<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Spiraling out in control: A Video Cartesian Dialectic on a Socio-technical Approach to Teaching Privacy, Infor- mation- and Cyber Security (PICS)</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Joakim Kävrestad</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rose-Mharie Åhlfeldt</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marcus Nohlberg</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Johani Karonen</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stewart Kowalski</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Skövde</institution>
        </aff>
      </contrib-group>
      <fpage>153</fpage>
      <lpage>155</lpage>
      <kwd-group>
        <kwd>education</kwd>
        <kwd>spiral learning</kwd>
        <kwd>curriculum</kwd>
        <kwd>information security</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>In this video submission, a series of videos are presented in which colleagues at the
University of Skövde discuss teaching privacy, information- and cyber security (PICS)
at the bachelor and masters level using a Cartesian stylized 4 quadrant coordinate
system. This system is made up of a x axis with social and technical poles and y axis with
theory and practice poles as shown in figure 1, below. The figure is an attempt to frame
a socio-technical dialectic between the teachers in the course. We also hope that the
framework can be used as a platform by teachers and students to discuss the topics of
privacy, information security and cyber security as an emergent socio-technical
property.</p>
      <p>
        Spiral learning, or spiral curriculum, is a concept of teaching that was first described
by Jerome Bruner (1960) as a curriculum that is designed so that subjects are revisited
at higher and higher level throughout a learning process
        <xref ref-type="bibr" rid="ref1">(Bruner, 1960)</xref>
        . As described
by Harden (1999), Spiral learning includes the following features:
1. Subjects are revisited
2. Each return to a subject brings new information to the learner
3. New information is related to previous learning
4. The competence of the learner increases until the goals with the curriculum is meet.
As such, spiral learning is about identifying fundamental ideas, or principles of a
subject and make the student revisit those ideas again and again to understand them fully
at a complex level
        <xref ref-type="bibr" rid="ref3">(Howard, 2007)</xref>
        . In these video we attempt to give our students a
framework that they can reuse to revisit pedagogical material during the program.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Background</title>
      <p>PICS is an established platform for collaboration between researcher and educators and
practitioners at the University of Skövde. PICS started in 2016 and was an initiative
from researchers at the University of Skövde, where the area of privacy, information
security and cyber security was included in their respective research in different ways.
Given the high demand for increased competences in the area, a first step was to
develop a master's program that meets both academic and industrial demands. The PICS
Master will start in the fall 2019 and the applicant statistic show 15 first-hand applicants
per study position for a total of approximately 300 applicants.</p>
      <p>Industrial and academic demands require that the students are exposed to both theory
and practice. However give the complex nature of systems security the student is
required to be exposed to both social and technical theories and practice.</p>
      <p>Applying the ideas of spiral curriculum to the socio-technical approach the PICS
Master could be visualized with a Cartesian stylized 4 quadrant coordinate systems
made up of an x axis with social and technical poles and y axis with theory and practice
poles as shown in figure 1, below.
©Copyright held by the author(s)</p>
    </sec>
    <sec id="sec-3">
      <title>The Videos</title>
      <p>In their State of Video in Education report 20181, Kalura reports that the use of videos
for supplementary material in class has increased. The purpose to create this video was
to give our students a short high level introduction, i.e. commercial, to the
socio-technical philosophy behind the program.</p>
      <p>Using the idea of a spiraling curriculum to teach PICS as a socio-technical subject
we seek to make the student move around in the quadrant presented in Figure 1. As
such, the quadrant serves as a tool that helps us design a curriculum that ensures that
the students are learning all aspects of the PICS area at different levels of complexity.
In the video one, three educators from the PICS master program at the University of
Skövde discuss how their teaching focus cover different areas in the field.</p>
      <p>In video one2, the three educators have being interviewed using the 4 quadrant
system to discuss how their individual teaching focus and courses cover different areas and
directions.</p>
      <p>In video two3, the same educators are talking about the challenges facing privacy,
information security and cyber security education in society in general.</p>
      <p>In the third video4, the educators discuss the learning challenges facing student to
understand the socio-technical approach to the problem of privacy, information security
and cyber security?
4</p>
    </sec>
    <sec id="sec-4">
      <title>Summary and next steps</title>
      <p>These videos show the different approaches among the teachers, but also the usefulness
of the quadrants to explain just why, and how, the teachers approach are different, and
how best to utilize these differences. The videos will, be used to introduce our students
at the PICS-program to how we teach, and why. In the future more videos material
describing the development during the program will be developed.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Bruner</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>1960</year>
          ).
          <source>The process of Education</source>
          . Cambridge, MA: The President and Fellows of Harvard College
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Harden</surname>
            ,
            <given-names>R. M.</given-names>
          </string-name>
          (
          <year>1999</year>
          ).
          <article-title>What is a spiral curriculum?</article-title>
          .
          <source>Medical teacher</source>
          ,
          <volume>21</volume>
          (
          <issue>2</issue>
          ),
          <fpage>141</fpage>
          -
          <lpage>143</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Howard</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2007</year>
          ).
          <article-title>Curriculum development</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>1 http://www.kaltura.com</mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>2 http://websvrnu.his.se/pics/video-01/video-01.html</mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>3 http://websvrnu.his.se/pics/video-02/video-02.html</mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>4 http://websvrnu.his.se/pics/video-03/video-03.html</mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>