Program Speakers for
TUESDAY, MARCH 9th


"Outrunning Your Headlights"
K Rudolph, Native Intelligence

Outline

Part 1 - Learning in the Year 2000 – Building a Better Crystal Ball

Changes in the Learning Landscape

  • Perceptions of Learning
  • Learners
  • Teachers/Trainers
  • Instruction


Part 2 - Students in the Year 2000 – Is Curious George Still Curious?

"Today's child, who can set a VCR and play complex interactive video games, will not be willing to sit passively in college classrooms 10 years hence to be lectured by a professor the way grandfather and grandmother were in 1960."

– Richard Kimball, 11·4·97 The Chronicle of Higher Education

  • Characteristics of Millennium Students
  • Expectations of Millennium Students


Part 3 - Strategies for Reaching Millennium Students

  • Principles of Learning
  • Strategies and Tips
  • Student Views
  • Lecture
  • IT-Based
  • Removing blocks

Conclusion

"Launching an OJT Program - Partnering for Change"
Erin Niedoba, Barbara DeBoy, Sharon Glass, NSA
This presentation will discuss a structured On-the-Job Training Program for System Administrators developed at the National Security Agency. This is an ongoing effort between the Subject Matter Experts in the customer organization and internal consultants from the National Cryptologic School. The presenters will provide: a history of the program, an overview of how to develop a structured OJT program, a listing of the duties and tasks and how they are used for employee development, countless lessons learned and contacts for those attendees who are interested in the program. We also strongly believe in audience participation!!

Go Back to Agenda Page (Previous Page)


Program Speakers for
WEDNESDAY, MARCH 10th


"Lessons Learned Web Based Training for Computer Security"
Sharon K. Walsh, Sandia National Laboratory

We are moving into the new world of Web based training.

Why change to Web based training? How do you move from presentation style to Web based training? What do you need in the form of support? Will your target audience accept this change? When will you change, what is the time line? Where will the end product be placed? Who will track the completions? Out of compliance notification?

All of these questions will be explored during this session.

Go Back to Agenda Page (Previous Page)


"New Technologies and Directions in Educational Software -
Paradigm Shift to Interactive Multimedia Platforms"
Dr. Rachelle S. Heller,
George Washington University
The computer has been employed as a tool for delivering and enhancing various educational disciplines for more than 20 years. Recently there has been a paradigm shift to include more interactive multimedia as an effective platform. In this presentation we will explore the role of the new technologies and the direction of educational software and computer enhanced education.

Go Back to Agenda Page (Previous Page)


"Evaluating Training"
Georgia A. Pedicini, Los Alamos National Laboratory
A study was conducted at Los Alamos National Laboratory (LANL) to evaluate the effectiveness of a specialized computer security briefing. Due to changes in the LANL environment, the training program now serves a substantially different pool of employees. This paper presents the philosophy and methodology of evaluating training programs. This paper also reports on the final results of the study, with conclusions, recommendations, and subsequent changes to computer security training at LANL.

Go Back to Agenda Page (Previous Page)


Program Speakers for
THURSDAY, MARCH 11th


"Teaching an On-Line Undergraduate Computer Security Course"
Dr. Karen Forcht, James Madison University
The course gives emphasis on why Computer Security Management is becoming a paramount concern in EVERY computer environment. And is aimed at the future computer practitioner or manager who must be aware of all tenets of computer security in order to protect their organization's most vital asset -- their information.

Go Back to Agenda Page (Previous Page)


"Web-Based Security Training: CBT End-User Awareness"
Jim Litchko, Integrated Management Services, Inc.
What is Web-based security training? How does it differ from computer-based training (CBT) methods? What are the issues, costs and retention when doing awareness in this manner? What is important: graphics, pace, flexibility, patience-factors, response formats, reports or cost? To answer these questions, Jim will present the concepts, real-world applications, successes, challenges, and solutions experienced when deploying Web-based awareness programs. Additionally, he will talk about how to increase retention through the creative use of SIREs, (Student Information Reinforcement Exercises).

Go Back to Agenda Page (Previous Page)

horizontal bar

up arrowTop of Page up arrow Back to FISSEA Page
up arrow Back to Organization's Page
Please send comments or suggestions to webmaster-csrc@nist.rip.
Last Modified: July 25, 2001.