Alexandra Savelieva, Sergey Avdoshin, PhD National Research University “Higher School of Economics” Alexandra Savelieva, Sergey Avdoshin, PhD National.

Slides:



Advertisements
Similar presentations
Information Literacy Instruction in Libraries
Advertisements

The 21st Century Context for
Department of Education, Employment and Workplace Relations
LEARNER CENTERED LEARNER DESIGNED Learning & Preparation Objectives Learning Resources and Strategies Evidence of Accomplishment of Objectives Criteria.
Bologna Process in terms of EU aims and objectives
1 Graduates’ Attributes : EMF, EUR-ACE and Federal Educational Standards Alexander I. Chuchalin, Chair of the RAEE Accreditation Board Graduates’ Attributes.
The Priority of Research and Doctoral School Nino Zhvania Head of the Quality Assurance Office.
Prof. Dr. Ramdan Abdel Maksoud Pharos University Faculty of Engineering Architectural Department.
NETS Meets Common Core Teresa Knapp Gordon, NBCT
2010 Challenges and Initiatives for Ministry of Education and Science of Georgia.
1 Positive Learning Outcomes Through Problem-Based Learning Willie Yip Department of Computing.
EURIDICE project Evaluation of image database use in online learning environment 11/
“FUTURE DIRECTIONS FOR TITLE VI AND FULBRIGHT- HAYS PROGRAMS” William I. Brustein Associate Provost for International Affairs University of Illinois TITLE.
Introduction to Student Learning Outcomes in the Major
The Subject Librarian's Role in Building Digital Collections: Where Information Management and Subject Expertise Meet Ruth Vondracek Oregon State University.
© 2003 Turoff 1 The Nature of Information Systems and Employment in IS Murray Turoff Information Systems Department.
Distributed Intelligence, Lifelong Learning, & Innovative Media: Foundations for Graduate Education Sharon Derry, University of Wisconsin-Madison Gerhard.
The Importance of Food Safety Media Training 2 nd Oman Food Safety Conference By Mobisher Rabbani.
Capstone Design Project (CDP) Civil Engineering Department First Semester 1431/1432 H 10/14/20091 King Saud University, Civil Engineering Department.
ICT TEACHERS` COMPETENCIES FOR THE KNOWLEDGE SOCIETY
Y. Rong June 2008 Modified in Feb  Industrial leaders  Initiation of a project (any project)  Innovative way to do: NABC ◦ Need analysis ◦ Approach.
A Student View of the simulated learning experience Austin Cooke Strategic Management.
Information Literacy Adapted from a presentation by Anke Tonn Nicholls State University.
CONTI’2008, 5-6 June 2008, TIMISOARA 1 Towards a digital content management system Gheorghe Sebestyen-Pal, Tünde Bálint, Bogdan Moscaliuc, Agnes Sebestyen-Pal.
Innovations in Engineering Education Why ? When ? How ? Ivan ŠIMAN, MSc. PhD.
Communication Degree Program Outcomes
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Evaluating Educational Technology and Integration.
ICT business statistics and ICT sector: Uzbekistan’s experience Prepared by Mukhsina Khusanova.
Learning Unit Documents and Examples. Learning Units - basic building block of a course For iGETT a Learning Unit consists of –Three parts Instructor.
Service-Learning and Grant Writing Workshop Tennessee Technological University February 23, 2010 Presented by: Shelley Brown Department of Sociology and.
Connected Learning with Web 2.0 For Educators Presenter: Faith Bishop Principal Consultant Illinois State Board of Education
Implementation and Management of an Information Systems Practicum in a Graduate Computer Information Technology Curriculum S amuel C onn, Asst. Professor.
Mission The faculty and staff of Pittman Elementary School are committed to providing every student with adequate time, effective teaching, and a positive.
Learning Outcomes of the SCPHN Programme & How they Link to Practice.
BUSINESS INFORMATICS descriptors presentation Vladimir Radevski, PhD Associated Professor Faculty of Contemporary Sciences and Technologies (CST) Linkoping.
Learning outcomes for BUSINESS INFORMATCIS Vladimir Radevski, PhD Associated Professor Faculty of Contemporary Sciences and Technologies (CST)
