6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Tanya Zlateva et al.<br />
5. Pedagogy, educational technologies and flexible delivery formats<br />
The maturing of the field and the great diversity of student backgrounds naturally led to the need of<br />
more imaginative and more participatory pedagogy. We were especially concerned with teaching our<br />
students how to relate concepts from different areas and apply them on real world applications. To<br />
achieve this we developed a series of virtual laboratories that provided an environment for applying<br />
theoretical concepts, testing different approaches, and assuming alternative roles in various<br />
scenarios.<br />
(Zlateva et al., 2008, Hylkema et al, 2010). The student reflections indicate that the new technologies<br />
enhance understanding and further communication and team building.<br />
Finally we needed also to address the problem of making our programs accessible through flexible<br />
delivery formats. We have considerable experience with flexible delivery formats: first with a blend of<br />
in-class and online in 2000 (Zlateva et al., 2001), and since 2003 a fully online MS in CIS program.<br />
The online version of the security concentration was introduced in 2005. There are significant<br />
differences in the preparation and the delivery of an face-to-face and an online course. One of the<br />
most important factors for successful teaching and learning online is the ability to create a meaningful<br />
and close student-teacher and student-student interaction. Towards this goal we introduced videoconferencing<br />
tools that were used for discussion and review sessions with the instructor, and also by<br />
student teams working on a project. The feedback from students and faculty is overwhelmingly<br />
positive and we are currently developing use cases that reflect the best practices for these<br />
technologies.<br />
6. Conclusions and future work<br />
For the last eight years we developed a comprehensive curriculum for security education. The core<br />
ensures an in-depth discussion of security of operating systems, software, networks as well as<br />
security policies and procedures. This core is complemented by concentration electives in digital<br />
forensics, biometrics, advanced cryptography, and security modules in high-level courses such as<br />
web technologies, enterprise computing, data mining, health informatics. The information security<br />
programs are linked to the programs of business continuity that provide much needed management<br />
context. From a methodological point of view great care is taken to relate abstract theory to practical<br />
skills and team work by using virtual laboratories and video-collaboration tools. Overall the curriculum<br />
introduces analytical dialogue, creative concepts and critical pedagogical methodologies to advance<br />
student learning.<br />
References<br />
Ashcroft v. ACLU 542 U.S. 656 (2004).<br />
Boston University (2010a) Information Security Programs (http://www.bu.edu/csmet/academic-programs/ ) and<br />
Course Descriptions (http://www.bu.edu/csmet/academic-programs/courses/)<br />
Boston University (2010b) Business Continuity, Security and Risk Management<br />
http://www.bu.edu/online/online_programs/graduate_degree/master_management/emergency_managemen<br />
t/courses.shtml<br />
Bellia, P.L., Berman, P.S. & Post, D.G. (2007). Cyberlaw: Problems of Policy and Jurisprudence in the<br />
Information Age, 4-10, St. Paul, MN: Thompson/West.<br />
Brown, T.A. (Lt. Col.) (2009). Sovereignty in Cyberspace: Legal Propriety of Protecting Defense Industrial Base<br />
Information Infrastructure, 64 A.F.L. Rev. 21, 256-257.<br />
Cavusoglu, H., Mishra, B. and Raghunathan, S. (2004)."The effect of Internet security breach announcements on<br />
market value: capital market reactions for breached firms and Internet security developers," International<br />
Journal of Electronic Commerce, Vol. 9, Number 1, pp. 69-104.<br />
Chabinsky, S. R. (2010). Cybersecurity Strategy: A Primer for Policy Makers and Those on the Front Line, 4 J.<br />
Nat'l Security L. & Pol'y 27, 38.<br />
Chander, A. (2002). Whose Republic? 69 U. Chi. L. Rev. 1479.<br />
Clarke, R.A. (2010). Cyber War, New York: Harper Collins.<br />
Cohen, A. (2010). Cyberterrorism: Are we Legally Ready? 9 J. Int'l bus. & L. 1, 40.<br />
Downing ,R. W. (2005). Shoring up the Weakest Link: What Lawmakers Around the World Need to Consider in<br />
Developing Comprehensive Laws to Combat Cybercrime, 43 Colum. J. Transnat’l L. 705, 716-19.<br />
Hylkema, M., Zlateva, T., Burstein, L. and Scheffler, P (2010). Virtual Laboratories for Learning Real World<br />
Security - Operating Systems. Proc. 14th Colloquium for Information Systems Security Education,<br />
Baltimore, MD June 7 – 9.<br />
Kerr, O.S. (2003). Cybercrime's Scope: Interpreting 'Access' and 'Authorization' in Computer Misuse Statutes, 78<br />
NYU Law Review No. 5, 1596, 1621 (citing various state and federal statutes defining "access").<br />
Lentz, C.I. (2010). A State's Duty to Prevent and Respond to Cyberterrorist Acts, 10 Chi. J. Int'l L. 799, 822-823.<br />
275