Publications

Evaluating cybersecurity education interventions: Three case studies

Abstract

The authors collaborate with cybersecurity faculty members from different universities to apply a five-step approach in designing an evaluation for education interventions. The goals of this exercise were to show how to design an evaluation for a real intervention from beginning to end, to highlight the common intervention goals and propose suitable evaluation instruments, and to discuss the expected investment of time and effort in preparing and performing the education evaluations.

Metadata

publication
IEEE Security & Privacy 13 (3), 63-69, 2015
year
2015
publication date
2015/6/4
authors
Jelena Mirkovic, Melissa Dark, Wenliang Du, Giovanni Vigna, Tamara Denning
link
https://ieeexplore.ieee.org/abstract/document/7118092/
resource_link
https://tamaradenning.net/files/papers/mirkovic-IEEE-SP-magazine-2015-evaluating-cybersecurity-education-interventions.pdf
journal
IEEE Security & Privacy
volume
13
issue
3
pages
63-69
publisher
IEEE