International Journal of Education and Management Engineering(IJEME)

ISSN: 2305-3623 (Print), ISSN: 2305-8463 (Online)

Published By: MECS Press

IJEME Vol.3, No.1, Jan. 2013

A Teaching Model Application in the Course of Information Security

Full Text (PDF, 117KB), PP.14-20

Views:49   Downloads:1


Chunyan Qiu,Wei Zhao,Jianhua Jiang,Jialing Han

Index Terms

Information security;schema theory;computer teaching


With the rapid development of economy, information Security is becoming more and more important for any modern organization in recent years. Therefore, How to teach information security is a challenge to universities. This paper aims to apply schema theory to information security curriculum. The teaching result shows that there is a significant difference in final exam and practice exam between the proposed model and a regular teaching model.

Cite This Paper

Chunyan Qiu,Wei Zhao,Jianhua Jiang,Jialing Han,"A Teaching Model Application in the Course of Information Security", IJEME, vol.3, no.1, pp.14-20, 2013.


[1] F. C. Bartlett, “Remembering,” Cambridge: Cambridge University Press. 1932.

[2] D. E. Rumelhart and A. Ortony, “The representation of knowledge and memory,” In R.C. Anderson, R. J. Spiro, and W. E. Montague(Eds.), Schooling and the acquisition of knowledge. Hillsdale, NJ: Erlbaum. 1977.

[3] M. W. Eysenck, M. T. Keane. “Cognitive Psychology: A Student‟sHandbook,” London: Longman Group Limited. 1985.

[4] M. E. Whitman and H. J. Mattord, “Designing and teaching information security curriculum,'‟ in Proceedings of the 1st annual Conference on Information Security Curriculum Development Kennesaw, Georgia: ACM, 2004.

[5] S. P. Marshall. “Schemas in problem solving,” Cambridge: Cambridge University press. 1995.

[6] Walker, A. Glenn. “Common Statistical Methods for Clinical Research with SAS Examples.” Cary,NC: SAS Institute. 2002

[7] Bluman, G. “Allan Elementary Statistics: A Step by Step Approach, A Brief Version“. 4th ed. New York: McGraw Hill. 2008.