<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Security and Computer Forensics in Web Engineering Education</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">William</forename><forename type="middle">Bradley</forename><surname>Glisson</surname></persName>
							<email>b.glisson@hatii.arts.gla.ac.uk</email>
							<affiliation key="aff0">
								<orgName type="department">HATII</orgName>
								<orgName type="institution">University of Glasgow</orgName>
								<address>
									<addrLine>11 University Gardens</addrLine>
									<postCode>G12 8QQ</postCode>
									<settlement>Glasgow</settlement>
									<country key="GB">United Kingdom</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ray</forename><surname>Welland</surname></persName>
							<affiliation key="aff1">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Glasgow</orgName>
								<address>
									<addrLine>Sir Alwyn Williams Building</addrLine>
									<postCode>G12 8QQ</postCode>
									<settlement>Glasgow</settlement>
									<country key="GB">United Kingdom</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">L</forename><forename type="middle">Milton</forename><surname>Glisson</surname></persName>
							<email>glissonm@ncat.edu</email>
							<affiliation key="aff2">
								<orgName type="department">School of Business and Economics</orgName>
								<orgName type="institution">N.C. A&amp;T State University</orgName>
								<address>
									<addrLine>1601 East Market Street</addrLine>
									<postCode>27411</postCode>
									<settlement>Greensboro</settlement>
									<region>NC</region>
									<country key="US">USA</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Security and Computer Forensics in Web Engineering Education</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">6D7B22A04BE148B4A97ADDF60E56F4E9</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T23:20+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Web Engineering</term>
					<term>Security</term>
					<term>Computer Forensics</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually. Security is frequently taught as a stand-alone course, assuming that security can be 'bolted on' to a web application at some point. Security issues must be integrated into Web Engineering processes right from the beginning to create secure solutions and therefore security should be an integral part of a Web Engineering curriculum. One aspect of Computer forensics investigates failures in security. Hence, students should be aware of the issues in forensics and how to respond when security failures occur; collecting evidence is particularly difficult for Web-based applications.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The integration of security and forensics into Web applications is imperative! Deloitte's latest survey indicates that organizations are becoming more frugal, more demanding and more cynical through a reduction in spending and reliance on metrics when it comes to the implementation of security <ref type="bibr" target="#b0">[1]</ref>. The latest report form PricewaterhouseCoopers (PwC) echoes this message indicating that "security spending is under pressure. Most executives are eyeing strategies to cancel, defer or downsize security-related initiatives" <ref type="bibr" target="#b1">[2]</ref>. The Internet Crime Complaint Center (IC 3 ) Report indicates that complaints increased by 22.3% in 2009 as compared to 2008. This translates into a total dollar loss from referred cases to be $559.7 million, more than doubling the 2008 loss of $246.6 million <ref type="bibr">[3]</ref>. A substantial portion of the complaints had to do with some form of fraud <ref type="bibr">[3]</ref>.</p><p>According to the UK Cards Association "Online banking losses totaled £59.7 million in 2009 -a 14 per cent rise on the 2008 figure." They go on to indicate that "This increase is largely due to criminals using more sophisticated methods to target online banking customers through malware, which targets vulnerabilities in customers' PCs, rather than the banks' own systems…" <ref type="bibr" target="#b2">[4]</ref>. This indicates that criminals are, possibly, becoming savvier in their attacks and that Web engineering needs to expand its scope to cover the entire transaction process; not just specific systems. Web Engineering has been defined as:</p><p>"the application of systematic, disciplined and quantifiable approaches to development, operation, and maintenance of Web-based applications" <ref type="bibr" target="#b3">[5,</ref><ref type="bibr" target="#b4">6]</ref>.</p><p>It is important to recognize that previous definitions of Web Engineering do not inherently make any direct references to security or forensics, consequently, today's Web applications face increased susceptibility to major security problems. This information highlights the need for academic institutions to integrate security and computer forensics' concepts and practices throughout Web engineering curricula.