[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1095714.1095738acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
Article

Redefining computer literacy in the age of ubiquitous computing

Published: 20 October 2005 Publication History

Abstract

Most computer literacy courses encountered by college students in a non-technical major encompass a foundation set of computing skills including efficient use of word processing, spreadsheet, database, and presentation software. Yet current college graduates are facing fresh challenges as end-users in a work force transformed by legislation that is revolutionizing digital data communication, by nearly boundary-less computer systems that include mobile and static devices, and by employer expectations for safeguarding critical data resources. For example, data privacy legislation affects all end-users of computer systems in the workplace. As employees, new graduates will have access to critical data to perform their jobs, yet they could be the weakest link in an otherwise effectively secure computer system, primarily because of inadequate education, negligence, and inexperience. Technical and mathematical computer security has progressed substantially in the last few years, but new graduates are typically lacking in the knowledge of computer security as a fundamental component of their workplace roles. This paper proposes a computer literacy course content and structure that incorporates substantial practice in end-user computer security.

References

[1]
Acohido, Byron, and Jon Swartz. Are Hackers Using Your PC to Spam and Steal? In USA Today, 8 Sept. 2004. Available <http://www.usatoday.com/tech/news/computersecurity/2004-09-08-zombieuser_x.htm>.
[2]
Acohido, Byron, and Jon Swartz. Home PCs Not As Protected As Owners Think. In USA Today, 25 Oct. 2004. Available <http://www.usatoday.com/tech/news/2004-10-25-internet-security_x.htm>.
[3]
America Online. Available <http://www.aol.com/optimized/safetyandsecurity.adp>.
[4]
Anti Phishing Working Group. APWG Phishing Activity Trends Report, 28 Mar. 2005. Available <http://antiphishing.org/APWG_Phishin_Activity_Report_Feb05.pdf>.
[5]
Armstrong, Illena. It's Not Just Home Users Who Are To Blame. SC Magazine, June 21, 2005. Available http://www.scmagazine.com/features/index.cfm?fuseaction=FeatureDetails&newsUID=fc2a83f9-69ae-4343-bc58-5227c9fab5eb&newsType=Features
[6]
Cobb, Chey. Network Security for Dummies. Wiley, New York, 2003.
[7]
Dourish, Paul, et al. Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem, Personal and Ubiquitous Computing 8 (Sept. 2004), 391--401.
[8]
Greene, Thomas C. Computer Security for the Home and Small Office. APress,New York, NY. 2004.
[9]
Guzdial, Mark and Andrea Forte. Design Process for a Non-majors Computing Course. In Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education. (SIGCSE '05 )(St. Louis, Missouri, February 23-27). ACM Press, New York, NY, 2005, 361--365.
[10]
Computer Technology Industry Association. Internet Security Threats Increasing in Maliciousness and Criminal Intent, Computing Technology Industry Association Study Reveals. Available <http://www.comptia.org>. Path: Press Releases.
[11]
Kan, Michael. IT Field Now Faces Worker Shortage. In Richmond Times-Dispatch, 27 June 2005. Available <http://www.timesdispatch.com/servlet/Satellite?pagename=RTD%2FMGArticle%2FRTD_BasicArticle&c=MGArticle&cid=1031783515110&path=%21business&s=1045855934855>&cid=1031783515110&path=%21business&s=1045855934855>&path=%21business&s=1045855934855>&s=1045855934855>>.
[12]
Orgill, Gregory L., et al. The Urgency for Effective User-privacy Education to Counter Social Engineering Attacks on Secure Computer Systems. In Proceedings of the 5th Conference on Information Technology Education. (Conference on Information Technology Education) (Salt Lake City, Utah, 2004). ACM, New York, NY, 2004, 177--181.
[13]
Perez, Juan Carlos. Gartner: Security concerns to stunt e-commerce growth. In Computerworld, 24 June 2005. Available http://www.computerworld.com>. Path: QuickLink# 55252.
[14]
Sullivan, Andy. Hackers Score Big by Thinking Small, Experts Say. In Computerworld, 21 June 2005. Available <http://www.computerworld.com/securitytopics/security/cybercrime/story/0,10801,102654,00.html>.
[15]
Weinstein, Andrew, and Susan Engley. Largest In-Home Study of Home Computer Users Shows Major Online Threats, Perception Gap. National Cyber Security Alliance. 25 Oct. 2005. Available <http://www.staysafeonline.info>.
[16]
Whitman, Michael E., and Herbert J. Mattord, Principles of Information Security. Thomson Course Technology. Boston, Massachusetts, 2003.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGITE '05: Proceedings of the 6th conference on Information technology education
October 2005
402 pages
ISBN:1595932526
DOI:10.1145/1095714
  • General Chair:
  • Rob Friedman
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 October 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. home computer security
  2. laboratory activities
  3. pedagogy

Qualifiers

  • Article

Conference

SIGITE05
Sponsor:

Acceptance Rates

Overall Acceptance Rate 176 of 429 submissions, 41%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2020)First year students’ experience in a Cyber World course – an evaluationEducation and Information Technologies10.1007/s10639-020-10274-5Online publication date: 15-Aug-2020
  • (2013)High school computing teachers' beliefs and practicesComputers & Education10.5555/2974070.297419468:C(141-152)Online publication date: 1-Oct-2013
  • (2012)On Spam Susceptibility and Browser UpdatingInternational Journal of Systems and Service-Oriented Engineering10.4018/jssoe.20120101033:1(44-57)Online publication date: 1-Jan-2012
  • (2011)Introductory computing course contentProceedings of the 2011 conference on Information technology education10.1145/2047594.2047610(55-60)Online publication date: 20-Oct-2011
  • (2010)Computer literacy revisitedACM Inroads10.1145/1805724.18057361:2(30-33)Online publication date: 1-Jun-2010
  • (2006)Don't be a phishProceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education10.1145/1140124.1140187(237-241)Online publication date: 26-Jun-2006
  • (2006)Don't be a phishACM SIGCSE Bulletin10.1145/1140123.114018738:3(237-241)Online publication date: 26-Jun-2006

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media