publication . Article . 2015

Embedding Ethics in System Administration Education

van der Ham, J.;
Open Access English
  • Published: 01 Jan 2015
Computer and network security cases continue to rise each year, playing an important role within our society. With a growing job market in this field, there remains little formal education at the high school level to become familiar with this profession. We proposed to develop an interactive computer and network security game which differs from other security-based games previously created, as it does not focus only on computer science security. Our development focuses on a wide range of topics and layers of the OSI Model to offer computer and network security education critical in areas of network and system administration. We have created a storyline, in which...
acm: ComputingMilieux_PERSONALCOMPUTING
20 references, page 1 of 2

Computer Systems Laboratory at Sungkyunkwan University. 2015. The OpenSSD Project. (2015). Retrieved 9 Septemeber 2015 from OpenSSD Project

S Baase. 2012. A Gift of Fire: Social, Legal, and Ethical Issues for Computers and Internet. Prentice Hall, Upper Saddle River, New Jersey.

M. Bailey and E. Kenneally. 2014a. Cyber-security Research Ethics Dialogue & Strategy (CREDS) Workshop, CREDS II - The Sequel . (2014). Retrieved 28 July 2015 from

M. Bailey and E. Kenneally. 2014b. Cyber-security Research Ethics Dialogue & Strategy (CREDS) Workshop Report. ACM SIGCOMM Computer Communication Review (CCR) 44, 2 (Apr 2014), 76-79.

Terrell Bynum. 2014. Computer and Information Ethics. In The Stanford Encyclopedia of Philosophy (winter 2014 ed.), Edward N. Zalta (Ed.).

National Cyber Security Centre. 2013. Responsible Disclosure Guideline. (2013). Retrieved 29 July 2015 from https://www.

SAGE Executive Committee. 2003. System Administrators' Code of Ethics. (2003). Retrieved 27 July 2015 from https: //

J Daniel Couger. 1989. Preparing IS students to deal with ethical issues. Mis Quarterly (1989), 211-218.

ACM council. 1992. ACM Code of Ethics and Professional Conduct. (1992). Retrieved 27 July 2015 from https://www.acm. org/about/code-of-ethics

Sven Dietrich, Jeroen Van Der Ham, Aiko Pras, Roland van Rijswijk Deij, Darren Shou, Anna Sperotto, Aimee Van Wynsberghe, and Lenore D Zuck. 2014. Ethics in data sharing: developing a model for best practice. In 2014 IEEE Security and Privacy Workshops (SPW). IEEE, 5-9.

Gordana Dodig-Crnkovic. 2004. On the importance of teaching professional ethics to computer science students. In Computing and Philosophy Conference, E-CAP. Citeseer.

Google. 2015. Google Developers: Public DNS. (2015). Retrieved 30 July 2015 from public-dns/

Erin Kenneally. 2015. How to throw the race to the bottom: revisiting signals for ethical and legal research using online data. ACM SIGCAS Computers and Society 45, 1 (2015), 4-10.

NVAO. 2014. Assessment report Master System and Network Engineering, University of Amsterdam. (2014). https://search. rapport%20UvA%20wo-ma%20System%20and%20Network%20Engineering.pdf

RIPE NCC. 2014. RIPE Atlas. (2014). Retrieved 30 July 2015 from

20 references, page 1 of 2
Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue