{"title":"Securing an Enterprise Level Database Accessed Over the Public Internet","authors":"Michal Králík","doi":"10.1300/J460v02n04_08","DOIUrl":"https://doi.org/10.1300/J460v02n04_08","url":null,"abstract":"ABSTRACT Since the Internet was opened for public and commercial use, companies have pushed their information systems departments to expand the capabilities of electronic communication and e-commerce. Businesses grew based upon their own management of technology, each bringing new ideas and developments to the table. By 2006, it was difficult to find any business that does not have a presence on the Internet. Mere presence is not enough to make a business stand out anymore. To maintain competitiveness in this highly connected world, companies are looking for faster and more secure ways to conduct business. This includes not only the ability to communicate with the customers, but also includes the way different divisions of a company interact with each other electronically. In this paper, I will discuss how one company (referred to as the ABC Corp.) has developed and secured a content management system containing a product information database that produces and controls every sales piece used internally and externally from paper catalogs and sales flyers, to content ready for display on the World Wide Web.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126762569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SECURITY ACADEMIC PROGRAMS","authors":"S. Lancaster","doi":"10.1300/j460v02n03_09","DOIUrl":"https://doi.org/10.1300/j460v02n03_09","url":null,"abstract":"The methodology that I employed in developing this United Statesbased academic program list involved gathering information directly from college Websites, and alphabetizing and categorizing by location (state). Also, there are separate sections for online degree programs and international security-related degree programs (English speaking). Many sites did not have a distinct classification for security-related degree programs. Often, information was buried under criminal justice or the computer sciences program listings. There is no single, comprehensive site that displays all the degrees offered in security. It is my intention to remedy this situation and provide a straightforward comprehensive resource with information about new degree programs in this field. Information about the listed institutions was taken from their respective Websites. I do not claim that these descriptions are an original creation, nor does this information necessarily reflect my opinion. Also, I cannot guarantee that the list is free of errors. This list only provides information on accredited degree programs.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131663802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interview with Hector Torres","authors":"John Kostanoski","doi":"10.1300/J460v02n03_07","DOIUrl":"https://doi.org/10.1300/J460v02n03_07","url":null,"abstract":"Hector Torres has over 25 years of experience in the field of security at the federal and corporate levels. Mr. Torres is a former US Army Intelligence and Special Operations Officer and has held a variety of positions of increasing responsibility as an Intelligence Analyst, Instructor, Special Agent, Staff Officer, and Commander while on active duty. He is a graduate of the US Army’s Airborne, Ranger, Special Forces, Military Intelligence, and Command and General Staff Schools. Mr. Torres has served as","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"269 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115315426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interview with Michael Witkowski, EdD, CPP","authors":"John Kostanoski","doi":"10.1300/J460v02n03_06","DOIUrl":"https://doi.org/10.1300/J460v02n03_06","url":null,"abstract":"","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130107986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facilitating Security Education in an Online Environment","authors":"E. Braude, A. Arakelian","doi":"10.1300/J460V02N03_03","DOIUrl":"https://doi.org/10.1300/J460V02N03_03","url":null,"abstract":"Abstract This paper explores and describes die different facets of facilitating an online security course. It describes the purpose of a facilitator, the qualifications necessary for a facilitator, defines the role of the facilitator, and finally describes the activities of a facilitator.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122433908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unsolved Homicides","authors":"J. McClellan","doi":"10.1300/J460v02n03_05","DOIUrl":"https://doi.org/10.1300/J460v02n03_05","url":null,"abstract":"Abstract In 1960 when the homicide rate in the United States was 9,110 the clearance rate stood at 92% (FBI, 1997), accounting for the clearance of 8,382 murders (Harris, Thomas, Fisher, & Hirsch, 2002; Regoeczi & Miethe, 2003; Litwin, 2004). Unfortunately, by 2002 the reported number of homicides solved and cleared by arrests had dipped to 62% (FBI, 2002). The unsolved rate in 2002 in the United States represented a 76% increase since 1960. The increase in unsolved/ uncleared homicide offenses has grown during the last 45 years in spite of the advances in investigative technologies, educational and training enhancements for investigators, and operational emphasis by law enforcement agencies towards community policing. The article explores issues and inferences from current research regarding reasons for the decline in the past decades in the solving of homicides in the United States. doi:10.1300/J460v02n03_05","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115984419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Form vs Substance","authors":"Lawrence A. Howard","doi":"10.1300/J460V02N03_02","DOIUrl":"https://doi.org/10.1300/J460V02N03_02","url":null,"abstract":"Abstract The tradition at maritime academies, however hands-on and robust, like any other institution or organization, is not immune to standard dysfunctions. They suffer everything from bureaucratic inertia to strategic ambiguities, yet can also demonstrate vision and resilience. This case study tells the story of how an innovative project originated, and how it grew to encompass a global vision of collaborative security education and training, doi: 10.1300/J460v02n03_02","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129258321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ACADEMY OF SECURITY EDUCATORS AND TRAINERS NEWS","authors":"Richard W. Kobetz","doi":"10.1300/j460v02n03_01","DOIUrl":"https://doi.org/10.1300/j460v02n03_01","url":null,"abstract":"","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129342115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interview with L. A. Wansley","authors":"John Kostanoski","doi":"10.1300/J460v02n02_07","DOIUrl":"https://doi.org/10.1300/J460v02n02_07","url":null,"abstract":"Mr. Wansley started his police career with the Compton, California Police Department in 1965 and rose to the position of commander of the detective division. In 1973 he became a Special Agent with the Federal Bureau of Investigations and specialized in long-term, deep undercover investigations involving white-collar crime, organized crime, and public corruption. He performed as the principal operative in dozens of high-profile nationwide investigations, including $55 million in recoveries and seizures and hundreds of arrests and convictions of major elected and appointed officials. He served as a Staff Counselor at the FBI National Academy in Quantico, Virginia. In 1983 he was appointed the Director of Team Operations for the Dallas Cowboys Football Club and Vice President, Texas Stadium Corporation. He went on a leave of absence from the Dallas Cowboys in 1988 to manage international security operations for Whitney Houston’s 1988 World Tour. He was responsible for the safety of this world-class artist and the one hundred plus personnel who went on to give 163 concert performances in 14 countries and 65 cities. During the tour he coordinated operations with U.S. and foreign governments and law","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127959636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"www.honeywell.com","authors":"J. Totans","doi":"10.1300/J460v02n02_08","DOIUrl":"https://doi.org/10.1300/J460v02n02_08","url":null,"abstract":"Abstract In this article we will look at the Web site offerings from Honeywell, specifically, the Web pages which support their security products business unit. As stated in the corporation's prospectus: Honeywell International Inc. is a diversified technology and manufacturing company, serving customers worldwide with aerospace products and services, control, sensing and security technologies for buildings, homes and industry, turbochargers, automotive products, specialty chemicals, fibers, and electronic and advanced materials. Our interest lies in evaluating how effective the company designs and implements its Internet Web pages to advance its corporate objectives. Foremost among these objectives is customer support for its products and services. For our purposes, we address and evaluate the company's support for its security product line.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"353 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124466092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}