Skip to main content
Top

Hint

Swipe to navigate through the chapters of this book

2017 | Supplement | Chapter

Cooperative Learning in Information Security Education: Teaching Secret Sharing Concepts

Authors : Yang-Wai Chow, Willy Susilo, Guomin Yang

Published in: Cooperative Design, Visualization, and Engineering

Publisher: Springer International Publishing

share
SHARE

Abstract

Information security is an important yet challenging area of education. Much of the difficulty lies in the complexity of security schemes and the often perceived disjoint between theory and practice. This paper investigates the topic of adopting cooperative learning for teaching secret sharing concepts and schemes. The aim of this is to motivate and cultivate an interest in students to learn more about the topic. By designing hands-on cooperative learning activities, the goal is help students appreciate the connection between theory and practice, and to be able to help and encourage each other in their understanding of the area. In this paper, we analyze the suitability of this group-based learning approach in relation to addressing the five essential elements of cooperative learning.

To get access to this content you need the following product:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 69.000 Bücher
  • über 500 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt 90 Tage mit der neuen Mini-Lizenz testen!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 50.000 Bücher
  • über 380 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe



 


Jetzt 90 Tage mit der neuen Mini-Lizenz testen!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 58.000 Bücher
  • über 300 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko





Jetzt 90 Tage mit der neuen Mini-Lizenz testen!

Literature
2.
go back to reference Bhattacharya, P., Yang, L., Guo, M., Qian, K., Yang, M.: Learning mobile security with labware. IEEE Secur. Priv. 12(1), 69–72 (2014) CrossRef Bhattacharya, P., Yang, L., Guo, M., Qian, K., Yang, M.: Learning mobile security with labware. IEEE Secur. Priv. 12(1), 69–72 (2014) CrossRef
3.
go back to reference Bishop, M.: What is computer security? IEEE Secur. Priv. 99(1), 67–69 (2003) CrossRef Bishop, M.: What is computer security? IEEE Secur. Priv. 99(1), 67–69 (2003) CrossRef
4.
go back to reference Blakley, G.: Safeguarding cryptographic keys. In: Proceedings of the 1979 AFIPS National Computer Conference, pp. 313–317 (1979) Blakley, G.: Safeguarding cryptographic keys. In: Proceedings of the 1979 AFIPS National Computer Conference, pp. 313–317 (1979)
5.
go back to reference Chow, Y.-W., Susilo, W., Wong, D.S.: Enhancing the perceived visual quality of a size invariant visual cryptography scheme. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 10–21. Springer, Heidelberg (2012). doi: 10.​1007/​978-3-642-34129-8_​2 CrossRef Chow, Y.-W., Susilo, W., Wong, D.S.: Enhancing the perceived visual quality of a size invariant visual cryptography scheme. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 10–21. Springer, Heidelberg (2012). doi: 10.​1007/​978-3-642-34129-8_​2 CrossRef
6.
go back to reference Chow, Y.-W., Susilo, W., Yang, G., Phillips, J.G., Pranata, I., Barmawi, A.M.: Exploiting the error correction mechanism in QR codes for secret sharing. In: Liu, J.K.K., Steinfeld, R. (eds.) ACISP 2016. LNCS, vol. 9722, pp. 409–425. Springer, Cham (2016). doi: 10.​1007/​978-3-319-40253-6_​25 CrossRef Chow, Y.-W., Susilo, W., Yang, G., Phillips, J.G., Pranata, I., Barmawi, A.M.: Exploiting the error correction mechanism in QR codes for secret sharing. In: Liu, J.K.K., Steinfeld, R. (eds.) ACISP 2016. LNCS, vol. 9722, pp. 409–425. Springer, Cham (2016). doi: 10.​1007/​978-3-319-40253-6_​25 CrossRef
7.
go back to reference Decuyper, S., Dochy, F., Van den Bossche, P.: Grasping the dynamic complexity of team learning: an integrative model for effective team learning in organisations. Educ. Res. Rev. 5(2), 111–133 (2010) CrossRef Decuyper, S., Dochy, F., Van den Bossche, P.: Grasping the dynamic complexity of team learning: an integrative model for effective team learning in organisations. Educ. Res. Rev. 5(2), 111–133 (2010) CrossRef
8.
go back to reference Ernits, M., Kikkas, K.: A live virtual simulator for teaching cybersecurity to information technology students. In: Zaphiris, P., Ioannou, A. (eds.) LCT 2016. LNCS, vol. 9753, pp. 474–486. Springer, Cham (2016). doi: 10.​1007/​978-3-319-39483-1_​43 Ernits, M., Kikkas, K.: A live virtual simulator for teaching cybersecurity to information technology students. In: Zaphiris, P., Ioannou, A. (eds.) LCT 2016. LNCS, vol. 9753, pp. 474–486. Springer, Cham (2016). doi: 10.​1007/​978-3-319-39483-1_​43
9.
go back to reference Johnson, D.W., Johnson, R.T.: Making cooperative learning work. Theory Pract. 38(2), 67–73 (1999) CrossRef Johnson, D.W., Johnson, R.T.: Making cooperative learning work. Theory Pract. 38(2), 67–73 (1999) CrossRef
10.
go back to reference Johnson, D.W., Johnson, R.T.: An educational psychology success story: social interdependence theory and cooperative learning. Educ. Res. 38(5), 365–379 (2009) CrossRef Johnson, D.W., Johnson, R.T.: An educational psychology success story: social interdependence theory and cooperative learning. Educ. Res. 38(5), 365–379 (2009) CrossRef
11.
go back to reference Kyndt, E., Raes, E., Lismont, B., Timmers, F., Cascallar, E., Dochy, F.: A meta-analysis of the effects of face-to-face cooperative learning. Do recent studies falsify or verify earlier findings? Educ. Res. Rev. 10, 133–149 (2013) CrossRef Kyndt, E., Raes, E., Lismont, B., Timmers, F., Cascallar, E., Dochy, F.: A meta-analysis of the effects of face-to-face cooperative learning. Do recent studies falsify or verify earlier findings? Educ. Res. Rev. 10, 133–149 (2013) CrossRef
12.
go back to reference Locasto, M., Sinclair, S.: An experience report on undergraduate cyber-security education and outreach. In: Annual Conference on Education in Information Security (ACEIS) (2009) Locasto, M., Sinclair, S.: An experience report on undergraduate cyber-security education and outreach. In: Annual Conference on Education in Information Security (ACEIS) (2009)
13.
go back to reference Logan, P.Y., Clarkson, A.: Teaching students to hack: curriculum issues in information security. In: ACM SIGCSE Bulletin, vol. 37, pp. 157–161. ACM (2005) Logan, P.Y., Clarkson, A.: Teaching students to hack: curriculum issues in information security. In: ACM SIGCSE Bulletin, vol. 37, pp. 157–161. ACM (2005)
14.
go back to reference Naor, M., Shamir, A.: Visual cryptography. In: Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). doi: 10.​1007/​BFb0053419 Naor, M., Shamir, A.: Visual cryptography. In: Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). doi: 10.​1007/​BFb0053419
16.
go back to reference Slavin, R.E.: When does cooperative learning increase student achievement? Psychol. Bull. 94(3), 429 (1983) CrossRef Slavin, R.E.: When does cooperative learning increase student achievement? Psychol. Bull. 94(3), 429 (1983) CrossRef
17.
go back to reference Terry, C., Castellano, A., Harrod, J., Luke, J., Reichherzer, T.: The UWF cyber battle lab: a hands-on computer lab for teaching and research in cyber security. In: Proceedings of the International Conference on Security and Management (SAM), p. 1. The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp) (2014) Terry, C., Castellano, A., Harrod, J., Luke, J., Reichherzer, T.: The UWF cyber battle lab: a hands-on computer lab for teaching and research in cyber security. In: Proceedings of the International Conference on Security and Management (SAM), p. 1. The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp) (2014)
18.
go back to reference Wu, D., Fulmer, J., Johnson, S.: Teaching information security with virtual laboratories. In: Carroll, J.M. (ed.) Innovative Practices in Teaching Information Sciences and Technology, pp. 179–192. Springer, Cham (2014). doi: 10.​1007/​978-3-319-03656-4_​16 CrossRef Wu, D., Fulmer, J., Johnson, S.: Teaching information security with virtual laboratories. In: Carroll, J.M. (ed.) Innovative Practices in Teaching Information Sciences and Technology, pp. 179–192. Springer, Cham (2014). doi: 10.​1007/​978-3-319-03656-4_​16 CrossRef
19.
go back to reference Xu, L., Huang, D., Tsai, W.-T.: Cloud-based virtual laboratory for network security education. IEEE Trans. Educ. 57(3), 145–150 (2014) CrossRef Xu, L., Huang, D., Tsai, W.-T.: Cloud-based virtual laboratory for network security education. IEEE Trans. Educ. 57(3), 145–150 (2014) CrossRef
Metadata
Title
Cooperative Learning in Information Security Education: Teaching Secret Sharing Concepts
Authors
Yang-Wai Chow
Willy Susilo
Guomin Yang
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-66805-5_8