Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- posterDecember 2024
Developing a Modular Cloud-Based Kubernetes Powered Framework for Scalable Cybersecurity Education
SIGCSE Virtual 2024: Proceedings of the 2024 on ACM Virtual Global Computing Education Conference V. 2Pages 325–326https://doi.org/10.1145/3649409.3691088We explore building a Kubernetes-powered, cloud-based cybersecurity education platform and framework named 'EDURange Cloud'. It allows instructors to efficiently design and host their own cybersecurity competitions and exercises. The benefits of this ...
- posterDecember 2024
Cybersecurity Pedagogy: Exploration Of Effective Teaching Methods For Engaging Middle School Learners
SIGCSE Virtual 2024: Proceedings of the 2024 on ACM Virtual Global Computing Education Conference V. 2Pages 303–304https://doi.org/10.1145/3649409.3691085Within the field of computer science, cybersecurity is essential for safeguarding individuals and organizations online. For students to develop an interest and be equipped with critical cybersecurity skills, learning experiences must be engaging. Despite ...
- research-articleDecember 2024
Validation of an Instrument to Measure Self-Efficacy in Information Security
SIGCSE Virtual 2024: Proceedings of the 2024 on ACM Virtual Global Computing Education Conference V. 1Pages 214–220https://doi.org/10.1145/3649165.3690095Problem. Extant measures of students' cybersecurity self-efficacy lack sufficient evidence of validity based on internal structure. Such evidence of validity is needed to enhance confidence in conclusions drawn from use of self-efficacy measures in the ...
- posterJuly 2024
Fine-Tuning AI to Assist in Building Curriculum for the CIA Triad and Cyber Kill Chain
ITiCSE 2024: Proceedings of the 2024 on Innovation and Technology in Computer Science Education V. 2Page 804https://doi.org/10.1145/3649405.3659495Educators face the continuous challenge of updating their teaching materials with the fast-paced changes in cybersecurity and integrating emerging topics into their existing content. This work presents the development progress of a cybersecurity ...
- research-articleJuly 2024
Equitable Access to Cybersecurity Education: A Case Study of Underserved Middle School Students
- Madison Thomas,
- Erynn Elmore,
- Brenda Chavez,
- Ronaisha Ruth,
- Charlotte Avery,
- Michel Cukier,
- Veronica Cateté
ITiCSE 2024: Proceedings of the 2024 on Innovation and Technology in Computer Science Education V. 1Pages 625–632https://doi.org/10.1145/3649217.3653581Existing research has primarily delved into the realm of computer science outreach aimed at K-12 students, with a focus on both informal and non-formal approaches. However, a noticeable research gap exists when it comes to cybersecurity outreach tailored ...
-
- research-articleJuly 2024
A User Experience Study of MeetingMayhem: A Web-Based Game to Teach Adversarial Thinking
ITiCSE 2024: Proceedings of the 2024 on Innovation and Technology in Computer Science Education V. 1Pages 611–617https://doi.org/10.1145/3649217.3653538We report on our experiences fielding MeetingMayhem, an interactive game that we developed, which introduces students to fundamental concepts in network security, cybersecurity, and adversarial thinking. The game is intended for students who do not ...
- research-articleJune 2024
Cybersecurity Education within a Computing Science Program - A Literature Review
WCCCE '24: Proceedings of the 26th Western Canadian Conference on Computing EducationArticle No.: 15, Pages 1–5https://doi.org/10.1145/3660650.3660666The importance of cybersecurity education within a computer science program is greater than ever in today’s rapidly advancing technological landscape. In order to protect sensitive information and digital infrastructure from various threats, ...
- research-articleMarch 2024
Remote Controlled Cyber: Toward Engaging and Educating a Diverse Cybersecurity Workforce
SIGCSE 2024: Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 1Pages 394–400https://doi.org/10.1145/3626252.3630917Cybersecurity education has grown exponentially to support the need for a skilled cybersecurity workforce. Further, capture-the-flag competitions have popularized cybersecurity by engaging and recruiting students while exposing them to cybersecurity ...
- research-articleMarch 2024
PWN The Learning Curve: Education-First CTF Challenges
SIGCSE 2024: Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 1Pages 937–943https://doi.org/10.1145/3626252.3630912We address the pressing need for effective and scalable cybersecurity education methodologies for undergraduate students. While Capture The Flag (CTF) challenges have been instrumental for some learners, for many novices CTF challenges are simply too ...
- research-articleMarch 2024
PWN Lessons Made Easy with Docker: Toward an Undergraduate Vulnerability Research Cybersecurity Class
SIGCSE 2024: Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 1Pages 986–992https://doi.org/10.1145/3626252.3630911Developing expertise in vulnerability research is critical to closing the cybersecurity workforce shortage. However, very few institutions have adopted vulnerability research into their cybersecurity curriculum, and fewer have examined how to teach this ...
- research-articleMarch 2024
DOJO: Applied Cybersecurity Education in the Browser
SIGCSE 2024: Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 1Pages 930–936https://doi.org/10.1145/3626252.3630836This paper introduces DOJO, a state-of-the-art, open-source learning platform for hands-on cybersecurity education that aims to minimize barriers for both students and instructors. DOJO draws insight and inspiration from the Capture The Flag (CTF) ...
- research-articleMarch 2024
Cybersecurity as a Crosscutting Concept Across an Undergrad Computer Science Curriculum: An Experience Report
SIGCSE 2024: Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 1Pages 916–922https://doi.org/10.1145/3626252.3630821Although many Computer Science (CS) programs offer cybersecurity courses, they are typically optional and placed at the periphery of the program. We advocate to integrate cybersecurity as a crosscutting concept in CS curricula, which is also consistent ...
- research-articleDecember 2023
Cyber Range and Cyber Defense Exercises: Gamification Meets University Students
Gamify 2023: Proceedings of the 2nd International Workshop on Gamification in Software Development, Verification, and ValidationPages 29–37https://doi.org/10.1145/3617553.3617888In the last decade, gamification has emerged as a valid alternative to more traditional learning processes both in academia and for professional training. Gamification has been successfully implemented in various disciplines to enhance the enjoyment ...
- ArticleNovember 2023
A Serious Video Game on Cybersecurity
Entertainment Computing – ICEC 2023Pages 341–345https://doi.org/10.1007/978-981-99-8248-6_29AbstractThe present paper deals with the videogame “Nabbovaldo and the Cyber Blackmail”, designed, developed and promoted by the Ludoteca del Registro.it, the educational section of Registro.it, the registry of Italian internet domains that works within ...
- research-articleOctober 2023
Lightweight Symphony: Towards Reducing Computer Science Student Anxiety with Standardized Docker Environments
SIGITE '23: Proceedings of the 24th Annual Conference on Information Technology EducationPages 15–21https://doi.org/10.1145/3585059.3611432During the COVID-19 pandemic, remote learning (RL) transformed the educational landscape for hands-on Computer Science courses. This paradigm shift accelerated the transition from traditional in-person programming labs to decentralized student-provided ...
- research-articleOctober 2023
Modern Cryptography Education of Middle School Students: A Review of Current Works
SIGITE '23: Proceedings of the 24th Annual Conference on Information Technology EducationPages 33–38https://doi.org/10.1145/3585059.3611428For many individuals, particularly youth, cryptography remains a hidden component of information technology, digital communications, and cybersecurity. Decrypting this complex field is an essential and valuable skill for protecting our modern digital ...
- research-articleOctober 2023
Comparison of Password Hygiene for Computer Science and Non-Computer Science Undergraduates
SIGITE '23: Proceedings of the 24th Annual Conference on Information Technology EducationPages 112–117https://doi.org/10.1145/3585059.3611410In today’s digital world, it is imperative that the next generation of workers is prepared to be successful working online. Students graduating from a technology curriculum may be prepared for secure digital work due to the nature of their coursework, ...
- research-articleAugust 2023
DJM-CYBER: A Joint Master in Advanced Cybersecurity
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and SecurityArticle No.: 65, Pages 1–10https://doi.org/10.1145/3600160.3605002Various publicly available studies show that millions of cybersecurity experts are missing worldwide. One possible way to tackle the workforce gap is with tailored higher education programmes. The goal of this paper is to present the relevant projects ...
- research-articleJune 2023
Want to Raise Cybersecurity Awareness? Start with Future IT Professionals.
ITiCSE 2023: Proceedings of the 2023 Conference on Innovation and Technology in Computer Science Education V. 1Pages 236–242https://doi.org/10.1145/3587102.3588862As cyber threats endanger everyone, from regular users to computing professionals, spreading cybersecurity awareness becomes increasingly critical. Therefore, our university designed an innovative cybersecurity awareness course that is freely available ...
- posterJune 2023
Inclusive Group Work Assessment for Cybersecurity
ITiCSE 2023: Proceedings of the 2023 Conference on Innovation and Technology in Computer Science Education V. 2Page 652https://doi.org/10.1145/3587103.3594173This poster presents an ongoing study that takes a diverse and inclusive approach to designing a practical group work assessment for an undergraduate cybersecurity course delivered to third year university cohorts. Students were given the choice to ...