skip to main content
10.1145/1940941.1940943acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
research-article

Active learning approaches to teaching information assurance

Published: 01 October 2010 Publication History

Abstract

This paper presents several active learning strategies to engage students in Information Assurance (IA) concepts and to enhance their learning experience. Simply listening to a lecture or attending a physical computing laboratory to explore IA concepts for numerous reasons, may not be ideal. Passive involvement of students in their learning process generally leads to a limited retention of knowledge. Students today have excellent visuospatial reasoning skills and the instructional methods chosen should be visual and require active participation. We are exploring several active learning pedagogies in hopes of increasing IA awareness amongst undergraduate computer science majors and non-majors.

References

[1]
Academic Technology Center: Teaching with Technology Collaboratory, Benefits of Using Discussion Boards in Your Classes, http://www.wpi.edu/Academics/ATC/Collaboratory/Idea/boardbenefits.html, accessed 07/15/10.
[2]
Bligh, D. (2000). What's the point in discussion? Portland, Oregon: Intellect Books.
[3]
Burd, Stephen & Conway, Christopher & Seazzu, Alessandro. (2009). Virtual Computing Laboratories: A Case Study With Comparisons To Physical Computing Laboratories. Journal of Information Technology Education. Volume 8.
[4]
Bullers, W. I., Burd, S. D., and Seazzu, A. (2006). Virtual Machines - An Idea Whose Time Has Returned: Application to Network, and Security, and Database Courses, ACM SIGCSE Bulletin (Inroads), March 2006, pp. 102--106.
[5]
Conklin, A. (2006). Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course. In Proceedings of the 39th Annual Hawaii international Conference on System Sciences - Volume 09(January 04--07, 2006). HICSS. IEEE Computer Society, Washington, DC, 220.2.
[6]
Finkelstein, N. D., Adams, W. K., Keller, C. J., Kohl, P. B., Perkins, K. K., & Podolefsky, N. S., et al. (2005). When learning about the real world is better done virtually: A study of substituting computer simulations for laboratory equipment. Phys. Rev. ST Phys. Educ. Res.
[7]
Habraken, C. (2004). Integrating into chemistry teaching today's student's visuospatial talents and skills, and the teaching of today's chemistry's graphical language. Journal of Science Education and Technology, 13(1), 89--94.
[8]
Gehringer, E. F. and Miller, C. S. (2009). Student-generated active-learning exercises. SIGCSE Bull. 41, 81--85.
[9]
Graaff, E. de, G. N. Saunders-Smits & M. R. Nieweg. (eds.) (2005). Research and Practice of Active Learning in Engineering Education. Amsterdam: Pallas Publications.
[10]
Johnson, D., Johnson, R., and Smith, K. (1998). Active Learning: Cooperation in the College Classroom, 2nd ed., Interaction Book Co., Edina, MN.
[11]
McConnell, S. & SchoenfeldTachner, R. (2001). Transferring your passion for teaching to the online environment: A five step instructional development model. EJournal of Instructional Science and Technology, 4(1).
[12]
McKeachie, W. J., & Svinicki, M. (2006). McKeachie's teaching tips: Strategies, Research, and Theory for College and University Teachers (12th ed.). Boston, MA: Houghton Mifflin.
[13]
McDonald, J. (2002). Is "as good as facetoface" as good as it gets? Journal of Asynchronous Learning, 2(2), 12--23.
[14]
Mitnick, K. and Simon, W. (2002). The Art of Deception: Controlling the Human Element of Security. Indianapolis, IN: Wiley Publishing, Inc.
[15]
Moreno, R. and Mayer, R. E. (1999). Cognitive principles of multimedia learning: The role of modality and contiguity. Journal of Educational Psychology, 91, 358--368.
[16]
National Security Agency Central Security Service. IA Courseware Evaluation Program. http://www.nsa.gov/ia/academic_outreach/iace_program/index.shtml, accessed 07/14/2010.
[17]
Online Collaborative Learning in Higher Education, http://clp.cqu.edu.au/glossory.htm, accessed 07/15/2010.
[18]
Padman, V. and Memon, N. (2002). Design of a Virtual Laboratory for Information Assurance Education and Research. In the Proceedings of the 2002 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY, 17--19.
[19]
Paulson, D. and Faust, J. Active Learning for the College Classroom, http://www.calstatela.edu/dept/chem/chem2/Active/, accessed 07/10/2010.
[20]
Pheeney, P. (1997). Hands on, minds on: Activities to engage our students. Science Scope, 21(4), 30--33.
[21]
Pimm, D. (1987). Speaking mathematically: Communication in mathematics classrooms. New York. Routledge & Kegan Paul.
[22]
Prince, M. (2004). Does Active Learning Work? A Review of the Research. Journal of Engineering Education
[23]
Study Guides and Strategies. http://www.studygs.net/pbl.htm, accessed 07/10/2010.
[24]
Whitman, M. and Mattord, H. (2011). Readings and Cases in Information Security Law and Ethics. Course Technology Cengage Learning.

Cited By

View all
  • (2021)Incorporating active learning activities to the design and development of an undergraduate software and web security courseJournal of Computers in Education10.1007/s40692-021-00194-9Online publication date: 16-Jun-2021
  • (2019)On the Learning Activities and Outcomes of an Information Security CourseProceedings of the 19th Koli Calling International Conference on Computing Education Research10.1145/3364510.3366158(1-2)Online publication date: 21-Nov-2019
  • (2015)Integrate mobile devices into CS security educationProceedings of the 2015 Information Security Curriculum Development Conference10.1145/2885990.2885991(1-4)Online publication date: 10-Oct-2015

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
InfoSecCD '10: 2010 Information Security Curriculum Development Conference
October 2010
187 pages
ISBN:9781450302029
DOI:10.1145/1940941
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • KSU - CISE: KSU Center for InfoSec Education
  • ISSA: The Metro Atlanta Information Systems Security Association

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 October 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. active leaning
  2. e-learning
  3. hands-on lab
  4. information assurance
  5. virtual labs

Qualifiers

  • Research-article

Funding Sources

Conference

InfoSecCD '10
Sponsor:
  • KSU - CISE
  • ISSA

Acceptance Rates

Overall Acceptance Rate 18 of 23 submissions, 78%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)2
Reflects downloads up to 12 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Incorporating active learning activities to the design and development of an undergraduate software and web security courseJournal of Computers in Education10.1007/s40692-021-00194-9Online publication date: 16-Jun-2021
  • (2019)On the Learning Activities and Outcomes of an Information Security CourseProceedings of the 19th Koli Calling International Conference on Computing Education Research10.1145/3364510.3366158(1-2)Online publication date: 21-Nov-2019
  • (2015)Integrate mobile devices into CS security educationProceedings of the 2015 Information Security Curriculum Development Conference10.1145/2885990.2885991(1-4)Online publication date: 10-Oct-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media