Skip to main content
Top
Published in: Journal of Computers in Education 1/2022

16-06-2021

Incorporating active learning activities to the design and development of an undergraduate software and web security course

Authors: Thitima Srivatanakul, Fenio Annansingh

Published in: Journal of Computers in Education | Issue 1/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Data breaches and cybersecurity incidents have been a major concern for companies in various sectors, including healthcare, financial, entertainment, business, education, and government. Maintaining and protecting these systems requires a workforce that is educated with the practical and technical skills needed by cybersecurity experts for information warfare and non-technical skills demanded by the industry. This paper describes the design and development of an undergraduate software and web security course using active learning strategies. It discusses the rationale in the course design on the selected cybersecurity knowledge and skills for a cybersecurity course developed at York College of the City University of New York (CUNY). Several active learning activities were used to promote both technical security and non-technical skills necessary to perform cybersecurity work, such as think-pair-share, buzz group, and roleplay. The results show that active learning help promote students' development in solving problems, proposing solutions, and explaining ideas through writing and discussion, essential cybersecurity skills. The paper may serve as an informative guide for other instructors to promote active learning in their cybersecurity courses. A course evaluation survey has suggested favorable results using active learning activities in the class. Students believe that it helped them to understand complex concepts and engage with the materials and activities.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Acharya, S., Ehrenreich, B., & Marciniak, J. (2015). OWASP inspired mobile security. In 2015 IEEE International Conference on Bioinformatics and Biomedicine (BIBM) (pp. 782–784). IEEE. Acharya, S., Ehrenreich, B., & Marciniak, J. (2015). OWASP inspired mobile security. In 2015 IEEE International Conference on Bioinformatics and Biomedicine (BIBM) (pp. 782–784). IEEE.
go back to reference Alkhatib, O. J. (2018). An interactive and blended learning model for engineering education. Journal of Computers in Education, 5(1), 19–48.CrossRef Alkhatib, O. J. (2018). An interactive and blended learning model for engineering education. Journal of Computers in Education, 5(1), 19–48.CrossRef
go back to reference Bloom, B. S., Krathwohl, D. R., & Masia, B. B. (1984). Bloom taxonomy of educational objectives. In Allyn and Bacon. Pearson Education. Bloom, B. S., Krathwohl, D. R., & Masia, B. B. (1984). Bloom taxonomy of educational objectives. In Allyn and Bacon. Pearson Education.
go back to reference Bonwell, C. C., & Eison, J. A. (1991). Active Learning: Creating Excitement in the Classroom. 1991 ASHE-ERIC Higher Education Reports. ERIC Clearinghouse on Higher Education, The George Washington University, One Dupont Circle, Suite 630, Washington, DC 20036–1183. Bonwell, C. C., & Eison, J. A. (1991). Active Learning: Creating Excitement in the Classroom. 1991 ASHE-ERIC Higher Education Reports. ERIC Clearinghouse on Higher Education, The George Washington University, One Dupont Circle, Suite 630, Washington, DC 20036–1183.
go back to reference Byun, M., Lee, Y., & Choi, J. Y. (2020). Analysis of software weakness detection of CBMC based on CWE. In 2020 22nd International Conference on Advanced Communication Technology (ICACT) (pp. 171–175). IEEE. Byun, M., Lee, Y., & Choi, J. Y. (2020). Analysis of software weakness detection of CBMC based on CWE. In 2020 22nd International Conference on Advanced Communication Technology (ICACT) (pp. 171–175). IEEE.
go back to reference Cabaj, K., Domingos, D., Kotulski, Z., & Respício, A. (2018). Cybersecurity education: Evolution of the discipline and analysis of master programs. Computers & Security, 75, 24–35.CrossRef Cabaj, K., Domingos, D., Kotulski, Z., & Respício, A. (2018). Cybersecurity education: Evolution of the discipline and analysis of master programs. Computers & Security, 75, 24–35.CrossRef
go back to reference Carlson, D. (2004). Teaching computer security. ACM SIGCSE. Bulletin, 36(2), 64–67. Carlson, D. (2004). Teaching computer security. ACM SIGCSE. Bulletin, 36(2), 64–67.
go back to reference Cawley, C. (2017). The impact on assessment results of changing to an active learning approach: a case study from an undergraduate computer science degree programme. Irish Journal of Academic Practice, 6(1), 9. Cawley, C. (2017). The impact on assessment results of changing to an active learning approach: a case study from an undergraduate computer science degree programme. Irish Journal of Academic Practice, 6(1), 9.
go back to reference Chatmon, C., Chi, H., & Davis, W. (2010). Active learning approaches to teaching information assurance. In 2010 Information Security Curriculum Development Conference (pp. 1–7). Chatmon, C., Chi, H., & Davis, W. (2010). Active learning approaches to teaching information assurance. In 2010 Information Security Curriculum Development Conference (pp. 1–7).
go back to reference Conklin, A. (2006). Cyber defense competitions and information security education: An active learning solution for a capstone course. In Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06) (Vol. 9, pp. 220b-220b). IEEE. Conklin, A. (2006). Cyber defense competitions and information security education: An active learning solution for a capstone course. In Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06) (Vol. 9, pp. 220b-220b). IEEE.
go back to reference Deslauriers, L., McCarty, L. S., Miller, K., Callaghan, K., & Kestin, G. (2019). Measuring actual learning versus feeling of learning in response to being actively engaged in the classroom. Proceedings of the National Academy of Sciences, 116(39), 19251–19257.CrossRef Deslauriers, L., McCarty, L. S., Miller, K., Callaghan, K., & Kestin, G. (2019). Measuring actual learning versus feeling of learning in response to being actively engaged in the classroom. Proceedings of the National Academy of Sciences, 116(39), 19251–19257.CrossRef
go back to reference Fernando, S. Y., & Marikar, F. M. (2017). Constructivist Teaching/Learning Theory and Participatory Teaching Methods. Journal of Curriculum and Teaching, 6(1), 110–122.CrossRef Fernando, S. Y., & Marikar, F. M. (2017). Constructivist Teaching/Learning Theory and Participatory Teaching Methods. Journal of Curriculum and Teaching, 6(1), 110–122.CrossRef
go back to reference Freeman, S., Eddy, S. L., McDonough, M., Smith, M. K., Okoroafor, N., Jordt, H., et al. (2014). Active learning increase student performance in science, engineering, and mathematics. Proceedings of the National Academy of Sciences, 11(23), 8410–8415.CrossRef Freeman, S., Eddy, S. L., McDonough, M., Smith, M. K., Okoroafor, N., Jordt, H., et al. (2014). Active learning increase student performance in science, engineering, and mathematics. Proceedings of the National Academy of Sciences, 11(23), 8410–8415.CrossRef
go back to reference Furnell, S., & Bishop, M. (2020). Addressing cybersecurity skills: The spectrum, not the silo. Computer Fraud & Security, 2020(2), 6–11.CrossRef Furnell, S., & Bishop, M. (2020). Addressing cybersecurity skills: The spectrum, not the silo. Computer Fraud & Security, 2020(2), 6–11.CrossRef
go back to reference Gehringer, E. F., & Miller, C. S. (2009). Student-generated active-learning exercises. In Proceedings of the 40th ACM technical symposium on Computer science education (pp. 81–85). https://dl.acm.org/doi/pdf/https://doi.org/10.1145/1508865.1508897 Gehringer, E. F., & Miller, C. S. (2009). Student-generated active-learning exercises. In Proceedings of the 40th ACM technical symposium on Computer science education (pp. 81–85). https://​dl.​acm.​org/​doi/​pdf/​https://​doi.​org/​10.​1145/​1508865.​1508897
go back to reference Henry, A.P. (2017). Mastering the cybersecurity skills crisis: realigning educational outcomes to industry requirements (Vol. 4). ACCS Discussion paper. Henry, A.P. (2017). Mastering the cybersecurity skills crisis: realigning educational outcomes to industry requirements (Vol. 4). ACCS Discussion paper.
go back to reference Hettiarachchi, E. (2019). Analyzing the impact of introducing active learning in a blended educational environment. International Journal of Learning and Teaching, 5(4) Hettiarachchi, E. (2019). Analyzing the impact of introducing active learning in a blended educational environment. International Journal of Learning and Teaching, 5(4)
go back to reference Lai, C. L., & Hwang, G. J. (2016). A self-regulated flipped-classroom approach to improving students’ learning performance in a mathematics course. Computers & Education, 100, 126–140.CrossRef Lai, C. L., & Hwang, G. J. (2016). A self-regulated flipped-classroom approach to improving students’ learning performance in a mathematics course. Computers & Education, 100, 126–140.CrossRef
go back to reference Malik, S., & Janjua, F. (2011). Active Lecturing: an Effective Pedagogic Approach. International Journal of Academic Research, 3(2). Malik, S., & Janjua, F. (2011). Active Lecturing: an Effective Pedagogic Approach. International Journal of Academic Research, 3(2).
go back to reference Mateti, P. (2003). A laboratory-based course on internet security. ACM SIGCSE Bulletin, 35(1), 252–256.CrossRef Mateti, P. (2003). A laboratory-based course on internet security. ACM SIGCSE Bulletin, 35(1), 252–256.CrossRef
go back to reference Nealy, C. (2005). Integrating soft skills through active learning in the management classroom. Journal of College Teaching & Learning (TLC), 2(4). Nealy, C. (2005). Integrating soft skills through active learning in the management classroom. Journal of College Teaching & Learning (TLC), 2(4).
go back to reference Newhouse, W., Keith, S., Scribner, B., & Witte, G. (2017). National initiative for cybersecurity education (NICE) cybersecurity workforce framework. (NIST special publication, 800–181). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-181 Newhouse, W., Keith, S., Scribner, B., & Witte, G. (2017). National initiative for cybersecurity education (NICE) cybersecurity workforce framework. (NIST special publication, 800–181). National Institute of Standards and Technology. https://​doi.​org/​10.​6028/​NIST.​SP.​800-181
go back to reference Opincaru, C. (2010). Web Security in University Curricula. Journal of Mobile, Embedded and Distributed Systems, 2(2), 84–90. Opincaru, C. (2010). Web Security in University Curricula. Journal of Mobile, Embedded and Distributed Systems, 2(2), 84–90.
go back to reference Pandya D., & Patel, N. J. (2016). OWASP top 10 vulnerability analyses in government websites. International Journal of Enterprise Computing and Business Systems, 6(1). Pandya D., & Patel, N. J. (2016). OWASP top 10 vulnerability analyses in government websites. International Journal of Enterprise Computing and Business Systems, 6(1).
go back to reference Pickard, J., & Chou, T., & Lunsford, P. J., & Spence, J. (2013). IPv6 Security Course with Remote Labs - Design and Development Paper presented at 2013 ASEE Annual Conference & Exposition, Atlanta, Georgia. https://peer.asee.org/19848 Pickard, J., & Chou, T., & Lunsford, P. J., & Spence, J. (2013). IPv6 Security Course with Remote Labs - Design and Development Paper presented at 2013 ASEE Annual Conference & Exposition, Atlanta, Georgia. https://​peer.​asee.​org/​19848
go back to reference Poston, H. (2020). Mapping the OWASP top ten to blockchain. Procedia Computer Science, 177, 613–617.CrossRef Poston, H. (2020). Mapping the OWASP top ten to blockchain. Procedia Computer Science, 177, 613–617.CrossRef
go back to reference Potter, L.E., Vickers, G. (2015), June. What skills do you need to work in cyber security? A look at the Australian market. In Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research (pp. 67–72). Potter, L.E., Vickers, G. (2015), June. What skills do you need to work in cyber security? A look at the Australian market. In Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research (pp. 67–72).
go back to reference Pournaghshband, V. (2013), Teaching the security mindset to CS1 students. Proceedings of the 44th ACM technical symposium on computer science education. Denver, Colorado, USA, pp 347– 352. Pournaghshband, V. (2013), Teaching the security mindset to CS1 students. Proceedings of the 44th ACM technical symposium on computer science education. Denver, Colorado, USA, pp 347– 352.
go back to reference Rahmalan, H., Ahmad, S. S. S., & Affendey, L. S. (2020). Investigation on designing a fun and interactive learning approach for Database Programming subject according to students' preferences. In Journal of Physics: Conference Series, 1529(2): 022076. IOP Publishing. Rahmalan, H., Ahmad, S. S. S., & Affendey, L. S. (2020). Investigation on designing a fun and interactive learning approach for Database Programming subject according to students' preferences. In Journal of Physics: Conference Series, 1529(2): 022076. IOP Publishing.
go back to reference Schneier, B. (1999). Attack trees. Dr. Dobb’s Journal, 24(12), 21–29. Schneier, B. (1999). Attack trees. Dr. Dobb’s Journal, 24(12), 21–29.
go back to reference Sϕhoel, H., Jaatun, M. G., & Boyd, C. (2018). OWASP Top 10-Do Startups Care?. In 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) (pp. 1–8). IEEE. Sϕhoel, H., Jaatun, M. G., & Boyd, C. (2018). OWASP Top 10-Do Startups Care?. In 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) (pp. 1–8). IEEE.
go back to reference Sobral, S. R. (2020). Project based learning with peer assessment in an introductory programming course. In 4th International Conference on Education and Distance Learning Conference (ICEDL2020), Roma, Italia, July 17–19. Sobral, S. R. (2020). Project based learning with peer assessment in an introductory programming course. In 4th International Conference on Education and Distance Learning Conference (ICEDL2020), Roma, Italia, July 17–19.
go back to reference Srivatanakul, T., & Moore, T. (2021). Promoting Security Mindset through Hands-on Exercises for Computer Science Undergraduate Students. In 2021 International Conference on Engineering Education and Information Technology (EEIT2021), Nanjing, China. Srivatanakul, T., & Moore, T. (2021). Promoting Security Mindset through Hands-on Exercises for Computer Science Undergraduate Students. In 2021 International Conference on Engineering Education and Information Technology (EEIT2021), Nanjing, China.
go back to reference Stuttard, D., & Pinto, M. (2011). The web application hacker's handbook: Finding and exploiting security flaws. John Wiley & Sons. Stuttard, D., & Pinto, M. (2011). The web application hacker's handbook: Finding and exploiting security flaws. John Wiley & Sons.
go back to reference Styers, M. L., Van Zandt, P. A., & Hayden, K. L. (2018). Active learning in flipped life science courses promotes development of critical thinking skills. CBE–Life Sciences Education, 17(3), ar39.CrossRef Styers, M. L., Van Zandt, P. A., & Hayden, K. L. (2018). Active learning in flipped life science courses promotes development of critical thinking skills. CBE–Life Sciences Education, 17(3), ar39.CrossRef
go back to reference Švábenský, V., Vykopal, J., Cermak, M. and Laštovička, M., (2018), July. Enhancing cybersecurity skills by creating serious games. In Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (pp. 194–199). Švábenský, V., Vykopal, J., Cermak, M. and Laštovička, M., (2018), July. Enhancing cybersecurity skills by creating serious games. In Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (pp. 194–199).
go back to reference Tharayil, S., Borrego, M., Prince, M., Nguyen, K. A., Shekhar, P., Finelli, C. J., & Waters, C. (2018). Strategies to mitigate student resistance to active learning. International Journal of STEM Education, 5(1), 7.CrossRef Tharayil, S., Borrego, M., Prince, M., Nguyen, K. A., Shekhar, P., Finelli, C. J., & Waters, C. (2018). Strategies to mitigate student resistance to active learning. International Journal of STEM Education, 5(1), 7.CrossRef
go back to reference Thongthua, A., & Ngamsuriyaroj, S. (2016, May). Assessment of hypervisor vulnerabilities. In 2016 International conference on cloud computing research and innovations (ICCCRI) (pp. 71–77). IEEE. Thongthua, A., & Ngamsuriyaroj, S. (2016, May). Assessment of hypervisor vulnerabilities. In 2016 International conference on cloud computing research and innovations (ICCCRI) (pp. 71–77). IEEE.
go back to reference Timmerman, B., & Lingard, R. (2003, November). Assessment of active learning with upper-division computer science students. In 33rd Annual Frontiers in Education, 2003. FIE 2003. (Vol. 3, pp. S1D-7). IEEE. Timmerman, B., & Lingard, R. (2003, November). Assessment of active learning with upper-division computer science students. In 33rd Annual Frontiers in Education, 2003. FIE 2003. (Vol. 3, pp. S1D-7). IEEE.
go back to reference Topham, L., Kifayat, K., Younis, Y. A., Shi, Q., & Askwith, B. (2016). Cyber security teaching and learning laboratories: A survey. Information & Security, 35(1), 51. Topham, L., Kifayat, K., Younis, Y. A., Shi, Q., & Askwith, B. (2016). Cyber security teaching and learning laboratories: A survey. Information & Security, 35(1), 51.
go back to reference Walden, J. (2008, October). Integrating web application security into the IT curriculum. In Proceedings of the 9th ACM SIGITE conference on Information technology education (pp. 187–192). Walden, J. (2008, October). Integrating web application security into the IT curriculum. In Proceedings of the 9th ACM SIGITE conference on Information technology education (pp. 187–192).
go back to reference Yu, H., Liao, W., Yuan, X., & Xu, J. (2006). Teaching a web security course to practice information assurance. In Proceedings of the 37th SIGCSE technical symposium on Computer science education (pp. 12–16). Yu, H., Liao, W., Yuan, X., & Xu, J. (2006). Teaching a web security course to practice information assurance. In Proceedings of the 37th SIGCSE technical symposium on Computer science education (pp. 12–16).
Metadata
Title
Incorporating active learning activities to the design and development of an undergraduate software and web security course
Authors
Thitima Srivatanakul
Fenio Annansingh
Publication date
16-06-2021
Publisher
Springer Berlin Heidelberg
Published in
Journal of Computers in Education / Issue 1/2022
Print ISSN: 2197-9987
Electronic ISSN: 2197-9995
DOI
https://doi.org/10.1007/s40692-021-00194-9

Other articles of this Issue 1/2022

Journal of Computers in Education 1/2022 Go to the issue

Premium Partner