Inclusive Group Work Assessment for Cybersecurity
Abstract
References
Index Terms
- Inclusive Group Work Assessment for Cybersecurity
Recommendations
Integrating hackathons into an online cybersecurity course
ICSE-SEET '22: Proceedings of the ACM/IEEE 44th International Conference on Software Engineering: Software Engineering Education and TrainingCybersecurity educators have widely introduced hackathons to facilitate practical knowledge gaining in cybersecurity education. Introducing such events into cybersecurity courses can provide valuable learning experiences for students. The nature of the ...
Towards an integrative learning approach in cybersecurity education
InfoSec '15: Proceedings of the 2015 Information Security Curriculum Development ConferenceThis paper describes a multifaceted approach to cybersecurity education based on integrative learning theory. We emphasize the need to focus on curriculum, experiential learning techniques, assessment and fostering a community of practice. The need to ...
Teaching Cybersecurity: Protecting the Business Environment
InfoSecCD '13: Proceedings of the 2013 on InfoSecCD '13: Information Security Curriculum Development ConferenceTraditional computer security has focused on protection against known threats, largely from outsider attacks. The number of cybersecurity incidents affecting businesses of all sizes demonstrates that our current cybersecurity posture is not entirely ...
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Mikko-Jussi Laakso,
- Mattia Monga,
- Program Chairs:
- Simon,
- Judithe Sheard
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Poster
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 46Total Downloads
- Downloads (Last 12 months)18
- Downloads (Last 6 weeks)3
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in