Napredna pretraga

Pregled bibliografske jedinice broj: 1003249

Computer-based Methods for Assessing Information Security Competencies


Deljkić, Žad; Pale, Predrag; Petrović, Juraj
Computer-based Methods for Assessing Information Security Competencies // MIPRO, 2019 Proceedings of the 42nd International Convention / Skala, Karolj (ur.).
Rijeka: GRAFIK, 2019. str. 1697-1702 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni)


Naslov
Computer-based Methods for Assessing Information Security Competencies

Autori
Deljkić, Žad ; Pale, Predrag ; Petrović, Juraj

Vrsta, podvrsta i kategorija rada
Radovi u zbornicima skupova, cjeloviti rad (in extenso), znanstveni

Izvornik
MIPRO, 2019 Proceedings of the 42nd International Convention / Skala, Karolj - Rijeka : GRAFIK, 2019, 1697-1702

Skup
42nd International Convention for Information and Communication Technology, Electronics and Microelectronics - MIPRO

Mjesto i datum
20.05.2019., 24.05.2019

Vrsta sudjelovanja
Predavanje

Vrsta recenzije
Međunarodna recenzija

Ključne riječi
computer based assessment ; formative assessment ; procedural knowledge ; security education ; information security ; cybersecurity ; security ; cyber range ; cyber exercise ; cyber defense exercise ; security competitons ; capture-the-flag ; capture the flag ; CTF ; virtual learning environment ; simulation ; scalable assessment ; automatic assessment ; automatic problem generation ; automatic scoring ; gamification ; security mindset ; adverserial thinking

Sažetak
With the growing importance of information security and cybersecurity, there is a widely recognized need for more security experts and a higher level of security education among all members of society. Effective methods for assessing information security competencies are a necessary prerequisite for developing, evaluating and improving security education. Procedural knowledge is a key part of information security competencies. In the context of information security, assessment methods such as written exams are often inadequate for assessing procedural knowledge, because with such methods, the person being assessed must explain what they would do in a certain situation instead of actually doing it. On the other hand, computer-based assessment methods can place a person in an authentic environment where he can directly react to a simulated situation and apply his knowledge. In the information security domain, such computer-based methods are therefore a natural solution for a direct assessment of procedural knowledge. In this paper, a list of requirements for evaluating assessment methods of information security competencies is proposed. These requirements are primarily focused on delivering an assessment that is both effective and feasible for use in education. Existing assessment methods are surveyed through the lens of these requirements.

Izvorni jezik
Engleski

Znanstvena područja
Računarstvo



POVEZANOST RADA


Ustanove
Fakultet elektrotehnike i računarstva, Zagreb

Profili:

Avatar Url Predrag Pale (autor)

Avatar Url Juraj Petrović (autor)

Citiraj ovu publikaciju

Deljkić, Žad; Pale, Predrag; Petrović, Juraj
Computer-based Methods for Assessing Information Security Competencies // MIPRO, 2019 Proceedings of the 42nd International Convention / Skala, Karolj (ur.).
Rijeka: GRAFIK, 2019. str. 1697-1702 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni)
Deljkić, Ž., Pale, P. & Petrović, J. (2019) Computer-based Methods for Assessing Information Security Competencies. U: Skala, K. (ur.)MIPRO, 2019 Proceedings of the 42nd International Convention.
@article{article, editor = {Skala, K.}, year = {2019}, pages = {1697-1702}, keywords = {computer based assessment, formative assessment, procedural knowledge, security education, information security, cybersecurity, security, cyber range, cyber exercise, cyber defense exercise, security competitons, capture-the-flag, capture the flag, CTF, virtual learning environment, simulation, scalable assessment, automatic assessment, automatic problem generation, automatic scoring, gamification, security mindset, adverserial thinking}, title = {Computer-based Methods for Assessing Information Security Competencies}, keyword = {computer based assessment, formative assessment, procedural knowledge, security education, information security, cybersecurity, security, cyber range, cyber exercise, cyber defense exercise, security competitons, capture-the-flag, capture the flag, CTF, virtual learning environment, simulation, scalable assessment, automatic assessment, automatic problem generation, automatic scoring, gamification, security mindset, adverserial thinking}, publisher = {GRAFIK}, publisherplace = {20.05.2019.} }