Teaching Team Collaboration in Cybersecurity: A Case Study from the Transactive Memory Systems Perspective
Autor: | Sang-Yoon Chang, Kay Yoon |
---|---|
Rok vydání: | 2021 |
Předmět: |
Structure (mathematical logic)
05 social sciences Perspective (graphical) 050301 education Computer security computer.software_genre Communication theory Knowledge sharing Scholarship 0502 economics and business Workforce Transactive memory ComputingMilieux_COMPUTERSANDEDUCATION 050211 marketing 0503 education Complex problems computer |
Zdroj: | EDUCON |
DOI: | 10.1109/educon46332.2021.9453894 |
Popis: | Recent trends in the cybersecurity workforce have recognized that effective solutions for complex problems require collective efforts from individuals with diverse sets of knowledge, skills, and abilities. Therefore, the growing need to train students in team collaboration skills propelled educators in computer science and engineering to adopt team-based pedagogical strategies. Team-based pedagogy has shown success in enhancing students’ knowledge in course subjects and their motivation in learning. However, it is limited in offering concrete frameworks specifically focusing on how to teach team collaboration skills. As part of an interdisciplinary effort, we draw on Transactive Memory Systems Theory–a communication theory that explains how individuals in groups learn who knows what and organize who does what–in developing a Team Knowledge Sharing Assignment as a tool for student teams to structure their team collaboration processes. This paper reports a result of a case study in designing and facilitating the assignment for cybersecurity students enrolled in a scholarship program. Students’ evaluations and the instructor’s assessment reveal that the assignment made a positive impact on students’ team collaboration skills by helping them successfully identify their team members’ expertise and capitalize on their team’s knowledge resources when delegating functional roles. Based on this case study, we offer practical suggestions on how the assignment could be used for various classes or cybersecurity projects and how instructors could maximize its benefits. |
Databáze: | OpenAIRE |
Externí odkaz: |