skip to main content
10.1145/1940941.1940953acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
research-article

Using the Parkerian Hexad to introduce security in an information literacy class

Published: 01 October 2010 Publication History

Abstract

In January 2006, Armstrong Atlantic State University(AASU) offered its first course in Information Security. At the same time, the university received funding for its Cyber Security Research Institute, a non-academic unit closely related to and funded by the U.S. Department of Homeland Security. The establishment of this research institute led the administration, the Department of Criminal Justice in the College of Arts and Sciences, and the School of Computing to create an academic minor in Cyber Security to be cross-listed between Criminal Justice and Information Technology. This paper describes the pedagogical effects of the creation of the minor and future implications for it and for the teaching of Information Security at Armstrong Atlantic State University.
This article describes how the presentation of security in a junior level information literacy course evolved from a framework using the CIA model to the Parkerian Hexad model. This change was driven by the increasing use of mobile computing devices and the belief that the CIA model was not a sufficient framework to describe security in that environment. The Parkerian Hexad meets the needs to describe a mobile computing environment. However, it needs to be augmented in the areas of privacy and non-repudiation to provide sufficient coverage.

References

[1]
Carlson, T., Information Security Management: Understanding ISO 17799, 2001, INS Whitepaper, DOL= http://www.ins.com/downloads/whitepapers/ins_white_paper_info_security_iso_17799_1101.pdf
[2]
Choney, S., "Is the desktop going the way of the dinosaur?", 2008, DOL= http://www.msnbc.msn.com/id/27556783/
[3]
Jansen, W. and Scarfone, K., "NIST Special Publication 800-124 Guidelines on Cell Phone and PDA Security", 2008 DOL= http://csrc.nist.gov/publications/nistpubs/800-124/SP800-124.pdf
[4]
Kabay," Security for Telecommuters" DOL= http://www.buscalegis.ccj.ufsc.br/revistas/index.php/buscalegis/article/viewFile/3003/2574
[5]
Kleinrock, L., "Nomadic Computing" Keynote Address: International Conf. on Mobile Computing and Networking (MOBICOM 1995) DOL= http://www.cs.ucla.edu/~lk/LK/Bib/PS/paper199.pdf
[6]
Parker, D. B. Fighting Computer Crime: A new Framework for Protecting Information New York. 1998, Wiley Computer Publishing, John Wiley & Sons, Inc.
[7]
Reid, R., Wei, J., and Platt, R., "A Teaching Module to Introduce Encryption for Web Users", 2005 Information Security Curriculum Development Conference (InfoSecCD 2005), September 2005, Kennesaw, Ga
[8]
Sidener, J, "Cell phones taking on many roles, transforming market, generation", 2008, DOL= http://legacy.signonsandiego.com/news/metro/20080127-9999-1n27phone.html
[9]
Wu, X., Security Architecture for Sensitive Information Systems, 2009, PhD dissertation at Monash University DOL= http://beast.infotech.monash.edu.au/~srini/theses/Ping_Thesis.pdf

Cited By

View all
  • (2024)Contradictions Identification of Safety and Security Requirements for Industrial Cyber–Physical SystemsIEEE Internet of Things Journal10.1109/JIOT.2023.333212811:7(12033-12057)Online publication date: 1-Apr-2024
  • (2023)Cyber-susiliency index: A comprehensive resiliency-sustainability-cybersecurity index for healthcare supply chain networksDecision Analytics Journal10.1016/j.dajour.2023.1003199(100319)Online publication date: Dec-2023
  • (2022)Cybersecurity Vulnerabilities in Off-Site ConstructionApplied Sciences10.3390/app1210503712:10(5037)Online publication date: 16-May-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
InfoSecCD '10: 2010 Information Security Curriculum Development Conference
October 2010
187 pages
ISBN:9781450302029
DOI:10.1145/1940941
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • KSU - CISE: KSU Center for InfoSec Education
  • ISSA: The Metro Atlanta Information Systems Security Association

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 October 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. CIA
  2. Parkerian Hexad
  3. information system education

Qualifiers

  • Research-article

Conference

InfoSecCD '10
Sponsor:
  • KSU - CISE
  • ISSA

Acceptance Rates

Overall Acceptance Rate 18 of 23 submissions, 78%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)43
  • Downloads (Last 6 weeks)1
Reflects downloads up to 12 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Contradictions Identification of Safety and Security Requirements for Industrial Cyber–Physical SystemsIEEE Internet of Things Journal10.1109/JIOT.2023.333212811:7(12033-12057)Online publication date: 1-Apr-2024
  • (2023)Cyber-susiliency index: A comprehensive resiliency-sustainability-cybersecurity index for healthcare supply chain networksDecision Analytics Journal10.1016/j.dajour.2023.1003199(100319)Online publication date: Dec-2023
  • (2022)Cybersecurity Vulnerabilities in Off-Site ConstructionApplied Sciences10.3390/app1210503712:10(5037)Online publication date: 16-May-2022
  • (2021)Cyberspace Security Threats and Attacks on E-Records Management at Moi University, Eldoret, KenyaHandbook of Research on Records and Information Management Strategies for Enhanced Knowledge Coordination10.4018/978-1-7998-6618-3.ch020(333-353)Online publication date: 2021
  • (2021)Tor forensics: Proposed workflow for client memory artefactsComputers & Security10.1016/j.cose.2021.102311106(102311)Online publication date: Jul-2021
  • (2021)Assessing cyber resilience of additive manufacturing supply chain leveraging data fusion technique: A model to generate cyber resilience index of a supply chainCIRP Journal of Manufacturing Science and Technology10.1016/j.cirpj.2021.09.00835(911-928)Online publication date: Nov-2021
  • (2015)Mobile Phone Usage by Low Literate UsersProceedings of the 7th Indian Conference on Human-Computer Interaction10.1145/2835966.2835968(10-18)Online publication date: 17-Dec-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media