Tutkimuksen kuvaus Research information

Kurssit/Courses Digitaaliset yleistaidot: Kyberturvallisuuden perusteet Kyberturvallisuus I Cyber Security I Cyber Security II Cryptography Engineering I Cryptography Engineering II

Capture the Flags (un)usual Monday morning CTF Dream vacation CTF

COMP.SEC.210 Cryptography Engineering II

This research investigates how studying affects cybersecurity knowledge, skills, interests, attitudes, and behavior, as well as confidence in one's own cybersecurity skills.

In addition, we examine how these variables are connected to academic success in the course Cryptography Engineering II. We also compare how different teaching methods affect the results.

Instructions

Participate by filling in the Pre-course-survey before starting the course. After completing the course, fill in the Post-course-survey.

If you have already started the course, but would still like to participate, you can only fill in the Post-course-survey. In such a case a comparison would not be meaningful, but you still get an opportunity for feedback and evaluation. This may reveal to you various effects the course had on your learning.

The Pre-course-survey takes about 30 min.

The Post-course-survey takes about 35 min. The Post-course-survey also collects feedback about the course, i.e. you can evaluate, for example, how the different teaching materials and teaching methods affected your interest in cybersecurity, how important the different teaching methods were for your learning, and how satisfied you were with the teaching methods and materials in general.

Survey links

Surveys are in Tampere university LimeSurvey.

The Pre-course-survey

The Post-course-survey

Research information

Privacy notice

Background

Currently, there is a global shortage of cyber security experts. Companies and society need a wide variety of cybersecurity skills, but current education cannot meet the need. Too few skilled people graduate, and sometimes the skills are not sufficient or do not meet the need. Therefore, to develop cybersecurity education, we need knowledge about how cybersecurity education affects students.

Purpose

This research investigates how studying affects the students' cybersecurity knowledge, skills, interests, attitudes, and behavior, as well as confidence in one's own cybersecurity skills.

In addition, we examine how these variables are connected to students' academic success in the course Cryptography Engineering II. We also compare how different teaching methods affect the results.

Benefits

By participating in this research, you will contribute to the development of cyber security education. The survey questions will help you better assess your cybersecurity skills and track their development throughout the course. In addition, you will get a clearer picture of which aspects of cybersecurity you are most interested in and which you think are not so important.

Participation

Participation from all students is crucial. We need responses from everyone, irrespective of your interest in the course or the grade you're aiming for!

Data confidentiality, processing, and storage

Participation in this research is voluntary. As background information, we collect gender, field of study, phase of studies, additional information about studies, and previously completed education. No sensitive personal data is collected. Performance data is collected from course Moodle. For analysis, pseudonymized pre- and post-survey responses, performance data and reports are combined. Personal information is used as background variables in statistical analysis. Your pre- and post-survey responses and performance data are connected by using a code that you receive for course exercises.

Data collected from the surveys are only used for research purposes and cybersecurity teaching development. You can stop answering at any time and you can also request the deletion of data you have already provided.

Research duration: 2022-2026

Personal data processing period: Until planned publications have been published and one year after the last publication.

The research material is processed according to Fair Data principles. After the research, data is opened and stored in the IDA - Research Data Storage Service. Opening data gives other researchers access to data, and they can, for example, repeat the analysis of data. In addition, opening the research data enables the reuse of the collected material as part of another research.