Abstract
An ever repeated problem within IT security is awareness and understanding. Some think this is due to failing educational systems and will be solved by interdisciplinary courses and programmes. This paper gives and overview of new developments within university education in IT Security, and analyses in particular what is meant by interdisciplinary approaches. An overview of existing models and frameworks for building educational programmes is given, and the most evident new directions for educators are outlined.
Chapter PDF
References
ACM (1991) Computing Curricula 1991. Report of the ACM/IEEE-CS Joint Curriculum Task Force, ACM Press & IEEE Computer Society Press.
Burns, A., McDermid, J. and Dobson, J. (1992) On the Meaning o Safety and Security., in The Computer Journal 35: 1, 3–15.
CobiT (1995) Control Objectives for Information Technology. CobiT Framework, Exposure Draft, August 1995, CobiT Steering Committee; the Information Systems Audit and Control Foundation Research Board and the Information Systems Audit and Control Foundation Standards Board.
Cohen, F.B. (1995) Viruses, Corruption, Denial, Disruption, and Information Assurance, in Information Security - the Next Decade (eds. Jan H.P. Eloff and Sebastian H. von Solms), Chapman & Hall, London.
Gritzalis, D (ed.) (1995) University Programmes on Information Security, Dependability and Safety, European Commission, Erasmus ICP Project ICP-94(&95)-G-4016/11, Report IS-CD-3c, Athens.
Higgins, John C. Information Security as a topic in undergraduate education of computer science, in Proceedings from the 12: th National Computer Security Conference, 1989.
Highland, H.J. (1992) Perspectives in Information Technology Security, in Education and Society Information Processing 92, Volume II (ed. R.M. Aiken), IFIP Transactions A-13, North-Holland, Amsterdam.
ImpactCS (1995) Consequences of Computing: A Framework for Teaching the Social and Ethical Impact of Computing. A Report from the ImpactCS Steering Committee, May, 1995, George Washington University, Washington.
INFOSEC (1992) Information Security INFOSEC’92. Security Investigations, European Commission DGXIII/F-GE1190/GI, reviewed, 22nd Jan 1992, Brussels.
Katsikas, S. and Gritzalis, D. (eds.) (1995) A proposal for a postgraduate curricula on information security, dependability, and safety, European Commission, Erasmus ICP-94(&95)-G-4016/11, Report IS-CD-4a, Athens.
Kneer, Dan, Vyskoc, J., Gallegos, F. (1994) Information Systems Audit Education, in IS Audit & Control Journal, Vol IV, 13–20.
Kolb, D. (1984) The cyclic model of leaning, Prentice Hall, N.J.
Lévy-Strauss, Claude (1968) The Savage Mind, University of Chicago Press, Chicago.
Lunheim, Rolf and Sindre, Guttorm (1994) Privacy and computing: a cultural perspective, in Security and Control of Information Technology in Society (eds. R. Sizer, L. Yngström, H. Kaspersen, S. Fischer-Hübner), IFIP Transactions A-43, North-Holland, Amsterdam.
Maconachy, W. (1989) Computer Security Education, Training, and Awareness: Turning a philosophical orientation into practical reality, in Proceedings from the 12th National Computer Security Conference, Baltimore.
Martin, C.D. and Holz, H.J. (1992) Integrating Social Impact and Ethical Issues Across the Computer Science Curriculum, in Education and Society Information Processing 92, Vol II (ed. R.M. Aiken), IFIP Transactions A-13, North-Holland, Amsterdam.
McCumber, J. (1991) Information Systems Security: a Comprehensive Model, in Proceedings from the 14th National Computer Security Conference, Washington.
Miller, K. (1988) Computer Ethics in the Curriculum, in Computer Science Education, 1, 37–52.
National Research Council (1991) Computers at Risk. Safe Computing In the Information Age, Systems Security Study Committee, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council, National Academy Press.
OECD (1992) Guidelines for the Security of Information Systems, Organisation for Economic Co-operation and Development, OECD/GD(92)190, Paris.
Parker, D. interview (1995) Computer Security as Folk Art: Why We Need the GASSP, in Computer Security Journal, Vol. X, Number 2, 1–4.
RDF, Riksdataforbundet (1986) En Svensk tiger — introduktion till ADB-sakerhet och sarbarhet. Skogs Reklamlito, Malmo.
Siklossi, K (1966) Cybernetic teaching, Prentice Hall, N.J.
Singleton, T., Flesher, Dale.L. (1994) The Developments of EDP Auditing Education, Research and Literature in North America: 1977 to 1994, in IS Audit & Control Journal, Vol. IV, 51–60.
Smith, R.A. (1991) Innovative teaching in engineering, Ellis Horwood, Chichester.
Turkle, Sherry (1990) Style as Substance in Educational Computing, in The Information Society: Evolving Landscapes (eds. J. Berleur, A. Clement, R. Sizer, D. Whitehouse), Springer-Verlag, New York.
Weber, R. (1994) The Evolution of the EDP Auditing Interviews, in IS Audit & Control Journal, Vol. III, 2–3.
Yngström, L. (1993) Evaluation of an academic programme in IT Security 1985–1990, in Computer Security: Discovering Tomorrow (eds. Graham E. Dougall and Darren Jones), North-Holland, Amsterdam.
Yngström, L. (1994) Education in IT Security at Bachelor and Master Levels Using a Systemic-Holistic Approach, in Security and Control of Information Technology in Society (eds. R Seizer, L. Yngström, H Kaspersen, S. Fischer-Hübner), IFIP Transactions A-43, North-Holland, Amsterdam
Yngström, L. (1995) A Holistic Approach to IT Security, in Information Security - the Next Decade (eds. Jan H.P. Eloff and Sebastian H. von Sohns), Chapman & Hall, London.
Yngström, L. (1995b) Education in IT security in Europe, in IFIP/TC11/WG11.8 workshop “Current and Future Needs, Problems and Prospects” May 8, Capetown, South Africa. (can be obtained through the author).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1996 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Yngström, L. (1996). IT Security and Privacy Education. In: Katsikas, S.K., Gritzalis, D. (eds) Information Systems Security. SEC 1996. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-1-5041-2919-0_30
Download citation
DOI: https://doi.org/10.1007/978-1-5041-2919-0_30
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2921-3
Online ISBN: 978-1-5041-2919-0
eBook Packages: Springer Book Archive