Show simple item record

dc.contributor.authorKuzminykh, I
dc.contributor.authorGhita, B
dc.contributor.authorXiao, H
dc.contributor.authorYevdokymenko, M
dc.contributor.authorYeremenko, O
dc.date.accessioned2022-11-07T11:54:33Z
dc.date.available2022-11-07T11:54:33Z
dc.date.issued2021-11-22
dc.identifier.isbn9781665428149
dc.identifier.urihttp://hdl.handle.net/10026.1/19870
dc.description.abstract

One of the main challenges encountered in the learning process is determining the content and concepts that present challenges for students, defined by the literature as troublesome knowledge. This paper focuses on exploring the potential threshold concept in the context of cyber security programmes delivered in higher education institutions. The analysis is done using a combination of academic view, collected through CoRe matrix questionnaires, and student perspective, gathered through surveys during the learning process of several cryptography courses. Following the aggregation of the two data sources, the study identifies eight troublesome knowledge areas within the observed courses, of which two satisfied the requirements for being a threshold concept.

dc.format.extent26-30
dc.language.isoen
dc.publisherIEEE
dc.subjecttroublesome knowledge
dc.subjectthreshold concept
dc.subjectcyber security
dc.subjectCoRe
dc.subjectactive learning
dc.titleInvestigating Threshold Concept and Troublesome Knowledge in Cyber Security
dc.typeconference
dc.typeConference Proceeding
plymouth.author-urlhttps://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000765760500005&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=11bb513d99f797142bcfeffcc58ea008
plymouth.date-start2021-11-22
plymouth.date-finish2021-11-25
plymouth.volume00
plymouth.conference-name2021 1st Conference on Online Teaching for Mobile Education (OT4ME)
plymouth.publication-statusPublished
plymouth.journal2021 1st Conference on Online Teaching for Mobile Education (OT4ME)
dc.identifier.doi10.1109/ot4me53559.2021.9638889
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.1109/ot4me53559.2021.9638889
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.typeConference Paper/Proceeding/Abstract


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV