skip to main content
10.1145/1940941.1940943acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
research-article

Active learning approaches to teaching information assurance

Published:01 October 2010Publication History

ABSTRACT

This paper presents several active learning strategies to engage students in Information Assurance (IA) concepts and to enhance their learning experience. Simply listening to a lecture or attending a physical computing laboratory to explore IA concepts for numerous reasons, may not be ideal. Passive involvement of students in their learning process generally leads to a limited retention of knowledge. Students today have excellent visuospatial reasoning skills and the instructional methods chosen should be visual and require active participation. We are exploring several active learning pedagogies in hopes of increasing IA awareness amongst undergraduate computer science majors and non-majors.

References

  1. Academic Technology Center: Teaching with Technology Collaboratory, Benefits of Using Discussion Boards in Your Classes, http://www.wpi.edu/Academics/ATC/Collaboratory/Idea/boardbenefits.html, accessed 07/15/10.Google ScholarGoogle Scholar
  2. Bligh, D. (2000). What's the point in discussion? Portland, Oregon: Intellect Books.Google ScholarGoogle Scholar
  3. Burd, Stephen & Conway, Christopher & Seazzu, Alessandro. (2009). Virtual Computing Laboratories: A Case Study With Comparisons To Physical Computing Laboratories. Journal of Information Technology Education. Volume 8.Google ScholarGoogle Scholar
  4. Bullers, W. I., Burd, S. D., and Seazzu, A. (2006). Virtual Machines - An Idea Whose Time Has Returned: Application to Network, and Security, and Database Courses, ACM SIGCSE Bulletin (Inroads), March 2006, pp. 102--106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Conklin, A. (2006). Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course. In Proceedings of the 39th Annual Hawaii international Conference on System Sciences - Volume 09(January 04--07, 2006). HICSS. IEEE Computer Society, Washington, DC, 220.2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Finkelstein, N. D., Adams, W. K., Keller, C. J., Kohl, P. B., Perkins, K. K., & Podolefsky, N. S., et al. (2005). When learning about the real world is better done virtually: A study of substituting computer simulations for laboratory equipment. Phys. Rev. ST Phys. Educ. Res.Google ScholarGoogle ScholarCross RefCross Ref
  7. Habraken, C. (2004). Integrating into chemistry teaching today's student's visuospatial talents and skills, and the teaching of today's chemistry's graphical language. Journal of Science Education and Technology, 13(1), 89--94.Google ScholarGoogle ScholarCross RefCross Ref
  8. Gehringer, E. F. and Miller, C. S. (2009). Student-generated active-learning exercises. SIGCSE Bull. 41, 81--85. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Graaff, E. de, G. N. Saunders-Smits & M. R. Nieweg. (eds.) (2005). Research and Practice of Active Learning in Engineering Education. Amsterdam: Pallas Publications.Google ScholarGoogle Scholar
  10. Johnson, D., Johnson, R., and Smith, K. (1998). Active Learning: Cooperation in the College Classroom, 2nd ed., Interaction Book Co., Edina, MN.Google ScholarGoogle Scholar
  11. McConnell, S. & SchoenfeldTachner, R. (2001). Transferring your passion for teaching to the online environment: A five step instructional development model. EJournal of Instructional Science and Technology, 4(1).Google ScholarGoogle Scholar
  12. McKeachie, W. J., & Svinicki, M. (2006). McKeachie's teaching tips: Strategies, Research, and Theory for College and University Teachers (12th ed.). Boston, MA: Houghton Mifflin.Google ScholarGoogle Scholar
  13. McDonald, J. (2002). Is "as good as facetoface" as good as it gets? Journal of Asynchronous Learning, 2(2), 12--23.Google ScholarGoogle Scholar
  14. Mitnick, K. and Simon, W. (2002). The Art of Deception: Controlling the Human Element of Security. Indianapolis, IN: Wiley Publishing, Inc. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Moreno, R. and Mayer, R. E. (1999). Cognitive principles of multimedia learning: The role of modality and contiguity. Journal of Educational Psychology, 91, 358--368.Google ScholarGoogle ScholarCross RefCross Ref
  16. National Security Agency Central Security Service. IA Courseware Evaluation Program. http://www.nsa.gov/ia/academic_outreach/iace_program/index.shtml, accessed 07/14/2010.Google ScholarGoogle Scholar
  17. Online Collaborative Learning in Higher Education, http://clp.cqu.edu.au/glossory.htm, accessed 07/15/2010.Google ScholarGoogle Scholar
  18. Padman, V. and Memon, N. (2002). Design of a Virtual Laboratory for Information Assurance Education and Research. In the Proceedings of the 2002 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY, 17--19.Google ScholarGoogle Scholar
  19. Paulson, D. and Faust, J. Active Learning for the College Classroom, http://www.calstatela.edu/dept/chem/chem2/Active/, accessed 07/10/2010.Google ScholarGoogle Scholar
  20. Pheeney, P. (1997). Hands on, minds on: Activities to engage our students. Science Scope, 21(4), 30--33.Google ScholarGoogle Scholar
  21. Pimm, D. (1987). Speaking mathematically: Communication in mathematics classrooms. New York. Routledge & Kegan Paul.Google ScholarGoogle Scholar
  22. Prince, M. (2004). Does Active Learning Work? A Review of the Research. Journal of Engineering EducationGoogle ScholarGoogle ScholarCross RefCross Ref
  23. Study Guides and Strategies. http://www.studygs.net/pbl.htm, accessed 07/10/2010.Google ScholarGoogle Scholar
  24. Whitman, M. and Mattord, H. (2011). Readings and Cases in Information Security Law and Ethics. Course Technology Cengage Learning.Google ScholarGoogle Scholar

Index Terms

  1. Active learning approaches to teaching information assurance

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      InfoSecCD '10: 2010 Information Security Curriculum Development Conference
      October 2010
      187 pages
      ISBN:9781450302029
      DOI:10.1145/1940941

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 October 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate18of23submissions,78%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader