Gamification to Support Cyber Security Community Education in Lebanon

Size: px
Start display at page:

Download "Gamification to Support Cyber Security Community Education in Lebanon"

Transcription

1 Gamification to Support Cyber Security Community Education in Lebanon Antoine M. Melki 1, Moussa G. Chatrieh 2 1 Instructional Technology Unit, University of Balamand, Balamand, Koura, Amioun 33, Lebanon {[email protected]} 2 Ecole Doctorale des Lettres et des Sciences, Université Libaniase, Sin El Fil, Beirut, Lebanon {[email protected]} Abstract: The research presented is a part of a larger project going in Lebanon. The aim of this paper is to describe the experience of the University of Balamand in adopting gamification as a means to provide community education in the field of cyber security. The volume of literature in cyber security field is increasing. One of the major highlighted issues is the place of humans in the security processes. On the other hand, digital citizenship and digital lifestyles are posing a number of challenges that are supposed to be met by education, since humans are involved. Meanwhile, the concepts of learning and teaching have changed drastically with the advances in web technologies and telecommunications. The main challenge lies in assuring cyber security, especially for those outside the regular educational setting. In the case of Lebanon, the majority of internet users are outside the regular outreach of any training or awareness program. This fact is a challenge for cybersecurity education in Lebanon. Accordingly, literature review shows that community learning comes as an appropriate solution, where universities have a major role to play. In addition, to avoid the problems underlying community education, like outreach, teaching difficulties, and financing, it is proposed to use gamification. This philosophy is adopted by the University of Balamand, whose experience is exposed in this research. Keywords: cybersecurity education, gamification, community learning 1. INTRODUCTION The cybersecurity studies are interdisciplinary by nature as they involve the study of several different fields: telecommunications, law, management, psychology, and others. With the advance in research in the field, focus is shifting from technology to humans, and the field is getting more involvement of experts from different backgrounds. In this paper, the human factor in cybersecurity is the main issue. The questions raised are primarily addressing the mass of online users, how to reach to them, and how improve their security in the cyber space. The Lebanese case is taken in specific, and gamification is highlighted as a potential solution of the outreach problem in community education which is proven to be the form that can contribute to the improving the cybersecurity of the large number of users who are outside the regular educational settings. In addition, the role of academia in this process and what it can offer to the community is emphasized. 172

2 2. THE HUMAN FACTOR IN CYBERSECURITY AND THE DIGITAL CITIZENSHIP The increasing number and sophistication of cyber threats is accompanied by concerns over the role of humans in cybersecurity. A large literature exist describing research on people in work settings, with emphasis on their contribution in cybersecurity. Reports cite numbers on the different threats in relation to humans. Threats related to humans include: 75% of people use the same password for multiple accounts, both at work and home, 7% of people use a password, which makes the threat among the top 100 most common problems, 91% of people use a password from the top 1000 most common, and 99.8% of people use a password from the top 10,000 most common FROM SECURITY TO LIFESTYLE On the other hand, attention is not anymore focused on security as a technical issue, as people are getting more immersed in technology and telecommunications. This immersion is tinting the lifestyle of humans as they become more and more dependent on ICT. In this endeavor, humans become the weakest link in cyber security, as they prefer to minimize their own inconvenience, as they reveal their predictability, apathy and general naivety about the potential impacts of their actions [1]. This digital lifestyle places the twenty first century people in the digital citizenship field. As expressed by Jason Ohler: The digital age beckons us to usher in a new era of character education, aimed directly at addressing the opportunities and challenges of living a digital lifestyle [2]. Meanwhile, digital citizenship is interpreted as being character education for the digital age [3] DIGITAL CITIZENSHIP Digital citizenship challenges the different components of societies by being expressed as nine elements as follows: a. Digital Access: full electronic participation in society. b. Digital Commerce: electronic buying and selling of goods. c. Digital Communication: electronic exchange of information. d. Digital Literacy: process of teaching and learning about technology and the use of technology. e. Digital Etiquette: electronic standards of conduct or procedure. f. Digital Law: electronic responsibility for actions and deeds g. Digital Rights and Responsibilities: those freedoms extended to everyone in a digital world. h. Digital Health and Wellness: physical and psychological well-being in a digital technology world. i. Digital Security (self-protection): electronic precautions to guarantee safety [4]. The sequence of citing the themes might not reflect their importance or chronology. If we try to list them by their significance in the cybersecurity context, digital literacy, etiquette, rights and responsibilities, should show before access and commerce. This rearrangement of the sequence highlights the central role of education in forming digital citizens. Shedding the light of this role on the cybersecurity field, education becomes a major challenge. 3. GAMIFICATION IN THE CYBERSECURITY ARENA Gamification is the process of enhancing a specific service by implementing game design elements in a non-game context to enhance the user s overall value creation and experience [5]. In addition, when designed and applied in an appropriate manner and setting, 173

3 gamification provides an alignment between motivation and desire that leads to the anticipated purpose of its use [6]. Gamification is used for educational purposes, not only entertainment. There exist games for science [7](Rouse, 2013), maths [8] (Goehle, 2013), foreign languages [9] (Danowska Florczyk & Mostowski, 2012), cultural heritage [10] (Gordillo, Gallego, Barra, & Quemada, 2013), health [11] (Gabarron, Schopf, Serrano, Fernandez Luque, & Dorronzoro, 2012), computer science [12] (Li, Dong, Untch, & Chasteen, 2013), software engineering [13] (Sheth, Bell, & Kaiser, 2012), business and logistics [14] (Reiners, et al., 2012), and lately for cybersecurity awareness training [15] (Adams and Makramalla) GAMIFICATION OF CYBERSECURITY EDUCATION An important principle of game design is the meaningfulness of the content to the players. Literature review shows that for a learning environment to be engaging, its context has to connect to the everyday lives of the learners. In the case of cybersecurity, the context is not a fictional world but a real one. The pervasiveness of cybersecurity affects the everyday lives of the users and their communities, so they are expected to meaningfully engage in the different tasks and activities created around this context, and presented as games. To conclude this section, this paper is advising the use of educational games as a means for community education to address the human weakness in cybersecurity, raise awareness of it, and assist abandoned users in getting protected. But the issue of cost and financial support remains unsolved. It is proposed to involve higher education institutions. 4. COMMUNITY EDUCATION Since issues of infrastructure are outside the interest of this research, and since this research is dedicated more to handle the matters of human weakness in cyberspace than infrastructure concerns, the problem of lack of awareness is the subject of emphasis. Under these circumstances, community education can be proposed as a solution. Community Education is a process whereby learning is used for both individual and community betterment. It is characterized by: 1) involvement of people of all ages, 2) the use of community learning, resources and research to bring about community change, and 3) the recognition that people can learn through, with and for each other to create a better world (Mezirow & Taylor, 2011). The problems facing community education can be summarized in the following: 1) it relies on non-traditional teaching, 2) its structure is so different from the school structure, 3) relationships between students and instructors, students among themselves, students and administration and instructors and administration are harder to manage and more sophisticated, 4) reaching out to students is more difficult than in school setting, and 5) the cost and financial support is usually the responsibility of the government or local authorities CYBERSECURITY COMMUNITY EDUCATION In the case of teaching about cybersecurity following community education principles, some of the factors dissolve. The issue of reaching out to students is not a problem as the environment is the online itself. In the same course, issues of relationships and administration get different orientation, since the instructor can become confined with the computer or smartphone. The age issue can be linked to learning which involves a process and content with corresponding characteristics. At this stage, gamification is proposed as a solution THE ROLES OF UNIVERSITIES IN COMMUNITY EDUCATION In principle, universities play a number of roles in their communities. They 1) assure continuity of basic education, 2) generate knowledge to drive and transform the community, 174

4 3) improve lives, raise wages and productivity, cultural and political benefits, etc. 4) answer to both governments and communities, 5) widen access and create equity in higher education, 6) work with communities on creating, mobilizing and applying knowledge, 7) and lastly, managing and creating sustainable community initiatives (Ali, 2010). So, the commitment of universities to their communities is obvious. Raising awareness, developing awareness and training programs and running them, doing research, developing software including educational games, can be some of the activities that universities can do as a contribution to nurture cybersecurity. So, since there is a need to raise awareness, develop the Internet ecosystem, and since community education contributes to the solution, universities shall contribute in cybersecurity education through providing community learning. 5. THE LEBANESE CASE A study made by We Are Social titled Digital Landscape: Middle East, North Africa & Turkey in July 2014 stated that in Lebanon whose population is 4,137,000 persons, the internet penetration amounts to 81% represented by 3,337,000 internet users, 94% of mobile subscription penetration represented by 3,900,000 users (We are social). Based on the numbers provided by the Bureau of Statistics in Lebanon, the total number of schools and universities students and the information users amount to 1,302,283. By taking a very optimistic stance in dealing with numbers, and assuming that all those in schools and information organization are reachable for raising awareness on cybersecurity, those who are left with no assistance is 2,034,717. Figure 1: Lebanon Overview Figure 2: Internet users in Lebanon Studies show that more than 50% of the users are not secure in the cyberspace due to 2 main factors: 1) issues related to infrastructure, and 2) lack of awareness. It can be easily concluded that in Lebanon two thirds of the users need assistance for both reasons mentioned above. 6. A PROPOSED PLAN FOR LEBANON Due to the large number of users in need to be reached in Lebanon under any awareness campaign or procedure, community education is needed. Accordingly, the more involved components of the society, the better the results can be. In the case of our study, universities have to play a major role. The case of the University of Balamand (UOB) can be cited as an example to show commitment and show how gamification can be a tool to support community education. 175

5 6.1. UOB S EXPERIENCE Since 2009, UOB had committed its self to raise awareness on cybersecurity. A cybersecurity awareness component was added in a number of courses across all the curricula at the university. A specialized graduate program is under study. A number of projects in the community were completed to raise awareness, like community campaigns at schools, NGOs, youth groups and others, training people on how to deal with cyber risks, development of training material, development of software, delivering training, in addition to creating some partnerships which are project based. Some memoranda of understanding were signed with specialized institutions GAMIFICATION AS A TOOL FOR COMMUNITY EDUCATION As the process dealt with in this paper is online and the players are online users, and based on the facts stated above on the validity of educational games to raise awareness on cybersecurity, UOB started a project named Asfalia in Asfalia is a cybersecurity gamification lab, aiming at: 1): the arabization of open source cyber security games to reach the masses, 2) organizing a summer camp to materialize the community partnership, and 3) games development. 7. CONCLUSION Cybersecurity is not anymore a purely academic issue, but a national concern with multinational dimensions. The diversity of users and their backgrounds requires innovative solutions. Universities, as a workroom of innovation, are expected to offer contributions that go beyond simple teaching of courses. A commitment to innovate solutions that nurture awareness, and encourage the development of a secure cyber ecosystem is required. UOB, as a leading university in Lebanon, is exploiting gamification to increase the outreach of cybersecurity awareness outreach as a means of community education. 8. REFERENCES [1]. Thales (2013). The Human Component of Cyber Security. November Retrieved from on 1/6/2015. [2]. Ohler, J. (2011). Digital Citizenship Means Character Education for the Digital Age, Kappa Delta Pi Record, 47:sup1, 25-27, DOI: / [3]. Ribble, M. (2012). Digital Citizenship for Educational Change. Kappa Delta Pi Record, 48:4, , DOI: / [4]. Brownell, L. (2013). Nine Elements of Digital Citizenship. tutorials/nine-elements-of-digital-citizenship. Retrieved on 1/6/2015. [5]. Huotari, K., & Hamari, J. (2012). Defining Gamification - A Service Marketing Perspective. In Proceedings of The 16th International Academic Mindtrek Conference, Tampere, Finland, October 3-5, [6]. Korolov, M. (2012) Gamification on the Enterprise. Networkworld.com, 10 September 2012, pp [7]. Rouse, K. (2013). Gamification in science education: The relationship of educational games to motivation and achievement. The University Of Southern Mississippi. Publication number: [8]. Goehle, G. (2013). Gamification and Web based Homework. PRIMUS, 23(3), [9]. Danowska-Florczyk, E. & Mostowski, P. (2012). Gamification as a new direction in teaching Polish as a foreign language. Proceedings of the international conference ICT for Language Learning, 5 th edition, Florence, Italy, November [10]. Gordillo, A., Gallego, D., Barra, E., & Quemada, J. (2013). The city as a learning 176

6 gamified platform. Frontiers in Education Conference (pp ). [12]. Gabarron, E., Schopf, T., Serrano, J. A., Fernandez Luque, L., & Dorronzoro, E. (2012). Gamification Strategy on Prevention of STDs for Youth. Studies in health technology and informatics, 192, [12]. Li, C., Dong, Z., Untch, R. H., & Chasteen, M. (2013). Engaging Computer Science Collaborative Learning Environment. International Journal of Information and Educational Technology, 3(1), [13]. Sheth, S. K., Bell, J. S., & Kaiser, G. E. (2012). Increasing Student Engagement in Software Engineering with Gamification. Retrieved from [14]. Reiners, T., Wood, L. C., Chang, V., Gütl, C. H., Teräs, H., & Gregory, S. (2012). Operationalising gamification in an educational authentic environment. IADIS Internet Technologies and Society, (pp ). Perth, Australia. [15]. Adams, M. and Makramalla, M. (2015) Cybersecurity Skills Training: An Attacker- Centric Gamified Approach. Technology Innovation Management Review. January P [16]. Mezirow, J. & Taylor, E. W. (2011). Transformative Learning in Practice: Insights from Community, Workplace, and Higher Education. John Wiley & Sons. pp [17]. Ali, A. (2010). Developing the Community: The Role of Universities and Open and Distance Learning. The 6 th Pan-Commonwealth Forum on Open Learning November Kochi, India. Retrieved on 24/4/2015 from /2010presentation/Pages/ aspx. [18]. We Are Social (2014). Digital Landscape: Middle East, North Africa & Turkey. Retrieved from on 1/6/

THE HUMAN COMPONENT OF CYBER SECURITY

THE HUMAN COMPONENT OF CYBER SECURITY cybersecurity.thalesgroup.com.au People, with their preference to minimise their own inconvenience, their predictability, apathy and general naivety about the potential impacts of their actions, are the

More information

Teaching Digital Citizenship

Teaching Digital Citizenship 32 Government of Newfoundland and Labrador - Education I A School-Wide Approach - Positive Behaviour Supports 2013 Education Teaching Digital Citizenship Digital citizenship can be defined as the norms

More information

DIGITAL CITIZENSHIP. TOJET: The Turkish Online Journal of Educational Technology January 2014, volume 13 issue 1

DIGITAL CITIZENSHIP. TOJET: The Turkish Online Journal of Educational Technology January 2014, volume 13 issue 1 DIGITAL CITIZENSHIP Aytekin ISMAN a *, Ozlem CANAN GUNGOREN b a Sakarya University, Faculty of Education 54300, Sakarya, Turkey b Sakarya University, Faculty of Education 54300, Sakarya, Turkey ABSTRACT

More information

The Challenges of the Software Industry. WIPO - MOET - ALSI Seminar 21-22 February 2011 Beirut - Lebanon

The Challenges of the Software Industry. WIPO - MOET - ALSI Seminar 21-22 February 2011 Beirut - Lebanon The Challenges of the Software Industry WIPO - MOET - ALSI Seminar 21-22 February 2011 Beirut - Lebanon Aly Harakeh [email protected] Marketing Manager Microsoft Lebanon and NIM Overview The high-tech

More information

The Arab World Online 2014: Trends in Internet and Mobile Usage in the Arab Region

The Arab World Online 2014: Trends in Internet and Mobile Usage in the Arab Region The Arab World Online 2014: Trends in Internet and Mobile Usage in the Arab Region Navigating through mounting developmental challenges, the Arab region continues to go through technology-enabled transformations,

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

Gamification in education: How gamification can encourage learning. Ryan Montville. The Ohio state University

Gamification in education: How gamification can encourage learning. Ryan Montville. The Ohio state University Running head: GAMIFICATION IN EDUCATION 1 Gamification in education: How gamification can encourage learning Ryan Montville The Ohio state University Running head: GAMIFICATION IN EDUCATION 2 Gamification

More information

Bachelor of Information Technology

Bachelor of Information Technology Bachelor of Information Technology Detailed Course Requirements The 2016 Monash University Handbook will be available from October 2015. This document contains interim 2016 course requirements information.

More information

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

THE CULTURE OF INNOVATION AND THE BUILDING OF KNOWLEDGE SOCIETIES. - Issue Paper -

THE CULTURE OF INNOVATION AND THE BUILDING OF KNOWLEDGE SOCIETIES. - Issue Paper - THE CULTURE OF INNOVATION AND THE BUILDING OF KNOWLEDGE SOCIETIES - Issue Paper - UNESCO, Bureau of Strategic Planning September 2003 1 I. The past and present scope of innovation During the last two decades,

More information

CREATING A SENSE OF PRESENCE IN ONLINE TEACHING: How to Be There for Distance Learners

CREATING A SENSE OF PRESENCE IN ONLINE TEACHING: How to Be There for Distance Learners GLOKALde July 2014, ISSN 2148-7278, Volume: 1 Number: 1 Book Review 2 GLOKALde is official e-journal of UDEEEWANA CREATING A SENSE OF PRESENCE IN ONLINE TEACHING: How to Be There for Distance Learners

More information

Jyväskylä Cyber Security Ecosystem

Jyväskylä Cyber Security Ecosystem Jyväskylä Cyber Security Ecosystem Adjunct Professor, Dr. (Military Sciences), Col (ret.) Martti Lehto 30.9.2015 High Level Cyber Security Comment 4.2.2014 President Sauli Niinistö highlighted cyber security.

More information

Program Planning Guide Business Administration, Associate in Applied Science General Business Administration Track (A25120)

Program Planning Guide Business Administration, Associate in Applied Science General Business Administration Track (A25120) Program Planning Guide Business Administration, Associate in Applied Science General Business Administration Track (A25120) Program Length: 5 semesters Career Pathway Options: Associate in Applied Science

More information

E-Learning at school level: Challenges and Benefits

E-Learning at school level: Challenges and Benefits E-Learning at school level: Challenges and Benefits Joumana Dargham 1, Dana Saeed 1, and Hamid Mcheik 2 1. University of Balamand, Computer science department [email protected], [email protected]

More information

Computer and Network Security in Higher Education

Computer and Network Security in Higher Education Mark Luker and Rodney Petersen Computer and Network Security in Higher Education Mark Luker and Rodney Petersen, Editors A Publication of EDUCAUSE Copyright 2003 Jossey-Bass Inc. Published by Jossey-Bass,

More information

PROFESSIONAL DEVELOPMENT: A VISION FOR SAUDI SCIENCE TEACHERS

PROFESSIONAL DEVELOPMENT: A VISION FOR SAUDI SCIENCE TEACHERS PROFESSIONAL DEVELOPMENT: A VISION FOR SAUDI SCIENCE TEACHERS Hiya Almazroa Pringcess Noura Bint Abdulrahman University, Saudi Arabia Abstract: Professional development is a significant mechanism for maintaining

More information

Gamification from the perspective of service marketing

Gamification from the perspective of service marketing Gamification from the perspective of service marketing Kai Huotari School of Information, UC Berkeley. California, USA Hanken School of Economics, Helsinki, Finland Helsinki Institute for Information Technology

More information

D R A F T. Faculty Senate Ad Hoc Committee on Quality in Online Learning.

