top of page

Problem Book Projects

Ethical Use of AI Tools in Cyber Education

The advent of publicly available generative AI tools has the potential to fundamentally alter how education operates. There is a risk of unethical use of AI tools for summative assessments such as coursework reports and dissertation theses, with detrimental effects on the accuracy of student results and individual learning.

baf7a3fe-007d-4421-8a1c-ffe8b8576da5

Work Ready Student Developers

Many students acquire good programming skills at university and are exposed to an array of relevant technologies. However, they often struggle to demonstrate their readiness to work within industry. Could a virtual software house, run by staff and mentored by alumni from industry, attract real clients with real problems that students could be recruited to work on?

68204849-cf91-49e3-bdbf-f3080d64728d

Cyber Job Analytics (Status : Pending)

Technologies (e.g., programming languages, operating systems, frameworks, APIs, service platforms etc.) are foundational to many career pathways. However, identifying and determining which technologies to learn, given that learning curves can often be costly, complicated and time consuming; particularly for students, graduates and career changers.

9dd66c25-9f17-4fdc-8898-79b6837b5091

Authentic Learning with Virtual Machines

A common approach when using virtual machines for assessments is to utilise a "one size fits all " template. Particularly when working with large student cohorts. However, this approach can often introduce limits to the scope, scale and creativity of authentic assessments, due to a lack of differentiation in assessment scope.

0572cfc1-974e-4124-b35b-4e8e56cbdc2c

AI Assisted Assessment Feedback

Assessment feedback should be clear, specific, objective, constructive, actionable, supportive, and prompt. Meeting this requirement for small cohorts is typically feasible. However, meeting this requirement for large cohorts across multiple assessments is not only challenging, but potentially detrimental to student outcomes for multiple reasons.

ff86acd2-eb41-485b-9b0f-38c4602f3eab

A Cyber Lesson Plan for 11-12-year-olds

How do we create and test a lesson plan for 11-12 year-olds, that introduces them to concepts of cyber security, in a way that is non-technical, intuitive, self-directed and contextual to their generation?

9df85068-db6c-4cc0-a2e8-5a7173c5a2be

bottom of page