{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T19:40:19Z","timestamp":1654112419988},"reference-count":21,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,4,1]]},"abstract":"<p>Constant risk to the confidentiality, integrity and the availability of information in our everyday lives and work has increased the need for responsible use and handling of information. Security education is becoming an integral part of any undergraduate curriculum in computer science and information systems. The evolving role of security in this digital era makes it nontrivial to decide the appropriate topics that need to be covered during the course duration in a way that all aspects of security deployment are examined. The only approach to this challenge is to use student-oriented learning strategies to encourage the students not only to recognize relationships between concepts and comprehend the underlying structure of what is being learned but also expose them to methods where they are responsible for their own independent learning. The current study examines the experiences gained in COMP-431 Computer Security, a senior-level undergraduate computer security course using such methods, with an emphasis on the students\u2019 reactions, perceptions, and experiences as well as the educator\u2019s role in the teaching and learning process.<\/p>","DOI":"10.4018\/ijcee.2012040103","type":"journal-article","created":{"date-parts":[[2013,2,6]],"date-time":"2013-02-06T16:21:25Z","timestamp":1360167685000},"page":"24-33","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing Dynamic-Content Courses with Student-Oriented Learning Strategies"],"prefix":"10.4018","volume":"2","author":[{"given":"Ioanna","family":"Dionysiou","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Nicosia, Nicosia, Cyprus"}]},{"given":"Despo","family":"Ktoridou","sequence":"additional","affiliation":[{"name":"Department of Management and MIS, University of Nicosia, Nicosia, Cyprus"}]}],"member":"2432","reference":[{"key":"ijcee.2012040103-0","year":"2008","journal-title":"Computer Science Curriculum 2008: An Interim Revision of CS 2003"},{"key":"ijcee.2012040103-1","volume":"Vol. 1","author":"C. C.Bonwell","year":"1991","journal-title":"Active learning: Creating excitement in the classroom"},{"issue":"1","key":"ijcee.2012040103-2","article-title":"The act of discovery.","volume":"31","author":"J. S.Bruner","year":"1961","journal-title":"Harvard Educational Review"},{"key":"ijcee.2012040103-3","doi-asserted-by":"publisher","DOI":"10.1016\/S0959-4752(02)00025-7"},{"key":"ijcee.2012040103-4","author":"B. J.Duch","year":"2001","journal-title":"The power of problem-based learning"},{"key":"ijcee.2012040103-5","unstructured":"Google, Inc. (2010). Security whitepaper: Google apps messaging and collaboration products. Retrieved January 7, 2011 from www.google.com\/a"},{"key":"ijcee.2012040103-6","author":"D. W.Johnson","year":"1991","journal-title":"Active learning: Cooperation in the college classroom"},{"key":"ijcee.2012040103-7","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0663.93.1.199"},{"key":"ijcee.2012040103-8","doi-asserted-by":"publisher","DOI":"10.1080\/01443410220138511"},{"key":"ijcee.2012040103-9","doi-asserted-by":"crossref","unstructured":"Ktoridou, D. (2010, April 14-16). Applying an inductive method to a new, multidiciplinary, management of innovation and technology course: Evidence from the University of Nicosia, IEEE Engineering Education \u2013 The Future of Global Learning in Engineering Education (EDUCON), Madrid, Spain (pp. 452 \u2013 460).","DOI":"10.1109\/EDUCON.2010.5492422"},{"key":"ijcee.2012040103-10","doi-asserted-by":"crossref","unstructured":"Ktoridou, D., & Dionysiou, I. (2011, April 4-6). A case-based learning: An instructional model to incorporate information security topics in multidisciplinary courses at the University of Nicosia. In Proceedings of the IEEE Global Engineering Education Conference (EDUCON) Amman, Jordan (pp. 466-469).","DOI":"10.1109\/EDUCON.2011.5773177"},{"key":"ijcee.2012040103-11","doi-asserted-by":"publisher","DOI":"10.1002\/hrdq.1029"},{"key":"ijcee.2012040103-12","author":"M.Lundeberg","year":"1999","journal-title":"Who learns what from cases and how? The research base for teaching and learning with cases"},{"key":"ijcee.2012040103-13","author":"W.McKeachie","year":"1986","journal-title":"Teaching tips"},{"key":"ijcee.2012040103-14","author":"S. B.Merriam","year":"1998","journal-title":"Qualitative research and case study applications in education"},{"key":"ijcee.2012040103-15","author":"C.Meyers","year":"1993","journal-title":"Promoting active learning: Strategies for the college classroom"},{"key":"ijcee.2012040103-16","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1002\/tl.111","article-title":"Problem-solving through design","author":"W. A.Nelson","year":"2003","journal-title":"Problem-based learning in the information age, new directions for teaching and learning"},{"key":"ijcee.2012040103-17","doi-asserted-by":"publisher","DOI":"10.1002\/j.2168-9830.2004.tb00809.x"},{"key":"ijcee.2012040103-18","doi-asserted-by":"publisher","DOI":"10.1002\/j.2168-9830.2006.tb00884.x"},{"key":"ijcee.2012040103-19","unstructured":"Schneier, B. (1999). Attack trees. Dr. Dobb\u2019s Journal. Retrieved from http:\/\/www.schneier.com\/paper-attacktrees-ddj-ft.html"},{"key":"ijcee.2012040103-20","author":"E.Seymour","year":"1997","journal-title":"Talking about leaving: Why undergraduates leave science"}],"container-title":["International Journal of Cyber Ethics in Education"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=74787","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T18:58:39Z","timestamp":1654109919000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcee.2012040103"}},"subtitle":["The Case of Computer Security Course"],"short-title":[],"issued":{"date-parts":[[2012,4,1]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcee.2012040103","relation":{},"ISSN":["2155-6903","2155-6911"],"issn-type":[{"value":"2155-6903","type":"print"},{"value":"2155-6911","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,4,1]]}}}