Abstract
We present work on a hybrid method for developing a pedagogical cybersecurity ontology augmented with teaching and learning-related knowledge in addition to the domain content knowledge. The intended use of this ontology is to support students in the process of learning. The general methodology for developing the pedagogical cybersecurity ontology combines the semi-automatic classification and acquisition of domain content knowledge with pedagogical knowledge. The hybrid development method involves the use of a seed ontology, an electronically readable textbook with a back-of-the-book index, semi-automatic steps based on pattern matching, and the cyberSecurity Ontology eXpert tool (SOX) for an expert to fill the knowledge gaps. Pedagogical knowledge elements include importance, difficulty, prerequisites and likely misunderstandings. The pedagogical cybersecurity ontology can be more useful for students than an ontology that contains only domain content knowledge.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
This “classification” is not related to the Description Logic classification algorithm.
- 2.
Bold font added by us.
References
Guarino, N., Oberle, D., Staab, S.: What is an Ontology? In: Staab, S., Studer, R. (eds.) Handbook on Ontologies. International Handbooks on Information Systems. Springer, Heidelberg (2009)
Geller, J., Chun, S., Wali, A.: A hybrid approach to developing a cyber security ontology. In: Proceedings of the 3rd International Conference on Data management Technologies and Applications, Vienna, Austria, pp. 377–384 (2014)
Shulman, L.S.: Those who understand: knowledge growth in teaching. Educ. Researcher 15(2), 4–31 (1986)
Shulman, L.S.: Knowledge and teaching: foundations of the new reform. Harvard Educ. Rev. 57(1), 1–22 (1987)
Cornet, R., de Keizer, N.: Forty years of SNOMED: a literature review. BMC Med. Inform. Decis. Mak 8(1), S2 (2008). doi: 1472-6947-8-S1-S2 [pii] 10.1186/1472-6947-8-S1-S2
Wijaya, D.T.: NELL: a machine that continuously reads, learns, and thinks by itself, May 2014. The Global Scientist, online magazine by international Fulbright science and technology fellows
An, Y.J., Geller, J., Wu, Y., Chun, S.A.: Automatic generation of ontology from the deep web. In: Proceedings Database and Expert Systems Applications, DEXA 2007, Regensburg, Germany (2007)
Geller, J., Chun, S.A., An, Y.J.: Toward the semantic deep web. IEEE Computer 41, 95–97 (2008)
Cleveland, D.B., Cleveland, A.D.: Introduction to Indexing and Abstracting, Fourth edn. Libraries Unlimited Inc., Englewood (2013)
Wu, Z., Li, Z., Mitra, P., Giles, C.L.: Can back-of-the-book indexes be automatically created? In: Proceedings CIKM, San Francisco, CA, pp. 1745–1750 (2013)
Chun, S.A., Geller, J., Wali, A.: Developing cyber security Ontology and linked data of security knowledge network. In: Proceedings Conference of the Florida Artificial Intelligence Research Society (Flairs-27), Pensacola, FL (2014)
Wali, A., Chun, S.A., Geller, J.: A bootstrapping approach for developing cyber security ontology using textbook index terms. In: Proceedings International Conference on Availability, Reliability and Security (ARES 2013), University of Regensburg, Germany (2013)
Rowan, B., Schilling, S.G., Ball, D.L., Miller, R., et al.: Measuring teachers’ pedagogical content knowledge in surveys: an exploratory study. Consortium for Policy Research in Education (2001). http://sii.soe.umich.edu/newsite/documents/pck%20final%20report%20revised%20BR100901.pdf. Accessed 12/December/2014
Caracciolo, C.: Designing and implementing an Ontology for logic and linguistics. Literary Linguist. Comput. 21, 29–39 (2006)
Hindle, D.: Noun classification from predicate-argument structures. In: Proceedings 28th Annual Meeting of the Association for Computational Linguistics, Pittsburgh, Pennsylvania (1990)
Hearst, M.A.: Automatic acquisition of hyponyms from large text corpora. In: Proceedings 14th Conference on Computational linguistics, Nantes, France (1992)
