Abstract In the last few years Nova Southeastern University (NSU) has embarked on the development of a comprehensive education and research program in information security. The university offers traditional and distance-learning graduate educational opportunities to information security professionals and those interested in pursuing careers in this critical field. In addition to a variety of educational programs, NSU faculty and students are also pursuing a variety of research efforts in information security which are addressing the current and emerging problems in securing critical information infrastructures. This article provides an overview of the educational programs and research initiatives in information security at NSU.
{"title":"Information Security Education and Research at Nova Southeastern University","authors":"J. Cannady","doi":"10.1300/J460v01n02_10","DOIUrl":"https://doi.org/10.1300/J460v01n02_10","url":null,"abstract":"Abstract In the last few years Nova Southeastern University (NSU) has embarked on the development of a comprehensive education and research program in information security. The university offers traditional and distance-learning graduate educational opportunities to information security professionals and those interested in pursuing careers in this critical field. In addition to a variety of educational programs, NSU faculty and students are also pursuing a variety of research efforts in information security which are addressing the current and emerging problems in securing critical information infrastructures. This article provides an overview of the educational programs and research initiatives in information security at NSU.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126482607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract New and evolving threats to aviation security require innovative and proactive solutions. Boston's Logan International Airport is adopting new methods to screen passengers based on techniques developed in Israel over the past 30 years. Behavior pattern recognition is a form of profiling passengers based not on race or religion but on suspicious and deceitful behavior. This technique is being used in addition to other aviation security measures in an attempt to form a more proactive approach to preventing future terrorist attacks at American airports.
航空安全面临的新威胁和不断演变的威胁需要创新和主动的解决方案。波士顿洛根国际机场(Logan International Airport)正在采用以色列过去30年来开发的技术为基础的新方法来筛查乘客。行为模式识别是一种基于可疑和欺骗行为而不是基于种族或宗教的乘客特征分析形式。这项技术正在与其他航空安全措施一起使用,试图形成一种更积极主动的方法,以防止未来在美国机场发生恐怖袭击。
{"title":"Behavior Pattern Recognition and Aviation Security","authors":"B. Seymour","doi":"10.1300/J460v01n02_06","DOIUrl":"https://doi.org/10.1300/J460v01n02_06","url":null,"abstract":"Abstract New and evolving threats to aviation security require innovative and proactive solutions. Boston's Logan International Airport is adopting new methods to screen passengers based on techniques developed in Israel over the past 30 years. Behavior pattern recognition is a form of profiling passengers based not on race or religion but on suspicious and deceitful behavior. This technique is being used in addition to other aviation security measures in an attempt to form a more proactive approach to preventing future terrorist attacks at American airports.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117271883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Since 1981, the Academy of Security Educators and Trainers (A.S.E.T.) has been conducting the most difficult, honored, and prestigious program in the entire security industry. No other program, and there have been dozens of certifications created over the decades, can make the claims of this professional certification process. To begin with, there are no “grandfathers” or “grandfathering” processes in the entire history of this program since the very first class. The creator of the program, Dr. Richard W. Kobetz, and the elected academy officers in 1981 went through the entire program process with an independent faculty conducting the first session. All candidates from the first class in August 1981 through class 28, in November 2004, have submitted to the entire program process. This legitimate program was created in an attempt to counter the training deficiencies noted and continuing in the security field through the creation of performance standards for security trainers. The Academy created a formal and valid process for men and women who desired to be recognized in a professional manner. As a result, in the history of the Certified Security Trainer (C.S.T.) Program, only 200 candidates have successfully completed the process, including some of the most prominent and recognized authors, professors, practitioners, and research professionals in the field.
{"title":"ACADEMY OF SECURITY EDUCATORS AND TRAINERS NEWS","authors":"Richard W. Kobetz","doi":"10.1300/j460v01n02_01","DOIUrl":"https://doi.org/10.1300/j460v01n02_01","url":null,"abstract":"Since 1981, the Academy of Security Educators and Trainers (A.S.E.T.) has been conducting the most difficult, honored, and prestigious program in the entire security industry. No other program, and there have been dozens of certifications created over the decades, can make the claims of this professional certification process. To begin with, there are no “grandfathers” or “grandfathering” processes in the entire history of this program since the very first class. The creator of the program, Dr. Richard W. Kobetz, and the elected academy officers in 1981 went through the entire program process with an independent faculty conducting the first session. All candidates from the first class in August 1981 through class 28, in November 2004, have submitted to the entire program process. This legitimate program was created in an attempt to counter the training deficiencies noted and continuing in the security field through the creation of performance standards for security trainers. The Academy created a formal and valid process for men and women who desired to be recognized in a professional manner. As a result, in the history of the Certified Security Trainer (C.S.T.) Program, only 200 candidates have successfully completed the process, including some of the most prominent and recognized authors, professors, practitioners, and research professionals in the field.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128690396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract This new column will introduce readers to those educators and trainers whose contributions and scholarly outputs have an enduring quality, and are or promise to be part of the discipline's literature. The column will take the reader on a tour of the theories and practices of security, and the tour guides will be those individuals whose work has shaped the discipline's methods, procedures, processes, and technologies. We are indeed fortunate to be able to launch the column with an interview of James D. Calder, PhD, CPP, from the University of Texas at San Antonio.
这个新专栏将向读者介绍那些教育工作者和培训师,他们的贡献和学术成果具有持久的质量,并且已经或有望成为该学科文献的一部分。本专栏将带领读者了解安全的理论和实践,导游将是那些其工作塑造了该学科的方法、程序、过程和技术的个人。我们确实很幸运,能够以来自圣安东尼奥德克萨斯大学的詹姆斯·d·考尔德(James D. Calder)博士的采访作为专栏的开始。
{"title":"Interview with James D. Calder, PhD, CPP","authors":"John Kostanoski","doi":"10.1300/J460V01N02_09","DOIUrl":"https://doi.org/10.1300/J460V01N02_09","url":null,"abstract":"Abstract This new column will introduce readers to those educators and trainers whose contributions and scholarly outputs have an enduring quality, and are or promise to be part of the discipline's literature. The column will take the reader on a tour of the theories and practices of security, and the tour guides will be those individuals whose work has shaped the discipline's methods, procedures, processes, and technologies. We are indeed fortunate to be able to launch the column with an interview of James D. Calder, PhD, CPP, from the University of Texas at San Antonio.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"6 24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132372884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract In this article, we review the World Wide Web site offerings of Carnegie Mellon's CERT Coordination Center (www.cert.org) with respect to its mission to encourage and foster Internet security strategies and practices. The Web site hosts the Computer Emergency Readiness Team-Internet security computer alert warning system and advanced research in computing security threats and mitigation practices.
{"title":"Carnegie Mellon University's CERT Coordination Center","authors":"J. Totans","doi":"10.1300/J460v01n02_12","DOIUrl":"https://doi.org/10.1300/J460v01n02_12","url":null,"abstract":"Abstract In this article, we review the World Wide Web site offerings of Carnegie Mellon's CERT Coordination Center (www.cert.org) with respect to its mission to encourage and foster Internet security strategies and practices. The Web site hosts the Computer Emergency Readiness Team-Internet security computer alert warning system and advanced research in computing security threats and mitigation practices.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132203402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract The purpose of this paper is to explore how innovative ideas based on game theory can be useful to security professionals and governments in managing the risks posed by a terrorist attack.
本文的目的是探讨基于博弈论的创新思想如何有助于安全专业人员和政府管理恐怖袭击带来的风险。
{"title":"Using Game Theory in Managing the Risks of Terrorism","authors":"B. Seymour","doi":"10.1300/J460v01n01_09","DOIUrl":"https://doi.org/10.1300/J460v01n01_09","url":null,"abstract":"Abstract The purpose of this paper is to explore how innovative ideas based on game theory can be useful to security professionals and governments in managing the risks posed by a terrorist attack.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122699581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The methodology that I employed in developing this United Statesbased academic program list involved gathering information directly from college Websites, and alphabetizing and categorizing by location (state). Also, there are separate sections for online degree programs and international security-related degree programs (English speaking). Many sites did not have a distinct classification for security-related degree programs. Often, information was buried under criminal justice or the computer sciences program listings. There is no single, comprehensive site that displays all the degrees offered in security. It is my intention to remedy this situation and provide a straightforward comprehensive resource with information about new degree programs in this field. Information about the listed institutions was taken from their respective Websites. I do not claim that these descriptions are an original creation, nor does this information necessarily reflect my opinion. Also, I cannot guarantee that the list is free of errors. This list only provides information on accredited degree programs.
