skip to main content
10.1145/1953163.1953173acmconferencesArticle/Chapter ViewAbstractPublication PagessigcseConference Proceedingsconference-collections
research-article

Science fiction prototyping and security education: cultivating contextual and societal thinking in computer security education and beyond

Published:09 March 2011Publication History

ABSTRACT

Computer security courses typically cover a breadth of technical topics, including threat modeling, applied cryptography, software security, and Web security. The technical artifacts of computer systems - and their associated computer security risks and defenses - do not exist in isolation, however; rather, these systems interact intimately with the needs, beliefs, and values of people. This is especially true as computers become more pervasive, embedding themselves not only into laptops, desktops, and the Web, but also into our cars, medical devices, and toys. Therefore, in addition to the standard technical material, we argue that students would benefit from developing a mindset focused on the broader societal and contextual issues surrounding computer security systems and risks. We used science fiction (SF) prototyping to facilitate such societal and contextual thinking in a recent undergraduate computer security course. We report on our approach and experiences here, as well as our recommendations for future computer security and other computer science courses.

References

  1. S. Bratus, A. Shubina, and M. E. Locasto. Teaching the principles of the hacker curriculum to undergraduates. In SIGCSE, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. T. Denning, A. Borning, B. Friedman, B. T. Gill, T. Kohno, and W. H. Maisel. Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices. In CHI, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. T. Denning, Y. Matsuoka, and T. Kohno. Neurosecurity: Security and privacy for neural devices. Neurosurgical Focus, 27, July 2009.Google ScholarGoogle ScholarCross RefCross Ref
  4. T. Denning, C. Matuszek, K. Koscher, J. R. Smith, and T. Kohno. A spotlight on security and privacy risks with future household robots: Attacks and lessons. In Ubicomp, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In USENIX Security, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Egerton, V. Callaghan, and G. Clarke. Using multiple personas in service robots to improve exploration strategies when mapping new environments. In Intelligent Environments, 2008.Google ScholarGoogle Scholar
  7. N. Ferguson, B. Schneier, and T. Kohno. Cryptography Engineering: Design Principles and Practical Applications. Wiley Publishing, Inc., 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Field. Screenplay: The Foundations of Screenwriting. Dell, 1979.Google ScholarGoogle Scholar
  9. R. Geambasu, T. Kohno, A. A. Levy, and H. M. Levy. Vanish: Increasing data privacy with self-destructing data. In USENIX Security, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In IEEE Symposium on Security and Privacy, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. B. D. Johnson. Nebulous Mechanisms. In Intelligent Environments, 2009.Google ScholarGoogle Scholar
  12. B.D. Johnson. Science Fiction Prototyping: A Framework for Design. Morgan and Claypool, 2010.Google ScholarGoogle Scholar
  13. B.D. Johnson. Science Fiction Prototypes Or: How I Learned to Stop Worrying about the Future and Love Science Fiction. In Intelligent Environments, 2009.Google ScholarGoogle Scholar
  14. D. Koontz. How to Write Best Selling Fiction. Writers Digest Books, 1981.Google ScholarGoogle Scholar
  15. K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage. Experimental security analysis of a modern automobile. In IEEE Symposium on Security and Privacy, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Leyden. Polish teen derails tram after hacking train network, 2008. http://www.theregister.co.uk/2008/01/11/tram_hack/.Google ScholarGoogle Scholar
  17. P. Mateti. A laboratory-based course on Internet security. In SIGCSE, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Moore. Alan Moore's Writing for Comics. Avatar Press, 2008.Google ScholarGoogle Scholar
  19. L. P. Nathan, B. Friedman, P. Klasnja, S. K. Kane, and J. K. Miller. Envisioning systemic effects on persons and society throughout interactive system design. In Designing Interactive Systems, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. D. Sanderson. Using Science Fiction to Teach Computer Science. In WWW@10, 2004.Google ScholarGoogle Scholar
  21. S. Schechter. Security that is meant to be skin deep: Using ultraviolet micropigmentation to store emergency-access keys for implantable medical devices. In USENIX Workshop on Health Security and Privacy, 2010.Google ScholarGoogle Scholar
  22. G. White and G. Nordstrom. Security across the curriculum: Using computer security to teach computer science principles. In National Information Systems Security Conference, 1996.Google ScholarGoogle Scholar

Index Terms

  1. Science fiction prototyping and security education: cultivating contextual and societal thinking in computer security education and beyond

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SIGCSE '11: Proceedings of the 42nd ACM technical symposium on Computer science education
      March 2011
      754 pages
      ISBN:9781450305006
      DOI:10.1145/1953163

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 9 March 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      SIGCSE '11 Paper Acceptance Rate107of315submissions,34%Overall Acceptance Rate1,595of4,542submissions,35%

      Upcoming Conference

      SIGCSE Virtual 2024

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader