Using the case method for teaching information security students in open source intelligence

Author:

Nazarov D. M.1ORCID,Simbirtsev R. A.2ORCID,Salalayko D. P.2ORCID

Affiliation:

1. Ural State University of Economics

2. Ural State University of Economics; JSC "Tochka"

Abstract

In today’s world, information is one of the most valuable resources, and the ability to process it becomes especially important in the process of training specialists of various profiles, including specialists in the field of information security. OSINT (Open Source Intelligence) is a technology for collecting and analyzing information about a person, organization, event or phenomenon from open sources. This powerful tool for the effective processing of open data is of particular interest for the formation of vocational competencies of students studying in the direction of training 10.03.01 “Information Security”.The authors of the article explore and test the principles of the case method as an effective method of teaching OSINT technologies. The case method, or the method of situational analysis, involves solving real-life problem situations and practical examples for deep understanding and mastering of the material. The article presents in detail specific cases on OSINT that can be used to teach students of “Information Security”. These tasks contribute to the development of critical thinking, the formation of analytical skills, and the ability to apply the acquired knowledge in practice.The article emphasizes the importance of feedback as a critical element of learning, which allows to customize and adapt the learning process according to students’ needs and level of mastery of OSINT technologies. In addition, the authors emphasize the importance of the multidisciplinary approach in OSINT training, including not only the study of technical aspects but also legal and ethical norms. The analysis of case method principles and case studies presented in the article will be useful for instructors developing OSINT training courses, as well as for specialists interested in modern methods and approaches to training in the field of information security.

Publisher

Publishing House Education and Informatics

Reference17 articles.

1. Bruner J.S. The act of discovery. Harvard Educational Review. 1961;31(1):23–32.

2. Dewey J. How we think. New York, USA, Dover Publications; 1997. 240 p.

3. Bransford J. D., Brown A. L., Cocking R. R. How people learn: Brain, mind, experience, and school. Washington, D.C., USA, National Academy Press; 2000. 312 p.

4. Lundeberg M. A., Levin B. B., Harrington H. L. Who learns what from cases and how? The research base for teaching and learning with cases. Mahwah, N.J., USA, Lawrence Erlbaum Associates Inc.; 1999. 281 p.

5. Lynn L. E. Teaching and learning with cases: A guidebook. New York, USA, Chatham House Publishers; 1999. 176p.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3