Writing requirements in computer security

Stefan A. Robila, Carl Bredlau

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations


This paper presents suggestions in incorporating essays in a Computer Security course. The first approach is a short essay that presents the student's personal view on computer security within the campus. In the paper, s/he uses information from the university's IT website and documents, as well as security disclosures of websites and software applications. This assignment is presented at the beginning of the course and serves as a basis of discussion both for the development of writing skills and for the identification of vulnerabilities faced by the campus community on the intranet and Internet illustrating the need for clear written regulations in IT security. The second approach requires an extended essay that describes the work performed in a term project. The essay assignment is developed in several stages that include a summary proposal, partial and complete drafts and final paper. The writing requires the student to go through all the steps needed to develop a significant scientific paper. The work must be original, supported by extensive literature review and follow a topic relevant to computer security. The essay development is complemented by ongoing class discussion of scientific papers, and by an in class presentation. The course was already piloted with the extended essay version and has received significant positive feedback from the students. It was recently approved to fit the Graduation Writing Requirements at our institution.

Original languageEnglish
Title of host publicationProceedings of the 6th Conference on Information Technology Education, SIGITE 2005
Number of pages2
StatePublished - 2005
Event6th ACM SIG-Information Technology Education Conference, SIGITE 2005 - Newark, NJ, United States
Duration: 20 Oct 200522 Oct 2005

Publication series

NameProceedings of the 6th Conference on Information Technology Education, SIGITE 2005


Other6th ACM SIG-Information Technology Education Conference, SIGITE 2005
Country/TerritoryUnited States
CityNewark, NJ


  • communication
  • computer security
  • pedagogy
  • writing


Dive into the research topics of 'Writing requirements in computer security'. Together they form a unique fingerprint.

Cite this