Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3017680.3017713acmconferencesArticle/Chapter ViewAbstractPublication PagessigcseConference Proceedingsconference-collections
research-article
Public Access

Cybersecurity for Future Presidents: An Interdisciplinary Non-majors Course

Published: 08 March 2017 Publication History

Abstract

We discuss the design and implementation of an interdisciplinary non-majors course Cybersecurity for future presidents, which broadens the types of computational courses available for non-majors. The goal of our course is to build awareness of cybersecurity issues and to promote thinking critically about them. Student debates on controversial cybersecurity issues facing society today motivate the technical and policy content. We present student assessment results, which demonstrate an increase of students' awareness, and outline directions for future course improvements.

References

[1]
Scott, T. 2015. Strengthening and Enhancing Federal Cybersecurity for the 21st Century. (July 31, 2015). Retrieved July 7, 2016 from https://www.whitehouse.gov/blog/2015/07/31/strengthening-enhancing-federal-cybersecurity-21st-century
[2]
White & Case. 2015. Cyber Risk: Why Cyber Security is Important. Latitudes 3 (Summer 2015). Retrieved July 7, 2016 from http://latitudes.whitecase.com/cyber-risk-why-cyber-security-is-important
[3]
Turner, C. F., Taylor, B. and Kaza, S. Security in computer literacy: A model for design, dissemination, and assessment. In Proceedings of the 42nd ACM Technical Symposium on Computer Science Education (Dallas, TX, March 09--12, 2011). SIGCSE '11. ACM, New York, NY, 15--20.
[4]
Sullivan, D. G. A data-centric introduction to computer science for non-majors. In Proceedings of the 44th ACM Technical Symposium on Computer Science Education (Denver, CO, March 06-09, 2013). SIGCSE '13. ACM, New York, NY, 71--76.
[5]
Muller, R. n.d. Physics for Future Presidents. (n.d.). Retrieved July 7, 2016 from http://muller.lbl.gov/teaching/Physics10/PffP.html
[6]
Burley, D. L. and Bishop, M. 2011. Summit on Education in Secure Software: Final Report. Technical Report. UC Davis: College of Engineering.
[7]
Kernighan, B. W. 2011. D is for Digital: What a Well-Informed Person Should Know about Computers and Communications. DisforDigital.net
[8]
Intelligence Squared U.S. n.d. Intelligence Squared Debates. (n.d.). Retrieved July 7, 2016 from http://intelligencesquaredus.org/.
[9]
Clark, D., Berson, T., and Lin, H. S. (Eds.). 2014. At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues. The National Academies Press, Washington, DC. Also,
[10]
CS Education Research Group. n.d. CS Unplugged: Computer Science without a Computer. (n.d.). July 7, 2016 from http://csunplugged.org/.
[11]
National Institute of Standards and Technology. 2014. Framework for Improving Critical Infrastructure Cybersecurity, Ver. 1. (Feb. 12, 2014). Retrieved July 7, 2016 from http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214.pdf

Cited By

View all
  • (2021)First year students’ experience in a Cyber World course – an evaluationEducation and Information Technologies10.1007/s10639-020-10274-526:1(1069-1087)Online publication date: 1-Jan-2021
  • (2020)Design of a cyber security awareness campaign to be implemented in a quarantine laboratoryJournal of Computing Sciences in Colleges10.5555/3417682.341768335:9(11-18)Online publication date: 12-Aug-2020
  • (2019)Securing the HumanProceedings of the Working Group Reports on Innovation and Technology in Computer Science Education10.1145/3344429.3372507(157-176)Online publication date: 18-Dec-2019

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGCSE '17: Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education
March 2017
838 pages
ISBN:9781450346986
DOI:10.1145/3017680
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 March 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. computer science education
  2. computing and society
  3. security policy

Qualifiers

  • Research-article

Funding Sources

Conference

SIGCSE '17
Sponsor:

Acceptance Rates

SIGCSE '17 Paper Acceptance Rate 105 of 348 submissions, 30%;
Overall Acceptance Rate 1,595 of 4,542 submissions, 35%

Upcoming Conference

SIGCSE Virtual 2024
1st ACM Virtual Global Computing Education Conference
December 5 - 8, 2024
Virtual Event , NC , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)45
  • Downloads (Last 6 weeks)9
Reflects downloads up to 22 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2021)First year students’ experience in a Cyber World course – an evaluationEducation and Information Technologies10.1007/s10639-020-10274-526:1(1069-1087)Online publication date: 1-Jan-2021
  • (2020)Design of a cyber security awareness campaign to be implemented in a quarantine laboratoryJournal of Computing Sciences in Colleges10.5555/3417682.341768335:9(11-18)Online publication date: 12-Aug-2020
  • (2019)Securing the HumanProceedings of the Working Group Reports on Innovation and Technology in Computer Science Education10.1145/3344429.3372507(157-176)Online publication date: 18-Dec-2019

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media