J460v02n04_07","DOIUrl":"https://doi.org/10.1300/J460v02n04_07","url":null,"abstract":"ABSTRACT Organized crime is taking advantage of insufficient computer crime legislation in multiple jurisdictions and successfully perpetrating their crimes on the Internet. This article assesses how money laundering and other crimes are facilitated by technology. It concludes with a survey of some of the initiatives in both the European Union (EU) and the US that are aimed at combating this growing problem. It is suggested that in order to address these criminal issues effectively, the initiatives must include all stakeholders and be international in scope. Solutions must include legislative changes, education, and continual cooperation between all interested parties.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116092102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Why Computer Security Courses Are Failing in Community Colleges and the Pitfalls to Avoid 为什么社区大学的计算机安全课程不受欢迎以及应该避免的陷阱
Journal of Security Education Pub Date : 2007-12-18 DOI: 10.1300/J460V02N04_06
M. Basham
{"title":"Why Computer Security Courses Are Failing in Community Colleges and the Pitfalls to Avoid","authors":"M. Basham","doi":"10.1300/J460V02N04_06","DOIUrl":"https://doi.org/10.1300/J460V02N04_06","url":null,"abstract":"ABSTRACT Many presentations on curriculum tend to focus upon the best practices. This article is not one of those. Instead this article is a collection of the pitfalls to avoid when building a computer security course, program, or degree. The intent is not to hope that programs fail but to give educators some guidance on the pitfalls to avoid when building computer security programs. This article results from more than seven years of managing, traveling, and lecturing on computer security program development issues.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125813975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ACADEMY OF SECURITY EDUCATORS AND TRAINERS NEWS 安全教育工作者和培训师新闻学院
Journal of Security Education Pub Date : 2007-12-18 DOI: 10.1300/J460v02n04_01
Richard W. Kobetz
{"title":"ACADEMY OF SECURITY EDUCATORS AND TRAINERS NEWS","authors":"Richard W. Kobetz","doi":"10.1300/J460v02n04_01","DOIUrl":"https://doi.org/10.1300/J460v02n04_01","url":null,"abstract":"","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132553437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trans-System Ruptures and Wireless Solutions 跨系统故障和无线解决方案
Journal of Security Education Pub Date : 2007-12-18 DOI: 10.1300/J460v02n04_02
Shreyas Pandit
{"title":"Trans-System Ruptures and Wireless Solutions","authors":"Shreyas Pandit","doi":"10.1300/J460v02n04_02","DOIUrl":"https://doi.org/10.1300/J460v02n04_02","url":null,"abstract":"ABSTRACT August 14, 2003, a massive power outage cascades through the Northeastern region of North America becoming the largest blackout in the region's history affecting over 50 million people and costing an estimated 4–10 billion US dollars. December 26, 2004, a tsunami triggered by two undersea earthquakes on the Sumatra-Andaman fault-line results in an estimated 300,000 deaths across five regions. August 23 and 29, 2005, the southeastern coast of the United States was hit by Hurricane Katrina, labeled as the most destructive and expensive disasters in US history. The perceived increase in the frequency of disasters over the recent years has prompted increased focus in the development of disaster resilient telecommunication networks. This paper provides an overview of how current telecommunications infrastructure functions during disasters, specifically how it ruptures and the impact it has on post-disaster recovery efforts. Further, the paper investigates possible attempts with wireless technology to prepare the telecommunications infrastructure for crisis communications.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122011785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interview with David Brooks 专访大卫·布鲁克斯
Journal of Security Education Pub Date : 2007-12-18 DOI: 10.1300/J460v02n04_10
John Kostanoski
{"title":"Interview with David Brooks","authors":"John Kostanoski","doi":"10.1300/J460v02n04_10","DOIUrl":"https://doi.org/10.1300/J460v02n04_10","url":null,"abstract":"David Brooks is currently the Security Science Discipline Coordinator in the School of Engineering and Mathematics, Edith Cowan University, Perth, Western Australia. David’s research areas include the security body of knowledge, psychometric risk management and the application of security technology. General duties include the development, management and administration of four undergraduate security science courses, an honour’s, two Master’s courses and a PhD program.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130654200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interview with Michael W. Wanik, CPP, CBCP 采访Michael W. Wanik, CPP, CBCP
Journal of Security Education Pub Date : 2007-12-18 DOI: 10.1300/J460v02n04_11
John Kostanoski
{"title":"Interview with Michael W. Wanik, CPP, CBCP","authors":"John Kostanoski","doi":"10.1300/J460v02n04_11","DOIUrl":"https://doi.org/10.1300/J460v02n04_11","url":null,"abstract":"","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133016451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
System Hardening 系统硬化
Journal of Security Education Pub Date : 2007-12-18 DOI: 10.1300/J460v02n04_09
Nick Clemente
{"title":"System Hardening","authors":"Nick Clemente","doi":"10.1300/J460v02n04_09","DOIUrl":"https://doi.org/10.1300/J460v02n04_09","url":null,"abstract":"ABSTRACT The rise of sophisticated technology introduces us to the sophisticated adversary. These adversaries force us to increase our defense and security of today's information systems more than ever. The powerful process of system hardening is a good way to increase our defense and security. System hardening is a multilayered system of defense to enhance the security of an information system. My goal here is to fully define the term system hardening and explain its benefits, methods to accomplish it, the tools available to us to secure our systems, the challenges that stand in the way, and the goals of system hardening.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121061215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信