Editorial Notes
NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the ICEMIS 2020Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM's investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.
ABSTRACT
The lack of cryptographic knowledge is one factor contributing to the cybersecurity skills gap. Cryptography is the core of the research in data security and a fundamental component in information assurance yet complex topic, with its purpose to conceal and authenticate information. Hence, teaching cryptography-based security protocols in an effective and engaging manner is a challenging problem throughout international HE sectors. With explanations usually based around mathematical notations, it can be a daunting and difficult subject for many students. This point is emphasized by the consistently lower marks achieved, in comparison to other course modules. To combat this, we propose the CYPHER platform, which delivers a motivating and engaging practical element to teaching and learning popular cryptographic protocols. It customizes a real-world scenarios that are illustrated by animation videos to depict and simplify a number of well-known cryptographic protocols. CYPHER provides an interactive learning experience, allowing the breakdown of complex topics to a level understood by each student. By providing assessment gamification, the delivered knowledge will be assessed in a fun way by playing a game to pass a number of stages and measure the level of understanding. The analysis of the evaluations' results showed that over 88% of the students surveyed had found the CYPHER platform increased the overall speed of understanding.
- E. Schaefer, "Devising a Better Way to Teach and Learn the Advanced Encryption Standard." [Online]. Available: math.scu.edu/~eschaefe/getfile.pdf%0D.Google Scholar
- C. Easttom, "Cryptography -- How does it impact cyber security and why you need to know more?," 2015. [Online]. Available: https://www.brighttalk.com/webcast/10573/144651.Google Scholar
- GCHQ, "Cryptoy - explore the fascinating world of cryptography."Google Scholar
- W. Yurcik and D. Doss, "Different approaches in the teaching of information systems security," in Proceedings of the Information Systems Education Conference, 2001.Google Scholar
- CrypTool, "CrypTool 2 -- CrypTool Portal." [Online]. Available: https://www.cryptool.org/en/cryptool2.Google Scholar
- Derryberry, "Serious games: online games for learning.".Google Scholar
- T. Susi, M. Johannesson, and P. Backlund, "Serious Games - An Overview," 2017 IEEE 8th Annu. Ubiquitous Comput. Electron. Mob. Commun. Conf. UEMCON 2017, pp. 1--24, 2007.Google Scholar
- D. R. Michael and S. Chen, "Serious games [electronic resource]: games that educate, train, and inform." p. 287, 2006.Google Scholar
- Simon Egenfeldt - Nielsen, "Overview of research on the edducational use of video games," Digit. Kompet., vol. 1, no. 3, pp. 184--213, 2006.Google Scholar
- K. Corti, "Games-based Learning; a serious business application," Inf. PixelLearning, pp. 1--20, 2006.Google Scholar
- C. Jordan, M. Knapp, D. Mitchell, M. Claypool, and K. Fisler, "CounterMeasures: A game for teaching computer security," in Annual Workshop on Network and Systems Support for Games, p. 6, 2011.Google Scholar
- C. Irvine, M. Thompson, and K. Allen, "Active Learning with the CyberCIEGE Video Game," Fed. Inf. Syst. Secur. Educ. Assoc. Conf., pp. 1--10, 2005.Google Scholar
- E. Adams and A. Rollings, Fundamentals of Game Design. Prentice Hall, 2006.Google ScholarDigital Library
- W. A. Labuschagne, I. Burke, N. Veerasamy, and M. M. Eloff, "Design of cyber security awareness game utilizing a social media framework," in 2011 Information Security for South Africa - Proceedings of the ISSA 2011 Conference, 2011.Google Scholar
- D. Schweitzer and L. Baird, "The design and use of interactive visualization applets for teaching ciphers," in Proceedings of the 2006 IEEE Workshop on Information Assurance, 2006, vol., no. June, pp. 69--75, 2006.Google Scholar
- A. McAndrew, "Teaching cryptography with open-source software," ACM SIGCSE Bull., vol. 40, no. 1, p. 325, 2008.Google ScholarDigital Library
- T. Yi and Z. Quan, "Teaching cryptography-based software developing with open-source software," in Proceedings of 2009 4th International Conference on Computer Science and Education, ICCSE 2009, pp. 1604--1608, 2009.Google Scholar
- S. Adamović, I. Branović, D. Živković, V. Tomašević, and M. Milosavljević, "Teaching interactive cryptography: the case for CrypTool," IEEE Conf. ICEST, vol. 1, no. 44006, pp. 3--5, 2011.Google Scholar
- J. Tao, J. Ma, J. Mayo, and C.-K. Shene, "DESvisual: A VISUALIZATION TOOL FOR THE DES CIPHER," J. Comput. Sci. Coll., vol. 27, no. 1, pp. 81--89, 2011.Google ScholarDigital Library
- J. Tao, J. Ma, and M. Keranen, "ECvisual: a visualization tool for elliptic curve based ciphers," in Proceedings of the 43rd ACM technical symposium on Computer Science Education, pp. 571--576, 2012.Google Scholar
- S. M. Gaffer and D. M. Alghazzawi, "Using Virtual Security Lab in Teaching Cryptography," Int. J. Mod. Educ. Comput. Sci., vol. 4, no. 1, pp. 26--32, 2012.Google ScholarCross Ref
- "SWEET." [Online]. Available: http://csis.pace.edu/~lchen/sweet/.Google Scholar
- Shadi Aljawarneh, Muneer Bani Yassein, and We'am Adel Talafha. 2018. A multithreaded programming approach for multimedia big data: encryption system. Multimedia Tools Appl. 77, 9 (May 2018), 10997--11016. DOI:https://doi.org/10.1007/s11042-017-4873-9Google ScholarDigital Library
- Vangipuram Radhakrishna, Shadi A. Aljawarneh, Puligadda Veereswara Kumar, and Kim-Kwang Raymond Choo. 2018. A novel fuzzy gaussian-based dissimilarity measure for discovering similarity temporal association patterns. Soft Comput. 22, 6 (March 2018), 1903--1919. DOI:https://doi.org/10.1007/s00500-016-2445-yGoogle ScholarDigital Library
- Shadi Aljawarneh, Shadi Aljawarneh, and Manisha Malhotra. 2017. Critical Research on Scalability and Security Issues in Virtual Cloud Environments (1st. ed.). IGI Global, USA.Google Scholar
- Shadi Aljawarneh, Muneer Bani Yassein, and We'am Adel Talafha. 2017. A resource-efficient encryption algorithm for multimedia big data. Multimedia Tools Appl. 76, 21 (November 2017), 22703--22724. DOI:https://doi.org/10.1007/s11042-016-4333-yGoogle ScholarDigital Library
- Shadi A. Aljawarneh, Raja A. Moftah, and Abdelsalam M. Maatuk. 2016. Investigations of automatic methods for detecting the polymorphic worms signatures. Future Gener. Comput. Syst. 60, C (July 2016), 67--77. DOI:https://doi.org/10.1016/j.future.2016.01.020Google ScholarDigital Library
- Raja A. Moftah, Abdelsalam M. Maatuk, Peter Plasmann, and Shadi Aljawarneh. 2015. An Overview about the Polymorphic Worms Signatures. In Proceedings of the The International Conference on Engineering & MIS 2015 (ICEMIS '15). Association for Computing Machinery, New York, NY, USA, Article 29, 1--4. DOI:https://doi.org/10.1145/2832987.2833031Google ScholarDigital Library
- Lizcano, D., Lara, J.A., White, B. and Aljawarneh, S., 2020. Blockchain-based approach to create a model of trust in open and ubiquitous higher education. Journal of Computing in Higher Education, 32(1), pp. 109--134.Google Scholar
- Sohil F. Alshareef, Abdelsalam M. Maatuk and Tawfig M. Abdelaziz. 2018. Aspect-Oriented Requirements Engineering: Approaches and Techniques. In DATA '18, October 1-2, 2018, Spain. ACM. https://doi.org/10.1145/3279996.3280009Google ScholarDigital Library
Recommendations
Learning by teaching SimStudent: an initial classroom baseline study comparing with cognitive tutor
AIED'11: Proceedings of the 15th international conference on Artificial intelligence in educationThis paper describes an application of a machine-learning agent, SimStudent, as a teachable peer learner that allows a student to learn by teaching. SimStudent has been integrated into APLUS (Artificial Peer Learning environment Using SimStudent), an on-...
Embedding interactive whiteboards in teaching and learning: The process of change in pedagogic practice
This paper draws on research carried out for the UK government during 2004---2006 to evaluate the impact of interactive whiteboards for teaching and learning in primary schools in England. Multilevel modelling showed positive gains in literacy, ...
Comments