Paper
8 June 2012 Applications of schema theory in information security teaching
Chunyan Qiu, Wei Zhao
Author Affiliations +
Proceedings Volume 8334, Fourth International Conference on Digital Image Processing (ICDIP 2012); 83342S (2012) https://doi.org/10.1117/12.956455
Event: Fourth International Conference on Digital Image Processing (ICDIP 2012), 2012, Kuala Lumpur, Malaysia
Abstract
Information security knowledge is more and more important to students in universities of finance and economics. However, mastering the skill of information security is not easy to them. Schema theory is applied into information security teaching to help students improve their skills. The teaching result shows that there is a significant difference in final exam and practice exam between the proposed model and a regular teaching model.
© (2012) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Chunyan Qiu and Wei Zhao "Applications of schema theory in information security teaching", Proc. SPIE 8334, Fourth International Conference on Digital Image Processing (ICDIP 2012), 83342S (8 June 2012); https://doi.org/10.1117/12.956455
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Statistical analysis

Computing systems

Information technology

Security technologies

Artificial intelligence

Computer science

Back to Top