Ideologies and Issues for Teaching Blockchain Cybersecurity in Management and Computer Science

  • Kenneth David Strang
  • Ferdinand Che
  • Narasimha Rao VajjhalaEmail author


In this chapter, we explored the need for cybersecurity in higher education, why it is needed, what is needed, and what ideologies universities are applying in the management science and computer science disciplines. Based on a contemporary literature review sample, we identified blockchain technology as one of the most essential components of modern cybersecurity higher education in both management science and computer science disciplines. We briefly reviewed the topics which were being taught within blockchain cybersecurity across these two disciplines. We then investigated the different ideologies that several leading universities were employing to teaching blockchain. Interestingly, we found that universities were developing very divergent strategies to teach blockchain. We proposed a conceptual typology to synthesize the scholarly ideologies for teaching blockchain at universities based on the literature and based on our experiences. The proposed model can be used by decision-makers at any level to design programs at universities or by prospective students to analyze what to study when pursuing a degree in cybersecurity. This chapter articulates the strategies that international universities are using to design and deliver cybersecurity and risk management degrees. This chapter will benefit educators and students as it would offer critical insights concerning how blockchain technology is integrated into cybersecurity and risk management.


Technology Privacy Trust Education Innovation Cybersecurity Blockchain Topology Curricula Teaching Framework 


  1. 1.
    S.J. Roohani, X. Zheng, Using ten teaching modules and recently publicized data-breach cases to integrate cybersecurity into upper-level accounting courses, in Advances in Accounting Education: Teaching and Curriculum Innovations, vol. 23, ed. by T. Calderon. Advances in Accounting Education (Emerald Publishing Limited, Bingley, United Kingdom, 2019), pp. 113–125Google Scholar
  2. 2.
    S.C. Yang, B. Wen, Toward a cybersecurity curriculum model for undergraduate business schools: a survey of AACSB-accredited institutions in the United States. J. Educ. Bus. 92(1), 1–8 (2017)CrossRefGoogle Scholar
  3. 3.
    A. Fleury, M. Houssay-Holzschuch, For a social geography of emerging countries: introduction to the themed issue. EchoGéo 21(5), 1–15 (2012)Google Scholar
  4. 4.
    A. Igonor, R. Forbes, J. McCombs, Cybersecurity education: the quest to building “bridge” skills. ISSA J. 8(1), 18–26 (2019)Google Scholar
  5. 5.
    N.H.A. Rahim, S. Hamid, L.M. Kiah, S. Shamshirband, S. Furnell, A systematic review of approaches to assessing cybersecurity awareness. Kybernetes 44(4), 606–622 (2015)CrossRefGoogle Scholar
  6. 6.
    S. Turner, 2019 data breaches—the worst breaches, so far. We Aren’t Just Protecting You from Identity Theft. We Protect Who You Are, February 25, 2019.
  7. 7.
    R. Gupta, Hands-On Cybersecurity with Blockchain: Implement DDoS Protection, PKI-Based Identity, 2FA, and DNS Security Using Blockchain (Packt Publishing, Birmingham, 2018)Google Scholar
  8. 8.
    A. Arnold, 4 Promising use cases of blockchain in cybersecurity, in Forbes, ed. (Forbes, Jersey City, 2019)Google Scholar
  9. 9.
    E.A. Shammar, A.T. Zahary, The internet of things (IoT): a survey of techniques, operating systems, and trends. Library Hi Tech 38(1), 1–62 (2019)CrossRefGoogle Scholar
  10. 10.
    A.R. Mathew, Cyber security through blockchain technology. Int. J. Eng. Adv. Technol. 9(1), 3821–3824 (2019)CrossRefGoogle Scholar
  11. 11.
    D. Lending, M. Mitri, T.W. Dillon, Ingredients of a high-quality information systems program in a changing IS landscape. J. Inf. Syst. Educ. 30(4), 266–279 (2019)Google Scholar
  12. 12.
    W. Dettling, How to teach blockchain in a business school? in Business Information Systems and Technology 4.0: New Trends in the Age of Digital Change (Springer International Publishing, New York, 2018)Google Scholar
  13. 13.
    L. Li, X. Wu, Research on school teaching platform based on blockchain technology, in Presented at the 14th International Conference on Computer Science Education (ICCSE), Toronto, Canada, 19–21 August 2019, 2019Google Scholar
  14. 14.
    A.F. Camilleri, A. Inamorato dos Santos, A. Grech, Blockchain in education (EUR 28778). Joint Research Centre (European Commission) 2017. doi:
  15. 15.
    J.R. Butcher, C.M. Blakey, Cybersecurity Tech Basics: Blockchain Technology Cyber Risks and Issues, pp. 1–5.
  16. 16.
    J.H. Jo, S. Rathore, V. Loia, J.H. Park, A blockchain-based trusted security zone architecture. Electron. Libr. 37(5), 796–810 (2019)CrossRefGoogle Scholar
  17. 17.
    Y. Wang, J.H. Han, P. Beynon-Davies, Understanding blockchain technology for future supply chains: a systematic literature review and research agenda. Supply Chain Manag. Int. J. 24(1), 62–84 (2019)CrossRefGoogle Scholar
  18. 18.
    E. Bonson, M. Bednárová, Blockchain and its implications for accounting and auditing. Meditari. Account. Res. 27(5), 725–740 (2019)CrossRefGoogle Scholar
  19. 19.
    P.J. Taylor, T. Dargahi, A. Dehghantanha, R.M. Parizi, K.-K.R. Choo, A systematic literature review of blockchain cyber security. Digit. Commun. Networks 6(1), 1–10 (2019)Google Scholar
  20. 20.
    T. Zalan, Born global on blockchain. Rev. Int. Business Strat. 28(1), 19–34 (2018)CrossRefGoogle Scholar
  21. 21.
    P.R. Vargas, C.L. Soriano, Blockchain in the university: a digital technology to design, implement and manage global learning itineraries. Digit. Educ. Rev. 35(1), 130–150 (2019)Google Scholar
  22. 22.
    S.R. Kursh, N.A. Gold, Adding Fintech and blockchain to your curriculum. Business Educ. Innov. J. 8(2), 6–12 (2016)Google Scholar
  23. 23.
    H. Sun, X. Wang, X. Wang, Application of blockchain technology in online education. Int. J. Emerg. Technol. Learn. 13(10), 252–259 (2018)CrossRefGoogle Scholar
  24. 24.
    I. Purdon, E. Erturk, Perspectives of blockchain technology, its relation to the cloud and its potential role in computer science education. Eng. Technol. Appl. Sci. Res. 7(6), 2340–2344 (2017)CrossRefGoogle Scholar
  25. 25.
    R. Shrestha, R. Bajracharya, A.P. Shrestha, S.Y. Nam, A new type of bockchain for secure message exchange in VANET. Digit. Commun. Networks 6(1), 1–10 (2019)Google Scholar
  26. 26.
    D. Gountia, Towards scalability trade-off and security issues in state-of-the-art blockchain. EAI Endors. Transact. Secur. Safe. 5(18), 1–9 (2019)Google Scholar
  27. 27.
    E. Piscini, D. Dalton, L. Kehoe, Blockchain and cybersecurity, December 14, 2017.
  28. 28.
    H. Subramanian, Security tokens: architecture, smart contract applications and illustrations using SAFE. Manag. Financ. 45(12), 1–14 (2019)Google Scholar
  29. 29.
    Z. Cai, C. Du, Y. Gan, J. Zhang, W. Huang, Research and development of blockchain security. Int. J. Performabil. Eng. 14(9), 2040–2047 (2018)Google Scholar
  30. 30.
    M. Thombs, A.A. Tillman, Designing 21st century curriculum for Bitcoin and blockchain studies. Int. J. Global Business 11(1), 67–80 (2018)Google Scholar
  31. 31.
    T.S. Ryabova, S. Henderson, Integrating cryptocurrency into intermediate financial accounting curriculum: a case study. J. of Acco. And Fina. 19(6), 167–179 (2019)Google Scholar
  32. 32.
    D. Craigen, N. Diakun-Thibault, R. Purse, Defining cybersecurity. Technol. Innov. Manag. Rev. 4(10), 13–21 (2014)CrossRefGoogle Scholar
  33. 33.
    Y. Raban, A. Hauptman, Foresight of cyber security threat drivers and affecting technologies. Foresight 20(4), 353–363 (2018)CrossRefGoogle Scholar
  34. 34.
    R. Rust, Banking on blockchains: a transformative technology reshaping Latin American and Caribbean economies. Univ. Miami Inter-Am. Law Rev. 50(2), 185–196 (2019)Google Scholar
  35. 35.
    J.H. Park, J.H. Park, Blockchain security in cloud computing: use cases, challenges, and solutions. Symmetry 9(1), 164–177 (2017)CrossRefGoogle Scholar
  36. 36.
    D. Conte de Leon, A. Stalick, A. Jillepalli, M. Haney, F. Sheldon, Blockchain: properties and misconceptions. Asia Pacific J. Innov. Entrepren. 11(3), 286–300 (2017)CrossRefGoogle Scholar
  37. 37.
    G. Guo, Blockchain: an emerging technology perfect for emerging economies, December 14, 2019.
  38. 38.
    E. Murabito, Trust, Consensus and Truth, December 16, 2019.
  39. 39.
    K.D. Strang, Teaching virtual online courses in an era of negative student reviews: mixed methods controlled experiment and feedback, in Emerging Technologies in Virtual Learning Environments, ed. by K. Becnel, (Information Resources Management Association (IRMA), Hershey, PA, 2019), pp. 20–37CrossRefGoogle Scholar
  40. 40.
    S. Negash, D. Thomas, Teaching blockchain for business, in Presented at the IEEE Canadian Conference of Electrical and Computer Engineering (CCECE), Edmonton, Canada, 2019Google Scholar
  41. 41.
    X. Liu, A small Java application for learning blockchain, in Presented at the Electronics and Mobile Communication Conference (IEMCON), Vancouver, Canada, 2018Google Scholar
  42. 42.
    A.R. Rao, R. Dave, Developing hands-on laboratory exercises for teaching STEM students the internet-of-things, cloud computing and blockchain applications, in Presented at the Integrated STEM Education Conference (ISEC), Princeton, NJ, 2019Google Scholar
  43. 43.
    S. Zeltsinger. What to Teach when Teaching Blockchain? 2017.
  44. 44.
    A. Bicak, M. Liu, D. Murphy, Cybersecurity curriculum development: Introducing specialties in a graduate program. Inform. Syst. Educ. J. 13(3), 99–110 (2015)Google Scholar
  45. 45.
    D. Mouheb, S. Abbas, M. Merabti, Cybersecurity curriculum design: a survey, in Transactions on Edutainment XV, vol. 11345, ed. by Zhigeng Pan Adrian David Cheok Wolfgang Müller Mingmin Zhang Abdennour El Rhalibi Kashif Kifayat (Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 2019), pp. 93–107Google Scholar
  46. 46.
    K.D. Strang, Effectively Teach Professionals Online: Explaining and Testing Educational Psychology Theories (VDM Publishing, Saarbruecken, 2010)Google Scholar
  47. 47.
  48. 48.
    D.L. Burley et al., Cybersecurity curricula 2017: curriculum guidelines for post-secondary degree programs in cybersecurity, in Joint Task Force on Cybersecurity Education, IEEE Computer Society, 2017, doi:

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Kenneth David Strang
    • 1
  • Ferdinand Che
    • 2
  • Narasimha Rao Vajjhala
    • 2
    Email author
  1. 1.APCC ResearchLong IslandUSA
  2. 2.American University of NigeriaYolaNigeria

Personalised recommendations