Abstract
E-Learning systems should be based on systematic pedagogical approaches and well-designed procedures and techniques. However, current literature on several areas of technology-enhanced learning environments, such as online information security (InfoSec) laboratories still lack well-specified pedagogical approaches and concrete design principles. In information security education, hands-on lab exercises play a major role in learning. Distance education brings in new challenges as the hands-on exercises require now virtual labs, which need to be accessible anywhere and often also anytime. This creates technological and pedagogical challenges, which are not fully understood in terms of explicit design principles that would enhance implementation and use of on-line educational labs. To contribute to this knowledge gap the paper describes five initial design principles: contextualization, collaboration, flexibility, cost-effectiveness, and scalability. The principles are based on a literature review, contextual interviews and observations at a European University. The initial concretization of the principles adopts the pedagogical approach of Personalized System of Instruction (PSI), which is deemed to represent a good fit to the contextual goals for developing on-line security labs in the context of the target university. Further research for actual design of virtual InfoSec labs, adopting the action design-based research tradition to develop learning environments, is needed in order to concretize, to test and to elaborate these design principles.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Gunasekaran, A., Mcneil, R.D., Shaul, D.: E-learning: research and applications. Industrial and Commercial Training 34, 44–53 (2002)
Crawford, E., Hu, Y.: A Multi-User Adaptive Security Application for Educational Hacking. In: Proceedings of the World Congress on Engineering and Computer Science, WCECS 2011, San Francisco, USA, October 19-21, vol. I (2011)
Lahoud, H.A., Tang, X.: Information Security Labs in IDS/IPS for Distance Education. In: SIGITE 2006, Minneapolis, Minnesota, USA, October 19-21, pp. 47–52. ACM (2006)
Dabbagh, N.: Pedagogical models for E-Learning: A theory-based design framework. International Journal of Technology in Teaching and Learning 1, 25–44 (2005)
Bednar, A.K., Cunningham, D., Duffy, T.M., Perry, J.D.: Theory into practice: How do we link. Constructivism and the Technology of Instruction: A Conversation, 17–34 (1992)
Bednar, A.K., Cunningham, D., Duffy, T.M., Perry, J.D.: Theory into practice: How do we link? In: Anglin, G.J. (ed.) Instructional Technology: Past, Present and Future. Libraries Unlimited, Englewood (1991)
Wang, F., Hannafin, M.J.: Design-based research and technology-enhanced learning environments. Educational Technology Research & Development 53(4), 5–23 (2005)
Iqbal, S., Päivärinta, T.: Towards a design theory for educational on-line information security laboratories. In: Popescu, E., Li, Q., Klamma, R., Leung, H., Specht, M. (eds.) ICWL 2012. LNCS, vol. 7558, pp. 295–306. Springer, Heidelberg (2012)
Hilgarth, B.: E-Learning Success in Action! From Case Study Research to the creation of the Cybernetic e-Learning Management Model. IJCISIM Journal 3, 415–426 (2011)
Kröckel, J., Hilgarth, B.: BPM @ KMU – Designing e-Learning for the Introduction of BPM in Small- and Medium –Sized Enterprises. In: Schmidt, W. (ed.) S-BPM ONE 2011. CCIS, vol. 213, pp. 34–47. Springer, Heidelberg (2011)
Thoms, B., Garrett, N., Ryan, T.: Online learning communities in the new “U”. International Journal of Networking and Virtual Organisations 6(5), 499–517 (2009)
Hrastinski, S., Keller, C., Carlsson, S.A.: Design exemplars for synchronous e-learning: A design theory approach. Computers & Education 55, 652–662 (2010)
Kerres, M., De Witt, C.: A Didactical Framework for the Design of Blended Learning Arrangements. Journal of Educational Media 28(2-3), 101–113 (2003)
Amiel, T., Reeves, T.C.: Design-Based Research and Educational Technology: Rethinking Technology and the Research Agenda. Educational Technology & Society 11(4), 29–40 (2008)
Orlikowski, W.J.: Improvising Organizational Transformation Over Time: A Situated Change Perspective. Information Systems Research 7(1), 63–92 (1996)
Harnesk, D., Thapa, D.: A Framework for Classifying Design Research Methods. In: vom Brocke, J., Hekkala, R., Ram, S., Rossi, M. (eds.) DESRIST 2013. LNCS, vol. 7939, pp. 479–485. Springer, Heidelberg (2013)
Sein, M., Henfridsson, O., Purao, S., Rossi, M., Lindgren, R.: Action design research. MIS Quarterly 35(2) (2011)
Gregor, S., Jones, D.: The anatomy of a design theory. Journal of the Association for Information Systems 8, 312–335 (2007)
Hevner, A.R., March, S.T., Park, J., Ram, S.: Design Science In Information Systems Research. MIS Quarterly 28(1), 75–105 (2004)
Pries-Heje, J., Venable, J., Baskerville, R.: Strategies for Design Science Research Evaluation. In: Proceedings of the 16th European Conference on Information Systems Galway, Ireland, June 9-11 (2008)
Venable, J., Pries-Heje, J., Baskerville, R.: A Comprehensive Framework for Evaluation in Design Science Research. In: Peffers, K., Rothenberger, M., Kuechler, B. (eds.) DESRIST 2012. LNCS, vol. 7286, pp. 423–438. Springer, Heidelberg (2012)
Checkland, P., Scholes, J.: Soft Systems Methodology in Practice. J. Wiley, Chichester (1990)
March, S.T., Smith, G.F.: Design and natural science research on information technology. Decision Support Systems 15, 251–266 (1995)
Walls, J.G., Widmeyer, G.R., El Sawy, O.A.: Building an information system design theory for vigilant EIS. Information Systems Research 3, 36–59 (1992)
Chen, F.-G., Chen, R.-M., Chen, J. -S.: A Portable Virtual Laboratory for Information Security Courses. In: Lin, S., Huang, X. (eds.) CSEE 2011, Part V. CCIS, vol. 218, pp. 245–250. Springer, Heidelberg (2011)
Aboutabl, M.S.: The Cyberdefense Laboratory: A Framework for Information Security Education. In: Proceedings of the IEEE Workshop on Information Assurance United States Military Academy, West Point, NY, pp. 55–60 (2006)
Wang, X., Hembroff, G.C., Yedica, R.: Using VMware VCenter Lab Manager in Undergraduate Education for System Administration and Network Security. In: Proceedings of the ACM Conference on Information Technology Education, pp. 43–52 (2010)
Krishna, K., Sun, W., Rana, P., et al.: V-NetLab: A Cost-Effective Platform to Support Course Projects in Computer security. In: Proceedings of the 9th Annual Colloquium for Information Systems Security Education (CISSE 2005), Atlanta, GA, June 6-9 (2005)
Li, C.: Blur the Boundary between the Virtual and the Real. Journal of Computing Sciences in Colleges 24, 39–45 (2009)
Gaspar, A., Langevin, S., Armitage, W., et al.: The Role of Virtualization in Computing Education. In: Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, pp. 131–132. ACM, New York (2008)
Sun, W., Katta, V., Krishna, K., Sekar, R.: V-netlab: an approach for realizing logically isolated networks for security experiments. In: Proceedings of the Conference on Cyber Security Experimentation and Test, Berkeley, CA, USA, pp. 1–6 (2008)
Burd, S.D., Seazzu, A.F., Conway, C., et al.: Virtual Computing Laboratories: A Case Study with Comparisons to Physical Computing Laboratories. Journal of Information Technology Education 8, 24 (2009)
Summers, W.C., Martin, C.: Using a Virtual Lab to Teach an Online Information Assurance Program. In: Proceedings of the 2nd Annual Conference on Information Security Curriculum Development, pp. 84–87. ACM, New York (2005)
Burd, S.D., Gaillard, G., Rooney, E., et al.: Virtual Computing Laboratories using VMware Lab Manager. In: Proceedings of the 44th Hawaii International Conference on System Sciences, pp. 1–9. IEEE (2011)
Choi, Y.B., Lim, S., Oh, T.H.: Feasibility of Virtual Security Laboratory for Three-Tiered Distance Education. In: Proceedings of the ACM Conference on Information Technology Education, pp. 53–58 (2010)
Li, P., Toderick, L.W., Lunsford, P.J.: Experiencing Virtual Computing Lab in Information Technology Education. In: Proceedings of the 10th ACM Conference on SIG-Information Technology Education, SIGITE 2009, Fairfax, Virginia, USA, October 22-24, pp. 55–59. ACM (2009)
Keller, F.S.: Good-bye, teacher. Journal of Applied Behavior Analysis 1(1), 79 (1968)
Collins, A., Joseph, D., Bielaczyc, K.: Design research: Theoretical and methodological issues. Journal of the Learning Sciences 13(1), 15–42 (2004)
Saarinen, L.: Enhancing ICT Supported Distributed Learning through Action Design Research. Doctoral Dissertations, Aalto University, School of Economics (2012)
Iivari, J.: The IS core-VII: Towards information systems as a science of meta-artifacts. Communication of the association for Information Systems 12(1) (2003)
Matti, R., Sandeep, P., Maung, K.S.: Generalizating from design research. In: International Workshop on IT Artefact Design & Workpractice Intervention, Barcelona (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Iqbal, S., Thapa, D. (2013). Initial Design Principles for an Educational, On-line Information Security Laboratory. In: Wang, JF., Lau, R. (eds) Advances in Web-Based Learning – ICWL 2013. ICWL 2013. Lecture Notes in Computer Science, vol 8167. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41175-5_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-41175-5_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41174-8
Online ISBN: 978-3-642-41175-5
eBook Packages: Computer ScienceComputer Science (R0)