Security-Related Research and Projects in Computing Promote Student Awareness of Security Issues

Security informatics represents a paradigm shift in university curricula in computing. In order to meet this challenge we will require a systemic curriculum change beyond the usual local course and program changes that have successfully handled smaller technological advances and shifts in the past. One of the novel approaches we use to teach information security at Pace University is to introduce security-related topics, research, and projects into our existing CSIS courses. We teach our masters and doctoral students how to conduct research and write dissertations in a number of areas of computing. Also, our student project teams at both the graduate and undergraduate levels are accustomed to developing real-world computer information systems for actual customers. In recent years, and especially since 9/11, we not only direct more of our faculty research toward security issues but also encourage more security-related student research and supervise more security-related student projects, as well as devoting more lessons to security topics in our courses. This paper gives an overview of our novel approach to teaching information security awareness through our research and projects.

[1]  Jie Zou,et al.  Interactive visual pattern recognition , 2002, Object recognition supported by user interaction for service robots.

[2]  Ch Chen,et al.  Pattern recognition and artificial intelligence , 1976 .

[3]  Sung-Hyuk Cha,et al.  Interactive Flag Identification Using Image Retrieval Techniques , 2004, CISST.

[4]  Peter J. Denning,et al.  The Profession of IT: The core of the third-wave professional , 2001, CACM.

[5]  Sung-Hyuk Cha,et al.  Establishing the Uniqueness of the Human Voice for Security Applications , 2004 .

[6]  C. Tappert,et al.  The Detection of Forged Handwriting Using a Fractal Number Estimate of Wrinkliness , 2003 .

[7]  Sung-Hyuk Cha,et al.  Multimodal integration of voice and ink for pervasive computing , 2002, Fourth International Symposium on Multimedia Software Engineering, 2002. Proceedings..

[8]  Woodrow Barfield,et al.  Military Applications of Wearable Computers and Augmented Reality , 2001 .

[9]  Sung-Hyuk Cha,et al.  A voice and ink XML multimodal architecture for mobile e-commerce systems , 2002, WMC '02.

[10]  Sung-Hyuk Cha,et al.  Interactive Visual System , 2003 .

[11]  Charles C. Tappert,et al.  Wireless Technologies in Pre-Hospital Communications =An Analysis for Northern Westchester Hospital , 2002 .

[12]  Sung-Hyuk Cha,et al.  Use of Histogram Distances in Iris Authentication , 2004, IC-AI.

[13]  Sung-Hyuk Cha,et al.  A Neural Network Classifier for Junk E-Mail , 2004, Document Analysis Systems.

[14]  Susan M. Merritt,et al.  The Doctor of Professional Studies in Computing: An Innovative Professional Doctoral Program , 2001 .

[15]  Charles C. Tappert,et al.  Migrating an Application to Java2 Micro Edition: From Port to Portability , 2002 .

[16]  Jonathan K Law,et al.  An efficient first pass of a two-stage approach for automatic language identification of telephone speech , 2002 .

[17]  Sung-Hyuk Cha,et al.  Automatic Detection Of Handwriting Forgery Using A Fractal Number Estimate Of Wrinkliness , 2004, Int. J. Pattern Recognit. Artif. Intell..

[18]  Sung-Hyuk Cha Assessing the discriminative power of Voice , 2004 .

[19]  William Baker,et al.  User Verification System , 2002 .

[20]  Sung-Hyuk Cha,et al.  Writer Identification: Statistical Analysis and Dichotomizer , 2000, SSPR/SPR.

[21]  Charles C. Tappert,et al.  A pervasive computing solution to asset, problem and knowledge management , 2002 .

[22]  Sung-Hyuk Cha,et al.  Individuality of handwriting. , 2002, Journal of forensic sciences.

[23]  Sung-Hyuk Cha,et al.  Use of distance measures in handwriting analysis , 2001 .

[24]  Sung-Hyuk Cha,et al.  Automatic detection of handwriting forgery , 2002, Proceedings Eighth International Workshop on Frontiers in Handwriting Recognition.