COMP.SEC.210 Cryptography Engineering II
This research investigates how studying affects cybersecurity knowledge, skills, interests, attitudes, and behavior, as well as confidence in one's own cybersecurity skills.
In addition, we examine how these variables are connected to academic success in the course Cryptography Engineering II. We also compare how different teaching methods affect the results.
Instructions
Participate by filling in the Pre-course-survey before starting the course. After completing the course, fill in the Post-course-survey.
If you have already started the course, but would still like to participate, you can only fill in the Post-course-survey. In such a case a comparison would not be meaningful, but you still get an opportunity for feedback and evaluation. This may reveal to you various effects the course had on your learning.
The Pre-course-survey takes about 30 min.
The Post-course-survey takes about 35 min. The Post-course-survey also collects feedback about the course, i.e. you can evaluate, for example, how the different teaching materials and teaching methods affected your interest in cybersecurity, how important the different teaching methods were for your learning, and how satisfied you were with the teaching methods and materials in general.
Survey links
Surveys are in Tampere university LimeSurvey.
Research information
Background
Currently, there is a global shortage of cyber security experts. Companies and society need a wide variety of cybersecurity skills, but current education cannot meet the need. Too few skilled people graduate, and sometimes the skills are not sufficient or do not meet the need. Therefore, to develop cybersecurity education, we need knowledge about how cybersecurity education affects students.
Purpose
This research investigates how studying affects the students' cybersecurity knowledge, skills, interests, attitudes, and behavior, as well as confidence in one's own cybersecurity skills.
In addition, we examine how these variables are connected to students' academic success in the course Cryptography Engineering II. We also compare how different teaching methods affect the results.
Benefits
By participating in this research, you will contribute to the development of cyber security education. The survey questions will help you better assess your cybersecurity skills and track their development throughout the course. In addition, you will get a clearer picture of which aspects of cybersecurity you are most interested in and which you think are not so important.
Participation
Participation from all students is crucial. We need responses from everyone, irrespective of your interest in the course or the grade you're aiming for!
Data confidentiality, processing, and storage
Participation in this research is voluntary. As background information, we collect gender, field of study, phase of studies, additional information about studies, and previously completed education. No sensitive personal data is collected. Performance data is collected from course Moodle. For analysis, pseudonymized pre- and post-survey responses, performance data and reports are combined. Personal information is used as background variables in statistical analysis. Your pre- and post-survey responses and performance data are connected by using a code that you receive for course exercises.
Data collected from the surveys are only used for research purposes and cybersecurity teaching development. You can stop answering at any time and you can also request the deletion of data you have already provided.
Research duration: 2022-2026
Personal data processing period: Until planned publications have been published and one year after the last publication.
The research material is processed according to Fair Data principles. After the research, data is opened and stored in the IDA - Research Data Storage Service. Opening data gives other researchers access to data, and they can, for example, repeat the analysis of data. In addition, opening the research data enables the reuse of the collected material as part of another research.