New Orleans, Louisiana
June 26, 2016
June 26, 2016
August 28, 2016
Computing & Information Technology
Employing Model-Eliciting Activities in Cybersecurity Education
College cybersecurity courses should ensure that the activities employed engage and allow translation from conceptual knowledge to practice. We propose to use model-eliciting activities (MEAs) to develop students’ representational fluency in the cybersecurity domain. MEAs are activities that intent to simulate real-word client-driven scenarios, this activities relay on teamwork and student ability to apply concepts. Properly constructed and implemented MEAs can increment use of: (1) student reflection tools in assessments, and (2) learning technologies. MEAs require students to iteratively build, test and refine their knowledge by encouraging students to build different forms of representations and connect and translate among them (Yildirim, Shuman, Besterfield-Sacre, & Yildirim, 2010). They focus on eliciting from students conceptual models that they iteratively revise in problem-solving episodes (Hamilton, et al., 2008). The cybersecurity topic chosen for the MEA implementation was Hyper-Text Transfer Protocol Secure (HTTPS). The MEA developed, “Migration to HTTPS”, comprises core concepts of HTTPS and their application on a real-world cybersecurity tasks. The activity was pilot tested with a group of 12 third year Electrical and Computer Engineering undergraduate students who participated in a Four-hour workshop in cryptography prior to working on the project in a group of two.
In this paper we will describe the underlying learning theory that guided our rationale for using MEA as a pedagogical approach to promote deep learning in cybersecurity principles. We will also describe how design principles guided the design of the “Migration to HTTPS MEA”, along with a justification of how we aligned learning objectives with assessment procedures and the implementation of the MEA. Finally, we will present the results of our pilot study, identify implications for teaching and learning, and propose future work.
Serrano, M. I., & Magana, A. J., & Yang, B. (2016, June), Employing Model-Eliciting Activities in Cybersecurity Education Paper presented at 2016 ASEE Annual Conference & Exposition, New Orleans, Louisiana. 10.18260/p.26943
ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2016 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015