Organizing and implementing the internship component of undergraduate programs in IS Security
- 266 Downloads
This paper describes experiences in organizing and running an internship component of an undergraduate program in information systems security. In 2004, Sheridan College Institute of Technology and Advanced Learning introduced a novel Bachelor in Applied Information Sciences (Information Systems Security) program. The intent was to educate well-rounded specialists in the field and provide them with valuable work experience during the 8-month long co-op term. The research presented here is based on the co-op officer reports, statistics reported by the co-op office, interviews with the students and other anecdotal data mainly collected through conversations with the involved parties. Besides providing facts that speak to the quality of the program and appropriate organization of the job placements, the authors critically examine successes and challenges encountered in this process. Comparison with other information systems security postsecondary programs in Ontario, Canada, is given based on type of program, characteristics and focus of curriculum content and length of internship.
KeywordsInformation systems security Curriculum development Internship
- Ayoub, R., Chin, A., & Parberry, I. (2005). A new model for a student cyber security organization. Proceedings of the 2nd Annual Conference on Information Security Curriculum Development, September 23–24, pp. 12–15.Google Scholar
- Bailey, T., Hughes, K., & Barr, T. (2000). Achieving scale and quality in school-to-work internships: Findings from two employer surveys. Educational Evaluation and Policy Analysis, 22(1), 41–64.Google Scholar
- Borg, W. R., & Gall, M. D. (1989). Educational research: An introduction (5th ed.). New York: Longman.Google Scholar
- Career Development Center of the Southern Illinois University. (2008). Internship Online Information, retrieved February 20, 2009, from www.siue.edu/careerdevelopmentcenter.
- CERIAS. (2001). Security Visionary Roundtable Call to Action, retrieved March 30, 2008, from www.cerias.purdue.edu/news_end_events/events/securitytrends/accenture_exec_sum_1q2001.pdf.
- Creswell, J. W. (2005). Educational research: Planning, Conducting and Evaluating Quantitative and Qualitative Research. (2e) New Jersey: Pearson Education, Upper Saddle River.Google Scholar
- Crowley, E. (2003). Information system security curricula development. Proceedings of the 4th Conference on IT Curriculum, October 16–18, pp. 249–255.Google Scholar
- Krippendorff, K. (2004). Content analysis: An introduction to its methodology (2nd ed.). Thousand Oaks: Sage Publications.Google Scholar
- Perrone, L. F., Auberdene, M., & Meng, X. (2005). Approaches to Undergraduate Instruction in Computer Security. Proceedings of the American Society for Engineering Education Annual Conference and Exposition, ASEE 2005, retrieved March 30, 2009, from http://www.ists.dartmouth.edu/library/116.pdf.
- Ralevich, V., & Martinovic, D. (2007). Experience of designing and implementing an applied degree program in Information Systems Security. Proceedings of the i-Society 2007, October 7–10, pp. 24–29.Google Scholar
- Schlichting, C., & Mason, J. (2005). The computer curriculum and certification: A proposal. Journal of Computing Sciences in Colleges, 20(4), 84–91.Google Scholar
- Stockman, M., Christopherson, C., Said, H., & Nyland, J. (2004). An Implementation of a Networking Track in an Information Technology Degree Program. Proceedings of the 5th Conference on Information Technology Education (formerly CITC), October 28–30, pp. 138–143.Google Scholar
- Wieler, S. S., & Bailey, T. R. (1997). Going to scale: Employer participation in school-to-work programs at LaGuardia community college. Educational Evaluation and Policy Analysis, 19(2), 123–140.Google Scholar
- Whitman, M., & Mattord, H. (2004a). Designing and teaching information security curriculum. Proceedings of the InfoSecCD Conference ’04, October 8, pp. 1–7.Google Scholar
- Whitman, M., & Mattord, H. (2004b). A draft curriculum model for programs of study in information security and assurance, retrieved March 30, 2009, from http://infosec.kennesaw.edu/InfoSecCurriculumModel.pdf.