Other faculty can be found here.

Dr. Corey Schou

  • University Professor of Informatics
  • Director, Informatics Research Institute
  • Professor, Department of Information Systems, College of Business
  • Department of Electrical Engineering and Computer Science
Idaho State University, Pocatello, 83209

(208) 282-3194 Email: schocore@isu.edu

Corey Schou is The University Professor of Informatics and Associate Dean at Idaho State University, director of the National Information Assurance Training and Education Center (NIATEC) and the Simplot Decision Support Center (SDSC), and for ten years the chair of the Colloquium for Information Systems Security Education (CISSE). Professor Schou is frequent public speaker and an active researcher with over 300 books, papers, articles, and, other presentations. His interests include information assurance, software engineering, secure applications development, security and privacy, collaborative decision-making, and the impact of technology on organization structure.

In the early 1980s, organizations began to recognize that connected PCs in various locations were much more vulnerable than a mainframe locked away in a single building. These organizations began seeking qualified individuals responsible for selecting, recommending and implementing security policy and procedures. However, few schools were offering information security curricula, much less academic degrees, and organizations would have to take an IT professional at his or her word that they knew how to manage information security for the entire enterprise.

By 1989 Schou and others had established a unified common Body of knowledge for computer security. Schou, with Idaho State University hosted the finalization meetings in Salt Lake City. His work was later recognized by the organization with various awards in San Francisco (Founder's award and the need for a professional certification to maintain and validate a common knowledge, values, and ethics for individuals in the industry became a growing concern. Several IT professional societies recognized that a certification program attesting to the qualifications of information security personnel was needed.

Schou's work is recognized several organizations such as (ISC)2 as foundational to the Information Assurance discipline in academia. His work for three decades has resulted in standards used internationally by government, industry and academia. standards for the United States Government.

In 2003 he was selected as the first University Professor at Idaho State University. He directs the Informatics Research Institute and the National Information Assurance Training and Education Center. His program was recognized by the United States Government as a Center of Academic Excellence in Information Assurance and is a leading institution in the CyberCorps/Scholarship for Service program.

In addition to his academic accomplishments, he holds a broad spectrum of certifications including CCFP - Certified Cyber Forensics Professional, CSSLP - Certified Secure Software Lifecycle Professional, HCISPP - HealthCare Information Security and Privacy Practitioner, CISSP®-ISSAP®: Information Systems Security Architecture Professional, and CISSP-ISSMP: Information Systems Security Management Professional.

He was nominated and selected as an honorary Certified Information Systems Professional (CISSP) based on his lifetime achievement. In 2001 the International Information Systems Security Certifying Consortium selected him as the second recipient of the Tipton award for contribution to the Information Security Profession. In 2007, he was recognized a Fellow of (ISC)2.

Professional Preparation

  • Rollins College Bio/Chem BS, 1968
  • Florida State University Political Science MS, 1970
  • Columbia University International Law (W. Friedman) 1970-1971
  • Florida State University International Law/ Political Science PhD, 1977

Appointments

  • Idaho State University Associate Professor/ Professor 1985 – present
  • University of Central Florida Assistant Professor Information Systems 1978 – 1984
  • Sandia Labs Vector Processing Facility
  • Florida State University Instructor/Assistant Professor 1974 – 1978
  • AFWL Cyber 205 and Cray Benchmarking
  • Florida Parole Commission Senior Statistician 1972 – 1974

Significant Consultancies

  • Fulbright Specialist project in New Zealand at University of Waikato during June/July 2014
  • United States Senate Information Assurance Planning 2006 – 2007
  • Department of State APEC/OECD computer Security Policy 2000 – 2002
  • McGraw Hill Information Assurance Series Editor 2005 – 2007
  • Microsoft Corporation Security and Academic Programs 1998 – 2004

