| 4 | -- | 0 | John Impagliazzo. Editor's corner |
| 6 | -- | 11 | Yan Timanovsky. Digest of ACM educational activities |
| 12 | -- | 16 | Curt M. White. Spotlight |
| 18 | -- | 0 | Cameron Wilson. Hour of code: bringing research to scale |
| 20 | -- | 22 | Tony Clear. IT industry employers expectations: our graduates deserve better! |
| 22 | -- | 23 | Heikki Topi. A truly global approach to revising the MSIS curriculum recommendation |
| 24 | -- | 26 | Henry M. Walker. Why a required course on theory? |
| 27 | -- | 28 | Lauri Malmi. Supervisor's perspective |
| 29 | -- | 30 | Michal Armoni. th WiPSCE conference, Berlin, November 2014 |
| 31 | -- | 32 | Lisa C. Kaczmarczyk. Do you speak #scicomm? |
| 33 | -- | 35 | Elizabeth K. Hawthorne. Creating 2+2 education pathways in cybersecurity |
| 36 | -- | 43 | Frances K. Bailie. st century |
| 44 | -- | 49 | Tina J. Ostrander. Making learning relevant for the real world: co-teaching with an industry professional |
| 50 | -- | 56 | Nenad Jukic, Heikki Topi. Teradata University Network: collaboration between industry and academia for improving education |
| 58 | -- | 0 | Diana L. Burley. Cybersecurity education, part 2 |
| 60 | -- | 63 | Diana L. Burley, Ernest L. McDuffie. An interview with Ernest McDuffie on the future of cybersecurity education |
| 64 | -- | 69 | Corey D. Schou. Plus ça change, plus c'est la même chose |
| 70 | -- | 76 | Claude Turner, Jie Yan, Dwight Richards, Pamela O'Brien, Jide Odubiyi, Quincy Brown. LUCID: a visualization and broadcast system for cyber defense competitions |
| 77 | -- | 81 | Ambareen Siraj, Blair Taylor, Siddharth Kaza, Sheikh Ghafoor. Integrating security in the computer science curriculum |
| 82 | -- | 83 | Daniel D. Garcia. TECH launch with gradescope: exam grading will never be the same again! |
| 84 | -- | 0 | Renee Dopplick. Experiential cybersecurity learning |