Team for Research in
Ubiquitous Secure Technology

Online Information Security Education through Anchored Instruction
Eric Imsand, Larry Howard, Ken Pence, Mike Byers, Dipankar Dasgupta

Citation
Eric Imsand, Larry Howard, Ken Pence, Mike Byers, Dipankar Dasgupta. "Online Information Security Education through Anchored Instruction". Talk or presentation, 11, November, 2008.

Abstract
The Internet is unquestionably the most extensive and accessible resource for information and commerce in history. But it is also providing a medium for new forms of crime, espionage, and even terror, targeting organizations and individuals alike. Broad awareness of vulnerabilities and defenses is needed to protect against all types of cyber attacks. While online learning environments provide a great opportunity to train large numbers of people, they have yet to demonstrate effectiveness in high-stakes situations. In an effort to better prepare cyberspace defenders, we are developing a multidisciplinary training program that encompasses topics from computer science, management information systems, and legal and ethical studies, using state-of-the-art online learning methods and technology. This paper describes the Adaptive Cyber-security Training (ACT) Online program, giving details of its targeted training population, curriculum, and instructional design strategy. We further report pilot testing results from two recently developed courses that show significant learning gains following this cyber security training

Electronic downloads

Citation formats  
  • HTML
    Eric Imsand, Larry Howard, Ken Pence, Mike Byers, Dipankar
    Dasgupta. <a
    href="http://www.truststc.org/pubs/483.html"
    ><i>Online Information Security Education through
    Anchored Instruction</i></a>, Talk or
    presentation,  11, November, 2008.
  • Plain text
    Eric Imsand, Larry Howard, Ken Pence, Mike Byers, Dipankar
    Dasgupta. "Online Information Security Education
    through Anchored Instruction". Talk or presentation, 
    11, November, 2008.
  • BibTeX
    @presentation{ImsandHowardPenceByersDasgupta08_OnlineInformationSecurityEducationThroughAnchoredInstruction,
        author = {Eric Imsand and Larry Howard and Ken Pence and
                  Mike Byers and Dipankar Dasgupta},
        title = {Online Information Security Education through
                  Anchored Instruction},
        day = {11},
        month = {November},
        year = {2008},
        abstract = {The Internet is unquestionably the most extensive
                  and accessible resource for information and
                  commerce in history. But it is also providing a
                  medium for new forms of crime, espionage, and even
                  terror, targeting organizations and individuals
                  alike. Broad awareness of vulnerabilities and
                  defenses is needed to protect against all types of
                  cyber attacks. While online learning environments
                  provide a great opportunity to train large numbers
                  of people, they have yet to demonstrate
                  effectiveness in high-stakes situations. In an
                  effort to better prepare cyberspace defenders, we
                  are developing a multidisciplinary training
                  program that encompasses topics from computer
                  science, management information systems, and legal
                  and ethical studies, using state-of-the-art online
                  learning methods and technology. This paper
                  describes the Adaptive Cyber-security Training
                  (ACT) Online program, giving details of its
                  targeted training population, curriculum, and
                  instructional design strategy. We further report
                  pilot testing results from two recently developed
                  courses that show significant learning gains
                  following this cyber security training},
        URL = {http://www.truststc.org/pubs/483.html}
    }
    

Posted by Jessica Gamble on 23 Jan 2009.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.