METHODOLOGY AND ASSESSMENT TOOLS FOR MEDICAL STUDENTS’ ACHIEVEMENTS ON THE BASIS OF COMPETENCE APPROACH OMSK STATE MEDICAL ACADEMY DEPARTMENT OF PEDAGOGY.
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
Guidelines for Designing Inquiry-Based Learning Environments on the Web: Professional Development of Educators Byung-Ro Lim IST, Indiana Univ. July 20,
=_A-ZVCjfWf8 Nets for students 2007.
Different approaches and experiences at the University of Parma (Italy) Embedding information literacy into subject learning Fabrizia Bevilacqua Monica.
D1.HGE.CL7.01 D1.HGA.CL6.08 Slide 1. Introduction Design, prepare and present reports  Classroom schedule  Trainer contact details  Assessments  Resources:
Design a Fireworks Show! Using Context and Problem Based Learning (CPBL) Dr Gan Shermer Emily M. MacCready.
Graduate studies - Master of Pharmacy (MPharm) 1 st and 2 nd cycle integrated, 5 yrs, 10 semesters, 300 ECTS-credits 1 Integrated master's degrees qualifications.
Vision Library Media Center serves as an integral part of the school ’ s educational program and is the information hub of the school. All students will.
Online curriculum centre Faculty member training, April 2009.
Education quality improvement via creating and introducing modern tools of interactive teaching Natalia Georgieva Marina Shakina Perm Campus National Research.
National Center for Supercomputing Applications Barbara S. Minsker, Ph.D. Associate Professor National Center for Supercomputing Applications and Department.
Incorporating Engineering Standards in the Major Design Experience William E. Kelly Department of Civil Engineering The Catholic University of America.
Digital Learning India 2008 July , 2008 Mrs. C. Vijayalakshmi Department of Computer science and Engineering Indian Institute of Technology – IIT.
Intel ® Teach Program International Curriculum Roundtable Programs of the Intel ® Education Initiative are funded by the Intel Foundation and Intel Corporation.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Hannah Love LSIS 5645 Core Assessment IV. Why is information literacy necessary?  To fulfill the goals of education by preparing students for The workplace.
Engineering Standards in Capstone Design William E. Kelly Department of Civil Engineering The Catholic University of America Washington, DC ASEE.
Technology Workshop 2 June 22, Extent of Technology Integration in Instruction by ABE Teachers.
Fundamentals of Governance: Parliament and Government Understanding and Demonstrating Assessment Criteria Facilitator: Tony Cash.
ISTE Standards for Teachers Anja Whitehead IDT 3600 Fall 2015.
First week. Catalog Description This course explores basic cultural, social, legal, and ethical issues inherent in the discipline of computing. Students.
Relationships in the 21 st Century Parent Teachers Students Association (PTSA) Goals, Membership, Participation.
Information Literacy Prepared for “The Role of Academic Libraries In Fostering Civil Society” Nancy Bolt, September 2002 Nancy Bolt & Associates.
National PE Cycle of Analysis. Fitness Assessment + Gathering Data Why do we need to asses our fitness levels?? * Strengths + Weeknesses -> Develop Performance.
Towards the greening of our minds: Green and sustainable chemistry Dr. Anne Marteel-Parrish Assistant Professor of Chemistry.
BUS 660 Entire Course (2 Sets) FOR MORE CLASSES VISIT This Tutorial contains 2 Sets of Papers for each Assignment (Check Details Below)
D RAFT OF F RAMEWORK OF C OLLABORATION A CTIVITIES “SEAEDUNET 2.0: D IGITAL -A GE T EACHING AND L EARNING M ODEL ”
Essay Writing Tips for Writing Essays POL No Simple Answers… Unfortunately there is no simple answer to how to write an essay. However, there are.
Prof. dr Svetislav Paunović BBA
Multiple literacy Standards for the 21st-Century learner
AACSB’s Standard 9: Curriculum content
Information Technology (IT)
Final Exam Reflection IDT3600 SARAH HERBERT.
Presentation transcript:

