You are on page 1of 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/247927004

Active learning approaches to teaching Information Assurance

Article · January 2010


DOI: 10.1145/1940941.1940943

CITATIONS READS
4 166

3 authors, including:

Christy Chatmon Hongmei Chi


Florida A&M University Florida A&M University
3 PUBLICATIONS   5 CITATIONS    62 PUBLICATIONS   203 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

NOAA Center for Coastal and Marine Ecosystems View project

Implement Hands-on Labs for File Integrity via Open Sources View project

All content following this page was uploaded by Hongmei Chi on 31 October 2014.

The user has requested enhancement of the downloaded file.


Active Learning Approaches to Teaching Information
Assurance
Christy Chatmon Hongmei Chi Will Davis
Dept. of Comp. & Info. Sciences Dept. of Comp. & Info. Sciences Dept. of Comp. & Info, Sciences
Florida A&M University Florida A&M University Florida A&M University
Tallahassee FL, 32307 Tallahassee FL, 32307 Tallahassee FL, 32307
cchatmon@cis.famu.edu hchi@cis.famu.edu will3davis@yahoo.com

ABSTRACT Our goal is to strengthen the existing IA program and increase IA


This paper presents several active learning strategies to engage awareness to other disciplines by integrating IA modules into
students in Information Assurance (IA) concepts and to enhance courses taught to non-majors.
their learning experience. Simply listening to a lecture or The variety of IA curricula and diverse educational models at
attending a physical computing laboratory to explore IA concepts universities has not provided their graduates with skills demanded
for numerous reasons, may not be ideal. Passive involvement of by employers. The levels of skills expected by employers and
students in their learning process generally leads to a limited those graduates have acquired after completing their studies
retention of knowledge. Students today have excellent suggests a discrepancy. Organizations employing IA
visuospatial reasoning skills and the instructional methods chosen professionals emphasize problem solving, creativity, and
should be visual and require active participation. We are interdisciplinary collaborative work while exhibiting effective
exploring several active learning pedagogies in hopes of communication and teamwork skills.
increasing IA awareness amongst undergraduate computer science
majors and non-majors. It is our view that instruction must adapt to these demands. The
traditional passive learning approach (reading, hearing, looking
and watching) should be adapted to create an environment in
Categories and Subject Descriptors which knowledge retention is significantly increased. [9, 15, 20]
K.3.2 [Computer and Information Science Education]: suggests that an increase in students’ retention of information is
Computer science education. gained by not simply receiving information verbally and visually,
students must be receiving and participating and doing.
General Terms Reaching today’s students can be a challenge when using
Management and Security primarily lecture-based instructional methods. Today's youth are
visuospatially intelligent and talented [7] and may need to
Keywords experience instruction that is visual and that requires active
Information Assurance, Hands-on lab, Active Leaning, Virtual participation. Many research studies [3, 5] show that by applying
Labs, E-Learning active and collaborative learning there will be improvements in:
o Information retention,
1. INTRODUCTION o Student-faculty interaction,
o Student-student interaction,
Information Assurance (IA) is one of the fastest growing areas of
o Academic achievements (i.e., grades),
the information economy, addressing concerns ranging from
matters of national security to individual privacy and information o Higher-level thinking skills,
protection in the conduct of commerce, entertainment and social o Teamwork,
interaction. At Florida A&M University (FAMU), the
information assurance track has become one of the most popular o Attitude towards the subject and motivation to learn.
tracks of study in the Department of Computer and Information These observations motivate a rethinking in how IA education
Sciences. instruction is delivered. To that end, we explore the potential for
active learning instructional methods to focus IA program and
modules more intently on problem solving, design,
communication and teamwork. The planning and preparation of
Permission to make digital or hard copies of all or part of this work for active learning activities we have implemented, such as virtual
personal or classroom use is granted without fee provided that copies are labs and web-based activities, are fundamental to the future of e-
not made or distributed for profit or commercial advantage and that learning in IA education at FAMU.
copies bear this notice and the full citation on the first page. To copy
otherwise, or republish, to post on servers or to redistribute to lists, In this paper, we introduce active learning as a pedagogical
requires prior specific permission and/or a fee. approach for IA education and provide several case studies to
