Personal Denial of Service Attacks (PDOS) and Online Misbehavior: The Need for Cyber Ethics and Information Security Education on University Campuses

Authors

  • Ashley Podhradsky Dakota State University, Madison, SD, USA
  • Larry J. LeBlanc Owen Graduate School of Management, Vanderbilt University, Nashville, TN, USA
  • Michael R. Bartolacci Pennsylvania State University, Berks, Reading, PA, USA

DOI:

https://doi.org/10.13052/jcsm2245-1439.335

Keywords:

Information security training, Personal Denial of Service Attack, Cyber Ethics

Abstract

The authors examine the need to provide basic information security and cyber ethics training for all university students, not just those pursuing an information security-related degree. The authors also discuss the need to include ethical hacking, as part of an emphasis on cyber ethics, into information security degree programs. Both of these topics are discussed within the context of a new category of cyber crime, a Personal Denial of Service Attack (PDOS) that the authors have identified, along with other types of cyber crime, that are endemic to university campuses.

Downloads

Download data is not yet available.

Author Biographies

Ashley Podhradsky, Dakota State University, Madison, SD, USA

Ashley Podhradsky is an Assistant Professor of Information Assurance and Forensics at Dakota State University in Madison, South Dakota. She received her D.Sc in Information Systems from Dakota State, with a specialization in information assurance and computer security. Her research interest include cyber security, specifically digital forensics. She has served as a guest editor for the Journal of Mobile Network Design and Innovation and the Journal of Interdisciplinary Telecommunications and Networking, both were special issues on Cyber Security. She is also the lead investigator at a security consulting firm in the Midwest.

Larry J. LeBlanc, Owen Graduate School of Management, Vanderbilt University, Nashville, TN, USA

Larry J. LeBlanc is a Professor of Operations Management in the Owen Graduate School of Management at Vanderbilt University. He received his Ph.D. from Northwestern University in Industrial Engineering/Management Sciences. His research interests include analyzing spreadsheet risk, teaching management science using spreadsheets, supply chain analysis, spreadsheet optimization models, implementation of algorithms for large-scale optimization models, and telecommunication network design/analysis. He has 70 publications in referred journals and also 70 presentations at universities and organizations overseas. Dr. LeBlanc was an invited speaker at the INFORMS workshop on Teaching Management Science and has twice received the Dean’s Award for Teaching Excellence. He was a guest editor of the special issue of the Interfaces on Spreadsheet Applications of Management Science and Operations Research.

Michael R. Bartolacci, Pennsylvania State University, Berks, Reading, PA, USA

Michael R. Bartolacci is an Associate Professor of Information Sciences and Technology at Penn State University - Berks. He holds a Ph.D. in Industrial Engineering and an MBA from Lehigh University. He conducts research in Information Security, Telecommunications Modeling, Information Technology Applications in Disaster Planning and Management, and Supply Chain Management.

References

F. Cohen, ‘Computer Viruses’, Doctoral Dissertation, University of Southern California, 1985.

M. Zenko, ‘Admiral Michael Mullen: Farewell and Thank You’, Retrieved from http://globalpublicsquare.blogs.cnn.com/2011/09/29/ admiral-michael-mullen-farewell-and-thank-you/ on May 29, 2014, 2011.

White House, ‘The Comprehensive National Cybersecurity Initiative’, Retrieved from http://www.whitehouse.gov/issues/foreign-policy/cybersecurity/national-initiative on 29 May 2014, 2012.

National Security Administration, ‘National Centers of Academic Excellence’, Retrieved from http://www.nsa.gov/ia/academic_outreach/ nat_cae/index.shtml on 29 May 2014, 2013.

M. Bartolacci, L. LeBlanc, A. Podhradsky, ‘Personal Denial Of Service (PDOS) Attacks: A Discussion and Exploration of a New Category of Cyber Crime’, Journal of Digital Forensics, Security and Law, In Print, 2014.

L. Cohen, M. Felson, ‘Social change and crime rate trends: A routine activity approach’, American Sociological Review, 588–608, 1979.

Privacy Rights Clearinghouse, ‘Are You Being Stalked?’, Retrieved from https://www.privacyrights.org/are-you-being-stalked on 29 May 2014, 2014.

M. Schwartz, ‘Cybersecurity Expert Shortage Puts U.S. A Risk’ Retrieved from www.informationweek.com on May 15, 2014, 2010.

National Security Administration, ‘Criteria for Measurement for CAE / Cyber Operations Retrieved from www.nsa.gov/academia/nat_cae_cyber_ ops/nat_cae_co_criteria.shtml on May 29, 2014, 2012.

T. Cook, G. Conti, D. Raymond, U. Stated, M. Academy, ‘When Good Ninjas Turn Bad: Preventing Your Students from Becoming the Threat’, Proceedings of the 16th Colloquium for Information Systems Security Education, 61–67, 2012.

S. Bratus, A. Shubina, M. Locasto, ‘Teaching the Principles of the Hacker Curriculum to Undergraduates’, 31st ACM Technical Symposium on Computer Science Education, ACM, doi:10.1145/1734263.1734303.

D. Carnevale, ‘Basic Training for Anti-Hackers: An intensive summer program drills students on cybersecurity skills’, Chronicle of Higher Education, 2, 5, 2005.

M. White, D. Ph, C. Gregory, L. Cohen, ‘Security Across the Curriculum Using Computer Security to Teach Computer Science Principles’ Internet Beseiged, ACM Press, 1997.

K. Arnett, M. Schmidt, ‘Busting the Ghost in the Machine’, Communications of the ACM, 92–95, 2005.

M. Dornseif, F. Gartner, T. Holtz, M. Mink, ‘An Offensive Approach to Teaching Information Security: Aachen summer school applied IT security’, Technical Report AIB 205.02.

G. Vigna, ‘Teaching Hands-on Network Security: Testbeds and Live Exercises’, Journal of Information Warfare, 2(3), 8–24, 2003.

Z. Trabelsi, W. Ibrahim, ‘A Hands-on Approach for Teaching Denial of Service Attacks: A Case Study’, Journal of Information Technology Education: Innovations in Practice, 12, 299–319, 2013.

M. Curbelo, A. Cruz, A. ‘Faculty Attitudes Toward Teaching Ethical Hacking to Computer and Information Systems Undergraduates Students’, Eleventh LACCEI Latin American and Caribbean Conference for Engineering and Technology - Innovation in Engineering, Technology and Education for Competitiveness and Prosperity, 1–8, 2013

M. AlMalki, M. Al-Falayleh, ‘Ethical Hacking and Security Awareness: An Ounce of prevention is worth a pound of cure’, Proceedings of Secure Abu Dhabi Conference, 2013.

R. Hartley, ‘Ethical Hacking: Teaching Students to Hack?’, Doctoral Dissertation, East Carolina University, 2006.

J. Livermore. ‘What are Faculty Attitudes Toward Teaching Ethical Hacking and Penetration Testing?’, Procedings of the 11th Colloquim for Information System Security Education, 2007.

A. Durant, ‘The Enemy Within’. Business XL, 2007.

T. Wulf, ‘Teaching ethics in undergraduate network’, Consortium for Computing Sciences in College, 19(1), 2003.

D. Gross, ‘Mafiaboy” breaks silence, paints “portrait of a hacker’, CNN.com, Retrieved on May 18, 2014, 2011.

AssociatedPress, ‘Monroe High School Students Caught Changing Grades’ Retrieved from www.KOMONews.com on May 21, 2014, 2014.

M. Birnbaum, J. Johnson, ‘Students at Potomac school hack into computers; grades feared changed’, The Washington Post, 2010.

C. Gofford, ‘Cheating scandal: Newport-Mesa official resigns to protest expulsions’, LA Times, 2014.

R. Wilkins, ‘Grade-altering scheme sends ex-Purdue student to jail, 2nd student sentenced for hacking professors’ computers’, Retrieved from Jconline.com on May 2, 2014, 2014.

H. Blume, S. Ceasar, ‘Teachers union members, parents protest $1-billion iPad plan. Los Angeles Times, 2013.

H. Blume, ‘LAUSD halts home use of iPads for students after devices hacked’, Los Angeles Times, 2013.

A. Watters, ‘Students Are “Hacking” Their School-Issued iPads: Good for Them. The limitations imposed on these devices inhibit students’ natural curiosity’, The Atlantic, 2013.

K. Mitnick, W. Simon, The art of deception: Controlling the human element of security, John Wiley and Sons, 2001.

Downloads

Published

2014-10-15

How to Cite

1.
Podhradsky A, LeBlanc LJ, Bartolacci MR. Personal Denial of Service Attacks (PDOS) and Online Misbehavior: The Need for Cyber Ethics and Information Security Education on University Campuses. JCSANDM [Internet]. 2014 Oct. 15 [cited 2024 Apr. 18];3(3):339-56. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/6195

Issue

Section

Articles