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Curricula</head><p>The idea for the implementation of security into systems has been around for a while as witnessed by the creation of a number of Information Assurance academic programs in the United States <ref type="bibr">[7]</ref>. Several of these programs are listed on the National Security Agency's (NSA) Web site for Centers of Academic Excellence <ref type="bibr">[7]</ref>. Papers have been published on the implementation of security curricula <ref type="bibr" target="#b5">[8]</ref> and the integration of security ethics <ref type="bibr" target="#b6">[9]</ref> into education. They have also been published on laboratory based solutions that implement information security knowledge <ref type="bibr" target="#b7">[10]</ref> and Internet security <ref type="bibr" target="#b8">[11]</ref> into education. However, these approaches offer very broad solutions to the security problem. Universities that are specifically offering curricula in Web Engineering should address business, security and forensics needs throughout all aspects of the Web Engineering curriculum.</p><p>From a Web Engineering perspective, an understanding of security needs to be established that includes how security has evolved, the legislation, regulation and certifications that impact security. It includes the implementation of security from a methodology perspective and discussions about how security fits into different application development methodologies. It would also need to address practical lab based implementation scenarios that reinforces concepts put forth in lectures.</p><p>There are a limited number of courses being offered in Web engineering and few complete programs to-date. On the postgraduate level, the University of Western Sydney offers a track in a Masters program <ref type="bibr" target="#b9">[12]</ref>. Deshpande, from the University of Western Sydney, has put forth ideas for a Web Engineering curriculum and has proposed six levels of complexity that need to be addressed in the curriculum <ref type="bibr" target="#b4">[6]</ref>. However, it can be argued that there is a seventh level of complexity that needs to be explicitly addressed and that is Web Engineering Security! Whitehead <ref type="bibr" target="#b10">[13]</ref> proposed a curriculum for a masters program in Web Engineering. However, he does not discuss, at any point in the paper, security.</p><p>North Carolina A&amp;T State University has proposed a complete undergraduate program in Web Engineering <ref type="bibr" target="#b9">[12]</ref>. However, to-date from their Web site this program does not appear to be currently available. The paper that they put forth to propose the program does mention security twice. The first occurrence is in the class description for the Introduction to Web Engineering where they state that students will learn "how to incorporate security feature(s) into web sites" <ref type="bibr" target="#b9">[12]</ref>. They also propose a specific course on 'Trust and Security' <ref type="bibr" target="#b9">[12]</ref>. Their proposal focuses more on the social aspects of the program and the potential benefits for attracting a diverse student body as well as increasing overall student numbers <ref type="bibr" target="#b9">[12]</ref>. There appears to be a lack of indepth security integration throughout the program. A quick search on the Web reveals a Web Engineering 'suggested' program of study for a Bachelor of Science in Applied Information Technology at Kentucky State University <ref type="bibr">[14]</ref>. The program introduces security in the senior year through a course titled 'Information Security' <ref type="bibr">[14]</ref>. The lack of information security topics throughout both undergraduate curricula is worrisome at the very least!</p><p>The reality in today's increasingly competitive academic environment is that courses need to be utilized as much as possible. Curricula need to be introduced and implemented so that they take advantage of existing infrastructure. A dedicated lab for a forensics or security course can also be utilized by the other programs. These facilities also can be used to implement specific courses in related areas like Web Engineering undergraduate and postgraduate degrees. The topics complement each other very nicely. Course work can be constructed so that students learn how to create viruses, trojans, and worms for the security related courses. The same students can then learn how to develop and integrate code into Web engineering projects that will identify these threats and log actions appropriately for the forensics course.</p><p>The trick is to make the learning environment fun for the students and beneficial for employment opportunities once the course is complete. This has to be balanced with University requirements. These requirements would include appropriate security measures to ensure that code developed in the security lab is not allowed to be introduced to the outside world. This could include measures like dedicated labs, swipe card entry, video surveillance, and policies that restricting devices that are brought into the lab. Additional measures would include the removal of USB ports and outwardly facing drives. To help mitigate worst case scenarios, additional software measures could also be introduced that limits the life span of any code developed in the lab.</p><p>Regardless of how security is implemented in a specific program, the initial problem with tackling security is the terminology. Terminology in various environments has the potential to have multiple meanings. As Anderson indicated, reality is a complex environment in the real world <ref type="bibr" target="#b11">[15]</ref>. Hence, what the terms security and vulnerability mean to one organization, such as a large financial institution, may or may not have the same relevance to another business, such as a newsagent or a small legal firm. Logically, different organizations will require "some combination of user authentication, transaction integrity and accountability, faulttolerance, message secrecy and covertness" <ref type="bibr" target="#b11">[15]</ref>. So what is the definition of security?