Journal of Security Education最新文献

筛选
英文 中文
Information Security Education and Research at Nova Southeastern University 诺瓦东南大学信息安全教育与研究
Journal of Security Education Pub Date : 2005-03-03 DOI: 10.1300/J460v01n02_10
J. Cannady
{"title":"Information Security Education and Research at Nova Southeastern University","authors":"J. Cannady","doi":"10.1300/J460v01n02_10","DOIUrl":"https://doi.org/10.1300/J460v01n02_10","url":null,"abstract":"Abstract In the last few years Nova Southeastern University (NSU) has embarked on the development of a comprehensive education and research program in information security. The university offers traditional and distance-learning graduate educational opportunities to information security professionals and those interested in pursuing careers in this critical field. In addition to a variety of educational programs, NSU faculty and students are also pursuing a variety of research efforts in information security which are addressing the current and emerging problems in securing critical information infrastructures. This article provides an overview of the educational programs and research initiatives in information security at NSU.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126482607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Behavior Pattern Recognition and Aviation Security 行为模式识别与航空安全
Journal of Security Education Pub Date : 2005-03-03 DOI: 10.1300/J460v01n02_06
B. Seymour
{"title":"Behavior Pattern Recognition and Aviation Security","authors":"B. Seymour","doi":"10.1300/J460v01n02_06","DOIUrl":"https://doi.org/10.1300/J460v01n02_06","url":null,"abstract":"Abstract New and evolving threats to aviation security require innovative and proactive solutions. Boston's Logan International Airport is adopting new methods to screen passengers based on techniques developed in Israel over the past 30 years. Behavior pattern recognition is a form of profiling passengers based not on race or religion but on suspicious and deceitful behavior. This technique is being used in addition to other aviation security measures in an attempt to form a more proactive approach to preventing future terrorist attacks at American airports.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117271883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ACADEMY OF SECURITY EDUCATORS AND TRAINERS NEWS 安全教育工作者和培训师新闻学院
Journal of Security Education Pub Date : 2005-03-03 DOI: 10.1300/j460v01n02_01
Richard W. Kobetz
{"title":"ACADEMY OF SECURITY EDUCATORS AND TRAINERS NEWS","authors":"Richard W. Kobetz","doi":"10.1300/j460v01n02_01","DOIUrl":"https://doi.org/10.1300/j460v01n02_01","url":null,"abstract":"Since 1981, the Academy of Security Educators and Trainers (A.S.E.T.) has been conducting the most difficult, honored, and prestigious program in the entire security industry. No other program, and there have been dozens of certifications created over the decades, can make the claims of this professional certification process. To begin with, there are no “grandfathers” or “grandfathering” processes in the entire history of this program since the very first class. The creator of the program, Dr. Richard W. Kobetz, and the elected academy officers in 1981 went through the entire program process with an independent faculty conducting the first session. All candidates from the first class in August 1981 through class 28, in November 2004, have submitted to the entire program process. This legitimate program was created in an attempt to counter the training deficiencies noted and continuing in the security field through the creation of performance standards for security trainers. The Academy created a formal and valid process for men and women who desired to be recognized in a professional manner. As a result, in the history of the Certified Security Trainer (C.S.T.) Program, only 200 candidates have successfully completed the process, including some of the most prominent and recognized authors, professors, practitioners, and research professionals in the field.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128690396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interview with James D. Calder, PhD, CPP 采访詹姆斯·d·考尔德,博士,CPP
Journal of Security Education Pub Date : 2005-03-03 DOI: 10.1300/J460V01N02_09
John Kostanoski
{"title":"Interview with James D. Calder, PhD, CPP","authors":"John Kostanoski","doi":"10.1300/J460V01N02_09","DOIUrl":"https://doi.org/10.1300/J460V01N02_09","url":null,"abstract":"Abstract This new column will introduce readers to those educators and trainers whose contributions and scholarly outputs have an enduring quality, and are or promise to be part of the discipline's literature. The column will take the reader on a tour of the theories and practices of security, and the tour guides will be those individuals whose work has shaped the discipline's methods, procedures, processes, and technologies. We are indeed fortunate to be able to launch the column with an interview of James D. Calder, PhD, CPP, from the University of Texas at San Antonio.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"6 24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132372884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Carnegie Mellon University's CERT Coordination Center 卡内基梅隆大学CERT协调中心
Journal of Security Education Pub Date : 2005-03-03 DOI: 10.1300/J460v01n02_12
J. Totans
{"title":"Carnegie Mellon University's CERT Coordination Center","authors":"J. Totans","doi":"10.1300/J460v01n02_12","DOIUrl":"https://doi.org/10.1300/J460v01n02_12","url":null,"abstract":"Abstract In this article, we review the World Wide Web site offerings of Carnegie Mellon's CERT Coordination Center (www.cert.org) with respect to its mission to encourage and foster Internet security strategies and practices. The Web site hosts the Computer Emergency Readiness Team-Internet security computer alert warning system and advanced research in computing security threats and mitigation practices.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132203402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Using Game Theory in Managing the Risks of Terrorism 运用博弈论管理恐怖主义风险
