Skip to main content

Practice in Compound Practical Teaching Method for Information Security Major

  • Conference paper
Advances in Computer Science, Environment, Ecoinformatics, and Education (CSEE 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 218))

  • 1085 Accesses

Abstract

This paper discusses the construction and improvement of the teaching system for information security major of northeastern university, including curriculum system, practice, training, graduation design and other aspects. We research the professionals teaching processes and guarantee system in information security major and practice it in daily teaching and some descriptions of the application results of this program is presented. The application results by the teaching method get good feedback.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. China Ministry of Education Class Information Security Steering Committee for Professional Teaching, http://www.sec-edu.cn/index.html

  2. Jonathan, R.: Online education as a toll good: An examination of the South Carolina virtual school program. Computers and Education 57(2), 1583–1594 (2011)

    Article  Google Scholar 

  3. Wang, Y.H., Liu, G.Y.: China accounting education change in the knowledge society: The constructivism education. In: 2nd International Workshop on Education Technology and Computer Science, ETCS 2010, 3rd edn., pp. 542–545 (2010)

    Google Scholar 

  4. Garrido, J.M., Bandyopadhyay, T.: Simulation model development in information security education. In: Proceedings of the 2009 Information Security Curriculum Development Annual Conference, InfoSecCD 2009, pp. 21–26 (2009)

    Google Scholar 

  5. Al-Hamdani, W.A., Dixie, W.D.: Information security policy in small education organization. In: Proceedings of the 2009 Information Security Curriculum Development Annual Conference, InfoSecCD 2009, pp. 72–76 (2009)

    Google Scholar 

  6. Wu, C.Y.: Analysis on the information security education for the public security active forces academy. In: 2010 International Forum on Information Technology and Applications, IFITA 2010, vol. 3, pp. 355–357 (2010)

    Google Scholar 

  7. Marks, A., Rezgui, Y.: A comparative study of information security awareness in higher education based on the concept of design theorizing. In: International Conference on Management and Service Science, MASS (2009)

    Google Scholar 

  8. Aboutabl, M.: The CyberDefense laboratory: A framework for information security education. In: Aboutabl, M. (ed.) Proceedings of the 2006 IEEE Workshop on Information Assurance, vol. 2006, pp. 55–60 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tan, Z., Yang, G., Zhu, Z., Ma, Y. (2011). Practice in Compound Practical Teaching Method for Information Security Major. In: Lin, S., Huang, X. (eds) Advances in Computer Science, Environment, Ecoinformatics, and Education. CSEE 2011. Communications in Computer and Information Science, vol 218. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23357-9_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23357-9_40

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23356-2

  • Online ISBN: 978-3-642-23357-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics