Writing requirements in computer security

Stefan Robila, Carl Bredlau

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

1 Citation (Scopus)

Abstract

This paper presents suggestions in incorporating essays in a Computer Security course. The first approach is a short essay that presents the student's personal view on computer security within the campus. In the paper, s/he uses information from the university's IT website and documents, as well as security disclosures of websites and software applications. This assignment is presented at the beginning of the course and serves as a basis of discussion both for the development of writing skills and for the identification of vulnerabilities faced by the campus community on the intranet and Internet illustrating the need for clear written regulations in IT security. The second approach requires an extended essay that describes the work performed in a term project. The essay assignment is developed in several stages that include a summary proposal, partial and complete drafts and final paper. The writing requires the student to go through all the steps needed to develop a significant scientific paper. The work must be original, supported by extensive literature review and follow a topic relevant to computer security. The essay development is complemented by ongoing class discussion of scientific papers, and by an in class presentation. The course was already piloted with the extended essay version and has received significant positive feedback from the students. It was recently approved to fit the Graduation Writing Requirements at our institution.

Original languageEnglish
Title of host publicationProceedings of the 6th Conference on Information Technology Education, SIGITE 2005
Pages385-386
Number of pages2
DOIs
StatePublished - 1 Dec 2005
Event6th ACM SIG-Information Technology Education Conference, SIGITE 2005 - Newark, NJ, United States
Duration: 20 Oct 200522 Oct 2005

Other

Other6th ACM SIG-Information Technology Education Conference, SIGITE 2005
CountryUnited States
CityNewark, NJ
Period20/10/0522/10/05

Fingerprint

Security of data
Students
Websites
Intranets
Information use
Application programs
Internet
Feedback

Keywords

  • communication
  • computer security
  • pedagogy
  • writing

Cite this

Robila, S., & Bredlau, C. (2005). Writing requirements in computer security. In Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005 (pp. 385-386) https://doi.org/10.1145/1095714.1095804
Robila, Stefan ; Bredlau, Carl. / Writing requirements in computer security. Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005. 2005. pp. 385-386
@inproceedings{4f60c0e42f21455a8ab93deaf407f029,
title = "Writing requirements in computer security",
abstract = "This paper presents suggestions in incorporating essays in a Computer Security course. The first approach is a short essay that presents the student's personal view on computer security within the campus. In the paper, s/he uses information from the university's IT website and documents, as well as security disclosures of websites and software applications. This assignment is presented at the beginning of the course and serves as a basis of discussion both for the development of writing skills and for the identification of vulnerabilities faced by the campus community on the intranet and Internet illustrating the need for clear written regulations in IT security. The second approach requires an extended essay that describes the work performed in a term project. The essay assignment is developed in several stages that include a summary proposal, partial and complete drafts and final paper. The writing requires the student to go through all the steps needed to develop a significant scientific paper. The work must be original, supported by extensive literature review and follow a topic relevant to computer security. The essay development is complemented by ongoing class discussion of scientific papers, and by an in class presentation. The course was already piloted with the extended essay version and has received significant positive feedback from the students. It was recently approved to fit the Graduation Writing Requirements at our institution.",
keywords = "communication, computer security, pedagogy, writing",
author = "Stefan Robila and Carl Bredlau",
year = "2005",
month = "12",
day = "1",
doi = "10.1145/1095714.1095804",
language = "English",
isbn = "1595932526",
pages = "385--386",
booktitle = "Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005",

}

Robila, S & Bredlau, C 2005, Writing requirements in computer security. in Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005. pp. 385-386, 6th ACM SIG-Information Technology Education Conference, SIGITE 2005, Newark, NJ, United States, 20/10/05. https://doi.org/10.1145/1095714.1095804

Writing requirements in computer security. / Robila, Stefan; Bredlau, Carl.

Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005. 2005. p. 385-386.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

TY - GEN

T1 - Writing requirements in computer security

AU - Robila, Stefan

AU - Bredlau, Carl

PY - 2005/12/1

Y1 - 2005/12/1

N2 - This paper presents suggestions in incorporating essays in a Computer Security course. The first approach is a short essay that presents the student's personal view on computer security within the campus. In the paper, s/he uses information from the university's IT website and documents, as well as security disclosures of websites and software applications. This assignment is presented at the beginning of the course and serves as a basis of discussion both for the development of writing skills and for the identification of vulnerabilities faced by the campus community on the intranet and Internet illustrating the need for clear written regulations in IT security. The second approach requires an extended essay that describes the work performed in a term project. The essay assignment is developed in several stages that include a summary proposal, partial and complete drafts and final paper. The writing requires the student to go through all the steps needed to develop a significant scientific paper. The work must be original, supported by extensive literature review and follow a topic relevant to computer security. The essay development is complemented by ongoing class discussion of scientific papers, and by an in class presentation. The course was already piloted with the extended essay version and has received significant positive feedback from the students. It was recently approved to fit the Graduation Writing Requirements at our institution.

AB - This paper presents suggestions in incorporating essays in a Computer Security course. The first approach is a short essay that presents the student's personal view on computer security within the campus. In the paper, s/he uses information from the university's IT website and documents, as well as security disclosures of websites and software applications. This assignment is presented at the beginning of the course and serves as a basis of discussion both for the development of writing skills and for the identification of vulnerabilities faced by the campus community on the intranet and Internet illustrating the need for clear written regulations in IT security. The second approach requires an extended essay that describes the work performed in a term project. The essay assignment is developed in several stages that include a summary proposal, partial and complete drafts and final paper. The writing requires the student to go through all the steps needed to develop a significant scientific paper. The work must be original, supported by extensive literature review and follow a topic relevant to computer security. The essay development is complemented by ongoing class discussion of scientific papers, and by an in class presentation. The course was already piloted with the extended essay version and has received significant positive feedback from the students. It was recently approved to fit the Graduation Writing Requirements at our institution.

KW - communication

KW - computer security

KW - pedagogy

KW - writing

UR - http://www.scopus.com/inward/record.url?scp=84885658365&partnerID=8YFLogxK

U2 - 10.1145/1095714.1095804

DO - 10.1145/1095714.1095804

M3 - Conference contribution

SN - 1595932526

SN - 9781595932525

SP - 385

EP - 386

BT - Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005

ER -

Robila S, Bredlau C. Writing requirements in computer security. In Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005. 2005. p. 385-386 https://doi.org/10.1145/1095714.1095804