</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Security Definition</head><p>In this paper, we will define a Web enabled secure system in terms of well established security concepts which consist of confidentiality, integrity and availability <ref type="bibr" target="#b12">[16,</ref><ref type="bibr" target="#b13">17]</ref>.</p><p>The Web Engineering solution should protect confidentiality by limiting access to the appropriate individuals <ref type="bibr" target="#b14">[18]</ref>. This would involve user identification, authentication and authorization. The integrity of the system should be maintained by only allowing modifications to be conducted by the appropriate individuals and within established guidelines <ref type="bibr" target="#b14">[18]</ref>. The availability of the system is defined by providing access to the appropriate parties at designated times <ref type="bibr" target="#b14">[18]</ref>. It should be noted that there are two additional categories that are commonly included when discussing security and they are 'non-repudiation' and 'accountability'. Non-repudiation is the capability to prevent, in this case, a software user, a system, or an application from denying actions they have performed. Accountability is the recording of the software user's actions.</p><p>Since "accountability includes authenticity and non-repudiation" <ref type="bibr" target="#b15">[19]</ref> and authenticity is the "property that allows the ability to validate the claimed identity of a system entity" <ref type="bibr" target="#b15">[19]</ref>, i.e., the authentication aspect, we will consider these topics to be subtopics of confidentiality that are utilized to help ensure integrity.</p><p>Vulnerabilities will be defined using The Organization for Internet Safety (OIS) definition. It has been said that "security is about preventing adverse consequences from the intentional and unwarranted actions of others" <ref type="bibr" target="#b16">[20]</ref>. OIS publishes Guidelines for Security Vulnerabilities Reporting and Response. In this document, security vulnerability is defined as "a flaw within a software system that can cause it to work contrary to its documented design and could be exploited to cause the system to violate its documented security policy" <ref type="bibr" target="#b17">[21]</ref>.</p><p>It should be noted that this statement makes the assumption that a documented security policy exists. The reality of the OIS vulnerability definition is that any flaws in the system design or application coding can potentially lead to security vulnerabilities. The need to improve security in the Web application development is reinforced by testimony from Robert F. Decay, Director, Information Security Issues indicating that patch management is critical in mitigating cyber vulnerabilities <ref type="bibr" target="#b18">[22]</ref>. According to the same report, the number of security vulnerabilities reported is increasing and attacks are becoming automated <ref type="bibr" target="#b18">[22]</ref>. Software security encompasses more than encryption and password maintenance. The ability to defend against software attacks, in the long run, will need to come from "more rigorous software engineering practices, better tools and technologies" <ref type="bibr" target="#b18">[22]</ref>.</p><p>Using these broad definitions to understand security supports the idea that security means more than implementing encryption, Secure Socket Layer (SSL), firewalls and creating and maintaining secure networks <ref type="bibr" target="#b19">[23,</ref><ref type="bibr" target="#b20">24]</ref>. It is also more than the use of digital certificates, the different technologies used for authentication and authorization or intrusion detection systems <ref type="bibr" target="#b19">[23,</ref><ref type="bibr" target="#b20">24]</ref>. In-depth discussions on these topics and research into their improvement are occurring on a daily basis. However, a system's security is not determined solely by the technology that is implemented. Web security is determined by a number of factors that include legal issues, social issues, technical issues, and Web engineering practices. This expansive perspective on the scope of security was reinforced by Eugene Spafford, a security expert and professor at Purdue University when he stated in an interview that "security is a total-picture issue, not a set of spot problems to patch" <ref type="bibr" target="#b21">[25]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Security Literature</head><p>In order to incorporate security into a Web Engineering curriculum, it is necessary to appreciate the current state of security methodology research and to acknowledge previous research in the field of information security design methods <ref type="bibr" target="#b13">[17]</ref>. Baskerville's analysis separated numerous system methods into three generations <ref type="bibr" target="#b22">[26]</ref>. The first generation consisted of check lists and risk analyses. This stage focused on actual physical systems specifications. The second generation engineering methods focused on complex customization through the use of engineering concepts and mechanistic procedures that relied heavily on functional requirements.</p><p>Even though Baskerville's analysis of the security design methods did not directly examine the applicability of the security methodologies to Web development, he did make an important point that is applicable to Web Engineering application development. Baskerville's analysis did suggest that "systems methods will neither be trustworthy nor successful unless the general research regarding systems methodology incorporates security analysis design as an explicit objective" <ref type="bibr" target="#b22">[26]</ref>.</p><p>Siponen updates and expands on Baskerville's analysis of information security development approaches declaring that there are five information system security generational classifications <ref type="bibr" target="#b23">[27]</ref>. Siponen arrives at his conclusion after an examination of the contributing research disciplines and an evaluation of seventeen modern information system security methodologies. Security is a highly diverse research subject that has been an area of interest for a variety of disciplines. Siponen identifies four research communities as contributors to information security research including Management Information Systems (MIS), computer science, software engineering and mathematics.</p><p>Siponen's first three generations correspond with Baskerville's generational classifications. Siponen defined the third generation as consisting of structural and object-oriented security methods, information modelling methods, and stepwise security methods. According to Siponen, the fourth generation builds on the third generation by addressing the social and socio-technical aspects of the methods. The fifth generation, of security methodologies, that Siponen discusses <ref type="bibr" target="#b23">[27]</ref> is really the next generation of methodologies. This implies that the fifth generation security methodologies do not currently exist, a point which he also articulates in a later article <ref type="bibr" target="#b24">[28]</ref>. Siponen's points, regarding the fifth generation, bring us to the heart of the security problem. There have been few industrial attempts to comprehensively address user focused aspects; methodology integration; practitioner malleability and employment of Web engineering security throughout the Web-based application development process via the establishment of a comprehensive security methodology. One industrial solution is the Web Engineering Security methodology (WES). WES is a proactive, flexible, customizable, process neutral security methodology that is based on empirical evidence <ref type="bibr" target="#b13">[17,</ref><ref type="bibr" target="#b25">29,</ref><ref type="bibr" target="#b26">30]</ref>. The natural question that arises when you are discussing security is what happens when it fails?</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Web Forensics Information</head><p>Security and forensics are two sides of the same coin. Security tries to prevent undesired things from happening while forensics acknowledges that something has happened and attempts to prove it through the evidence that is left on machines, networked devices and/or mobile devices.</p><p>Appreciating that security is a broad concept that needs to be covered in its entirety ushers in the concept of educating people to prepare and handle situations when things go wrong. In order to accomplish this integration, forensics needs to be proactively integrated into software development methodologies. Depending on the needs of the individual organizations, this can include the capturing of necessary log information, network packets and mobile device information. It can also include the proper training for personnel on how to handle first responder incidents <ref type="bibr" target="#b27">[31]</ref>. It is realistic to perceive a situation where a graduate from a Web Engineering program is a first responder to a potential criminal situation. How do they handle the situation? What can they do or not do that will preserve the evidence? This necessitates a basic understanding of computer forensics principles, techniques, and processes.</p><p>In a Web based environment, students should be taught about different operating and file systems and how they store potentially relevant data from the client and the server side. As an example, a Windows registry can store information pertaining to previously visited Web sites, to search queries, and passwords. They should also be informed about the types of information that can potentially be located on networks and networked machines. What are the ethical issues that students need to consider?</p><p>To complicate matters, Cisco's latest prediction is that global IP traffic will get to 667 Exabyte's by 2013 <ref type="bibr">[32]</ref>. Out of all of the data that is being passed around the Internet, what information do you need to keep and for how long? What are the legal implications with maintaining this information? Hence, students need to understand the relevance of this information in a court of law and the legislative issues that complicate jurisdictional rights in a global environment. Relevant legislation has been discussed by Glisson et al. <ref type="bibr" target="#b28">[33]</ref>. How does this and other legislation impact the design and implementation of Web engineering systems or the extraction of data in an investigative situation?</p><p>The need for security and forensic integration into Web Engineering is highlighted with the emergence and high rate of acceptance currently demonstrated with cloud computing. Hence, a Web Engineering curriculum needs an in-depth exposure to operating and file systems, networks, dynamic memory, legal and ethical implications, mobile devices and basic digital forensics concepts and procedures.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Security and Forensics Curriculum Integration</head><p>The integration of these concepts into a Web Engineering curriculum is challenging. There are so many aspects of both security and digital forensics that need to be discussed through out the implementation of the program that it makes covering all of them to any depth difficult. This issue is highlighted in Table <ref type="table" target="#tab_0">1</ref>-Curriculum Integration. The courses and the year were taken as an example from the Bachelor of Science in Applied Information Technology at Kentucky State University <ref type="bibr">[14]</ref>. The corresponding security and forensic topics are offered as a guide in corresponding classes and are not meant to be a definitive solution. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Conclusion</head><p>With the blatant need for improved security, coupled with the increasing implementation of security metrics in industry, the need to address security and forensics throughout Web Engineering curricula is critical. This includes addressing everything from an in-depth understanding of the concept of security, to hardware implications, to secure application development and to the legal, as well as, ethical implications associated with Web Engineering.</p><p>As the US Department of Homeland Security has stated "there is nothing inherently 'security-enhancing' about most development methodologies" <ref type="bibr" target="#b29">[34]</ref>.</p><p>Developing applications and understanding the interactions from a security and a forensics perspective is critical from a Web Engineering curriculum perspective. These concepts should be integrated throughout a Web Engineering curriculum.</p><p>As the digital revolution continues to saturate societies and these devices continually become more networked, the need to address security and forensics in Web engineering curricula will continue to be a critical issue. Future work should explore the impact of cloud computing on practical real-world implementations of security and forensics in the realm of Web Engineering. It should focus on the integration of security and forensics concepts throughout the academic curriculum; not via a single class or set of lectures.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 .</head><label>1</label><figDesc>Curriculum IntegrationOne solution that has been developed to critique the security of Web Engineering development methodologies is The Security Criteria for Web Application Development (SCWAD)<ref type="bibr" target="#b13">[17,</ref><ref type="bibr" target="#b26">30]</ref>. The goal of any examination should be to highlight the lack of security in the processes and initiate discussions applicable to Web Engineering curricula. In other words, do security methodologies effectively build security into development methodologies? SCWAD attempts to achieve this goal by addressing the following criteria:1. Active organizational support for security in the Web development process 2. Proper Security Controls in the development environment 3. Security visibility throughout all areas of the development process 4. Delivery of a cohesive system, integrating business requirements, software &amp; security 5. Prompt, rigorous security testing and evaluation 6. Trust and Accountability</figDesc><table><row><cell>Courses</cell><cell>Security Topics</cell></row><row><cell>Freshman Year</cell><cell></cell></row><row><cell>Programming Concepts Computer Hardware</cell><cell>• Authentication and Authorization • Public Key Cryptography • Computer Architecture &amp; Protection Mechanisms</cell></row><row><cell>Sophomore Year</cell><cell></cell></row><row><cell>Advanced Programming Concepts Data Communication Technology Database Management Systems Unix Network Programming or Router Theory and</cell><cell>• Access Control Techniques &amp; Administration • Identification &amp; Authentication Techniques • Practical implementation of these techniques • Application layer security protocols • Building in investigative tools and data capture • Advanced cryptography concepts • Working with data at the hexadecimal level • Understanding access controls for specific DBMS • Authorization and the need for auditing • Compromising a Unix Host • Investigating a Unix host &amp; understanding</cell></row><row><cell>Configuration</cell><cell>protocols</cell></row><row><cell>Junior Year</cell><cell></cell></row><row><cell cols="2">Network Operating Systems • Understanding of the different devices in a</cell></row><row><cell></cell><cell>network and the data captured by each device • Dynamic Host Configuration Protocol</cell></row><row><cell></cell><cell>configuration &amp; security</cell></row><row><cell>Adv. Databases &amp; Data Mining</cell><cell>• Access Control • Types of attacks (SQL injection) • Investigation approached &amp; Data mining for</cell></row><row><cell></cell><cell>evidence</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<ptr target="https://www.deloitte.com/" />
		<title level="m">Losing Ground 2009 TMT Global Security Survey Key findings</title>
				<imprint>
			<publisher>Deloitte</publisher>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m" type="main">Trial by fire</title>
		<imprint>
			<date type="published" when="2009">2009</date>
			<publisher>PricewaterhouseCoopers</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<ptr target="http://www.theukcardsassociation.org.uk/media_centre/press_releases_new/-/page/922/" />
		<title level="m">The UK Cards Association</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title/>
		<author>
			<persName><forename type="first">Y</forename><surname>Deshpande</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Web Engineering. Journal of Web Engineering</title>
		<imprint>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="3" to="17" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Web Engineering Curriculum: A Case Study of an Evolving Framework</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Deshpande</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Web Enginering 4th international conference, ICE 2004. 2004</title>
				<meeting><address><addrLine>Munich, Germany</addrLine></address></meeting>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Information system security curricula development</title>
		<author>
			<persName><forename type="first">E</forename><surname>Crowley</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 4th conference on Information technology curriculum</title>
				<meeting>the 4th conference on Information technology curriculum<address><addrLine>Lafayette, Indiana, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">An information security ethics education model</title>
		<author>
			<persName><forename type="first">M</forename><surname>Dark</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Comput. Small Coll</title>
		<imprint>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="82" to="88" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">A Laboratory Study Designed for Reducing the Gap between Information Security Knowledge and Implementation</title>
		<author>
			<persName><forename type="first">R</forename><surname>Elitzur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Sai</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Electronic Commerce Studies</title>
		<imprint>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page">13</biblScope>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">A laboratory-based course on internet security</title>
		<author>
			<persName><forename type="first">P</forename><surname>Mateti</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 34th SIGCSE technical symposium on Computer science education</title>
				<meeting>the 34th SIGCSE technical symposium on Computer science education<address><addrLine>Reno, Navada, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">C</forename><surname>Esterline</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">A</forename><surname>Williams</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">C</forename><surname>Carr</surname></persName>
		</author>
		<ptr target="http://redux.comp.ncat.edu/carr/web_engineering/SIGCSE_Web.pdf" />
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A PROPOSED CURRICULUM FOR A MASTERS IN WEB ENGINEERING</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">J</forename><surname>Whitehead</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Web Engineering</title>
		<imprint>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page">5</biblScope>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">Security Engineering: A Guide to Building Dependable Distributed Systems</title>
		<author>
			<persName><forename type="first">R</forename><surname>Anderson</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2001">2001</date>
			<publisher>John Wiley &amp; Sons, Inc</publisher>
			<pubPlace>New York</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">Official (ISC)2 Guide to the CISSP Exam</title>
		<author>
			<persName><forename type="first">S</forename><surname>Hansche</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Berti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Hare</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
			<publisher>Auerbach</publisher>
			<pubPlace>Boca Raton</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<title level="m" type="main">The Web Engineering Security (WES) Methodology</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">B</forename><surname>Glisson</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page">245</biblScope>
			<pubPlace>Glasgow</pubPlace>
		</imprint>
		<respStmt>
			<orgName>Department of Computing Science ; University of Glasgow</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">P</forename><surname>Pfleeger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">L</forename><surname>Pfleeger</surname></persName>
		</author>
		<title level="m">Security in Computing. Third Edition ed. 2003</title>
				<meeting><address><addrLine>Upper Saddle River, NJ</addrLine></address></meeting>
		<imprint>
			<publisher>Prentice Hall</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<title level="m" type="main">The CISSP and CAP Prep Guide</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">L</forename><surname>Krutz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">D</forename><surname>Vines</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2007">2007</date>
			<publisher>Wiley</publisher>
			<pubPlace>Indianapolis, IN</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">Beyond Fear: Thinking Sensibly About Security in an Uncertain World</title>
		<author>
			<persName><forename type="first">B</forename><surname>Schneier</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
			<publisher>Springer-Verlag New York Inc</publisher>
			<biblScope unit="volume">303</biblScope>
			<pubPlace>New York</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<ptr target="http://www.symantec.com/index.jsp" />
		<title level="m">Organization for Internet Safety</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">INFORMATION SECURITY Effective Patch Management is Critical to Mitigating Software Vulnerabilities</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">F</forename><surname>Dacey</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Testimony Before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census, House Committee on Government Reform</title>
				<imprint>
			<publisher>United States General Accounting Office</publisher>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Web applications have become IT&apos;s next security battleground</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">B</forename><surname>Dickson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">San Antonio Business Journal</title>
		<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<title level="m" type="main">The internet security guidebook: from planning to deployment</title>
		<author>
			<persName><forename type="first">J</forename><surname>Ellis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Speed</surname></persName>
		</author>
		<editor>E. Carrasco</editor>
		<imprint>
			<date type="published" when="2001">2001</date>
			<publisher>Academic Press</publisher>
			<biblScope unit="page" from="1" to="320" />
			<pubPlace>San Diego</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">J</forename><surname>Mccormick</surname></persName>
		</author>
		<ptr target="asp" />
		<imprint>
			<date>00</date>
			<biblScope unit="page">2152093</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Information systems security design methods: implications for information systems development</title>
		<author>
			<persName><forename type="first">R</forename><surname>Baskerville</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Computing Surveys</title>
		<imprint>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="375" to="414" />
			<date type="published" when="1993">1993</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<title level="m" type="main">Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">T</forename><surname>Siponen</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page">37</biblScope>
			<pubPlace>Oulu, Finland</pubPlace>
		</imprint>
		<respStmt>
			<orgName>Department of Information Processing Science, University of Oulu</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Secure-System Design Methods: Evolution and Future Directions</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">T</forename><surname>Siponen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IT Professional</title>
		<imprint>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="40" to="44" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Web Engineering Security: Essential Elements</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">B</forename><surname>Glisson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Welland</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The Second International Conference on Availability, Reliability and Security (ARES) 2007</title>
				<meeting><address><addrLine>Vienna, Austria</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Web Engineering Security: A Practitioner&apos;s Perspective</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">B</forename><surname>Glisson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mcdonald</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Welland</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Web Engineering</title>
				<meeting><address><addrLine>Palo Alto, California</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Organizational Handling of Digital Evidence</title>
		<author>
			<persName><forename type="first">S</forename><surname>Hoolachan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">B</forename><surname>Glisson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The 2010 ADFSL Conference on Digital Forensics, Security and Law. 2010</title>
				<meeting><address><addrLine>St. Paul, Minnesota, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Association of Digital Forensics, Security and Law</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Secure Web Application Development and Global Regulation</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">B</forename><surname>Glisson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">M</forename><surname>Glisson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Welland</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The Second International Conference on Availability, Reliability and Security (ARES) 2007</title>
				<meeting><address><addrLine>Vienna, Austria</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<monogr>
		<title level="m">in the Software Lifecycle</title>
				<meeting><address><addrLine>Washington, DC</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2006">2006</date>
		</imprint>
		<respStmt>
			<orgName>Department of Homeland Security, Security ; Department of Homeland Security</orgName>
		</respStmt>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
