Gamification to Support Cyber Security Community Education in Lebanon
|
|
|
- Mildred York
- 10 years ago
- Views:
Transcription
1 Gamification to Support Cyber Security Community Education in Lebanon Antoine M. Melki 1, Moussa G. Chatrieh 2 1 Instructional Technology Unit, University of Balamand, Balamand, Koura, Amioun 33, Lebanon {[email protected]} 2 Ecole Doctorale des Lettres et des Sciences, Université Libaniase, Sin El Fil, Beirut, Lebanon {[email protected]} Abstract: The research presented is a part of a larger project going in Lebanon. The aim of this paper is to describe the experience of the University of Balamand in adopting gamification as a means to provide community education in the field of cyber security. The volume of literature in cyber security field is increasing. One of the major highlighted issues is the place of humans in the security processes. On the other hand, digital citizenship and digital lifestyles are posing a number of challenges that are supposed to be met by education, since humans are involved. Meanwhile, the concepts of learning and teaching have changed drastically with the advances in web technologies and telecommunications. The main challenge lies in assuring cyber security, especially for those outside the regular educational setting. In the case of Lebanon, the majority of internet users are outside the regular outreach of any training or awareness program. This fact is a challenge for cybersecurity education in Lebanon. Accordingly, literature review shows that community learning comes as an appropriate solution, where universities have a major role to play. In addition, to avoid the problems underlying community education, like outreach, teaching difficulties, and financing, it is proposed to use gamification. This philosophy is adopted by the University of Balamand, whose experience is exposed in this research. Keywords: cybersecurity education, gamification, community learning 1. INTRODUCTION The cybersecurity studies are interdisciplinary by nature as they involve the study of several different fields: telecommunications, law, management, psychology, and others. With the advance in research in the field, focus is shifting from technology to humans, and the field is getting more involvement of experts from different backgrounds. In this paper, the human factor in cybersecurity is the main issue. The questions raised are primarily addressing the mass of online users, how to reach to them, and how improve their security in the cyber space. The Lebanese case is taken in specific, and gamification is highlighted as a potential solution of the outreach problem in community education which is proven to be the form that can contribute to the improving the cybersecurity of the large number of users who are outside the regular educational settings. In addition, the role of academia in this process and what it can offer to the community is emphasized. 172
2 2. THE HUMAN FACTOR IN CYBERSECURITY AND THE DIGITAL CITIZENSHIP The increasing number and sophistication of cyber threats is accompanied by concerns over the role of humans in cybersecurity. A large literature exist describing research on people in work settings, with emphasis on their contribution in cybersecurity. Reports cite numbers on the different threats in relation to humans. Threats related to humans include: 75% of people use the same password for multiple accounts, both at work and home, 7% of people use a password, which makes the threat among the top 100 most common problems, 91% of people use a password from the top 1000 most common, and 99.8% of people use a password from the top 10,000 most common FROM SECURITY TO LIFESTYLE On the other hand, attention is not anymore focused on security as a technical issue, as people are getting more immersed in technology and telecommunications. This immersion is tinting the lifestyle of humans as they become more and more dependent on ICT. In this endeavor, humans become the weakest link in cyber security, as they prefer to minimize their own inconvenience, as they reveal their predictability, apathy and general naivety about the potential impacts of their actions [1]. This digital lifestyle places the twenty first century people in the digital citizenship field. As expressed by Jason Ohler: The digital age beckons us to usher in a new era of character education, aimed directly at addressing the opportunities and challenges of living a digital lifestyle [2]. Meanwhile, digital citizenship is interpreted as being character education for the digital age [3] DIGITAL CITIZENSHIP Digital citizenship challenges the different components of societies by being expressed as nine elements as follows: a. Digital Access: full electronic participation in society. b. Digital Commerce: electronic buying and selling of goods. c. Digital Communication: electronic exchange of information. d. Digital Literacy: process of teaching and learning about technology and the use of technology. e. Digital Etiquette: electronic standards of conduct or procedure. f. Digital Law: electronic responsibility for actions and deeds g. Digital Rights and Responsibilities: those freedoms extended to everyone in a digital world. h. Digital Health and Wellness: physical and psychological well-being in a digital technology world. i. Digital Security (self-protection): electronic precautions to guarantee safety [4]. The sequence of citing the themes might not reflect their importance or chronology. If we try to list them by their significance in the cybersecurity context, digital literacy, etiquette, rights and responsibilities, should show before access and commerce. This rearrangement of the sequence highlights the central role of education in forming digital citizens. Shedding the light of this role on the cybersecurity field, education becomes a major challenge. 3. GAMIFICATION IN THE CYBERSECURITY ARENA Gamification is the process of enhancing a specific service by implementing game design elements in a non-game context to enhance the user s overall value creation and experience [5]. In addition, when designed and applied in an appropriate manner and setting, 173
3 gamification provides an alignment between motivation and desire that leads to the anticipated purpose of its use [6]. Gamification is used for educational purposes, not only entertainment. There exist games for science [7](Rouse, 2013), maths [8] (Goehle, 2013), foreign languages [9] (Danowska Florczyk & Mostowski, 2012), cultural heritage [10] (Gordillo, Gallego, Barra, & Quemada, 2013), health [11] (Gabarron, Schopf, Serrano, Fernandez Luque, & Dorronzoro, 2012), computer science [12] (Li, Dong, Untch, & Chasteen, 2013), software engineering [13] (Sheth, Bell, & Kaiser, 2012), business and logistics [14] (Reiners, et al., 2012), and lately for cybersecurity awareness training [15] (Adams and Makramalla) GAMIFICATION OF CYBERSECURITY EDUCATION An important principle of game design is the meaningfulness of the content to the players. Literature review shows that for a learning environment to be engaging, its context has to connect to the everyday lives of the learners. In the case of cybersecurity, the context is not a fictional world but a real one. The pervasiveness of cybersecurity affects the everyday lives of the users and their communities, so they are expected to meaningfully engage in the different tasks and activities created around this context, and presented as games. To conclude this section, this paper is advising the use of educational games as a means for community education to address the human weakness in cybersecurity, raise awareness of it, and assist abandoned users in getting protected. But the issue of cost and financial support remains unsolved. It is proposed to involve higher education institutions. 4. COMMUNITY EDUCATION Since issues of infrastructure are outside the interest of this research, and since this research is dedicated more to handle the matters of human weakness in cyberspace than infrastructure concerns, the problem of lack of awareness is the subject of emphasis. Under these circumstances, community education can be proposed as a solution. Community Education is a process whereby learning is used for both individual and community betterment. It is characterized by: 1) involvement of people of all ages, 2) the use of community learning, resources and research to bring about community change, and 3) the recognition that people can learn through, with and for each other to create a better world (Mezirow & Taylor, 2011). The problems facing community education can be summarized in the following: 1) it relies on non-traditional teaching, 2) its structure is so different from the school structure, 3) relationships between students and instructors, students among themselves, students and administration and instructors and administration are harder to manage and more sophisticated, 4) reaching out to students is more difficult than in school setting, and 5) the cost and financial support is usually the responsibility of the government or local authorities CYBERSECURITY COMMUNITY EDUCATION In the case of teaching about cybersecurity following community education principles, some of the factors dissolve. The issue of reaching out to students is not a problem as the environment is the online itself. In the same course, issues of relationships and administration get different orientation, since the instructor can become confined with the computer or smartphone. The age issue can be linked to learning which involves a process and content with corresponding characteristics. At this stage, gamification is proposed as a solution THE ROLES OF UNIVERSITIES IN COMMUNITY EDUCATION In principle, universities play a number of roles in their communities. They 1) assure continuity of basic education, 2) generate knowledge to drive and transform the community, 174
4 3) improve lives, raise wages and productivity, cultural and political benefits, etc. 4) answer to both governments and communities, 5) widen access and create equity in higher education, 6) work with communities on creating, mobilizing and applying knowledge, 7) and lastly, managing and creating sustainable community initiatives (Ali, 2010). So, the commitment of universities to their communities is obvious. Raising awareness, developing awareness and training programs and running them, doing research, developing software including educational games, can be some of the activities that universities can do as a contribution to nurture cybersecurity. So, since there is a need to raise awareness, develop the Internet ecosystem, and since community education contributes to the solution, universities shall contribute in cybersecurity education through providing community learning. 5. THE LEBANESE CASE A study made by We Are Social titled Digital Landscape: Middle East, North Africa & Turkey in July 2014 stated that in Lebanon whose population is 4,137,000 persons, the internet penetration amounts to 81% represented by 3,337,000 internet users, 94% of mobile subscription penetration represented by 3,900,000 users (We are social). Based on the numbers provided by the Bureau of Statistics in Lebanon, the total number of schools and universities students and the information users amount to 1,302,283. By taking a very optimistic stance in dealing with numbers, and assuming that all those in schools and information organization are reachable for raising awareness on cybersecurity, those who are left with no assistance is 2,034,717. Figure 1: Lebanon Overview Figure 2: Internet users in Lebanon Studies show that more than 50% of the users are not secure in the cyberspace due to 2 main factors: 1) issues related to infrastructure, and 2) lack of awareness. It can be easily concluded that in Lebanon two thirds of the users need assistance for both reasons mentioned above. 6. A PROPOSED PLAN FOR LEBANON Due to the large number of users in need to be reached in Lebanon under any awareness campaign or procedure, community education is needed. Accordingly, the more involved components of the society, the better the results can be. In the case of our study, universities have to play a major role. The case of the University of Balamand (UOB) can be cited as an example to show commitment and show how gamification can be a tool to support community education. 175
5 6.1. UOB S EXPERIENCE Since 2009, UOB had committed its self to raise awareness on cybersecurity. A cybersecurity awareness component was added in a number of courses across all the curricula at the university. A specialized graduate program is under study. A number of projects in the community were completed to raise awareness, like community campaigns at schools, NGOs, youth groups and others, training people on how to deal with cyber risks, development of training material, development of software, delivering training, in addition to creating some partnerships which are project based. Some memoranda of understanding were signed with specialized institutions GAMIFICATION AS A TOOL FOR COMMUNITY EDUCATION As the process dealt with in this paper is online and the players are online users, and based on the facts stated above on the validity of educational games to raise awareness on cybersecurity, UOB started a project named Asfalia in Asfalia is a cybersecurity gamification lab, aiming at: 1): the arabization of open source cyber security games to reach the masses, 2) organizing a summer camp to materialize the community partnership, and 3) games development. 7. CONCLUSION Cybersecurity is not anymore a purely academic issue, but a national concern with multinational dimensions. The diversity of users and their backgrounds requires innovative solutions. Universities, as a workroom of innovation, are expected to offer contributions that go beyond simple teaching of courses. A commitment to innovate solutions that nurture awareness, and encourage the development of a secure cyber ecosystem is required. UOB, as a leading university in Lebanon, is exploiting gamification to increase the outreach of cybersecurity awareness outreach as a means of community education. 8. REFERENCES [1]. Thales (2013). The Human Component of Cyber Security. November Retrieved from on 1/6/2015. [2]. Ohler, J. (2011). Digital Citizenship Means Character Education for the Digital Age, Kappa Delta Pi Record, 47:sup1, 25-27, DOI: / [3]. Ribble, M. (2012). Digital Citizenship for Educational Change. Kappa Delta Pi Record, 48:4, , DOI: / [4]. Brownell, L. (2013). Nine Elements of Digital Citizenship. tutorials/nine-elements-of-digital-citizenship. Retrieved on 1/6/2015. [5]. Huotari, K., & Hamari, J. (2012). Defining Gamification - A Service Marketing Perspective. In Proceedings of The 16th International Academic Mindtrek Conference, Tampere, Finland, October 3-5, [6]. Korolov, M. (2012) Gamification on the Enterprise. Networkworld.com, 10 September 2012, pp [7]. Rouse, K. (2013). Gamification in science education: The relationship of educational games to motivation and achievement. The University Of Southern Mississippi. Publication number: [8]. Goehle, G. (2013). Gamification and Web based Homework. PRIMUS, 23(3), [9]. Danowska-Florczyk, E. & Mostowski, P. (2012). Gamification as a new direction in teaching Polish as a foreign language. Proceedings of the international conference ICT for Language Learning, 5 th edition, Florence, Italy, November [10]. Gordillo, A., Gallego, D., Barra, E., & Quemada, J. (2013). The city as a learning 176
