<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Teaching Secure Software Development Through an Online Course</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Christopher Theisen</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ted Zhu</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kevin Oliver</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Laurie Williams</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Duke University</institution>
          ,
          <addr-line>Durham, North Carolina</addr-line>
          ,
          <country country="US">United States</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>North Carolina State University</institution>
          ,
          <addr-line>Raleigh, North Carolina</addr-line>
          ,
          <country country="US">United States</country>
        </aff>
      </contrib-group>
      <fpage>19</fpage>
      <lpage>33</lpage>
      <abstract>
        <p>With an increasing number of cybersecurity attacks threatening consumers, organizations, and governments, the need for trained software security professionals is greater than ever. However, the industry is experiencing a shortage in security professionals for roles at all levels of cybersecurity. Massively Open Online Courses (MOOCs) o er educators an opportunity to retrain current professionals on cybersecurity topics to meet new and ongoing threats. The goal of this paper is to assist instructors of online software security courses in making their courses engaging and e ective. In this paper, we present the details of our online software security course, including the technologies used and the material presented. We conducted a pre- and post-survey of course participants and report information on their backgrounds, motivations, and learning objectives. Based on our re ection on the course, we recommend that future instructors of online security courses seed peer discussion on online discussion forums, carefully choose their course platform, and have professionally shot lecture videos.</p>
      </abstract>
      <kwd-group>
        <kwd>security</kwd>
        <kwd>education</kwd>
        <kwd>MOOC</kwd>
        <kwd>online</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>A 2015 report on the shortage of security professionals worldwide by Frost and
Sullivan and (ISC)2 indicated that the cybersecurity industry faces a shortage
of 1.5 million security professionals by 20201. The gap in security professionals
cannot be lled through new graduates alone. Retraining current members of the
workforce on cybersecurity skills can provide immediate relief for the security
professional shortage, while also opening a new, lucrative career path for those
who retrain.</p>
      <p>Copyright c 2017 by the paper's authors. Copying permitted for private and academic
purposes.</p>
      <p>
        One common method used for retraining professionals is the use of Massively
Open Online Courses, or MOOCs. MOOCs are typically run by universities
or professional organizations, and provide students a exible, online platform
for learning. However, research has shown that e ective execution of a MOOC
can be di cult [
        <xref ref-type="bibr" rid="ref1 ref2">1,2</xref>
        ]. MOOCs typically have thousands or tens of thousands of
participants, and having instructors interact with all of the participants is not
feasible.
      </p>
      <p>
        In an e ort to assist in these retraining e orts, we ran an online course on the
topic of software security during the Spring of 2017. The course builds on lessons
learned from a similar online course [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] we conducted in Fall 2014 as well as
suggestions for running online courses from the larger scienti c community [
        <xref ref-type="bibr" rid="ref4 ref5">4,5</xref>
        ].
The class featured nine weeks of content, with two lectures per week, a weekly
discussion on the latest security news, an episode of the Silver Bullet Podcast
from Synopsys [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], and an exercise for the students. The goal of this paper is
to assist instructors of online software security courses in making their courses
engaging and e ective. By presenting the results of our course and the e ect
of our improvements from a previous iteration of the course, we hope to help
instructors of future software security courses improve their o erings.
      </p>
      <p>In this paper, we examine the following research questions in relation to our
Software Security MOOC:
RQ1 How did students respond to the presentation of the course and the course
content?
RQ2 How did previously suggested improvements help the course, and what
additional lessons were learned during the execution of the latest course?
To answer these questions, we asked students in the course to reply to
preand post-surveys about a variety of topics, including their reason for taking
the course, what their professional background was, what their goals were for
taking the course, and their knowledge about software security subjects. We
compared the results of the pre- and post-surveys to determine how students
met their goals. Additionally, each of the instructors or support sta for the
course re ected on their experience running the course and provided a list of
lessons learned for instructors of future online courses to bene t from.</p>
      <p>The rest of the paper is structured as follows. Section 2 covers related work
to software security education and online courses. Section 3 describes our online
course including the software used and the material presented. Section 4 presents
the demographic information for the students who signed up for the course.
Section 5 details the questions presented during our pre- and post-surveys and the
student responses. Section 6 presents the authors' lessons learned while running
the course, so instructors running future online courses can bene t. Section 7
describes the limitations of the conclusions of our study.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related Work</title>
      <p>
        MOOCs are not uniform in their construction. Some MOOCs are o ered free to
the public, while others have fees or organization membership requirements for
registration [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. MOOCs have su ered from exceptionally high dropout rates,
with up to 97% of registered students dropping out by the end of the course [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
However, MOOCs have been highlighted for their ability to reach populations
that would not otherwise have access to educational opportunities on advanced
subjects [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        We draw on previously constructed security courses to strengthen our own
course. Thesien et al [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] provided a list of lessons learned from their own
experience in running software security courses. Speci cally, they spoke on the
challenges of peer evaluation, the time consuming nature of running an online
course, and the positive reception of informal roundtable discussions on the
weekly topic.
      </p>
      <p>
        We also drew on general MOOC pedagogy suggestions from the wider online
learning community when we constructed our course. Bru et al. [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] suggested
that discussion forums be seeded with open-ended questions to encourage student
discussion. Fournier et al. [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] recommended that tools be provided to students to
encourage learning outside of the course itself. Pardos et al. [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] recommended
multiple sources of information on the same topic, so students with di erent
learning styles can choose their preferred delivery method.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Course Description</title>
      <p>In this section, we describe the content and structure of the course. We present
the learning objectives for students taking the course, the course syllabus, and
the structure of each lecture, along with other parts of the course content. Our
course was hosted on Amazon AWS using the OpenEDX open source software
package, at https://www.learnsoftwaresecurity.com/.
3.1</p>
      <sec id="sec-3-1">
        <title>Learning Objectives</title>
        <p>For our course, we used the following four learning objectives:
{ Security Risk Management</p>
        <p>Students will be able to assess the security risk of a system under
development. Risk management will include the development of formal and informal
misuse case and threat models. Risk management will also involve the
utilization of security metrics.
{ Security Testing</p>
        <p>Students will be able to perform all types of security testing, including fuzz
testing at each of these levels: white box, grey box, and black box/penetration
testing.
{ Secure coding techniques</p>
        <p>Students will understand secure coding practices to prevent common
vulnerabilities from being injected into software.
{ Security Requirements, Validation, and Veri cation</p>
        <p>Students will be able to write security requirements (which include privacy
requirements). They will be able to validate these requirements and to
perform additional veri cation practices of static analysis and security
inspection.</p>
        <p>These four learning objectives inform the selection of materials taught in the
course, and were presented to students when they signed up for the course.
3.2</p>
      </sec>
      <sec id="sec-3-2">
        <title>Syllabus</title>
        <p>
          The online course took place over a period of nine weeks, from March 27th to May
29th, during the Spring of 2017. The course ran as an independent MOOC (i.e.
not associated with a MOOC company, such as Coursera or Udacity) o ered
by North Carolina State University. McGraw [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] states that 50% of security
errors are implementation bugs, while 50% are design aws. McGraw's assertion
about the ratio of implementation bugs to design aws informs our split of
implementation bug coverage and design aw coverage in our course.
        </p>
        <p>
          The rst four weeks covered the Open Web Application Security Project
(OWASP) [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] Top 10 Vulnerabilities. OWASP periodically releases a list
detailing the top 10 types of vulnerabilities that are most commonly seen by software
developers and security professionals, and detail how the type of exploit works,
how widespread the exploit is, what the possible negative e ects are, and some
mitigation techniques. The OWASP Top 10 has a particular focus on
implementation bugs. We use the OWASP Top 10 as an introduction to security
vulnerabilities, and how to think about them from a defensive perspective.
        </p>
        <p>
          The next three weeks introduced the IEEE Center for Secure Design's (CSD)
Top 10 security design aws to give a background on design decisions that could
result in vulnerabilities [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]. Certain design aws, such as the failure to
authenticate users, may not be picked up by static analysis or other automatic tools
designed for security. Understanding common security design pitfalls teaches
students to avoid making similar mistakes in their own programs, or spot de
ciencies in programs that they are reviewing or testing.
        </p>
        <p>Finally, after making students aware of potential security issues, we conclude
the nal three weeks by presenting security mitigation techniques: attack trees,
abuse cases, threat modeling, the STRIDE threat model, security requirements,
usability issues in security, and security risk analysis.</p>
        <p>{ Week 1 (Available March 27th)</p>
        <p>OWASP Top 10: A1 Injection</p>
        <p>OWASP Top 10: A2 Broken Authentication and Session Management
{ Week 2 (Available April 3rd)</p>
        <p>OWASP Top 10: A3 Cross Site Scripting (XSS)
OWASP Top 10: A4 Insecure Direct Object References
{ Week 3 (Available April 10th)
{ Week 4 (Available April 17th)</p>
        <p>OWASP Top 10: A5 Security Miscon guration
OWASP Top 10: A6 Sensitive Data Exposure
OWASP Top 10: A7 Missing Function Level Access Control and A8
Cross-Site Request Forgery (CSRF)
OWASP Top 10: A9 Using Components with Known Vulnerabilities and
A10 Unvalidated Redirects and Forwards
{ Week 5 (Available April 24th)
{ Week 6 (Available May 1st)</p>
        <p>IEEE CSD D1-D3: Trust, Authenticate, Authorize
IEEE CSD D4-D5: Separate Data, Validate Data
IEEE CSD D6-D7: Use Cryptography Correctly, Sensitive Data
IEEE CSD D8-D10: Consider Users, Attack Surface, Flexibility
{ Week 7 (Available May 8th)</p>
        <p>Attack Trees</p>
        <p>Abuse Cases
{ Week 8 (Available May 15th)</p>
        <p>Threat Modeling and STRIDE</p>
        <p>Security Requirements
{ Week 9 (Available May 22nd)</p>
        <p>Usability</p>
        <p>Security Risk Analysis
3.3</p>
      </sec>
      <sec id="sec-3-3">
        <title>Lectures</title>
        <p>
          We partnered with local startup Stembrite2 who specialize in assisting educators
with the video portion of their online course o ering. We limited our lectures to
515 minutes each, as recommended by Aiken et al [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. Each lecture was shot using
a Lightboard3, an Open Source Hardware \chalkboard" speci cally designed for
video lectures. During each lecture, PowerPoint slides were superimposed onto
the video, and the lecturer wrote additional items on the Lightboard. Lecture
slides were adapted from a set of slides use for a software security course at
North Carolina State University.
        </p>
        <p>After each lecture, students were asked at least ve multiple choice questions
on the presented topics. Students who scored at least an 80% average on these
quizzes earned a Certi cate of Completion for the course.</p>
        <p>2 http://stembrite.org/index.html
3 http://lightboard.info/</p>
      </sec>
      <sec id="sec-3-4">
        <title>Silver Bullet Podcast</title>
        <p>
          The Silver Bullet Podcast with Gary McGraw [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] is a security podcast that
discusses a variety of topics related to software security. Each episode features an
interview with a prominent security professional on a speci c topic in
cybersecurity. Each week, we selected an episode of the podcast that was relevant to
that week's topics or current events in software security.
        </p>
        <p>Similar to the lectures, students were asked at least ve multiple choice
questions on the topic of the podcast. These quizzes were also included in the average
for the Certi cate of Completion.
3.5</p>
      </sec>
      <sec id="sec-3-5">
        <title>Weekly Security News Discussion</title>
        <p>During the course, the three instructors taped a 10-15 minute panel discussion
each week about the latest news in software security. The goal of these panel
discussions was to familiarize students with recent developments in software
security news, and also to get the reaction of a group of knowledgeable
security professionals to these news items. Topics included the WannaCry attack on
the National Health Service (NHS), the Mirai botnet using Internet of Things
devices, and a large breach into the Cloud are service. Each week, 2-4 recent
events in software security were discussed, and the panel members would re ect
on the event and discuss the reasons why the attack occurred, the consequences
of the attack, and possible mitigation techniques. Students were also prompted
to re ect on each topic on the course discussion boards.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Course Context</title>
      <p>Students enrolling in our online course were invited to take a pre-survey at the
start of the course and a post-survey upon the completion of the course. In total,
surveys were received from 98 unique persons, including 49 pre-surveys, and 70
post-surveys. Only 21 students completed both a pre-survey and a post-survey.
In this section, we describe the responses to these surveys and draw conclusions
for further improvement of the course.
4.1</p>
      <sec id="sec-4-1">
        <title>Who Enrolled?</title>
        <p>
          A total of 1048 students signed up for the online course. Of those students, 372
completed at least one quiz. At the end of the course, 191 students were issued
a certi cate of completion, which was issued if the student averaged at least
an 80% on the quizzes for the entire nine weeks of the course. This is a total
retention rate of 18.2%, which compares favorably against the typical MOOC
retention rate of 3% [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ].
        </p>
        <p>Demographics of the 98 students who completed a survey(s) provide a
snapshot of the type of student enrolling in the MOOC. The full demographic
information about enrollees can be found in Table 1. For the education elds, primary
refers to students who have completed the compulsory education in their
country, and associate's refers to students who have completed a two year university
or community college degree. These students were largely American, male, and
Caucasian. Their age ranges varied widely, most commonly between 30-59. Most
held a bachelors or masters degree and were currently employed full-time in the
private sector in the areas of software engineering or computer security and
cryptography. Students also reported the number of years of experience they had in
their areas of computer science responsibility with a mean of 15.5 years reported,
and a widely divergent standard deviation of 11.9.</p>
        <p>Education Employment Sector
bachelor's 54.3% full-time 91.4% private sector
masters 28.3% student 5.4% education
doctoral 5.4% part-time 3.2% government
associate's 4.3% health care
primary 4.3% non-pro t%
Age
25.8%
24.7%
23.7%
15.1%
10.8%</p>
        <p>Responsibilities
60.2% software engineering 54.5%
17.0% computer security 33.8%
15.9% databases 19.5%
3.4% computer networks 15.6%
3.4% information science 15.6%
architecture 15.6%
performance analysis 11.7%</p>
        <p>As self-directedness is a trait known to impact online course performance,
students were asked to self-rate their ability to self-direct academic work without
direction or external motivation. Not surprisingly for students signing up for a
self-directed MOOC, 68.1% of students reported they were very self-directed,
30.9% moderately self-directed, and only 1.1% lacking in self-direction.
4.2</p>
      </sec>
      <sec id="sec-4-2">
        <title>Enrollment and Participation</title>
        <p>Surveyed students indicated how they heard about the MOOC with a majority
hearing about it through a colleague (69.9%) or social media outlet like LinkedIn
or Twitter (19.4%). A small percentage (10.8%) heard about the MOOC through
a professional association or other news outlet.</p>
        <p>When asked to re ect on di erent reasons for enrolling in a MOOC,
students indicated the reasons that applied to them or did not apply to them. The
reasons students were most likely to enroll in our MOOC included: general
interest in topic (96.8%), personal growth and enrichment (96.7%), relevance to job
(85.9%), for fun and challenge (80.5%), for resources applicable to the practice
of software security (72.4%), to earn a certi cate or statement of
accomplishment (71.3%), to share what they learned with colleagues/peers (67.4%), and to
become a better coach or mentor to colleagues/peers (60.2%).</p>
        <p>Conversely, students indicated a number of reasons that did not factor into
their enrollment in the MOOC, including: to improve English skills (89.2%), to
receive incentives from employer such as a promotion (83.3%), relevance to
academic research (83.1%), for a career change (76.2%), relevance to school/degree
(69.9%), to take the course with colleagues/friends (68.6%), or to connect/network
with other software security professionals (67.9%).</p>
        <p>When asked what could be done to make students more active in the course, a
few comments were received. Seven students suggested more discussion/interaction
among course participants, perhaps in the form of an online meet up or group
chat, and perhaps as a required/mandatory part of the course since some
students did not pay attention to it as a non-required element. One student
suggested posting recommended activity requirements and a timeline to help
students stay on pace.</p>
        <p>Students reported the number of hours spent on the course per week, with
most spending from 1-2 hours per week (70.4%) or 3-4 hours per week (25.4%).
Only 4.2% reported spending 5-6 hours per week on the course.
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>RQ1 -Student Response</title>
      <p>In this section, we report the student survey responses to the course, along with
feedback received directly from students enrolled in the course.
5.1</p>
      <sec id="sec-5-1">
        <title>Course Quality</title>
        <p>Students were asked on the post-survey (n=70) if they agreed or disagreed that
the MOOC e ectively followed a set of common instructional design
principles. The most well-received instructional design elements in the MOOC were
elements dealing with content authenticity and in particular how the MOOC
covered real-world problems relevant to the workplace. The least well-received
instructional design elements in the MOOC were elements dealing with
interaction and collaboration, with 26.1% of students stating that the course required
collaboration outside of the course, and 25.7% stating the course required
collaboration within the course. The full survey responses from participants' about
the overall course quality can be found in Table 2.</p>
        <p>
          Students were asked on the post-survey (n=70) if they agreed or disagreed
that certain course elements aided their learning in the MOOC, on a ve-point
Likert scale [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] from strongly disagree to strongly agree. A strong majority of
students agreed or strongly agreed that course lectures (87.3%), linked resources
(80.0%), readings (78.9%), and assessments (77.5%) aided their learning. When
asked what additional non-human supports students would recommend to aid
their learning, 20 students provided written comments. Twelve of these students
recommended more labs and exercises and a virtual machine or Web site test bed
to complete these exercises in an authentic setting. Four students commented on
course content, requesting more examples and reading material, suggesting that
content be provided earlier in the course, and suggesting more in-depth reading
material since one person deemed existing materials to be too light weight. Other
suggestions by individuals included: providing a glossary of technical
terminology, adding minimum browser requirements since one person said their browser
would not handle the course Web page, and partnering with an external entity to
provide more extensive guides on how to complete some of the tasks discussed.
        </p>
        <p>Students were also asked on the post-survey (n=70) if certain feedback loops
aided their learning in the course, on a ve-point Likert scale from strongly
disagree to strongly agree. When asked whether the feedback they received from
the instructors was su cient, 65.7% agreed or strongly agreed that it was. Ten
students provided written comments about course feedback loops, with ve of
these comments re ecting on quizzing. Students recommended more authentic
assessment beyond multiple choice questions that could be retaken until correct.
Students also suggested providing corrective feedback or explaining why any quiz
answers were marked incorrect. Two students commented on peer review with
one suggesting deadlines were needed and another that discussion threads might
be a better way to conduct peer review. Finally, individual students made a few
recommendations, including the inclusion of information on the use of arti cial
intelligence for tracing security vulnerabilities.</p>
        <p>Students were asked on the post-survey (n=70) if certain student
strategies aided their learning in the course on a ve-point Likert scale from strongly
disagree to strongly agree. A majority (67.1%) of students agreed or strongly
agreed that study skills strategies aided their learning and that time
management strategies aided their learning (e.g., setting a schedule and working on
the course consistently) (67.1%). Students responded more neutrally to
collaboration strategies with peers, however, with only 37.1% agreeing or strongly
agreeing that these aided their learning. Only a few comments were registered
about student strategies with one student requesting more readings and another
more opportunities to collaborate with peers.</p>
        <p>Finally, students were asked on the post-survey (n=70) if the technical
learning curve and MOOC platform were manageable on a ve-point Likert scale from
strongly disagree to strongly agree. Students largely agreed that the technical
learning curve (91.0% agreed or strongly agreed) and MOOC platform were
manageable (88.4%).
5.2</p>
      </sec>
      <sec id="sec-5-2">
        <title>Student Beliefs About Software Security</title>
        <p>Students were asked on both the pre- and post-survey about their software
security beliefs, such as its relevance in the workplace. Results were generally similar
on both the pre- and post-survey with a strong majority of respondents
indicating software security was an applicable topic in the workplace, was a current
problem with unsolved components, was relevant and applicable to their work,
had severe consequences if not tended to, and was an important priority in their
work. On one item about software security getting worse over time, it is
noteworthy that more respondents agreed with this statement on the post-survey
than on the pre-survey, perhaps suggesting they learned from the course about
the escalating nature of threats to software security. Any pre-post comparisons
should be made cautiously, however, as these two survey groups were largely
different persons who may have simply held di erent beliefs about software security.
The full survey responses from participants about their beliefs about software
security can be found in Table 3.</p>
        <p>For the 21 students who did complete both pre- and post-surveys, results
were compared to determine if any changes in beliefs had occurred by the
end of the MOOC. For these 21 students, there were no signi cant di erences
pre-to-post for these question items, except for one item: software security is
a current problem with unsolved components, for which the pre-survey
agreement (M=3.9, SD=1.37) was signi cantly less than the post-survey agreement
(M=4.6, SD=.68), t(18) = -2.42, p = .026. This nding might suggest students
became slightly more aware of the unsolved nature of software security
components through the MOOC.
5.3</p>
      </sec>
      <sec id="sec-5-3">
        <title>Student Understanding of Software Security Course Topics</title>
        <p>Students were asked to rate their current understanding of course topics on
both the pre- and post-survey, on a ve-point scale (no understanding, minimal,
moderate, good, and strong). The percent of participants who reported good
or strong understanding of course topics at pre-survey and at post-survey is
reported in the table below. Students on average did report stronger understanding
on the post-survey, but again it is di cult to compare between these two
survey groups who were largely di erent persons. The improvement in scores may
suggest the course did improve some participants understanding, but this result
cannot be con rmed and is generally not supported by what little statistical
data is available, presented in Table 4.</p>
        <p>For the 21 students who did complete both pre- and post-surveys, results
were compared to determine if self-reported understanding of course topics
improved from pre-to-post. There was no signi cant di erence in these students
self-reported understanding of security risk management, security testing, or
security requirements from pre-to-post. There was a signi cant di erence in
prepost understanding for secure coding techniques, with these 21 students
reporting signi cantly less understanding at pre-survey (M=3.0, SD=.94), than at
post-survey (M=3.5, SD=1.0), t(18)=-2.73, p=.014. This nding might suggest
students became slightly more knowledgeable about secure coding techniques
through the MOOC.
5.4</p>
      </sec>
      <sec id="sec-5-4">
        <title>Student Importance Placed on Course Topics</title>
        <p>Students were asked to rank the aforementioned four course topics in terms of
their order of importance to ones area of employment responsibility. Security
risk management was ranked slightly higher among pre-survey takers relative
to post-survey takers, while secure coding techniques and security requirements
were ranked slightly lower among pre-survey takers relative to post-survey
takers. These results could suggest some shifting in importance placed on course
topics, but again it is di cult to compare between these two survey groups. The
importance rankings for each topic are listed in Table 5.</p>
        <p>For the 21 students who did complete both pre-post surveys, results were
compared to determine if average rank order for a given course topic shifted
from pre-to-post. However, no signi cant di erences were found.
Students taking the software security MOOC in spring 2017 appreciated that the
content and problems re ected real-world issues, and most students agreed that
the di erent course content elements (lectures, linked resources, readings, and
assessments) aided their learning. To complement this content, students
recommended the MOOC incorporate further labs or virtual test bed exercises, more
authentic assessment beyond multiple choice questions, and further guidance
to monitor ones progress through these materials and activities (e.g., activity
requirements, timelines, pacing schedule).</p>
        <p>To improve the MOOC, the number one recommendation across four di
erent question sets (recurring theme) was the need to incorporate more
studentstudent discussion and interaction into the course (e.g., online hangouts, chats,
forums). Only a few students requested more student-instructor interaction,
perhaps acknowledging this is a challenge in a large enrollment MOOC course.
Students, however, did expect and ask for further student-student interaction.
