Seminar in Information Science
Fall 2013 Greensheet
D2L Login and Tutorials
Information Systems Resources
- D2L Information: This course will use D2L to manage course documents, assignments, and grades. This course will be available beginning August 19, 2013. Students will be enrolled into the site automatically.
- Blackboard Collaborate Information: This course will use Blackboard Collaborate for online lectures and presentations. This course will be available beginning August 19, 2013. Students will be enrolled into the site automatically.
- Virtual Security Cloud Lab: The labs assigned in this course will be accessed using the Virtual Security Cloud Lab. Students will be provided with login information through D2L.
- Course name: LIBR 287 Seminar in Information Science: Cybersecurity
- Course code: 2225
- Word Processor: Microsoft Word, Open Office Writer or Apple Pages
- Browser: Mozilla Firefox or Internet Explorer
This course provides an overview of the challenges and strategies relating to the confidentiality, integrity and availability of information and information resources. Topics include information systems security (ISS) fundamentals, ISS within the seven domains of a typical information technology (IT) infrastructure, risks, threats, and vulnerabilities found in a typical IT infrastructure, security countermeasures for combating risks, threats, and vulnerabilities commonly found in an IT infrastructure, (ISC)2 Systems Security Certified Practitioner (SSCP®) Common Body of Knowledge – SSCP® domains, and Compliance laws and standards that affect organizations today.
Formal Assignments for this course are as follows:
- Readings (SLO#1, 2, 3, 4)
Students must read assigned chapters and other material provided by the instructor during the semester.
- Labs (SLO#5)
Students are to complete ten lab assignments. Lab assignments provide students a real-life look at the use of various tools and systems that are used to mitigate network attacks. Students will use their virtual lab manual and must have access to the Virtual Security Cloud Lab (VSCL) to complete lab assignments.
- Risk/Threat/Vulnerability Analysis (SLO#1, 3, 4)
Students will conduct a risk, threat, and vulnerability analysis of a library of their choice. Students must be able to physically and remotely access their chosen library’s resources. Students will be required to post the name of the library of their choice on the discussion board. No more than one student can analyze any one particular library. Therefore, students should select and post their library to the discussion board as quickly as possible. Students will be required to submit their findings in a written report to the instructor. Students will also share their findings on the discussion board.
- Research Paper and Presentation (SLO#1, 3, 4, 5)
Each student will conduct research and present their findings on a current cybersecurity topic area. Students must propose their research project to the instructor by the end of the second week of the semester. No more than one student can research any one particular topic area. Therefore, students should select and propose their research topic to the instructor as quickly as possible
- Online Discussion Board (SLO#1, 2, 3, 4, 5)
Students will lead/moderate one discussion thread relating to their individual research topic. Students must also participate in the discussion board by providing ideas or opinions relating to research topics espoused by other students. Discussion board participation cannot be made-up once the discussion has been completed.
- Final Exam (SLO#1, 2, 3, 4, 5, 6)
Students will complete a final exam. The exam will cover assigned readings, and can comprise of multiple choice, short answer, and essay questions.
The course will use the following calendar. This calendar is subject to change with fair notice.
|Week||Week of||Reading Assigned||Assignment Due|
|0||Aug. 21||Futuring Strategic Planning and Shared Awareness: An Ohio University Libraries' Case Study||Self-Introduction|
|1||Aug. 26||Lesson 1: Information Systems Security||Lab #1|
|2||Sept. 2||Lesson 2: Changing How People and Businesses Communicate|
|3||Sept. 9||Lesson 3: Malicious Attacks, Threats, and Vulnerabilities||Lab #2|
|4||Sept. 16||Lesson 4: The Drivers of the Information Security Business||Lab #5|
|5||Sept. 23||Lesson 5: Access Controls||Lab #3|
|6||Sept. 30||Lesson 6: Security Operations and Administration||Lab #10|
|7||Oct. 7||Lesson 7: Auditing, Testing, and Monitoring||Lab #4|
|8||Oct. 14||Lesson 8:Risk, Response, and Recovery||Risk/Threat/Vulnerability Analysis Part 1|
|9||Oct. 21||Lesson 9: Cryptography||Lab #6|
|10||Oct. 28||Lesson 10: Networks and Telecommunications||Lab #7|
|11||Nov. 4||Lesson 11: Malicious Code and Activity||Lab #9|
|12||Nov. 11||Lesson 12: Information Security Standards||Lab #8|
|13||Nov. 18||Lesson 13: Information Security Education and Training
Lesson 14: Information Security Professional Certifications
|Risk/Threat/Vulnerability Analysis Final Report|
|14||Nov. 25||Lesson 15: U.S. Compliance Laws and International Compliance Laws||Research Paper|
|15||Dec. 16||Final Exam - Online|
|Labs (10)||50%||50 pts. (5 pts. each)|
|Risk/Threat/Vulnerability Analysis (2 Parts)||10%||Part A: 4 pts.
Part B: 6 pts.
|Research Paper||15%||Written Report: 10 pts.
b) Presentation: 5 pts.
|Online Discussion||10%||a) Introduction: 2 pts.
b) Lead/Moderate Discussion Thread: 4 pts.
c) Participation: 4 pts.
|Final Exam||15%||15 pts.|
Other Relevant Information:
- Each lesson commences on Monday and ends on Sunday. For example, week/lesson 1 will commence on August 26th and all assignments due for this week/lesson is due on September 1st.
- Weekly assignments are due on Sunday by 11:59 pm, unless otherwise stated.
- Late work will be accepted at a reduced rate of 20% per day late.
- All written work must be professionally written and follow APA style guidelines.
- All written work must be proofread and free of grammar and spelling errors.
- Final report is due on December 9, 2013 at 11:59 pm.
Course Workload Expectations
Success in this course is based on the expectation that students will spend, for each unit of credit, a minimum of forty-five hours over the length of the course (normally 3 hours per unit per week with 1 of the hours used for lecture) for instruction or preparation/studying or course related activities including but not limited to internships, labs, clinical practica. Other course structures will have equivalent workload expectations as described in the syllabus.
Instructional time may include but is not limited to:
Working on posted modules or lessons prepared by the instructor; discussion forum interactions with the instructor and/or other students; making presentations and getting feedback from the instructor; attending office hours or other synchronous sessions with the instructor.
Student time outside of class:
In any seven-day period, a student is expected to be academically engaged through submitting an academic assignment; taking an exam or an interactive tutorial, or computer-assisted instruction; building websites, blogs, databases, social media presentations; attending a study group;contributing to an academic online discussion; writing papers; reading articles; conducting research; engaging in small group work.
LIBR 200, Other prerequisites may be added depending on content.
Student Learning Outcomes
Upon successful completion of the course, students will be able to:
- Develop conceptual and practical strategies for presenting information on a mobile device.
- Explain the elements of a good user experience.
- Describe user research techniques and a design and innovation methodology.
- Articulate the relationship between design thinking, user experience, and innovation.
- Analyze library websites with user research techniques.
- Evaluate a library website and identify good aspects and areas that could be improved.
- Describe how libraries can improve their physical touchpoints with user research techniques.
- Apply design thinking skills to identify opportunities for libraries.
- Identify nontraditional user-centered library programs or services and use them to explain opportunity for the future of libraries.
- Describe the web service model and be able to access and retrieve information from a 3rd party service.
- Design interfaces to display web service content on a variety of mobile devices through responsive web design.
- Examine programming and markup languages used for web application development.
- Navigate an IDE (integrated development environment) for web application development.
- Describe the model-view-controller (MVC) programming model.
Core Competencies (Program Learning Outcomes)
LIBR 287 supports the following core competencies:
- E Design, query and evaluate information retrieval systems.
- H Demonstrate proficiency in identifying, using, and evaluating current and emerging information and communication technologies.
- J Describe the fundamental concepts of information-seeking behaviors.
- N Evaluate programs and services based on measurable criteria.
- Jones & Bartlett Learning (2013). Virtual lab access for custom ISSA course. Burlington, MA: Jones & Bartlett Learning. Available online from the publisher: http://www.jblearning.com/catalog/9781284022605/
- Kim, D., & Solomon, M.G. (2012). Fundamentals of information systems security. Burlington, MA: Jones & Bartlett Learning. Available through Amazon: 0763790257
- vLab Solutions (2013). Lab manual to accompany fundamentals of information systems security. Burlington, MA: Jones & Bartlett Learning. Available through Amazon: 144963835X
The standard SJSU School of Information Grading Scale is utilized for all iSchool courses:
|97 to 100||A|
|94 to 96||A minus|
|91 to 93||B plus|
|88 to 90||B|
|85 to 87||B minus|
|82 to 84||C plus|
|79 to 81||C|
|76 to 78||C minus|
|73 to 75||D plus|
|70 to 72||D|
|67 to 69||D minus|
In order to provide consistent guidelines for assessment for graduate level work in the School, these terms are applied to letter grades:
- C represents Adequate work; a grade of "C" counts for credit for the course;
- B represents Good work; a grade of "B" clearly meets the standards for graduate level work;
For core courses in the MLIS program (not MARA) — INFO 200, INFO 202, INFO 204 — the iSchool requires that students earn a B in the course. If the grade is less than B (B- or lower) after the first attempt you will be placed on administrative probation. You must repeat the class the following semester. If -on the second attempt- you do not pass the class with a grade of B or better (not B- but B) you will be disqualified.
- A represents Exceptional work; a grade of "A" will be assigned for outstanding work only.
Students are advised that it is their responsibility to maintain a 3.0 Grade Point Average (GPA).
General Expectations, Rights and Responsibilities of the Student
As members of the academic community, students accept both the rights and responsibilities incumbent upon all members of the institution. Students are encouraged to familiarize themselves with SJSU's policies and practices pertaining to the procedures to follow if and when questions or concerns about a class arises. See University Policy S90-5 at http://www.sjsu.edu/senate/docs/S90-5.pdf. More detailed information on a variety of related topics is available in the SJSU catalog at http://info.sjsu.edu/web-dbgen/catalog/departments/LIS.html. In general, it is recommended that students begin by seeking clarification or discussing concerns with their instructor. If such conversation is not possible, or if it does not serve to address the issue, it is recommended that the student contact the Department Chair as a next step.
Dropping and Adding
Students are responsible for understanding the policies and procedures about add/drop, grade forgiveness, etc. Refer to the current semester's Catalog Policies section at http://info.sjsu.edu/static/catalog/policies.html. Add/drop deadlines can be found on the current academic year calendars document on the Academic Calendars webpage at http://www.sjsu.edu/provost/services/academic_calendars/. The Late Drop Policy is available at http://www.sjsu.edu/aars/policies/latedrops/policy/. Students should be aware of the current deadlines and penalties for dropping classes.
Information about the latest changes and news is available at the Advising Hub at http://www.sjsu.edu/advising/.
Consent for Recording of Class and Public Sharing of Instructor Material
University Policy S12-7, http://www.sjsu.edu/senate/docs/S12-7.pdf, requires students to obtain instructor's permission to record the course and the following items to be included in the syllabus:
- "Common courtesy and professional behavior dictate that you notify someone when you are recording him/her. You must obtain the instructor's permission to make audio or video recordings in this class. Such permission allows the recordings to be used for your private, study purposes only. The recordings are the intellectual property of the instructor; you have not been given any rights to reproduce or distribute the material."
- It is suggested that the syllabus include the instructor's process for granting permission, whether in writing or orally and whether for the whole semester or on a class by class basis.
- In classes where active participation of students or guests may be on the recording, permission of those students or guests should be obtained as well.
- "Course material developed by the instructor is the intellectual property of the instructor and cannot be shared publicly without his/her approval. You may not publicly share or upload instructor generated material for this course such as exam questions, lecture notes, or homework solutions without instructor consent."
Your commitment, as a student, to learning is evidenced by your enrollment at San Jose State University. The University Academic Integrity Policy F15-7 at http://www.sjsu.edu/senate/docs/F15-7.pdf requires you to be honest in all your academic course work. Faculty members are required to report all infractions to the office of Student Conduct and Ethical Development. The Student Conduct and Ethical Development website is available at http://www.sjsu.edu/studentconduct/.
Campus Policy in Compliance with the American Disabilities Act
If you need course adaptations or accommodations because of a disability, or if you need to make special arrangements in case the building must be evacuated, please make an appointment with me as soon as possible, or see me during office hours. Presidential Directive 97-03 at http://www.sjsu.edu/president/docs/directives/PD_1997-03.pdf requires that students with disabilities requesting accommodations must register with the Accessible Education Center (AEC) at http://www.sjsu.edu/aec to establish a record of their disability.
Download Adobe Acrobat Reader to access PDF files.
More accessibility resources.