Information Security Curriculum Development Conference 2010, demonstrate its usefulness.
October 1-3, 2010, Kennesaw, GA, USA.
Copyright 2009 ACM 978-1-60558-661-8/00/0004…$5.00.
2. ACTIVE LEARNING Cooperative Learning is defined as a structured form of group
work where students pursue common goals while being assessed
individually. The emphasis of this approach is a focus on
The “talk and chalk” or “sit and get” approach using a power cooperative incentives rather than competition to promote
point presentation combined with lecture is not alone effective to learning [12]. An example of this approach is cooperative groups,
teaching IA concepts. The increase popularity of active learning which are useful for more complex projects. This approach is
methods in computer science curricula is due to the growing encourages discussion of problem solving techniques and avoid
awareness that it is no longer possible to train computer scientists the embarrassment of students who have not mastered all the
for a life long career within a comparatively short period. A skills yet [19]. Examples of this approach include cooperative
computer scientist needs competencies in problem solving, groups, concept mapping, and debates.
teamwork, and communication skills to be able to apply technical
knowledge in various circumstances. The origin of learning is Problem-Based Learning can refer to as an instructional method
rooted in activity, doing something to find out about the world where relative problems are introduced at the beginning of the
[9]. instructional cycle to which is used to provide the context and
motivation for the learning that follows. This approach involves
Active learning refers to developing and implementing planned considerable self-directed learning on the students’ part. Learning
activities to engage the participant as a “partner” in the activity. In becomes active as the students discover and work with content
short, students are learning by doing. That means that while that they determine to be necessary to solve the problem.
students are doing an active learning exercise (such as hands-on Problem-based learning as experienced by the student is when a
lab), 90% of the students are actively engaged with the material student: 1.) explores the issues 2.) lists what is known 3.)
and getting practice in the skills an instructor is trying to teach develops, and writes out, the problem statement in own words 4.)
them. Active learning results in a deeper and more integrated lists out possible solutions 5.) lists actions to be taken with a
understanding of concepts, as well as significant improvement in timeline 6.) lists what needs to be known 7.) writes up solutions
student retention in degree programs. Engaged students remember with its supporting documentation and 8.) debriefing exercise is
concepts longer, enjoy the learning process more, and are more administered individually and as a group.
likely to continue.
Learning by Doing is best described by a Chinese famous
Active learning techniques can help students to increase mastery educator Confucius who said two thousand years ago, “tell me
of foundational skills, improve technical communication skills, and I will forget, show me and I may remember, involve me and
and enhance critical thinking. [5, 8] describes several case studies I’ll understand.” When students with limited computing
demonstrating this approach, in this paper we explore our background enter the IA field, they face a steep learning curve.
implementation of integrating active learning strategies into the Hands-on labs that employ game playing help students to quickly
IA courses illustrated by several case studies. grasp core content and topics.

2.1 Various Active Learning Techniques 2.2 The Learning Process


In comparing the effectiveness of lectures and group discussions,
research suggest that both are useful for knowledge-level learning, Learning begins at the initial exposure of the content, where the
group discussion methods are more favorable for problem- student witnesses the use of new concepts to explain or explore an
solving, transfer of knowledge to new situations, and motivation IA issue in a virtual/physical environment. During the exposure
for further learning [2]. [10] found that cooperation improved stage, the learner is exposed to the new concept from the
learning outcomes relative to individual work across the board. instructor/peer or by their own experiences. Students are afforded
The primary goal of small group techniques is to get students to additional opportunities to learn as they apply IA concepts to
really think about the material so they can state their own views, solve a real-world problem or do an experiment. This is
to hear others, to hone their argumentative skills, and vocalize considered learning by doing, where one has become familiar
what it is they are thinking about. This approach makes it enough with IA concepts/measures to find solutions to the real-
difficult for students to avoid participating thus making each world specific security problems. The adaptation and creativity
person accountable. [19] stages mark the onset of research.

Collaborative Learning refers to any instructional method in Our motivation for designing the various learning activities was to
which students work together in small groups toward a common create a unique environment to allow students to incorporate what
goal [17, 22]. The emphasis of this approach is on student they have been exposed to into applications. As an example, in
interaction rather than on learning as a solitary activity. An several of our security courses, students are required to create
example of this approach is a “think/write-pair-share” method. and design their own labs to be administered to their peers. The
The instructor begins by posing an issue or problem to the class student in this activity is given guidance by the instructor, but is
and then allowing the students to reflect and write out their allowed the freedom to explore the security tools. We examine
response. Students then pair up and explain their responses to this idea further later in the paper. This type of experience
one another for a set time. Lastly, as a class, the issue or problem encourages the student to move from the exposure stage to a
is discussed. The instructor may record each group’s main point higher level of learning. With guidance and similar activities, the
on the board and incorporate the material into a future lecture. student gains mastery of the concepts as shown in Figure 1. This
is the ultimate achievement and core of the learning process.
following section, we examine several of the active-learning
techniques adopted in our various IA courses: virtual hands-on
MASTERY
Creativity laboratory exercises, online cooperative group discussions, think-
pair-share activities, student-generated laboratory exercises, and
student-led current event reviews.

Learning by Adapting 3.1 Virtual Laboratory Exercises

Education in IA is better served by a laboratory component that


reinforces IA concepts while providing exposure to current tools.
Learning by Doing It is always important to show students how to apply the theory in
practical situations [18]. Hence, it is our view that a good part of
an IA course should focus on applications and operational
concerns. In order to support our security track, a combination of
Learning by Peer
physical and virtual laboratory exercises are conducted. However
EXPOSURE recently we are primarily offering laboratory exercises virtually.
The rising interest in the use of virtual laboratories is due to
several reasons including interest in supporting distance
education, potential for resource sharing and cost savings, and
Figure 1. Stages of Learning Process
potential for improved educational outcomes [3]. IA e-learning
opportunities at FAMU are currently being developed which
makes the need to transition from physical to virtual laboratories
2.3 Faculty Development even greater. Another compelling reason is that our physical IA
laboratory consists of 15 desktop workstations which support four
courses and research activities. With a growing interest in our IA
The uses of active learning strategies and its advantages do not security track, the enrollment has soared and has caused a
come free. The instructor must invest more in preparation, and significant strain not only on the physical workstations, but also
must leave her or his comfort zone with respect to loss of control. on faculty/staff that continuously reconfigured the workstations
Faculty development is necessary to learn how and feel for classroom experimentations. The implementation of the
comfortable facilitating rather than transmitting, classroom and virtual environment (VMware Server) allows for an enriched
laboratory technology. It takes time and effort to fine-tune the laboratory experience for the students and an easier setup and
learning process to get return on investment. Students also have implementation for faculty/staff. Students are now able to access
to make efforts to learn course (lecture) materials outside of class, their experiments from remote locations (with Microsoft Terminal
then to engage with one another, the teacher and the overall Server Connection) and are accessible at all times.
course experience.
Table 1. Examples of Virtual Laboratory Exercises
Instructors who adopt active learning strategies for IA instruction
will spend considerable time developing hands-on labs, finding Special Software
interesting projects, discovering topics for class discussion, and Topic: Description:
Needed:
learning to use new technologies. The most important part is to
transfer the teaching style from passive lectures to active learning; Explore the process of virus Avira AntiVir
from instructor-center to student-center. Virus Removal removal & vulnerability Personal; Trojan
identification (see Figure 2) Horse application
In September 1, 2009, FAMU CIS department was awarded an Modification of local
NSF grant CNS-0939138: CPATH-1: Computational Thinking Password Policy
security policies
Evolution to Studio-Based Active Learning. This project along
Identification of resources LANguard Network
with NSF grant CNS-0939017: CPATH-2: Collaborative Enumeration
available on the network Scanner
Research: Broadening Studio-Based Learning in Computing
Education, in which several faculty members are participants, has Host-based Detection of system-level Sygate Personal
been instrumental in faculty training in active/studio-based Firewall/IDS attacks Firewall
learning techniques. Protocol observation using a
Packet Analyzer Ethereal
packet sniffing tool

