Early Post-Secondary Student Performance of Adversarial Thinking

Nick Young, S. Krishnamurthi
{"title":"Early Post-Secondary Student Performance of Adversarial Thinking","authors":"Nick Young, S. Krishnamurthi","doi":"10.1145/3446871.3469743","DOIUrl":null,"url":null,"abstract":"Motivation. “Adversarial thinking” (at) is viewed as a central idea in cybersecurity. We believe a similar idea carries over into other critical areas as well, such as understanding the perils of social networks and machine learning. Objectives. What kinds of at can we expect of early post-secondary computing students? In particular, can they meaningfully analyze computing systems that are well beyond their technical ken? Is their analysis limited to only a social or only a technical space? Method. In an introductory post-secondary course, we study student responses to questions designed to exercise at, broadly defined. To do this we develop a rubric that provides insight into desirable content. Results. We find that these students are fairly strong at at. They are regularly able to adopt an adversarial or empathetic viewpoint and analyze quite sophisticated systems. Most of all, they can meaningfully do so (a) outside an explicit cybersecurity context, (b) even from an introductory level, and (c) well before they understand well the key technologies under evaluation. On the other hand, we also find several instances where students do not explore systems as much as they could, and fail to reference other material they know, which could be evidence of lack of transfer. In addition, our rubric would benefit from refinement that would enable a more sophisticated analysis of student responses. Discussion. Our work provides a baseline evaluation of what we can expect from students. It suggests that at can be introduced early in the curriculum, and in contexts outside computer security.","PeriodicalId":309835,"journal":{"name":"Proceedings of the 17th ACM Conference on International Computing Education Research","volume":"103 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 17th ACM Conference on International Computing Education Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3446871.3469743","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

Motivation. “Adversarial thinking” (at) is viewed as a central idea in cybersecurity. We believe a similar idea carries over into other critical areas as well, such as understanding the perils of social networks and machine learning. Objectives. What kinds of at can we expect of early post-secondary computing students? In particular, can they meaningfully analyze computing systems that are well beyond their technical ken? Is their analysis limited to only a social or only a technical space? Method. In an introductory post-secondary course, we study student responses to questions designed to exercise at, broadly defined. To do this we develop a rubric that provides insight into desirable content. Results. We find that these students are fairly strong at at. They are regularly able to adopt an adversarial or empathetic viewpoint and analyze quite sophisticated systems. Most of all, they can meaningfully do so (a) outside an explicit cybersecurity context, (b) even from an introductory level, and (c) well before they understand well the key technologies under evaluation. On the other hand, we also find several instances where students do not explore systems as much as they could, and fail to reference other material they know, which could be evidence of lack of transfer. In addition, our rubric would benefit from refinement that would enable a more sophisticated analysis of student responses. Discussion. Our work provides a baseline evaluation of what we can expect from students. It suggests that at can be introduced early in the curriculum, and in contexts outside computer security.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
早期中学后学生对抗性思维的表现
动机。“对抗性思维”(at)被视为网络安全的核心思想。我们相信类似的想法也会延续到其他关键领域,比如理解社交网络和机器学习的危险。目标。我们可以期待初学计算机专业的学生有什么样的成就?特别是,他们是否能够有意义地分析远远超出其技术知识范围的计算系统?他们的分析仅仅局限于社会领域还是仅仅局限于技术领域?方法。在高等教育的入门课程中,我们研究学生对问题的回答,这些问题的设计是为了练习广义的能力。为了做到这一点,我们开发了一个标准,以提供对理想内容的洞察力。结果。我们发现这些学生在语文方面相当强。他们经常能够采取对抗或同情的观点,并分析相当复杂的系统。最重要的是,他们可以有意地这样做(a)在明确的网络安全背景之外,(b)甚至从入门级别开始,以及(c)在他们很好地理解所评估的关键技术之前。另一方面,我们也发现了一些例子,学生没有尽可能多地探索系统,也没有参考他们知道的其他材料,这可能是缺乏转移的证据。此外,我们的标题将受益于改进,从而能够对学生的反应进行更复杂的分析。讨论。我们的工作为我们对学生的期望提供了一个基线评估。它建议,at可以在课程的早期引入,并在计算机安全以外的环境中引入。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Exploring the Impact of Gender Bias on Pair Programming A Pedagogical Framework for Teaching Computer Programming: A Social Constructivist and Cognitive Load Theory Approach Computing Educational Activities Involving People Rather Than Things Appeal More to Women (Recruitment Perspective) Developing Empathy and Persistence through Professional Development in New to CSA Teachers Promoting Learning Transfer in Computer Science Education by Training Teachers to use Explicit Programming Strategies
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1