6 gamified platform. Frontiers in Education Conference (pp ). [12]. Gabarron, E., Schopf, T., Serrano, J. A., Fernandez Luque, L., & Dorronzoro, E. (2012). Gamification Strategy on Prevention of STDs for Youth. Studies in health technology and informatics, 192, [12]. Li, C., Dong, Z., Untch, R. H., & Chasteen, M. (2013). Engaging Computer Science Collaborative Learning Environment. International Journal of Information and Educational Technology, 3(1), [13]. Sheth, S. K., Bell, J. S., & Kaiser, G. E. (2012). Increasing Student Engagement in Software Engineering with Gamification. Retrieved from [14]. Reiners, T., Wood, L. C., Chang, V., Gütl, C. H., Teräs, H., & Gregory, S. (2012). Operationalising gamification in an educational authentic environment. IADIS Internet Technologies and Society, (pp ). Perth, Australia. [15]. Adams, M. and Makramalla, M. (2015) Cybersecurity Skills Training: An Attacker- Centric Gamified Approach. Technology Innovation Management Review. January P [16]. Mezirow, J. & Taylor, E. W. (2011). Transformative Learning in Practice: Insights from Community, Workplace, and Higher Education. John Wiley & Sons. pp [17]. Ali, A. (2010). Developing the Community: The Role of Universities and Open and Distance Learning. The 6 th Pan-Commonwealth Forum on Open Learning November Kochi, India. Retrieved on 24/4/2015 from /2010presentation/Pages/ aspx. [18]. We Are Social (2014). Digital Landscape: Middle East, North Africa & Turkey. Retrieved from on 1/6/
THE HUMAN COMPONENT OF CYBER SECURITY
cybersecurity.thalesgroup.com.au People, with their preference to minimise their own inconvenience, their predictability, apathy and general naivety about the potential impacts of their actions, are the
Teaching Digital Citizenship
32 Government of Newfoundland and Labrador - Education I A School-Wide Approach - Positive Behaviour Supports 2013 Education Teaching Digital Citizenship Digital citizenship can be defined as the norms
DIGITAL CITIZENSHIP. TOJET: The Turkish Online Journal of Educational Technology January 2014, volume 13 issue 1
DIGITAL CITIZENSHIP Aytekin ISMAN a *, Ozlem CANAN GUNGOREN b a Sakarya University, Faculty of Education 54300, Sakarya, Turkey b Sakarya University, Faculty of Education 54300, Sakarya, Turkey ABSTRACT
The Challenges of the Software Industry. WIPO - MOET - ALSI Seminar 21-22 February 2011 Beirut - Lebanon
The Challenges of the Software Industry WIPO - MOET - ALSI Seminar 21-22 February 2011 Beirut - Lebanon Aly Harakeh [email protected] Marketing Manager Microsoft Lebanon and NIM Overview The high-tech
The Arab World Online 2014: Trends in Internet and Mobile Usage in the Arab Region
The Arab World Online 2014: Trends in Internet and Mobile Usage in the Arab Region Navigating through mounting developmental challenges, the Arab region continues to go through technology-enabled transformations,
Cyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
Gamification in education: How gamification can encourage learning. Ryan Montville. The Ohio state University
Running head: GAMIFICATION IN EDUCATION 1 Gamification in education: How gamification can encourage learning Ryan Montville The Ohio state University Running head: GAMIFICATION IN EDUCATION 2 Gamification
Bachelor of Information Technology
Bachelor of Information Technology Detailed Course Requirements The 2016 Monash University Handbook will be available from October 2015. This document contains interim 2016 course requirements information.
Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape
White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions
Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
THE CULTURE OF INNOVATION AND THE BUILDING OF KNOWLEDGE SOCIETIES. - Issue Paper -
THE CULTURE OF INNOVATION AND THE BUILDING OF KNOWLEDGE SOCIETIES - Issue Paper - UNESCO, Bureau of Strategic Planning September 2003 1 I. The past and present scope of innovation During the last two decades,
CREATING A SENSE OF PRESENCE IN ONLINE TEACHING: How to Be There for Distance Learners
GLOKALde July 2014, ISSN 2148-7278, Volume: 1 Number: 1 Book Review 2 GLOKALde is official e-journal of UDEEEWANA CREATING A SENSE OF PRESENCE IN ONLINE TEACHING: How to Be There for Distance Learners
Jyväskylä Cyber Security Ecosystem
Jyväskylä Cyber Security Ecosystem Adjunct Professor, Dr. (Military Sciences), Col (ret.) Martti Lehto 30.9.2015 High Level Cyber Security Comment 4.2.2014 President Sauli Niinistö highlighted cyber security.
Program Planning Guide Business Administration, Associate in Applied Science General Business Administration Track (A25120)
Program Planning Guide Business Administration, Associate in Applied Science General Business Administration Track (A25120) Program Length: 5 semesters Career Pathway Options: Associate in Applied Science
E-Learning at school level: Challenges and Benefits
E-Learning at school level: Challenges and Benefits Joumana Dargham 1, Dana Saeed 1, and Hamid Mcheik 2 1. University of Balamand, Computer science department [email protected], [email protected]
Computer and Network Security in Higher Education
Mark Luker and Rodney Petersen Computer and Network Security in Higher Education Mark Luker and Rodney Petersen, Editors A Publication of EDUCAUSE Copyright 2003 Jossey-Bass Inc. Published by Jossey-Bass,
PROFESSIONAL DEVELOPMENT: A VISION FOR SAUDI SCIENCE TEACHERS
PROFESSIONAL DEVELOPMENT: A VISION FOR SAUDI SCIENCE TEACHERS Hiya Almazroa Pringcess Noura Bint Abdulrahman University, Saudi Arabia Abstract: Professional development is a significant mechanism for maintaining
Gamification from the perspective of service marketing
Gamification from the perspective of service marketing Kai Huotari School of Information, UC Berkeley. California, USA Hanken School of Economics, Helsinki, Finland Helsinki Institute for Information Technology
D R A F T. Faculty Senate Ad Hoc Committee on Quality in Online Learning.
Faculty Senate Ad Hoc Committee on Quality in Online Learning. The Faculty Senate Ad Hoc Committee on the Future Direction of Quality Education is charged with: Defining quality in online/distance education
SOCIAL MEDIA MARKETING TRENDS IN TURKEY
SOCIAL MEDIA MARKETING TRENDS IN TURKEY June 2012 About the Authors AYŞEGÜL TOKER is a professor of Information Systems at the Department of Management, and the Dean of the Faculty of Economics and Administrative
BUSINESS PROCESS OUTSOURCING INDUSTRY IN LEBANON
BUSINESS PROCESS OUTSOURCING INDUSTRY IN LEBANON Content SECTOR OVERVIEW p 3 INTERNATIONALLY RENOWNED EDUCATIONAL SYSTEM p 4 COST-COMPETITIVE & HIGHLY SKILLED WORKFORCE ESTABLISHED TRACK RECORD ENABLING
A Detailed Strategy for Managing Corporation Cyber War Security
A Detailed Strategy for Managing Corporation Cyber War Security Walid Al-Ahmad Department of Computer Science, Gulf University for Science & Technology Kuwait [email protected] ABSTRACT Modern corporations
Cyberspace Situational Awarness in National Security System
Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, [email protected], [email protected]
A Common North Star: College Summit and the Common Core State Standards
A Common North Star: College Summit and the Common Core State Standards Overview The broad based adoption of the Common Core State Standards (Common Core) presents a challenge to any organization serving
Gamifying Software Development Environments Using Cognitive Principles
Gamifying Software Development Environments Using Cognitive Principles Position Paper Naomi Unkelos-Shpigel, Irit Hadar Information Systems Department, University of Haifa Carmel Mountain 31905, Haifa,
C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
An Innovative Two Factor Authentication Method: The QRLogin System
An Innovative Two Factor Authentication Method: The QRLogin System Soonduck Yoo*, Seung-jung Shin and Dae-hyun Ryu Dept. of IT, University of Hansei, 604-5 Dangjung-dong Gunpo city, Gyeonggi do, Korea,
i-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5
i-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5 Scope of curriculum i-safe materials are available in topic modules to provide the teacher with flexibility in creating a program of instruction
Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability
Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability The i-safe comprehensive curriculum provides a unique approach to Internet safety education, by meaningfully integrating
National Cyber Security Strategy 2015-2017
National Cyber Security Strategy 2015-2017 Table of Contents Table of Contents...i Executive Summary... 1 1. Introduction... 2 2. Context - People, Economy, and State... 4 3. Guiding Principles... 10 4.