Research

Published Intellectual Contributions

Refereed Publications
  • Schou, Corey D. (2015). Plus Ça Change, Plus C'est La Même Chose: Breadth or depth, which is correct? The right answer is: -Yes. ACM Inroads, 6(2), 53-56.Special Section – Cybersecurity Education – Part 2
  • Huhtinen, A. M., Armistead, L., & Schou, C., (2014) Educating and Training Soldiers for Information Operations, Journal of Information Warfare Volume 13, Issue 1. ISSN 1445 3347
  • Maschner, H. D., & Schou, C. D. (2013, October). Idaho Museum of Natural History, Idaho State University 921 S. 8 St., Stop 8096 Pocatello, ID 83209-USA. In Digital Heritage International Congress (DigitalHeritage), 2013 (Vol. 2, pp. 265-271). IEEE.
  • Betts, M. W., Maschner, H. D., Schou, C. D., Schlader, R., Holmes, J., Clement, N., & Smuin, M. (2011). Virtual zooarchaeology: building a web-based reference collection of northern vertebrates for archaeofaunal research and education. Journal of Archaeological Science, 38(4), 755-e1.
  • Maschner, H. D., Betts, M. W., & Schou, C. D. (2011). Virtual Zooarchaeology of the Arctic Project (VZAP). SAA Archaeological Record, 11, 41-43.
  • Schou, C., Armistead, E. L., Ryan, J. (2011). International Academic Standards: A new approach to Information Operations for interoperability. Journal of Information Warfare
  • Bettis, M., Maschner, H., Schou, C., Schlader, R., Holmes, J., Smuin, M. (2011). Virtual zooarchaeology: building a web-based reference collection of northern vertebrates for archaeofaunal research and education. Journal of Archaeological Science -- Elsvere, 38(4), Pages 755.e1–755.e9.
  • Schou, C., Lohse, E. (2010). The Crabtree Files, The assembled works and papers of Crabtree and Swanson. Idaho: Idaho Museum of Natural History, IRI.
  • Trimmer, K., Parker, K. R., Schou, C. Functional Requirements for Secure Code: The Reference Monitor and Use Case, Academy of Information and Management Sciences Journal, 2010.
  • Frost, James and Schou, Corey, Critical Thinking and Ethics Integrated Across the Information Assurance Curriculum, ACEIS 2009: The Second Annual Conference on Education in Information Security, February 2009.
  • Lohse, E., Schou, C. The Crabtree Files, The assembled works and papers of Crabtree and Swanson. The fathers of modern American flint knapping
  • Schou, Corey D, “Are you Interoperable,” Defence Management Journal, 37 July 2007 77-80 –Shared Database and Security.
  • Trimmer, K., Parker, K. R., Schou, C. (2007). Forcing Early Implementation of Information Assurance Precepts throughout the Design Phase. Journal of Informatics Education Research, 9(1), 95-120.
  • Frost, James, Schou, Corey, The Missing Components of the Security Audit - A Case Study, in The Challenge of Managing System Integrity, 2006, ISBN: 0-9772107-2-3.
  • Frost, James and Schou, Corey, Integration of Ethics into the Computer Information Systems Curriculum via The People Component Of The McCumber Model, IFIP 11.8, Symposium on Security, May 2005.
  • Strickland, A., Strickland J., Moulton, S., White J., and Schou C (June, 2008) Development of a Digital Reusable Learning Object to Provide Instruction and Assessment of Piaget‘s Conservation of Number in Order to Improve Elementary Student Mathematics Performance Presentation to the ED-MEDIA 2008, World Conference on Educational Multimedia, Hypermedia and Telecommunications. Vienna, Austria (Refereed Research Paper pp. 1341-1349).
  • Petersen, Rodney, Ronald Larsen, Corey Schou, and Lee Strickland “What’s in a Name?”, EDUCAUSE Quarterly (http://www.educause.edu/pub/eq/), January 2004.
  • Schou, Corey D., and Frost, J. Homeland Security and Information Assurance in Biomedical Informatics Systems, IEEE Engineering in Medicine and Biology, January/February 2004.
  • Schou, Corey D., The Role of Community Colleges in Cyber Security Education An Investment in Curriculum Cooperation sponsored by The American Association of Community Colleges The National Science Foundation, Washington, DC, June 2002,March 2003.
  • Schou, Corey D., Information Assurance in Education, EDUCAUSE Security Professionals Workshop, Temecula California April 2003.
  • Schou, Corey, Frincke, D., Reynolds, C., Frost, J., Davis, J., “Meeting the Information Assurance Crisis — Now”; EDPACS EDP Audit and Control Systems, December, 2000.
  • Schou, Corey, Kregg Aytes., Anne Hackert “Academic User Services” Annual Advances in Case Research, 1998
  • Schou, Corey, “Education Cases” Chapter 8 in Thin Client/Server Computing, Joel Kanter, Microsoft Press, December 1997 pp. 212-217
  • Schou, Corey, Friedlob, T, Schleifer, A, Plewa, T., “An Auditor's Primer on Encryption”, The CPA Journal, November 1997.
  • Schou, Corey D., W. V. Maconachy, James Frost, “Awareness, Training And Education: A Security Measure To Maintain System Integrity”, ISSA Journal, 1994.
  • Schou, Corey, W. V. Maconachy, “Information Security Certification for the ‘90s”, in Computer Security Journal, Spring 1993.
  • Schou, Corey D., Gantt, Gamewell, “Legal Aspects of Information Security”, EDP Audit, Control and Security, May, 1993. p. 5-12. Vol. xx, No. 11.
  • Schou, Corey D. “The Role of Legislation in Information Security”, EDP Audit, Control and Security, April, 1993. p. 1-8. Vol. xx, No. 10.
  • Schou, Corey D., “How a Virus Works: An Allegory”, Scientific Computing, VI, 6.
  • Schou, Corey D., George Johnson, “Project Expediting in PERT with Stochastic Time Estimates”, Project Management Journal, August 1990.
  • Schou, Corey D., “The More Things Change, The More They Stay The Same: The Growth of Information Security”, Scientific Computing, VI, 4.
  • Schou, Corey D., Ron Rubin, “Small Business Analysis with the Microcomputer”, The Practicing Accountant, September 1984.
  • Schou, Corey D., Ron Rubin “Profit Please”, InCider, January, 1983.
  • Rubin, Ron, Schou, Corey, Microcomputer Programs for Data Analysis; published by Small Business Institute, 1982.
  • Rubin, Ron, Schou, Corey, and Terry, Campbell; “Computer Generated Financial Ratios: Small Business Assistance from the CPA”, The Practicing CPA, published by the American Institute of Certified Public Accountants, September 1982.
  • Schou, Corey, Ron, Rubin, “Protect Your Small Business from Impending Disaster”, Micrcomputing, October 1982.
  • Schou, Corey D. Terry, Campbell, “Computer Generated Breakeven Analysis”, The Practicing CPA, published by the American Institute of Certified Public Accountants, November 1981.
  • Schou, Corey D. “The United Nations and Collective Security: Some Normative and Empirical Considerations”, Georgia Journal of International and Comparative Law: Vol. 2, 1972.
Conference Proceedings
  • Maschner, H. D., Schou, C. Virtualization and the democratization of science: 3D technologies revolutionize museum research and access. Proceedings of the 2013 World Digital Heritage Conference. IEEE.Basic or Discovery Scholarship, Published, All authors have co-author status, 1-4799-3169-9
  • Beard, D. V., Parker, K. R., Ottaway, T., Davey, W. f., Schou, C. (2013). Requiring a Systems Analyis and Design Course for a Computer Science Major (pp. 7). Las Vegas, NV: FECS-13.Teaching and Learning Scholarship, Published, All authors have co-author status, International, Publically Available, May 2013, July (3rd Quarter/Summer) 2013, Peer-reviewed/Refereed
  • Huhtinen, A. M., Armistead, L., & Schou, C. Educating and Training Soldiers for Information Operations. In Proceeding of the 5th International Conference Information Warfare and Security (p. 155). Peer-reviewed/Refereed
  • Maschner, H., Bettis, M., Schou, C. (2010). Vzap: an online comparative collection for archaeofaunal research. ICAZ 2010 Conference: Archaeozoology in a Digital World : New Approaches to Communication and Collaboration.
  • Schou, C., IEEE -- USA Annual Meeting, "Integrating Information Assurance Principles in the Engineering & Computer Science Curriculum," IEEE Institute of Electrical and Electronics Engineers, Nashville TN. (March 2010).
  • Frost, J., Schou, C., 'Critical Thinking and Ethics Integrated Across the Information Assurance’ ACEIS 2008/9: The Second Annual Conference on Education in Information Security, February 2009.
  • Schou, C., Armistead, L, Ryan, J. Developing an Academic Curriculum in Information Operations: The First Steps, Proceedings, 4th International Conference on Information Warfare and Security, Cape Town, South Africa, 2009.
  • Schou, C., ITiCSE 2009: Annual Conference on Innovation and Technology in Computer Science Education, "Developing Information Assurance Standards," IEEE, Université Pierre et Marie Curie, Paris France. (July 8, 2009).
  • Trimmer, K., Parker, K. R., Schou, C. (2008). Functional Requirements: The Reference Monitor and Use Case (2nd ed., vol. 12, pp. 47). Candler, NC: Proceedings of the Academy of Information and Management Sciences.
  • Schou, Maconachy, Jackson, Awareness, Training and Education: Preparing Yourself and Your Organization for FISMA Compliance. FISMA Risk Management and Compliance Training, MISTI, Washington, DC 2006.
  • Schou, Building a Curriculum in Computer Security and Information Assurance, North Carolina Computer Instructors Association, 2006.
  • Schou, C., Frost, J., Ryan, J., Developing Secure Code for Information Assurance, Academic Days on Trustworthy Computing, Seattle, 2006.
  • J. Frost, Schou, C, The Missing Components of the Security Audit, IS OneWorld, Las Vegas 2006.
  • Schou, C., “Importance of Professional Certification in the International Environment”, Kuala Lumpur, Malaysia, International/Asian Forum for Computer Security, 2006
  • Sammons, D., Lohse, E.S., Schou, C. Strickland, A.W., & Schlader, R, A secure user-created database of archaeological information. Paper presented at the IASSIST/IFDO Meetings (International Association for Social Science Information Service & Technology and International Federation of Data Organizations), Edinburgh, UK, May 2005.
  • Strickland, J., Strickland, A., Schou, C. & Schou, S. (2005). An Investigation of Hispanic Student Achievement in Elementary School Mathematics through the Use of a Computer-Assisted Instruction Receptive/Expressive Language Model. In P. Kommers & G. Richards (Eds.), Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications 2005 (pp. 3331-3335). Chesapeake, VA: AACE.
  • Sammons, D., Lohse, E.S., Schou, C. Strickland, A.W., & Schlader, R. (2005). A secure user-created database of archaeological information. Paper presented at the IASSIST/IFDO Meetings (International Association for Social Science Information Service & Technology and International Federation of Data Organizations), Edinburgh, UK, May 2005.
  • Schou, C., Developing Information Assurance in the Curriculum -- Make IA Pervasive not Invasive International Conference on Informatics Education and Research, Las Vegas, Nevada December 8, 2005
  • Schou, Trimmer and Parker, Forcing Early Binding of Security Using a Design Reference Monitor.” In Proceedings of the International Conference on Informatics Education and Research, Las Vegas, Nevada: December 9-11 (pp. 321-331).
  • Schou, C., Trimmer, K., Parker, K. R. (2005). “Forcing Early Binding of Security Using a Design Reference Monitor” (2005th ed.). Proceedings of the International Conference on Informatics Education and Research.
  • Frost, J., Schou, C.D., “Integrating Ethics In Security Education Via The People Component Of The McCumber Model”, IFIP 11.8 Moscow, Russia.
  • Frost, James, Maconachy, William V., Schou, Corey, and Springer, John D., “Building an Educational Response to Terrorism: A Multifaceted Problem, A Multidimensional Response”, Information Systems Control Journal, Vol. 6, 2004.
  • Ryan, Julie J.C.H., & Schou, Corey D. (2004) On security education, training, and certification. Information Systems Control, vol. 6, pp 27-30.
