Teaching Secure Acquisition in Higher Education

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • Additional Information
    • Publication Information:
      USA: IEEE
    • Publication Date:
      2020
    • Abstract:
      Acquisition is the most common method for introducing new technology into organizations, but security and integrity are difficult to guarantee using conventional acquisition techniques. Best practices for secure acquisition are an essential part of the general education process in cybersecurity.
    • Author Affiliations:
      Cybersecurity and Information Systems, University of Detroit Mercy
      Software Engineering, Carnegie Mellon University
    • ISSN:
      1540-7993
      1558-4046
    • Accession Number:
      10.1109/MSEC.2020.2989644
    • Rights:
      Copyright 2003-2012, IEEE
    • AMSID:
      9138558
    • Date of Current Version:
      2020
    • Document Subtype:
      IEEE Magazine
    • Sponsored by:
      IEEE Computer Society
    • Accession Number:
      edseee.9138558
  • Citations
    • ABNT:
      SHOEMAKER, D.; MEAD, N.; KOHNKE, A. Teaching Secure Acquisition in Higher Education. IEEE Security & Privacy, Security & Privacy, IEEE, IEEE Secur. Privacy, [s. l.], v. 18, n. 4, p. 60–66, 2020. DOI 10.1109/MSEC.2020.2989644. Disponível em: http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edseee&AN=edseee.9138558. Acesso em: 30 set. 2020.
    • AMA:
      Shoemaker D, Mead N, Kohnke A. Teaching Secure Acquisition in Higher Education. IEEE Security & Privacy, Security & Privacy, IEEE, IEEE Secur Privacy. 2020;18(4):60-66. doi:10.1109/MSEC.2020.2989644
    • APA:
      Shoemaker, D., Mead, N., & Kohnke, A. (2020). Teaching Secure Acquisition in Higher Education. IEEE Security & Privacy, Security & Privacy, IEEE, IEEE Secur. Privacy, 18(4), 60–66. https://doi.org/10.1109/MSEC.2020.2989644
    • Chicago/Turabian: Author-Date:
      Shoemaker, D., N. Mead, and A. Kohnke. 2020. “Teaching Secure Acquisition in Higher Education.” IEEE Security & Privacy, Security & Privacy, IEEE, IEEE Secur. Privacy 18 (4): 60–66. doi:10.1109/MSEC.2020.2989644.
    • Harvard:
      Shoemaker, D., Mead, N. and Kohnke, A. (2020) ‘Teaching Secure Acquisition in Higher Education’, IEEE Security & Privacy, Security & Privacy, IEEE, IEEE Secur. Privacy, 18(4), pp. 60–66. doi: 10.1109/MSEC.2020.2989644.
    • Harvard: Australian:
      Shoemaker, D, Mead, N & Kohnke, A 2020, ‘Teaching Secure Acquisition in Higher Education’, IEEE Security & Privacy, Security & Privacy, IEEE, IEEE Secur. Privacy, vol. 18, no. 4, pp. 60–66, viewed 30 September 2020, .
    • MLA:
      Shoemaker, D., et al. “Teaching Secure Acquisition in Higher Education.” IEEE Security & Privacy, Security & Privacy, IEEE, IEEE Secur. Privacy, vol. 18, no. 4, July 2020, pp. 60–66. EBSCOhost, doi:10.1109/MSEC.2020.2989644.
    • Chicago/Turabian: Humanities:
      Shoemaker, D., N. Mead, and A. Kohnke. “Teaching Secure Acquisition in Higher Education.” IEEE Security & Privacy, Security & Privacy, IEEE, IEEE Secur. Privacy 18, no. 4 (July 1, 2020): 60–66. doi:10.1109/MSEC.2020.2989644.
    • Vancouver/ICMJE:
      Shoemaker D, Mead N, Kohnke A. Teaching Secure Acquisition in Higher Education. IEEE Security & Privacy, Security & Privacy, IEEE, IEEE Secur Privacy [Internet]. 2020 Jul 1 [cited 2020 Sep 30];18(4):60–6. Available from: http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edseee&AN=edseee.9138558