Skip to main content

Designing a Cybersecurity Curriculum Library: Best Practices from Digital Library Research

  • Conference paper
  • First Online:
National Cyber Summit (NCS) Research Track 2021 (NCS 2021)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 310))

Included in the following conference series:

Abstract

The global cybersecurity crisis has forced academic institutions to expand cybersecurity education, and accessible, quality cybersecurity curriculum is needed. The CLARK cybersecurity curriculum resource library is a large-scale Design Science Research project intended to address critical demands in cybersecurity. This paper focuses on the need for a living digital library, surveys current cybersecurity repositories, and discusses factors that determine the success of a digital library. We also discuss CLARK, a multifaceted solution that includes various lenses for building and sustaining a living library of cybersecurity curriculum.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    ACM/IEEE-CS Joint Task Force on Computing Curricula 2013. Computer Science Curricula 2013.

  2. 2.

    Catalyzing Computing and Cybersecurity in Community Colleges (C5).

  3. 3.

    ACM/IEEE-CS Joint Task Force on Computing Curricula. 2013. Computer Science Curricula 2013. ACM Press and IEEE Computer Society Press. https://doi.org/10.1145/2534860

  4. 4.

    Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity (CSEC 2017).

References

  • Calhoun, K.: Exploring Digital Libraries: Foundations, Practice, Prospects. Facet Publishing, Abingdon (2014)

    Google Scholar 

  • CSTA Source Online K-12 Repository | CSTA Source (n.d.)

    Google Scholar 

  • Curated Collections | NSDL (n.d.)

    Google Scholar 

  • Dark, M., Kaza, S., LaFountain, S., Taylor, B.: The cyber cube: a multifaceted approach for a living cybersecurity curriculum library. In: The Colloquium for Information Systems Security Education (CISSE) (2018)

    Google Scholar 

  • Hagerott, M., Stavridis, J.: Home – article – Trump’s big defense … – foreign policy guide. Foreign Policy Guide (2017). https://fpguide.foreignpolicy.com/article-trumps-big-defense/

  • Home - SkillsCommons Repository (n.d.). http://www.skillscommons.org/. Accessed 27 Jan 2021

  • Jeng, J.: What is usability in the context of the digital library and how can it be measured? Inf. Technol. Libr. 24(2), 47–56 (2005). https://doi.org/10.6017/ital.v24i2.3365

    Article  Google Scholar 

  • Kortemeyer, G.: Ten years later: why open educational resources have not noticeably affected higher education, and why we should care. Educ. Rev. 1–8 (2013)

    Google Scholar 

  • Library - National CyberWatch Center: National CyberWatch Center (n.d.)

    Google Scholar 

  • Marchionini, G., Plaisant, C., Komlodi, A.: The people in digital libraries: multifaceted approaches to assessing needs and impact. In: Digital Library Use: Social Practice in Design and Evaluation. MIT Press, Cambridge (2003). https://doi.org/10.7551/mitpress/2424.003.0009

  • Mullins, P., et al.: Panel on integrating security concepts into existing computer courses. In: Proceedings of the 33rd SIGCSE Technical Symposium on Computer Science Education - SIGCSE 2002, vol. 34, no. 1, p. 365 (2002). https://doi.org/10.1145/563340.563480

  • National Research Council: Knowing what students know: the science and design of educational assessment. Issues Sci. Technol. 19, 48–52 (2001)

    Google Scholar 

  • Peffers, K., Tuunanen, T., Rothenberger, M.A., Chatterjee, S.: A design science research methodology for information systems research. J. Manag. Inf. Syst. 24(3), 45–77 (2007). https://doi.org/10.2753/MIS0742-1222240302

    Article  Google Scholar 

  • Search Instructional Materials | EngageCSEdu (n.d.)

    Google Scholar 

  • Shipman, F.M., et al.: Ensemble: a distributed portal for the distributed community of computing education. In: Lalmas, M., Jose, J., Rauber, A., Sebastiani, F., Frommholz, I. (eds.) ECDL 2010. LNCS, vol. 6273, pp. 506–509. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15464-5_68

    Chapter  Google Scholar 

  • Software Assurance Materials and Artifacts | The CERT Division (n.d.)

    Google Scholar 

  • Spafford, E.: New Approaches to Cybersecurity Education (NACE) Workshop (2018). https://www.cerias.purdue.edu/site/nace/

  • Wiggins, G.: Educative Assessment: Designing Assessments to Inform and Improve Student Performance. Jossey-Bass, San Francisco (1999). https://doi.org/10.5860/choice.36-2887

  • Zhang, Y.: Developing a holistic model for digital library evaluation. J. Am. Soc. Inf. Sci. Technol. 61(1), 88–110 (2010). https://doi.org/10.1002/asi.21220

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Blair Taylor .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Taylor, B., Kaza, S., Dark, M. (2022). Designing a Cybersecurity Curriculum Library: Best Practices from Digital Library Research. In: Choo, KK.R., Morris, T., Peterson, G., Imsand, E. (eds) National Cyber Summit (NCS) Research Track 2021. NCS 2021. Lecture Notes in Networks and Systems, vol 310. Springer, Cham. https://doi.org/10.1007/978-3-030-84614-5_5

Download citation

Publish with us

Policies and ethics