Evaluating Cybersecurity Education Interventions: Three Case Studies

Jelena Mirkovic, Melissa Dark, Wenliang Du, Giovanni Vigna, Tamara Denning

Research output: Contribution to journalArticlepeer-review

20 Scopus citations


The authors collaborate with cybersecurity faculty members from different universities to apply a five-step approach in designing an evaluation for education interventions. The goals of this exercise were to show how to design an evaluation for a real intervention from beginning to end, to highlight the common intervention goals and propose suitable evaluation instruments, and to discuss the expected investment of time and effort in preparing and performing the education evaluations.

Original languageEnglish (US)
Article number7118092
Pages (from-to)63-69
Number of pages7
JournalIEEE Security and Privacy
Issue number3
StatePublished - May 1 2015


  • control-alt-hack
  • cybersecurity education
  • education intervention
  • evaluation design
  • iCTF
  • intervention evaluation
  • security
  • seed labs

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering
  • Law


Dive into the research topics of 'Evaluating Cybersecurity Education Interventions: Three Case Studies'. Together they form a unique fingerprint.

Cite this