A Teaching Model Application in the Course of Information Security
Автор: Chunyan Qiu, Wei Zhao, Jianhua Jiang, Jialing Han
Журнал: International Journal of Education and Management Engineering(IJEME) @ijeme
Статья в выпуске: 1 vol.3, 2013 года.
Бесплатный доступ
With the rapid development of economy, information Security is becoming more and more important for any modern organization in recent years. Therefore, How to teach information security is a challenge to universities. This paper aims to apply schema theory to information security curriculum. The teaching result shows that there is a significant difference in final exam and practice exam between the proposed model and a regular teaching model.
Information security, schema theory, computer teaching
Короткий адрес: https://sciup.org/15013799
IDR: 15013799
Список литературы A Teaching Model Application in the Course of Information Security
- F. C. Bartlett, “Remembering,” Cambridge: Cambridge University Press. 1932.
- D. E. Rumelhart and A. Ortony, “The representation of knowledge and memory,” In R.C. Anderson, R. J. Spiro, and W. E. Montague(Eds.), Schooling and the acquisition of knowledge. Hillsdale, NJ: Erlbaum. 1977.
- M. W. Eysenck, M. T. Keane. “Cognitive Psychology: A Student‟sHandbook,” London: Longman Group Limited. 1985.
- M. E. Whitman and H. J. Mattord, “Designing and teaching information security curriculum,'‟ in Proceedings of the 1st annual Conference on Information Security Curriculum Development Kennesaw, Georgia: ACM, 2004.
- S. P. Marshall. “Schemas in problem solving,” Cambridge: Cambridge University press. 1995.
- Walker, A. Glenn. “Common Statistical Methods for Clinical Research with SAS Examples.” Cary,NC: SAS Institute. 2002
- Bluman, G. “Allan Elementary Statistics: A Step by Step Approach, A Brief Version“. 4th ed. New York: McGraw Hill. 2008.