Skip to main content

2019 | OriginalPaper | Buchkapitel

Teaching as a Collaborative Practice: Reframing Security Practitioners as Navigators

verfasst von : Patricia A. H. Williams, Lizzie Coles-Kemp

Erschienen in: Transactions on Edutainment XV

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The need is growing for a workforce with both technical skills and the ability to navigate existing and emerging information security challenges. Practitioners can no longer depend upon process-driven approaches to people, processes and IT systems to manage information security. They need to be navigators of the entire environment to effectively integrate controls to protect information and technology. The research presented in this paper trialed an innovative tactile learning activity developed through the European Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security (TREsPASS) project with tertiary education students, designed to provide students with experience in real-world modelling of complex information security scenarios. The outcomes demonstrate that constructing such models in an educational setting are a means of encouraging exploration of the multiple dimensions of security. Such teaching may be a means of teaching social, organization and technical navigation skills necessary to integrate security controls in complex settings.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat Burdon, M., Siganto, J., Coles-Kemp, L.: The regulatory challenges of Australian information security practice. Comput. Law Secur. Rev. 32(4), 623–633 (2016)CrossRef Burdon, M., Siganto, J., Coles-Kemp, L.: The regulatory challenges of Australian information security practice. Comput. Law Secur. Rev. 32(4), 623–633 (2016)CrossRef
6.
Zurück zum Zitat November, V., Camacho-Hübner, E., Latour, B.: Entering a risky territory: space in the age of digital navigation. Environ. Plan. D Soc. Space 28(4), 581–599 (2010)CrossRef November, V., Camacho-Hübner, E., Latour, B.: Entering a risky territory: space in the age of digital navigation. Environ. Plan. D Soc. Space 28(4), 581–599 (2010)CrossRef
7.
Zurück zum Zitat Coles-Kemp, L., Overill, R.E.: On the role of the facilitator in information security risk assessment. J. Comput. Virol. 3(2), 143–148 (2007)CrossRef Coles-Kemp, L., Overill, R.E.: On the role of the facilitator in information security risk assessment. J. Comput. Virol. 3(2), 143–148 (2007)CrossRef
8.
Zurück zum Zitat Vasenev, A., Montoya, L., Ceccarelli, A., Le, A., Ionita, D.: Threat navigator: grouping and ranking malicious external threats to current and future urban smart grids. In: Hu, J., Leung, Victor C.M., Yang, K., Zhang, Y., Gao, J., Yang, S. (eds.) Smart Grid Inspired Future Technologies. LNICST, vol. 175, pp. 184–192. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-47729-9_19CrossRef Vasenev, A., Montoya, L., Ceccarelli, A., Le, A., Ionita, D.: Threat navigator: grouping and ranking malicious external threats to current and future urban smart grids. In: Hu, J., Leung, Victor C.M., Yang, K., Zhang, Y., Gao, J., Yang, S. (eds.) Smart Grid Inspired Future Technologies. LNICST, vol. 175, pp. 184–192. Springer, Cham (2017). https://​doi.​org/​10.​1007/​978-3-319-47729-9_​19CrossRef
9.
Zurück zum Zitat de Leeuw, K.M.M., Bergstra, J.: The History of Information Security: A Comprehensive Handbook. Elsevier, Amsterdam (2007) de Leeuw, K.M.M., Bergstra, J.: The History of Information Security: A Comprehensive Handbook. Elsevier, Amsterdam (2007)
10.
Zurück zum Zitat Saltzer, J., Schroeder, M.: The protection of information in computer systems. Proc. IEEE 63(9), 1278–1308 (1975)CrossRef Saltzer, J., Schroeder, M.: The protection of information in computer systems. Proc. IEEE 63(9), 1278–1308 (1975)CrossRef
11.
Zurück zum Zitat Reece, R., Stahl, B.: The professionalisation of information security: perspectives of UK practitioners. Comput. Secur. 48, 182–195 (2015)CrossRef Reece, R., Stahl, B.: The professionalisation of information security: perspectives of UK practitioners. Comput. Secur. 48, 182–195 (2015)CrossRef
16.
Zurück zum Zitat Shedden, P., Scheepers, R., Smith, W., Ahmad, A.: Incorporating a knowledge perspective into security risk assessments. VINE J. Knowl. Manag. 41(2), 152–166 (2011) Shedden, P., Scheepers, R., Smith, W., Ahmad, A.: Incorporating a knowledge perspective into security risk assessments. VINE J. Knowl. Manag. 41(2), 152–166 (2011)
17.
Zurück zum Zitat Hansen, L., Nissenbaum, H.: Digital disaster, cyber security, and the copenhagen school. Int. Stud. Q. 53(4), 1155–1175 (2009)CrossRef Hansen, L., Nissenbaum, H.: Digital disaster, cyber security, and the copenhagen school. Int. Stud. Q. 53(4), 1155–1175 (2009)CrossRef
18.
Zurück zum Zitat Libicki, M., Senty, D., Pollak, J.: Hackers Wanted: An Examination of the Cybersecurity Labor Market. RAND Corporation, Santa Monica (2014)CrossRef Libicki, M., Senty, D., Pollak, J.: Hackers Wanted: An Examination of the Cybersecurity Labor Market. RAND Corporation, Santa Monica (2014)CrossRef
23.
Zurück zum Zitat Bloom, B., Englehart, M., Furst, E., Hill, W., Krathwohl, D.: Taxonomy of Educational Objectives: The Classification of Educational Goals. Handbook I: Cognitive Domain. Longmans Green, New York (1956) Bloom, B., Englehart, M., Furst, E., Hill, W., Krathwohl, D.: Taxonomy of Educational Objectives: The Classification of Educational Goals. Handbook I: Cognitive Domain. Longmans Green, New York (1956)
28.
Zurück zum Zitat Hentea, M., Dhillon, H.S., Dhillon, M.: Towards changes in information security education. J. Inf. Technol. Educ. 5, 221–233 (2006) Hentea, M., Dhillon, H.S., Dhillon, M.: Towards changes in information security education. J. Inf. Technol. Educ. 5, 221–233 (2006)
29.
Zurück zum Zitat Yasinsac, A.: Information security curricula in computer science departments: theory and practice. Georg. Wash. Univ. J. Inf. Secur. 1(2), 5 (2002) Yasinsac, A.: Information security curricula in computer science departments: theory and practice. Georg. Wash. Univ. J. Inf. Secur. 1(2), 5 (2002)
33.
Zurück zum Zitat Conklin, A.: Cyber defense competitions and information security education: an active learning solution for a capstone course. In: Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS 2006) (2006) Conklin, A.: Cyber defense competitions and information security education: an active learning solution for a capstone course. In: Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS 2006) (2006)
34.
Zurück zum Zitat He, W., Kshirsagar, A., Nwala, A., Li, Y.: Teaching information security with workflow technology–a case study approach. J. Inf. Syst. Educ. 25(3), 201+ (2014) He, W., Kshirsagar, A., Nwala, A., Li, Y.: Teaching information security with workflow technology–a case study approach. J. Inf. Syst. Educ. 25(3), 201+ (2014)
35.
Zurück zum Zitat Zurita, H., Maynard, S., Ahmad, A.: Evaluating the utility of research articles for teaching information security management. In: Proceeding of Australasian Conference on Information Systems 2015 (2016). https://arxiv.org/abs/1606.01448 Zurita, H., Maynard, S., Ahmad, A.: Evaluating the utility of research articles for teaching information security management. In: Proceeding of Australasian Conference on Information Systems 2015 (2016). https://​arxiv.​org/​abs/​1606.​01448
37.
Zurück zum Zitat Tonkin, E.: Multilayered paper prototyping for user concept modeling: supporting the development of application profiles. In: Proceedings of the International Conference on Dublin Core and Metadata Applications, 2009, pp. 51–60 (2009) Tonkin, E.: Multilayered paper prototyping for user concept modeling: supporting the development of application profiles. In: Proceedings of the International Conference on Dublin Core and Metadata Applications, 2009, pp. 51–60 (2009)
38.
Zurück zum Zitat Linek, S.B., Tochtermann, K.: Paper prototyping: the surplus merit of a multi-method approach. Forum Qual. Soc. Res. 16(3) (2015) Linek, S.B., Tochtermann, K.: Paper prototyping: the surplus merit of a multi-method approach. Forum Qual. Soc. Res. 16(3) (2015)
41.
Zurück zum Zitat Kirschner, P.A., Ayres, P., Chandler, P.: Contemporary cognitive load theory research: the good, the bad and the ugly. Comput. Hum. Behav. 27(1), 99–105 (2011)CrossRef Kirschner, P.A., Ayres, P., Chandler, P.: Contemporary cognitive load theory research: the good, the bad and the ugly. Comput. Hum. Behav. 27(1), 99–105 (2011)CrossRef
42.
Zurück zum Zitat Sweller, J.: Cognitive load during problem solving: effects on learning. Cogn. Sci. 12(2), 257–285 (1988)CrossRef Sweller, J.: Cognitive load during problem solving: effects on learning. Cogn. Sci. 12(2), 257–285 (1988)CrossRef
43.
Zurück zum Zitat Kalyuga, S., Hanham, J.: Instructing in generalized knowledge structures to develop flexible problem solving skills. Comput. Hum. Behav. 27(1), 63–68 (2011)CrossRef Kalyuga, S., Hanham, J.: Instructing in generalized knowledge structures to develop flexible problem solving skills. Comput. Hum. Behav. 27(1), 63–68 (2011)CrossRef
44.
Zurück zum Zitat Kirschner, F., Paas, F., Kirschner, P.A.: Superiority of collaborative learning with complex tasks: a research note on an alternative affective explanation. Comput. Hum. Behav. 27(1), 53–57 (2011)CrossRef Kirschner, F., Paas, F., Kirschner, P.A.: Superiority of collaborative learning with complex tasks: a research note on an alternative affective explanation. Comput. Hum. Behav. 27(1), 53–57 (2011)CrossRef
46.
Zurück zum Zitat Hall, P., Heath, C., Coles-Kemp, L., Tanner, A.: Examining the contribution of critical visualisation to information security. In: Proceedings of the 2015 New Security Paradigms Workshop 2015, pp. 59–72. ACM, September 2015 Hall, P., Heath, C., Coles-Kemp, L., Tanner, A.: Examining the contribution of critical visualisation to information security. In: Proceedings of the 2015 New Security Paradigms Workshop 2015, pp. 59–72. ACM, September 2015
Metadaten
Titel
Teaching as a Collaborative Practice: Reframing Security Practitioners as Navigators
verfasst von
Patricia A. H. Williams
Lizzie Coles-Kemp
Copyright-Jahr
2019
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-59351-6_10