{"title":"Information Security Education and Research at Nova Southeastern University","authors":"J. Cannady","doi":"10.1300/J460v01n02_10","DOIUrl":"https://doi.org/10.1300/J460v01n02_10","url":null,"abstract":"Abstract In the last few years Nova Southeastern University (NSU) has embarked on the development of a comprehensive education and research program in information security. The university offers traditional and distance-learning graduate educational opportunities to information security professionals and those interested in pursuing careers in this critical field. In addition to a variety of educational programs, NSU faculty and students are also pursuing a variety of research efforts in information security which are addressing the current and emerging problems in securing critical information infrastructures. This article provides an overview of the educational programs and research initiatives in information security at NSU.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126482607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Behavior Pattern Recognition and Aviation Security","authors":"B. Seymour","doi":"10.1300/J460v01n02_06","DOIUrl":"https://doi.org/10.1300/J460v01n02_06","url":null,"abstract":"Abstract New and evolving threats to aviation security require innovative and proactive solutions. Boston's Logan International Airport is adopting new methods to screen passengers based on techniques developed in Israel over the past 30 years. Behavior pattern recognition is a form of profiling passengers based not on race or religion but on suspicious and deceitful behavior. This technique is being used in addition to other aviation security measures in an attempt to form a more proactive approach to preventing future terrorist attacks at American airports.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117271883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ACADEMY OF SECURITY EDUCATORS AND TRAINERS NEWS","authors":"Richard W. Kobetz","doi":"10.1300/j460v01n02_01","DOIUrl":"https://doi.org/10.1300/j460v01n02_01","url":null,"abstract":"Since 1981, the Academy of Security Educators and Trainers (A.S.E.T.) has been conducting the most difficult, honored, and prestigious program in the entire security industry. No other program, and there have been dozens of certifications created over the decades, can make the claims of this professional certification process. To begin with, there are no “grandfathers” or “grandfathering” processes in the entire history of this program since the very first class. The creator of the program, Dr. Richard W. Kobetz, and the elected academy officers in 1981 went through the entire program process with an independent faculty conducting the first session. All candidates from the first class in August 1981 through class 28, in November 2004, have submitted to the entire program process. This legitimate program was created in an attempt to counter the training deficiencies noted and continuing in the security field through the creation of performance standards for security trainers. The Academy created a formal and valid process for men and women who desired to be recognized in a professional manner. As a result, in the history of the Certified Security Trainer (C.S.T.) Program, only 200 candidates have successfully completed the process, including some of the most prominent and recognized authors, professors, practitioners, and research professionals in the field.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128690396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interview with James D. Calder, PhD, CPP","authors":"John Kostanoski","doi":"10.1300/J460V01N02_09","DOIUrl":"https://doi.org/10.1300/J460V01N02_09","url":null,"abstract":"Abstract This new column will introduce readers to those educators and trainers whose contributions and scholarly outputs have an enduring quality, and are or promise to be part of the discipline's literature. The column will take the reader on a tour of the theories and practices of security, and the tour guides will be those individuals whose work has shaped the discipline's methods, procedures, processes, and technologies. We are indeed fortunate to be able to launch the column with an interview of James D. Calder, PhD, CPP, from the University of Texas at San Antonio.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"6 24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132372884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Carnegie Mellon University's CERT Coordination Center","authors":"J. Totans","doi":"10.1300/J460v01n02_12","DOIUrl":"https://doi.org/10.1300/J460v01n02_12","url":null,"abstract":"Abstract In this article, we review the World Wide Web site offerings of Carnegie Mellon's CERT Coordination Center (www.cert.org) with respect to its mission to encourage and foster Internet security strategies and practices. The Web site hosts the Computer Emergency Readiness Team-Internet security computer alert warning system and advanced research in computing security threats and mitigation practices.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132203402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Game Theory in Managing the Risks of Terrorism","authors":"B. Seymour","doi":"10.1300/J460v01n01_09","DOIUrl":"https://doi.org/10.1300/J460v01n01_09","url":null,"abstract":"Abstract The purpose of this paper is to explore how innovative ideas based on game theory can be useful to security professionals and governments in managing the risks posed by a terrorist attack.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122699581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SECURITY ACADEMIC PROGRAMS","authors":"S. Lancaster, Oneil Cross","doi":"10.1300/J460V01N01_12","DOIUrl":"https://doi.org/10.1300/J460V01N01_12","url":null,"abstract":"The methodology that I employed in developing this United Statesbased academic program list involved gathering information directly from college Websites, and alphabetizing and categorizing by location (state). Also, there are separate sections for online degree programs and international security-related degree programs (English speaking). Many sites did not have a distinct classification for security-related degree programs. Often, information was buried under criminal justice or the computer sciences program listings. There is no single, comprehensive site that displays all the degrees offered in security. It is my intention to remedy this situation and provide a straightforward comprehensive resource with information about new degree programs in this field. Information about the listed institutions was taken from their respective Websites. I do not claim that these descriptions are an original creation, nor does this information necessarily reflect my opinion. Also, I cannot guarantee that the list is free of errors. This list only provides information on accredited degree programs.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121341161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing Corporate Security Departments' Internal Relationships and Linkages with Other Business Functions","authors":"Mahesh K. Nalla","doi":"10.1300/J460v01n01_04","DOIUrl":"https://doi.org/10.1300/J460v01n01_04","url":null,"abstract":"Abstract During the past decade there has been extensive research that has addressed corporate security departments' external relationships with law enforcement. However, little is known about the internal relationships of corporate security with the other business functions in the organization. Security directors and managers from the Fortune 500 and Fortune Service 500 companies were surveyed to assess the corporate security departments' relationship to other business functions and departments within the organization. The major categories of respondents included chemical/pharmaceutical, financial, manufacturing, service, and utilities companies. Respondents were asked about the corporate security departments' relationship to other business functions as well as which executives and departments are closely associated or allied with corporate security. Findings suggest that corporate security is closely aligned with other business functions and works well with other departments. However, the extent to which executives and departments that are associated with corporate security to ensure security within the company varies among the types of industries.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"522 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116213662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Serving Security","authors":"Robert D. McCrie","doi":"10.1300/J460V01N01_08","DOIUrl":"https://doi.org/10.1300/J460V01N01_08","url":null,"abstract":"Abstract John Jay College has offered a degree in security management since 1972. The program now includes three degrees (AS, BS, and MS in Protection Management), two non-matriculate certificate programs, and a facility to provide education and training to the community at large, the Security Management Institute. The article describes the origin of the programs. Emphasis on research and international connections are also discussed. Since the blow to the city and the nation on 9/ 11/01, courses have been revised to include more emphasis on counter-terrorism, cybercrime, and emergency response and mitigation.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133474761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of Introductory Security Courses on the Career Choices of Criminal Justice Students","authors":"Brandon R. Kooi, Mahesh K. Nalla","doi":"10.1300/J460V01N01_05","DOIUrl":"https://doi.org/10.1300/J460V01N01_05","url":null,"abstract":"Abstract This article discusses the results from 189 pre- and posttest questionnaires that were administered to students taking private security courses at six higher educational institutions. Questions assessed the impact of introductory security courses on students' perceptions of the security occupation and also their desire to take security courses within a traditional criminal justice curriculum. Results showed significant changes in their perceptions of the security occupation, as well as their career aspirations, as a result of having taken a class in private security.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130688133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}