Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3660043.3660165acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicieaiConference Proceedingsconference-collections
research-article

An Innovative Teaching Approach for Information Security: Improving Students' Practical and High-Level Skills by Using Ubiquitous Learning and Competition: Enhancing Students' Information Security Skills through Ubiquitous Learning and Competition

Published: 30 May 2024 Publication History
  • Get Citation Alerts
  • Abstract

    Traditional information security teaching faces several challenges, including time and space limitations, restricted participation, outdated experiment designs, limited process monitoring, and capacity limitations for conducting experiments. This paper proposes an innovative information security ubiquitous teaching approach based on the competition mechanism, aiming to address the issues associated with traditional information security teaching methods and to stimulate students' interest and initiative in learning. A ubiquitous teaching platform is designed to engage students in self-learning and experimentation in their fragmented time, while teachers can communicate and interact with students more flexibly and comprehensively, promoting a transformation of the teaching mode. In our teaching method, information security experiments are constructed with a competition mechanism that allows students to compete for points and rankings, thereby stimulating their competitiveness and innovative thinking. The implementation of the competition mechanism-based information security experiments consists of three parts: competition management, scenario simulation, and competition display.

    References

    [1]
    P. Zheng, X. Wang, and J. Li, “Exploration and practice of curriculum ideological and political construction reform——take” information security” course as an example,” ASP Transactions on Computers, vol. 1, no. 1, pp. 1–5, 2021.
    [2]
    L. Xu, D. Huang, and W.-T. Tsai, “Cloud-based virtual laboratory for network security education,” IEEE Transactions on Education, vol. 57, no. 3, pp. 145–150, 2013.
    [3]
    J. Garc ́ ıa and J. Entrialgo, “Using computer virtualization and software tools to implement a low cost laboratory for the teaching of storage area networks,” computer applications in engineering education, vol. 23, no. 5, pp. 715–723, 2015.
    [4]
    N. F. Abdel-Maksoud, “When virtual becomes better than real: Investigating the impact of a networking simulation on learning and motivation.” International Journal of Education and Practice, vol. 6, no. 4, pp. 253–270, 2018.
    [5]
    X. Hu, H. Le, A. G. Bourgeois, and Y. Pan, “Collaborative learning in cloud-based virtual computer labs,” in 2018 ieee frontiers in education conference (fie) . IEEE, 2018, pp. 1–5.
    [6]
    L. Topham, K. Kifayat, Y. A. Younis, Q. Shi, and B. Askwith, “Cyber security teaching and learning laboratories: A survey,” Information & Security, vol. 35, no. 1, p. 51, 2016.
    [7]
    A. Ahmed, K. Lundqvist, C. Watterson, and N. Baghaei, “Teaching cyber-security for distance learners: A reflective study,” in 2020 IEEE Frontiers in Education Conference (FIE) . IEEE, 2020, pp. 1–7.
    [8]
    R. Zhang, C. Xu, and M. Xie, “Powering hands-on cybersecurity practices with cloud computing,” in 2019 IEEE 27th International Conference on Network Protocols (ICNP) . IEEE, 2019, pp. 1–2.
    [9]
    A. Kivity, Y. Kamay, D. Laor, U. Lublin, and A. Liguori, “kvm: the linux virtual machine monitor,” in Proceedings of the Linux symposium, vol. 1, no. 8. Dttawa, Dntorio, Canada, 2007, pp. 225–230.
    [10]
    E. Trickel, F. Disperati, E. Gustafson, F. Kalantari, M. Mabey, N. Tiwari, Y. Safaei, A. Doup ́ e, and G. Vigna, “Shell we play a game? ctf-as-a-service for security education.” in ASE@ USENIX Security Symposium, 2017.

    Index Terms

    1. An Innovative Teaching Approach for Information Security: Improving Students' Practical and High-Level Skills by Using Ubiquitous Learning and Competition: Enhancing Students' Information Security Skills through Ubiquitous Learning and Competition

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ICIEAI '23: Proceedings of the 2023 International Conference on Information Education and Artificial Intelligence
        December 2023
        1132 pages
        ISBN:9798400716157
        DOI:10.1145/3660043
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 30 May 2024

        Permissions

        Request permissions for this article.

        Check for updates

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Funding Sources

        • the Undergraduate Teaching Quality Enhancement Program Project of Anhui Polytechnic University
        • the Advanced Research Project of Anhui Polytechnic University
        • the Research Start-up Fund for Talent Introduction of Anhui Polytechnic University
        • Provincial Natural Science Foundation of Anhui

        Conference

        ICIEAI 2023

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 11
          Total Downloads
        • Downloads (Last 12 months)11
        • Downloads (Last 6 weeks)11

        Other Metrics

        Citations

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media