Early Post-Secondary Student Performance of Adversarial Thinking

Nick Young, S. Krishnamurthi
{"title":"Early Post-Secondary Student Performance of Adversarial Thinking","authors":"Nick Young, S. Krishnamurthi","doi":"10.1145/3446871.3469743","DOIUrl":null,"url":null,"abstract":"Motivation. “Adversarial thinking” (at) is viewed as a central idea in cybersecurity. We believe a similar idea carries over into other critical areas as well, such as understanding the perils of social networks and machine learning. Objectives. What kinds of at can we expect of early post-secondary computing students? In particular, can they meaningfully analyze computing systems that are well beyond their technical ken? Is their analysis limited to only a social or only a technical space? Method. In an introductory post-secondary course, we study student responses to questions designed to exercise at, broadly defined. To do this we develop a rubric that provides insight into desirable content. Results. We find that these students are fairly strong at at. They are regularly able to adopt an adversarial or empathetic viewpoint and analyze quite sophisticated systems. Most of all, they can meaningfully do so (a) outside an explicit cybersecurity context, (b) even from an introductory level, and (c) well before they understand well the key technologies under evaluation. On the other hand, we also find several instances where students do not explore systems as much as they could, and fail to reference other material they know, which could be evidence of lack of transfer. In addition, our rubric would benefit from refinement that would enable a more sophisticated analysis of student responses. Discussion. Our work provides a baseline evaluation of what we can expect from students. It suggests that at can be introduced early in the curriculum, and in contexts outside computer security.","PeriodicalId":309835,"journal":{"name":"Proceedings of the 17th ACM Conference on International Computing Education Research","volume":"103 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 17th ACM Conference on International Computing Education Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3446871.3469743","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

Motivation. “Adversarial thinking” (at) is viewed as a central idea in cybersecurity. We believe a similar idea carries over into other critical areas as well, such as understanding the perils of social networks and machine learning. Objectives. What kinds of at can we expect of early post-secondary computing students? In particular, can they meaningfully analyze computing systems that are well beyond their technical ken? Is their analysis limited to only a social or only a technical space? Method. In an introductory post-secondary course, we study student responses to questions designed to exercise at, broadly defined. To do this we develop a rubric that provides insight into desirable content. Results. We find that these students are fairly strong at at. They are regularly able to adopt an adversarial or empathetic viewpoint and analyze quite sophisticated systems. Most of all, they can meaningfully do so (a) outside an explicit cybersecurity context, (b) even from an introductory level, and (c) well before they understand well the key technologies under evaluation. On the other hand, we also find several instances where students do not explore systems as much as they could, and fail to reference other material they know, which could be evidence of lack of transfer. In addition, our rubric would benefit from refinement that would enable a more sophisticated analysis of student responses. Discussion. Our work provides a baseline evaluation of what we can expect from students. It suggests that at can be introduced early in the curriculum, and in contexts outside computer security.
早期中学后学生对抗性思维的表现
动机。“对抗性思维”(at)被视为网络安全的核心思想。我们相信类似的想法也会延续到其他关键领域,比如理解社交网络和机器学习的危险。目标。我们可以期待初学计算机专业的学生有什么样的成就?特别是,他们是否能够有意义地分析远远超出其技术知识范围的计算系统?他们的分析仅仅局限于社会领域还是仅仅局限于技术领域?方法。在高等教育的入门课程中,我们研究学生对问题的回答,这些问题的设计是为了练习广义的能力。为了做到这一点,我们开发了一个标准,以提供对理想内容的洞察力。结果。我们发现这些学生在语文方面相当强。他们经常能够采取对抗或同情的观点,并分析相当复杂的系统。最重要的是,他们可以有意地这样做(a)在明确的网络安全背景之外,(b)甚至从入门级别开始,以及(c)在他们很好地理解所评估的关键技术之前。另一方面,我们也发现了一些例子,学生没有尽可能多地探索系统,也没有参考他们知道的其他材料,这可能是缺乏转移的证据。此外,我们的标题将受益于改进,从而能够对学生的反应进行更复杂的分析。讨论。我们的工作为我们对学生的期望提供了一个基线评估。它建议,at可以在课程的早期引入,并在计算机安全以外的环境中引入。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信