Engaging and Active Security Education (EASE) workshop

Security is an increasingly important topic within higher education, but it is often challenging to identify effective learning and teaching practices that actively involve all students.

The Engaging and Active Security Education (EASE) workshop at the UK ACM SIGCSE Computing Education Practice conference aims to support cyber security educators in exchanging practice as well as devising new practices. The objectives of the EASE workshop are:

  • to expand the community of cyber security educators
  • to provide an avenue for cyber security educators to exchange learning and teaching practice
  • to afford opportunities for cyber security educators to collaborate and form novel learning and teaching practices.

The EASE workshop is seeking practices from the wider community that can be presented at the workshop and can be subsequently accessed on the workshop website.

Programme

Time Speaker Topic
1.05 pm Start
1pm to 1.15pm

Joseph Maguire
University of Glasgow

Rosanne English
University of Strathclyde

Welcome
1.15pm to 1.30pm

Tom Pricket
Northumbria University.

Alastair Irons
Sunderland University

James Davenport
University of Bath

Paul Hanna
University of Ulster

1.30pm to 1.45pm

Karen Renaud
University of Strathclyde

1.45pm to 2.00pm

Adriana Wilde
University of Winchester

2.00pm to 2.15pm

Coffee

2.15pm to 2.30pm

James Davenport
University of Bath

2.30pm to 2.45pm

Rosanne English
University of Strathclyde

Joseph Maguire
University of Glasgow

2.45pm to 3pm

Closing remarks and next steps.

Practice

The EASE workshop seeks effective and engaging practices for cyber security education in higher education.

The expectation is that presenters will spend 10 minutes presenting their practice and 5 minutes answering questions over Zoom. The important questions that presenters have to consider are:

  • What is the rationale?

    The motivation for the design and delivery of the learning and teaching practice and how it specifically targets cyber security education.

  • What is the specific practice?

    The detail of what is required for an individual to delivery the practice and specifically how they should deliver it.

  • When does it work best?

    The specific context for when the practice is optimal, e.g. optimal for very large classes, small seminar classes, remote-delivery or in-person etc.

  • When does it not work?

    The constraints that would hamper the success of the practice, e.g. not suitable for remote delivery.

Educators should use the submission form to submit their practice for consideration for presentation at the worshop and for presentation on the website.

Submission form

Use the form before to submit your cyber security education teaching practice for consideration.

If you encounter any problems, just contact the workshop organisers Joseph Maguire and Rosanne English.

(Powered by Un-static Forms)