<html><head><style type='text/css'>p { margin: 0; }</style></head><body><div style='font-family: times new roman,new york,times,serif; font-size: 12pt; color: #000000'><div style="color:#000;font-weight:normal;font-style:normal;text-decoration:none;font-family:Helvetica,Arial,sans-serif;font-size:12pt;"><style>p { margin: 0; }</style><div style="font-family: times new roman,new york,times,serif; font-size: 12pt; color: #000000"><div style="font-style: normal; text-decoration: none; font-family: Helvetica, Arial, sans-serif; font-size: 12pt;"><style>p { margin: 0; }</style><div style="font-family: 'times new roman', 'new york', times, serif; font-size: 12pt;"><div style="font-style: normal; text-decoration: none; font-family: Helvetica, Arial, sans-serif; font-size: 12pt;"><style>p { margin: 0; }</style><div style="font-family: 'times new roman', 'new york', times, serif; font-size: 12pt;"><div style="font-style: normal; text-decoration: none; font-family: Helvetica, Arial, sans-serif; font-size: 12pt;"><style>p { margin: 0; }</style><div style="font-family: 'times new roman', 'new york', times, serif; font-size: 12pt;"><div style="font-style: normal; text-decoration: none; font-family: Helvetica, Arial, sans-serif; font-size: 12pt;"><style>p { margin: 0; }</style><div style="font-family: 'times new roman', 'new york', times, serif; font-size: 12pt;"><div style="font-style: normal; text-decoration: none; font-family: Helvetica, Arial, sans-serif; font-size: 12pt;"><style>p { margin: 0; }</style><div style="font-family: 'times new roman', 'new york', times, serif; font-size: 12pt;"><div style="font-style: normal; text-decoration: none; font-family: Helvetica, Arial, sans-serif; font-size: 12pt;"><style>p { margin: 0; }</style><div style="font-family: 'times new roman', 'new york', times, serif; font-size: 12pt;"><font face="times new roman, new york, times, serif" size="3" style="color: rgb(0, 0, 0); font-weight: normal;"><img src="cid:fe19bbd5cc7eaede79afc00dd602b8824316a706@zimbra"></font><br><div style="text-align: center;"><div style="color: rgb(0, 0, 0); font-weight: normal; background-color: rgb(255, 255, 255);"><font face="times new roman, new york, times, serif" size="4"><b><br></b></font></div><div style="color: rgb(0, 0, 0); font-weight: normal; text-align: left; background-color: rgb(255, 255, 255);"><font face="times new roman, new york, times, serif" size="4"><b>Welcome to the Kennesaw State University Information Security Education News Bulletin</b></font></div><div style="color: rgb(0, 0, 0); font-weight: normal; text-align: start; background-color: rgb(255, 255, 255);"><font face="times new roman, new york, times, serif"></font></div><div style="color: rgb(0, 0, 0); font-weight: normal; text-align: start; background-color: rgb(255, 255, 255);">Please feel free to forward this information to any of your colleagues who may be interested in research, pedagogy, or instruction in <span style="font-size: 12pt;">information security.</span></div><div style="color: rgb(0, 0, 0); font-weight: normal; text-align: start; background-color: rgb(255, 255, 255);"><font face="times new roman, new york, times, serif"><br></font></div><div style="color: rgb(0, 0, 0); font-weight: normal; text-align: start; background-color: rgb(255, 255, 255);"></div><div style="color: rgb(0, 0, 0); font-weight: normal; text-align: start; background-color: rgb(255, 255, 255);"></div><div style="color: rgb(0, 0, 0); font-weight: normal; text-align: start; background-color: rgb(255, 255, 255);"><a href="http://infosec.kennesaw.edu/infoseccd" target="_blank" style="font-size: 12pt; color: rgb(0, 0, 139); text-decoration: none; cursor: pointer;"><b>Information Security Curriculum Development Conference 2014 (InfoSecCD 2014) </b></a></div><div style="text-align: start; background-color: rgb(255, 255, 255);"><font color="#00008b"><b>EARLY REGISTRATION EXTENDED TO 9/15/14</b></font></div><div style="color: rgb(0, 0, 0); font-weight: normal; text-align: start; background-color: rgb(255, 255, 255);"><font face="times new roman, new york, times, serif"><span class="Object" style="color: rgb(0, 0, 139); cursor: pointer;"><span class="Object" style="cursor: pointer;"><b style="color: rgb(0, 0, 139); text-decoration: none; cursor: pointer;"><a href="http://infosec.kennesaw.edu/infoseccd" target="_blank" style="color: rgb(0, 0, 139); text-decoration: none; cursor: pointer;">(http://infosec.kennesaw.edu/infoseccd)</a></b></span></span></font></div><div style="color: rgb(0, 0, 0); font-weight: normal; text-align: start; background-color: rgb(255, 255, 255);"><font face="times new roman, new york, times, serif"><br></font></div><div style="color: rgb(0, 0, 0); font-weight: normal; text-align: start; background-color: rgb(255, 255, 255);"><font face="times new roman, new york, times, serif">Scheduled for October 11, 2014 at the KSU Coles College of Business, Burruss Building (new location, same great campus!). </font></div><div style="color: rgb(0, 0, 0); text-align: start; background-color: rgb(255, 255, 255);"><p class="MsoNormal" style="font-weight: normal; margin-bottom: 0.0001pt; text-align: justify;">InfoSecCD seeks to provide academics, researchers, and
practitioners with an opportunity to share their perspectives with others
interested in the various aspects of Information Security Curriculum
Development. Papers offering novel research contributions in any aspect of
information security education are solicited for submission to the 2014 InfoSecCD
Conference.</p><p class="MsoNormal" style="font-weight: normal; margin-bottom: 0.0001pt; text-align: justify;"><br></p><p class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify;"><b>We have extended early registration to September 15, 2014.</b><span style="font-weight: normal;"> </span></p><p class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify;"><span style="font-weight: normal;"><br></span></p><p class="MsoNormal" style="text-align: center; margin-bottom: 0.0001pt;"><span style="font-weight: normal;">Still the same low price! For registration visit the KSU Mall at </span></p><p class="MsoNormal" style="text-align: center; font-weight: normal; margin-bottom: 0.0001pt;"><a href="https://epay.kennesaw.edu/C20923_ustores/web/store_cat.jsp?STOREID=51&CATID=296" target="_blank">https://epay.kennesaw.edu/C20923_ustores/web/store_cat.jsp?STOREID=51&CATID=296</a> </p><p class="MsoNormal" style="text-align: center; font-weight: normal; margin-bottom: 0.0001pt;">or the conference web site at <a href="http://infosec.kennesaw.edu/infoseccd" target="_blank">http://infosec.kennesaw.edu/infoseccd</a></p>
<p class="MsoNormal" align="center" style="font-weight: normal; margin-bottom: 0.0001pt; text-align: center;"><i><br>
This conference is in cooperation with the ACM SIGMIS with the proceedings to
be published in the ACM Digital Library.</i><b><span style="font-size:12.0pt"></span></b></p><p class="MsoNormal" align="center" style="font-weight: normal; margin-bottom: 0.0001pt; text-align: center;"><br></p><div style="font-weight: normal;"><b style="font-size: 12pt;"><span class="Object" id="OBJ_PREFIX_DWT522_com_zimbra_url" style="color: rgb(0, 0, 139); cursor: pointer;"><span class="Object" id="OBJ_PREFIX_DWT2361_com_zimbra_url" style="cursor: pointer;"><a href="http://socio.org.uk/isej/" target="_blank" style="color: rgb(0, 0, 139); text-decoration: none; cursor: pointer;">Information Security Education Journal - ISEJ (http://socio.org.uk/isej/)</a></span></span></b></div><div style="font-weight: normal;"><font face="times new roman, new york, times, serif"><br></font></div><div style="font-weight: normal;"><font face="times new roman, new york, times, serif">The Center has started a new Journal – the Information Security Education Journal (ISEJ). The ISEJ seeks to collect and publish peer-reviewed, high-quality research, perspectives, and best practice articles on the instructional challenges and innovations associated with Information Security teaching and learning in post-secondary educational settings. Information Security education includes curriculum development and implementation, best practices in the instruction of information security theoretical and practical topics, InfoSec laboratory experiences and exercises, as well as other related pedagogical topics.</font></div><p class="MsoNormal" align="center" style="font-weight: normal; margin-bottom: 0.0001pt; text-align: center;"><i><br></i></p></div><div style="color: rgb(0, 0, 0); font-weight: normal; text-align: start; background-color: rgb(255, 255, 255);"><font face="times new roman, new york, times, serif">If you or any of your colleagues would like to be added to a list to receive future newsletters, be added to the specific mailing list for any of these events, or would simply like more information, please email <span class="Object" id="OBJ_PREFIX_DWT524_com_zimbra_email" style="color: rgb(0, 0, 139); cursor: pointer;"><span class="Object" id="OBJ_PREFIX_DWT2363_com_zimbra_email" style="cursor: pointer;">infosec@kennesaw.edu</span></span>. In your email subject line, please mention the tags of #CISENEWS, </font><font face="times new roman, new york, times, serif"><font face="times new roman, new york, times, serif">#SECCDC, #ISEJ, or </font>#INFOSECCD to be sure we add you to the proper list(s).<br></font></div><div style="color: rgb(0, 0, 0); font-weight: normal; text-align: start; background-color: rgb(255, 255, 255);"><font face="times new roman, new york, times, serif"><br></font></div><div style="color: rgb(0, 0, 0); font-weight: normal; font-size: 12pt; text-align: start; background-color: rgb(255, 255, 255);"><div></div><div><span style="font-size: 12pt;">Regards</span></div></div><div style="color: rgb(0, 0, 0); font-weight: normal; font-size: 12pt; text-align: start; background-color: rgb(255, 255, 255);">Mike Whitman</div></div><div style="color: rgb(0, 0, 0); font-weight: normal; font-family: 'times new roman', 'new york', times, serif; font-size: 12pt;">-- <br><div><span></span>Michael E. Whitman, Ph.D., CISM, CISSP<br>Professor of Information Security, <br>Director, Center for Information Security Education and</div><div>Editor-In-Chief, Information Security Education Journal<br>Department of Information Systems <br>Michael J. Coles College of Business<br>Kennesaw State University - A National Center of Academic Excellence in Information Assurance Education<br>1000 Chastain Rd. MS 1101<br>Kennesaw, GA 30144-5591<br>Ph: 770.499.3568<br>Fx: 770.423.6731<br>Clendenin Building (12) Rm #3061<br>This message (including any attachments) contains confidential information intended for a specific individual and purpose, and is protected by law. If you are not the intended recipient, you should delete this message immediately and are hereby notified that any disclosure, copying or distribution of this message, or the taking of any action based on it, is strictly prohibited.<br>Further, the contents of this email and any attachments it may be associated with may be protected by the copyright laws of the United States.<br><span></span><br></div></div></div></div><br><br><br>-- <br><div style="color: rgb(0, 0, 0); font-weight: normal;"><span></span>Michael E. Whitman, Ph.D., CISM, CISSP<br>Professor of Information Security, <br>Director, Center for Information Security Education and<br>Editor-In-Chief, Information Security Education Journal<br>Department of Information Systems <br>Michael J. Coles College of Business<br>Kennesaw State University - A National Center of Academic Excellence in Information Assurance Education<br>1000 Chastain Rd. MS 1101<br>Kennesaw, GA 30144-5591<br>Ph: 770.499.3568<br>Fx: 770.423.6731<br>Clendenin Building (12) Rm #3061<br>This message (including any attachments) contains confidential information intended for a specific individual and purpose, and is protected by law. If you are not the intended recipient, you should delete this message immediately and are hereby notified that any disclosure, copying or distribution of this message, or the taking of any action based on it, is strictly prohibited.<br>Further, the contents of this email and any attachments it may be associated with may be protected by the copyright laws of the United States.<br><span></span><br></div></div></div><br><br><br>-- <br><div style="color: rgb(0, 0, 0); font-weight: normal;"><span></span>Michael E. Whitman, Ph.D., CISM, CISSP<br>Professor of Information Security, <br>Director, Center for Information Security Education and<br>Editor-In-Chief, Information Security Education Journal<br>Department of Information Systems <br>Michael J. Coles College of Business<br>Kennesaw State University - A National Center of Academic Excellence in Information Assurance Education<br>1000 Chastain Rd. MS 1101<br>Kennesaw, GA 30144-5591<br>Ph: 770.499.3568<br>Fx: 770.423.6731<br>Clendenin Building (12) Rm #3061<br>This message (including any attachments) contains confidential information intended for a specific individual and purpose, and is protected by law. If you are not the intended recipient, you should delete this message immediately and are hereby notified that any disclosure, copying or distribution of this message, or the taking of any action based on it, is strictly prohibited.<br>Further, the contents of this email and any attachments it may be associated with may be protected by the copyright laws of the United States.<br><span></span><br></div></div></div><br><br><br>-- <br><div style="color: rgb(0, 0, 0); font-weight: normal;"><span></span>Michael E. Whitman, Ph.D., CISM, CISSP<br>Professor of Information Security, <br>Director, Center for Information Security Education and<br>Editor-In-Chief, Information Security Education Journal<br>Department of Information Systems <br>Michael J. Coles College of Business<br>Kennesaw State University - A National Center of Academic Excellence in Information Assurance Education<br>1000 Chastain Rd. MS 1101<br>Kennesaw, GA 30144-5591<br>Ph: 770.499.3568<br>Fx: 770.423.6731<br>Clendenin Building (12) Rm #3061<br>This message (including any attachments) contains confidential information intended for a specific individual and purpose, and is protected by law. If you are not the intended recipient, you should delete this message immediately and are hereby notified that any disclosure, copying or distribution of this message, or the taking of any action based on it, is strictly prohibited.<br>Further, the contents of this email and any attachments it may be associated with may be protected by the copyright laws of the United States.<br><span></span><br></div></div></div><br><br><br>-- <br><div style="color: rgb(0, 0, 0); font-weight: normal;"><span></span>Michael E. Whitman, Ph.D., CISM, CISSP<br>Professor of Information Security, <br>Director, Center for Information Security Education and<br>Editor-In-Chief, Information Security Education Journal<br>Department of Information Systems <br>Michael J. Coles College of Business<br>Kennesaw State University - A National Center of Academic Excellence in Information Assurance Education<br>1000 Chastain Rd. MS 1101<br>Kennesaw, GA 30144-5591<br>Ph: 770.499.3568<br>Fx: 770.423.6731<br>Clendenin Building (12) Rm #3061<br>This message (including any attachments) contains confidential information intended for a specific individual and purpose, and is protected by law. If you are not the intended recipient, you should delete this message immediately and are hereby notified that any disclosure, copying or distribution of this message, or the taking of any action based on it, is strictly prohibited.<br>Further, the contents of this email and any attachments it may be associated with may be protected by the copyright laws of the United States.<br><span></span><br></div></div></div><br><br><br>-- <br><div style="color: rgb(0, 0, 0); font-weight: normal;"><span></span>Michael E. Whitman, Ph.D., CISM, CISSP<br>Professor of Information Security, <br>Director, Center for Information Security Education and<br>Editor-In-Chief, Information Security Education Journal<br>Department of Information Systems <br>Michael J. Coles College of Business<br>Kennesaw State University - A National Center of Academic Excellence in Information Assurance Education<br>1000 Chastain Rd. MS 1101<br>Kennesaw, GA 30144-5591<br>Ph: 770.499.3568<br>Fx: 770.423.6731<br>Clendenin Building (12) Rm #3061<br>This message (including any attachments) contains confidential information intended for a specific individual and purpose, and is protected by law. If you are not the intended recipient, you should delete this message immediately and are hereby notified that any disclosure, copying or distribution of this message, or the taking of any action based on it, is strictly prohibited.<br>Further, the contents of this email and any attachments it may be associated with may be protected by the copyright laws of the United States.<br><span></span><br></div></div></div><br><br><br>-- <br><div style="color: rgb(0, 0, 0);"><span></span>Michael E. Whitman, Ph.D., CISM, CISSP<br>Professor of Information Security, <br>Director, Center for Information Security Education and<br>Editor-In-Chief, Information Security Education Journal<br>Department of Information Systems <br>Michael J. Coles College of Business<br>Kennesaw State University - A National Center of Academic Excellence in Information Assurance Education<br>1000 Chastain Rd. MS 0405<br>Kennesaw, GA 30144-5591<br>Ph: 470.578.3568<br>Fx: 770.423.6731<br>Burruss Building Rm # 489<br>This message (including any attachments) contains confidential information intended for a specific individual and purpose, and is protected by law. If you are not the intended recipient, you should delete this message immediately and are hereby notified that any disclosure, copying or distribution of this message, or the taking of any action based on it, is strictly prohibited.<br>Further, the contents of this email and any attachments it may be associated with may be protected by the copyright laws of the United States.<br><span></span><br></div></div></div><br><br><br>-- <br><div id="33517e5e-d613-4e09-96c7-21216fc5c7e5"><span name="x"></span>Michael E. Whitman, Ph.D., CISM, CISSP<br>Professor of Information Security, <br>Director, Center for Information Security Education and<br>Editor-In-Chief, Information Security Education Journal<br>Department of Information Systems <br>Michael J. Coles College of Business<br>Kennesaw State University - A National Center of Academic Excellence in Information Assurance Education<br>1000 Chastain Rd. MS 0405<br>Kennesaw, GA 30144-5591<br>Ph: 470.578.3568<br>Fx: 770.423.6731<br>Burruss Building Rm # 489<br>This message (including any attachments) contains confidential information intended for a specific individual and purpose, and is protected by law. If you are not the intended recipient, you should delete this message immediately and are hereby notified that any disclosure, copying or distribution of this message, or the taking of any action based on it, is strictly prohibited.<br>Further, the contents of this email and any attachments it may be associated with may be protected by the copyright laws of the United States.<br><span name="x"></span><br></div></div></body></html>