3. OUR APPROACHES System Determination of security Microsoft Baseline


Vulnerabilities state of a system Security Analyzer
Investigate the flaws and
The security track at FAMU consists of three main courses: Web Browser
vulnerabilities of Web
Introduction to Computer Security (CIS 4360), Applied Security Security
browser software
(CIS 4361), and Network Security (CNT 4406), which has been
successfully mapped to the CNSS standards 4011 and 4012 [16]. The exercises engage students in an active learning way and more
Additionally, we also offer Digital Forensics not included in the importantly allow students to gain a deeper understanding of how
mapping. [19] discusses 29 active learning approaches. In the the security tools work and explore their limitations and
capabilities. It also exposes students to the activities of designing o Students have a greater sense of race and gender-
secure systems and policy implementation. based equality
Initially students are provided video tutorials to foster an Students are given one or more topics to select from. The student
understanding of proper use and access (remotely) to the virtual must then read 2-4 pieces of literature associated with their topic.
machine and its resources before conducting their first laboratory Each student is then required to participate in two online group
assignment. Video tutorials are also provided for later labs to discussions biweekly – one group discussion and one pair
offer explanation of laboratory experiences and to reinforce discussion. After posting their initial response to the question, the
concepts. Table 1 demonstrates examples of virtual laboratory student must read their groupmates posts and post at least one
exercises conducted in our various security courses. reply/follow up.
It is important to provide adequate time between the deadlines for
the initial response and the reply/follow up responses to allow
students to read each other’s posts and allow the instructor to
respond to posts as well. Also, students are explained the value of
participation on the discussion board and provided online
discussion guidelines/tips prior to discussion activities beginning.
This is essential to stimulating a healthy academic debate on IA
issues. The instructors spend time explaining to students how to
listen to others, how to validate others’ opinions and beliefs, the
usefulness of paraphrasing to clarify understanding, the
importance of summarizing, and how to encourage others to
participate in the discussion. It is not assumed that students have
these skills and taking time to emphasize them may facilitate a
more successful experience for the student.

