Category Archives: Research

IAS research survey for federal workers and contractors

Posted on by Mary Brown

Below is a link to a graduate survey related to IAS that needs federal government, military and contractors to participate. The survey has 26 questions and takes 10-20 minutes to complete. IAS Research Survey

CISSE – Call For Papers

Posted on by Mary Brown

The Colloquium for Information Systems Security Education has posted a call for papers to be submitted in relationship with their conference in San Diego in June. Paper submission deadline is March 15th, 2014. Details are in the link below: http://us6.campaign-archive1.com/?=4f21661f1350898b24c6690f0&id=5014c96432&e=ee54fe0c58

NSA information security research paper competition

Posted on by Mary Brown

The NSA is holding a competition for authors of information security focused research papers. See the attached document for details. NSA_paper_compads-12.20

Learner Spotlight: Brian Toevs, PhD

Posted on by Dr. Steven Brown

Capella Learner Brian Toevs just completed his dissertation, “THE INFLUENCE OF WRITTEN INFORMATION SECURITY POLICY ON DIGITAL FORENSIC DATA ANALYSIS: A CASE STUDY OF LAW ENFORCEMENT AND PRIVATE INVESTIGATIVE OPERATIONS ” The purpose of this qualitative case study was to … Continue reading

Learner Spotlight: Dr. Yohannes Tadesse

Posted on by Dr. Steven Brown

Capella Learner Yohannes Tadesse just completed his dissertation, “An Investigation of Influencing Factors for Adopting Federated Identity Authentication in Service-Oriented Architecture (SOA)” The dissertation explored information technology (IT) decision-makers’ perceptions and the influencing factors that might contribute towards the adoption … Continue reading

Password Policy Research

Posted on by Mary Brown

Password policy has long been a topic of debate in the information security community. Here is an interesting study that suggests that users can be overwhelmed by aggressive policies and may do more harm than good. Check it out and … Continue reading

Posted in Current Topics, Research, Security | | Leave a comment