Join Login

Membership and collaboration facilitated by Member 365.


Join Login

Membership and collaboration facilitated by Member 365.

22nd Colloquium

Ethical Thinking in Cyber Space

  • Concluded
  • June 11, 2018
  • 3:15 PM to 6:00 PM
  • Poydras

Cybersecurity professional face significant ethical dilemmas in responding to a range of events including malicious hacking all the way up through state sponsored cyber-attacks. How best can we as educators prepare our students to meet such evolving ethical challenges? To address this increasing concern, researchers at the University of Illinois at Urbana-Champaign are hosting a workshop at CISSE 2018 with sponsorship from the U.S. National Security Agency.

To register for this event: Workshop Registration

For more information about this initiative:

Our goals for the workshop are to inspire ethical inquiry in cybersecurity that can foster a culture of dialogue and ethical engagement for the field of cybersecurity and to get your feedback on a graduate level cybersecurity ethics curriculum developed and piloted at the University of Illinois. We will share our curricular materials with you and we are interested in your ideas for adapting the curriculum to other contexts (K-12, community college/undergraduate, and professional). We are interested to know what you see as the most pressing ethical issues facing cybersecurity and would like to think together about how to move forward with this initiative.

EThiCS Workshop Planning Committee

  • Roy Campbell, University of Illinois at Urbana-Champaign
  • Masooda Bashir, University of Illinois at Urbana-Champaign
  • Jane Blanken-Web, University of Illinois at Urbana-Champaign


3:15 PM
4:15 PM

Panel Discussion

  • Matthew Bishop, University of California, Davis
  • Melissa Dark, Purdue University
  • Scott Shackelford, Indiana University

  • Matthew Bishop, Melissa Dark, Scott Shackelford

4:15 PM
5:15 PM

EThiCS Curriculum Workshop

University of Illinois at Urbana-Champaign

  • Roy Campbell, Jane Blanken-Webb, Masooda Bashir, India Owens, Xiaorui Yang, Sarah Elizabeth Deshaies

5:15 PM
6:00 PM



Matthew Bishop

Matt Bishop received his Ph.D. in computer science from Purdue University, where he specialized in computer security, in 1984. He is on the faculty at the Department of Computer Science at the University of California at Davis, California, USA. His main research area is the analysis of vulnerabilities in computer systems, including modeling them, building tools to detect vulnerabilities, and ameliorating or eliminating them. Currently, he has research projects involving data sanitization, modeling election processes, and examining metrics for evaluating network attack detection mechanisms; he is also looking at the "insider" problem. He has been active in the area of UNIX security since 1979, and has presented tutorials at SANS, USENIX, and other conferences. He also has done work on electronic voting, and was one of the two principle investigators of the California Top-to-Bottom Review, which performed a technical review of all electronic voting systems certified for use in the State of California, USA. His textbook, Computer Security: Art and Science, was published in December 2002 by Addison-Wesley Professional. He also teaches software engineering, machine architecture, operating systems, programming, and (of course) computer security.

Melissa Dark

Dr. Melissa Dark is currently the W.C. Furnas Professor of Technology in Computer and Information. Melissa Dark has extensive experience teaching, curriculum development, and instructional research and assessment. She is currently leading several projects / initiatives in cybersecurity education including:

  • INSuRE - this project is a cybersecurity research collaborative that uses the cybersecurity student talent pool to work on problems of national interest supplied by federal agencies and national labs, and at the same time develops hands-on, applied research skills of students.
  • Secure Programming Clinic - this project that is developing a concept inventory to diagnose learners misconceptions in secure programming.
  • Cyber fMRI - this project that is investigating the use of representational fluency to develop deep conceptual understanding of selected complex cybersecurity topics.
  • C5 - this project is focused on developing the capacity of community colleges in cybersecurity and computing.

Scott Shackelford

Indiana University

Last modified on Friday, 01 June 2018 12:53

The Colloquium recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information is vital to business continuity and security. The Colloquium's goal is to work together to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula, especially at the graduate and undergraduate levels.


Save money and support the Colloquium for Information Systems Security Education.

Recent Posts