3.3 Think-Pair-Share Activities


Figure 2: Virus Removal Exercise

Another cooperative learning technique we use is the think, pair,


share strategy which encourages individual participation.
3.2 Online Cooperative Group Discussion Students think through questions posed to them using three
Activities distinct steps [10, 19]:
1. Think – Students think independently about the
Socratic questioning techniques are a useful active learning tool to question posed in class forming their own ideas.
encourage effective class discussion and interaction. Students in
our security courses enjoy a good classroom discussion/debate 2. Pair – Students are grouped in pairs to discuss
about IA related current events and security concepts such as their thoughts which allow students to articulate
computer viruses, privacy issues and hacker activities just to name their ideas and to consider those of others.
a few. Our class time is limited and valuable. To ensure that we 3. Share – Students pairs share their ideas with the
cover as many security concepts as we can during the semester, class. Students tend to be more comfortable
we use online group discussion activities via Blackboard to sharing their ideas with the support of a partner.
investigate and reinforce IA concepts. During this step students’ ideas become more
The benefits to using online discussion boards to facilitate active refined.
learning pedagogy are abundant [1]: Research suggests that students’ learning is enhanced when they
o Students utilize critical thinking skills are given opportunities to elaborate on ideas through talk. It is
through this method that students increase the kinds of personal
o Students participate more regularly and more communications that are necessary to internally process, organize,
thoughtfully than they would in a face-to-face and retain ideas [21].
instructional setting, especially in large classes
Students are given guidelines outlining the procedures when the
o Students develop a stronger class community “think-pair-share” activity is first introduced. They are then
o Students are more likely to cite research and class presented a challenging or open-ended question either prior to
readings class time or during class depending on its level of complexity. If
o Students achieve greater cognitive and exploratory the question or issue is presented during class the students are
learning given a period of time to “think” and consider their thoughts
about the question. It is helpful to set time limits on the “think”
o Faculty members spend less time answering and “pair” activities. Also, if the “think” step is outside of class
questions (students often answer each others encourage students to write down their thoughts.
questions with little or no prompting from the
instructor)
In the “pair” step, the students are paired with a collaborative often revealed and resolved during this discussion stage. This
group member to discuss their ideas. It is during this step that approach is useful beyond discussion questions. We also use this
students begin to construct their knowledge in these discussions approach informally for lecture check and current events opinion.
and discover what they do know and what they do not know,
which is not normally available to them during traditional
lectures.
3.4 Student Generated Labs
We use various approaches to address the “share” step of the
strategy. After a set period of time, the instructor randomly We have adapted the “Quiz/Test Questions” approach, which [19]
solicits student comments or takes a classroom vote/poll. The is described as students becoming actively involved by
random calls are important to ensure that students are individually constructing some (or all) of the questions for quizzes and tests,
accountable for participating. The responses are often more and combine it with the “Cooperative Groups” strategy. Research
intellectually concise since students are given a chance to reflect suggests the “Quiz/Test Questions” activity encourages students
on their ideas. Also, this approach enhances the student’s oral to think more deeply about the course material and explore major
communication skills as they are given an opportunity to discuss themes, comparison of views, applications, and higher-order
their ideas with their peers. Another variation is to require thinking skills. We require student groups to create a hands-on
students to write down their thoughts and collect them for later laboratory assignment as a course project to be administered to
review and discussion. The instructor is then given an their peers. This assignment promotes a mastery of foundational
opportunity to see whether there are problems in comprehension IA skills as shown in Figure 1. IA professionals must be able to
[19, 20, 22]. learn novel technologies/skills and be self-directed.
Below are examples of the type of discussion questions posed to At the beginning of the semester, student groups of size 2-3 are
students during a “think-pair-share” activity: formed and given a project list where each project lists several
o What would you recommend as a punishment for a free source software for consideration. They must then develop a
policy violation involving removal of confidential virtual laboratory exercise including documentation to be
records for a “harmless” reason like catching up on rendered to their peers.
reading them at home? Would your recommended Here is an example of a student-generated hands-on lab which
punishment be different if the violator used them for a required groups to give an overview of tools for network
different purpose, perhaps using them to perform monitoring and traffic analysis. The Netflow analyzer from
identity theft? [24]: SolarWinds was chosen by a group. A hands-on lab was created
o Get into the mindset of a truly determined hacker. by students demonstrating the steps for monitoring wireless and
Why would someone devote tremendous time and wired network traffic. Their exercise also required customization
energy to trying to break into an information system? of the NetFlow data displays to view traffic by specified time
What could the reward be? periods (up to 60 minutes) and by traffic type (see Figure 3).

o Once managers have gone to the trouble of creating a


security policy, how can they ensure that all personnel
read and understand it?
o Most security policies recommend the following:
o Personnel must never use a password that is
the same as or similar to one they are using on
any corporate system and on the Internet site.
o Company personnel must never use the same
or a similar password in more than one
system. This policy pertains to various types
of devices (computers or voice mail), various
locations of devices (home or business), and
various type of systems, devices (router or
firewall), or programs (database or
application) [14].
Do you agree or disagree with these
recommendations. Discuss the feasibility of
following these recommendations. Figure 3: NetFlow data displays to view traffic
Research tells us that we need time to mentally chew over new These activities foster the learning by doing idea. The student
ideas in order to store them in memory. If we allow students to groups spend numerous hours brainstorming, creating and
“think-pair-share” throughout the lesson, more of the critical documenting their exercises. The instructor meets with each
information is retained [19]. Students are given an opportunity to student group periodically throughout the semester to ensure
talk over new ides and their misunderstandings about the topic are progress. Midway through the semester each group is required to
give a presentation on the status of their project. Lastly, each 5. CONCLUSIONS & FUTURE PLANS
group’s final laboratory exercise is critiqued by their peers after
completing the exercise.
We have discussed our approaches for implementing active
learning activities for CS-majors in IA education. In the future, we
3.5 Student-Led Current Event Reviews will continue to improve and expand the mentioned activities to
include current trending topics and popular security tools. In
addition, we will continuously retrieve student feedback to make
To motivate students’ interest and awareness in news related to
activities better learning tools and more student-friendly.
information assurance, we encourage students to pay attention to
press news or technology news related to IA topics. All Current In the future, we plan to develop IA active learning
event summations and presentations must respond to the activities/modules to be included in courses taught to non-CS
following questions: (1) How does the topic you have chosen majors as a way to increase IA awareness. In addition, we are
relate to Information Security? (2) How do the topics discussed planning on expanding IA education at FAMU by offering e-
in your article(s) relate to the basic computer security goals – learning opportunities to our students and the community; we
Confidentiality, Integrity, and Availability (CIA)? (3) What is the hope to incorporate our active learning approaches to support this
global/societal impact of the topic(s) discussed in your article(s)? effort.
Most students are enthused to complete those assignments. Here
are examples of topics chosen by students: (1) graphics-based 6. ACKNOWLEDGMENTS
password research project1 (2) a report on botnet attack from
Russian gangs for financial advantages2. This assignment helps to This work has been supported in part by U.S. Department of
encourage our students to remain engaged in IA topics and Education grant P120A080094 and by NSF CPATH.
concerns.

