27th
 Oct
2015
CSKE at the VIBRANT Security Conference




On the 11th June the CSKE project was represented by our student team at Liverpool John Moores University where they attended the VIBRANT Cyber Security Conference. This is the first UK Workshop of its kind and our team delivered a poster presentation on the Knowledge Exchange Model (KEM).

The KEM model is one of the core components involved in the teaching of the MOOC as well as a key part of the project. The KEM consists of 4 phases.
  • Capture
  • Create
  • Embed
  • Disseminate
These phases essentially underpin the project alongside the learning and consulting framework. This means the project provides the means for both student and academics to create unique resources for a course while offering excellent opportunities for students involved within the development team.

The VIBRANT conference was a brilliant opportunity for the student team not only to represent the project but also explore other ideas and offerings from other universities. It allowed for them to showcase their work from the create phase of the project and spread awareness of the project.
Posted in CSKE by Kenneth Popay
Posted 27th Oct 2015
04th
 Jun
2015
Exploring the MOOC specification
Following recent discussions, our intended prototype MOOC is taking a new direction. We’re moving away from turning the TEL versions of our PBLs in MOOC versions and instead using it to explain the knowledge exchange model used on this project to support other academics or institutions develop their own model and scenarios for their own contexts.

This map explores our current thinking on the content of the revised MOOC.
Posted in CSKE by Admin
Posted 04th Jun 2015
04th
 Jun
2015
Project Overview Map created
As part of our evaluation, this map explains the relationship between each component of the project and how these eventually achieve the overall aims of the project.
Posted in CSKE by Admin
Posted 04th Jun 2015
30th
 Jan
2015
Evaluation strategy concept maps completed
Evaluation strategy concept maps completed 30th January 2015admin The main features of the evaluations strategy for CSKE are: focus questions with an emphasis on impact and future development; use of concept mapping as a device for both data capture and communication; an iterative process which runs throughout the main project (and potentially beyond as it can then be ‘adopted’ by the project team); and evaluation outcomes and outputs which are easy to access and communicate and which are available to the project team for further development after the cessation of project funding.

The evaluation strategy concept map and the first iteration of the CSKE evaluation map have now been released. To read the full evaluation strategy, visit here.
Posted in CSKE by Admin
Posted 30th Jan 2015
28th
 Jan
2015
Problem based learning scenarios 1 - 9 released
The first round of problem based learning scenarios have now been formulated with our industry partners and are made available through this platform. The scenarios cover a wide range of themes from within cyber security, including: Incident management; software development; information policy and governance in SMEs and others. See all the PBL scenarios
Posted in CSKE by Admin
Posted 28th Jan 2015
19th
 Jan
2015
Expressions of interest now invited from SMEs for funded knowledge exchange placements
We are keen to hear from any SME in the North West who would be interested to engage with our knowledge exchange (KE) work. Student KE placements are fully funded and envisage an individual or small team of students working on a given cyber security project during the summer of 2015. Students studying on our MSc Information Security and IT Management will undertake short, flexible placements involving activities to promote cyber security. Placements will be framed around a cyber security need of the business.
Posted in CSKE by Admin
Posted 19th Jan 2015
15th
 Jan
2015
New vacancies: E-Learning Content Developers required
As this project moves into its next phase of work, the team is recruiting for 5 E-Content Developers to help shape the problem based learning scenarios. These roles are being offered to the Department of Computing’s student base. For more information and details of how to apply, please see our Vacancies page. Edit: These Vacancies have now closed.
Posted in CSKE by Admin
Posted 15th Jan 2015
12th
 Jan
2015
Project website launched!
Working with Edge Hill University’s social enterprise the Web Factory, the Cyber Security Knowledge Exchange project has launched its website. The site will house all the latest information about the project: the scenarios; project updates; and the links to our massive open online course (MOOC) on cyber security!
Posted in CSKE by Admin
Posted 12th Jan 2015