Alexandra Savelieva, Sergey Avdoshin, PhD National Research University “Higher School of Economics” Alexandra Savelieva, Sergey Avdoshin, PhD National Research University “Higher School of Economics” Information Security Education and Awareness: Start with a Story 31 May – 2 June 2011, Budapest, Hungary 2011 Workshop on Cyber Security and Global Affairs 31 May – 2 June 2011, Budapest, Hungary 2011 Workshop on Cyber Security and Global Affairs

Information security education problem Decisions | 31 May - 2 June, Workshop on Cyber Security and Global AffairsPAGE 2 | Academia vs. Real World

Case study method Case studies are stories with educational message (Source: Clyde Freeman Herreid, “Start with a story”) Purpose: teaching students work individually/as a team to Analyse information, Process it in a systematic way Outline key problems Generate and evaluate alternative solutions Select optimal solution and prepare for actions Application: Sociology Economics Law Management | 31 May - 2 June, Workshop on Cyber Security and Global AffairsPAGE 3 |

Problems with application of case study method in teaching information security Lack of educational materials Lack of ready-made case study available for free use Lack of guidelines for writing case- studies Inappropriateness of cases from consulting practice | 31 May - 2 June, Workshop on Cyber Security and Global AffairsPAGE 4 |

Problems with application of case study method in teaching information security Lack of educational materials Lack of ready-made case study available for free use Lack of guidelines for writing case- studies Inappropriateness of cases from consulting practice | 31 May - 2 June, Workshop on Cyber Security and Global AffairsPAGE 5 | Public sources of ideas Real names replaced with imaginary Accumulating experience and writing guidelines

Where to get the idea for a story? News portals Company web sites Professional communities RISSPA | Лента инцидентов ИБ groups?mostPopular=&gid= Информационная безопасность | 31 May - 2 June, Workshop on Cyber Security and Global AffairsPAGE 6 |

Structure of case study TitleAbstractKey wordsBodyQuestions and tasksCase analysis / solutionGuidelines for teacherBibliography | 31 May - 2 June, Workshop on Cyber Security and Global AffairsPAGE 7 |

Case study creation process. Data collection Main plot identification Relevant information search Concept definition Formulation of a catchy title Problem statement Main text writing Compilation of information from different sources Removal of redundant information Enrichment with imaginary details Replacement of key actors names Formatting List of key words population Bibliography description Hand-outs formatting and printing Finalisation Approbation Refinement of main text Incorporation of guidelines Teacher’s materials preparation | 31 May - 2 June, Workshop on Cyber Security and Global AffairsPAGE 8 |

Problems with application of case study method in teaching information security Lack of educational materials Lack of ready-made case study available for free use Lack of guidelines for writing case- studies Inappropriateness of cases from consulting practice | 31 May - 2 June, Workshop on Cyber Security and Global AffairsPAGE 9 | Public sources of ideas Real names replaced with imaginary Accumulating experience and writing guidelines Engaging students in contributing to the library of case studies

Evaluation criteria for student’s work Writing a case study Relevancy of information Real-life story basis Structure of text Sufficiency of selected material No occurrences of real company/people names Freshness of ideas Accuracy of problem statement Author’s contribution and analytical pre-processing of information from public sources Analysis of case study Demonstration of good command of theoretical knowledge Ability to identify both common and specific problems Exploring various solutions Openness to other people’s ideas Being persuasive in argumentation Application of risk management principles and decision making methods | 31 May - 2 June, Workshop on Cyber Security and Global AffairsPAGE 10 |

Case studies by key words | 31 May - 2 June, Workshop on Cyber Security and Global AffairsPAGE 11 |

There is a way to make information security course: interactive and entertaining facilitating development of analytical skills encouraging active use of theoretical knowledge close to real-world situation adaptive to students’ level and background admitting both teamwork and independent work with minimal requirements to laboratory equipment | 31 May - 2 June, Workshop on Cyber Security and Global AffairsPAGE 12 |

Advantages of case study method application Focus on practical aspects of information security in the real world High level of students’ interest and involvement Understanding of organizational decisions and corporate culture impact on information security Demonstration of risk management principles application in the context of information protection Practical classes with minimum requirements to equipment Multifaceted approach to information security – from the perspective of user, technical specialist, CFO, architect, tom-manager | 31 May - 2 June, Workshop on Cyber Security and Global AffairsPAGE 13 |

Approbation Software Engineering Department of National Research University “Higher School of Economics” “Information security management” (MSc programme, 2 nd year) “Methods of information protection” (BSc programme, 4 th year). Training Labs'2010 conference Format: interactive case study training “Risk management in the world of digital dependencies” Course “Microsoft technologies and products in information protection”, supported by a grant from Microsoft (students’ rating of the course – 4,83 out of 5 effective ) Microsoft faculty resource center, Internet university for information technologies, | 31 May - 2 June, Workshop on Cyber Security and Global AffairsPAGE 14 |

Conclusion What we have Library of case studies (currently: 19 ready-to-use, 5 work-in-progress) Growth of course rating based on students’ assessment Plagiarism reduction in students’ course works Award from foundation for educational innovations in Higher School of Economics What is next Identification of new sources for case study plots Refilling of the case study library Application of case studies for final assessment of students’ competencies acquired during information security courses Cyber exercises as a new type of training | 31 May - 2 June, Workshop on Cyber Security and Global AffairsPAGE 15 |

Thank You Alexandra Savelieva, Sergey Avdoshin, PhD National Research University “Higher School of Economics” Alexandra Savelieva, Sergey Avdoshin, PhD National Research University “Higher School of Economics” Information Security Education and Awareness: Start with a Story 31 May – 2 June Workshop on Cyber Security and Global Affairs 31 May – 2 June Workshop on Cyber Security and Global Affairs

Demo Video case: Switching to a Secure Frequency

Case study Title: Switching to a secure frequency Actors: Commander Tong Admiral Key areas: Human factors Information risk management Consequences of information system failure Information availability User Interface Design and Usability Adequate level of information protection Secure channels for data transmission | 31 May - 2 June, Workshop on Cyber Security and Global AffairsPAGE 18 |