COLLEGE OF EDUCATION

UNDERGRADUATE DEPARTMENTAL COURSE SYLLABUS

1. Course Prefix and Number: EDG 3775 Credit Hours: 3

2. Course Title: Cybersecurity and the Everyday Citizen

3. Regular Instructor(s): Ilene R. Berson, Ph.D.; Michael J. Berson, Ph.D.

4. Course Prerequisites (if any): Not applicable.

5. Course Description:

Cybersecurity is an issue of national and international significance. Today, our entire way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money off of them; lawyers and ethicists building new frameworks for right and wrong. Most of all, cybersecurity issues affect us as individuals. We face new questions in everything from our rights and responsibilities as citizens of both the online and real world to how to protect ourselves in this high stakes context. This course explores the human side of cybersecurity. As everyday citizens in a globally connected world, we have a responsibility to protect one of our most valuable resources—information. We will focus on personal, social and policy issues as well as address strategies to secure our digital footprints and promote safe interactions in a public Internet and wireless world.

6. Course Goals and Objectives:

Students will be able to:

·  identify and describe major global cybersecurity issues facing everyday citizens.

·  identify and describe political, economic, ethical, social, cultural, and technological cyber threats on the everyday citizen.

·  synthesize different types and sources of information online to assess global issues from multiple perspectives

·  compare their own digital footprint with peers and use this knowledge to manage their online identity

·  weigh options and implement solutions to enhance the cybersecurity of their devices

·  advocate and practice safe, legal, and responsible use of information and technology

·  identify and analyze the Internet security issues for personal e-commerce

·  analyze international approaches to promoting cybersecurity among citizens

Learning Outcomes:

Students will demonstrate:

·  cybersecurity skills and knowledge through applied projects.

·  ability to use data collection and analyzing tools for cybersecurity research.

·  understanding of the multi-disciplinary aspect involved in computer attacks and defense.

·  skills in communicating effectively orally and in writing about cybersecurity and the everyday citizen

·  recognition of scope of security and safety issues currently associated with the cyber world, including threats to critical infrastructure and the digital economy.

·  implementation of strategies to secure their data and devices

·  knowledge of the process for reporting cybersecurity and cybersafety concerns such as those arising from online scams, offensive (including prohibited) content, cyberbullying, or the improper use of social networking sites.

·  advocacy for informed and responsible decision-making as global cyber citizens

7. Content Outline:

Module 1: Introduction to the Course

Module 2: What is Cybersecurity and why should the everyday citizen care?

Module 3: Digital Footprint: Protecting and Managing Your Online Reputation and Identity

Module 4: Free Speech, Privacy, and the Right to be Forgotten

Module 5: Spam, Scams and Other Intrusions

Module 6: Global Citizenship: Risks, Rights and Responsibilities

Module 7: Digital Health and Wellness

Module 8: Information Quality and Literacy

Module 9: E-commerce, E-money and Transacting: How to Shop and Bank Online

Module 10: Keep Out: Securing Your Devices and Digital Stuff

Module 11: PSAs: Educate, Engage, Empower Part 1

Module 12: PSAs: Educate, Engage, Empower Part 2

8. Evaluation of Student Outcomes:

The grade in this class will be a result of completion of the course requirements, listed below.

15% Digital Footprint Part 1

15% Digital Footprint Part 2

15% Secure Your Technology

25% PSA Presentation Project

15% Threaded Discussion

15% Quizzes

Modules. Each week a new module will be opened for completion. You are responsible for everything that is posted in the module folder for the week. This will include readings, discussion posts, video, Power Points, and quizzes.
Quizzes. To make sure that you keep up with and understand the textbook material, you will be asked to complete online quizzes on each module. The quizzes will be available until 5:00 pm EST of the individual due dates. You may retake the quiz up to 3 times (Note: The syllabus quiz has unlimited retakes), but you must submit your answers before 5:00 pm on the due date. If you do not take a quiz by its due date, there will be no make ups, and you will receive a zero. Again, pay attention to these due dates—you are responsible for noting and adhering to the course schedule! When you have submitted the quiz, you can view your grades in the Student Gradebook section of Canvas.

