Return to book
Review this book
About the author
Introduction
1.
Introduction
1.1.
Two Themes
1.2.
1. Journalists have a real need for practical information-security skills that is not currently being met.
1.3.
Applied Takeaway: Scale Expectations to Reflect the Resources Available
1.4.
2. Demand for information-security coursework was matched by the time and effort committed by students.
1.5.
Applied Takeaway: Build It and They Will Come
2.
Methodology
2.1.
Design Principles
3.
Workshop Structure
3.1.
Series structure
3.2.
Session structure
4.
Evaluation Methods
4.1.
Quantitative Evaluation
4.2.
Qualitative Evaluation
5.
Attendance and Outcomes
5.1.
Drop-in Workshop Attendance
5.2.
Cumulative Workshop Attendance
5.3.
Differences between Drop-in and Cumulative Sessions
5.4.
Results
5.5.
Challenges and Opportunities
6.
Conclusions andRecommendations
6.1.
Commit to sustained teaching and follow-up.
6.2.
Repetition and review are key to retention.
6.3.
Make information-security a core competency.
6.4.
Educate and leverage support staff.
6.5.
Future potential.
7.
Appendix A
7.1.
Curriculum
8.
Endnotes
Powered by
GitBook
A
A
Serif
Sans
White
Sepia
Night
Twitter
Google
Facebook
Weibo
Instapaper
Learning Security
Two Themes