Abstract
The authors collaborate with cybersecurity faculty members from different universities to apply a five-step approach in designing an evaluation for education interventions. The goals of this exercise were to show how to design an evaluation for a real intervention from beginning to end, to highlight the common intervention goals and propose suitable evaluation instruments, and to discuss the expected investment of time and effort in preparing and performing the education evaluations.
Original language | English (US) |
---|---|
Article number | 7118092 |
Pages (from-to) | 63-69 |
Number of pages | 7 |
Journal | IEEE Security and Privacy |
Volume | 13 |
Issue number | 3 |
DOIs | |
State | Published - May 1 2015 |
Keywords
- control-alt-hack
- cybersecurity education
- education intervention
- evaluation design
- iCTF
- intervention evaluation
- security
- seed labs
ASJC Scopus subject areas
- Computer Networks and Communications
- Electrical and Electronic Engineering
- Law