IMPLEMENTING GAME ELEMENTS INTO DIDACTIC PROCESS: A CASE STUDY
IMPLEMENTING GAME ELEMENTS INTO DIDACTIC PROCESS: A CASE STUDY Magdalena Borys Lublin University of Technology, Poland [email protected] Maciej Laskowski Lublin University of Technology, Poland [email protected]
The Zendesk Benchmark Q2 2013
The Zendesk Benchmark Q IN FOCUS: CUSTOMER SELF-SERVICE zendesk.com The Zendesk Benchmark Q/ Table of Contents Global Customer Satisfaction Summary Page Background on Zendesk Benckmark Customer Satisfaction
Course Description \ Bachelor of Primary Education Education Core
Course Description \ Bachelor of Primary Education Education Core EDUC 310 :Foundations of Education in Qatar and School Reform : This course has been designed to acquaint the learners with the progress
Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program
Mobile Application Security Helping Organizations Develop a Secure and Effective Mobile Application Security Program by James Fox [email protected] Shahzad Zafar [email protected] Mobile applications
Securing the Nation: Creating cyber security, resilience and readiness
NZTech Developing a National Technology Strategy NZTech Developing a National Technology Strategy A Cyber-Secure New Zealand The Role of Government Procurement B R I E F I N G P A P E R Securing the Nation:
National Cyber Security Strategies
May 2012 National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is
Executive Leadership MBA Course Descriptions
Executive Leadership MBA Course Descriptions MBA 608: Interpersonal Leadership and Managing Organizational Behavior (3 credits) This course provides rising stars learning opportunities to take the next
First World Summit Award Mobile Content
UNITED NATIONS EDUCATIONAL, SCIENTIFIC AND CULTURAL ORGANIZATION First World Summit Award Mobile Content Releasing mobile potential for development Keynote Address by Mr. Jānis Kārkliņš Assistant Director
C E. 21 st Century Model High Schools That Work. An Enhanced HSTW Design for Implementing the West Virginia Framework for High Performing High Schools
21 st Century Model High Schools That Work An Enhanced HSTW Design for Implementing the West Virginia Framework for High Performing High Schools C E 21 st Century High Schools That Work (HSTW)is an effort-based
Chariho Regional School District. Technology Education Curriculum. Grades K-8
Chariho Regional School District Technology Education Curriculum Grades K-8 March 13, 2012 Chariho Regional School District Technology Education Curriculum Grades K - 8 Table of Contents Page Section One
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
NEW COMPETENCE OF BIOLOGY TEACHER IN THE FACE OF SOCIAL AND CULTURAL CHANGES
ISSN 1308 8971 Special Issue: Selected papers presented at WCNTSE NEW COMPETENCE OF BIOLOGY TEACHER IN THE FACE OF SOCIAL AND CULTURAL CHANGES Katarzyna POTYRALA, Alicja WALOSIK & Andrzej RZEPKA Institute
Cyber Security Strategy(Information Security Policy Council, June 10, 2013)
Environmental Change Vision to aim as a Goal Basic Principles Cyber Security Strategy(Information Security Policy Council, June 10, 2013) Areas of Efforts Increasing severity of the risk surrounding cyberspace
Engaging Computer Science Students through Gamification in an Online Social Network Based Collaborative Learning Environment
Engaging Computer Science Students through Gamification in an Online Social Network Based Collaborative Learning Environment Cen Li, Zhijiang Dong, Roland H. Untch, and Michael Chasteen Abstract Gamification
i-safe K 12 CURRICULUM SCOPE 06-07
i-safe K 12 CURRICULUM SCOPE 06-07 GRADES K 4 Scope and sequence i-safe materials are available in topic modules to provide the teacher with flexibility in creating a program of instruction that best suits
This is an example of a response to UNC Tomorrow.ECU Tomorrow And the Implications for Academic Degree Program Planning.