Students noted that optional discussions were not likely to lead to any
meaningful interaction, thus it may be necessary to make discussions/interactions
mandatory to get credit for the MOOC.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>RQ2 - Lessons Learned</title>
      <p>In this section, we discuss the lessons we learned during the execution of the
course, so future instructors may bene t from our experience. In no particular
order:</p>
      <p>1. Peer discussion does not happen organically. The amount of
studentto-student interaction on our discussion boards was lower than we expected, and
as discussed above, students would have liked more opportunities to interact
with their peers. We saw spikes in activity on the discussion boards when our
weekly panel discussions prompted them to provide their opinions in a speci c
way, such as describing how they would prevent a particular attack if it targeted
their organization.</p>
      <p>2. Carefully choose your course platform. Two of the instructors of this
course have previous experience running a software security MOOC, and the
previous course was severely hampered both in quality and time spent because of
the previously used platform. OpenEDX on Amazon AWS have a straightfoward
implementation process with better performance than the previous course
platform, and we would recommend this combination to instructors looking to run
their own independent courses.</p>
      <p>We did receive feedback from one student that OpenEDX was the reason
they stopped participating in the course, as they felt the interface was clunky
and not intuitive. While we felt the interface was an overall improvement over
the previous platform, continued improvement in streamlining the course for
participants is important for student retention.</p>
      <sec id="sec-6-1">
        <title>3. Professional video editing improves lecture quality. The support of</title>
        <p>Stembrite's video editor improved the quality of the lecture videos signi cantly
compared to the previous course. While consumer video editing solutions can
work for creating lecture videos, a student who participated in both courses
commented that the current lecture videos were more authoritative and were
easier to follow, thanks to the Lightboard technologies and the improvements in
video quality and editing.</p>
        <p>4. Having instructor o ce hours. Based on student feedback, we
recognized the need for more instructor-student interaction where possible. To that
end, halfway through the course we made an instructor available for \o ce
hours," or a set time that the instructor could be reached on a web conferencing
service. However, this service was used minimally by students, with only one
student taking advantage of the service over the last four weeks of the course.
However, if this service was available from the beginning of the course, more
students may have taken advantage of it, or we might have retained students
that we lost during the course. For large courses with 10,000+ students,
having webinars like this may be unfeasible without additional moderators or other
pre-planning activities.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Limitations</title>
      <p>Results from the pre- and post-survey are only from students who self-selected
to provide results to the researchers. Students who opt to provide demographic
information may represent a di erent population than the whole body of
students. Additionally, students who opt to provide feedback on the course may
represent a di erent population than the whole body of students. Students who
were satis ed with the course may be more likely to respond to a survey asking
for feedback.</p>
      <p>Results from the pre- and post-survey do not represent the same students.
While there is some overlap between the two groups, the majority of the
responders only took one of the two surveys. A lack of data from the same students
in the pre- and post-surveys could result in a di erent understanding of the
students' satisfaction with the course.</p>
      <p>Parts of the lessons learned represents the opinions of the authors, and is not
necessarily grounded in feedback received from the students unless otherwise
noted. Di erent instructors may have di erent lessons learned from the authors.
8</p>
    </sec>
    <sec id="sec-8">
      <title>Acknowledgements</title>
      <p>We thank the participants for their attention and feedback on the course. We
thank the Realsearch group for their important feedback on the paper. The
work in this paper was funded under National Science Foundation grant number
4900-1318428.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Liyanagunawardena</surname>
            ,
            <given-names>T.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Adams</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Williams</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          :
          <article-title>Moocs: A systematic study of the published literature 2008-2012</article-title>
          . The International Review of Research in Open and
          <source>Distributed Learning</source>
          <volume>14</volume>
          (
          <issue>3</issue>
          ) (
          <year>2013</year>
          )
          <volume>202</volume>
          {
          <fpage>227</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Kay</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reimann</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Diebold</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kummerfeld</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Moocs: So many learners, so much potential</article-title>
          ...
          <source>IEEE Intelligent Systems</source>
          <volume>28</volume>
          (
          <issue>3</issue>
          ) (
          <year>2013</year>
          )
          <volume>70</volume>
          {
          <fpage>77</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Theisen</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Williams</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oliver</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Murphy-Hill</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          :
          <article-title>Software security education at scale</article-title>
          . In: Software Engineering
          <string-name>
            <surname>Companion (ICSE-C)</surname>
          </string-name>
          , IEEE/ACM International Conference on,
          <source>IEEE</source>
          (
          <year>2016</year>
          )
          <volume>346</volume>
          {
          <fpage>355</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Bali</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Mooc pedagogy: gleaning good practice from existing moocs</article-title>
          .
          <source>Journal of Online Learning and Teaching</source>
          <volume>10</volume>
          (
          <issue>1</issue>
          ) (
          <year>2014</year>
          )
          <fpage>44</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Breslow</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pritchard</surname>
            ,
            <given-names>D.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>DeBoer</surname>
          </string-name>
          , J.,
          <string-name>
            <surname>Stump</surname>
            ,
            <given-names>G.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ho</surname>
            ,
            <given-names>A.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Seaton</surname>
          </string-name>
          , D.T.:
          <article-title>Studying learning in the worldwide classroom: Research into edx's rst mooc</article-title>
          .
          <source>Research &amp; Practice in Assessment 8</source>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6. Synopsys: Silver bullet podcast - https://www.cigital.com/podcast/ (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Vardi</surname>
          </string-name>
          , M.Y.:
          <article-title>Will moocs destroy academia?</article-title>
          <source>Communications of the ACM</source>
          <volume>55</volume>
          (
          <issue>11</issue>
          ) (
          <year>2012</year>
          ) 5{
          <fpage>5</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Rivard</surname>
          </string-name>
          , R.:
          <article-title>Measuring the mooc dropout rate</article-title>
          .
          <source>Inside Higher Ed</source>
          <volume>8</volume>
          (
          <year>2013</year>
          ) 2013
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Hyman</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <article-title>: In the year of disruptive education</article-title>
          .
          <source>Communications of the ACM</source>
          <volume>55</volume>
          (
          <issue>12</issue>
          ) (
          <year>2012</year>
          )
          <volume>20</volume>
          {
          <fpage>22</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Bru</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Lessons learned from vanderbilts rst moocs (</article-title>
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Fournier</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kop</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sitlia</surname>
          </string-name>
          , H.:
          <article-title>The value of learning analytics to networked learning on a personal learning environment</article-title>
          .
          <source>In: Proceedings of the 1st International Conference on Learning Analytics and Knowledge</source>
          ,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2011</year>
          )
          <volume>104</volume>
          {
          <fpage>109</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Pardos</surname>
            ,
            <given-names>Z.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schneider</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          :
          <article-title>First annual workshop on massive open online courses</article-title>
          .
          <source>In: International Conference on Arti cial Intelligence in Education</source>
          , Springer (
          <year>2013</year>
          )
          <volume>950</volume>
          {
          <fpage>950</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>McGraw</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>On bricks and walls: Why building secure software is hard</article-title>
          .
          <source>Computers &amp; Security</source>
          <volume>21</volume>
          (
          <issue>3</issue>
          ) (
          <year>2002</year>
          )
          <volume>229</volume>
          {
          <fpage>238</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14. OWASP: Top 10 - https://www.owasp.org, accessed
          <year>2017</year>
          -
          <volume>06</volume>
          -
          <fpage>25</fpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15. IEEE:
          <article-title>Avoiding the top 10 software security design aws</article-title>
          - http://cybersecurity.ieee.org/center-for
          <string-name>
            <surname>-</surname>
          </string-name>
          secure-design/, accessed 2017-
          <volume>06</volume>
          -
          <fpage>25</fpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Aiken</surname>
            ,
            <given-names>J.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lin</surname>
            ,
            <given-names>S.Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Douglas</surname>
            ,
            <given-names>S.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Greco</surname>
            ,
            <given-names>E.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thoms</surname>
            ,
            <given-names>B.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schatz</surname>
            ,
            <given-names>M.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Caballero</surname>
            ,
            <given-names>M.D.:</given-names>
          </string-name>
          <article-title>The initial state of students taking an introductory physics mooc</article-title>
          .
          <source>arXiv preprint arXiv:1307.2533</source>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Likert</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>A technique for the measurement of attitudes</article-title>
          . Archives of psychology (
          <year>1932</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>