Share Email Print

Proceedings Paper

Applications of schema theory in information security teaching
Author(s): Chunyan Qiu; Wei Zhao
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

Information security knowledge is more and more important to students in universities of finance and economics. However, mastering the skill of information security is not easy to them. Schema theory is applied into information security teaching to help students improve their skills. The teaching result shows that there is a significant difference in final exam and practice exam between the proposed model and a regular teaching model.

Paper Details

Date Published: 8 June 2012
PDF: 6 pages
Proc. SPIE 8334, Fourth International Conference on Digital Image Processing (ICDIP 2012), 83342S (8 June 2012); doi: 10.1117/12.956455
Show Author Affiliations
Chunyan Qiu, Jilin Univ. of Finance and Economics (China)
Wei Zhao, Northeast Normal Univ. (China)

Published in SPIE Proceedings Vol. 8334:
Fourth International Conference on Digital Image Processing (ICDIP 2012)
Mohamed Othman; Sukumar Senthilkumar; Xie Yi, Editor(s)

© SPIE. Terms of Use
Back to Top