Advertisement

Education and Information Technologies

, Volume 17, Issue 1, pp 27–48 | Cite as

Organizing and implementing the internship component of undergraduate programs in IS Security

  • Victor Ralevich
  • Dragana Martinovic
Article

Abstract

This paper describes experiences in organizing and running an internship component of an undergraduate program in information systems security. In 2004, Sheridan College Institute of Technology and Advanced Learning introduced a novel Bachelor in Applied Information Sciences (Information Systems Security) program. The intent was to educate well-rounded specialists in the field and provide them with valuable work experience during the 8-month long co-op term. The research presented here is based on the co-op officer reports, statistics reported by the co-op office, interviews with the students and other anecdotal data mainly collected through conversations with the involved parties. Besides providing facts that speak to the quality of the program and appropriate organization of the job placements, the authors critically examine successes and challenges encountered in this process. Comparison with other information systems security postsecondary programs in Ontario, Canada, is given based on type of program, characteristics and focus of curriculum content and length of internship.

Keywords

Information systems security Curriculum development Internship 

References

  1. Ayoub, R., Chin, A., & Parberry, I. (2005). A new model for a student cyber security organization. Proceedings of the 2nd Annual Conference on Information Security Curriculum Development, September 23–24, pp. 12–15.Google Scholar
  2. Bailey, T., Hughes, K., & Barr, T. (2000). Achieving scale and quality in school-to-work internships: Findings from two employer surveys. Educational Evaluation and Policy Analysis, 22(1), 41–64.Google Scholar
  3. Borg, W. R., & Gall, M. D. (1989). Educational research: An introduction (5th ed.). New York: Longman.Google Scholar
  4. Career Development Center of the Southern Illinois University. (2008). Internship Online Information, retrieved February 20, 2009, from www.siue.edu/careerdevelopmentcenter.
  5. CERIAS. (2001). Security Visionary Roundtable Call to Action, retrieved March 30, 2008, from www.cerias.purdue.edu/news_end_events/events/securitytrends/accenture_exec_sum_1q2001.pdf.
  6. Creswell, J. W. (2005). Educational research: Planning, Conducting and Evaluating Quantitative and Qualitative Research. (2e) New Jersey: Pearson Education, Upper Saddle River.Google Scholar
  7. Crowley, E. (2003). Information system security curricula development. Proceedings of the 4th Conference on IT Curriculum, October 16–18, pp. 249–255.Google Scholar
  8. Krippendorff, K. (2004). Content analysis: An introduction to its methodology (2nd ed.). Thousand Oaks: Sage Publications.Google Scholar
  9. O’Leary, M. (2006). A laboratory based capstone course in computer security for undergraduates. ACM SIGCSE Bulletin, 38(1), 2–6.CrossRefGoogle Scholar
  10. Perrone, L. F., Auberdene, M., & Meng, X. (2005). Approaches to Undergraduate Instruction in Computer Security. Proceedings of the American Society for Engineering Education Annual Conference and Exposition, ASEE 2005, retrieved March 30, 2009, from http://www.ists.dartmouth.edu/library/116.pdf.
  11. Ralevich, V., & Martinovic, D. (2007). Experience of designing and implementing an applied degree program in Information Systems Security. Proceedings of the i-Society 2007, October 7–10, pp. 24–29.Google Scholar
  12. Ralevich, V., & Martinovic, D. (2010). Designing and implementing an undergraduate program in information system security. Education and Information Technology, Springer. doi: 10.1007/s10639-010-9123-y.Google Scholar
  13. Schlichting, C., & Mason, J. (2005). The computer curriculum and certification: A proposal. Journal of Computing Sciences in Colleges, 20(4), 84–91.Google Scholar
  14. Stockman, M., Christopherson, C., Said, H., & Nyland, J. (2004). An Implementation of a Networking Track in an Information Technology Degree Program. Proceedings of the 5th Conference on Information Technology Education (formerly CITC), October 28–30, pp. 138–143.Google Scholar
  15. Wieler, S. S., & Bailey, T. R. (1997). Going to scale: Employer participation in school-to-work programs at LaGuardia community college. Educational Evaluation and Policy Analysis, 19(2), 123–140.Google Scholar
  16. Whitman, M., & Mattord, H. (2004a). Designing and teaching information security curriculum. Proceedings of the InfoSecCD Conference ’04, October 8, pp. 1–7.Google Scholar
  17. Whitman, M., & Mattord, H. (2004b). A draft curriculum model for programs of study in information security and assurance, retrieved March 30, 2009, from http://infosec.kennesaw.edu/InfoSecCurriculumModel.pdf.

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  1. 1.School of Applied Computing and Engineering SciencesSheridan Institute of Technology and Advanced LearningOakvilleCanada
  2. 2.Faculty of EducationUniversity of WindsorWindsorCanada

Personalised recommendations