Case-based learning: An instructional model to incorporate information security topcis in multidiciplinary courses at the University of Nicosia

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The field of information security (IS) has long been characterized by the challenge of approaching it in a systematic manner as it constantly evolves. Academic institutions offer specialized courses on security, however it is important to have students exposed to the basic security practices regardless of their field of interest. Thus the topic of IS as such is could be, in part, integrated into various multidisciplinary courses, where educators must find a common learning ground to motivate and encourage students, coming from different specializations, to: recognize relationships between concepts of IS comprehended, underline the structure of what is being learned and to show their understanding. The authors in this paper initially present an overview of the case-based learning theory, and proceed with focusing on the lecture's teaching/learning development and delivery material for the undergraduate course MIS 151-Business Software Applications at the University of Nicosia. The results of this case study will offer indications on how to design a case based learning environment in the area of IS or any other course that could be taught through cases.

Original languageEnglish
Title of host publication2011 IEEE Global Engineering Education Conference, EDUCON 2011
Pages466-469
Number of pages4
DOIs
Publication statusPublished - 2011
Event2011 IEEE Global Engineering Education Conference, EDUCON 2011 - Amman, Jordan
Duration: 4 Apr 20116 Apr 2011

Other

Other2011 IEEE Global Engineering Education Conference, EDUCON 2011
Country/TerritoryJordan
CityAmman
Period4/04/116/04/11

Keywords

  • inductive methods
  • information security
  • problem-based learning
  • student-centered approach

Fingerprint

Dive into the research topics of 'Case-based learning: An instructional model to incorporate information security topcis in multidiciplinary courses at the University of Nicosia'. Together they form a unique fingerprint.

Cite this