A basic course model on information security for high school it curriculum

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

As more of the activities of daily living take place online, computer security education for high school students is of increasing importance. To address this need, we design a course model as prototype curriculum to teach high school students about the basics of information security. Prototype examples of hands-on lab activities are also introduced for enhancing students' practical skills on information security. IT educators can consider the proposed work in this paper as a guideline for designing and developing information security courses to high school students. We identify challenges encountered in this process, and contend that these challenges stem from the nature of the information security field.

Original languageEnglish
Title of host publicationProceedings of 2019 IEEE Global Engineering Education Conference, EDUCON 2019
EditorsAlaa K. Ashmawy, Sebastian Schreiter
PublisherIEEE Computer Society
Pages63-70
Number of pages8
ISBN (Electronic)9781538695067
DOIs
Publication statusPublished - Apr 2019
Event10th IEEE Global Engineering Education Conference, EDUCON 2019 - Dubai, United Arab Emirates
Duration: Apr 9 2019Apr 11 2019

Publication series

NameIEEE Global Engineering Education Conference, EDUCON
VolumeApril-2019
ISSN (Print)2165-9559
ISSN (Electronic)2165-9567

Conference

Conference10th IEEE Global Engineering Education Conference, EDUCON 2019
Country/TerritoryUnited Arab Emirates
CityDubai
Period4/9/194/11/19

Keywords

  • Computer password
  • Firewall
  • High school curriculum
  • Information security
  • Learning outcomes
  • Malicious programs
  • Phishing
  • Social engineering

ASJC Scopus subject areas

  • Engineering(all)
  • Information Systems and Management
  • Education

Fingerprint

Dive into the research topics of 'A basic course model on information security for high school it curriculum'. Together they form a unique fingerprint.

Cite this