Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3408877.3432462acmconferencesArticle/Chapter ViewAbstractPublication PagessigcseConference Proceedingsconference-collections
research-article

Creating a Multifarious Cyber Science Major

Published: 05 March 2021 Publication History

Abstract

Existing approaches to computing-based cyber undergraduate majors typically take one of two forms: a broad exploration of both technical and human aspects, or a deep technical exploration of a single discipline relevant to cybersecurity. This paper describes the creation of a third approach--a multifarious major, consistent with Cybersecurity Curricula 2017, the ABET Cybersecurity Program Criteria, and the National Security Agency Center for Academic Excellence--Cyber Operations criteria. Our novel curriculum relies on a 10-course common foundation extended by one of five possible concentrations, each of which is delivered through a disciplinary lens and specialized into a highly relevant computing interest area serving society's diverse cyber needs. The journey began years ago when we infused cybersecurity education throughout our programs, seeking to keep offerings and extracurricular activities relevant in society's increasingly complex relationship with cyberspace. This paper details the overarching design principles, decision-making process, benchmarking, and feedback elicitation activities. A surprising key step was merging several curricula proposals into a single hybrid option. The new major attracted a strong initial cohort, meeting our enrollment goals and exceeding our diversity goals. We provide several recommendations for any institution embarking on a process of designing a new cyber-named major.

References

[1]
ABET, Inc. 2019. Criteria for Accrediting Computing Programs, 2020--2021. https://www.abet.org/accreditation/accreditation-criteria/criteria-for-accrediting-computing-programs-2020--2021/ Accessed: August 27, 2020.
[2]
Jean R. S. Blair, Christa M. Chewar, Rajendra K. Raj, and Edward Sobiesk. 2020 a. Infusing Principles and Practices for Secure Computing Throughout an Undergraduate Computer Science Curriculum. In Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education (Trondheim, Norway) (ITiCSE '20). Association for Computing Machinery, New York, NY, USA, 82--88. https://doi.org/10.1145/3341525.3387426
[3]
Jean R. S. Blair, Andrew O. Hall, and Edward Sobiesk. 2019. Educating Future Multidisciplinary Cybersecurity Teams. Computer, Vol. 52, 3 (2019), 58--66. https://doi.org/10.1109/MC.2018.2884190
[4]
Jean R. S. Blair, Andrew O. Hall, and Edward Sobiesk. 2020 b. Holistic Cyber Education. In Cyber Security Education: Principles and Policies, Greg Austin (Ed.). Routledge, New York, Chapter 10, 160--172.
[5]
Diana L. Burley. 2014. Cybersecurity Education, Part 1. ACM Inroads, Vol. 5, 1 (March 2014), 41. https://doi.org/10.1145/2568195.2568210
[6]
Diana L. Burley. 2015. Cybersecurity Education, Part 2. ACM Inroads, Vol. 6, 2 (May 2015), 58. https://doi.org/10.1145/2746407
[7]
Andrea Danyluk, Steve Roach, Elizabeth K. Hawthorne, Henry M. Walker, Ruth E. Anderson, and Christa M. Chewar. 2013. ACM/IEEE Computer Science 2013 Exemplar-Fest. In Proceeding of the 44th ACM Technical Symposium on Computer Science Education (Denver, Colorado, USA) (SIGCSE '13). Association for Computing Machinery, New York, NY, USA, 285--286. https://doi.org/10.1145/2445196.2445284
[8]
Joseph J. Ekstrom, Barry M. Lunt, Allen Parrish, Rajendra K. Raj, and Edward Sobiesk. 2017a. Information Technology as a Cyber Science. In Proceedings of the 37th SIGITE technical symposium on Information Technology education (SIGITE '17). ACM, New York, 84--89.
[9]
Joseph J. Ekstrom, Barry M. Lunt, Allen Parrish, Rajendra K. Raj, and Edward Sobiesk. 2017b. Information Technology as a Cyber Science. In Proceedings of the 18th Annual Conference on Information Technology Education (Rochester, New York, USA) (SIGITE '17). Association for Computing Machinery, New York, NY, USA, 33--37. https://doi.org/10.1145/3125659.3125697
[10]
David Gibson, Vijay Anand, Josh Dehlinger, Charles Dierbach, Tracy Emmersen, and Andrew Phillips. 2019. Accredited Undergraduate Cybersecurity Degrees: Four Approaches. Computer Magazine, Vol. 52, 3 (March 2019), 38--47.
[11]
Association for Computing Machinery (ACM) Joint Task Force on Computing Curricula and IEEE Computer Society. 2013. Computer Science Curricula 2013: Curriculum Guidelines for Undergraduate Degree Programs in Computer Science .Association for Computing Machinery, New York, NY, USA.
[12]
Joint Task Force on Cybersecurity Education. 2017. Cybersecurity Curricula 2017: Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity. Technical Report. ACM, IEEE-CS, AIS SIGSEC, and IFIP WG 11.8. https://doi.org/10.1145/3184594
[13]
Merriam-Webster. 2004. Webster's New World College Dictionary fourth ed.). Collins Dictionary. https://www.collinsdictionary.com/us/dictionary/english/multifarious accessed August 25, 2020.
[14]
Allen Parrish, John Impagliazzo, Rajendra K. Raj, Henrique Santos, Muhammad Rizwan Asghar, Audun Jøsang, Teresa Pereira, and Eliana Stavrou. 2018. Global Perspectives on Cybersecurity Education for 2030: A Case for a Meta-Discipline. In Proceedings Companion of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (Larnaca, Cyprus) (ITiCSE 2018 Companion). Association for Computing Machinery, New York, NY, USA, 36--54. https://doi.org/10.1145/3293881.3295778
[15]
Mihaela Sabin, Svetlana Peltsverger, Cara Tang, and Barry M. Lunt. 2016. ACM/IEEE-CS Information Technology Curriculum 2017: A Status Update. In Proceedings of the 17th Annual Conference on Information Technology Education (Boston, Massachusetts, USA) (SIGITE '16). Association for Computing Machinery, New York, NY, USA, 102--103. https://doi.org/10.1145/2978192.2978241
[16]
Ann Sobel, Allen Parrish, and Rajendra K. Raj. 2019. Curricular Foundations for Cybersecurity. Computer, Vol. 52, 3 (March 2019), 14--17. https://doi.org/10.1109/MC.2019.2898240
[17]
Edward Sobiesk, Jean Blair, Gregory Conti, Michael Lanham, and Howard Taylor. 2015. Cyber Education: a multi-level, multi-discipline approach. In Proceedings of the 16th Annual Conference on Information Technology Education (SIGITE '15) (Chicago Illinois). ACM, ACM digital library, 43--47.
[18]
Valdemar Svabensky, Jan Vykopal, and Pavel Celeda. 2020. What Are Cybersecurity Education Papers About? A Systematic Literature Review of SIGCSE and ITiCSE Conferences. In SIGCSE '20: Proceedings of the 51st ACM Technical Symposium on Computer Science Education. ACM, ACM digital library, 2--8. https://doi.org/10.1145/3328778.3366816
[19]
US National Security Agency and the Department of Homeland Security. 2018. Centers of Academic Excellence in Cybersecurity. https://www.nsa.gov/resources/students-educators/centers-academic-excellence/ Accessed: April 02, 2018.

Cited By

View all
  • (2024)Remote Controlled Cyber: Toward Engaging and Educating a Diverse Cybersecurity WorkforceProceedings of the 55th ACM Technical Symposium on Computer Science Education V. 110.1145/3626252.3630917(394-400)Online publication date: 7-Mar-2024
  • (2024)Cybersecurity as a Crosscutting Concept Across an Undergrad Computer Science Curriculum: An Experience ReportProceedings of the 55th ACM Technical Symposium on Computer Science Education V. 110.1145/3626252.3630821(916-922)Online publication date: 7-Mar-2024

Index Terms

  1. Creating a Multifarious Cyber Science Major

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGCSE '21: Proceedings of the 52nd ACM Technical Symposium on Computer Science Education
    March 2021
    1454 pages
    ISBN:9781450380621
    DOI:10.1145/3408877
    This paper is authored by an employee(s) of the United States Government and is in the public domain. Non-exclusive copying or redistribution is allowed, provided that the article citation is given and the authors and agency are clearly identified as its source.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 05 March 2021

    Permissions

    Request permissions for this article.

    Check for updates

    Badges

    • Best Paper

    Author Tags

    1. curriculum development
    2. cyber operations
    3. cyber science
    4. cyber-physical systems
    5. cybersecurity
    6. machine learning
    7. network services

    Qualifiers

    • Research-article

    Conference

    SIGCSE '21
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,595 of 4,542 submissions, 35%

    Upcoming Conference

    SIGCSE Virtual 2024
    1st ACM Virtual Global Computing Education Conference
    December 5 - 8, 2024
    Virtual Event , NC , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)39
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 16 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Remote Controlled Cyber: Toward Engaging and Educating a Diverse Cybersecurity WorkforceProceedings of the 55th ACM Technical Symposium on Computer Science Education V. 110.1145/3626252.3630917(394-400)Online publication date: 7-Mar-2024
    • (2024)Cybersecurity as a Crosscutting Concept Across an Undergrad Computer Science Curriculum: An Experience ReportProceedings of the 55th ACM Technical Symposium on Computer Science Education V. 110.1145/3626252.3630821(916-922)Online publication date: 7-Mar-2024

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media