Corey Schou


Corey D. Schou is the University Professor of Informatics and the Associate Dean of the College of Business at Idaho State University. He has been involved in establishing computer security and information assurance training and standards for 25 years. His research interests include information assurance, ethics, privacy, and collaborative decision making. He was responsible for compiling and editing computer security standards and training materials for the Committee on National Security Systems. Throughout his career, he has remained an active classroom teacher despite his research and service commitments. He is the founding director of the Informatics Research Institute and the National Information Assurance Training and Education Center (NIATEC) that was designated the National Center of Excellence in Information Assurance Education. In 1996, his research center was cited by the Information Systems Security Association (ISSA) for Outstanding Contributions to the Security Profession and he was selected as the Educator of the Year by the Federal Information Systems Security Educators Association (FISSEA). In 1997, the Masie Institute and TechLearn Consortium recognized his contributions to distance education. In 2001, Schou was honored by (ISC)2 with the Tipton award for his work in professionalization and the development of the common body of knowledge in computer security.. Schou serves as the chair of the Colloquium for Information Systems Security Education (CISSE). Under his leadership, the Colloquium creates an environment for exchange and dialogue among leaders in government, industry, and academia concerning information security and information assurance education. In addition, he the editor of Information Systems Security , the computer security and information assurance series editor for McGraw Hill and serves on the board of several professional organizations.

EDUCAUSE Publications

  • What's in a Name?
    • Article

    As colleges and universities attempt to ramp up the security of their computer networks, a common strategy has been to employ dedicated security staff and establish a central IT security office.