Journal of Security Education Pub Date : 2004-11-11 DOI: 10.1300/J460v01n01_09
B. Seymour
{"title":"Using Game Theory in Managing the Risks of Terrorism","authors":"B. Seymour","doi":"10.1300/J460v01n01_09","DOIUrl":"https://doi.org/10.1300/J460v01n01_09","url":null,"abstract":"Abstract The purpose of this paper is to explore how innovative ideas based on game theory can be useful to security professionals and governments in managing the risks posed by a terrorist attack.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122699581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SECURITY ACADEMIC PROGRAMS 安全学术课程
Journal of Security Education Pub Date : 2004-11-11 DOI: 10.1300/J460V01N01_12
S. Lancaster, Oneil Cross
{"title":"SECURITY ACADEMIC PROGRAMS","authors":"S. Lancaster, Oneil Cross","doi":"10.1300/J460V01N01_12","DOIUrl":"https://doi.org/10.1300/J460V01N01_12","url":null,"abstract":"The methodology that I employed in developing this United Statesbased academic program list involved gathering information directly from college Websites, and alphabetizing and categorizing by location (state). Also, there are separate sections for online degree programs and international security-related degree programs (English speaking). Many sites did not have a distinct classification for security-related degree programs. Often, information was buried under criminal justice or the computer sciences program listings. There is no single, comprehensive site that displays all the degrees offered in security. It is my intention to remedy this situation and provide a straightforward comprehensive resource with information about new degree programs in this field. Information about the listed institutions was taken from their respective Websites. I do not claim that these descriptions are an original creation, nor does this information necessarily reflect my opinion. Also, I cannot guarantee that the list is free of errors. This list only provides information on accredited degree programs.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121341161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing Corporate Security Departments' Internal Relationships and Linkages with Other Business Functions 评估公司安全部门与其他业务部门的内部关系和联系
Journal of Security Education Pub Date : 2004-11-11 DOI: 10.1300/J460v01n01_04
Mahesh K. Nalla
{"title":"Assessing Corporate Security Departments' Internal Relationships and Linkages with Other Business Functions","authors":"Mahesh K. Nalla","doi":"10.1300/J460v01n01_04","DOIUrl":"https://doi.org/10.1300/J460v01n01_04","url":null,"abstract":"Abstract During the past decade there has been extensive research that has addressed corporate security departments' external relationships with law enforcement. However, little is known about the internal relationships of corporate security with the other business functions in the organization. Security directors and managers from the Fortune 500 and Fortune Service 500 companies were surveyed to assess the corporate security departments' relationship to other business functions and departments within the organization. The major categories of respondents included chemical/pharmaceutical, financial, manufacturing, service, and utilities companies. Respondents were asked about the corporate security departments' relationship to other business functions as well as which executives and departments are closely associated or allied with corporate security. Findings suggest that corporate security is closely aligned with other business functions and works well with other departments. However, the extent to which executives and departments that are associated with corporate security to ensure security within the company varies among the types of industries.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"522 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116213662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Serving Security 安全服务
Journal of Security Education Pub Date : 2004-11-11 DOI: 10.1300/J460V01N01_08
Robert D. McCrie
{"title":"Serving Security","authors":"Robert D. McCrie","doi":"10.1300/J460V01N01_08","DOIUrl":"https://doi.org/10.1300/J460V01N01_08","url":null,"abstract":"Abstract John Jay College has offered a degree in security management since 1972. The program now includes three degrees (AS, BS, and MS in Protection Management), two non-matriculate certificate programs, and a facility to provide education and training to the community at large, the Security Management Institute. The article describes the origin of the programs. Emphasis on research and international connections are also discussed. Since the blow to the city and the nation on 9/ 11/01, courses have been revised to include more emphasis on counter-terrorism, cybercrime, and emergency response and mitigation.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133474761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impact of Introductory Security Courses on the Career Choices of Criminal Justice Students 安全入门课程对刑事司法专业学生职业选择的影响
Journal of Security Education Pub Date : 2004-11-11 DOI: 10.1300/J460V01N01_05
Brandon R. Kooi, Mahesh K. Nalla
{"title":"Impact of Introductory Security Courses on the Career Choices of Criminal Justice Students","authors":"Brandon R. Kooi, Mahesh K. Nalla","doi":"10.1300/J460V01N01_05","DOIUrl":"https://doi.org/10.1300/J460V01N01_05","url":null,"abstract":"Abstract This article discusses the results from 189 pre- and posttest questionnaires that were administered to students taking private security courses at six higher educational institutions. Questions assessed the impact of introductory security courses on students' perceptions of the security occupation and also their desire to take security courses within a traditional criminal justice curriculum. Results showed significant changes in their perceptions of the security occupation, as well as their career aspirations, as a result of having taken a class in private security.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130688133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信