This paper is presented on International Conference on Human Computing Education and Information Management System ( ICHCEIMS 2016 ) – Sydney, Australia on March 27 – 28, 2016 Princess Rin Rin Project : Development and Deployment of Multilingual Security Literacy e-Learning Hiroshi Ueda Academic Center for Computing and Media Studies, Kyoto University Yoshida-honmachi, Sakyo-ku, Kyoto 606-8501, JAPAN uep@media.kyoto-u.ac.jp Motonori Nakamura National Institute of Informatics 2-1-2 Hitotsubashi, Chiyoda-Ku, Tokyo 101-8430, JAPAN motonori@nii.ac.jp Abstract: The goal of this study is to improve education for security literacy in university by developing sustainable framework. This paper deals with an on-line e-learning activity applied our contents from 2011 to 2015. The elearning we have developed is multilingual, based on common security guideline in Japan, and took sustainability into consideration. Additionally, a kind animation character, "Princess Rin Rin" and "Chu-kichi" help us. "GakuNin'' authentication federation-enabled CMS "GakuNinMoodle" was used for deployment the eleaning toward nationwide universities. As a result, GakuNinMoodle and the contens, "Learn with Princess Rin Rin: Cyberethics'' was successfully deployed to 102 institutes. In addition, it was found that a way to improve a performance of CMS under the situation of massive access and downloading learning log. In conclusion, our activity have sufficient feature to improve e-learning on security literacy in Japan. Keywords—e-learning; security literacy; moodle; authentication federation I. INTRODUCTION It is required taking an action for security incidents since network connected devices such as PCs, Tablets, Smart-phones grew as core platform of education and research on institutes. In addition, computer supported education is advancing recently [1]. Education on security literacy to users is the best way to prevent security incidents with understand and act of users such as phishing, information leak, targeted mail attack, illegal access, piracy, because it is limited that security barrier such as firewall, anti-virus scanner, intrusion detection. A number of effort have been made in recent years to develop education on security literacy. These include face-to-face education by ICT division of university [2], educational videos [3, 4], and game-based interactive contents [5, 6, and 7]. This paper is presented on International Conference on Human Computing Education and Information Management System ( ICHCEIMS 2016 ) – Sydney, Australia on March 27 – 28, 2016 However, unlike the efforts made in many ways, very little attention was given to the standardization of education contents and the visualization to make evidence data. In addition, it is not enough to provide education by Japanese and English since there are more than 130,000 foreign students in Japan [8]. Furthermore, though education for security literacy should be viewed as a continuing process, technical difficulty and cost to keep upto-date these contents was reported. The goal of this study was to improve education for security literacy in university by developing sustainable contents and its deployment. This paper deals with an on-line e-learning activity applied our contents from 2011 to 2015. E-Learning which is not restricted by learner's location or time limitation have been employed for that purpose. The e-learning contents we have developed is multilingual, based on common security guideline in Japan, and took sustainability into consideration. Additionally, a kind animation character joins to help us. "GakuNin'' authentication federation-enabled CMS (Course Management System) was used for deployment the elearning for "Cyberethics'' to nationwide universities. Our project has been carried out standardization, visualization and multilingualization of education on security literacy in japan since GakuNinMoodle (https://security-learning.nii.ac.jp/) and "Learn with Princess Rin Rin: Cyberethics'' was accessed from 102 institutes such as Kyoto University, Gunma University, National Institute of Technology. In addition, it was found that a way to improve a performance of CMS under the situation of massive access and downloading learning log. II. METHOD Our "Cyberethics'' education e-leaning project aimed at to learn anytime, anywhere by standard contents. The contents have two appealing characters, "Princess Rin Rin'' and "Chu-Kichi'' shown in Fig. 1. That is why our project called "Princess Rin Rin Project''. Our three development principles are, (1) Standard and visible; (2) Multilingual; (3) Sustainable. The detail are as follows. Figure 1. "Princess Rin Rin'' and "Chu-Kichi'' This paper is presented on International Conference on Human Computing Education and Information Management System ( ICHCEIMS 2016 ) – Sydney, Australia on March 27 – 28, 2016 TABLE I. TOC OF "LEARN WITH PRINCESS RIN RIN: CYBERETHICS'' Chapter Content Estimated Time (Minutes) Introduction Foreword Introduction of the Cast 5 1 Living in the Information Age 10 2 Protection of Privacy 15 3 Intellectual Property Rights 10 4 Email 15 5 The Internet 20 6 Computer Viruses 15 7 Unauthorized Access 15 8 File-Sharing 10 Conclusion A Final Word 5 Figure 2. Example of "Dangermeter". (Korean) (1) Standard and visible: The contents based on Japanese standard security education material, "The Sample Policies for Information Security Measures for Institutions of Higher Education'' provided by National Institute of Informatics [9]. Namely, it is not needed to re-define inside contents since the contents based on "The Sample Policies". Our contents provides topics as in Table 1 with 10 chapters and final exam, and each chapter goes on as follows: Dangermeter: Pre-quiz to remind yourself on security literacy. (Fig. 2) A True Story: Familiar examples of information security incidents. (Fig. 3) Basic Information: An instruction to keep safe on information literacy. (Fig. 4) This paper is presented on International Conference on Human Computing Education and Information Management System ( ICHCEIMS 2016 ) – Sydney, Australia on March 27 – 28, 2016 Quiz: Review exercises corresponds to each chapter. (Fig. 5) Moreover, by employing SCORM (Sharable Content Object Reference Model) [10] content package which is a collection of standard and specifications for web-based e-learning, developing in standard is enabled. And another point of our project, also common open-source CMS Moodle [11], make visibility by processing learning logs. (2) Multilingual: Japanese, English, Chinese and Korean version are developed with considering cultural differences. It is not just translation since direct-translation from Japanese mild text may not be enough to make foreign students understand. For example, we revise not only text and voice but also figure and movie. In addition, taking simple and clear content is made in production of English version to enhance understanding for non-native English speakers. (3) Sustainable: Revision within section or page is allowed by using HTML5 wrapped by SCORM as contents structure, and computer-generated voice software. SCORM package is suitable for keeping updated since it is made from separated files such as manifest (imsmanifest.xml) which defines its structure and e-resources such as HTML, mp3. Also computer-generated voice software is useful to make and edit multi-language voice. It has been popular in everyday use such as station and airport broadcast, voice of telephone customer service office. A nationwide e-learning on Cyberethics by GakuNinMoodle which can be accessed from federated institutions in order to pursue not copy distribution, but centralized contents management, started at November 2012. GakuNinMoodle is authentication-federated LMS as shown in Table 2, so that GakuNin is authentication federation framework based on Shibboleth [12] middleware in Japan. GakuNinMoodle extended from original moodle has features as follows: Figure 3. Example of a true story section. (English) This paper is presented on International Conference on Human Computing Education and Information Management System ( ICHCEIMS 2016 ) – Sydney, Australia on March 27 – 28, 2016 Figure 4. Example of a basic information page. (Chinese) Figure 5. Example of a quiz. (Japanese) 1. Authentication via institute's IdP (Identity Provider): Shibboleth authentication capable. 2. Creating own separate course by institute: Specific e-learning course may be required. 3. Store nothing except institute name: Use PseudoID concatenated URL of IdP and SP (Service Provide) and ID hash. 4. Learning log filter by institute: Visualize e-learning is needed. III. RESLUT Fig. 6 shows the login and the unique login attempts of GakuNinMoodle from September 2013 on. GakuNinMoodle was used by 102 institutions (Public university: 32, Private University: 52, National Institute of Technology: 52, other: 3) as of Sept. 5, 2015. Overall login and unique attempts are 90,283, 27,840 respectively. This paper is presented on International Conference on Human Computing Education and Information Management System ( ICHCEIMS 2016 ) – Sydney, Australia on March 27 – 28, 2016 TABLE II. A SYSTEM OVERVIEW OF GAKUNINMOODLE CPU Intel(R) Xeon(R) CPU L5520 @ 2.27GHz RAM 8GB OS CentOS 5.11 Web server Apache httpd 2.2.3 Database MySQL 5.5.37 PHP PHP 5.4.27 Base CMS Moodle 2.6.2 (Build 20140310) Figure 6. Login Activity of GakuNinMoodle as of 2014-2015. Figure 7. CPU load statstics of GakuNinMoodle as of 2014. From the result, user activities on GakuNinMoodle increase and vary with large number of institutions and course completion request from institution to users. For example, Kyoto University promotes to learn security literacy by "Learn with Princess Rin Rin'' on GakuNinMoodle for all the newcomers including foreigners. They reported that 78% in 2013, 81% in 2014, 85% in 2015 This paper is presented on International Conference on Human Computing Education and Information Management System ( ICHCEIMS 2016 ) – Sydney, Australia on March 27 – 28, 2016 newcomers complete the contents. Another example, National Institute of Technology that have 52 campus in many parts of Japan joined GakuNin authentication federation in 2014 in order to use GakuNinMoodle, and decided to take "Learn with Princess Rin Rin: Cyberethics'' for all faculty member until Sept. 2014. The daily CPU load average of GakuNinMoodle in 2014 academic year are plotted in Fig. 7. The results shows that the CPU load average approaches "25'' and the system fails to continue service with access from National Institute of Technology just before their deadline, Sept. 2014. The improvement of server performance successfully applied in Oct. 2014 to work around for massive access the course until Oct. 31 2014, extended deadline: change of child process creation of HTTP daemon, optimization of database memory usage. IV. DISCUSSION The goal of this study was to improve education for security literacy in university by developing sustainable contents and its deployment. This paper deals with an on-line e-learning activity applied our contents from 2011 to 2015. Our project has been carried out standardization, visualization and multilingualization of education on security literacy in japan since GakuNinMoodle and "Learn with Princess Rin Rin: Cyberethics'' was accessed from 102 institutes such as Kyoto University, Gunma University, National Institute of Technology. In addition, it was found that a way to improve a performance of CMS under the situation of massive access and downloading learning log. This is in contrast to previous e-learning on security literacy in which, problems that is a not standardized content, difficult to keep up-to-date, targeted not to foreign student, were reported. In our project, the actual improvement of security literacy education by providing standardized, sustainable, multi-language e-learning contents on GakuNinMoodle which can used for federated institutions in Japan, to solve these problems were made. Further work is underway to analyze learning record and system log to improve contents with an idea that the best way to improve e-learning is consider learner's behavior. In conclusion, our GakuNinMoodle and contents, "Learn with Princess Rin Rin: Cyberethics'' have sufficient feature to improve for e-learning on security literacy in Japan. V. CONCLUSION E-Learning which is not restricted by learner's location or time limitation have been employed for that purpose. The e-learning contents we have developed is multilingual, based on common security guideline in Japan, and took sustainability into consideration. Additionally, a kind animation This paper is presented on International Conference on Human Computing Education and Information Management System ( ICHCEIMS 2016 ) – Sydney, Australia on March 27 – 28, 2016 character joins to help us. "GakuNin'' authentication federation-enabled CMS (Course Management System) was used for deployment the elearning for "Cyberethics'' to nationwide universities. Our project has been carried out standardization, visualization and multilingualization of education on security literacy in japan since GakuNinMoodle and "Learn with Princess Rin Rin: Cyberethics'' was accessed from 102 institutes such as Kyoto University, Gunma University, National Institute of Technology. In addition, it was found that a way to improve a performance of CMS under the situation of massive access and downloading learning log. From the development and the deployment, we can conclude; 1. Employing e-learning with standardized contents can be the solution for improvement of security literacy education in university. 2. Though foreign students can understand Japanese, multi-language education is important for universities in Japan that takes on a large number of them. 3. It is recommended that sufficient server resource, examined plan for running CMS to deploy e-learning nationwide successfully because performance bottlenecks will easily arise under the situation that many concurrent access and a large number of database queries are reported. ACKNOWLEDGMENT I wish to thank the members of Working Group for Promoting Information Security Policy in Institutions of Higher Education, who established The Sample Policies for Information Security Measures for Institutions of Higher Education. For research and deployment assistance, thanks to: member of Kyoto University, National Institute of Informatics, Gunma University, National Institute of Technology, RYOMO SYSTEMS CO., LTD and SOUM Corporation. This work was supported in part by JSPS KAKENHI Grant Number 26330397. REFERENCES [1] Ministry of Education, Culture, Sports, Science and Technology, "A Survey on the Use of ICT in Higher Education", 2014. [Online]. Available: http://www.mext.go.jp/a_menu/koutou/itaku/1347642.htm. [Accessed: 20- Jan- 2016]. [2] Nishimura, K.; Ohigashi, T.; Iwasawa, K.; Sumiya, T.;Inagaki, T.; Nakamura, A.; Miyauchi, Y.; Mito, S. & Aibara R. "An Implementation of Information Security and Compliance Course in Hiroshima University", IPSJ SIG Technical Reports(IOT), vol. 2012, no. 2, pp. 1-6, 2012. [3] T. Yamanoue, I. Fuse, S. Okabe, A. Nakamura, M. Nakanishi, S. Fukada, T. Tagawa, T. Takeo, I. Murata, T. Uehara, T. Yamada and H. Ueda, "Computer Ethics Video Clips for University Students in Japan from 2003 until 2013", 2014 IEEE 38th International Computer Software and Applications Conference Workshops, 2014. This paper is presented on International Conference on Human Computing Education and Information Management System ( ICHCEIMS 2016 ) – Sydney, Australia on March 27 – 28, 2016 [4] National Institute of Informatics, "Hikari and Tsubasa’s Information Security Three Choice Class", 2005. [Online]. Available: http://www.nii.ac.jp/service/portal/hikatsuba/. [Accessed: 20Jan- 2016]. [5] M. Kawakami, H. Yasuda and R. Sasaki, "Development of an E-learning Content-Making System for Information Security (ELSEC) and its Application to Anti-phishing Education", 2010 International Conference on e-Education, e-Business, e-Management and eLearning, 2010. [6] S. Sheng, B. Magnien, P. Kumaraguru, A. Acquisti, L. Cranor, J. Hong and E. Nunge, "AntiPhishing Phil", Proceedings of the 3rd symposium on Usable privacy and security - SOUPS '07, 2007. [7] Information-technology Promotion Agency, Japan, "e-Learning Contents for Evaluation and Certification on Information Security", 2016. [Online]. Available: https://www.ipa.go.jp/security/fy19/development/e_Learning_CC/. [Accessed: 20- Jan- 2016]. [8] Independent Administrative Institution Japan Student Services Organization, "International Students in Japan 2014", 2016. [Online]. Available: http://www.jasso.go.jp/en/about/statistics/intl_student/data2014.html. [Accessed: 20- Jan- 2016]. [9] National Institute of Informatics, "The Sample Policies for Information Security Measures for Institutions of Higher Education", 2015. [Online]. Available: http://www.nii.ac.jp/csi/sp/. [Accessed: 20- Jan- 2016]. [10] ADL Net, "SCORM", 2015. [Online]. Available: http://adlnet.gov/adl-research/scorm/. [Accessed: 20- Jan- 2016]. [11] Moodle.org, "Moodle - Open-source learning platform | Moodle.org", 2016. [Online]. Available: https://moodle.org/. [Accessed: 20- Jan- 2016]. [12] Shibboleth.net, "Shibboleth", 2016. [Online]. Available: https://shibboleth.net/. [Accessed: 25Jan-