Publications
Evaluating cybersecurity education interventions: Three case studies
Abstract
The authors collaborate with cybersecurity faculty members from different universities to apply a five-step approach in designing an evaluation for education interventions. The goals of this exercise were to show how to design an evaluation for a real intervention from beginning to end, to highlight the common intervention goals and propose suitable evaluation instruments, and to discuss the expected investment of time and effort in preparing and performing the education evaluations.
Metadata
- publication
- IEEE Security & Privacy 13 (3), 63-69, 2015
- year
- 2015
- publication date
- 2015/6/4
- authors
- Jelena Mirkovic, Melissa Dark, Wenliang Du, Giovanni Vigna, Tamara Denning
- link
- https://ieeexplore.ieee.org/abstract/document/7118092/
- resource_link
- https://tamaradenning.net/files/papers/mirkovic-IEEE-SP-magazine-2015-evaluating-cybersecurity-education-interventions.pdf
- journal
- IEEE Security & Privacy
- volume
- 13
- issue
- 3
- pages
- 63-69
- publisher
- IEEE