Abstract
Information security is an important yet challenging area of education. Much of the difficulty lies in the complexity of security schemes and the often perceived disjoint between theory and practice. This paper investigates the topic of adopting cooperative learning for teaching secret sharing concepts and schemes. The aim of this is to motivate and cultivate an interest in students to learn more about the topic. By designing hands-on cooperative learning activities, the goal is help students appreciate the connection between theory and practice, and to be able to help and encourage each other in their understanding of the area. In this paper, we analyze the suitability of this group-based learning approach in relation to addressing the five essential elements of cooperative learning.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Beimel, A.: Secret-sharing schemes: a survey. In: Chee, Y.M., Guo, Z., Ling, S., Shao, F., Tang, Y., Wang, H., Xing, C. (eds.) IWCC 2011. LNCS, vol. 6639, pp. 11–46. Springer, Heidelberg (2011). doi:10.1007/978-3-642-20901-7_2
Bhattacharya, P., Yang, L., Guo, M., Qian, K., Yang, M.: Learning mobile security with labware. IEEE Secur. Priv. 12(1), 69–72 (2014)
Bishop, M.: What is computer security? IEEE Secur. Priv. 99(1), 67–69 (2003)
Blakley, G.: Safeguarding cryptographic keys. In: Proceedings of the 1979 AFIPS National Computer Conference, pp. 313–317 (1979)
Chow, Y.-W., Susilo, W., Wong, D.S.: Enhancing the perceived visual quality of a size invariant visual cryptography scheme. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 10–21. Springer, Heidelberg (2012). doi:10.1007/978-3-642-34129-8_2
Chow, Y.-W., Susilo, W., Yang, G., Phillips, J.G., Pranata, I., Barmawi, A.M.: Exploiting the error correction mechanism in QR codes for secret sharing. In: Liu, J.K.K., Steinfeld, R. (eds.) ACISP 2016. LNCS, vol. 9722, pp. 409–425. Springer, Cham (2016). doi:10.1007/978-3-319-40253-6_25
Decuyper, S., Dochy, F., Van den Bossche, P.: Grasping the dynamic complexity of team learning: an integrative model for effective team learning in organisations. Educ. Res. Rev. 5(2), 111–133 (2010)
Ernits, M., Kikkas, K.: A live virtual simulator for teaching cybersecurity to information technology students. In: Zaphiris, P., Ioannou, A. (eds.) LCT 2016. LNCS, vol. 9753, pp. 474–486. Springer, Cham (2016). doi:10.1007/978-3-319-39483-1_43
Johnson, D.W., Johnson, R.T.: Making cooperative learning work. Theory Pract. 38(2), 67–73 (1999)
Johnson, D.W., Johnson, R.T.: An educational psychology success story: social interdependence theory and cooperative learning. Educ. Res. 38(5), 365–379 (2009)
Kyndt, E., Raes, E., Lismont, B., Timmers, F., Cascallar, E., Dochy, F.: A meta-analysis of the effects of face-to-face cooperative learning. Do recent studies falsify or verify earlier findings? Educ. Res. Rev. 10, 133–149 (2013)
Locasto, M., Sinclair, S.: An experience report on undergraduate cyber-security education and outreach. In: Annual Conference on Education in Information Security (ACEIS) (2009)
Logan, P.Y., Clarkson, A.: Teaching students to hack: curriculum issues in information security. In: ACM SIGCSE Bulletin, vol. 37, pp. 157–161. ACM (2005)
Naor, M., Shamir, A.: Visual cryptography. In: Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). doi:10.1007/BFb0053419
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Slavin, R.E.: When does cooperative learning increase student achievement? Psychol. Bull. 94(3), 429 (1983)
Terry, C., Castellano, A., Harrod, J., Luke, J., Reichherzer, T.: The UWF cyber battle lab: a hands-on computer lab for teaching and research in cyber security. In: Proceedings of the International Conference on Security and Management (SAM), p. 1. The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp) (2014)
Wu, D., Fulmer, J., Johnson, S.: Teaching information security with virtual laboratories. In: Carroll, J.M. (ed.) Innovative Practices in Teaching Information Sciences and Technology, pp. 179–192. Springer, Cham (2014). doi:10.1007/978-3-319-03656-4_16
Xu, L., Huang, D., Tsai, W.-T.: Cloud-based virtual laboratory for network security education. IEEE Trans. Educ. 57(3), 145–150 (2014)
Acknowledgments
The authors would like to acknowledge the support of the UOW UIC International Links Grant 2017 that was awarded for this study.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Chow, YW., Susilo, W., Yang, G. (2017). Cooperative Learning in Information Security Education: Teaching Secret Sharing Concepts. In: Luo, Y. (eds) Cooperative Design, Visualization, and Engineering. CDVE 2017. Lecture Notes in Computer Science(), vol 10451. Springer, Cham. https://doi.org/10.1007/978-3-319-66805-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-66805-5_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-66804-8
Online ISBN: 978-3-319-66805-5
eBook Packages: Computer ScienceComputer Science (R0)