ABSTRACT
This paper presents several active learning strategies to engage students in Information Assurance (IA) concepts and to enhance their learning experience. Simply listening to a lecture or attending a physical computing laboratory to explore IA concepts for numerous reasons, may not be ideal. Passive involvement of students in their learning process generally leads to a limited retention of knowledge. Students today have excellent visuospatial reasoning skills and the instructional methods chosen should be visual and require active participation. We are exploring several active learning pedagogies in hopes of increasing IA awareness amongst undergraduate computer science majors and non-majors.
- Academic Technology Center: Teaching with Technology Collaboratory, Benefits of Using Discussion Boards in Your Classes, http://www.wpi.edu/Academics/ATC/Collaboratory/Idea/boardbenefits.html, accessed 07/15/10.Google Scholar
- Bligh, D. (2000). What's the point in discussion? Portland, Oregon: Intellect Books.Google Scholar
- Burd, Stephen & Conway, Christopher & Seazzu, Alessandro. (2009). Virtual Computing Laboratories: A Case Study With Comparisons To Physical Computing Laboratories. Journal of Information Technology Education. Volume 8.Google Scholar
- Bullers, W. I., Burd, S. D., and Seazzu, A. (2006). Virtual Machines - An Idea Whose Time Has Returned: Application to Network, and Security, and Database Courses, ACM SIGCSE Bulletin (Inroads), March 2006, pp. 102--106. Google ScholarDigital Library
- Conklin, A. (2006). Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course. In Proceedings of the 39th Annual Hawaii international Conference on System Sciences - Volume 09(January 04--07, 2006). HICSS. IEEE Computer Society, Washington, DC, 220.2. Google ScholarDigital Library
- Finkelstein, N. D., Adams, W. K., Keller, C. J., Kohl, P. B., Perkins, K. K., & Podolefsky, N. S., et al. (2005). When learning about the real world is better done virtually: A study of substituting computer simulations for laboratory equipment. Phys. Rev. ST Phys. Educ. Res.Google ScholarCross Ref
- Habraken, C. (2004). Integrating into chemistry teaching today's student's visuospatial talents and skills, and the teaching of today's chemistry's graphical language. Journal of Science Education and Technology, 13(1), 89--94.Google ScholarCross Ref
- Gehringer, E. F. and Miller, C. S. (2009). Student-generated active-learning exercises. SIGCSE Bull. 41, 81--85. Google ScholarDigital Library
- Graaff, E. de, G. N. Saunders-Smits & M. R. Nieweg. (eds.) (2005). Research and Practice of Active Learning in Engineering Education. Amsterdam: Pallas Publications.Google Scholar
- Johnson, D., Johnson, R., and Smith, K. (1998). Active Learning: Cooperation in the College Classroom, 2nd ed., Interaction Book Co., Edina, MN.Google Scholar
- McConnell, S. & SchoenfeldTachner, R. (2001). Transferring your passion for teaching to the online environment: A five step instructional development model. EJournal of Instructional Science and Technology, 4(1).Google Scholar
- McKeachie, W. J., & Svinicki, M. (2006). McKeachie's teaching tips: Strategies, Research, and Theory for College and University Teachers (12th ed.). Boston, MA: Houghton Mifflin.Google Scholar
- McDonald, J. (2002). Is "as good as facetoface" as good as it gets? Journal of Asynchronous Learning, 2(2), 12--23.Google Scholar
- Mitnick, K. and Simon, W. (2002). The Art of Deception: Controlling the Human Element of Security. Indianapolis, IN: Wiley Publishing, Inc. Google ScholarDigital Library
- Moreno, R. and Mayer, R. E. (1999). Cognitive principles of multimedia learning: The role of modality and contiguity. Journal of Educational Psychology, 91, 358--368.Google ScholarCross Ref
- National Security Agency Central Security Service. IA Courseware Evaluation Program. http://www.nsa.gov/ia/academic_outreach/iace_program/index.shtml, accessed 07/14/2010.Google Scholar
- Online Collaborative Learning in Higher Education, http://clp.cqu.edu.au/glossory.htm, accessed 07/15/2010.Google Scholar
- Padman, V. and Memon, N. (2002). Design of a Virtual Laboratory for Information Assurance Education and Research. In the Proceedings of the 2002 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY, 17--19.Google Scholar
- Paulson, D. and Faust, J. Active Learning for the College Classroom, http://www.calstatela.edu/dept/chem/chem2/Active/, accessed 07/10/2010.Google Scholar
- Pheeney, P. (1997). Hands on, minds on: Activities to engage our students. Science Scope, 21(4), 30--33.Google Scholar
- Pimm, D. (1987). Speaking mathematically: Communication in mathematics classrooms. New York. Routledge & Kegan Paul.Google Scholar
- Prince, M. (2004). Does Active Learning Work? A Review of the Research. Journal of Engineering EducationGoogle ScholarCross Ref
- Study Guides and Strategies. http://www.studygs.net/pbl.htm, accessed 07/10/2010.Google Scholar
- Whitman, M. and Mattord, H. (2011). Readings and Cases in Information Security Law and Ethics. Course Technology Cengage Learning.Google Scholar
Index Terms
- Active learning approaches to teaching information assurance
Recommendations
Designing a computer forensics concentration for cross-disciplinary undergraduate students
InfoSecCD '10: 2010 Information Security Curriculum Development ConferenceIn this paper, we design and expand the highly successful Information Assurance (IA) program through education and training opportunities in digital forensics for students in other disciplines, and for local law enforcement professionals. Faculty ...
Information assurance in the undergraduate curriculum
ACM-SE 43: Proceedings of the 43rd annual Southeast regional conference - Volume 1Information assurance and systems security are important topics that compel the attention of future computer scientists. Typically, undergraduate students in computer science programs today are exposed to these concepts at the end of their education in ...
A comprehensive undergraduate information assurance program
Security education and critical infrastructuresThis paper describes the experience of our institution in creating a comprehensive undergraduate information assurance (IA) program. An interdisciplinary approach was undertaken in order to include a larger portion of the student body and faculty and ...
Comments