{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:29Z","timestamp":1750307909597,"version":"3.41.0"},"reference-count":51,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2006,9,1]],"date-time":"2006-09-01T00:00:00Z","timestamp":1157068800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["J. Educ. Resour. Comput."],"published-print":{"date-parts":[[2006,9]]},"abstract":"<jats:p>A novel idea for information security education created by the New York State Center for Information Forensics and Assurance (CIFA) is presented. This new approach incorporates a teaching hospital model originally developed for medical training. In this model, information security problems from industry and government are solved and abstracted into living-cases used for training and education of university students and public-sector employees. Such a model helps ensure that the curriculum stays current even as the field of information assurance continues to evolve. Solving industry problems hones research skills, while exposing students to living cases helps build context for concepts in information assurance. The success of this approach is contingent upon strong partnerships with government and private organizations that have real security issues as well as an active research program in information security that involves faculty and students. This article presents an implementation of this approach at CIFA. Development of the curriculum, observations gleaned through dissemination of the curriculum, and the infrastructure developed to support this concept are discussed. Evaluation of students has demonstrated the effectiveness of the \u201cteaching hospital\u201d concept and provided us with feedback to further refine its implementation.<\/jats:p>","DOI":"10.1145\/1243481.1243483","type":"journal-article","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T14:37:11Z","timestamp":1181140631000},"page":"2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Innovative model for information assurance curriculum"],"prefix":"10.1145","volume":"6","author":[{"given":"Sanjay","family":"Goel","sequence":"first","affiliation":[{"name":"The University at Albany, State University of New York, and New York State Center for Information Forensics and Assurance, Albany, NY"}]},{"given":"Damira","family":"Pon","sequence":"additional","affiliation":[{"name":"The University at Albany, State University of New York, and New York State Center for Information Forensics and Assurance, Albany, NY"}]},{"given":"Peter","family":"Bloniarz","sequence":"additional","affiliation":[{"name":"New York State Center for Information Forensics and Assurance"}]},{"given":"Robert","family":"Bangert-Drowns","sequence":"additional","affiliation":[{"name":"New York State Center for Information Forensics and Assurance"}]},{"given":"George","family":"Berg","sequence":"additional","affiliation":[{"name":"New York State Center for Information Forensics and Assurance"}]},{"given":"Vince","family":"Delio","sequence":"additional","affiliation":[{"name":"New York State Center for Information Forensics and Assurance"}]},{"given":"Laura","family":"Iwan","sequence":"additional","affiliation":[{"name":"New York State Center for Information Forensics and Assurance"}]},{"given":"Thomas","family":"Hurbanek","sequence":"additional","affiliation":[{"name":"New York State Center for Information Forensics and Assurance"}]},{"given":"Sandoor P.","family":"Schuman","sequence":"additional","affiliation":[{"name":"New York State Center for Information Forensics and Assurance"}]},{"given":"Jagdish","family":"Gangolly","sequence":"additional","affiliation":[{"name":"New York State Center for Information Forensics and Assurance"}]},{"given":"Adnan","family":"Baykal","sequence":"additional","affiliation":[{"name":"New York State Center for Information Forensics and Assurance"}]},{"given":"Jon","family":"Hobbs","sequence":"additional","affiliation":[{"name":"New York State Center for Information Forensics and Assurance"}]}],"member":"320","published-online":{"date-parts":[[2006,9]]},"reference":[{"first-page":"1","volume-title":"Proceedings of the 30th ASEE\/IEEE Frontiers in Education Conference","author":"Azadivar F.","key":"e_1_2_1_1_1"},{"key":"e_1_2_1_2_1","first-page":"17","article-title":"Theory into practice: How do we link? In Constructivism and Technology of Instruction: A Conversation, T.M Duffy and D.H. Jonassen (eds.), Lawrence Erlbaum Associates, Hillsdale","author":"Bednar A.K.","year":"1998","journal-title":"NJ"},{"volume-title":"Proceedings of the 29th SIGCSE Technical Symposium on Computer Science Education","year":"1998","author":"Ben-Ari M.","key":"e_1_2_1_3_1"},{"volume-title":"Learning and the Educational Process, J.D. Krumboltz (ed), Rand McNally","author":"Berlyne D.E.","key":"e_1_2_1_4_1"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/4434.895087"},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Bishop M. and Frincke D. 2004. Joining the security education community. IEEE Security&amp;Privacy (Sept.\/Oct) 61-63. 10.1109\/MSP.2004.75   Bishop M. and Frincke D. 2004. Joining the security education community. IEEE Security&amp;Privacy (Sept.\/Oct) 61-63. 10.1109\/MSP.2004.75","DOI":"10.1109\/MSP.2004.75"},{"volume-title":"Handbook 1: Cognitive Domain.","author":"Bloom B.S.","key":"e_1_2_1_7_1"},{"key":"e_1_2_1_8_1","unstructured":"Boud D. and Feletti G. 1991. The Challenge of Problem-Eased Learning. Kogan Page London.  Boud D. and Feletti G. 1991. The Challenge of Problem-Eased Learning. Kogan Page London."},{"key":"e_1_2_1_9_1","unstructured":"Brooks J.G. and Brooks M.G. 1993. The Case for Constructivist Classrooms. Association for Supervision and Curriculum Development. Alexandria VA.  Brooks J.G. and Brooks M.G. 1993. The Case for Constructivist Classrooms. Association for Supervision and Curriculum Development. Alexandria VA."},{"first-page":"243","volume-title":"3rd Annual World Conference on Information Security Education (WISE3","author":"Conti G.","key":"e_1_2_1_10_1"},{"key":"e_1_2_1_11_1","unstructured":"Dark M. and Davis J. 2002. Report on information assurance curriculum development. Curriculum Development Workshop CERIAS. http:\/\/www.cerias.purdue.edu\/education\/post_secondary_education\/undergrad_and_grad\/curriculum_development\/information_assurance\/report_info_assurance_cur_dev.pdf.  Dark M. and Davis J. 2002. Report on information assurance curriculum development. Curriculum Development Workshop CERIAS. http:\/\/www.cerias.purdue.edu\/education\/post_secondary_education\/undergrad_and_grad\/curriculum_development\/information_assurance\/report_info_assurance_cur_dev.pdf."},{"key":"e_1_2_1_12_1","unstructured":"Dick W. and Carey L. 1990. The Systematic Design Of Instruction. Harper Collins New York.  Dick W. and Carey L. 1990. The Systematic Design Of Instruction. Harper Collins New York."},{"key":"e_1_2_1_13_1","first-page":"6","article-title":"Problem based learning in physics: the power of students teaching students","volume":"47","author":"Duch B.","year":"1995","journal-title":"About Teaching"},{"key":"e_1_2_1_14_1","unstructured":"Duffy T.M. and Jonassen D.H. 1992. Constructivist and the Technology of Instruction: A Conversation. Lawrence Erlbaum Associates Hillsdale NJ.  Duffy T.M. and Jonassen D.H. 1992. Constructivist and the Technology of Instruction: A Conversation. Lawrence Erlbaum Associates Hillsdale NJ."},{"edition":"4","volume-title":"Conditions of Learning","author":"Gagn\u00e9 R.M.","key":"e_1_2_1_15_1"},{"volume-title":"Developing an integrated security training, awareness, and education program gsec practical assignment version 1.4b","author":"Gilbert C.","key":"e_1_2_1_16_1"},{"key":"e_1_2_1_17_1","unstructured":"Goel S. Baykal A. and Pon D. Botnets: the anatomy of a case. Journal of Information Systems Security (accepted).  Goel S. Baykal A. and Pon D. Botnets: the anatomy of a case. Journal of Information Systems Security (accepted)."},{"volume-title":"Proceedings of the Information Resource Management Association (IRMA) International Conference","author":"Goel S.","key":"e_1_2_1_18_1"},{"key":"e_1_2_1_19_1","unstructured":"Goel S. and Pon D. Information security risk analysis: A pedagogic model based on a teaching hospital. Accepted for publication in Tools for Teaching Computer Networking and Hardware Concepts N. Sarkar ed.  Goel S. and Pon D. Information security risk analysis: A pedagogic model based on a teaching hospital. Accepted for publication in Tools for Teaching Computer Networking and Hardware Concepts N. Sarkar ed."},{"key":"e_1_2_1_20_1","first-page":"1","article-title":"CSI\/FBI computer crime and security survey","author":"Gordon L.A.","year":"2004","journal-title":"Computer Security Institute Publications"},{"volume-title":"Instructional Design Theories and Models: A New Paradigm of Instructional Theory","author":"Hannafin M.","key":"e_1_2_1_21_1"},{"volume-title":"Proceedings of the 7th Colloquium for Information Systems Security Education (Washington, D.C., June).","author":"Hoffman L.J.","key":"e_1_2_1_22_1"},{"issue":"3","key":"e_1_2_1_23_1","first-page":"211","article-title":"Information systems security education: Redressing the balance of theory and practice","volume":"13","author":"Hsu C.","year":"2002","journal-title":"Journal of Information Systems Education"},{"key":"e_1_2_1_24_1","first-page":"139","volume-title":"Proceedings of the IFIP TC11 WC 11.8 First Workd Conference on Information Security Education","author":"Irvine C.E.","year":"1999"},{"key":"e_1_2_1_25_1","first-page":"E03","volume-title":"CA","author":"Irvine C.E.","year":"2003"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.735847"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/248739.248741"},{"key":"e_1_2_1_28_1","first-page":"31","article-title":"Action research: cooperative learning in the science classroom","volume":"24","author":"Johnson R.T.","year":"1986","journal-title":"Science and Children"},{"volume-title":"Instructional Design Theories and Models: A New Paradigm of Instructional Theory","author":"Jonassen D.H.","key":"e_1_2_1_29_1"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02296434"},{"first-page":"24","volume-title":"Proceedings of the 32nd ASEE\/IEEE Frontiers in Education Conference","author":"Kramer B.A.","key":"e_1_2_1_31_1"},{"key":"e_1_2_1_32_1","unstructured":"Kumar K. Weiqing S. Rana P. Li T. and Sekar R. 2005. V-NetLab: A cost-effective platform to support course projects in computer security. In The 9th Annual Colloquium for Information Systems Security Education (CISSE Atlanta GA June) USENIX Association Berkeley CA. Retrieved on May 7 2006 from http:\/\/seclab.cs.sunysb.edu\/seclab\/pubs\/papers\/ncisse05.pdf 1-7.  Kumar K. Weiqing S. Rana P. Li T. and Sekar R. 2005. V-NetLab: A cost-effective platform to support course projects in computer security. In The 9th Annual Colloquium for Information Systems Security Education (CISSE Atlanta GA June) USENIX Association Berkeley CA. Retrieved on May 7 2006 from http:\/\/seclab.cs.sunysb.edu\/seclab\/pubs\/papers\/ncisse05.pdf 1-7."},{"key":"e_1_2_1_33_1","unstructured":"Management of America Inc. 1999. Accredited models for clinical training of physicians in medical schools that operate without a teaching hospital under the control of the university. Florida State University. http:\/\/med.fsu.edu\/pdf\/03_clin_training_of_phys.pdf.  Management of America Inc. 1999. Accredited models for clinical training of physicians in medical schools that operate without a teaching hospital under the control of the university. Florida State University. http:\/\/med.fsu.edu\/pdf\/03_clin_training_of_phys.pdf."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/10720530490273917"},{"issue":"9","key":"e_1_2_1_35_1","first-page":"1","article-title":"The implications of information assurance and security crisis on computing model curricula","volume":"1","author":"Mcginnis D.R.","year":"2003","journal-title":"Information Systems Education Journal"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1177\/002248719104200402"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1021\/ed075p135"},{"volume-title":"Criteria for measurement","author":"National Security Agency. 1999.","key":"e_1_2_1_38_1"},{"key":"e_1_2_1_39_1","unstructured":"Needham D. 2001. A case study of case studies: Producing real world learning within the business classroom. ultiBASE Articles. http:\/\/ultibase.rmit.edu.au\/Articles\/nov01\/needhaml.htm.  Needham D. 2001. A case study of case studies: Producing real world learning within the business classroom. ultiBASE Articles. http:\/\/ultibase.rmit.edu.au\/Articles\/nov01\/needhaml.htm."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1097\/00001888-199209000-00002"},{"volume-title":"Case-based teaching and constructivism: Carpenters and tools","author":"Riesbeck C.K.","key":"e_1_2_1_41_1"},{"volume-title":"Artificial Intelligence: Modern Approach","year":"1995","author":"Russell S.J.","key":"e_1_2_1_42_1"},{"key":"e_1_2_1_43_1","unstructured":"Samford University. 2003. PBL background: definitions. Problem Based Learning at Samford University. http:\/\/www.samford.edu\/pbl\/definitions.html.  Samford University. 2003. PBL background: definitions. Problem Based Learning at Samford University. http:\/\/www.samford.edu\/pbl\/definitions.html."},{"key":"e_1_2_1_44_1","first-page":"25","article-title":"Problem-based learning: As authentic as it gets","author":"Stepien W.","year":"1993","journal-title":"Educational Leadership"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1177\/016235329301600402"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024744613867"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.3928\/0022-0124-20030101-07"},{"volume-title":"Cooperative Learning: A Guide to Research.","year":"1991","author":"Totten S.","key":"e_1_2_1_48_1"},{"key":"e_1_2_1_49_1","unstructured":"United States. 2003. Priority III: A national cyberspace security awareness and training program. The National Strategy to Secure Cyberspace. http:\/\/www.whitehouse.gov\/pcipb\/priority_3.pdf.  United States. 2003. Priority III: A national cyberspace security awareness and training program. The National Strategy to Secure Cyberspace. http:\/\/www.whitehouse.gov\/pcipb\/priority_3.pdf."},{"issue":"6","key":"e_1_2_1_50_1","first-page":"5","article-title":"A recursive, reflective instructional design model based on constructivist-interpretivist theory","volume":"30","author":"Willis J.","year":"1995","journal-title":"Educational Technology"},{"issue":"4","key":"e_1_2_1_51_1","first-page":"11","article-title":"Cognitive dissonance as an instructional variable","volume":"43","author":"Wilson E.G.","year":"1991","journal-title":"Ohio Media Spectrum"}],"container-title":["Journal on Educational Resources in Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1243481.1243483","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1243481.1243483","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:49Z","timestamp":1750258069000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1243481.1243483"}},"subtitle":["A teaching hospital"],"short-title":[],"issued":{"date-parts":[[2006,9]]},"references-count":51,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2006,9]]}},"alternative-id":["10.1145\/1243481.1243483"],"URL":"https:\/\/doi.org\/10.1145\/1243481.1243483","relation":{},"ISSN":["1531-4278","1531-4278"],"issn-type":[{"type":"print","value":"1531-4278"},{"type":"electronic","value":"1531-4278"}],"subject":[],"published":{"date-parts":[[2006,9]]},"assertion":[{"value":"2006-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}