Online Information Security Education through Anchored Instruction

ثبت نشده
چکیده

The Internet is unquestionably the most extensive and accessible resource for information and commerce in history. But it is also providing a medium for new forms of crime, espionage, and even terror, targeting organizations and individuals alike. Broad awareness of vulnerabilities and defenses is needed to protect against all types of cyber attacks. While online learning environments provide a great opportunity to train large numbers of people, they have yet to demonstrate effectiveness in high-stakes situations. In an effort to better prepare cyberspace defenders, we are developing a multidisciplinary training program that encompasses topics from computer science, management information systems, and legal and ethical studies, using state-of-the-art online learning methods and technology. This paper describes the Adaptive Cyber-security Training (ACT) Online program, giving details of its targeted training population, curriculum, and instructional design strategy. We further report pilot testing results from two recently developed courses that show significant learning gains following this cyber security training. Index terms – Cyber Security, Cyber Ethics, Information Security Basics, Online Training, STAR Legacy cycle.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Introducing Security in a Chemical Engineering Design Course Using Adaptive Online Learning

The Education program of the NSF TRUST Science and Technology Center aims to develop and disseminate on-line learning resources that can be used by educators to address security issues in multiple disciplines and multi-disciplinary contexts. We report on a pilot project for this approach where an on-line module was created to introduce security issues in a chemical engineering capstone design c...

متن کامل

An Online Learning Approach to Information Systems Security Education

ISBN 1-933510-96-X/$15.00  2011 CISSE Abstract –The demand for information systems security education has never been higher, while the availability of high-quality information systems security instruction and of well-qualified instructors are both extremely limited. Meeting the demand requires converting teaching from an individual activity to a community-based research activity. As a result, ...

متن کامل

Transitioning from Face-to-Face to Online Instruction: How to Increase Presence and Cognitive/Social Interaction in an Online Information Security Risk Assessment Class

abstract This article briefly reviews two important goals in online education: interaction and presence. These are important goals in online education because they are linked to learning and motivation to learn. The article provides guidelines and an extended example of how to design an online course in information security in a manner that will enhance interaction and presence. This article's ...

متن کامل

Implementing a Strategic, Sequential, and Iterative Pedagogical Flow to Online IS Distance Education Learning

The Internet and World Wide Web have enabled the delivery of online instruction through content management and learning management systems. Many educational institutions and corporate organizations utilize the online environment to successfully extend the reach of their training and education programs. Away from the structure of a classroom, many students are unable to demonstrate sufficient di...

متن کامل

A NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008