4. FEEDBACKS
7. REFERENCES
Anecdotal feedback from students has been very positive. We
collect responses for each IA course at the end of each semester. [1] Academic Technology Center: Teaching with Technology
Several responses are presented below to the following question: Collaboratory, Benefits of Using Discussion Boards in Your
What did you like the best about this course? Classes,
http://www.wpi.edu/Academics/ATC/Collaboratory/Idea/boa
“I like all those hands-on labs and the most interesting lab is rdbenefits.html, accessed 07/15/10.
that I can design my [own] labs and learn free source tools.” [2] Bligh, D. (2000). What’s the point in discussion? Portland,
Oregon: Intellect Books.
“The Current Event reports. These assignments really opened
my eyes to security…” [3] Burd, Stephen & Conway, Christopher & Seazzu,
Alessandro. (2009). Virtual Computing Laboratories: A Case
“The current event discussions.” Study With Comparisons To Physical Computing
“The hands on labs and the in-class discussions made me want Laboratories. Journal of Information Technology Education.
to learn more about security.” Volume 8.
[4] Bullers, W. I., Burd, S. D., and Seazzu, A. (2006). Virtual
The main finding so far suggests that the active learning activities Machines - An Idea Whose Time Has Returned: Application
are welcomed by students and they have a sense of being involved to Network, and Security, and Database Courses, ACM
in their learning experience. Of course, this survey is preliminary. SIGCSE Bulletin (Inroads), March 2006, pp. 102-106.
We will conduct a formal questionnaire for feedback from our [5] Conklin, A. (2006). Cyber Defense Competitions and
students. In addition, we will test various active learning activities Information Security Education: An Active Learning
in courses for non-CS majors and conduct a well-designed Solution for a Capstone Course. In Proceedings of the 39th
pre/post-surveys and report the responses in future papers. We Annual Hawaii international Conference on System Sciences
also found that the student-centered activities, such as student- - Volume 09(January 04 - 07, 2006). HICSS. IEEE Computer
generated labs and peer review exercises require the instructors to Society, Washington, DC, 220.2.
spend considerable outside class time with students to provide [6] Finkelstein, N. D., Adams, W. K., Keller, C. J., Kohl, P. B.,
guidance on how to express their views and findings. Perkins, K. K., & Podolefsky, N. S., et al. (2005). When
learning about the real world is better done virtually: A study
of substituting computer simulations for laboratory
equipment. Phys. Rev. ST Phys. Educ. Res.
[7] Habraken, C. (2004). Integrating into chemistry teaching
1
http://www.darkreading.com/security/vulnerabilities/showArticle today’s student’s visuospatial talents and skills, and the
.jhtml?articleID=208804640 teaching of today’s chemistry’s graphical language. Journal
2 of Science Education and Technology, 13(1), 89-94.
http://news.cnet.com/8301-10789_3-10086352-57.html
[8] Gehringer, E. F. and Miller, C. S. (2009). Student-generated http://www.nsa.gov/ia/academic_outreach/iace_program/inde
active-learning exercises. SIGCSE Bull. 41, 81-85. x.shtml, accessed 07/14/2010.
[9] Graaff, E. de, G. N. Saunders-Smits & M.R. Nieweg. (eds.) [17] Online Collaborative Learning in Higher Education,
(2005). Research and Practice of Active Learning in http://clp.cqu.edu.au/glossory.htm, accessed 07/15/2010.
Engineering Education. Amsterdam: Pallas Publications. [18] Padman, V. and Memon, N. (2002). Design of a Virtual
[10] Johnson, D., Johnson, R., and Smith, K. (1998). Active Laboratory for Information Assurance Education and
Learning: Cooperation in the College Classroom, 2nd ed., Research. In the Proceedings of the 2002 IEEE Workshop
Interaction Book Co., Edina, MN. on Information Assurance, United States Military Academy,
[11] McConnell, S. & SchoenfeldTachner, R. (2001). West Point, NY, 17-19.
Transferring your passion for teaching to the online [19] Paulson, D. and Faust, J. Active Learning for the College
environment: A five step instructional development model. Classroom,
EJournal of Instructional Science and Technology, 4(1). http://www.calstatela.edu/dept/chem/chem2/Active/,
[12] McKeachie, W. J., & Svinicki, M. (2006). McKeachie’s accessed 07/10/2010.
teaching tips: Strategies, Research, and Theory for College [20] Pheeney, P. (1997). Hands on, minds on: Activities to
and University Teachers (12th ed.). Boston, MA: Houghton engage our students. Science Scope, 21(4), 30--33.
Mifflin. [21] Pimm, D. (1987). Speaking mathematically: Communication
[13] McDonald, J. (2002). Is “as good as facetoface" as good as it in mathematics classrooms. New York. Routledge & Kegan
gets? Journal of Asynchronous Learning, 2(2), 12-23. Paul.
[14] Mitnick, K. and Simon, W. (2002). The Art of Deception: [22] Prince, M. (2004). Does Active Learning Work? A Review
Controlling the Human Element of Security. Indianapolis, of the Research. Journal of Engineering Education
IN: Wiley Publishing, Inc. [23] Study Guides and Strategies.
[15] Moreno, R. and Mayer, R.E. (1999). Cognitive principles of http://www.studygs.net/pbl.htm, accessed 07/10/2010.
multimedia learning: The role of modality and contiguity. [24] Whitman, M. and Mattord, H. (2011). Readings and Cases
Journal of Educational Psychology, 91, 358-368. in Information Security Law and Ethics. Course Technology
[16] National Security Agency Central Security Service. IA Cengage Learning.
Courseware Evaluation Program.

View publication stats

You might also like