Skip to main content

Developing a Pedagogical Cybersecurity Ontology

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 178))

Abstract

We present work on a hybrid method for developing a pedagogical cybersecurity ontology augmented with teaching and learning-related knowledge in addition to the domain content knowledge. The intended use of this ontology is to support students in the process of learning. The general methodology for developing the pedagogical cybersecurity ontology combines the semi-automatic classification and acquisition of domain content knowledge with pedagogical knowledge. The hybrid development method involves the use of a seed ontology, an electronically readable textbook with a back-of-the-book index, semi-automatic steps based on pattern matching, and the cyberSecurity Ontology eXpert tool (SOX) for an expert to fill the knowledge gaps. Pedagogical knowledge elements include importance, difficulty, prerequisites and likely misunderstandings. The pedagogical cybersecurity ontology can be more useful for students than an ontology that contains only domain content knowledge.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    This “classification” is not related to the Description Logic classification algorithm.

  2. 2.

    Bold font added by us.

References

  1. Guarino, N., Oberle, D., Staab, S.: What is an Ontology? In: Staab, S., Studer, R. (eds.) Handbook on Ontologies. International Handbooks on Information Systems. Springer, Heidelberg (2009)

    Google Scholar 

  2. Geller, J., Chun, S., Wali, A.: A hybrid approach to developing a cyber security ontology. In: Proceedings of the 3rd International Conference on Data management Technologies and Applications, Vienna, Austria, pp. 377–384 (2014)

    Google Scholar 

  3. Shulman, L.S.: Those who understand: knowledge growth in teaching. Educ. Researcher 15(2), 4–31 (1986)

    Article  Google Scholar 

  4. Shulman, L.S.: Knowledge and teaching: foundations of the new reform. Harvard Educ. Rev. 57(1), 1–22 (1987)

    Article  Google Scholar 

  5. Cornet, R., de Keizer, N.: Forty years of SNOMED: a literature review. BMC Med. Inform. Decis. Mak 8(1), S2 (2008). doi: 1472-6947-8-S1-S2 [pii] 10.1186/1472-6947-8-S1-S2

    Article  Google Scholar 

  6. Wijaya, D.T.: NELL: a machine that continuously reads, learns, and thinks by itself, May 2014. The Global Scientist, online magazine by international Fulbright science and technology fellows

    Google Scholar 

  7. An, Y.J., Geller, J., Wu, Y., Chun, S.A.: Automatic generation of ontology from the deep web. In: Proceedings Database and Expert Systems Applications, DEXA 2007, Regensburg, Germany (2007)

    Google Scholar 

  8. Geller, J., Chun, S.A., An, Y.J.: Toward the semantic deep web. IEEE Computer 41, 95–97 (2008)

    Article  Google Scholar 

  9. Cleveland, D.B., Cleveland, A.D.: Introduction to Indexing and Abstracting, Fourth edn. Libraries Unlimited Inc., Englewood (2013)

    Google Scholar 

  10. Wu, Z., Li, Z., Mitra, P., Giles, C.L.: Can back-of-the-book indexes be automatically created? In: Proceedings CIKM, San Francisco, CA, pp. 1745–1750 (2013)

    Google Scholar 

  11. Chun, S.A., Geller, J., Wali, A.: Developing cyber security Ontology and linked data of security knowledge network. In: Proceedings Conference of the Florida Artificial Intelligence Research Society (Flairs-27), Pensacola, FL (2014)

    Google Scholar 

  12. Wali, A., Chun, S.A., Geller, J.: A bootstrapping approach for developing cyber security ontology using textbook index terms. In: Proceedings International Conference on Availability, Reliability and Security (ARES 2013), University of Regensburg, Germany (2013)

    Google Scholar 

  13. Rowan, B., Schilling, S.G., Ball, D.L., Miller, R., et al.: Measuring teachers’ pedagogical content knowledge in surveys: an exploratory study. Consortium for Policy Research in Education (2001). http://sii.soe.umich.edu/newsite/documents/pck%20final%20report%20revised%20BR100901.pdf. Accessed 12/December/2014

  14. Caracciolo, C.: Designing and implementing an Ontology for logic and linguistics. Literary Linguist. Comput. 21, 29–39 (2006)

    Article  Google Scholar 

  15. Hindle, D.: Noun classification from predicate-argument structures. In: Proceedings 28th Annual Meeting of the Association for Computational Linguistics, Pittsburgh, Pennsylvania (1990)

    Google Scholar 

  16. Hearst, M.A.: Automatic acquisition of hyponyms from large text corpora. In: Proceedings 14th Conference on Computational linguistics, Nantes, France (1992)

