Developing and Piloting a Quantitative Assessment Tool for Cybersecurity Courses

The rapid growth of the Internet over the past two decades has led to a proliferation of network-capable computing devices. This growth has occurred so rapidly that the academic pipeline is struggling to keep up with the demand for cybersecurity professionals capable of protecting the expanding infrastructure. Training a security-focused workforce has become a critical objective of government entities, businesses, and academic institutions. As educators respond to this growing demand, developing new curriculum and methodologies for training cybersecurity professionals, there has been little systematic effort to assess student outcomes from the variety of pedagogical approaches being used. This paper presents the second stage in our work to develop an assessment tool designed to measure student interest and self-efficacy in relation to cybersecurity. Such a tool will allow educators to detect changes in student outcomes and thus systematically improve pedagogical methods. Initial instrument development is based on a qualitative study of students enrolled in an introductory cybersecurity course. We piloted the survey during the Spring and Fall 2014 semesters, and present the results here along with discussions of our ongoing and future activities with this project.

[1]  Richard H. Austing,et al.  Curriculum '78: recommendations for the undergraduate program in computer science— a report of the ACM curriculum committee on computer science , 1979, CACM.

[2]  William Neugent Teaching computer security: A course outline , 1982, Comput. Secur..

[3]  Steven D. Brown,et al.  Self-efficacy in the prediction of academic performance and perceived career options. , 1986 .

[4]  Matt Bishop,et al.  Teaching Computer Security , 1993, SEC.

[5]  A. Bandura Perceived Self-Efficacy in Cognitive Development and Functioning , 1993, Educational Psychologist.

[6]  Nancy G. Boyd,et al.  The Influence of Self-Efficacy on the Development of Entrepreneurial Intentions and Actions , 1994 .

[7]  Mark S. Litwin,et al.  How to Measure Survey Reliability and Validity , 1995 .

[8]  R. Bogdan Qualitative research for education : an introduction to theory and methods / by Robert C. Bogdan and Sari Knopp Biklen , 1997 .

[9]  Susan Wiedenbeck,et al.  Development and Validation of Scores on a Computer Programming Self-Efficacy Scale and Group Analyses of Novice Programmer Self-Efficacy , 1998 .

[10]  A. Bandura,et al.  Self-efficacy beliefs as shapers of children's aspirations and career trajectories. , 2001, Child development.

[11]  Udo W. Pooch,et al.  Using an isolated network laboratory to teach advanced networks and security , 2001, SIGCSE '01.

[12]  S. Cassidy,et al.  Developing the Computer User Self-Efficacy (Cuse) Scale: Investigating the Relationship between Computer Self-Efficacy, Gender and Experience with Computers , 2002 .

[13]  S. Dika,et al.  Mathematics and Science Achievement: Effects of Motivation, Interest, and Academic Engagement , 2002 .

[14]  P. Freebody Qualitative Research in Education , 2003 .

[15]  Laurie Williams,et al.  Computer Science Attitude Survey , 2003 .

[16]  J. Willis Qualitative Research Methods in Education and Educational Technology. Research Methods for Educational Technology. , 2008 .

[17]  Melissa Dark,et al.  An exploration of the current state of information assurance education , 2010, SGCS.

[18]  Frank M. Pajares,et al.  Self-Efficacy Beliefs , 2010 .

[19]  Joseph Paul Cohen,et al.  Challenge Based Learning in Cybersecurity Education , 2011 .

[20]  K. Perreault,et al.  Research Design: Qualitative, Quantitative, and Mixed Methods Approaches , 2011 .

[21]  Ernest McDuffie,et al.  NICE: Creating a Cybersecurity Workforce and Aware Public , 2012, IEEE Security & Privacy.

[22]  Ronald C. Dodge,et al.  Cybersecurity Workforce Development Directions , 2012, HAISA.

[23]  Allison Elliott Tew,et al.  Becoming experts: measuring attitude development in introductory computer science , 2013, SIGCSE '13.

[24]  Claretha Hughes Self-Efficacy Beliefs , 2014 .

[25]  Eugene Y. Vasserman,et al.  A Longitudinal Study of Students in an Introductory Cybersecurity Course , 2014 .

[26]  Wm. Arthur Conklin,et al.  Re-engineering Cybersecurity Education in the US: An Analysis of the Critical Factors , 2014, 2014 47th Hawaii International Conference on System Sciences.