Abstract | ||
---|---|---|
We have designed and developed a 3D digital Lego system as an education tool for teaching security protocols effectively in Information Assurance courses (Lego is a trademark of the LEGO Group. Here, we use it only to represent the pieces of a construction set.). Our approach applies the pedagogical methods learned from toy construction sets by treating security primitives as Lego pieces and protocols as construction results. Simulating the Lego toys, the digital Legos use matching shapes to help students understand the relationships among security primitives and protocols. Specifically, we present a flexible Lego generation method that can use various intuitive shapes to represent abstract and complex security protocols. Our design allows easy generation of new Lego sets and creation of different course materials. The integrated system also provides 3D interaction methods that simulate the real Lego building experience. For selected security courses, we have designed sample demonstrations and experiments for a set of important protocols. The initial evaluation results show encouraging feedback from students on using digital Legos in introductory security courses. |
Year | DOI | Venue |
---|---|---|
2011 | 10.1109/TLT.2010.19 | IEEE Transactions on Learning Technologies |
Keywords | Field | DocType |
security protocol teaching,real lego building experience,digital legos,teaching security protocols,lego toys,lego piece,security protocol,3d digital lego system,complex security protocol,educational courses,visualization for education.,teaching,introductory security course,3d interaction method,new lego set,intuitive shape,lego building experience,digital lego system,lego toy,pedagogical method,education tool,construction set,lego pieces,information science education,security primitive,information assurance course,flexible lego generation method,toy construction set,digital lego,computer aided instruction,security of data,lego set,protocols,visualization,shape,teaching methods,security,information security,construction industry,integrable system,three dimensional | Information assurance,Cryptographic protocol,Computer science,Visualization,Trademark,Information security,Teaching method,3D interaction,Multimedia,Course materials | Journal |
Volume | Issue | ISSN |
4 | 2 | 1939-1382 |
Citations | PageRank | References |
1 | 0.35 | 9 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Li Yu | 1 | 62 | 2.41 |
Lane Harrison | 2 | 243 | 20.22 |
Aidong Lu | 3 | 353 | 30.18 |
Zhiwei Li | 4 | 1315 | 107.73 |
Weichao Wang | 5 | 21 | 5.93 |