    Google Scholar 

  17. Cimiano, P., Hotho, A., Staab, S.: Learning concept hierarchies from text corpora using formal concept analysis. J. Artif. Int. Res. 24, 305–339 (2005)

    MATH  Google Scholar 

  18. Wiebke, P.: A set-theoretical approach for the induction of inheritance hierarchies. Electron. Notes Theor. Comput. Sci. 53, 1–13 (2004)

    Article  Google Scholar 

  19. Jain, P., Hitzler, P., Sheth, A.P., Verma, K., Yeh, P.Z.: Ontology alignment for linked open data. In: Patel-Schneider, P.F., Pan, Y., Hitzler, P., Mika, P., Zhang, L., Pan, J.Z., Horrocks, I., Glimm, B. (eds.) ISWC 2010, Part I. LNCS, vol. 6496, pp. 402–417. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  20. Fellbaum, C.: WordNet: An Electronic Lexical Database. MIT Press, Cambridge (1998)

    MATH  Google Scholar 

  21. Pattanasri, N., Jatowt, A., Tanaka, K.: Context-aware search inside e-learning materials using textbook ontologies. In: Dong, G., Lin, X., Wang, W., Yang, Y., Yu, J.X. (eds.) Advances in Data and Web Management. LNCS, vol. 4505, pp. 658–669. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  22. Souag, A., Salinesi, C., Comyn-Wattiau, I.: Ontologies for security requirements: a literature survey and classification. In: Bajec, M., Eder, J. (eds.) CAiSE Workshops 2012. LNBIP, vol. 112, pp. 61–69. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  23. Fenz, S., Ekelhart, A.: Formalizing information security knowledge. In: Proceedings 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia (2009)

    Google Scholar 

  24. Geneiatakis, D., Lambrinoudakis, C.: An ontology description for SIP security flaws. Comput. Commun. 30, 1367–1374 (2007)

    Article  Google Scholar 

  25. Herzog, A., Shahmeri, N., Duma, C.: An ontology of information security. Int. J. Inf. Secur. Priv. 1(4), 1–23 (2007)

    Article  Google Scholar 

  26. Kim, A., Luo, J., Kang, M.: Security ontology for annotating resources. In: Meersman, R. (ed.) OTM 2005. LNCS, vol. 3761, pp. 1483–1499. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  27. Undercoffer, J., Joshi, A., Pinkston, J.: Modeling computer attacks: an ontology for intrusion detection. In: Vigna, G., Kruegel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 113–135. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  28. Blanco, C., Lasheras, J., Valencia-Garcia, R., Fernandez-Medina, E., Toval, A., Piattini, M.: A systematic review and comparison of security ontologies. In: Proceedings of the Third International Conference on Availability, Reliability and Security (2008)

    Google Scholar 

  29. Wang, S., Ontology of Learning Objects Repository for Pedagogical Knowledge Sharing Interdisciplinary Journal of E-Learning and Learning Objects, vol. 4, Formerly the Interdisciplinary Journal of Knowledge and Learning Objects (2008)

    Google Scholar 

  30. Goodrich, M., Tamassia, R.: Introduction to Computer Security. Addison-Wesley, USA (2010)

    Google Scholar 

  31. Glossary of Key Information Security Terms. NIST Interagency Report, p. 222: NIST, US Department of Commerce (2012)

    Google Scholar 

  32. Vizenor, L.T., Bodenreider, O., McCray, A.T.: Auditing associative relations across two knowledge sources. J. Biomed. Inform. 42(3), 426–439 (2009)

    Article  Google Scholar 

  33. Skoudis, E., Liston, T.: Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, 2nd edn. Prentice Hall PTR, Englewood Cliffs (2006). Paperback – January 2, ISBN-10: 013148104

    Google Scholar 

  34. Elmasri, R., Navathe, S.B.: Fundamentals of Database Systems, 6th edn. Pearson, Boston (2010)

    Google Scholar 

Download references

Acknowledgements

This work is partially funded by NSF grants 1241687 and 1241976. We gratefully acknowledge Pearson and Addison-Wesley for making the electronic textbooks available. We acknowledge the contributions of Mickel Mansour for building the SOX prototype system and of the domain experts at NJIT, Reza Curtmola and Roberto Rubino, for their participation and their valuable feedback.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to James Geller .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Chun, S.A., Geller, J. (2015). Developing a Pedagogical Cybersecurity Ontology. In: Helfert, M., Holzinger, A., Belo, O., Francalanci, C. (eds) Data Management Technologies and Applications. DATA 2014. Communications in Computer and Information Science, vol 178. Springer, Cham. https://doi.org/10.1007/978-3-319-25936-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25936-9_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25935-2

  • Online ISBN: 978-3-319-25936-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics