skip to main content
10.1145/1231047.1231050acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
Article

Full-spectrum information security education: integrating B.Sc., M.Sc., and Ph.D. programs

Published:22 September 2006Publication History

ABSTRACT

In this paper, we describe the content and rationale of a comprehensive information security program encompassing degree options at the B.Sc., M.Sc., and Ph.D. levels established at Gjøvik University College, Norway. While the individual programs are open for students meeting certain formal prerequisites at each level, the sequence of degree programs is also designed in such a way as to allow students to progress from B.Sc. to Ph.D. levels without undue overlap or repetition.

This is accomplished by placing different emphases on the teaching and learning tools and techniques used, moving on to higher levels in Bloom's hierarchy in the process. At the same time, the different degrees also take into account the career progression and concomitant changes in the needs of students. We describe these considerations along with a brief description of courses offered at each level, along with a description of the learning environments at each level.

References

  1. L. Anderson and D. R. Krathwohl, editors. A Taxonomy for Learning, Teaching and Assessing: A Revision of Bloom's Taxonomy of Educational Objectives. Longman, New York, NY, USA, 2001.Google ScholarGoogle Scholar
  2. M. Bishop. Academia and education in information security: Four years later. In Proceedings of the 4th Colloquium for Information Systems Security Education, 2000.Google ScholarGoogle Scholar
  3. B. S. Bloom and D. R. Krathwohl, editors. Taxonomy of Educational Objectives: The Classification of Educational Goals. Longmans, Green & Co., New York, NY, USA, 1956.Google ScholarGoogle Scholar
  4. C. Ciechanowicz, K. M. Martin, F. Piper, and M. J. B. Robshaw. Ten years of information security masters programmes. In World Conference on Information Security Education, pages 215--230, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. CISR. Seventh workshop on education in computer security (wecs7). http://cisr.nps.edu/WECS7/. (Retrieved June 10. 2006).Google ScholarGoogle Scholar
  6. CISSE. Colloquium for information systems security education. http://cisse.info. (Retrieved June 10. 2006).Google ScholarGoogle Scholar
  7. G. Conti, J. M. D. Hill, S. Lathrop, K. Alford, and D. J. Ragsdale. Towards a comprehensive undergraduate information assurance program. In C. Irvine and H. Armstrong, editors, Security Education and Critical Infrastructure, pages 243--260. Kluwer Academic Publishers, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D. Frincke and M. Bishop. Joining the Security Education Community. IEEE Security & Privacy, 2(5):61--63, Sept./Oct. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Hentea, H. S. Dhillon, and M. Dhillon. Towards changes in information security education. Journal of Information Technology Education, 5:221--233, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  10. C. E. Irvine and H. L. Armstrong, editors. Security Education and Critical Infrastructures, IFIP TC11 / WG11.8 Third Annual World Conference on Information Security Education (WISE3), June 26--28, 2003, Monterey, California, USA. Kluwer, 2003.Google ScholarGoogle Scholar
  11. N. P. Schembari. A bachelor of science degree in computer security: The experiences of a national center of academic excellence in information assurance education. In Proceedings of the 9th Colloquium for Information Systems Security Education, pages 6--11, 2005.Google ScholarGoogle Scholar
  12. C. Taylor, R. Shumba, and J. Walden. Computer security education: Past, present and future. In Proceedings of the Seventh Workshop on Education in Computer Security (WECS7), pages 67--78, 2006.Google ScholarGoogle Scholar
  13. M. E. Whitman, editor. Proceedings of the 2nd Annual Conference on Information Security Curriculum Development, Kennesaw, GA, USA, Sept. 2005. ACM, ACM Press. Google ScholarGoogle ScholarCross RefCross Ref
  14. M. E. Whitman and H. J. Mattord. A (draft) model curriculum for programs of study in information security and assurance. http://infosec.kennesaw.edu/presentations/InfoSecCurriculumModel.pdf. (Retrieved June 10. 2006).Google ScholarGoogle Scholar
  15. M. E. Whitman and H. J. Mattord. Designing and teaching information security curriculum. In InfoSecCD '04: Proceedings of the 1st annual conference on Information security curriculum development, pages 1--7, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. E. Whitman and A. Woszczynski, editors. Proceedings of the 1st Annual Conference on Information Security Curriculum Development, Kennesaw, GA, USA, Oct. 2004. ACM, ACM Press. Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Full-spectrum information security education: integrating B.Sc., M.Sc., and Ph.D. programs

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      InfoSecCD '06: Proceedings of the 3rd annual conference on Information security curriculum development
      September 2006
      206 pages
      ISBN:1595934375
      DOI:10.1145/1231047

      Copyright © 2006 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 September 2006

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate18of23submissions,78%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader