Evaluating Cybersecurity Education Interventions: Three Case Studies

Jelena Mirkovic, Melissa Dark, Wenliang Du, Giovanni Vigna, Tamara Denning

Research output: Contribution to journalArticle

5 Citations (Scopus)

Abstract

The authors collaborate with cybersecurity faculty members from different universities to apply a five-step approach in designing an evaluation for education interventions. The goals of this exercise were to show how to design an evaluation for a real intervention from beginning to end, to highlight the common intervention goals and propose suitable evaluation instruments, and to discuss the expected investment of time and effort in preparing and performing the education evaluations.

Original languageEnglish (US)
Article number7118092
Pages (from-to)63-69
Number of pages7
JournalIEEE Security and Privacy
Volume13
Issue number3
DOIs
StatePublished - May 1 2015

Fingerprint

Education
evaluation
education
university

Keywords

  • control-alt-hack
  • cybersecurity education
  • education intervention
  • evaluation design
  • iCTF
  • intervention evaluation
  • security
  • seed labs

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Networks and Communications
  • Law

Cite this

Evaluating Cybersecurity Education Interventions : Three Case Studies. / Mirkovic, Jelena; Dark, Melissa; Du, Wenliang; Vigna, Giovanni; Denning, Tamara.

In: IEEE Security and Privacy, Vol. 13, No. 3, 7118092, 01.05.2015, p. 63-69.

Research output: Contribution to journalArticle

Mirkovic, J, Dark, M, Du, W, Vigna, G & Denning, T 2015, 'Evaluating Cybersecurity Education Interventions: Three Case Studies', IEEE Security and Privacy, vol. 13, no. 3, 7118092, pp. 63-69. https://doi.org/10.1109/MSP.2015.57
Mirkovic, Jelena ; Dark, Melissa ; Du, Wenliang ; Vigna, Giovanni ; Denning, Tamara. / Evaluating Cybersecurity Education Interventions : Three Case Studies. In: IEEE Security and Privacy. 2015 ; Vol. 13, No. 3. pp. 63-69.
@article{fb7fb190d60e499ebd878d44aedaa9db,
title = "Evaluating Cybersecurity Education Interventions: Three Case Studies",
abstract = "The authors collaborate with cybersecurity faculty members from different universities to apply a five-step approach in designing an evaluation for education interventions. The goals of this exercise were to show how to design an evaluation for a real intervention from beginning to end, to highlight the common intervention goals and propose suitable evaluation instruments, and to discuss the expected investment of time and effort in preparing and performing the education evaluations.",
keywords = "control-alt-hack, cybersecurity education, education intervention, evaluation design, iCTF, intervention evaluation, security, seed labs",
author = "Jelena Mirkovic and Melissa Dark and Wenliang Du and Giovanni Vigna and Tamara Denning",
year = "2015",
month = "5",
day = "1",
doi = "10.1109/MSP.2015.57",
language = "English (US)",
volume = "13",
pages = "63--69",
journal = "IEEE Security and Privacy",
issn = "1540-7993",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "3",

}

TY - JOUR

T1 - Evaluating Cybersecurity Education Interventions

T2 - Three Case Studies

AU - Mirkovic, Jelena

AU - Dark, Melissa

AU - Du, Wenliang

AU - Vigna, Giovanni

AU - Denning, Tamara

PY - 2015/5/1

Y1 - 2015/5/1

N2 - The authors collaborate with cybersecurity faculty members from different universities to apply a five-step approach in designing an evaluation for education interventions. The goals of this exercise were to show how to design an evaluation for a real intervention from beginning to end, to highlight the common intervention goals and propose suitable evaluation instruments, and to discuss the expected investment of time and effort in preparing and performing the education evaluations.

AB - The authors collaborate with cybersecurity faculty members from different universities to apply a five-step approach in designing an evaluation for education interventions. The goals of this exercise were to show how to design an evaluation for a real intervention from beginning to end, to highlight the common intervention goals and propose suitable evaluation instruments, and to discuss the expected investment of time and effort in preparing and performing the education evaluations.

KW - control-alt-hack

KW - cybersecurity education

KW - education intervention

KW - evaluation design

KW - iCTF

KW - intervention evaluation

KW - security

KW - seed labs

UR - http://www.scopus.com/inward/record.url?scp=84933524163&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84933524163&partnerID=8YFLogxK

U2 - 10.1109/MSP.2015.57

DO - 10.1109/MSP.2015.57

M3 - Article

AN - SCOPUS:84933524163

VL - 13

SP - 63

EP - 69

JO - IEEE Security and Privacy

JF - IEEE Security and Privacy

SN - 1540-7993

IS - 3

M1 - 7118092

ER -