Threaded Discussion. For each week of class, students will be asked to respond to two reflective questions, which require the translation of the course content into a practical application. The questions will be posted on Canvas, and all responses are to be submitted as part of a threaded discussion. The responses are to include the student’s understanding of the content discussed and personal introspection. You will receive 5 points for quality responses to each question.

Requirements for Threaded Discussion:

·  Timing of first post: You must submit your posts by 5 pm on the due date (see course schedule).

·  Number of posts (threads): You must submit at least 2 posts for each question. At least one of your posts must be a new post and at least one must be a reply to a post from a fellow classmate.

·  Post length requirement: Each posting must be at least 10 sentences long. They can be longer.

·  Descriptive subject: The subject of each new post must accurately describe what you discuss within the post. This does not apply to posts that are replies.

·  Integration of information from readings: You must integrate information from the readings in your new post.

o  You should make this obvious by typing “In the article entitled it states…” or “In the report by... it states…”

Grading Point Structure for Each Discussion Question (5 points):

Number of posts

·  0 points – missing 1 new post and 1 reply

·  1 point – missing 1 new post or 1 reply

·  2 points - 1 new post and 1 reply

Post length

·  0 points –Either or both posts shorter than 10 sentences

·  1 point - All posts 10 sentences or longer

Integration of information from readings

·  0 points – Absent

·  1 point - Briefly referenced or missing personal introspection

·  2 points - Completely stated with personal introspection

Digital Footprint Part 1. In this assignment, you are asked to keep a digital diary for 4 days which includes at least one weekend day, and then visualize it. To keep your digital diary, think about all of the different digital devices you use daily. Mark every digital interaction you have for each 24 hour period, starting when you wake up. Do you listen to the radio? Do you check your email on your iPhone before getting out of bed? Do you read a Kindle on the way to class, or play iPad games on the subway? Make a note of every time you check your email, Facebook, or Twitter. When do you use the phone? Make a note of each usage of media, and the time, and be as detailed as possible. This will be your data set. You will be provided with a grid for recording your digital usage. With your data, you will create an infographic of your digital life.

To create your infographic, choose ONE of the following statistic prompts to visualize:

·  Visualize the entire 4-day period, and show which hours you use the most digital media. (For example, this could be a pie chart showing 24 hours, with “slices” getting darker when you use more media, lighter when you use less, creating a gradient effect.)

·  How much time to do you spend online, and what are the different activities you do online? Show how much of your time is spent doing each activity (phone usage, gaming, surfing the internet, texting and so on.)

·  What do you share the most in a given day… (if you want an extra challenge, also add in who you share it with)

Digital Footprint Part 2. Watch a video by the Digital Tattoo Project, and then search for yourself on these websites:

•  http://pipl.com/

•  http://www.spezify.com/

•  http://personas.media.mit.edu/personasWeb.html

•  http://www.google.com/

•  http://www.bing.com/

•  http://www.yahoo.com/

•  http://www.images.google.com

Use Image Chef to make a word mosaic. Use the drop down arrow next to the heart and search for a foot. Type in all of the sites you have left a footprint on. Save ascreen shotof your foot. Write a reflection: Think about what you found out about yourself. What does your digital dossier say about you? How might a future employer perceive your online identity?

Secure Your Technology. Follow the following steps to secure your technology, and write a reflection about each stage of the process.

·  Set automatic updates on your operating system software

·  Set passwords on your computer

·  Use and update security software

·  Install and use a firewall

·  Secure your internet connection

·  Secure your wireless network

·  Use smart settings for your internet browser

·  Back-up your data

·  Manage and reduce spam

·  Be smart about sharing files

·  Secure online telephoning (VoIP)

Presentation Project: After exploring global examples of PSA campaigns on cybersecurity, you will select a cyberhygiene or cyberethics issue, and develop educational material (such as a poster or video) to inform the public about this issue. The material may be made public to the USF community. As part of the project, students must demonstrate their understanding of the ethics, policies, and technology surrounding the topic. The goal of the project is for students to engage with the community and communicate cybersecurity issues in a way that is relatable for students on campus.

9. Grading Criteria:

Weighted Grade Grade

94-100 A

90-93 A-

87-89 B+

84-86 B

80-83 B-

77-79 C+


Weighted Grade Grade

74-76 C

70-73 C-

67-69 D+

64-66 D

60-63 D-

Below 60 F

10. Textbook(s) and Readings:

Selected Readings from the Following Resources:

Angwin, J. (2014). Dragnet nation: A quest for privacy, security, and freedom in a world of relentless surveillance. New York: Times Books.

Deibert, R. J. (2013). Black code: Inside the battle for cyberspace. Toronto, ON: McClelland & Stewart.

Harper, R. H. R. (2014). Trust, computing and society. New York: Cambridge University Press.

Singer, P., & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. New York: Oxford University Press.

Bazzell, M. (2014). Hiding from the Internet: Eliminating Personal Online Information. Retrieved from http://computercrimeinfo.com/cleaningid.html

11. Academic Dishonesty:

“Plagiarism is defined as "literary theft" and consists of the unattributed quotation of the exact words of a published text or the unattributed borrowing of original ideas by paraphrase from a published text. On written papers for which the student employs information gathered from books, articles, or oral sources, each direct quotation, as well as ideas and facts that are not generally known to the public-at-large, must be attributed to its author by means of the appropriate citation procedure. Citations may be made in footnotes or within the body of the text. Plagiarism also consists of passing off as one's own, segments or the total of another person's work.”
“Punishment for academic dishonesty will depend on the seriousness of the offense and may include receipt of an "F" with a numerical value of zero on the item submitted, and the "F" shall be used to determine the final course grade. It is the option of the instructor to assign the student a grade of "F" of "FF" (the latter indicating dishonesty) in the course.”

12. Detection of Plagiarism:

The University of South Florida has an account with an automated plagiarism detection service which allows instructors to submit student assignments to be checked for plagiarism. I reserve the right to ask students to submit their assignments to Turnitin through myUSF. In order to comply with federal (FERPA) and state privacy laws, you are not required to include personal identifying information such as your name, SSN, and/or U# in the body of the work (text) or use such information in the file naming convention prior to submitting. Your submission will be placed in the course grade center in your account that can be accessed by the instructor and attributed to you.Assignments are compared automatically with a database of journal articles, web articles, and previously submitted papers. The instructor receives a report showing exactly how a student's paper was plagiarized.

13. Gender Based Crimes:

Educators must report incidents of gender-based crimes including sexual assault, sexual harassment, stalking, dating violence and domestic violence. If a student discloses in class, in papers, or to an instructor, the instructor is required by law to report the disclosure. The Center for Victim Advocacy and Violence Prevention (813-974-5757) is a confidential resource where you can talk about such situations and receive assistance in confidence. Additional confidential resources on campus are: the Counseling Center (813-974-2831) and Student Health Services (813-974-2331).

14. Web Portal Information:

Every newly enrolled USF student receives an official USF e-mail account that ends with "mail.acomp.usf.edu." Every official USF correspondence to students will be sent to that account. Go to the Academic Computing website and select the link "Activating a Student E-mail Account" for detailed information. Information about the USF Web Portal can be found at:
http://www.acomp.usf.edu/portal.htm.

15. ADA Statement:

Students in need of academic accommodations for a disability may consult with the office of Services for Students with Disabilities to arrange appropriate accommodations. Students are required to give reasonable notice (typically 5 working days) prior to requesting an accommodation