Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3197091.3197110acmconferencesArticle/Chapter ViewAbstractPublication PagesiticseConference Proceedingsconference-collections
research-article
Public Access

Cybersecurity in liberal arts general education curriculum

Published: 02 July 2018 Publication History

Abstract

Cybersecurity learning has been explored through different analytical lenses, across a range of grade levels and academic institutions. From attempts to standardize learning with accreditation to refining curricula and labs, there is currently considerable effort to create more programs in this discipline to address a million-job gap within the cybersecurity workforce. One primary challenge in cybersecurity education on the post-secondary level is offering experiential coursework to undergraduate students at liberal arts institutions. While such experiential coursework is already prevalent at research universities, smaller liberal arts institutions are still trying to gain a foothold into offering cybersecurity as a course of study. We address this issue with the design of an undergraduate course and cybersecurity learning modules that fit into the liberal arts education. First, we present the design of a general education course situated in a new educational paradigm, project CyberPaths, aiming at helping primarily undergraduate institutions with limited resources to introduce experiential cybersecurity learning. It takes advantage of experiential learning through a cloud infrastructure called Global Environment for Network Innovations (GENI). Then we describe our experience teaching this First Year Experience (FYE) course that exposed freshmen of different majors to cybersecurity. We present the design of pre- and post-course surveys, as well as focus group interviews that were used to evaluate students’ learning experience. Student feedback and direct observation suggest that incorporating flexible cybersecurity modules into general education coursework can be an effective vehicle to demonstrate importance and key concepts of cybersecurity to a diverse student population.

References

[1]
(ISC)², "2017 Global Information Security Workforce Study," {Online}. Available: http://bit.ly/2qVp6CF. {Accessed 2017}.
[2]
S. Morgan, "Zero-percent cybersecurity unemployment, 1 million jobs unfilled," CSO Online, 2016 September 2016. {Online}. Available: http://bit.ly/2cL50VM. {Accessed 2017}.
[3]
J. Ekstrom, A. Parrish, E. Sobiesk, R. Raj, "ABET Supporter Session: Computing and CS Accreditation - What You Should Know," in 48TH ACM Technical Symposium on Computer Science Education (SIGCSE), March 8-11., Seattle, 2017.
[4]
The 2011 ITiCSE Working Group on Information Assurance (IA) Education, "Information Assurance Education in Two- and Fouryear Institutions," in Proceedings of the 16th Annual Conference Reports on Innovation and Technology in Computer Science Education - Working Group Reports, Darmstadt, Germany, 2011.
[5]
"ACM Joint Task Force on Cybersecurity Education," 2015. {Online}. Available: http://www.csec2017.org/. {Accessed 2016}.
[6]
"National Centers of Academic Excellence in Cyber Defense," 2016. {Online}. Available: http://bit.ly/2bJiCA2. {Accessed 2017}.
[7]
"Project CyberPaths," {Online}. Available: http://blogs.cofc.edu/cyberpaths/modules/. {Accessed 2017}.
[8]
"Security Injections @Towson – Cybersecurity Modules for Computer Science Courses," {Online}. Available: http://bit.ly/2G1llDq. {Accessed 2016}.
[9]
"Security Knitting Kit," {Online}. Available: http://bit.ly/2Dw4paM. {Accessed 2016}.
[10]
"SEED Labs," Syracuse University, {Online}. Available: http://bit.ly/2F1UKok.
[11]
"EDURange: A Cybersecurity Competition Platform to Enhance Undergraduate Security Analysis Skills," {Online}. Available: http://bit.ly/2G2mk6c. {Accessed 2016}.
[12]
R. Weiss, J. Mache, and E. Nilsen, "Top 10 Hands-on Cybersecurity Exercises," Consortium for Computing Sciences in Colleges, vol. 29, no. 1, pp. 140--147, 2013.
[13]
M. Berman, J. S. Chase, L. Landweber, A. Nakaod, M. Ott, D. Raychaudhuri, R. Ricci, and I. Seskar, "GENI: A federated testbed for innovative network experiments," Computer Networks, vol. 61, pp. 5-23, 2014.
[14]
J. Wing, "Computational Thinking," Communications of the ACM, pp. 33-35, 2006.
[15]
C. Alvarado, "CS1," {Online}. Available: http://bit.ly/2Dorg3T. {Accessed 2017}.
[16]
"CS 150, Personal Productivity Using Technology," {Online}. Available: http://bit.ly/2DzXcWb. {Accessed 2017}.
[17]
A. &. J. C. Strauss, Basics of qualitative research: Techniques and procedures for developing grounded theory., Thousand Oaks, CA: Sage., 1998.

Cited By

View all
  • (2024)A Critical Review of Cybersecurity Education in the United StatesProceedings of the 55th ACM Technical Symposium on Computer Science Education V. 110.1145/3626252.3630757(241-247)Online publication date: 7-Mar-2024
  • (2023)Reimaging Cybersecurity in Educational PracticesHandbook of Research on Current Trends in Cybersecurity and Educational Technology10.4018/978-1-6684-6092-4.ch001(1-18)Online publication date: 17-Feb-2023
  • (2023)Some Emerging Trends in Cybersecurity Education and Training for EntrepreneursProceedings of the International Conference on Business Excellence10.2478/picbe-2023-008817:1(971-975)Online publication date: 14-Jul-2023
  • Show More Cited By

Index Terms

  1. Cybersecurity in liberal arts general education curriculum

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ITiCSE 2018: Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education
    July 2018
    394 pages
    ISBN:9781450357074
    DOI:10.1145/3197091
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 July 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Cybersecurity
    2. GENI
    3. General Education
    4. Liberal Arts

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    ITiCSE '18
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 552 of 1,613 submissions, 34%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)155
    • Downloads (Last 6 weeks)16
    Reflects downloads up to 21 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Critical Review of Cybersecurity Education in the United StatesProceedings of the 55th ACM Technical Symposium on Computer Science Education V. 110.1145/3626252.3630757(241-247)Online publication date: 7-Mar-2024
    • (2023)Reimaging Cybersecurity in Educational PracticesHandbook of Research on Current Trends in Cybersecurity and Educational Technology10.4018/978-1-6684-6092-4.ch001(1-18)Online publication date: 17-Feb-2023
    • (2023)Some Emerging Trends in Cybersecurity Education and Training for EntrepreneursProceedings of the International Conference on Business Excellence10.2478/picbe-2023-008817:1(971-975)Online publication date: 14-Jul-2023
    • (2023)Password Cracking as a Medium for Introducing Cybersecurity Skills and Student Autonomy2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE)10.1109/CSCE60160.2023.00402(2502-2508)Online publication date: 24-Jul-2023
    • (2023)Cyber security in university libraries and implication for library and information science education in NigeriaDigital Library Perspectives10.1108/DLP-11-2022-008939:3(248-266)Online publication date: 9-May-2023
    • (2022)EdGENIProceedings of the 53rd ACM Technical Symposium on Computer Science Education - Volume 110.1145/3478431.3499300(801-807)Online publication date: 22-Feb-2022
    • (2021)How Do Students Feel About Automated Security Static Analysis Exercises?2021 IEEE Frontiers in Education Conference (FIE)10.1109/FIE49875.2021.9637201(1-4)Online publication date: 13-Oct-2021
    • (2021)Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training2021 IEEE Frontiers in Education Conference (FIE)10.1109/FIE49875.2021.9637052(1-9)Online publication date: 13-Oct-2021
    • (2021)Exercise Perceptions: Experience Report from a Secure Software Development CourseQuality of Information and Communications Technology10.1007/978-3-030-85347-1_37(521-535)Online publication date: 25-Aug-2021
    • (2020)A Cybersecurity Course for EveryoneProceedings of the 21st Annual Conference on Information Technology Education10.1145/3368308.3415399(409-412)Online publication date: 7-Oct-2020
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media