skip to main content
10.1145/2528908.2528922acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
tutorial

The Assessment of Learning Outcomes in Information Assurance Curriculum

Published: 12 October 2013 Publication History

Abstract

We present an overview of the design and conduct of learning outcomes assessment for an undergraduate information assurance curriculum. The described program of assessment provides for an evidence-based, decision-making process that can be used to inform faculty on changes needed to curriculum. While the conduct of the assessment cycle is not an insignificant one (developing outcomes and objectives, assessing student learning, collecting and analyzing assessment data, and using assessment data to guide conversation about curriculum), the benefits are great in terms of assisting faculty to make good choices when reviewing/revising curriculum (and at the course level: course content, teaching methodology, and assignments).

References

[1]
Middle States Commission on Higher Education, "Home Page," 2013. {Online}. Available: http://www.msche.org/. {Accessed 1 July 2013}.
[2]
New England Association of Schools and Colleges, "Home Page," 2013. {Online}. Available: http://www.neasc.org/. {Accessed 1 July 2013}.
[3]
North Central Association Commission on Accreditation and School Improvement, "Home Page," 2013. {Online}. Available: http://www.ncacasi.org/. {Accessed 1 July 2013}.
[4]
ABET, "Assessment Planning," {Online}. Available: http://www.abet.org/assessment-planning/. {Accessed 8 February 2013}.
[5]
National Security Agency, "National Centers of Academic Excellence," {Online}. Available: http://www.nsa.gov/ia/academic_outreach/nat_cae/. {Accessed 1 July 2013}.
[6]
National Institute for Learning Outcomes Assessment, "Home Page," 2012. {Online}. Available: http://www.learningoutcomeassessment.org/. {Accessed 8 February 2013}.
[7]
M. Goodrich and R. Tamassia, Introduction to Computer Security, Upper Saddle River, NJ: Addison-Wesley, 2010.
[8]
D. Landoll, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second ed., Boca Raton, FL: CRC Press, 2011.
[9]
E. Skoudis, Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, Second ed., Upper Saddle River, NJ: Prentice Hall, 2006.
[10]
W. Stallings, Cryptography and Network Security: Principles and Practice, Fifth ed., Upper Saddle River, NJ: Prentice Hall, 2011.
[11]
National Institute of Standards and Technology Information Technology Lab, "Federal Information Security Management Act (FISMA) Implementation Project," {Online}. Available: http://csrc.nist.gov/groups/SMA/fisma/. {Accessed 8 July 2013}.
[12]
National Institute of Standards and Technology Information Technology Laboratory, "Special Publications (800 Series)," 2013. {Online}. Available: http://csrc.nist.gov/publications/PubsSPs.html. {Accessed 8 July 2013}.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
InfoSecCD '13: Proceedings of the 2013 on InfoSecCD '13: Information Security Curriculum Development Conference
October 2013
119 pages
ISBN:9781450325479
DOI:10.1145/2528908
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 October 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Assessment
  2. Computer Security
  3. Education
  4. Information Assurance
  5. Learning Outcomes

Qualifiers

  • Tutorial
  • Research
  • Refereed limited

Conference

InfoSecCD '13

Acceptance Rates

InfoSecCD '13 Paper Acceptance Rate 18 of 23 submissions, 78%;
Overall Acceptance Rate 18 of 23 submissions, 78%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 93
    Total Downloads
  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media