Pretražite po imenu i prezimenu autora, mentora, urednika, prevoditelja

Napredna pretraga

Pregled bibliografske jedinice broj: 1003249

Computer-based Methods for Assessing Information Security Competencies


Deljkić, Žad; Pale, Predrag; Petrović, Juraj
Computer-based Methods for Assessing Information Security Competencies // MIPRO, 2019 Proceedings of the 42nd International Convention / Skala, Karolj (ur.).
Rijeka, 2019. str. 1697-1702 doi:10.23919/MIPRO.2019.8757201 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni)


CROSBI ID: 1003249 Za ispravke kontaktirajte CROSBI podršku putem web obrasca

Naslov
Computer-based Methods for Assessing Information Security Competencies

Autori
Deljkić, Žad ; Pale, Predrag ; Petrović, Juraj

Vrsta, podvrsta i kategorija rada
Radovi u zbornicima skupova, cjeloviti rad (in extenso), znanstveni

Izvornik
MIPRO, 2019 Proceedings of the 42nd International Convention / Skala, Karolj - Rijeka, 2019, 1697-1702

Skup
42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2019)

Mjesto i datum
Opatija, Hrvatska, 20.05.2019. - 24.05.2019

Vrsta sudjelovanja
Predavanje

Vrsta recenzije
Međunarodna recenzija

Ključne riječi
computer based assessment ; formative assessment ; procedural knowledge ; security education ; information security ; cybersecurity ; security ; cyber range ; cyber exercise ; cyber defense exercise ; security competitons ; capture-the-flag ; capture the flag ; CTF ; virtual learning environment ; simulation ; scalable assessment ; automatic assessment ; automatic problem generation ; automatic scoring ; gamification ; security mindset ; adverserial thinking

Sažetak
With the growing importance of information security and cybersecurity, there is a widely recognized need for more security experts and a higher level of security education among all members of society. Effective methods for assessing information security competencies are a necessary prerequisite for developing, evaluating and improving security education. Procedural knowledge is a key part of information security competencies. In the context of information security, assessment methods such as written exams are often inadequate for assessing procedural knowledge, because with such methods, the person being assessed must explain what they would do in a certain situation instead of actually doing it. On the other hand, computer-based assessment methods can place a person in an authentic environment where he can directly react to a simulated situation and apply his knowledge. In the information security domain, such computer-based methods are therefore a natural solution for a direct assessment of procedural knowledge. In this paper, a list of requirements for evaluating assessment methods of information security competencies is proposed. These requirements are primarily focused on delivering an assessment that is both effective and feasible for use in education. Existing assessment methods are surveyed through the lens of these requirements.

Izvorni jezik
Engleski

Znanstvena područja
Računarstvo



POVEZANOST RADA


Ustanove:
Fakultet elektrotehnike i računarstva, Zagreb

Profili:

Avatar Url Predrag Pale (autor)

Avatar Url Juraj Petrović (autor)

Poveznice na cjeloviti tekst rada:

doi ieeexplore.ieee.org

Citiraj ovu publikaciju:

Deljkić, Žad; Pale, Predrag; Petrović, Juraj
Computer-based Methods for Assessing Information Security Competencies // MIPRO, 2019 Proceedings of the 42nd International Convention / Skala, Karolj (ur.).
Rijeka, 2019. str. 1697-1702 doi:10.23919/MIPRO.2019.8757201 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni)
Deljkić, Ž., Pale, P. & Petrović, J. (2019) Computer-based Methods for Assessing Information Security Competencies. U: Skala, K. (ur.)MIPRO, 2019 Proceedings of the 42nd International Convention doi:10.23919/MIPRO.2019.8757201.
@article{article, author = {Deljki\'{c}, \v{Z}ad and Pale, Predrag and Petrovi\'{c}, Juraj}, editor = {Skala, K.}, year = {2019}, pages = {1697-1702}, DOI = {10.23919/MIPRO.2019.8757201}, keywords = {computer based assessment, formative assessment, procedural knowledge, security education, information security, cybersecurity, security, cyber range, cyber exercise, cyber defense exercise, security competitons, capture-the-flag, capture the flag, CTF, virtual learning environment, simulation, scalable assessment, automatic assessment, automatic problem generation, automatic scoring, gamification, security mindset, adverserial thinking}, doi = {10.23919/MIPRO.2019.8757201}, title = {Computer-based Methods for Assessing Information Security Competencies}, keyword = {computer based assessment, formative assessment, procedural knowledge, security education, information security, cybersecurity, security, cyber range, cyber exercise, cyber defense exercise, security competitons, capture-the-flag, capture the flag, CTF, virtual learning environment, simulation, scalable assessment, automatic assessment, automatic problem generation, automatic scoring, gamification, security mindset, adverserial thinking}, publisherplace = {Opatija, Hrvatska} }
@article{article, author = {Deljki\'{c}, \v{Z}ad and Pale, Predrag and Petrovi\'{c}, Juraj}, editor = {Skala, K.}, year = {2019}, pages = {1697-1702}, DOI = {10.23919/MIPRO.2019.8757201}, keywords = {computer based assessment, formative assessment, procedural knowledge, security education, information security, cybersecurity, security, cyber range, cyber exercise, cyber defense exercise, security competitons, capture-the-flag, capture the flag, CTF, virtual learning environment, simulation, scalable assessment, automatic assessment, automatic problem generation, automatic scoring, gamification, security mindset, adverserial thinking}, doi = {10.23919/MIPRO.2019.8757201}, title = {Computer-based Methods for Assessing Information Security Competencies}, keyword = {computer based assessment, formative assessment, procedural knowledge, security education, information security, cybersecurity, security, cyber range, cyber exercise, cyber defense exercise, security competitons, capture-the-flag, capture the flag, CTF, virtual learning environment, simulation, scalable assessment, automatic assessment, automatic problem generation, automatic scoring, gamification, security mindset, adverserial thinking}, publisherplace = {Opatija, Hrvatska} }

Časopis indeksira:


  • Scopus


Citati:





    Contrast
    Increase Font
    Decrease Font
    Dyslexic Font