27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Tanya Zlateva et al.<br />

5. Pedagogy, educational technologies and flexible delivery formats<br />

The maturing of the field and the great diversity of student backgrounds naturally led to the need of<br />

more imaginative and more participatory pedagogy. We were especially concerned with teaching our<br />

students how to relate concepts from different areas and apply them on real world applications. To<br />

achieve this we developed a series of virtual laboratories that provided an environment for applying<br />

theoretical concepts, testing different approaches, and assuming alternative roles in various<br />

scenarios.<br />

(Zlateva et al., 2008, Hylkema et al, 2010). The student reflections indicate that the new technologies<br />

enhance understanding and further communication and team building.<br />

Finally we needed also to address the problem of making our programs accessible through flexible<br />

delivery formats. We have considerable experience with flexible delivery formats: first with a blend of<br />

in-class and online in 2000 (Zlateva et al., 2001), and since 2003 a fully online MS in CIS program.<br />

The online version of the security concentration was introduced in 2005. There are significant<br />

differences in the preparation and the delivery of an face-to-face and an online course. One of the<br />

most important factors for successful teaching and learning online is the ability to create a meaningful<br />

and close student-teacher and student-student interaction. Towards this goal we introduced videoconferencing<br />

tools that were used for discussion and review sessions with the instructor, and also by<br />

student teams working on a project. The feedback from students and faculty is overwhelmingly<br />

positive and we are currently developing use cases that reflect the best practices for these<br />

technologies.<br />

6. Conclusions and future work<br />

For the last eight years we developed a comprehensive curriculum for security education. The core<br />

ensures an in-depth discussion of security of operating systems, software, networks as well as<br />

security policies and procedures. This core is complemented by concentration electives in digital<br />

forensics, biometrics, advanced cryptography, and security modules in high-level courses such as<br />

web technologies, enterprise computing, data mining, health informatics. The information security<br />

programs are linked to the programs of business continuity that provide much needed management<br />

context. From a methodological point of view great care is taken to relate abstract theory to practical<br />

skills and team work by using virtual laboratories and video-collaboration tools. Overall the curriculum<br />

introduces analytical dialogue, creative concepts and critical pedagogical methodologies to advance<br />

student learning.<br />

References<br />

Ashcroft v. ACLU 542 U.S. 656 (2004).<br />

Boston University (2010a) Information Security Programs (http://www.bu.edu/csmet/academic-programs/ ) and<br />

Course Descriptions (http://www.bu.edu/csmet/academic-programs/courses/)<br />

Boston University (2010b) Business Continuity, Security and Risk Management<br />

http://www.bu.edu/online/online_programs/graduate_degree/master_management/emergency_managemen<br />

t/courses.shtml<br />

Bellia, P.L., Berman, P.S. & Post, D.G. (2007). Cyberlaw: Problems of Policy and Jurisprudence in the<br />

Information Age, 4-10, St. Paul, MN: Thompson/West.<br />

Brown, T.A. (Lt. Col.) (2009). Sovereignty in Cyberspace: Legal Propriety of Protecting Defense Industrial Base<br />

Information Infrastructure, 64 A.F.L. Rev. 21, 256-257.<br />

Cavusoglu, H., Mishra, B. and Raghunathan, S. (2004)."The effect of Internet security breach announcements on<br />

market value: capital market reactions for breached firms and Internet security developers," International<br />

Journal of Electronic Commerce, Vol. 9, Number 1, pp. 69-104.<br />

Chabinsky, S. R. (2010). Cybersecurity Strategy: A Primer for Policy Makers and Those on the Front Line, 4 J.<br />

Nat'l Security L. & Pol'y 27, 38.<br />

Chander, A. (2002). Whose Republic? 69 U. Chi. L. Rev. 1479.<br />

Clarke, R.A. (2010). Cyber War, New York: Harper Collins.<br />

Cohen, A. (2010). Cyberterrorism: Are we Legally Ready? 9 J. Int'l bus. & L. 1, 40.<br />

Downing ,R. W. (2005). Shoring up the Weakest Link: What Lawmakers Around the World Need to Consider in<br />

Developing Comprehensive Laws to Combat Cybercrime, 43 Colum. J. Transnat’l L. 705, 716-19.<br />

Hylkema, M., Zlateva, T., Burstein, L. and Scheffler, P (2010). Virtual Laboratories for Learning Real World<br />

Security - Operating Systems. Proc. 14th Colloquium for Information Systems Security Education,<br />

Baltimore, MD June 7 – 9.<br />

Kerr, O.S. (2003). Cybercrime's Scope: Interpreting 'Access' and 'Authorization' in Computer Misuse Statutes, 78<br />

NYU Law Review No. 5, 1596, 1621 (citing various state and federal statutes defining "access").<br />

Lentz, C.I. (2010). A State's Duty to Prevent and Respond to Cyberterrorist Acts, 10 Chi. J. Int'l L. 799, 822-823.<br />

275

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!