{"title":"SECURITY ACADEMIC PROGRAMS","authors":"S. Lancaster, Oneil Cross","doi":"10.1300/J460V01N01_12","DOIUrl":"https://doi.org/10.1300/J460V01N01_12","url":null,"abstract":"The methodology that I employed in developing this United Statesbased academic program list involved gathering information directly from college Websites, and alphabetizing and categorizing by location (state). Also, there are separate sections for online degree programs and international security-related degree programs (English speaking). Many sites did not have a distinct classification for security-related degree programs. Often, information was buried under criminal justice or the computer sciences program listings. There is no single, comprehensive site that displays all the degrees offered in security. It is my intention to remedy this situation and provide a straightforward comprehensive resource with information about new degree programs in this field. Information about the listed institutions was taken from their respective Websites. I do not claim that these descriptions are an original creation, nor does this information necessarily reflect my opinion. Also, I cannot guarantee that the list is free of errors. This list only provides information on accredited degree programs.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121341161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract During the past decade there has been extensive research that has addressed corporate security departments' external relationships with law enforcement. However, little is known about the internal relationships of corporate security with the other business functions in the organization. Security directors and managers from the Fortune 500 and Fortune Service 500 companies were surveyed to assess the corporate security departments' relationship to other business functions and departments within the organization. The major categories of respondents included chemical/pharmaceutical, financial, manufacturing, service, and utilities companies. Respondents were asked about the corporate security departments' relationship to other business functions as well as which executives and departments are closely associated or allied with corporate security. Findings suggest that corporate security is closely aligned with other business functions and works well with other departments. However, the extent to which executives and departments that are associated with corporate security to ensure security within the company varies among the types of industries.
{"title":"Assessing Corporate Security Departments' Internal Relationships and Linkages with Other Business Functions","authors":"Mahesh K. Nalla","doi":"10.1300/J460v01n01_04","DOIUrl":"https://doi.org/10.1300/J460v01n01_04","url":null,"abstract":"Abstract During the past decade there has been extensive research that has addressed corporate security departments' external relationships with law enforcement. However, little is known about the internal relationships of corporate security with the other business functions in the organization. Security directors and managers from the Fortune 500 and Fortune Service 500 companies were surveyed to assess the corporate security departments' relationship to other business functions and departments within the organization. The major categories of respondents included chemical/pharmaceutical, financial, manufacturing, service, and utilities companies. Respondents were asked about the corporate security departments' relationship to other business functions as well as which executives and departments are closely associated or allied with corporate security. Findings suggest that corporate security is closely aligned with other business functions and works well with other departments. However, the extent to which executives and departments that are associated with corporate security to ensure security within the company varies among the types of industries.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"522 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116213662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract John Jay College has offered a degree in security management since 1972. The program now includes three degrees (AS, BS, and MS in Protection Management), two non-matriculate certificate programs, and a facility to provide education and training to the community at large, the Security Management Institute. The article describes the origin of the programs. Emphasis on research and international connections are also discussed. Since the blow to the city and the nation on 9/ 11/01, courses have been revised to include more emphasis on counter-terrorism, cybercrime, and emergency response and mitigation.
{"title":"Serving Security","authors":"Robert D. McCrie","doi":"10.1300/J460V01N01_08","DOIUrl":"https://doi.org/10.1300/J460V01N01_08","url":null,"abstract":"Abstract John Jay College has offered a degree in security management since 1972. The program now includes three degrees (AS, BS, and MS in Protection Management), two non-matriculate certificate programs, and a facility to provide education and training to the community at large, the Security Management Institute. The article describes the origin of the programs. Emphasis on research and international connections are also discussed. Since the blow to the city and the nation on 9/ 11/01, courses have been revised to include more emphasis on counter-terrorism, cybercrime, and emergency response and mitigation.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133474761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract This article discusses the results from 189 pre- and posttest questionnaires that were administered to students taking private security courses at six higher educational institutions. Questions assessed the impact of introductory security courses on students' perceptions of the security occupation and also their desire to take security courses within a traditional criminal justice curriculum. Results showed significant changes in their perceptions of the security occupation, as well as their career aspirations, as a result of having taken a class in private security.
{"title":"Impact of Introductory Security Courses on the Career Choices of Criminal Justice Students","authors":"Brandon R. Kooi, Mahesh K. Nalla","doi":"10.1300/J460V01N01_05","DOIUrl":"https://doi.org/10.1300/J460V01N01_05","url":null,"abstract":"Abstract This article discusses the results from 189 pre- and posttest questionnaires that were administered to students taking private security courses at six higher educational institutions. Questions assessed the impact of introductory security courses on students' perceptions of the security occupation and also their desire to take security courses within a traditional criminal justice curriculum. Results showed significant changes in their perceptions of the security occupation, as well as their career aspirations, as a result of having taken a class in private security.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130688133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}