A taxonomy and gap-analysis in digital privacy education

SK Paul, DA Knox - International Symposium on Foundations and Practice …, 2022 - Springer
Computers of different types and portable devices like: mobile phones, smartwatches and an
increasing number of IoT devices, collect and use our personal data, to improve and simplify …

A Systematic Mapping Study on Teaching of Security Concepts in Programming Courses

A Torbunova, A Ashraf, I Porres - arXiv preprint arXiv:2407.07511, 2024 - arxiv.org
Context: To effectively defend against ever-evolving cybersecurity threats, software systems
should be made as secure as possible. To achieve this, software developers should …

Supporting cybersecurity education and training via LMS integration: CyLMS

R Beuran, D Tang, Z Tan, S Hasegawa, Y Tan… - Education and …, 2019 - Springer
Cybersecurity education and training are being conducted on an ever-increasing scale, as
most organizations need to improve their readiness in dealing with the more and more …

Learning outcomes for cyber defense competitions

AB Woszczynski, A Green - Journal of Information Systems Education, 2017 - jise.org
Cyber defense competitions (CDCs) simulate a real-world environment, where the
competitors must protect the information assets of a fictional organization. These …

Developing an undergraduate course curriculum for ethical hacking

Y Wang, M McCoey, Q Hu - Proceedings of the 21st Annual Conference …, 2020 - dl.acm.org
An Ethical Hacking (EH) course not only is a critical component for a Cybersecurity program
but also an essential preparation for CS/IT majors towards career paths as security …

Developing an undergraduate course curriculum on information security

Y Wang, M McCoey, H Zou - Proceedings of the 19th Annual SIG …, 2018 - dl.acm.org
The teaching of Information Security has well-known difficulties. On one hand, security
issues can arise in a broad spectrum of fields, and it is challenging to chose a subset of …

[PDF][PDF] Design of a cyber security awareness campaign to be implemented in a quarantine laboratory

T Sardar, LA Wahsheh - Journal of Computing Sciences in Colleges, 2020 - ccsc.org
Humans are still the weakest link in the cyber security chain. Cyber criminals are working
faster than users can defend themselves. In this research work, we investigate effective …

A survey of recent progress on undergraduate information security teaching

H Daming, Z Sheng - Nanjing Xinxi Gongcheng Daxue …, 2020 - search.proquest.com
With the rapid development of techniques such as cloud computing, mobile application and
IoT, information technology nowadays has been fully integrated into our daily life. The need …

The Future of Education

SE Schmeelk, DM Dragos - conference.pixel-online.net
Cybersecurity topics which make it into textbooks have historically been developed from real
world threats which have been actualized in the real world. In fact, most risk management …

Integrating Cybersecurity Labs into Traditional Curriculum Design

SE Schmeelk, DM Dragos - … . The Future of …, 2019 - conference.pixel-online.net
Cybersecurity topics which make it into textbooks have historically been developed from real
world threats which have been actualized in the real world. In fact, most risk management …