Online Information Security Education through Anchored Instruction
ثبت نشده
چکیده
The Internet is unquestionably the most extensive and accessible resource for information and commerce in history. But it is also providing a medium for new forms of crime, espionage, and even terror, targeting organizations and individuals alike. Broad awareness of vulnerabilities and defenses is needed to protect against all types of cyber attacks. While online learning environments provide a great opportunity to train large numbers of people, they have yet to demonstrate effectiveness in high-stakes situations. In an effort to better prepare cyberspace defenders, we are developing a multidisciplinary training program that encompasses topics from computer science, management information systems, and legal and ethical studies, using state-of-the-art online learning methods and technology. This paper describes the Adaptive Cyber-security Training (ACT) Online program, giving details of its targeted training population, curriculum, and instructional design strategy. We further report pilot testing results from two recently developed courses that show significant learning gains following this cyber security training. Index terms – Cyber Security, Cyber Ethics, Information Security Basics, Online Training, STAR Legacy cycle.
منابع مشابه
Introducing Security in a Chemical Engineering Design Course Using Adaptive Online Learning
The Education program of the NSF TRUST Science and Technology Center aims to develop and disseminate on-line learning resources that can be used by educators to address security issues in multiple disciplines and multi-disciplinary contexts. We report on a pilot project for this approach where an on-line module was created to introduce security issues in a chemical engineering capstone design c...
متن کاملAn Online Learning Approach to Information Systems Security Education
ISBN 1-933510-96-X/$15.00 2011 CISSE Abstract –The demand for information systems security education has never been higher, while the availability of high-quality information systems security instruction and of well-qualified instructors are both extremely limited. Meeting the demand requires converting teaching from an individual activity to a community-based research activity. As a result, ...
متن کاملTransitioning from Face-to-Face to Online Instruction: How to Increase Presence and Cognitive/Social Interaction in an Online Information Security Risk Assessment Class
abstract This article briefly reviews two important goals in online education: interaction and presence. These are important goals in online education because they are linked to learning and motivation to learn. The article provides guidelines and an extended example of how to design an online course in information security in a manner that will enhance interaction and presence. This article's ...
متن کاملImplementing a Strategic, Sequential, and Iterative Pedagogical Flow to Online IS Distance Education Learning
The Internet and World Wide Web have enabled the delivery of online instruction through content management and learning management systems. Many educational institutions and corporate organizations utilize the online environment to successfully extend the reach of their training and education programs. Away from the structure of a classroom, many students are unable to demonstrate sufficient di...
متن کاملA NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL
Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...
متن کامل