Evaluating Cybersecurity Education Interventions: Three Case Studies

Jelena Mirkovic, Melissa Dark, Wenliang Du, Giovanni Vigna, Tamara Denning

Research output: Contribution to journalArticlepeer-review

23 Scopus citations

Abstract

The authors collaborate with cybersecurity faculty members from different universities to apply a five-step approach in designing an evaluation for education interventions. The goals of this exercise were to show how to design an evaluation for a real intervention from beginning to end, to highlight the common intervention goals and propose suitable evaluation instruments, and to discuss the expected investment of time and effort in preparing and performing the education evaluations.

Original languageEnglish (US)
Article number7118092
Pages (from-to)63-69
Number of pages7
JournalIEEE Security and Privacy
Volume13
Issue number3
DOIs
StatePublished - May 1 2015

Keywords

  • control-alt-hack
  • cybersecurity education
  • education intervention
  • evaluation design
  • iCTF
  • intervention evaluation
  • security
  • seed labs

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering
  • Law

Fingerprint

Dive into the research topics of 'Evaluating Cybersecurity Education Interventions: Three Case Studies'. Together they form a unique fingerprint.

Cite this