Consider the risk management of information and the principles of risk themselves. Do we have a culture that is working so far to right of the normalized curve of expectations that we’re expending huge amounts of resources for very little…
Concept Map: Enterprise Risk Management
EDIT 2/27/2012 — A lot of people are showing up looking at this lately. I have an update on it that I can post if you are interested. Using the comment function is onerous but let me know if you…
An argument for a comprehensive definition of cyberspace
Contention: There is a contention that cyber is the electromagnetic spectrum and that point is countered by a position that cyber is larger than or composed of more than the electromagnetic spectrum. The proponents of the electromagnetic spectrum say that cyber…
Who would show up at your funeral?
The Internet has done strange things to us. We think we are more important than we are and we have ways to measure that. We think we have relationships with people we have never met and are not likely to…
Evaluation of the balance of scholarship and research effecting gender issues of environment and cognitive model processes
Abstract This paper explores two areas of the gender and technology in education issues. The first issue explored is the cultural and environmental issue that has a significant amount of scholarship associated with the specific elements. The second issue is…
Less is more: Orphan computers and mission assurance
Unlike a lot of technologists I don’t have a bevy of personal computers I use. I only have one primary computing device, one phone, and that’s it. Yes I have a couple of computers for work that are used at…
The scientist dilemma: How innovation was murdered by politicians
I see a problem with the continuing move toward corporate science. As corporations upgrade their research arms (good) there is not an associated upgrade to public research (bad). I trace a lot of the current scientific redundancy back to the…
Draft: Cyber paradigm: Depiction of educational divergence
Another graphic from Sam’s little black book of ideas. This graphic is based on a lot of work I did while at Purdue. There isn’t anybody looking at the cyber schism currently, but what it shows is the difference in…
Some effects of technology on music and protest
Abstract This paper discusses the issues of technology, music, and the intersection with social movements such as protest. Relying heavily on discussion of the guitar and music hall as examples where technology has created radical change the discussion centers on…
Changing Tactics: Swarm and air power
David Ronfeldt and John Arquilla in the early 2000s discussed as part of Network-centric Warfare the concept of swarming. Large scale forces working autonomously with heightened capacity but perhaps lower cost and capability are able to work effectively against opponents.…
A laboratory-based course on wireless security
Abstract The objective of this paper is to provide information on how to create a course that informs students how to secure a wireless local area network (WLAN) through the execution of laboratory exercises. The expectation is that students will…
Creating appropriate paranoia within information assurance and security courses
Abstract The requisite behavior of paranoia in dealing with information assurance and security topics building towards a professional or subject matter expert is highly valued. Specifically the behaviors of inquiry and awareness leading to informed suspicion and paranoia in evaluating…
Considerations of defense in depth
Abstract Can we accept that the security of information is not the same as the security of systems? If you were to draw a Venn diagram of the two they would intersect but neither would encompass the other. Or, would…
The myth of retraining
One of the things I hear politicians say, especially near elections, is that the solution to the jobs crisis is for those who are unemployed or under employed to get retraining. This is a myth. It doesn’t help. Here is…
Distributed Computer Forensics: Challenges and Possible Solutions
Abstract When the Internet began a small group of users were involved in the project, and the users knew each other quite well. When you consider the current state of the Internet and the variety of transactions currently taking place…