Using bloom's and Webb's taxonomies to integrate emerging cybersecurity topics into a computing curriculum

Mark Alan Harris, Karen P. Patten

Research output: Contribution to journalArticle

11 Citations (Scopus)

Abstract

Recent high profile hackings have cost companies millions of dollars resulting in an increasing priority to protect government and business data. Universities are under increased pressure to produce graduates with better security knowledge and skills, particularly emerging cybersecurity skills. Although accredited undergraduate computing programs recognize the need to solve this problem, these computing programs are constrained by accreditation standards and have limited ability to modify their curricula. This paper discusses a case study on how one Accreditation Board for Engineering and Technology (ABET) accredited undergraduate IT program created a strategy to continue to teach existing security-related topics as well as emerging cybersecurity topics within its IT curriculum without increasing credit requirements. The faculty developed an IT Security-related and Cybersecurity Curriculum Taxonomy to identify strategies to move security-related topics taught in the higher level courses to lower and intermediate courses. Thus emerging cybersecurity topics could be added to high-level courses. The faculty also created the IT Student Learning (Security-related) Taxonomy by combining Bloom's Taxonomy's six levels of thinking with Webb's Depth of Knowledge Model. This student learning taxonomy enabled the faculty to review the student learning outcomes for each of the existing security-related core topics and develop new ones for the emerging cybersecurity topics. Challenges, benefits, and application of this strategy to other disciplines are discussed.

Original languageEnglish (US)
Pages (from-to)219-234
Number of pages16
JournalJournal of Information Systems Education
Volume26
Issue number3
StatePublished - Jan 1 2015

Fingerprint

Taxonomies
taxonomy
Curricula
curriculum
Accreditation
Students
accreditation
learning
Industry
student
dollar
credit
graduate
engineering
Costs
ability
costs

Keywords

  • Bloom's taxonomy
  • Curriculum design and development
  • Cybersecurity
  • Webb's depth of knowledge

ASJC Scopus subject areas

  • Education
  • Engineering (miscellaneous)

Cite this

Using bloom's and Webb's taxonomies to integrate emerging cybersecurity topics into a computing curriculum. / Harris, Mark Alan; Patten, Karen P.

In: Journal of Information Systems Education, Vol. 26, No. 3, 01.01.2015, p. 219-234.

Research output: Contribution to journalArticle

@article{b9402995acea4355a6ef14c63a2713f8,
title = "Using bloom's and Webb's taxonomies to integrate emerging cybersecurity topics into a computing curriculum",
abstract = "Recent high profile hackings have cost companies millions of dollars resulting in an increasing priority to protect government and business data. Universities are under increased pressure to produce graduates with better security knowledge and skills, particularly emerging cybersecurity skills. Although accredited undergraduate computing programs recognize the need to solve this problem, these computing programs are constrained by accreditation standards and have limited ability to modify their curricula. This paper discusses a case study on how one Accreditation Board for Engineering and Technology (ABET) accredited undergraduate IT program created a strategy to continue to teach existing security-related topics as well as emerging cybersecurity topics within its IT curriculum without increasing credit requirements. The faculty developed an IT Security-related and Cybersecurity Curriculum Taxonomy to identify strategies to move security-related topics taught in the higher level courses to lower and intermediate courses. Thus emerging cybersecurity topics could be added to high-level courses. The faculty also created the IT Student Learning (Security-related) Taxonomy by combining Bloom's Taxonomy's six levels of thinking with Webb's Depth of Knowledge Model. This student learning taxonomy enabled the faculty to review the student learning outcomes for each of the existing security-related core topics and develop new ones for the emerging cybersecurity topics. Challenges, benefits, and application of this strategy to other disciplines are discussed.",
keywords = "Bloom's taxonomy, Curriculum design and development, Cybersecurity, Webb's depth of knowledge",
author = "Harris, {Mark Alan} and Patten, {Karen P.}",
year = "2015",
month = "1",
day = "1",
language = "English (US)",
volume = "26",
pages = "219--234",
journal = "Journal of Information Systems Education",
issn = "1055-3096",
publisher = "Data Processing Management Association's Special Interest Group for Education",
number = "3",

}

TY - JOUR

T1 - Using bloom's and Webb's taxonomies to integrate emerging cybersecurity topics into a computing curriculum

AU - Harris, Mark Alan

AU - Patten, Karen P.

PY - 2015/1/1

Y1 - 2015/1/1

N2 - Recent high profile hackings have cost companies millions of dollars resulting in an increasing priority to protect government and business data. Universities are under increased pressure to produce graduates with better security knowledge and skills, particularly emerging cybersecurity skills. Although accredited undergraduate computing programs recognize the need to solve this problem, these computing programs are constrained by accreditation standards and have limited ability to modify their curricula. This paper discusses a case study on how one Accreditation Board for Engineering and Technology (ABET) accredited undergraduate IT program created a strategy to continue to teach existing security-related topics as well as emerging cybersecurity topics within its IT curriculum without increasing credit requirements. The faculty developed an IT Security-related and Cybersecurity Curriculum Taxonomy to identify strategies to move security-related topics taught in the higher level courses to lower and intermediate courses. Thus emerging cybersecurity topics could be added to high-level courses. The faculty also created the IT Student Learning (Security-related) Taxonomy by combining Bloom's Taxonomy's six levels of thinking with Webb's Depth of Knowledge Model. This student learning taxonomy enabled the faculty to review the student learning outcomes for each of the existing security-related core topics and develop new ones for the emerging cybersecurity topics. Challenges, benefits, and application of this strategy to other disciplines are discussed.

AB - Recent high profile hackings have cost companies millions of dollars resulting in an increasing priority to protect government and business data. Universities are under increased pressure to produce graduates with better security knowledge and skills, particularly emerging cybersecurity skills. Although accredited undergraduate computing programs recognize the need to solve this problem, these computing programs are constrained by accreditation standards and have limited ability to modify their curricula. This paper discusses a case study on how one Accreditation Board for Engineering and Technology (ABET) accredited undergraduate IT program created a strategy to continue to teach existing security-related topics as well as emerging cybersecurity topics within its IT curriculum without increasing credit requirements. The faculty developed an IT Security-related and Cybersecurity Curriculum Taxonomy to identify strategies to move security-related topics taught in the higher level courses to lower and intermediate courses. Thus emerging cybersecurity topics could be added to high-level courses. The faculty also created the IT Student Learning (Security-related) Taxonomy by combining Bloom's Taxonomy's six levels of thinking with Webb's Depth of Knowledge Model. This student learning taxonomy enabled the faculty to review the student learning outcomes for each of the existing security-related core topics and develop new ones for the emerging cybersecurity topics. Challenges, benefits, and application of this strategy to other disciplines are discussed.

KW - Bloom's taxonomy

KW - Curriculum design and development

KW - Cybersecurity

KW - Webb's depth of knowledge

UR - http://www.scopus.com/inward/record.url?scp=85017650375&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85017650375&partnerID=8YFLogxK

M3 - Article

VL - 26

SP - 219

EP - 234

JO - Journal of Information Systems Education

JF - Journal of Information Systems Education

SN - 1055-3096

IS - 3

ER -