Skip to main content

Initial Design Principles for an Educational, On-line Information Security Laboratory

  • Conference paper
Book cover Advances in Web-Based Learning – ICWL 2013 (ICWL 2013)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8167))

Included in the following conference series:

Abstract

E-Learning systems should be based on systematic pedagogical approaches and well-designed procedures and techniques. However, current literature on several areas of technology-enhanced learning environments, such as online information security (InfoSec) laboratories still lack well-specified pedagogical approaches and concrete design principles. In information security education, hands-on lab exercises play a major role in learning. Distance education brings in new challenges as the hands-on exercises require now virtual labs, which need to be accessible anywhere and often also anytime. This creates technological and pedagogical challenges, which are not fully understood in terms of explicit design principles that would enhance implementation and use of on-line educational labs. To contribute to this knowledge gap the paper describes five initial design principles: contextualization, collaboration, flexibility, cost-effectiveness, and scalability. The principles are based on a literature review, contextual interviews and observations at a European University. The initial concretization of the principles adopts the pedagogical approach of Personalized System of Instruction (PSI), which is deemed to represent a good fit to the contextual goals for developing on-line security labs in the context of the target university. Further research for actual design of virtual InfoSec labs, adopting the action design-based research tradition to develop learning environments, is needed in order to concretize, to test and to elaborate these design principles.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gunasekaran, A., Mcneil, R.D., Shaul, D.: E-learning: research and applications. Industrial and Commercial Training 34, 44–53 (2002)

    Article  Google Scholar 

  2. Crawford, E., Hu, Y.: A Multi-User Adaptive Security Application for Educational Hacking. In: Proceedings of the World Congress on Engineering and Computer Science, WCECS 2011, San Francisco, USA, October 19-21, vol. I (2011)

    Google Scholar 

  3. Lahoud, H.A., Tang, X.: Information Security Labs in IDS/IPS for Distance Education. In: SIGITE 2006, Minneapolis, Minnesota, USA, October 19-21, pp. 47–52. ACM (2006)

    Google Scholar 

  4. Dabbagh, N.: Pedagogical models for E-Learning: A theory-based design framework. International Journal of Technology in Teaching and Learning 1, 25–44 (2005)

    Google Scholar 

  5. Bednar, A.K., Cunningham, D., Duffy, T.M., Perry, J.D.: Theory into practice: How do we link. Constructivism and the Technology of Instruction: A Conversation, 17–34 (1992)

    Google Scholar 

  6. Bednar, A.K., Cunningham, D., Duffy, T.M., Perry, J.D.: Theory into practice: How do we link? In: Anglin, G.J. (ed.) Instructional Technology: Past, Present and Future. Libraries Unlimited, Englewood (1991)

    Google Scholar 

  7. Wang, F., Hannafin, M.J.: Design-based research and technology-enhanced learning environments. Educational Technology Research & Development 53(4), 5–23 (2005)

    Article  Google Scholar 

  8. Iqbal, S., Päivärinta, T.: Towards a design theory for educational on-line information security laboratories. In: Popescu, E., Li, Q., Klamma, R., Leung, H., Specht, M. (eds.) ICWL 2012. LNCS, vol. 7558, pp. 295–306. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  9. Hilgarth, B.: E-Learning Success in Action! From Case Study Research to the creation of the Cybernetic e-Learning Management Model. IJCISIM Journal 3, 415–426 (2011)

    Google Scholar 

  10. Kröckel, J., Hilgarth, B.: BPM @ KMU – Designing e-Learning for the Introduction of BPM in Small- and Medium –Sized Enterprises. In: Schmidt, W. (ed.) S-BPM ONE 2011. CCIS, vol. 213, pp. 34–47. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  11. Thoms, B., Garrett, N., Ryan, T.: Online learning communities in the new “U”. International Journal of Networking and Virtual Organisations 6(5), 499–517 (2009)

    Article  Google Scholar 

  12. Hrastinski, S., Keller, C., Carlsson, S.A.: Design exemplars for synchronous e-learning: A design theory approach. Computers & Education 55, 652–662 (2010)

    Article  Google Scholar 

  13. Kerres, M., De Witt, C.: A Didactical Framework for the Design of Blended Learning Arrangements. Journal of Educational Media 28(2-3), 101–113 (2003)

    Article  Google Scholar 

  14. Amiel, T., Reeves, T.C.: Design-Based Research and Educational Technology: Rethinking Technology and the Research Agenda. Educational Technology & Society 11(4), 29–40 (2008)

    Google Scholar 

  15. Orlikowski, W.J.: Improvising Organizational Transformation Over Time: A Situated Change Perspective. Information Systems Research 7(1), 63–92 (1996)

    Article  Google Scholar 

  16. Harnesk, D., Thapa, D.: A Framework for Classifying Design Research Methods. In: vom Brocke, J., Hekkala, R., Ram, S., Rossi, M. (eds.) DESRIST 2013. LNCS, vol. 7939, pp. 479–485. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  17. Sein, M., Henfridsson, O., Purao, S., Rossi, M., Lindgren, R.: Action design research. MIS Quarterly 35(2) (2011)

    Google Scholar 

  18. Gregor, S., Jones, D.: The anatomy of a design theory. Journal of the Association for Information Systems 8, 312–335 (2007)

    Google Scholar 

  19. Hevner, A.R., March, S.T., Park, J., Ram, S.: Design Science In Information Systems Research. MIS Quarterly 28(1), 75–105 (2004)