D R A F T. Faculty Senate Ad Hoc Committee on Quality in Online Learning. Faculty Senate Ad Hoc Committee on Quality in Online Learning. The Faculty Senate Ad Hoc Committee on the Future Direction of Quality Education is charged with: Defining quality in online/distance education

More information

SOCIAL MEDIA MARKETING TRENDS IN TURKEY

SOCIAL MEDIA MARKETING TRENDS IN TURKEY SOCIAL MEDIA MARKETING TRENDS IN TURKEY June 2012 About the Authors AYŞEGÜL TOKER is a professor of Information Systems at the Department of Management, and the Dean of the Faculty of Economics and Administrative

More information

BUSINESS PROCESS OUTSOURCING INDUSTRY IN LEBANON

BUSINESS PROCESS OUTSOURCING INDUSTRY IN LEBANON BUSINESS PROCESS OUTSOURCING INDUSTRY IN LEBANON Content SECTOR OVERVIEW p 3 INTERNATIONALLY RENOWNED EDUCATIONAL SYSTEM p 4 COST-COMPETITIVE & HIGHLY SKILLED WORKFORCE ESTABLISHED TRACK RECORD ENABLING

More information

A Detailed Strategy for Managing Corporation Cyber War Security

A Detailed Strategy for Managing Corporation Cyber War Security A Detailed Strategy for Managing Corporation Cyber War Security Walid Al-Ahmad Department of Computer Science, Gulf University for Science & Technology Kuwait [email protected] ABSTRACT Modern corporations

More information

Cyberspace Situational Awarness in National Security System

Cyberspace Situational Awarness in National Security System Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, [email protected], [email protected]

More information

A Common North Star: College Summit and the Common Core State Standards

A Common North Star: College Summit and the Common Core State Standards A Common North Star: College Summit and the Common Core State Standards Overview The broad based adoption of the Common Core State Standards (Common Core) presents a challenge to any organization serving

More information

Gamifying Software Development Environments Using Cognitive Principles

Gamifying Software Development Environments Using Cognitive Principles Gamifying Software Development Environments Using Cognitive Principles Position Paper Naomi Unkelos-Shpigel, Irit Hadar Information Systems Department, University of Haifa Carmel Mountain 31905, Haifa,

More information

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information

More information

An Innovative Two Factor Authentication Method: The QRLogin System

An Innovative Two Factor Authentication Method: The QRLogin System An Innovative Two Factor Authentication Method: The QRLogin System Soonduck Yoo*, Seung-jung Shin and Dae-hyun Ryu Dept. of IT, University of Hansei, 604-5 Dangjung-dong Gunpo city, Gyeonggi do, Korea,

More information

i-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5

i-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5 i-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5 Scope of curriculum i-safe materials are available in topic modules to provide the teacher with flexibility in creating a program of instruction

More information

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability The i-safe comprehensive curriculum provides a unique approach to Internet safety education, by meaningfully integrating

More information

National Cyber Security Strategy 2015-2017

National Cyber Security Strategy 2015-2017 National Cyber Security Strategy 2015-2017 Table of Contents Table of Contents...i Executive Summary... 1 1. Introduction... 2 2. Context - People, Economy, and State... 4 3. Guiding Principles... 10 4.

More information

IMPLEMENTING GAME ELEMENTS INTO DIDACTIC PROCESS: A CASE STUDY

IMPLEMENTING GAME ELEMENTS INTO DIDACTIC PROCESS: A CASE STUDY IMPLEMENTING GAME ELEMENTS INTO DIDACTIC PROCESS: A CASE STUDY Magdalena Borys Lublin University of Technology, Poland [email protected] Maciej Laskowski Lublin University of Technology, Poland [email protected]

More information

The Zendesk Benchmark Q2 2013

The Zendesk Benchmark Q2 2013 The Zendesk Benchmark Q IN FOCUS: CUSTOMER SELF-SERVICE zendesk.com The Zendesk Benchmark Q/ Table of Contents Global Customer Satisfaction Summary Page Background on Zendesk Benckmark Customer Satisfaction

More information

Course Description \ Bachelor of Primary Education Education Core

Course Description \ Bachelor of Primary Education Education Core Course Description \ Bachelor of Primary Education Education Core EDUC 310 :Foundations of Education in Qatar and School Reform : This course has been designed to acquaint the learners with the progress

More information

Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program

Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program Mobile Application Security Helping Organizations Develop a Secure and Effective Mobile Application Security Program by James Fox [email protected] Shahzad Zafar [email protected] Mobile applications

More information

Securing the Nation: Creating cyber security, resilience and readiness

Securing the Nation: Creating cyber security, resilience and readiness NZTech Developing a National Technology Strategy NZTech Developing a National Technology Strategy A Cyber-Secure New Zealand The Role of Government Procurement B R I E F I N G P A P E R Securing the Nation:

More information

National Cyber Security Strategies

National Cyber Security Strategies May 2012 National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is

More information

Executive Leadership MBA Course Descriptions

Executive Leadership MBA Course Descriptions Executive Leadership MBA Course Descriptions MBA 608: Interpersonal Leadership and Managing Organizational Behavior (3 credits) This course provides rising stars learning opportunities to take the next

More information

First World Summit Award Mobile Content

First World Summit Award Mobile Content UNITED NATIONS EDUCATIONAL, SCIENTIFIC AND CULTURAL ORGANIZATION First World Summit Award Mobile Content Releasing mobile potential for development Keynote Address by Mr. Jānis Kārkliņš Assistant Director

More information

C E. 21 st Century Model High Schools That Work. An Enhanced HSTW Design for Implementing the West Virginia Framework for High Performing High Schools

C E. 21 st Century Model High Schools That Work. An Enhanced HSTW Design for Implementing the West Virginia Framework for High Performing High Schools 21 st Century Model High Schools That Work An Enhanced HSTW Design for Implementing the West Virginia Framework for High Performing High Schools C E 21 st Century High Schools That Work (HSTW)is an effort-based

More information

Chariho Regional School District. Technology Education Curriculum. Grades K-8

Chariho Regional School District. Technology Education Curriculum. Grades K-8 Chariho Regional School District Technology Education Curriculum Grades K-8 March 13, 2012 Chariho Regional School District Technology Education Curriculum Grades K - 8 Table of Contents Page Section One

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

NEW COMPETENCE OF BIOLOGY TEACHER IN THE FACE OF SOCIAL AND CULTURAL CHANGES

NEW COMPETENCE OF BIOLOGY TEACHER IN THE FACE OF SOCIAL AND CULTURAL CHANGES ISSN 1308 8971 Special Issue: Selected papers presented at WCNTSE NEW COMPETENCE OF BIOLOGY TEACHER IN THE FACE OF SOCIAL AND CULTURAL CHANGES Katarzyna POTYRALA, Alicja WALOSIK & Andrzej RZEPKA Institute

More information

Cyber Security Strategy(Information Security Policy Council, June 10, 2013)

Cyber Security Strategy(Information Security Policy Council, June 10, 2013) Environmental Change Vision to aim as a Goal Basic Principles Cyber Security Strategy(Information Security Policy Council, June 10, 2013) Areas of Efforts Increasing severity of the risk surrounding cyberspace

More information

Engaging Computer Science Students through Gamification in an Online Social Network Based Collaborative Learning Environment

Engaging Computer Science Students through Gamification in an Online Social Network Based Collaborative Learning Environment Engaging Computer Science Students through Gamification in an Online Social Network Based Collaborative Learning Environment Cen Li, Zhijiang Dong, Roland H. Untch, and Michael Chasteen Abstract Gamification

More information

i-safe K 12 CURRICULUM SCOPE 06-07

i-safe K 12 CURRICULUM SCOPE 06-07 i-safe K 12 CURRICULUM SCOPE 06-07 GRADES K 4 Scope and sequence i-safe materials are available in topic modules to provide the teacher with flexibility in creating a program of instruction that best suits

More information

This is an example of a response to UNC Tomorrow.ECU Tomorrow And the Implications for Academic Degree Program Planning.

This is an example of a response to UNC Tomorrow.ECU Tomorrow And the Implications for Academic Degree Program Planning. This is an example of a response to UNC Tomorrow.ECU Tomorrow And the Implications for Academic Degree Program Planning. Program planners should review UNC Tomorrow Commission Final Report (December 2007)

More information

S. ll IN THE SENATE OF THE UNITED STATES

S. ll IN THE SENATE OF THE UNITED STATES OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American

More information

DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT

DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT Security education is critical in today s cyber threat environment. Many schools have investigated different approaches to teaching fundamental

More information

Government of Kenya Ministry of Information Communications and Technology Telposta Towers, 10th Floor, Kenyatta Ave Nairobi, Kenya

Government of Kenya Ministry of Information Communications and Technology Telposta Towers, 10th Floor, Kenyatta Ave Nairobi, Kenya i Government of Kenya Ministry of Information Communications and Technology Telposta Towers, 10th Floor, Kenyatta Ave Nairobi, Kenya ii Executive Summary Global information and communication technology

More information

ITU National Cybersecurity/CIIP Self-Assessment Tool

ITU National Cybersecurity/CIIP Self-Assessment Tool ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For

More information

Where Is Interactive Marketing Heading?

Where Is Interactive Marketing Heading? Trend Report Changhee Han _ [email protected] Chakyung Bae _ [email protected] 2013 ad:tech London Where Is Interactive Marketing Heading? ad:tech is an international seminar on interactive marketing

More information

Surviving the Era of Hack Attacks Cyber Security on a Global Scale

Surviving the Era of Hack Attacks Cyber Security on a Global Scale Surviving the Era of Hack Attacks Cyber Security on a Global Scale Dr. Adriana Sanford ASU Lincoln Professor of Global Corporate Compliance and Ethics Clinical Associate Professor of Law and Ethics This

More information

Richard Kerby Senior Inter-Regional Adviser E-Government and Knowledge Management

Richard Kerby Senior Inter-Regional Adviser E-Government and Knowledge Management 2014 UN e-government Survey Richard Kerby Senior Inter-Regional Adviser E-Government and Knowledge Management Outline Development Efforts and Public Administration at the UN UN E-Government Survey Advocacy,

More information

LEARNING AND COMPETENCE 2020. Strategy of the Finnish National Board of Education (FNBE)

LEARNING AND COMPETENCE 2020. Strategy of the Finnish National Board of Education (FNBE) LEARNING AND COMPETENCE 2020 Strategy of the Finnish National Board of Education (FNBE) Enhancing studies and provision of education and training Strengthening teaching personnel s competence Leading and

More information

P21 Framework Definitions

P21 Framework Definitions P21 Framework Definitions To help practitioners integrate skills into the teaching of core academic subjects, the Partnership has developed a unified, collective vision for learning known as the Framework

More information

CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE.

CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE. CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE. CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE The early 21st century has been defined by the Internet,

More information

How To Develop A Cyber Security Society

How To Develop A Cyber Security Society CYBER SECURITY EDUCATION IN MONTENEGRO: CURRENT TRENDS, CHALLENGES AND OPEN PERSPECTIVES Ramo Šendelj, Ivana Ognjanović University of Donja Gorica, Montenegro Abstract Cyber-security threats evolve as

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

A SURVEY ON ACCEPTABILITY OF E-LEARNING MBA OFFERED BY THE PRIVATE UNIVERSITIES IN BANGLADESH

A SURVEY ON ACCEPTABILITY OF E-LEARNING MBA OFFERED BY THE PRIVATE UNIVERSITIES IN BANGLADESH A SURVEY ON ACCEPTABILITY OF E-LEARNING MBA OFFERED BY THE PRIVATE UNIVERSITIES IN BANGLADESH Touhid Bhuiyan Faculty of Science and Technology, Queensland University of Technology (AUSTRALIA) [email protected]

More information

Brochure More information from http://www.researchandmarkets.com/reports/3611542/

Brochure More information from http://www.researchandmarkets.com/reports/3611542/ Brochure More information from http://www.researchandmarkets.com/reports/3611542/ A2P SMS Market, Services (Transactional [CRM, Interactive], Promotional [Marketing, Inquiry, Pushed content]), Verticals,

More information

Coggin College of Business Marketing & Logistics Course Descriptions

Coggin College of Business Marketing & Logistics Course Descriptions CATALOG 2010-2011 Undergraduate Information Coggin College of Business Marketing & Logistics Course Descriptions MAR2905: Special Topics in Marketing v. 1-3 Prerequisite: Permission of instructor. Special

More information

such as loneliness and computer/ict illiteracy. (see also the staff working paper Ageing well in the information Society )

such as loneliness and computer/ict illiteracy. (see also the staff working paper Ageing well in the information Society ) Contribution of the European Network of Occupational Therapy in Higher Education to the Debate around the Consultation Paper Europe s Social Reality by Roger Liddle and Fréderic Lerais ENOTHE The European

More information

How To Get A Business Degree

How To Get A Business Degree SAMPLE OR SUGGESTED CURRICULUM ALIGNED TO OUTCOMES-BASED EDUCATION (OBE) FOR BACHELOR OF SCIENCE IN BUSINESS ADMINISTRATION Major in Operations Management (OM) I. Program Description PROGRAM SPECIFICATIONS

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

BERGENFIELD PUBLIC SCHOOL DISTRICT PUBLIC RELATIONS PLAN 2016-2021

BERGENFIELD PUBLIC SCHOOL DISTRICT PUBLIC RELATIONS PLAN 2016-2021 BERGENFIELD PUBLIC SCHOOL DISTRICT PUBLIC RELATIONS PLAN 2016-2021 Approved by the Bergenfield Board of Education December 21, 2015 Table of Contents Introduction... 3 Rationale... 4 Public Relations Goals...

More information

Priority III: A National Cyberspace Security Awareness and Training Program

Priority III: A National Cyberspace Security Awareness and Training Program Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 European Union Agency for Network and Information Security Summary 1 Presentation

More information

Digital Identity Management for Natural Persons

Digital Identity Management for Natural Persons Please cite this paper as: OECD (2011), Digital Identity Management for Natural Persons: Enabling Innovation and Trust in the Internet Economy - Guidance for Government Policy Makers, OECD Digital Economy

More information

Department of Education

Department of Education 177 Department of Education Chairperson: Ghaith, Ghazi M Professor Emeritus: Haddad, Fuad Professors: Bashshur, Munir M.; BouJaoude, Saouma B.; Ghaith, Ghazi M.; Jurdak, Murad E. Associate Professor: Khamis,

More information

FREEDOM IN ADULT EDUCATION

FREEDOM IN ADULT EDUCATION FREEDOM IN ADULT EDUCATION Abstract The paper deals with the term freedom in the education environment. The author s attention is focused on the adult education. He attempts to specify his point of view

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

Embedding English language in an accounting subject: A case of interactive interdisciplinary collaboration and learning

Embedding English language in an accounting subject: A case of interactive interdisciplinary collaboration and learning e-journal of Business Education & Scholarship of Teaching Vol. 6, No. 1, 2012, pp: 44-50. http://www.ejbest.org Instructional Note Embedding English language in an accounting subject: A case of interactive

More information

10 Facts about the Australian Curriculum FACT 1 THE AUSTRALIAN CURRICULUM SETS HIGH STANDARDS

10 Facts about the Australian Curriculum FACT 1 THE AUSTRALIAN CURRICULUM SETS HIGH STANDARDS FACT 1 THE AUSTRALIAN CURRICULUM SETS HIGH STANDARDS The Australian Curriculum sets the expectations for what all young Australians should be taught, regardless of where they live. The Australian Curriculum

More information

3D Class: A gamified learning environment.

3D Class: A gamified learning environment. 3D Class: A gamified learning environment. Eduardo Galembeck * & Rodrigo D. Takase # *,# State University of Campinas (UNICAMP), Institute of Biology Dept. of Biochemestry Figure 1: 3D Class main screen

More information

Canadians and Their Money Building a brighter financial future

Canadians and Their Money Building a brighter financial future Report of Recommendations on Financial Literacy EXECUTIVE SUMMARY AND RECOMMENDATIONS Canadians and Their Money Building a brighter financial future December 2010 Executive Summary Financial literacy is

More information

Morris College Teacher Education Curriculum Changes Elementary Education

Morris College Teacher Education Curriculum Changes Elementary Education EDU 200 Introduction to Education (3) Introduction to Education provides an introduction to the nature of education and its place in our society. An overview of the historical background of systems of

More information

THE COLLEGE OF THE BAHAMAS GENERAL EDUCATION PROGRAMME

THE COLLEGE OF THE BAHAMAS GENERAL EDUCATION PROGRAMME Academic Board Focus Group THE COLLEGE OF THE BAHAMAS GENERAL EDUCATION PROGRAMME Introduction One of the major goals of The College of The Bahamas as identified in Strategic Plan 2002-2007 is to graduate

More information

West Windsor-Plainsboro Regional School District Computer Programming Grade 8

West Windsor-Plainsboro Regional School District Computer Programming Grade 8 West Windsor-Plainsboro Regional School District Computer Programming Grade 8 Unit 1: Programming Content Area: Technology Course & Grade Level: Computer Programming, Grade 8 Summary and Rationale The

More information

Introduction to Runtime Application Self Protection (RASP) Making Applications Self Protecting, Self Diagnosing and Self Testing

Introduction to Runtime Application Self Protection (RASP) Making Applications Self Protecting, Self Diagnosing and Self Testing Introduction to Runtime Application Self Protection (RASP) Making Applications Self Protecting, Self Diagnosing and Self Testing The cyber security landscape has become increasingly complex in recent years.

More information

POLICY ISSUES IN BRIEF

POLICY ISSUES IN BRIEF ISSUES AND SOLUTIONS for Career and Technical Education in Virginia 2015 Educators and business representatives from across Virginia, along with 10 organizations representing Career and Technical Education

More information

BC s Digital Literacy Framework (DRAFT)

BC s Digital Literacy Framework (DRAFT) BC s Digital Literacy Framework (DRAFT) Using standards-based techniques, a collaborative teaching environment enriched through creative integration of technology tools takes learning beyond standardized

More information

Characteristics of Effective and Sustainable Teaching Development Programs for Quality Teaching in Higher Education

Characteristics of Effective and Sustainable Teaching Development Programs for Quality Teaching in Higher Education Characteristics of Effective and Sustainable Teaching Development Programs for Quality Teaching in Higher Education This presentation will address the following conference aim/question: What are the contextual

More information

Caring, one person at a time.

Caring, one person at a time. JOHNSON & JOHNSON STRATEGIC FRAMEWORK Caring, one person at a time. STRATEG IC FRAM EWOR K 1 Nothing is more important than the health and well-being of those we love. That s why the Johnson & Johnson

More information