Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/2819009.2819078acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Experiences in developing and delivering a programme of part-time education in software and systems security

Published: 16 May 2015 Publication History

Abstract

We report upon our experiences in developing and delivering a programme of part-time education in Software and Systems Security at the University of Oxford. The MSc in Software and Systems Security is delivered as part of the Software Engineering Programme at Oxford --- a collection of one-week intensive courses aimed at individuals who are responsible for the procurement, development, deployment and maintenance of large-scale software-based systems. We expect that our experiences will be useful to those considering a similar journey.

References

[1]
T. C. Lethbridge, "What knowledge is important to a software professional?" IEEE Computer, vol. 33, no. 5, pp. 44--50, 2000.
[2]
M. Shaw, "Software engineering education: A roadmap," in Proceedings of the 22nd International Conference on Software Engineering (ICSE 2000). ACM Press, 2000, pp. 371--380.
[3]
M. Shaw, "Continuing prospects for an engineering discipline of software," IEEE Software, vol. 26, no. 6, pp. 64--67, 2009.
[4]
C. O'Leary, D. Lawless, D. Gordon, L. Haifeng, and K. Bechkoum, "Developing a software engineering curriculum for the emerging software industry in China," in Proceedings of the 19th IEEE International Conference on Software Engineering Education and Training (CSEET 2006), 2006, pp. 115--122.
[5]
G. Taran and M. Rosso-Llopart, "Software engineering education in Russia: A comparative study of people, process and technology: A four year pespective," in Proceedings of the 20th IEEE International Conference on Software Engineering Education and Training (CSEET 2007), 2007, pp. 19--28.
[6]
K. Garg and V. Varma, "Software engineering education in India: Issues and challenges," in Proceedings of the 21st IEEE Conference on Software Education Education and Training (CSEET 2008), 2008, pp. 110--117.
[7]
M. R. Ali, "Imparting effective software engineering education," ACM SIGSOFT Software Engineering Notes, vol. 31, no. 4, pp. 1--3, 2006.
[8]
N. R. Mead, "Software engineering education: How far we've come and how far we have to go," Journal of Systems and Software, vol. 82, no. 4, pp. 571--575, 2009.
[9]
M. A. Ardis and P. B. Henderson, "Software engineering education (SEEd): Is software engineering ready for MOOCs?" ACM SIGSOFT Software Engineering Notes, vol. 37, no. 5, pp. 14--14, 2012.
[10]
N. R. Mead, H. J. C. Ellis, A. Moreno, and P. MacNeil, "Can industry and academia collaborate to meet the need for software engineers?" Cutter IT Journal, vol. 14, no. 6, pp. 32--39, 2001.
[11]
S. Fraser, R. Bareiss, B. Boehm, M. Hayes, L. Hill, G. Silberman, and D. Thomas, "Meeting the challenge of software engineering education for working professionals in the 21st century," in Proceedings of the 18th Annual SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2003), 2003, pp. 262--264.
[12]
R. B. Vaughn and J. Carver, "Position paper: The importance of experience with industry in software engineering education," in Proceedings of the 19th IEEE International Conference on Software Engineering Education and Training (CSEET 2006), 2006, pp. 19--19.
[13]
G. V. B. Subrahmanyam, "A dynamic framework for software engineering education curriculum to reduce the gap between the software organizations and software educational institutions," in Proceedings of the 22nd IEEE International Conference on Software Engineering Education and Training (CSEET 2009), 2009, pp. 248--254.
[14]
N. E. A. M. Almi, N. A. Rahman, D. Purusothaman, and S. Sulaiman, "Software engineering education: The gap between industry's requirements and graduates' readiness," in Proceedings of the IEEE Symposium on Computers and Informatics (ISCI 2011), 2011, pp. 542--547.
[15]
A. C. Simpson, A. P. Martin, J. Gibbons, J. W. M. Davies, and S. W. McKeever, "On the supervision and assessment of part-time postgraduate software engineering projects," in Proceedings of the 25th International Conference on Software Engineering (ICSE 2003). IEEE Computer Society Press, 2003, pp. 628--633.
[16]
J. W. M. Davies, A. C. Simpson, and A. P. Martin, "Teaching formal methods in context," in CoLogNET/FME Sympsoium, TFM 2004, ser. Lecture Notes in Computer Science, C. N. Dean and R. T. Boute, Eds. Springer, 2004, vol. 3294, pp. 185--202.
[17]
J. M. Spivey, The Z Notation: A Reference Manual, 2nd ed. Prentice-Hall International, 1992.
[18]
J. C. P. Woodcock and J. W. Davies, Using Z: Specification, Refinement, and Proof. Prentice-Hall International, 1996.
[19]
C. A. R. Hoare, Communicating Sequential Processes. Prentice-Hall International, 1985.
[20]
A. W. Roscoe, Understanding Concurrent Systems. Springer-Verlag, 2010.
[21]
J.-R. Abrial, The B-Book: Assigning Programs to Meanings. Cambridge University Press, 1996.
[22]
S. A. Schneider, The B-Method: An Introduction. Palgrave Cornerstones in Computer Science, 2001.
[23]
B. S. Blanchard, System Engineering Management. Wiley, 1998.
[24]
E. Hjelmås and S. D. Wolthusen, "Full-spectrum information security education: Integrating B. Sc., M. Sc., and Ph.D. programs," in Proceedings of the 3rd Annual Conference on Information Security Curriculum Development (InfoSecCD 2006), 2006, pp. 5--12.
[25]
M. Petković and W. Jonker, Eds., Security, Privacy, and Trust in Modern Data Management. Springer, 2007.
[26]
K. O'Hara and N. Shadbolt, The Spy In The Coffee Machine: The End of Privacy As We Know It. Oneworld Publications, 2008.
[27]
M. Bishop, Introduction to Computer Security. Addison Wesley, 2004.
[28]
D. D. Clark and D. R. Wilson, "A comparison of commercial and military computer security policies," in Proceedings of the 1987 IEEE Symposiym on Research in Security and Privacy, 1987, pp. 183--193.
[29]
D. Korff and N. Shadbolt, "Public information: Cause for celebration or concern?" Public and Science, pp. 10--11, March 2010.
[30]
A. C. Simpson, "On privacy and public data: A study of data.gov.uk," Journal of Privacy & Confidentiality, vol. 3, no. 1, pp. 51--65, 2011.
[31]
C. Ciechanowicz, K. M. Martin, F. C. Piper, and M. J. B. Robshaw, "Ten years of information security masters programmes: Reflections and new challenges," in Security Education and Critical Infrastructures, C. Irvine and H. Armstrong, Eds. Kluwer Academic Publishers, 2003, pp. 215--230.
[32]
N. R. Mead, J. McDonald, J. H. Allen, M. Ardis, T. B. Hilburn, A. J. Kornecki, and R. C. Linger, "Development of a master of software assurance reference curriculum," International Journal of Secure Software Engineering, vol. 1, no. 4, pp. 18--34, 2010.
[33]
N. R. Mead, J. H. Allen, M. Ardis, T. B. Hilburn, A. J. Kornecki, R. C. Linger, and J. McDonald, "Software assurance curriculum project volume I: Master of software assurance reference curriculum," Software Engineering Institute, Carnegie Mellon University, Tech. Rep. CMU/SEI-2010-TR-005/ESD-TR-2010-005, August 2010.
[34]
N. R. Mead, T. B. Hilburn, and R. C. Linger, "Software assurance curriculum project volume II: Undergraduate course outlines," Software Engineering Institute, Carnegie Mellon University, Tech. Rep. CMU/SEI-2010-TR-019, ESC-TR-2010-019, August 2010.
[35]
N. R. Mead, J. H. Allen, M. Ardis, T. B. Hilburn, A. J. Kornecki, and R. C. Linger, "Software assurance curriculum project volume III: Master of software assurance course syllabi," Software Engineering Institute, Carnegie Mellon University, Tech. Rep. CMU/SEI-2011-TR-013/ESD-TR-2011-013, March 2011.
[36]
L. F. Cranor and N. Sadeh, "A shortage of privacy engineers," IEEE Security & Privacy, vol. 11, no. 2, pp. 77--79, 2013.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICSE '15: Proceedings of the 37th International Conference on Software Engineering - Volume 2
May 2015
1058 pages

Sponsors

Publisher

IEEE Press

Publication History

Published: 16 May 2015

Check for updates

Qualifiers

  • Research-article

Conference

ICSE '15
Sponsor:

Acceptance Rates

Overall Acceptance Rate 276 of 1,856 submissions, 15%

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 105
    Total Downloads
  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Dec 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media