    Google Scholar 

  20. Pries-Heje, J., Venable, J., Baskerville, R.: Strategies for Design Science Research Evaluation. In: Proceedings of the 16th European Conference on Information Systems Galway, Ireland, June 9-11 (2008)

    Google Scholar 

  21. Venable, J., Pries-Heje, J., Baskerville, R.: A Comprehensive Framework for Evaluation in Design Science Research. In: Peffers, K., Rothenberger, M., Kuechler, B. (eds.) DESRIST 2012. LNCS, vol. 7286, pp. 423–438. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  22. Checkland, P., Scholes, J.: Soft Systems Methodology in Practice. J. Wiley, Chichester (1990)

    Google Scholar 

  23. March, S.T., Smith, G.F.: Design and natural science research on information technology. Decision Support Systems 15, 251–266 (1995)

    Article  Google Scholar 

  24. Walls, J.G., Widmeyer, G.R., El Sawy, O.A.: Building an information system design theory for vigilant EIS. Information Systems Research 3, 36–59 (1992)

    Article  Google Scholar 

  25. Chen, F.-G., Chen, R.-M., Chen, J. -S.: A Portable Virtual Laboratory for Information Security Courses. In: Lin, S., Huang, X. (eds.) CSEE 2011, Part V. CCIS, vol. 218, pp. 245–250. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  26. Aboutabl, M.S.: The Cyberdefense Laboratory: A Framework for Information Security Education. In: Proceedings of the IEEE Workshop on Information Assurance United States Military Academy, West Point, NY, pp. 55–60 (2006)

    Google Scholar 

  27. Wang, X., Hembroff, G.C., Yedica, R.: Using VMware VCenter Lab Manager in Undergraduate Education for System Administration and Network Security. In: Proceedings of the ACM Conference on Information Technology Education, pp. 43–52 (2010)

    Google Scholar 

  28. Krishna, K., Sun, W., Rana, P., et al.: V-NetLab: A Cost-Effective Platform to Support Course Projects in Computer security. In: Proceedings of the 9th Annual Colloquium for Information Systems Security Education (CISSE 2005), Atlanta, GA, June 6-9 (2005)

    Google Scholar 

  29. Li, C.: Blur the Boundary between the Virtual and the Real. Journal of Computing Sciences in Colleges 24, 39–45 (2009)

    MATH  Google Scholar 

  30. Gaspar, A., Langevin, S., Armitage, W., et al.: The Role of Virtualization in Computing Education. In: Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, pp. 131–132. ACM, New York (2008)

    Chapter  Google Scholar 

  31. Sun, W., Katta, V., Krishna, K., Sekar, R.: V-netlab: an approach for realizing logically isolated networks for security experiments. In: Proceedings of the Conference on Cyber Security Experimentation and Test, Berkeley, CA, USA, pp. 1–6 (2008)

    Google Scholar 

  32. Burd, S.D., Seazzu, A.F., Conway, C., et al.: Virtual Computing Laboratories: A Case Study with Comparisons to Physical Computing Laboratories. Journal of Information Technology Education 8, 24 (2009)

    Google Scholar 

  33. Summers, W.C., Martin, C.: Using a Virtual Lab to Teach an Online Information Assurance Program. In: Proceedings of the 2nd Annual Conference on Information Security Curriculum Development, pp. 84–87. ACM, New York (2005)

    Chapter  Google Scholar 

  34. Burd, S.D., Gaillard, G., Rooney, E., et al.: Virtual Computing Laboratories using VMware Lab Manager. In: Proceedings of the 44th Hawaii International Conference on System Sciences, pp. 1–9. IEEE (2011)

    Google Scholar 

  35. Choi, Y.B., Lim, S., Oh, T.H.: Feasibility of Virtual Security Laboratory for Three-Tiered Distance Education. In: Proceedings of the ACM Conference on Information Technology Education, pp. 53–58 (2010)

    Google Scholar 

  36. Li, P., Toderick, L.W., Lunsford, P.J.: Experiencing Virtual Computing Lab in Information Technology Education. In: Proceedings of the 10th ACM Conference on SIG-Information Technology Education, SIGITE 2009, Fairfax, Virginia, USA, October 22-24, pp. 55–59. ACM (2009)

    Google Scholar 

  37. Keller, F.S.: Good-bye, teacher. Journal of Applied Behavior Analysis 1(1), 79 (1968)

    Article  Google Scholar 

  38. Collins, A., Joseph, D., Bielaczyc, K.: Design research: Theoretical and methodological issues. Journal of the Learning Sciences 13(1), 15–42 (2004)

    Article  Google Scholar 

  39. Saarinen, L.: Enhancing ICT Supported Distributed Learning through Action Design Research. Doctoral Dissertations, Aalto University, School of Economics (2012)

    Google Scholar 

  40. Iivari, J.: The IS core-VII: Towards information systems as a science of meta-artifacts. Communication of the association for Information Systems 12(1) (2003)

    Google Scholar 

  41. Matti, R., Sandeep, P., Maung, K.S.: Generalizating from design research. In: International Workshop on IT Artefact Design & Workpractice Intervention, Barcelona (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Iqbal, S., Thapa, D. (2013). Initial Design Principles for an Educational, On-line Information Security Laboratory. In: Wang, JF., Lau, R. (eds) Advances in Web-Based Learning – ICWL 2013. ICWL 2013. Lecture Notes in Computer Science, vol 8167. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41175-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41175-5_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41174-8

  • Online ISBN: 978-3-642-41175-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics