International Journal of Education and Management Engineering(IJEME)
ISSN: 2305-3623 (Print), ISSN: 2305-8463 (Online)
Published By: MECS Press
IJEME Vol.3, No.1, Jan. 2013
A Teaching Model Application in the Course of Information Security
Full Text (PDF, 117KB), PP.14-20
With the rapid development of economy, information Security is becoming more and more important for any modern organization in recent years. Therefore, How to teach information security is a challenge to universities. This paper aims to apply schema theory to information security curriculum. The teaching result shows that there is a significant difference in final exam and practice exam between the proposed model and a regular teaching model.
Cite This Paper
Chunyan Qiu,Wei Zhao,Jianhua Jiang,Jialing Han,"A Teaching Model Application in the Course of Information Security", IJEME, vol.3, no.1, pp.14-20, 2013.
 F. C. Bartlett, “Remembering,” Cambridge: Cambridge University Press. 1932.
 D. E. Rumelhart and A. Ortony, “The representation of knowledge and memory,” In R.C. Anderson, R. J. Spiro, and W. E. Montague(Eds.), Schooling and the acquisition of knowledge. Hillsdale, NJ: Erlbaum. 1977.
 M. W. Eysenck, M. T. Keane. “Cognitive Psychology: A Student‟sHandbook,” London: Longman Group Limited. 1985.
 M. E. Whitman and H. J. Mattord, “Designing and teaching information security curriculum,'‟ in Proceedings of the 1st annual Conference on Information Security Curriculum Development Kennesaw, Georgia: ACM, 2004.
 S. P. Marshall. “Schemas in problem solving,” Cambridge: Cambridge University press. 1995.
 Walker, A. Glenn. “Common Statistical Methods for Clinical Research with SAS Examples.” Cary,NC: SAS Institute. 2002
 Bluman, G. “Allan Elementary Statistics: A Step by Step Approach, A Brief Version“. 4th ed. New York: McGraw Hill. 2008.