An Educators Perspective of Integrating Information Security into Undergraduate Computing Curricula

نویسندگان

  • Lindokuhle Gcina Gomana
  • Lynn Ann Futcher
  • Kerry-Lynn Thomson
چکیده

Information is an integral part of our everyday lives and organisations need to have their information and related systems protected from various threats that exist. Therefore, information security education is of vital importance to all computing learners. It is the duty of higher education institutions to ensure that information security is pervasively integrated into the undergraduate computing curriculum. This will ensure that security is addressed multiple times, in multiple classes. Furthermore, this could ensure that higher education institutions produce computing graduates that possess fundamental information security knowledge, skills and understanding. This, in turn, will provide computing graduates with the ability to combat information security related threats. This paper briefly reviews existing literature relating to information security in higher education. Furthermore, it explores various South African educators’ perspectives on the pervasive integration of information security into undergraduate computing curricula. This was determined through a semi-structured interview supported by a questionnaire. Furthermore, the participants of this research study were educators in the Computer Science, Information Systems, and Information Technology fields. The results indicate that there are various challenges in South Africa regarding the pervasive integration of information security into undergraduate computing curricula.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula

Information Technology (IT) encompasses all aspects of computing technology. The pervasiveness of IT over the past decade means that information assurance and security (IAS) know-how has become increasingly important for IT professionals worldwide. However, South African universities do not get specific curriculum guidelines to ensure that all essential securityrelated aspects are included in t...

متن کامل

Integrating Information Security with Information System Architecture and Administration Curricula

While the cost and flexibility benefits resulting from distributed and cloud computing environments are clearly evident, this approach also has farreaching implications for the threat surface presented as well as general information security risks, particularly to availability. The design of cloud-based storage services also implies that data once stored with such services may very hard to reca...

متن کامل

Hands-On Approach to Teach Security Courses at undergraduate Level Lessons Learnt

It has become imperative for companies, governments, and organizations to understand how to guard against hackers, outsiders, and even disgruntled employees who threaten their information security, integrity and daily business operations. To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and grad...

متن کامل

IT-Enhanced Laboratory Experience within a Modern Undergraduate Engineering Curriculum

The emergence of Information Technology (IT) is enabling engineering educators to constantly reconsider both the content and means of delivery of modern undergraduate curricula. Online learning environments are rapidly becoming viable options for providing students with a bridge from theoretical concepts to practical engineering applications. They can be made to represent repositories of integr...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016