ABSTRACT
Computer security courses typically cover a breadth of technical topics, including threat modeling, applied cryptography, software security, and Web security. The technical artifacts of computer systems - and their associated computer security risks and defenses - do not exist in isolation, however; rather, these systems interact intimately with the needs, beliefs, and values of people. This is especially true as computers become more pervasive, embedding themselves not only into laptops, desktops, and the Web, but also into our cars, medical devices, and toys. Therefore, in addition to the standard technical material, we argue that students would benefit from developing a mindset focused on the broader societal and contextual issues surrounding computer security systems and risks. We used science fiction (SF) prototyping to facilitate such societal and contextual thinking in a recent undergraduate computer security course. We report on our approach and experiences here, as well as our recommendations for future computer security and other computer science courses.
- S. Bratus, A. Shubina, and M. E. Locasto. Teaching the principles of the hacker curriculum to undergraduates. In SIGCSE, 2010. Google ScholarDigital Library
- T. Denning, A. Borning, B. Friedman, B. T. Gill, T. Kohno, and W. H. Maisel. Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices. In CHI, 2010. Google ScholarDigital Library
- T. Denning, Y. Matsuoka, and T. Kohno. Neurosecurity: Security and privacy for neural devices. Neurosurgical Focus, 27, July 2009.Google ScholarCross Ref
- T. Denning, C. Matuszek, K. Koscher, J. R. Smith, and T. Kohno. A spotlight on security and privacy risks with future household robots: Attacks and lessons. In Ubicomp, 2009. Google ScholarDigital Library
- R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In USENIX Security, 2004. Google ScholarDigital Library
- S. Egerton, V. Callaghan, and G. Clarke. Using multiple personas in service robots to improve exploration strategies when mapping new environments. In Intelligent Environments, 2008.Google Scholar
- N. Ferguson, B. Schneier, and T. Kohno. Cryptography Engineering: Design Principles and Practical Applications. Wiley Publishing, Inc., 2010. Google ScholarDigital Library
- S. Field. Screenplay: The Foundations of Screenwriting. Dell, 1979.Google Scholar
- R. Geambasu, T. Kohno, A. A. Levy, and H. M. Levy. Vanish: Increasing data privacy with self-destructing data. In USENIX Security, 2009. Google ScholarDigital Library
- D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In IEEE Symposium on Security and Privacy, 2008. Google ScholarDigital Library
- B. D. Johnson. Nebulous Mechanisms. In Intelligent Environments, 2009.Google Scholar
- B.D. Johnson. Science Fiction Prototyping: A Framework for Design. Morgan and Claypool, 2010.Google Scholar
- B.D. Johnson. Science Fiction Prototypes Or: How I Learned to Stop Worrying about the Future and Love Science Fiction. In Intelligent Environments, 2009.Google Scholar
- D. Koontz. How to Write Best Selling Fiction. Writers Digest Books, 1981.Google Scholar
- K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage. Experimental security analysis of a modern automobile. In IEEE Symposium on Security and Privacy, 2010. Google ScholarDigital Library
- J. Leyden. Polish teen derails tram after hacking train network, 2008. http://www.theregister.co.uk/2008/01/11/tram_hack/.Google Scholar
- P. Mateti. A laboratory-based course on Internet security. In SIGCSE, 2003. Google ScholarDigital Library
- A. Moore. Alan Moore's Writing for Comics. Avatar Press, 2008.Google Scholar
- L. P. Nathan, B. Friedman, P. Klasnja, S. K. Kane, and J. K. Miller. Envisioning systemic effects on persons and society throughout interactive system design. In Designing Interactive Systems, 2008. Google ScholarDigital Library
- D. Sanderson. Using Science Fiction to Teach Computer Science. In WWW@10, 2004.Google Scholar
- S. Schechter. Security that is meant to be skin deep: Using ultraviolet micropigmentation to store emergency-access keys for implantable medical devices. In USENIX Workshop on Health Security and Privacy, 2010.Google Scholar
- G. White and G. Nordstrom. Security across the curriculum: Using computer security to teach computer science principles. In National Information Systems Security Conference, 1996.Google Scholar
Index Terms
- Science fiction prototyping and security education: cultivating contextual and societal thinking in computer security education and beyond
Recommendations
Science fiction in computer science education
SIGCSE '12: Proceedings of the 43rd ACM technical symposium on Computer Science EducationThe use of science fiction (SF) to engage students in computer science learning is becoming more popular [1-6]. There is ample material available to help both undergraduate and graduate students make connections between technical content and human ...
Teaching Computer Science Ethics Using Science Fiction
SIGCSE 2023: Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 2This workshop will introduce participants interested in teaching a full-term computer science ethics course to the tools and techniques of using science fiction to teach that course. The workshop will consist of three hourlong parts, each of which will ...
Security education: a roadmap to the future
SIGCSE 08The topic of this proposed special session is security education with an emphasis on increasing the number of schools and programs that teach it. We will review the current status of security education as it is taught within the CS discipline including ...
Comments