  • Lohse, E.S., Corey Schou, Robert Schlader, and D. Sammons, Information Archives: Management, Research and Information Distribution in a Confidential, Controlled Environment, WAC5 Washington DC, June 2004.
  • Schou, Corey D., Standards, Standards, Standards, Who has the Standards, Proceedings 4th Australian Information Warfare and IT Security Conference – Enhancing Trust, 20-21 November 2003, University of South Australia, Adelaide, Australia.
  • Lohse, E.S., Robert Schlader, and Corey Schou, “Automated Classification of Stone Projectile Points in a Neural Network”, paper presented at the Northwest Anthropology Conference, Bellingham, Washington, March 19-22. To be published as Abstracts: Northwest Anthropological Conference, 2003.
  • Lohse, E.S., Corey Schou, Robert Schlader, and D. Sammons, Automated Classification of Stone Projectile Points in a Neural Network.” Paper presented at the Computer Applications in Archaeology Meeting, Vienna, Austria, April 8-12. To be published as “CAA 2003”, British Anthropological Records. http://www.archaeologie-wien.at/caa2003/workshops/wo159.htm http://www.archaeologie-wien.at/caa2003/papers/57.htm.
  • Schou, Corey D., James Frost, W. V. Maconachy, What’s New in the InfoSec Profession, InfoSec World Conference Proceedings, MISTI (Management Information Systems Training Institute), Orlando Florida, March 2002.
  • К.Шоу, Д.Фринк, Дж.Дэвис, Дж.Фрост. Обучение информационной безопасности: всемирный кризис и подготовка специалистов // Безопасность информационных технологий. - │4. - 2001. - С. 5-10. (In Russian).
  • Schou, Corey D., Deborah Frincke, James Davis, James Frost. Obuchenije informachionnoi bezopasnosti: vsemirnii crisis i podgotovka spechialistov // Bezopasnost informachionnih technologii. - │ 4. - 2001. - S. 5-10. (In Russian).
  • Maconachy, W. Victor, Schou, Corey, Daniel Ragsdale and Don Welch, A Model for Information Assurance: An Integrated Approach, IEEE Proceedings, June 2001.
  • Schou, Corey D., Deborah Frincke, James Davis, James Frost, Information Security Education: A Worldwide Workforce Crisis, WISE 2 Proceedings, IFIP 11.8, Perth, Australia, June 2001. (WISE 2 World Conference Information Security Education) (International Federation of Information Professionals).
  • Schou, Corey D., Information Security: Curriculum Initiatives, Information Security Working Group APEC- TEL –23, Canberra Australia, March 12, 2001. Published as Information Security Working Group Paper.
  • Schou, Corey, Maconachy, W. Victor, What's New in the INFOSEC Profession, Proceedings of The ISI Forum on Information Security in Government, April 24 - 26, 2001 Washington D.C.
  • Schou, Corey, Maconachy, W. Victor, Keeping Current: Staying Up-to-Date with INFOSEC, Proceedings of The ISI Forum on Information Security in Government, April 24 - 26, 2001 Washington D.C.
  • Schou, Corey, Maconachy, W. Victor, Information Security As A Profession: Myth or Reality
  • Developing a Profession by Developing National Training Standards, Proceedings of The ISI Forum, February 24 - 26, 2001 Orlando FL.
  • Schou, Corey, Frost, James, Wingert, Nathan, Maconachy, W. Victor, Using Electronic Technology to Resolve Organizational Differences and Develop e-Curriculum, Proceedings TechLearn Conference, Nov. 2000.
  • Frost, James, Adamcik, Barbara and Schou, Corey, An Analysis Of Instructors’ Leadership Styles Using the Blake and Mouton’s Leadership Model, Mountain Plains Conference, Oct. 2000.
  • Maconachy, W. V., Figallo, L., Schou, C.D., “INFOSEC Professionalization: A Road to be Traveled”, Invited and Published in FASE, Forum for the Advancement of Software Engineering, January 1999.
  • Schou, Corey, W. Vic Maconachy Government Information Security: The Next Steps, MISTI, Annapolis, Md., May 1999, (Proceedings) (Management Information Systems Training Institute).
  • Schou, Corey, Maconachy, W., Blazer, W. “Learning in the Digital Age: National Training Standards”; Presented at TechLearn, Orlando, Florida, November 1998, TechLearn 1998 Proceedings.
  • Schou, Corey, Wills, T., Frost, James, “Design Considerations for a Learning Environment”, Presented at TechLearn, Orlando, Florida, November 1998, TechLearn 1998 Proceedings.
  • Schou, Corey, Frost, J, Wingert, N, LaFond, H. Using Teams and Electronic Decision Support To Increase Training Effectiveness, Proceeding TechLearn '97 Orlando, Florida, September 1997.
  • Schou, Corey, LaBarre, James E., Tokheim, Michael J., Peterson, S., Developing A Competency-Based CIS Core Curriculum For 2000 And Beyond, Proceedings Association of Management Montreal, August 1997 .
  • Schou, Corey, Smith, K., Liebrock, L., Experiential Education: How to Avoid Teaching With Stuffed Animals, Proceedings Association of Management Montreal, August 1997 .
  • Schou, Corey, Beard, D”, Quick GOMS A Visual Software Engineering Tool for Simple Rapid Time Motion Modeling, Interactions, Vol. 1V, 3, June 1997 p81-.
  • Schou, Corey, Maconachy, W., Reigger, W., Symposium on information Security in Government, Proceedings, Information Security Institute, February, 1997.
  • Schou, Corey, Maconachy, W., Friedlob, T., Plewa, F., “The Emergence and Documentation of INFOSEC Professional Development Criteria in Government”, Proceedings, Information Security Institute, February, 1997.
  • Schou, Corey”, New Paradigms for Delivering Instruction: Manage the Channel”, Electronic Proceedings, Association of Management, Vancouver, BC, August 1995.
  • Schou, Corey, Masie, Maconachy, “Applying Group Technology to Developing a Strategic Plan”, Electronic Proceedings, Association of Management, Vancouver, BC, August 1995.
  • Schou, Corey, John Tressler, James Frost, W. Vic Maconachy, “Business Process Reengineering: Increasing Empowerment And Enablement”, Proceedings Federal Software Technology Conference, Salt Lake, UT., April 1995.
  • Schou, Corey, Dee DeZaffra, W. Vic Maconachy, “Information Security Fundamentals for Senior Management”, Proceedings Federal Software Technology Conference, Salt Lake, UT, April 1995.
  • Schou, Corey, W. Vic Maconachy, Dennis Gilbert, “Functional Managers: How to Protect Information Assets”, Proceedings Federal Software Technology Conference, Salt Lake, UT, April 1995.
  • Schou, Corey”, Using Business Process Reengineering to Establish Systems Security”, Proceedings, Federal Information Systems Security Educators’ Association, Gaithersburg, Md., February 1995.
  • Schou, Corey, Maconachy”, Developing Information Security Programs”, Proceedings Seventeenth Annual National Computer Security Conference, Baltimore Md. October 1994.
  • Schou, Corey, LaFond, Wingert, Frost, “Workshop on Group Decision Support Technology”, Proceedings Eighth Annual INEL Computing Symposium, September 1994
  • Schou, Corey, Aytes, Dunn and Frost, “ISO 9000 Requirements and Electronic Group Support Technology”, Proceedings Eight Annual INEL Computing Symposium, September 1994.
  • Schou, Corey, Aytes, Dunn and Frost, “Applying Emerging Group Support Technologies to meet ISO 9000 Requirements”, International Trade Conference Proceedings, Sun Valley, Idaho August 1994.
  • Schou, Corey, J. Frost, J. Kilpatrick, R. Salazar, “Applying Group Decision Support Technology To Small Business Issues”, in Proceedings, Western Decision Sciences Institute, April, 1994.
  • Sue B. Schou, George Johnson, Schou, Corey, “Integration of Statistics into The College Of Business Curriculum”, in Proceedings Western Decision Sciences Institute, April, 1994.
  • Schou, Corey, Frost, Wingert, LaFond, “Improving Competitive Strength through Electronic Tools To Change Quality, Reliability Productivity “In Proceedings INSEAD Quality And Productivity Forum, Seattle, March, 1994.
  • Schou, Corey, J. Kilpatrick, R. Salazar, J. Frost, N. Wingert, H LaFond”, Group Decision Support and The Small Business”, Proceedings Small Business Institute Directors Association, February 1994.
  • Schou, Corey D., J. Frost, N. Wingert, H. LaFond “Improved Research Productivity and Quality Using Electronic Collaborative Processes”, In Proceedings Scientific Computing and Automation Summit, Washington, DC, October 1993.
  • Schou, Corey, James C. Frost, George Johnson, “Cost Effective Design and Construction of A University Decision Center”, in Proceedings IBSCA 1993.
  • Schou, Corey, James Frost, Nathan Wingert, Herbert LaFond, “Enhancing Productivity and Quality Using Collaborative Organizational Re-Engineering and Paradigm Change Processes”, in Proceedings Association of Management, Atlanta, Georgia, August, 1993.
  • Frost, James, Schou, Corey, “Looking Inward for Competitive Strength in the International Arena”, In proceedings of Mountain Plains, July 1993.
  • Schou, Corey, W. V. Maconachy, and James Frost, “Organizational Information Security: Awareness, Training and Education to Maintain System Integrity”, In Proceedings Ninth International Computer Security Symposium, Toronto, Canada, May 1993.
  • Schou, Corey D., F. Lynn McNulty and Arthur F. Chantker”, Information Security: An Expanding Challenge for Accountants and Information Professionals”, In Proceedings, Western Decision Sciences Institute, San Diego, Ca. March 1993.
  • Schou, Corey D., George A. Johnson, and A. Davant Bullard, “Applications and Examples of Quality Control Training Software”, in Simulation and Gaming — Proceedings of the Association of Business Simulation and Experiential Learning, Las Vegas, Nevada, April 1992.
  • Schou, Corey D., James Frost, G. Dobie, Andrew Schou, “Design Considerations In Group Decision Support Centers”, in Proceedings of the Western Decision Sciences Institute, Reno, Nevada, March 1992.
  • Schou, Corey D., George A. Johnson, and A. Davant Bullard, “Quality Control Training Using Simulation”, in Proceedings of the Western Decision Sciences Institute, Reno, Nevada, March 1992. With George A. Johnson, and A. Davant Bullard.
  • Schou, Corey D., “Applying Sound Information Security Principles in a Microcomputer Environment”, in MacSciTech 1992 Proceedings, San Francisco, January 1992.
  • Schou, Corey D., “Applying Sound Information Security Principles in a Microcomputer Environment”, in MacSciTech 1992 Proceedings, San Francisco, January 1992.
  • Editor Proceedings of the 7th Annual Scientific Computing and Automation Conference, Elsvier Communications, December 1991.
  • Schou, Corey D., F. Lynn McNulty “Certification of Information Security Professionals”, EDP Audit, Control and Security, December, 1991.
  • Schou, Corey D., George A. Johnson, and A. Davant Bullard, “Models and Simulation Applications in Quality Control Training”, In Proceedings of the Western Decision Sciences Institute, Kauai, Hawaii, March, 1991.
  • Schou, Corey D., John Kilpatrick, “Ethics and Information Security in the Small Firm”, In Proceedings of the Small Business Institute Director’s Association Orlando, Florida, February, 1991
  • Schou, Corey D., George A. Johnson, and A. Davant Bullard, “The Application of Models and Simulation in Developing Quality Control Training”, in Proceedings of Western Computer Simulation Conference, Anaheim, California, January 1991.
  • Schou, Corey D., “Ethics Comes in Last — Why?” In Proceedings of the Sixth Annual Computer Security Applications Conference, Tucson, Arizona December 1990.
  • Schou, Corey D., George Johnson, “Teaching Statistics Using the Computer”, Proceedings and Abstracts Decision Sciences Institute, Nineteenth Annual Meeting, Western Regional Conference, March, 1990, With George Johnson.
  • Schou, Corey D., “Certification of Computer Security Professionals”, Proceedings 12th National Computer Security Conference, Baltimore, Maryland, October 1989.
  • Schou, Corey D., “The Computer Security Process” Proceedings International Interdisciplinary Consortium for Information Systems, Pittsburgh, Pennsylvania, December 1988.
  • Schou, Corey D., “A study of MBA Admission Criteria” in Proceedings of the Mountain Plains Management Conference. Denver, Colorado. October 1988.
  • Schou, Corey D., “A Survey of the Importance of Entry Level Skills and Experience” in Incorporating Computing Technology into the Business Curriculum, Proceedings of International Business Schools Computer Users Group. July 1988.
  • Schou, Corey D., George Johnson, “A Reexamination of the Application of Computer Models in the Production and Operations Classroom”, Proceedings Western Decision Science Institute, Hawaii, March 1988.
  • Schou, Corey D., “The Impact of Computer Models on Business Planning: An academic Perspective”, Proceedings International Interdisciplinary Consortium for Information Systems, Pittsburgh, Pennsylvania. December 1987.
  • Schou, Corey D., Roland Nord, “Program Texts and Literary Texts: Do Good Programs Make Great Literature?” Proceedings International Interdisciplinary Consortium for Information Systems, Pittsburgh, Pennsylvania, December 1987.
  • Schou, Corey, George Johnson, “Integrated Models of Business Operation”, Mountain Plains Management Society, October 1987.
  • Schou, Corey D., “Managerial Criteria for the Selection of Local Area Networks”, Proceeding of the ACM Denver, Colorado. October 1985.
  • Schou, Corey D., Rubin, Ronald, “The Selection of Microcomputer Systems for the Small Business”, Proceedings of the Small Business Institute Directors Association, February 1984.
  • Schou, Corey D., Ronald Rubin, “Computerization: How to Automate the Small Business”, Small Business Institute: Twelve Years of Progress, 1984 Proceedings, Small Business Institute Directors' Association, pp. 218-223
  • Schou, Corey D., Ron Rubin, Small Business Institute: Twelve Years of Progress, 1984 Proceedings, Small Business Institute Directors' Association, pp. 218-223.
  • Schou, Andrew, Corey Schou, “Matrix Organization/Management Information Systems”, Proceedings of World Congress on Project Management, June 1982.
  • Schou, Corey D. “The Dynamics of Corporate Input into the Formation of U. S. Oceans Policy”, in Proceedings of the Southern Management Association, New Orleans, November 1979.
  • Schou, Corey D. “A Workshop On The PLATO-IV Computer-Assisted Instruction System and Its Potential Applications to Management and Management Education”, Workshop and demonstration presented and paper published in Proceedings of the Southern Management Association, New Orleans, November 1975.
Books
Book, Scholarly
  • Schou, C., & Hernandez, S. (2015). Information Assurance Handbook. McGraw-Hill Education.
  • Nestler, V., Harrison, K. … Schou, C (Ed.). (2015). Principles of Computer Security: CompTIA Security+ and Beyond. Lab Manual. McGraw-Hill.
  • Conklin, W., White, G., Cothren, C.… Schou C. (Ed) (2015) Principles of Computer Security, Fourth Edition, McGraw-Hill
  • Schou, C., Hernandez, S. (2013). Information Assurance for the Enterprise: A Roadmap to Information Security (pp. 600). Illinois: McGraw Hill.Teaching and Learning Scholarship, Submitted, USA, ISBN 0072255242, International, Current edition Publically Available, January (Scheduled originally 1st Quarter/Winter) 2013, Peer-reviewed/Refereed
  • Corey D., Shoemaker, Daniel; Information Assurance for the Enterprise: A Roadmap to Information Security, McGraw Hill, January 2007
  • Schou, Corey D., Kuhel, D., “Information Operations Education: Lessons Learned from Information Assurance”, Information Warfare Separating Hype from Reality, Edited by Edwin L. Armistead, Potomac Books, Washington DC, 2007
  • Book Chapter (R) The Columbia Plateau-Snake River Region Cultural Sequence, with C. Schou. In Projectile Point Sequences in Northwestern North America, edited by Roy Carlson and Marty Magne. Canadian Archaeological Association.
Monograph/Standard
  • Schou, C.D., and Frost, J., Committee for National Security Systems – CNSS Standard 4011, Information Assurance Knowledge, Skill and Ability Compendium, to be published, July 2007
  • PCommunity College Curriculum Development for Information Assurance: The Idaho Model. North Carolina Computer Instructors Association, 2007
  • Strickland, A. W, Strickland, J. M., Moulton, S., Schou, C., Sammons, D. Applying Technology to Improve Mathematics Performance of Hispanic students: An informatics web-based mathematics instructional and assessment system capitalizing on receptive language learning and working memory. Paper accepted for CAL 07, Trinity College Dublin, Republic of Ireland, Dublin, IR, March 26-28 2007
  • The Southern Columbia Plateau Projectile Point Sequence, CAA, Computer Applications and Quantitative Methods in Archaeology by E.S. Lohse and C. Schou
  • Northwestern Plains Projectile Point Typology Workshop 2007, organized by E.S. Lohse, D. Sammons, C. Schou, J. Frost, K. Turley-Ames, and A.W. Strickland. Simplot Decision Support Center, Idaho State University, September. Funded by HSSRC/ISU.
  • Applying Technology to Improve Mathematics Performance of Hispanic Students: An Informatics Web-based Mathematics Instructional and Assessment System Capitalizing on Receptive Language Learning and Working Memory. In C. Montgomerie & J. Seale (Eds.), Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications 2007 (pp. 2312-2319). Chesapeake, VA: AACE.
  • Developing Information Assurance For Defense Communications Using Standards and Certification, Information Assurance For Defense Conference, London, England, 2007. Schou
  • Information Assurance Certification and Workforce Development for Australia, AUSCert, 2007. Brisbane, Australia (Australian Computer Emergency Reaction Team – In USA this is run by U.S. Govt and Carnegie Mellon University)
  • Information Assurance Education: The way ahead in a network-centric environment, Colloquium XI, 2007. Maconachy, V.W. and Schou, C
  • Professionalizing the Practice of Information Security, Colloquium XI, 2007, Murray, W, Schou, C, Maconachy, V.W. 2007.
  • Schou, C.D., and Frost, J.,CNSS Standard 4016, National Information Assurance Training Standard For Risk Analysts, To be published, November 2005.
  • Schou, Corey D, Training the Security Evaluator APEC-TEL 29, Hong Kong, China, March 2004, Published as Information Security Working Group Paper
  • Schou, Corey D., Vendor Information Retrieval Progress report. APEC-TEL 29, Hong Kong, China, March 2004, Published as Information Security Working Group Paper. (APEC Asia Pacific Economic Cooperation).
  • Schou, Corey D., Establishing International Computer Security Training Standards. APEC-TEL 29, Hong Kong, China, March 2004, Published as Information Security Working Group Paper. (APEC Asia Pacific Economic Cooperation) Monograph.
  • Schou, Corey D., Frost, James, eDACUM X Final Report, Standards for Systems Security Administrator, Senior Systems Security Manager, and Information Systems Security Manager, Department of Defense, Washington, DC, October, 2003.
  • Schou, Corey D, Training the Security Evaluator APEC-TEL 26, Moscow, Russia, August 2002, Published as Information Security Working Group Paper
  • Schou, Corey D., Vendor Information Retrieval Progress report. APEC-TEL 26, Moscow, Russia, August 2002, Published as Human Resources Working Group Paper. (APEC Asia Pacific Economic Cooperation).
  • Schou, Corey D., Information Security: Curriculum Initiatives, Information Security Working Group APEC- TEL –23. Canberra Australia, March 12, 2001. Published as Information Security Working Group Paper.
  • Schou, Corey D., Information Security: Curriculum Initiatives, Human Resources Working Group APEC- TEL –23. Canberra Australia, March 12, 2001. Published as Human Resources Working Group Paper. (APEC Asia Pacific Economic Cooperation).
  • Schou, Corey D., Information Security: Curriculum Initiatives, Human Resources Working Group APEC- TEL –23, Canberra Australia, March 12, 2001. Published as Human Resources Working Group Paper, (APEC Asia Pacific Economic Cooperation).
  • Schou, Corey and Frost, J., eDACUM IX, Session report - Update of Existing NSTISSC Training Standards – Systems Administrator for the Federal government, July 2000.
  • Schou, Corey, Frost, J., Technology Initiatives: State Board Of Education October, 2000.
  • Schou, Corey, Frost, J., Wingert, N., eDACUM VIII Developing the Risk Analyst, Monograph, Department of Defense, 628 pages, July 1999 (MONOGRAPH).
  • Schou, Corey, Frost, J., Wingert, N., eDACUM VII The Certifier’s Roles and Skills, Monograph, Department of Defense, 481 pages, June 1999 Monograph).
  • Schou, Corey, Friedlob, T, Schleifer, A, Plewa, T., An Auditor's Introduction to Encryption, a monograph published by the Institute of Internal auditors, 1998.
  • Schou, Corey, Maconachy, W., National Standards for Information Security; National Colloquium on Information Security, Baltimore MD, April 1997.
  • Schou, Corey, Frost, Wingert, Proceedings 18th National Information Systems Security Conference Baltimore, MD October 1995 Government Printing Office.
  • Schou, Corey, Frost, Wingert, LaFond, Unified Information Security Dictionary, Department of Defense, November 1994.
  • Schou, Corey, W. V. Maconachy, Information Technology Security Training And Professional Development Invitational Workshop, IT Security Education Awareness And Training For Users, Operations Staff, And Management, Published by National Institute of Standards and Technology, Gaithersburg Md.
  • Schou, Corey D., Information Security Instruction, Department of Defense, 1990.
  • Schou, Corey D., Information Security Curriculum, Department of Defense, Editor, 1989 This document provides a comprehensive Information Security Curriculum for use in both business and information systems studies.
  • Schou, Corey D., “Information Systems Security: Laws and Legislation”, in Information Security Curriculum, with co-authors, Department of Defense, 1989.
  • Schou, Corey D., “Systems Security”, in Information Security Curriculum, with co-authors, Department of Defense, 1989.
  • Schou, Corey D., “Corporate Security”, in Information Security Curriculum, with co-authors, Department of Defense, 1989.
  • Schou, Corey D., Computer Security Planning, compiled for Westinghouse Idaho Nuclear, pp. 261. December 1988.
  • Schou, Corey D., Computer Systems Security, Compiled for the United States Department of Energy, pp. 255. This monograph details the computer security techniques for modern microcomputer systems, 1987.
  • Schou, Corey D., Microcomputer Programs for Data Analysis, University of Central Florida, 1986.
  • Schou, Corey D., Anne Cudd, Ronald Balsley, “Statistical Tutor”, A microcomputer training program, ISU Center for Business Research, 1986.
  • Schou, Corey D., Electronic Maintenance Systems Techniques, Compiled for the Secretary of the Army 1986, pp. 480, This monograph outlines techniques for establishing high tech systems maintenance for computer systems.
  • Schou, Corey D., Peacetime Productivity Planning System, Compiled for the Department of Defense 1984, pp. 931. This monograph provides a complete analysis of peacetime productivity and the United States industrial base.
  • Schou, Corey D. International Law: Determinants of U. S. Fishery Policy, University Microfilms, September 1977.
  • Keim, Robert. Bechtold, S.E., Schou, C.D, Voich, D. Feasibility Analysis of Five Alternatives for the Collection and Reporting of State and Local Criminal Justice Information in Florida.
  • Schou, Corey D., Computer Techniques for DCASR Managers, Department of Defense, Boston, Massachusetts, 1970.
  • Schou, Corey D., Computer Techniques for DCASR Managers: File Update, Department of Defense, Boston, Massachusetts, 1970.
  • Schou, Corey D., Basic Statistics for DCASR Managers, Department of Defense, Boston, Massachusetts, 1970.
Presentations Given
Oral Presentation
  • Lohse, E. S., Sammons Lohse, D., Schou, C., Northwest Anthropological Conference, "Columbia Plateau Cultural Area: What do we know now?," NWAC, Portland, OR, Conference, Regional, Academic, Accepted. (March 30, 2013).
  • Presentation of current work in building an interactive database of previously published work in the Columbia Plateau; discussion of parameters, priorities, and concerns of expert Plateau archaeologists for the database design
  • Lohse, E. S., Sammons Lohse, D. (Author Only), Schou, C., Paleo-American Odyssey Conference, "Building Expert Game Simulations of Clovis Adaptive Strategies," Center for First Americans, Santa Fe, NM, Conference, National, Academic, Accepted. (October 16, 2013).
  • W. V. Maconachy, Schou, C., “Information Assurance Education: The way ahead in a network-centric environment”, Proceedings of the 11th Colloquium for Information Systems Security Education – Boston, June 2007
  • Schou, Corey, Maconachy, William V., and Frost, James, "Building an Educational Response to Terrorism: A Multifaceted Problem, A Multidimensional Response," Information Systems Control Journal, Vol. 6, 2004.
  • Schou, C., Armistead, L, Ryan, Julie. International Academic Standards: A new approach to Information Operations for interoperability, January 2010
  • Schou, C. (Presenter & Author), Maschner, H. (Presenter & Author), Bettis, M. (Presenter & Author), Arctic Research Conference, "VZAP Image Database," NSF, Boulder Colorado. (November 2009).
  • Schou, C., SWA Software Assurance, "Bridging the Gap: Aligning the Software and Security Professions," Department of Homeland Security, Washington, DC. (November 1, 2009).
  • Schou, C.D., Implementing Information Assurance in A State Wide Curriculum, TEC, Austin Texas February 2005
  • Schou, C. D., Information Assurance in War, Keynote INFO War Conference, Melbourne, Australia
  • Schou, Corey D., Kuhel, D., Armistead, E., Information Operations Education: Lessons Learned from Information Assurance., 4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005.
  • Schou, Corey D., The Recipe for Information Assurance in a Two Year Program, North Carolina Computer Teachers Association, Hickory NC, March 2005.
  • Schou, Corey D., Information Assurance and National Security, Carnegie Mellon University, Pittsburgh, PA
  • Schou, Corey D., Working Connections Faculty Workshop on Information Assurance, Annandale, VA NVCC (5/19)
  • Schou, Corey D., Faculty short course on teaching information assurance (75) Brookdale, New Jersey (5/24)
  • Schou, Corey D., workshop on information assurance (100) Cape Fear, North Carolina – ½ day
  • Schou, Corey D., Working Connections Faculty Workshop on Information Assurance Charlotte, NC (5/20)
  • Schou, Corey D., EDUCAUSE – 3 separate presentations ½ day on information assurance teaching materials
  • Schou, Corey D., Workshop on curriculum development. Hartford Connecticut.
  • Schou, Corey D., NIATEC and Its Impact on Curriculum Development, NSA Centers of Academic Excellence Conference, October 2003.
  • Schou, Corey D., Network Curriculum Standards, Course Technology Conference, Nashville, Tn, March 2003
  • Schou, Corey D., Developing Curriculum for Minority Serving Institutions, Hampton University, Hampton, Virginia, November 2003.
  • Schou, Corey D., Information Assurance Curriculum Development, Virginia Community Colleges, Virginia Beach, Virginia, November 2003.
  • Schou, Corey D., Information Assurance Standards Development, Presentation Macquarie University, Sydney Australia, November 2003.
  • Schou, Corey D., Information Systems Security Education and Research, US – India bilateral negotiations on Information Assurance Education, New Delhi, India April 2002.
  • Schou, Corey D., Information Assurance Curriculum Internationalization, Presentation, ISC2 Annual meeting, London England, September,2002
  • Schou, Corey D., Information Systems Security Education and Research Presented at Minority Faculty Information Assurance Workshop Carnegie Mellon University July 24, 2002, Pittsburgh, PA
  • Schou, Corey D., Certification Expert Debate panel at Information Security Forum Annual Congress 6 - 8 Sardinia, Italy. October 2002
  • Schou, Corey D., Introduction to Information Assurance for Minority Institutions. .Presented at CISSE Seattle Washington, June 2002.
  • Schou, Corey D., Information Assurance and the NIATEC presented at the National Security Agency to the Presidents’ forum, November 2002.
  • Schou, Corey D., W. V. Maconachy, James Frost, What’s New in the InfoSec Profession; The ISI Forum on Information Security in Government; Washington, DC April 2002, Schou, Frost, Maconachy
  • Schou, Corey D., Information Assurance for University Presidents, Presented at the EDUCAUSE Presidents forum, Washington, DC November 2002.
  • Schou, Corey D., Frost, James. Emerging Information Assurance Initiatives, Presented at INRA Inland Northwest Research Alliance Summit, November, 2001.
  • Schou, Corey D., Classified Briefing, Classified Proceedings, Phoenix Challenge, Colorado Springs, Colorado, September 2001.
  • Schou, Corey D., Role and Mission of the National Colloquium for Information Systems Security Education, Proceedings, Phoenix Challenge, Colorado Springs, Colorado, September 2001.
  • Schou, Corey, Vic Maconachy, James Frost Information Assurance A Discipline Emerging from the Wilderness: Keeping your Secrets – Secret; TechLearn October 2000, Orlando, November 2000.
  • Schou, Corey, Frost, James, Wingert, Nathan, Maconachy, W. Victor, Using Electronic Technology to Resolve Organizational Differences and Develop e-Curriculum, TechLearn Conference, Nov. 2000.
  • Schou, Corey, Daniel Ryan, Role and Mission of the National Colloquium for Information Systems Security Education, Air Force Intelligence Agency, San Antonio Texas, September, 2000.
  • Schou, Corey, Frost, J., Plus Ca Change - Plus C’est la Memê Chose: Involving Everyone, Air Force Intelligence Agency, San Antonio Texas, September, 2000.
  • Schou, Corey, Frost, J., Cyber Security Summit: Research in the wilderness?; Cyber Security Summit, Carnegie~ Mellon University, September 2000.
  • Frost, James, Stratton, W. Schou, C.D., Developing for the Japanese Web, AJBS, Salt Lake, June 1999 (American Japan Business).
  • Frost, James, Wingert, N., LaFond, H., Schou, C.D., Improving International Competitive Strength Through Electronic Tools, AJBS (American Japan Business), Salt Lake, June 1999.
  • Schou, Corey, Maconachy, W., Murray, W., Wilson, M., “Developing National Standards to Support Industry, Government, and Academia: a National Colloquium”, in Enabling Technologies for Law Enforcement and Security Proceedings Vol. 3577. Also presented conference at Boston in Massachusetts November 1-5 1998.
  • Schou, Corey, Teaching “Computer Security Penetration Techniques using ‘live systems’”, Presented at the National Computer Security Conference, Crystal City, October, 1998 .
  • Schou, Corey, “Defining The Relationship Between Systems Certifiers and Designated Approving Authorities”, Presented at the National Computer Security Conference, Crystal City, October 1998.
  • Schou, Corey, “Education Cases” Chapter 8 in Thin Client/Server Computing, Joel Kanter, Microsoft Press, December 1997 pp. 212-217
  • Schou, Corey, Friedlob, T, Schleifer, A, Plewa, T., “An Auditor's Primer on Encryption”, The CPA Journal, November 1997.
  • Schou, Corey, Kregg Aytes., Anne Hackert; Academic User Services, Presented at the Society for Case Study Research, July 1997, Kerney, Nebraska
  • Schou, Corey, Stratton, Bill, Smith, Ken, Technology In Action: Improving College of Business Productivity, AACSB, Western Dean’s Conference AACSB, October 21, 1997, Maui, Hawaii.
  • Schou, Corey, Evaluating Off-the-Shelf Information Security Training Materials, National Computer Security Conference, Baltimore, MD, October 1997.
  • Schou, Corey, The National INFOSEC Colloquium: Outcomes and Progress, National Computer Security Conference, Baltimore, MD, October 1997.
  • Schou, Corey, What the Research Says About Excellence in Training and Learning, Proceeding TechLearn '97 Orlando, Florida, September 1997.
  • Schou, Corey, Maconachy, Vic., The Internet For CPAs: Internal and External Security Issues, Idaho Society of CPAs, June 21, 1997, Post Falls, Idaho.
  • Schou, Corey, Ready Fire Aim, Planning and Preparing for the Internet Impact, Presented at the National Society of Fund Raising Executives, Cleveland Oh, April, 1997.
  • Schou, Corey, James Frost, and Nathan Wingert, Group Decision Making Tools to Select Focus, Presentation to the Rocky Mountain International Business Association, April 1997.
  • Schou, Corey, Nathan Wingert, James Frost, Interactive Language Selection Model, presented at TriADA Conference, Philadelphia November 1996.
  • Schou, Corey, Susanne Peterson”, Minority Curriculum Initiatives in Information Systems and Computer Science”, Presentation at Association of Departments of Engineering and Computer Science at Minority Institutions (ADMI), Myaguez, Puerto Rico August 199.
  • Schou, Corey, David Beard, James Frost, Nathan Wingert, “Strategic Directions in Health Care: Application of Group Process Support Systems (GPSS)”, Presented at INFORMS Conference November 3 - 5, 1996 Atlanta, Georgia.
  • Schou, Corey, David Beard, William Fannin, James Frost, “Structure of an Undergraduate MMT Curriculum”, National INFORMS Conference November 3 - 5, 1996 Atlanta, Georgia.
  • Schou, Corey, Joel Kanter, “Visual Basic: The Easy Way In”, Presented with Microsoft at National ACM Conference February 1996.
  • Schou, Corey, Maconachy, V, Herholts, M., “The Educational Domain of Information Technology Security, ACM Workshop on Education in Computer Security, Naval Post Graduate School.
  • Schou, Corey, Maconachy”, National InfoSec Standards: The Reality Proceedings 18th National Information Systems Security Conference, Baltimore, MD October 1995.
  • Schou, Corey, Maconachy, Frost, Wingert “National Encyclopedia of Information Security”, Proceedings 18th National Information Systems Security Conference, Baltimore, MD October 1995.
  • Schou, Corey, Wingert, Frost, “Developing a Consensus”, Presentation at Microsoft Education Consortium, Seattle Washington, June, 1995.
  • Schou, Corey. Presentation at National Computer Retailers Association, Transferring Technology into Universities, Denver, July 1994
  • Schou, Corey, W. V. Maconachy., John Tressler. Presentation at NSTISSIC (A subcommittee of the National Security Council) on Information Systems Security.
  • Schou, Corey, Wingert, LaFond, Frost, Workshop on Application of Group Decision Support to Information and Computer Security, at Information Systems Security Association National Meeting San Francisco, March 1994.
  • Schou, Corey, Maconachy, Tressler, DeZaffra, Gilbert, Presentation to Federal Information Systems Security Association - What have FISSEA, CISS, NIST and NSA been up to?, February 1994.
  • Schou, Corey D.”, Safety, Quality, and Productivity — Using the Group Process”, Presented the Seventh Annual INEL Computing Symposium, October, 1993.
  • Schou, Corey Presentation at Federal Information Systems Security Educators Association on “Executive Level Briefings on Information Security”, February 1993.
  • Schou, Corey D., “Developing a Consensus — Critical Issues for Quality Information Systems Application”, Computer Training and Support Conference, November 1992.
  • Schou, Corey D., “Group Decision Support For Developing a Curriculum (DACUM)”National Computer Security Conference, Baltimore, October 1992
  • Schou, Corey D., “A Workshop for Developing Training Material For The Certification of Computer Security Professionals”, National Computer Security Conference, Baltimore, October, 1992.
  • Schou, Corey D., Developing Training Material For The Certification of Computer Security Professionals, Computer Training and Support Conference, November, 1992.
  • Schou, Corey D., Curriculum Development Using Group Decision Support, Computer Training, and Support Conference, November 1992.
  • Schou, Corey D., Scientific Applications of Group Decision Support, the Sixth Annual INEL Computing Symposium, September 1992.
  • Schou, Corey D., “Critical Issues in Information Security”, Presented at the National Computer Security Educators Conference, Baltimore, Md., February, 1992.
  • Schou, Corey D., “Systems Security Ethics”, Presented at the National Computer Training Conference, November 1991.
  • Schou, Corey D., “System Security - Action and Control”, Presented at the EDPAA and ISSA Midwest regional conference, October 1991.
  • Schou, Corey D., “Information and Certification: Trends for the ‘90s”, in ISPN Invited paper October 1991.
  • Schou, Corey D., “Scientific Computing, A Vision of The Future”, In The Proceedings of the 7th Annual Scientific Computing and Automation Conference, Philadelphia, Pa September 1991.
  • Schou, Corey D., “Managing Information Systems Effectively, in “The Proceedings of the 7th Annual Scientific Computing and Automation Conference, Philadelphia, Pa September 1991.
  • Schou, Corey D., James C. Frost, George Johnson and A. Davant Bullard “Managing a Production Campaign Using Turing Machines As Analysts” in Machine Learning and Neural Networks, International Association of Science and Technology for Development, November 1990.
  • Schou, Corey D., “Information Security: A Challenge for the Next Decade”, Presented at the National Computer Training Conference, November 1990.
  • Schou, Corey D., “Information Security: The Development of Training Modules”, in Information Systems Security: Standards — The Key to the Future, Washington, DC, October 1990.
  • Schou, Corey D., “Turing Machines As Analysts For The Production Campaign” in Presented at the IASTED International Symposium on Machine Learning and Neural Networks October, 1990.
  • Schou, Corey D., “Image Databases and Processing” presented at Scientific Computing National Symposium, September 1990.
  • Schou, Corey D., “Computer Security: Training Needs for Managers” in Data Security Management, Auerbach September 1990.
  • Schou, Corey D., “Computer Security, Laws and Legislation” in Information Technology Resource Utilization, Yaverbaum, ed., Idea Group, Harrisburg, Pa. 1990
  • Schou, Corey D., “Developing an Information Security Curriculum”, National Computer Security Educators Conference, February 1990.
  • Schou, Corey D., “Software Production Estimation”, Canadian Operations Research Society / ORSA / TIMS, Vancouver Canada, May 1989.
  • Schou, Corey D., George Johnson, “Dynamic Requirements Analysis”, Canadian Operations Research Society/ ORSA/TIMS. Vancouver Canada May 1989.
  • Schou, Corey D., Ron LeBlanc, Andrew Schou, “The Pedagogic Impact of Computer Spreadsheets” Canadian Operations Research Society / ORSA / TIMS, Vancouver Canada May 1989.
  • Schou, Corey D., “A Recommended Computer Security Curriculum” Presented to 11th National Computer Security Conference”, Baltimore, Md. October 1988.
  • Schou, Corey D., Roland Nord, “Literary Criticism and Programming Pedagogy”, Proceedings Computer Science Conference ACM, Atlanta, February 1988.
  • Schou, Corey D., George Johnson, “Spreadsheets: Integrated Support for Simulations and Games” National ABSEL, Hilton Head South Carolina. February 1987.
  • Schou, Corey D., Alan Carpenter “An interactive Production Planning Simulation System”, National ACM, New Orleans, March 1985.
  • Schou, Corey D., Alan Carpenter “Decision-support Modeling Techniques for Production Planning”, With A. Carpenter, National ACM. New Orleans, March 1985.
  • Schou, Corey D., Alan Carpenter, Mike Moore, “Decision support tools for production analysis”, Mid S.E. Regional ACM, November 1984
  • Schou, Corey D., Rubin, Ronald, “Workshop on Microcomputer Analysis”, National Meeting Small Business Institute Directors Association, Denver, February 1984
  • Schou, Corey D., “An Analysis of Network Systems Available for Business Microprocessors” Presented at annual meeting - Association for Business Simulation and Experiential Learning, Phoenix, Arizona, Mar. 1983
  • Schou, Corey D., “The Development of Criminal Justice Systems with the Microcomputer.” Paper presented to the Academy of Criminal Justice Science, Louisville, KY., March 1983.
  • Schou, Corey D. “Microcomputers And Interactive Video: Applications In Corporate Training”, Paper presented at the National Society for Performance in Instruction. San Diego, California, April 1982.
  • Schou, Andrew, Corey Schou, “The Effect of Managerial Performance on Productivity in a Large Bank”, Presented at the Fifth European Congress on Operations Research, Lausanne, Switzerland, June 1982
  • Schou, Corey D., “Workshop on Microcomputer Applications in the Small Business, “ Paper presented to the Small Business Institute Directors Association, San Francisco, California, February, 1982.
  • Schou, Corey D., A. Schou and P. Storm, “An Examination of Management Leadership Style and Productivity” Washington DC National ORSA/TIMS, May 1980
  • Schou, Corey D., Gary Orwig, “Computer Managed Instruction Materials”, National AECT, Philadelphia PA, April, 1980
  • Schou, Corey D. “The Time Sharing Computer vs. The Dedicated System for the Small Business”, Paper presented to the Small Business Institute Directors Association, Miami, Florida, March 1980.
  • Schou, Corey D., Gerber, Homer, “Educational Needs for Managers Using Computers in Small Business”, Small Business Institute Directors Association, Miami, Florida, March 1980.
  • Schou, Corey, Schou, A, “Management Information Systems: A valuable Adjunct in Matrix Organization Design, “National ORSA/TIMS, Milwaukee, 1979.
  • Schou, Corey, Schou, A, McCartney, W., “Organizational Leadership: Pay and Performance”, National ORSA/TIMS, Milwaukee, 1979.
  • Schou, Corey, Schou, A, “Structural Design Variables and Their Relationship to Employee Job Satisfaction”, National ORSA/TIMS, Milwaukee, 1979.
  • Schou, Corey D., “Workshop on Criminal Justice Information Needs”, Southern Management Association, Atlanta, Georgia. Session Coordinator and Presenter
  • Schou, Corey D., “Development of Prescriptive Feedback in A Man-Machine Interface”, with co-authors, ORSA/TIMS National Meeting, Miami, FL. 1976.
  • Schou, Corey D. “Heuristics in Systems Development As Applied to Criminal Justice Agencies”, ORSA/TIMS National Meeting, Miami, FL. 1976.
  • Schou, Corey D., “A User Oriented Design Methodology for Distributed Information Systems”, ORSA/TIMS, National Meeting, 1976.
Invited Presentations
  • August 2013, Keynote Secure Philippines (2013), Manila Philippines, Building a Computer Security Curriculum for Personnel Interoperability.
  • August 2013, Presentation at International Computer Forensics Workshop, Seoul Korea, Building a Modular Approach to Computer Forensics Certification, CCFP.
  • November 2013, Japan Ministry of Education, MITI, and Denkai University Invited Keynote, Using Education to Build Secure Infrastructure: Building an International Model.
  • Schou, C. (2011). Saudi Arabian Information Assurance Handbook (pp. 421). Riahd: Government of Saudi Arabia.
  • Schou, C., Secure Korea, "Developing new Paradigms for Secure Software," KISA, Korean Government, Seoul, Korea. (2009).
  • Schou, C., SWA Software Assurance, "Bridging the Gap: Aligning the Software and Security Professions," Department of Homeland Security, Washington, DC. (November 1, 2009).
  • Schou, C., "Security as an interdependent software development problem," Education Ministry and CyberSecurity Malaysia, Kuala Lumpur, Malaysia. (July 8, 2009).
  • Schou, C., CyberSecurity Malaysia. (July 7, 2009). Keynote on protecting distributed data systems
  • Schou, C., ADMI, Emerging Trends and Technology, "Ethical Hacking -- Does It Exist," ADMI -- Association of Computer and Information Science/Engineering Departments at Minority Institutions, Baltimore, Maryland -- Morgan State. (April 18, 2009).
  • Schou, C., Building an Information Assurance Program – The Small School Approach – Developing Secure Code, Association of Computer and Information Science Engineering Departments at Minority Institutions, April 2008. Virginia Beach Virginia.
  • Schou, C., “Improving The International Computer Security Research Agenda Using Standards”, Proceeding AUS-CERT. May 2008
  • Schou, C., “Career Path for Information Security Professionals – Developing Secure Software across the Lifecycle”, Secure Korea, October 2008.
  • Schou, C., International Implications for Centers of Excellence in Computer Security, King Saud University, Riyadh, Saudi Arabia, November 2008.
  • Forensic Models for Bombing Case – APEC Legal Briefs, 2007 – Report submitted Manila, Philippines. Schou
  • Developing Secure Code in a managed environment. ISC2 Meetings, Tokyo, Japan November, Schou, C., 2006.
  • Schou , C., Developing Ethical Perspectives for Students, North Carolina Computer Instructors Association, 2006.
  • Schou, Education and Training Standards for Information Assurance Professionals – CNSS 4011, National Security Agency, Baltimore, Maryland, November 2006 Schou
  • Schou, Idaho State University – The First Cohort – A National Success Story, NSF Center of Academic Excellence November 2006
  • Schou, Workshop Developing the Faculty Role of Academia in Protecting Information Technology Resources, PH Workshop, San Diego, California, 2006 – Schou
  • Frost, James, Schou, Corey, The Missing Components Of The Security Audit Fifth Annual Security Conference, April 19, 2006.
  • Schou, C., Ryan, J., The Critical Role of Academia in Protecting Information Technology Resources, PH Workshop, Miami Florida, 2006.
  • Keynote with Malaysian Minister of Technology at International/Asian Forum for Computer Security, 2006
  • Importance of Professional Certification in the International Environment, Kuala Lumpur, Malaysia, International/Asian Forum for Computer Security, 2006
  • Schou, “Career Enhancement Through Professional Certification”, InfoSecurity India Bangalore, India, 2006.
  • Schou, “Developing Standards for Information Assurance”, Korean Information Security Agency, Seoul Korea, November 2006.
  • Schou, “Developing the next generation of CIOs” , SecureKorea: Security Leadership Seminar, 2006.
  • Schou, “Merging Curriculum”, Donguk University Faculty Seminar, 2006, Seoul, Korea, 2006.
  • Schou, Caelli, “Panel on Certification and Standards”, AUSCert, Brisbane, Australia, 2006.
  • Schou, “Status Report on the Profession and Outsourcing, InfoSecurity” Bangalore, India, 2006.
  • Schou, “The Human Factor: Professionalizing the Information Security Workforce”, Singapore, November 2006.
  • Career Enhancement Through Professional Certification”, InfoSecurity India Bangalore, India, 2006. Schou
  • Developing Standards for Information Assurance, Korean Information Security Agency, Seoul Korea, November 2006 Schou
  • Developing the next generation of CIOs , SecureKorea: 2006, Security Leadership Seminar, Schou
  • Merging Curriculum Donguk University Faculty Seminar, 2006, Seoul, Korea.. Schou
  • Panel on Certification and Standards, AUSCert, Brisbane, Australia, Schou, Caelli
  • Status Report on the Profession and Outsourcing, InfoSecurity India Bangalore, India, 2006. Schou
  • Schou, The Human Factor: Professionalizing the Information Security Workforce, Singapore, November 2006.
  • Schou, C.D., Building a Security Curriculum, Securely Keynote Security IT Conference, San Diego, California, April 2005.
  • Schou, Corey D., CSI and Forensics - What is Reality, Keynote -Computer Security Institute, Forensics and Computers in the Curriculum, Raleigh, North Carolina.
  • Schou, Corey D., One Word Model for Information Assurance, Keynote - Colloquium for Information Assurance Education, Adelaide Australia, November 2005.
  • Schou, Corey D., Keynote at Mid-South Computer Science Conferences and ½ day short course on curriculum development Little Rock, Arkansas, 2004.
  • Schou, Corey D., Virginia Institute of Information Technology ½ day short course on IA curriculum development Norfolk, Virginia, 2004
  • Schou, Corey D., Workshop on information assurance textbook requirements San Francisco, California, 2004.
  • Schou, Corey D., Presentation on Information Assurance curriculum at Purdue, West Lafayette, Indiana, 2004.
  • Schou, Corey D., “NIATEC Tools and Resources for Awareness, Training and Education” Presented at CISSE 8, West Point, New York, June 2004.
  • Schou, Corey D., Developing Awareness for University Administrators, EDUCAUSE, January, 2004.
  • Schou, Corey D., James Frost, The Role of the National Colloquium for Information Systems Security Education (NCISSE), presentation to Federal Information Systems Security Educators Association, February, 2002.
  • Schou, Corey D., Information Assurance Initiatives in Idaho, EITEC, November 2002, Idaho Falls, Idaho.
  • Schou, Corey D., Reducing the Shortage of Information Security Professionals in the United States. IT& T Meetings, sponsored by NOIE (National Office of the Information Economy), Canberra Australia, March 14, 2001.
  • Schou, Corey D., On Guard: To Protect and Serve, Syllabus, July 2001
  • Also appears on-line at http://www.syllabus.com/syllabusmagazine/article.asp?id=4195.
  • Schou, Corey D., “Information Assurance Education -- A Worldwide Crisis”, Syllabus, August 2001. Also appears on-line at http://www.syllabus.com/syllabusmagazine/article.asp?id=4578.
  • Schou, Corey D., Security for Electronic Proceedings -- Developing the Information Security Workforce, Institute for Managerial Accountants, Invited Keynote, New Orleans, June 2001.
  • Schou, Corey D., Keynote -- International Curriculum Projects 2001, WISE 2 Proceedings, IFIP 11.8, Perth, Australia, June, 2001. (WISE 2 World Conference Information Security Education) (International Federation of Information Professionals).
  • Schou, Corey, Frost, J., Stratton, W., Wingert, N., LaFond H., Managing Research and Development using Electronic Meeting Space, Proceedings Hawaii Conference on Business, Honolulu, Hawaii, June 2001.
  • Schou, Corey, Maconachy, W.V., Frost, J., Security/Privacy: Building Confidence in Electronic Transactions; Association of Governmental Accountants, April 2001, Coeur d’Alene, Idaho
  • Schou, Corey D., James Frost, GagaPoP Applications for Security Education, Intermountain GigaPoP, Idaho Falls, Idaho, May, 2001.
  • Schou, Corey D., State of the Gap – Involving all Three Components, NCISSE, Washington, DC, May 2001.
  • Schou, Corey D., Reducing the Shortage of Information Security Professionals in the United States. IT& T Meetings, sponsored by NOIE (National Office of the Information Economy), Canberra Australia, March 14, 2001.
  • Schou, Corey, Frincke, D., Security/ Privacy: Building Public Confidence in Electronic Transactions; E-Government Workshop, State of Idaho, Boise, Idaho September 2000.
  • Frost, James and Schou, Corey, Information Assurance - Lost in Risk? Farm Bureau National Managers Meeting, August, 2000.
  • Schou, Corey, Frost, James Developing the InfoSec Workforce October 2000 Information ITAA Global INFOSEC Summit, Washington DC.
  • Schou, Corey, Frost, J., Implementing Office 2000, Making the Jump, Los Angeles, February 1999.
  • Schou, Corey, Mays, S., Developing Curricula for Minority Institutions, UNCF/HACU faculty seminar, Seattle, February 1999 (United Negro College Fund, Hispanic American Colleges and Universities)
  • Schou, Corey, Developing Roles for National Centers of Excellence, Presentation to the National Centers of Excellence Presidents forum, Washington, DC, September 1999.
  • Schou, Corey, Computer Science Curriculum Creation, National ACM meetings SIGCSE, New Orleans, Microsoft Session presentation, March 1999 (Association for Computing Machinery).
  • Schou, Corey, Developments in Information Assurance Curriculum, Information Assurance Centers of Excellence Presidents Forum, Coeur d’Alene, Idaho, July 1999.
  • Schou, Corey, D., Developing a Information Assurance Program: From Standards to Reality. Proceedings of the Carnegie Melon University Education and Training Needs Symposium, Presented at symposium on Sept 1 & 2, Washington DC
  • Schou, Corey, Smith, K, Stratton, W, “From Here to Technology in Less than an Eternity” in Tax Advisor, December 1998.
  • Schou, Corey, “Business/School Outreach: Idaho State helps businesses with decision making” in Corporate Training University, July, August 1998.
  • Schou, Corey, Daniel Pantaleo, Paul Weinberg, RoseAnn Rosenthal, and Frank Friedman, “Industry and Universities: A New Era of Cooperation?” Munir Mandviwalla (moderator). Temple Technology Showcase, June 3-4, 1998.
  • Schou, Corey, Smith, Kenneth, “New Curriculum For Accountants: Integrating Information Systems and Accounting Curricula”, AICPA National Tax Education Symposium, June 5-6, 1998, Las Vegas, Nevada.
  • Schou, Corey, Kenneth Smith, Richard Boes, “Designing a New Venue: Tax, Teaching and Technology”, AICPA National Tax Education Symposium, June 5-6, 1998, Las Vegas, Nevada.
  • Schou, Corey, Smith, Kenneth, Stratton, William, “Technology In Action: Using Technology In Accounting Education”, AICPA National Tax Education Symposium, June 5-6, 1998, Las Vegas, Nevada.
  • Schou, Corey, LaFond, Wingert, Invitational Workshop on Hypertext Computer Security Documents, Baltimore Md., October 1994.
  • Schou, Corey D., Ron Leblanc, “The Application of Computer Models in Marketing Management”, Academy Marketing Science, Montreal, April 1988.
  • Schou, Andrew, Corey Schou, Bill McCartney, “Sources of Influence as Related To Managerial Leadership Style, S. E. Decision Science Institute, February 1988.
Contracts, Grants and Sponsored Research
  • (Pending) Schou, C. (Principal), Frost, J. (Co-Principal), “Interdisciplinary Scholarship for Service for the Inter-Mountain West - Idaho State University,” Sponsored by National Science Foundation, External to Idaho State University, $3,260,186.
  • (Funded) Schou, C. (Principal), Frost, J. (Co-Principal), " Idaho State University SFS 2011 Grant Application," Sponsored by National Science Foundation, External to Idaho State University, $1,826,951. (start: 2011, end: 2014).
  • (Funded) Schou, C. (Co-Principal), Maschner, H. (Co-Principal), “EAGER: Virtual Arctic Archeological Repositories and the Democratization of Science: The Alaska Peninsula Project.” $299,676, start 12/19/2012.
  • (Funded) Schou, C., (Principal), McCurry, M., (Co-Principal), “Indigenous Nations Geosciences Education and Community Awareness Project,” $199,987, 09/01/2011 - 08/31/2015.
  • (Funded) Schou, C. (Principal), Frost, J. (Co-Principal), "Idaho State University Scholarship For Service 2008 Project," Sponsored by National Science Foundation, External to Idaho State University, $333,135.
  • (Funded) Schou, C. (Principal), Frost, J. (Co-Principal), "Idaho State University Scholarship For Service 2008 Project," Sponsored by National Science Foundation, External to Idaho State University, $1,051,509. (start: 2008, end: 2011).
  • (Funded) Schou, C. (Principal), "3D Visualization System," Sponsored by ISR, Idaho State University, $25,000.00. (start: 2011, end: 2013).
  • Developing 3D Visualization System for Data
  • (Funded) Schou, C. (Co-Principal), Maschner, H. (Principal), Betts, M. (Co-Principal), "Virtual Zooarchaeology of the Arctic Project (VZAP): Phase 2," Sponsored by NSF Arctic Research, Idaho State University, $1,029,232.00. (start: October 1, 2010, end: September 30, 2013).
  • (Funded) Schou, C. (Co-Principal), Maschner, H. (Principal), Betts, M. “Virtual Zooarchaeology of the Arctic Project (VZAP),” $767,286, awarded 11/21/2007.
  • (Funded) Schou, C. (Co-Principal), Maschner, H. (Principal), Betts, M. (Co-Principal), “IPY: Virtual Zooarchaeology of the Arctic Project (VZAP),” $942,504, awarded 03/16/2007.
  • (Funded) Schou, C. (Co-Principal), Maschner, H. (Co-Principal), Frost, J. (Supporting), "VZAP Phase I," Sponsored by NSF, External to Idaho State University, $310,605.00. (start: 2007).
  • Image Database
  • (Funded) Frost, J. (Principal), Schou, C. (Co-Principal), “A Collaborative Proposal: FOR THE BUILDING OF INFORMATION SECURITY EXPERTISE AND CAPACITY,” $299,263, 1/29/2007.
  • (Funded) Schou, C.. and Lohse, E., “Construction of a Projectile Point Classification for the Northwestern Plains through a Knowledge Elicitation Protocol Utilizing a Computer-Based Anonymous Decision Tool,” Internally Funded by Humanities/Social Sciences Research Committee National Science Foundation, 2007.
  • (Funded) Schou, C. (Principal), Frost, J. (Co-Principal), Electronic eDACUM X, Revalidated national standards for NSTISSC, Department of Defense, 2001-2005
  • (Funded) Schou, C. (Principal), Frost, J. (Co-Principal), “Cyber Service Education, Training and Awareness at Idaho State University,” $1,661,086, started 08/27/2002.
  • (Funded) Schou, C. (Principal), Frost, J. (Co-Principal), “Electronic eDACUM IX,” Revalidated national standards for Systems Administrator and DAA, National Security Council, 2000-2002
  • (Funded) Schou, C. (Principal), Frost, J. (Co-Principal), “Electronic eDACUM VIII Validation,” Validated national standards for Risk Analyst, National Security Council, 2000-2001.
  • (Funded) Schou, C. (Principal), Frost, J. (Co-Principal), “Electronic eDACUM VII,” Developed national standards for Information Systems Security Certifiers, National Security Council, 1998-2000.
  • (Funded) Schou, C. (Principal), Frost, J. (Co-Principal), “Electronic eDACUM VI, Developed materials for Systems Security officers for Information Security operations. Used portable system and Paradigm software to support 50 concurrent users. 1995-1996
  • (Funded) Schou, C. (Principal), Frost, J. (Co-Principal), “Electronic DACUM V, Developed integrated training program materials for all levels of federal employees. Funded by the National Security Agency, 1994-1995.
  • (Funded) Schou, C. (Principal), Frost, J. (Co-Principal), “Electronic DACUM IV,”Conducted an Electronic Group Decision Support forum for a diverse sample of federal agencies on the implementation of training for DAA, ISSO and Systems Administrators. The new technology implemented here will allow DoD trainers to develop new training, 1994.
  • (Funded) Schou, C. (Principal), Frost, J. (Co-Principal), “Electronic DACUM III,” Conducted an Electronic Group Decision Support forum for a diverse sample of federal agencies on the implementation of training to meet PL 100-235. It is expected that the expanded Model implemented by the National Institute of Standards and Technology, 1993-1994.
  • (Funded) Schou, C. (Principal), Frost, J. (Co-Principal), “Electronic DACUM II,” Conducted an Electronic Group Decision Support forum for a diverse sample of federal agencies on the implementation of training to meet PL 100-235, DACUM II, Information Security Training Requirements, published by the Federal Information Systems Security Association, and the National Computer Security Center. Baltimore, Md. September 1993, The results DACUM II held at Idaho State University were distributed at the National Computer Security Conference in September 1993. (pp. 134), 1992-1993.
  • (Funded) Schou, C. (Principal), Frost, J. (Co-Principal), “Electronic DACUM I, Conducted an Electronic Group Decision Support forum for a diverse sample of federal agencies on the implementation of training to meet PL 100-235, DACUM I, Establishing The Baseline, pub¬lished by the Federal Information Systems Security Association, Washington, D. C., February 1993, prepared the complete DACUM I re¬port for the Federal Government. ISU has distributed 500 copies to industry. (pp. 176), 1992-1992

Service

General Service

University
  • Statewide Critical Infrastructure Advisory Committee, Approximately 50 hour spent per year. 2012-Present.
    • Appointed 2012 2013
    • Elected Vice Chair 2014
  • University Computer Security Advisory Committee, Chair, approximately 40 hours spent per year, Appointed, Local. (August 2011 - Present).
  • Program Coordinator for Computer Science in Engineering, Other, approximately 400 hours spent per year, Appointed, Regional. (July 2011 - 2012).
    • Mentoring new department chair and attempting to maintain accreditation of program. Coordinate new report for ABET (150 pages) after earlier one by EE which failed
  • Saudi Student Association, Student Org Advisor (Non-Professional Org), Other, approximately 20 hours spent per year. (July 2009 - 2014).
    • Faculty Advisor
  • VP Research Advisory Board, Committee Member, Member, approximately 20 hours spent per year, Appointed. (2009 - Present).
    • Advise the VP Research on issues of interest to the research institutes on campus.
  • RISE Facility Advisory Board, Committee Member, anticipated 30 hour spent per year. (2014 – Present)
College
  • Information Assurance Program --, Administrative Assignment, Associate Dean, Other, Appointed. (2005 - Present).
    • Coordinate Information Assurance Program and associated technology issues
  • Student recruiting tor MBA and Scholarship for Service, Student Recruiter, approximately 120 hours spent per year. (August 2005 - Present).
    • Recruit MBA and Undergraduates for Scholarship for Service.
  • Informatics Research Institute, Other Officer, approximately 780 hours spent per year, Appointed, International. (2005 - Present).
    • Direct and coordinate activities of the Informatics Research Institute. Support research and researchers across five colleges. Teach courses to MBA and Computer Science students.
Professional
  • Board of Directors International Information Systems Security Certification Consortium, Pro Bono Professional Service, Member, approximately 100 hours spent per year, Elected, International. (January 2009 - Present).
    • One of 13 board members of 120,000 member organization Elected Chair of Board 2015-2016
  • Consortium Asian Advisory Board, Chair of Advisory Board with 20 members, 2005-Present President/Elect/Past, approximately 100 hours spent per year, Appointed, International. (2005 - 2012).
    • Coordinate security professionals across Asia
  • Management Consulting, Australian Government, AUSCERT, Pro Bono. (2011 - Present).
    • Worked with Australian Computer Emergency Response Team on Professional Certification Standards in Information Assurance. Ongoing
  • Management Consulting, Government of Indonesia, Jakarta, Pro Bono. (2011 - Present).
    • Worked with Indonesian government to establish standards for Computer Security Training
  • Academic, King Saud University, Riyadh, Saudi Arabia, Pro Bono. (2011 - 2014).
    • Developing standards for KSU Center of Academic Excellence in Information Assurance. Working with Saudi Center of Excellence on Computer Security
  • Academic, Government of Saudi Arabia, Saudi Arabia, Pro Bono. (November 2010 - 2014).
    • Prepared Saudi Arabia Information Assurance Handbook. Translated into Arabic. Published as government document 12,000 copies in first edition.
  • Management Consulting, Computer Security Hall of Fame, Baltimore, MD, Pro Bono. (2012 - Present).
    • Serve on founding board of directors for national effort to select members of a Computer Security hall of fame.

Editorships and Program Boards

Technical Editor Elsevier

  • Ryan, Julie JCH, and Cade Kamachi. Detecting and Combating Malicious Email. Syngress-Elsivier, 2014. – Present

Series Editor, McGraw Hill

  • Computer Security Series Editor, McGraw Hill 2005 – Present
    • McGraw Hill Series Editor, Editor, International, 10, Papers, Appointed, Published, Academic. (July 2002 - Present).
    • Review 5-10 book manuscripts each year

Editorial Boards

  • Editorial Board European Conference on Information Warfare and Security 2006-present
  • Editorial Board International Conference on Information Warfare and Security 2005 – present
  • Journal Editorial Board, Information and Computer Security 2014 -- Present
  • Journal Editorial Board, Journal of Information Management and Computer Security 2005 – Present
  • Recent Reviews 2013-2014
    • IMCS-01-2010-0007 Information Security Governance in Saudi Organizations: An Empirical Study
    • IMCS-05-2013-0028 Framework for Preventing Money Laundering in Banks
    • IMCS-08-2013-0039 Security Education In Colleges: Is It Sufficient?
    • IMCS-11-2013-0056 Hackademic Challenges
    • IMCS-03-2013-0013 Child Security on cyber space through Moral cognition
    • IMCS-09-2013-0057 Democracy, Culture and Information Security: A Case Study in Zanzibar
    • IMCS-01-2013-0005 Recommendations for an Information Security Training Program for College Students
    • IMCS-08-2013-0057 Security Culture and the Employment Relationship as Drivers of Employees' Security Compliance
    • IMCS-09-2013-0063 Snakes and Ladders for digital natives: Information security education for the youth
    • IMCS-02-2014-0017 Management commitment and awareness creation - ICT safety and security in electric power supply network companies
    • IMCS-05-2014-0030 User Attitude and Behavior towards Information Security
    • IMCS-07-2014-0053 Trust in cyberspace
  • Reviewer Hawaii International Conference on Systems Sciences (HICSS) 2013
    • Minitrack Information Assurance and Interoperability in Health Care, Chair Hawaii International Conference on Systems Sciences
  • Program Committee 2014 IFIP WISE 9 IFIP Working Group 11.8 (Information Security Education) “Information Security Education Across the Curriculum”.
    • Reviewer 2 papers
  • Program Committee, CLASP 2014 IEEE/ACM International Workshop on Advances in Cloud Computing Legislation, Accountability, Security and Privacy (CLASP)
    • Reviewer 2 papers
  • Program Committee WISE 8 IFIP WG 11.8 (Information Security Education)
    • Reviewer 3 papers
  • Reviewer, Human Aspects of Information Security and Assurance (HAISA) Workshop on Digital Forensics and Incident Analysis (WDFIA) IFIP Information Security Education Workshop 12th Annual IFIP Workshop on Information Security Management", IFIP International Federation of Information Professionals, Invited Manuscript Reviewer, International, Papers, Appointed, Accepted, Academic. (June 2009 - Present).
  • Reviewer Hawaii International Conference on Systems Sciences (HICSS 45) 2014
  • Technical Board, A. S. I. A., (2013). 8th Annual Symposium on Information Assurance (ASIA’13).
    • Reviewer 2 papers

Academic Program and Personnel Reviews

  • Academic Program Review, Networks and Security Curriculum, Whatcom Community, College, Washington 2014
  • Academic Program Review, BAS in CyberSecurity and Forensics,Highline, College,, Washington 2014
  • Academic Program Review, Bachelor of Computer Security, Polytechnic of Namibia, Namibia, 2014

Directed Student Learning

2011-2013 6 students in Practicum and Masters research
Total load 13 students
2012-2014 7 students in Practicum and Masters research
Total Load 13 students
2013-2015 5 students in Practicum and Masters research
Total Load 12 students
2014-2016 5 students in Practicum and Masters research
Total load 10 students
  • Graduate Supervised Research, "Practicum in Information Assurance," MBA. CIS, 4.0 credit hours, In-Process. (August 2013 - May 2015). Advised: James Burres
  • Graduate Supervised Research, "Practicum in Information Assurance," MBA. CIS, 4.0 credit hours, In-Process. (August 2013 - May 2015). Advised: Joshua Sommers
  • Graduate Supervised Research, "Practicum in Information Assurance," MBA. CIS, 4.0 credit hours, In-Process. (August 2013 - May 2015). Advised: Kyle Griffith
  • Graduate Supervised Research, "Practicum in Information Assurance," MBA. CIS, 4.0 credit hours, In-Process. (August 2013 - May 2015). Advised: Stephen Terry
  • Graduate Supervised Research, "Practicum in Information Assurance," MBA. CIS, 4.0 credit hours, In-Process. (August 2013 - May 2015). Advised: Timothy Wakeman
  • Graduate Supervised Research, "Practicum in Information Assurance," MBA. CIS, 4.0 credit hours. (August 2012 - May 2014). Advised: Cade Kamachi
  • Graduate Supervised Research, "Practicum in Information Assurance," MBA. CIS, 4.0 credit hours. (August 2012 - May 2014). Advised: Eliot Long
  • Graduate Supervised Research, "Practicum in Information Assurance," MBA. CIS, 4.0 credit hours. (August 2012 - May 2014). Advised: Fox Albert
  • Graduate Supervised Research, "Practicum in Information Assurance," MBA. CIS, 4.0 credit hours. (August 2012 - May 2014). Advised: Jeremy Brown
  • Graduate Supervised Research, "Practicum in Information Assurance," MBA. CIS, 4.0 credit hours. (August 2012 - May 2014). Advised: Marshall Smith
  • Graduate Supervised Research, "Practicum in Information Assurance," MBA. CIS, 4.0 credit hours. (August 2012 - May 2014). Advised: Princess Young
  • Graduate Supervised Research, "Practicum in Information Assurance," MBA. CIS, 4.0 credit hours. (August 2012 - May 2014). Advised: Ryan Beckstead
  • Master's Thesis Committee Chair, "Thesis," MBA. CIS, 4.0 credit hours. (August 2012 - May 2014). Advised: Cade Kamachi
  • Master's Thesis Committee Chair, "Thesis," MBA. CIS, 4.0 credit hours. (August 2012 - May 2014). Advised: Eliot Long
  • Master's Thesis Committee Chair, "Thesis" MBA. CIS, 4.0 credit hours. (August 2012 - May 2014). Advised: Fox Albert
  • Master's Thesis Committee Chair, "Thesis" MBA. CIS, 4.0 credit hours. (August 2012 - May 2014). Advised: Jeremy Brown
  • Master's Thesis Committee Chair, "Thesis" MBA. CIS, 4.0 credit hours. (August 2012 - May 2014). Advised: Marshall Smith
  • Master's Thesis Committee Chair, "Thesis" MBA. CIS, 4.0 credit hours. (August 2012 - May 2014). Advised: Princess Young
  • Master's Thesis Committee Chair, "Thesis" MBA. CIS, 4.0 credit hours. (August 2012 - May 2014). Advised: Ryan Beckstead
  • Graduate Supervised Research, "Practicum in Information Assurance," MBA. CIS, 4.0 credit hours. (August 2011 - May 2013). Advised: Brandon Streator
  • Graduate Supervised Research, "Practicum in Information Assurance," MBA. CIS, 4.0 credit hours. (August 2011 - May 2013). Advised: Christopher Bramwell
  • Graduate Supervised Research, "Practicum in Information Assurance," MBA. CIS, 4.0 credit hours. (August 2011 - May 2013). Advised: Daniel Rochester
  • Graduate Supervised Research, "Practicum in Information Assurance," MBA. CIS, 4.0 credit hours. (August 2011 - May 2013). Advised: Jack Slade
  • Graduate Supervised Research, "Practicum in Information Assurance," MBA. CIS, 4.0 credit hours. (August 2011 - May 2013). Advised: Preston Hill
  • Graduate Supervised Research, "Practicum in Information Assurance," MBA. CIS, 4.0 credit hours. (August 2011 - May 2013). Advised: Randall Marshall
  • Thesis/MBA Paper, “MBA Paper”. MBA. CIS, 4.0 credit hours. (August 2011 - May 2013). Advised: Brandon Streator
  • Thesis/MBA Paper, “MBA Paper”. MBA. CIS, 4.0 credit hours. (August 2011 - May 2013). Advised: Christopher Bramwell
  • Thesis/MBA Paper, “MBA Paper”. MBA. CIS, 4.0 credit hours. (August 2011 - May 2013). Advised: Daniel Rochester
  • Thesis/MBA Paper, “MBA Paper”. MBA. CIS, 4.0 credit hours. (August 2011 - May 2013). Advised: Jack Slade
  • Thesis/MBA Paper, “MBA Paper”. MBA. CIS, 4.0 credit hours. (August 2011 - May 2013). Advised: Preston Hill
  • Thesis/MBA Paper, “MBA Paper”. MBA. CIS, 4.0 credit hours. (August 2011 - May 2013). Advised: Randall Marshall
  • Dissertation Committee Member, "Security and Forensics -- RAVE vs LARE,". 3.0 credit hours, (May 2011 - January 2013). Advised: Vincent Nestler, functioned as research director
NIATEC National Science Foundation Information Assurance Directorate Department of Homeland Security CISSE Scholarship For Service