skip to main content
10.1145/3408877.3432462acmconferencesArticle/Chapter ViewAbstractPublication PagessigcseConference Proceedingsconference-collections
research-article
Best Paper

Creating a Multifarious Cyber Science Major

Published:05 March 2021Publication History

ABSTRACT

Existing approaches to computing-based cyber undergraduate majors typically take one of two forms: a broad exploration of both technical and human aspects, or a deep technical exploration of a single discipline relevant to cybersecurity. This paper describes the creation of a third approach--a multifarious major, consistent with Cybersecurity Curricula 2017, the ABET Cybersecurity Program Criteria, and the National Security Agency Center for Academic Excellence--Cyber Operations criteria. Our novel curriculum relies on a 10-course common foundation extended by one of five possible concentrations, each of which is delivered through a disciplinary lens and specialized into a highly relevant computing interest area serving society's diverse cyber needs. The journey began years ago when we infused cybersecurity education throughout our programs, seeking to keep offerings and extracurricular activities relevant in society's increasingly complex relationship with cyberspace. This paper details the overarching design principles, decision-making process, benchmarking, and feedback elicitation activities. A surprising key step was merging several curricula proposals into a single hybrid option. The new major attracted a strong initial cohort, meeting our enrollment goals and exceeding our diversity goals. We provide several recommendations for any institution embarking on a process of designing a new cyber-named major.

References

  1. ABET, Inc. 2019. Criteria for Accrediting Computing Programs, 2020--2021. https://www.abet.org/accreditation/accreditation-criteria/criteria-for-accrediting-computing-programs-2020--2021/ Accessed: August 27, 2020.Google ScholarGoogle Scholar
  2. Jean R. S. Blair, Christa M. Chewar, Rajendra K. Raj, and Edward Sobiesk. 2020 a. Infusing Principles and Practices for Secure Computing Throughout an Undergraduate Computer Science Curriculum. In Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education (Trondheim, Norway) (ITiCSE '20). Association for Computing Machinery, New York, NY, USA, 82--88. https://doi.org/10.1145/3341525.3387426Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Jean R. S. Blair, Andrew O. Hall, and Edward Sobiesk. 2019. Educating Future Multidisciplinary Cybersecurity Teams. Computer, Vol. 52, 3 (2019), 58--66. https://doi.org/10.1109/MC.2018.2884190Google ScholarGoogle ScholarCross RefCross Ref
  4. Jean R. S. Blair, Andrew O. Hall, and Edward Sobiesk. 2020 b. Holistic Cyber Education. In Cyber Security Education: Principles and Policies, Greg Austin (Ed.). Routledge, New York, Chapter 10, 160--172.Google ScholarGoogle Scholar
  5. Diana L. Burley. 2014. Cybersecurity Education, Part 1. ACM Inroads, Vol. 5, 1 (March 2014), 41. https://doi.org/10.1145/2568195.2568210Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Diana L. Burley. 2015. Cybersecurity Education, Part 2. ACM Inroads, Vol. 6, 2 (May 2015), 58. https://doi.org/10.1145/2746407Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Andrea Danyluk, Steve Roach, Elizabeth K. Hawthorne, Henry M. Walker, Ruth E. Anderson, and Christa M. Chewar. 2013. ACM/IEEE Computer Science 2013 Exemplar-Fest. In Proceeding of the 44th ACM Technical Symposium on Computer Science Education (Denver, Colorado, USA) (SIGCSE '13). Association for Computing Machinery, New York, NY, USA, 285--286. https://doi.org/10.1145/2445196.2445284Google ScholarGoogle Scholar
  8. Joseph J. Ekstrom, Barry M. Lunt, Allen Parrish, Rajendra K. Raj, and Edward Sobiesk. 2017a. Information Technology as a Cyber Science. In Proceedings of the 37th SIGITE technical symposium on Information Technology education (SIGITE '17). ACM, New York, 84--89.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Joseph J. Ekstrom, Barry M. Lunt, Allen Parrish, Rajendra K. Raj, and Edward Sobiesk. 2017b. Information Technology as a Cyber Science. In Proceedings of the 18th Annual Conference on Information Technology Education (Rochester, New York, USA) (SIGITE '17). Association for Computing Machinery, New York, NY, USA, 33--37. https://doi.org/10.1145/3125659.3125697Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. David Gibson, Vijay Anand, Josh Dehlinger, Charles Dierbach, Tracy Emmersen, and Andrew Phillips. 2019. Accredited Undergraduate Cybersecurity Degrees: Four Approaches. Computer Magazine, Vol. 52, 3 (March 2019), 38--47.Google ScholarGoogle Scholar
  11. Association for Computing Machinery (ACM) Joint Task Force on Computing Curricula and IEEE Computer Society. 2013. Computer Science Curricula 2013: Curriculum Guidelines for Undergraduate Degree Programs in Computer Science .Association for Computing Machinery, New York, NY, USA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Joint Task Force on Cybersecurity Education. 2017. Cybersecurity Curricula 2017: Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity. Technical Report. ACM, IEEE-CS, AIS SIGSEC, and IFIP WG 11.8. https://doi.org/10.1145/3184594Google ScholarGoogle Scholar
  13. Merriam-Webster. 2004. Webster's New World College Dictionary fourth ed.). Collins Dictionary. https://www.collinsdictionary.com/us/dictionary/english/multifarious accessed August 25, 2020.Google ScholarGoogle Scholar
  14. Allen Parrish, John Impagliazzo, Rajendra K. Raj, Henrique Santos, Muhammad Rizwan Asghar, Audun Jøsang, Teresa Pereira, and Eliana Stavrou. 2018. Global Perspectives on Cybersecurity Education for 2030: A Case for a Meta-Discipline. In Proceedings Companion of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (Larnaca, Cyprus) (ITiCSE 2018 Companion). Association for Computing Machinery, New York, NY, USA, 36--54. https://doi.org/10.1145/3293881.3295778Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Mihaela Sabin, Svetlana Peltsverger, Cara Tang, and Barry M. Lunt. 2016. ACM/IEEE-CS Information Technology Curriculum 2017: A Status Update. In Proceedings of the 17th Annual Conference on Information Technology Education (Boston, Massachusetts, USA) (SIGITE '16). Association for Computing Machinery, New York, NY, USA, 102--103. https://doi.org/10.1145/2978192.2978241Google ScholarGoogle Scholar
  16. Ann Sobel, Allen Parrish, and Rajendra K. Raj. 2019. Curricular Foundations for Cybersecurity. Computer, Vol. 52, 3 (March 2019), 14--17. https://doi.org/10.1109/MC.2019.2898240Google ScholarGoogle ScholarCross RefCross Ref
  17. Edward Sobiesk, Jean Blair, Gregory Conti, Michael Lanham, and Howard Taylor. 2015. Cyber Education: a multi-level, multi-discipline approach. In Proceedings of the 16th Annual Conference on Information Technology Education (SIGITE '15) (Chicago Illinois). ACM, ACM digital library, 43--47.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Valdemar Svabensky, Jan Vykopal, and Pavel Celeda. 2020. What Are Cybersecurity Education Papers About? A Systematic Literature Review of SIGCSE and ITiCSE Conferences. In SIGCSE '20: Proceedings of the 51st ACM Technical Symposium on Computer Science Education. ACM, ACM digital library, 2--8. https://doi.org/10.1145/3328778.3366816Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. US National Security Agency and the Department of Homeland Security. 2018. Centers of Academic Excellence in Cybersecurity. https://www.nsa.gov/resources/students-educators/centers-academic-excellence/ Accessed: April 02, 2018.Google ScholarGoogle Scholar

Index Terms

  1. Creating a Multifarious Cyber Science Major

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader