skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Case Study: Mapping an E-Voting Based Curriculum to CSEC2017
An electronic voting (E-voting) oriented cybersecurity curriculum, proposed by Hostler et al. [4] in 2021, leverages the rich security features of E-voting systems and E-voting process to teach essential concepts of cybersecurity. Existing curricular guidelines describe topics in computer security, but do not instantiate them with examples. This is because their goals are different. In this case study, we map the e-voting curriculum into the CSEC2017 curriculum guidelines, to demonstrate how such a mapping is done. Further, this enables teachers to select the parts of the e-voting curriculum most relevant to their classes, by basing the selection on the relevant CSEC2017 learning objectives. We conclude with a brief discussion on generalizing this mapping to other curricular guidelines.  more » « less
Award ID(s):
2011175 2011117
PAR ID:
10408617
Author(s) / Creator(s):
; ; ; ; ;
Editor(s):
Doyle, Maureen; Stephenson, Ben
Date Published:
Journal Name:
SIGCSE 2023: Proceedings of the 54th ACM Technical Symposium on Computer Science Education
Volume:
1
Page Range / eLocation ID:
514 to 520
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. In recent years, all computing disciplinary communities and curricular guidelines have increased their expectations of and requirements for incorporating cybersecurity into their discipline. For computer science, this has been a daunting task for a number of reasons, including the fast-paced evolution and expansion of the discipline, the perceived challenge of finding space in the curriculum, and the difficulty of selecting the best content. This paper takes the position that infusing security concepts pervasively into an undergraduate Computer Science program is a crucial and attainable best practice. A five-step methodology is presented to incorporate cybersecurity into a traditional computer science curriculum in a way that maintains disciplinary integrity without adding significant new curricular content. This methodology is consistent with the philosophy and recommendations of the latest computer science and cybersecurity curricular guidelines. The paper also illustrates the application of these techniques to a typical Computer Science program. 
    more » « less
  2. Steven Furnell and Nathan Clarke (Ed.)
    An electronic voting (e-voting) based interactive cybersecurity education curriculum has been proposed recently. It is well-known that assignments and projects are coherent parts of and important for any curriculum. This paper proposes a set of course projects, assignment design, and a coherent online plug-and-play (PnP) platform implementation. The PnP platform and the proposed exemplary assignments and projects, are systematic (derived from the same system), adaptive (smoothly increasing difficulty), flexible (bound to protocols instead of implementations), and interactive (teacher-student and student-student interactions). They allow students to implement parts of the components of this e-voting system, which they can then plug into the PnP system, to run, test and modify their implementations, and to enhance their knowledge and skills on cryptography, cybersecurity, and software engineering. 
    more » « less
  3. Furnell, Steven; Clarke, Nathan (Ed.)
    An electronic voting (e-voting) based interactive cybersecurity education curriculum has been proposed recently. It is well-known that assignments and projects are coherent parts of and important for any curriculum. This paper proposes a set of course projects, assignment design, and a coherent online plug-and-play (PnP) platform implementation. The PnP platform and the proposed exemplary assignments and projects, are systematic (derived from the same system), adaptive (smoothly increasing difficulty), flexible (bound to protocols instead of implementations), and interactive (teacher-student and student-student interactions). They allow students to implement parts of the components of this e-voting system, which they can then plug into the PnP system, to run, test and modify their implementations, and to enhance their knowledge and skills on cryptography, cybersecurity, and software engineering. 
    more » « less
  4. Furnell, Steven; Clarke, Nathan (Ed.)
    An electronic voting (e-voting) based interactive cybersecurity education curriculum has been proposed recently. It is well-known that assignments and projects are coherent parts of and important for any curriculum. This paper proposes a set of course projects, assignment design, and a coherent online plug-and-play (PnP) platform implementation. The PnP platform and the proposed exemplary assignments and projects, are systematic (derived from the same system), adaptive (smoothly increasing difficulty), flexible (bound to protocols instead of implementations), and interactive (teacher-student and student-student interactions). They allow students to implement parts of the components of this e-voting system, which they can then plug into the PnP system, to run, test and modify their implementations, and to enhance their knowledge and skills on cryptography, cybersecurity, and software engineering. 
    more » « less
  5. Drevin, Lynette; Miloslavskaya, Natalia; Leung, Wai Sze; von Solms, Sune (Ed.)
    Cybersecurity is becoming increasingly important to individuals and society alike. However, due to its theoretical and practical complexity, keeping students interested in the foundations of cybersecurity is a challenge. One way to excite such interest is to tie it to current events, for example elections. Elections are important to both individuals and society, and typically dominate much of the news before and during the election. We are developing a curriculum based on elections and, in particular, an electronic voting protocol. Basing the curriculum on an electronic voting framework allows one to teach critical cybersecurity concepts such as authentication, privacy, secrecy, access control, encryption, and the role of non-technical factors such as policies and laws in cybersecurity, which must include societal and human factors. Student-centered interactions and projects allow them to apply the concepts, thereby reinforcing their learning. 
    more » « less