INFORMATION CHANGE THE WORLD

International Journal of Education and Management Engineering(IJEME)

ISSN: 2305-3623 (Print), ISSN: 2305-8463 (Online)

Published By: MECS Press

IJEME Vol.3, No.1, Jan. 2013

A Teaching Model Application in the Course of Information Security

Full Text (PDF, 117KB), PP.14-20


Views:49   Downloads:1

Author(s)

Chunyan Qiu,Wei Zhao,Jianhua Jiang,Jialing Han

Index Terms

Information security;schema theory;computer teaching

Abstract

With the rapid development of economy, information Security is becoming more and more important for any modern organization in recent years. Therefore, How to teach information security is a challenge to universities. This paper aims to apply schema theory to information security curriculum. The teaching result shows that there is a significant difference in final exam and practice exam between the proposed model and a regular teaching model.

Cite This Paper

Chunyan Qiu,Wei Zhao,Jianhua Jiang,Jialing Han,"A Teaching Model Application in the Course of Information Security", IJEME, vol.3, no.1, pp.14-20, 2013.

Reference

[1] F. C. Bartlett, “Remembering,” Cambridge: Cambridge University Press. 1932.

[2] D. E. Rumelhart and A. Ortony, “The representation of knowledge and memory,” In R.C. Anderson, R. J. Spiro, and W. E. Montague(Eds.), Schooling and the acquisition of knowledge. Hillsdale, NJ: Erlbaum. 1977.

[3] M. W. Eysenck, M. T. Keane. “Cognitive Psychology: A Student‟sHandbook,” London: Longman Group Limited. 1985.

[4] M. E. Whitman and H. J. Mattord, “Designing and teaching information security curriculum,'‟ in Proceedings of the 1st annual Conference on Information Security Curriculum Development Kennesaw, Georgia: ACM, 2004.

[5] S. P. Marshall. “Schemas in problem solving,” Cambridge: Cambridge University press. 1995.

[6] Walker, A. Glenn. “Common Statistical Methods for Clinical Research with SAS Examples.” Cary,NC: SAS Institute. 2002

[7] Bluman, G. “Allan Elementary Statistics: A Step by Step Approach, A Brief Version“. 4th ed. New York: McGraw Hill. 2008.