Infusing Aboriginal Perspectives in Cyber Education
DOI:
https://doi.org/10.4108/eetel.5779Keywords:
First Nations Perspectives, Indigenous Perspectives, Cyber Security, Cyber Education, Computer Science Education, Strength and Deficit-based DiscourseAbstract
While human factors are important in cyber security, the discipline has largely not explored incorporating indigenous perspectives—or, more specifically, in an Australian context, Aboriginal perspectives—in its curricula. In this paper, we introduce a promising approach for aligning Aboriginal perspectives with the needs of cyber security graduates and incorporating diverse perspectives into cyber degrees. The approach advocates for the centrality of good curriculum design fundamentals: backward design, constructive alignment, and student outcomes. The paper ends by reflecting on challenges and lessons from the first implementation and review of the material. It provides recommendations for other cyber practitioners exploring ways of incorporating indigenous perspectives in their teaching.
References
[1] “Indigenous strategy 2022–25,” Universities Australia, 2022. [Online]. Available: https://rb.gy/4yxo5p
[2] “What is reconciliation?” Reconciliation Australia., 2023. [Online]. Available: https://tinyurl.com/3jf23yak
[3] “Aboriginal and torres strait islander plan 2022–2026,” Edith Cowan University, 2022. [Online]. Available: https://tinyurl.com/ye94ddhp
[4] “Curriculum design.” Edith Cowan University, 2023. [Online]. Available: https://tinyurl.com/3yht5974
[5] C. Fforde, L. Bamblett, R. Lovett, S. Gorringe, and W. Fogarty, “Discourse, deficit and identity: Aboriginality, the race paradigm and the language of representation in contemporary australia,” Media International Australia incorporating Culture and Policy, vol. 149, pp. 162–173, 2013.
[6] M. L. J. H. M.-J. Fogarty, William; Lovell, “Deficit discourse and strengths-based approaches: changing the narrative of aboriginal and torres strait islander health and wellbeings,” Lowitja Institute, pp. 1–48, 2018.
[7] G. T. L. E. M. T.-K. P. J. . D. L. Kennedy, J., “A beginners guide to incorporating aboriginal perspectives into engineering curricula.” 2016. [Online]. Available: https://tinyurl.com/at9dh7rc
[8] “Expert advisory board appointed as development of new cyber security strategy begins.” Department of Home Affairs., 2022. [Online]. Available: https://tinyurl.com/29jbecbr
[9] “2022 employer satisfaction survey.” QILT, 2023. [Online]. Available: https://tinyurl.com/2hduke5n
[10] J. Wray, “The stereotype of cyber security.” 2022. [Online]. Available: https://tinyurl.com/3ydnnp3d
[11] L. Harjinder, S. Jane, J. Mike, J. Helge, P. Blaine, and H. Richard, “Pedagogic challenges in teaching cyber security – a uk perspective,” 2022.
[12] J. Allison, “Devising a cyber security management module through integrated course design,” Journal of Further and Higher Education, vol. 47, no. 10, pp. 1389–1403, 2023.
[13] J. T. F. on Cybersecurity Education, Cybersecurity Curricula 2017: Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity. New York, NY, USA: Association for Computing Machinery, 2018.
[14] L. Risse, M. Beamond, J. Hall, Y. Wang, M. Warren, B. Barua, and V. Kondylas, “Gender dimensions of the australian cyber security sector - report,” Melbourne, Australia.
[15] B. Bennett, “The courage to feel uncomfortable: what australians need to learn to achieve real reconciliation,” The Conversation, 2022. [Online]. Available: https://shorturl.at/jFGNX
[16] J. Biggs, “What the student does: teaching for enhanced learning,” Higher Education Research & Development, vol. 18, no. 1, pp. 57–75, 1999.
[17] T. Angelo, Designing subjects for learning: practical research-based principles and guidelines, 2012, pp. 93–111.
[18] L.-I. Rigney, A Design and Evaluation Framework for Indigenisation of Australian Universities. Singapore: Springer Singapore, 2017, pp. 45–63.
[19] “Embedding aboriginal and torres strait islander presence: Opening knowledge pathways,” Australian Department of Education., 2011. [Online]. Available: https://shorturl.at/yzCR3
[20] “United nations declaration on the rights of indigenous peoples,” United Nations, 2007. [Online]. Available: https://rb.gy/1mllum
[21] “Unfinished business - andrew mackenzie chief executive officer bhp.” BHP, 2019. [Online]. Available: https://cutt.ly/Ww7cT4jB
[22] C. Wahlquist, “Rio tinto blasts 46,000-year-old aboriginal site to expand iron ore mine,” Sydney Morning Herald, 2020. [Online]. Available: https://rb.gy/zs3hth
[23] N. Toscano and H. Hastie, “Rio tinto ceo, top executives resign amid cave blast crisis,” The Guardian, 2020. [Online]. Available: https://shorturl.at/xE248
[24] M. K. L., “The role of aboriginal knowledges in higher education in the 21st century,” Department of Education, Skills and Employment., 2020. [Online]. Available: https://shorturl.at/cgX19
[25] S. Singh, A. Cabraal, C. Demosthenous, G. Astbrink, and M. Furlong, “Security design based on social and cultural practice: Sharing of passwords usability and internationalization.” Australia: Springer, 2007, p. 10.
[26] ——, “Password sharing: implications for security design based on social practice,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ser. CHI ’07. New York, NY, USA: Association for Computing Machinery, 2007, p. 895–904.
[27] E. Rennie and T. Yunkaporta, “Aboriginal communities embrace technology, but they have unique cyber safety challenges,” The Conversation, 2016. [Online]. Available: https://shorturl.at/qPQV6
[28] M. E. Whitman and H. J. Mattord, Principles of information security, sixth edition. ed. Boston, MA: Cengage Learning, 2018.
[29] M. Walter, R. Lovett, B. Maher, B. Williamson, J. Prehn, G. Bodkin-Andrews, and V. Lee, “Indigenous data sovereignty in the era of big data and open data,” Australian Journal of Social Issues, vol. 56, no. 2, pp. 143–156, 2021.
[30] C. . M.-S. . S. L. Hyett, Sarah Louise ; Gabel, “Deficitbased indigenous health research and the stereotyping of indigenous peoples,” Canadian Journal of Bioethics / Revue canadienne de bioéthique, vol. 2, no. 2, pp. 102–109, 2019.
[31] J. Bryant, R. Bolt, J. R. Botfield, K. Martin, M. Doyle, D. Murphy, S. Graham, C. E. Newman, S. Bell, C. Treloar, A. J. Browne, and P. Aggleton, “Beyond deficit: ‘strengths-based approaches’ in indigenous health research,” Sociology of Health & Illness, vol. 43, no. 6, pp. 1405–1421, 2021.
[32] V. Villarroel, S. Bloxham, D. Bruna, C. Bruna, and C. Herrera-Seda, “Authentic assessment: creating a blueprint for course design,” Assessment & Evaluation in Higher Education, vol. 43, no. 5, pp. 840–854, 2018.
[33] D. Boud and N. Falchikov, “Aligning assessment with long-term learning,” Assessment & Evaluation in Higher Education, vol. 31, no. 4, pp. 399–413, 2006.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 John Shannahan, Mohiuddin Ahmed

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This is an open-access article distributed under the terms of the Creative Commons Attribution CC BY 4.0 license, which permits unlimited use, distribution, and reproduction in any medium so long as the original work is properly cited.