This is an example of a response to UNC Tomorrow.ECU Tomorrow And the Implications for Academic Degree Program Planning. Program planners should review UNC Tomorrow Commission Final Report (December 2007)
S. ll IN THE SENATE OF THE UNITED STATES
OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American
DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT
DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT Security education is critical in today s cyber threat environment. Many schools have investigated different approaches to teaching fundamental
Government of Kenya Ministry of Information Communications and Technology Telposta Towers, 10th Floor, Kenyatta Ave Nairobi, Kenya
i Government of Kenya Ministry of Information Communications and Technology Telposta Towers, 10th Floor, Kenyatta Ave Nairobi, Kenya ii Executive Summary Global information and communication technology
ITU National Cybersecurity/CIIP Self-Assessment Tool
ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For
Where Is Interactive Marketing Heading?
Trend Report Changhee Han _ [email protected] Chakyung Bae _ [email protected] 2013 ad:tech London Where Is Interactive Marketing Heading? ad:tech is an international seminar on interactive marketing
Surviving the Era of Hack Attacks Cyber Security on a Global Scale
Surviving the Era of Hack Attacks Cyber Security on a Global Scale Dr. Adriana Sanford ASU Lincoln Professor of Global Corporate Compliance and Ethics Clinical Associate Professor of Law and Ethics This
Richard Kerby Senior Inter-Regional Adviser E-Government and Knowledge Management
2014 UN e-government Survey Richard Kerby Senior Inter-Regional Adviser E-Government and Knowledge Management Outline Development Efforts and Public Administration at the UN UN E-Government Survey Advocacy,
LEARNING AND COMPETENCE 2020. Strategy of the Finnish National Board of Education (FNBE)
LEARNING AND COMPETENCE 2020 Strategy of the Finnish National Board of Education (FNBE) Enhancing studies and provision of education and training Strengthening teaching personnel s competence Leading and
P21 Framework Definitions
P21 Framework Definitions To help practitioners integrate skills into the teaching of core academic subjects, the Partnership has developed a unified, collective vision for learning known as the Framework
CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE.
CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE. CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE The early 21st century has been defined by the Internet,
How To Develop A Cyber Security Society
CYBER SECURITY EDUCATION IN MONTENEGRO: CURRENT TRENDS, CHALLENGES AND OPEN PERSPECTIVES Ramo Šendelj, Ivana Ognjanović University of Donja Gorica, Montenegro Abstract Cyber-security threats evolve as
Honourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
A SURVEY ON ACCEPTABILITY OF E-LEARNING MBA OFFERED BY THE PRIVATE UNIVERSITIES IN BANGLADESH
A SURVEY ON ACCEPTABILITY OF E-LEARNING MBA OFFERED BY THE PRIVATE UNIVERSITIES IN BANGLADESH Touhid Bhuiyan Faculty of Science and Technology, Queensland University of Technology (AUSTRALIA) [email protected]
Brochure More information from http://www.researchandmarkets.com/reports/3611542/
Brochure More information from http://www.researchandmarkets.com/reports/3611542/ A2P SMS Market, Services (Transactional [CRM, Interactive], Promotional [Marketing, Inquiry, Pushed content]), Verticals,
Coggin College of Business Marketing & Logistics Course Descriptions
CATALOG 2010-2011 Undergraduate Information Coggin College of Business Marketing & Logistics Course Descriptions MAR2905: Special Topics in Marketing v. 1-3 Prerequisite: Permission of instructor. Special
such as loneliness and computer/ict illiteracy. (see also the staff working paper Ageing well in the information Society )
Contribution of the European Network of Occupational Therapy in Higher Education to the Debate around the Consultation Paper Europe s Social Reality by Roger Liddle and Fréderic Lerais ENOTHE The European
How To Get A Business Degree
SAMPLE OR SUGGESTED CURRICULUM ALIGNED TO OUTCOMES-BASED EDUCATION (OBE) FOR BACHELOR OF SCIENCE IN BUSINESS ADMINISTRATION Major in Operations Management (OM) I. Program Description PROGRAM SPECIFICATIONS
The UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
BERGENFIELD PUBLIC SCHOOL DISTRICT PUBLIC RELATIONS PLAN 2016-2021
BERGENFIELD PUBLIC SCHOOL DISTRICT PUBLIC RELATIONS PLAN 2016-2021 Approved by the Bergenfield Board of Education December 21, 2015 Table of Contents Introduction... 3 Rationale... 4 Public Relations Goals...