Cimiano, P., Hotho, A., Staab, S.: Learning concept hierarchies from text corpora using formal concept analysis. J. Artif. Int. Res. 24, 305–339 (2005)
Wiebke, P.: A set-theoretical approach for the induction of inheritance hierarchies. Electron. Notes Theor. Comput. Sci. 53, 1–13 (2004)
Jain, P., Hitzler, P., Sheth, A.P., Verma, K., Yeh, P.Z.: Ontology alignment for linked open data. In: Patel-Schneider, P.F., Pan, Y., Hitzler, P., Mika, P., Zhang, L., Pan, J.Z., Horrocks, I., Glimm, B. (eds.) ISWC 2010, Part I. LNCS, vol. 6496, pp. 402–417. Springer, Heidelberg (2010)
Fellbaum, C.: WordNet: An Electronic Lexical Database. MIT Press, Cambridge (1998)
Pattanasri, N., Jatowt, A., Tanaka, K.: Context-aware search inside e-learning materials using textbook ontologies. In: Dong, G., Lin, X., Wang, W., Yang, Y., Yu, J.X. (eds.) Advances in Data and Web Management. LNCS, vol. 4505, pp. 658–669. Springer, Heidelberg (2007)
Souag, A., Salinesi, C., Comyn-Wattiau, I.: Ontologies for security requirements: a literature survey and classification. In: Bajec, M., Eder, J. (eds.) CAiSE Workshops 2012. LNBIP, vol. 112, pp. 61–69. Springer, Heidelberg (2012)
Fenz, S., Ekelhart, A.: Formalizing information security knowledge. In: Proceedings 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia (2009)
Geneiatakis, D., Lambrinoudakis, C.: An ontology description for SIP security flaws. Comput. Commun. 30, 1367–1374 (2007)
Herzog, A., Shahmeri, N., Duma, C.: An ontology of information security. Int. J. Inf. Secur. Priv. 1(4), 1–23 (2007)
Kim, A., Luo, J., Kang, M.: Security ontology for annotating resources. In: Meersman, R. (ed.) OTM 2005. LNCS, vol. 3761, pp. 1483–1499. Springer, Heidelberg (2005)
Undercoffer, J., Joshi, A., Pinkston, J.: Modeling computer attacks: an ontology for intrusion detection. In: Vigna, G., Kruegel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 113–135. Springer, Heidelberg (2003)
Blanco, C., Lasheras, J., Valencia-Garcia, R., Fernandez-Medina, E., Toval, A., Piattini, M.: A systematic review and comparison of security ontologies. In: Proceedings of the Third International Conference on Availability, Reliability and Security (2008)
Wang, S., Ontology of Learning Objects Repository for Pedagogical Knowledge Sharing Interdisciplinary Journal of E-Learning and Learning Objects, vol. 4, Formerly the Interdisciplinary Journal of Knowledge and Learning Objects (2008)
Goodrich, M., Tamassia, R.: Introduction to Computer Security. Addison-Wesley, USA (2010)
Glossary of Key Information Security Terms. NIST Interagency Report, p. 222: NIST, US Department of Commerce (2012)
Vizenor, L.T., Bodenreider, O., McCray, A.T.: Auditing associative relations across two knowledge sources. J. Biomed. Inform. 42(3), 426–439 (2009)
Skoudis, E., Liston, T.: Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, 2nd edn. Prentice Hall PTR, Englewood Cliffs (2006). Paperback – January 2, ISBN-10: 013148104
Elmasri, R., Navathe, S.B.: Fundamentals of Database Systems, 6th edn. Pearson, Boston (2010)
Acknowledgements
This work is partially funded by NSF grants 1241687 and 1241976. We gratefully acknowledge Pearson and Addison-Wesley for making the electronic textbooks available. We acknowledge the contributions of Mickel Mansour for building the SOX prototype system and of the domain experts at NJIT, Reza Curtmola and Roberto Rubino, for their participation and their valuable feedback.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Chun, S.A., Geller, J. (2015). Developing a Pedagogical Cybersecurity Ontology. In: Helfert, M., Holzinger, A., Belo, O., Francalanci, C. (eds) Data Management Technologies and Applications. DATA 2014. Communications in Computer and Information Science, vol 178. Springer, Cham. https://doi.org/10.1007/978-3-319-25936-9_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-25936-9_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25935-2
Online ISBN: 978-3-319-25936-9
eBook Packages: Computer ScienceComputer Science (R0)