{"title":"评估知识和技能与替代评估途径的法医学","authors":"Joseph Maguire","doi":"10.1145/3498343.3498351","DOIUrl":null,"url":null,"abstract":"Designing assessment for courses in computer science which are interdisciplinary by nature can be challenging. Challenging in making them interdisciplinary but also relevant within computing science. This paper presents the design and delivery of such an assessment for postgraduates in digital forensics that utilises assessment choice. Student teams were allowed to create either a program which implemented steganography or a report on the feasibility of such a tool being used to exfiltrate data by a whistle-blower in a fictional company. This paper reports on student feedback of this approach and provides a discussion on the benefits and concerns of utilising such an approach.","PeriodicalId":135120,"journal":{"name":"Proceedings of 6th Conference on Computing Education Practice","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Assessing Knowledge and Skills in Forensics with Alternative Assessment Pathways\",\"authors\":\"Joseph Maguire\",\"doi\":\"10.1145/3498343.3498351\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Designing assessment for courses in computer science which are interdisciplinary by nature can be challenging. Challenging in making them interdisciplinary but also relevant within computing science. This paper presents the design and delivery of such an assessment for postgraduates in digital forensics that utilises assessment choice. Student teams were allowed to create either a program which implemented steganography or a report on the feasibility of such a tool being used to exfiltrate data by a whistle-blower in a fictional company. This paper reports on student feedback of this approach and provides a discussion on the benefits and concerns of utilising such an approach.\",\"PeriodicalId\":135120,\"journal\":{\"name\":\"Proceedings of 6th Conference on Computing Education Practice\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of 6th Conference on Computing Education Practice\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3498343.3498351\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of 6th Conference on Computing Education Practice","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3498343.3498351","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Assessing Knowledge and Skills in Forensics with Alternative Assessment Pathways
Designing assessment for courses in computer science which are interdisciplinary by nature can be challenging. Challenging in making them interdisciplinary but also relevant within computing science. This paper presents the design and delivery of such an assessment for postgraduates in digital forensics that utilises assessment choice. Student teams were allowed to create either a program which implemented steganography or a report on the feasibility of such a tool being used to exfiltrate data by a whistle-blower in a fictional company. This paper reports on student feedback of this approach and provides a discussion on the benefits and concerns of utilising such an approach.