Priority III: A National Cyberspace Security Awareness and Training Program
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015
Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 European Union Agency for Network and Information Security Summary 1 Presentation
Digital Identity Management for Natural Persons
Please cite this paper as: OECD (2011), Digital Identity Management for Natural Persons: Enabling Innovation and Trust in the Internet Economy - Guidance for Government Policy Makers, OECD Digital Economy
Department of Education
177 Department of Education Chairperson: Ghaith, Ghazi M Professor Emeritus: Haddad, Fuad Professors: Bashshur, Munir M.; BouJaoude, Saouma B.; Ghaith, Ghazi M.; Jurdak, Murad E. Associate Professor: Khamis,
FREEDOM IN ADULT EDUCATION
FREEDOM IN ADULT EDUCATION Abstract The paper deals with the term freedom in the education environment. The author s attention is focused on the adult education. He attempts to specify his point of view
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
Embedding English language in an accounting subject: A case of interactive interdisciplinary collaboration and learning
e-journal of Business Education & Scholarship of Teaching Vol. 6, No. 1, 2012, pp: 44-50. http://www.ejbest.org Instructional Note Embedding English language in an accounting subject: A case of interactive
10 Facts about the Australian Curriculum FACT 1 THE AUSTRALIAN CURRICULUM SETS HIGH STANDARDS
FACT 1 THE AUSTRALIAN CURRICULUM SETS HIGH STANDARDS The Australian Curriculum sets the expectations for what all young Australians should be taught, regardless of where they live. The Australian Curriculum
3D Class: A gamified learning environment.
3D Class: A gamified learning environment. Eduardo Galembeck * & Rodrigo D. Takase # *,# State University of Campinas (UNICAMP), Institute of Biology Dept. of Biochemestry Figure 1: 3D Class main screen
Canadians and Their Money Building a brighter financial future
Report of Recommendations on Financial Literacy EXECUTIVE SUMMARY AND RECOMMENDATIONS Canadians and Their Money Building a brighter financial future December 2010 Executive Summary Financial literacy is
Morris College Teacher Education Curriculum Changes Elementary Education
EDU 200 Introduction to Education (3) Introduction to Education provides an introduction to the nature of education and its place in our society. An overview of the historical background of systems of
THE COLLEGE OF THE BAHAMAS GENERAL EDUCATION PROGRAMME
Academic Board Focus Group THE COLLEGE OF THE BAHAMAS GENERAL EDUCATION PROGRAMME Introduction One of the major goals of The College of The Bahamas as identified in Strategic Plan 2002-2007 is to graduate
West Windsor-Plainsboro Regional School District Computer Programming Grade 8
West Windsor-Plainsboro Regional School District Computer Programming Grade 8 Unit 1: Programming Content Area: Technology Course & Grade Level: Computer Programming, Grade 8 Summary and Rationale The
Introduction to Runtime Application Self Protection (RASP) Making Applications Self Protecting, Self Diagnosing and Self Testing
Introduction to Runtime Application Self Protection (RASP) Making Applications Self Protecting, Self Diagnosing and Self Testing The cyber security landscape has become increasingly complex in recent years.
POLICY ISSUES IN BRIEF
ISSUES AND SOLUTIONS for Career and Technical Education in Virginia 2015 Educators and business representatives from across Virginia, along with 10 organizations representing Career and Technical Education
BC s Digital Literacy Framework (DRAFT)
BC s Digital Literacy Framework (DRAFT) Using standards-based techniques, a collaborative teaching environment enriched through creative integration of technology tools takes learning beyond standardized
Characteristics of Effective and Sustainable Teaching Development Programs for Quality Teaching in Higher Education
Characteristics of Effective and Sustainable Teaching Development Programs for Quality Teaching in Higher Education This presentation will address the following conference aim/question: What are the contextual
Caring, one person at a time.
JOHNSON & JOHNSON STRATEGIC FRAMEWORK Caring, one person at a time. STRATEG IC FRAM EWOR K 1 Nothing is more important than the health and well-being of those we love. That s why the Johnson & Johnson
