ABSTRACT
In this paper, we describe the content and rationale of a comprehensive information security program encompassing degree options at the B.Sc., M.Sc., and Ph.D. levels established at Gjøvik University College, Norway. While the individual programs are open for students meeting certain formal prerequisites at each level, the sequence of degree programs is also designed in such a way as to allow students to progress from B.Sc. to Ph.D. levels without undue overlap or repetition.
This is accomplished by placing different emphases on the teaching and learning tools and techniques used, moving on to higher levels in Bloom's hierarchy in the process. At the same time, the different degrees also take into account the career progression and concomitant changes in the needs of students. We describe these considerations along with a brief description of courses offered at each level, along with a description of the learning environments at each level.
- L. Anderson and D. R. Krathwohl, editors. A Taxonomy for Learning, Teaching and Assessing: A Revision of Bloom's Taxonomy of Educational Objectives. Longman, New York, NY, USA, 2001.Google Scholar
- M. Bishop. Academia and education in information security: Four years later. In Proceedings of the 4th Colloquium for Information Systems Security Education, 2000.Google Scholar
- B. S. Bloom and D. R. Krathwohl, editors. Taxonomy of Educational Objectives: The Classification of Educational Goals. Longmans, Green & Co., New York, NY, USA, 1956.Google Scholar
- C. Ciechanowicz, K. M. Martin, F. Piper, and M. J. B. Robshaw. Ten years of information security masters programmes. In World Conference on Information Security Education, pages 215--230, 2003. Google ScholarDigital Library
- CISR. Seventh workshop on education in computer security (wecs7). http://cisr.nps.edu/WECS7/. (Retrieved June 10. 2006).Google Scholar
- CISSE. Colloquium for information systems security education. http://cisse.info. (Retrieved June 10. 2006).Google Scholar
- G. Conti, J. M. D. Hill, S. Lathrop, K. Alford, and D. J. Ragsdale. Towards a comprehensive undergraduate information assurance program. In C. Irvine and H. Armstrong, editors, Security Education and Critical Infrastructure, pages 243--260. Kluwer Academic Publishers, 2003. Google ScholarDigital Library
- D. Frincke and M. Bishop. Joining the Security Education Community. IEEE Security & Privacy, 2(5):61--63, Sept./Oct. 2004. Google ScholarDigital Library
- M. Hentea, H. S. Dhillon, and M. Dhillon. Towards changes in information security education. Journal of Information Technology Education, 5:221--233, 2006.Google ScholarCross Ref
- C. E. Irvine and H. L. Armstrong, editors. Security Education and Critical Infrastructures, IFIP TC11 / WG11.8 Third Annual World Conference on Information Security Education (WISE3), June 26--28, 2003, Monterey, California, USA. Kluwer, 2003.Google Scholar
- N. P. Schembari. A bachelor of science degree in computer security: The experiences of a national center of academic excellence in information assurance education. In Proceedings of the 9th Colloquium for Information Systems Security Education, pages 6--11, 2005.Google Scholar
- C. Taylor, R. Shumba, and J. Walden. Computer security education: Past, present and future. In Proceedings of the Seventh Workshop on Education in Computer Security (WECS7), pages 67--78, 2006.Google Scholar
- M. E. Whitman, editor. Proceedings of the 2nd Annual Conference on Information Security Curriculum Development, Kennesaw, GA, USA, Sept. 2005. ACM, ACM Press. Google ScholarCross Ref
- M. E. Whitman and H. J. Mattord. A (draft) model curriculum for programs of study in information security and assurance. http://infosec.kennesaw.edu/presentations/InfoSecCurriculumModel.pdf. (Retrieved June 10. 2006).Google Scholar
- M. E. Whitman and H. J. Mattord. Designing and teaching information security curriculum. In InfoSecCD '04: Proceedings of the 1st annual conference on Information security curriculum development, pages 1--7, 2004. Google ScholarDigital Library
- M. E. Whitman and A. Woszczynski, editors. Proceedings of the 1st Annual Conference on Information Security Curriculum Development, Kennesaw, GA, USA, Oct. 2004. ACM, ACM Press. Google ScholarCross Ref
Index Terms
- Full-spectrum information security education: integrating B.Sc., M.Sc., and Ph.D. programs
Recommendations
Designing and teaching information security curriculum
InfoSecCD '04: Proceedings of the 1st annual conference on Information security curriculum developmentWith increasing interest by students and faculty in Information Security Curriculum, and increasing demand for information security professionals from industry, many institutions are beginning the task of creating a meaningful information security ...
Embedding information security curricula in existing programmes
InfoSecCD '04: Proceedings of the 1st annual conference on Information security curriculum developmentThere is a need for educators of information technology professionals to monitor the demands of the market and to adjust their programmes and curriculum accordingly. A number of universities and colleges have sought opportunities to extend their ...
Computer Science Education in North-Rhine Westphalia, Germany—A Case Study
Special Issue II on Computer Science Education in K-12 SchoolsIn North-Rhine Westphalia, the most populated state in Germany, Computer Science (CS) has been taught in secondary schools since the early 1970s. This article provides an overview of the past and current situation of CS education in North-Rhine ...
Comments