Best practices to design hands-on activities for virtual computer laboratories

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

In this paper, we introduce a collaborative virtual computer laboratory and discuss best strategies to foster student learning using virtual computers, particularly in information security which requires substantial hands-on experimentation to master the subject matter. Unfortunately, information security topics are challenging to teach in traditional computer laboratories mainly due to restrictive information technology policies. In recent decades, virtual computing has become a promising solution to address the challenges of providing students with hands-on learning experiences in information security. While the literature mainly focuses on technical aspects of virtual computer laboratories and provides ample examples about how they can be used in information security courses, there is a lack of pedagogical studies. We introduce a framework based on Kolb's Experiential Learning Cycle to design activities for virtual computer laboratories. We provide empirical evidence that if virtual computer activities are designed and conducted according to this framework, student learning can be enhanced even further.

Original languageEnglish (US)
Title of host publicationISEC 2013 - 3rd IEEE Integrated STEM Education Conference
DOIs
StatePublished - Jul 18 2013
Event3rd IEEE Integrated STEM Education Conference, ISEC 2013 - Princeton, NJ, United States
Duration: Mar 9 2013Mar 9 2013

Publication series

NameISEC 2013 - 3rd IEEE Integrated STEM Education Conference

Other

Other3rd IEEE Integrated STEM Education Conference, ISEC 2013
CountryUnited States
CityPrinceton, NJ
Period3/9/133/9/13

All Science Journal Classification (ASJC) codes

  • Automotive Engineering

Fingerprint Dive into the research topics of 'Best practices to design hands-on activities for virtual computer laboratories'. Together they form a unique fingerprint.

Cite this