Skip to main content

Analyzing Cybersecurity Understanding Using a Brain Computer Interface

  • Conference paper
  • First Online:
HCI for Cybersecurity, Privacy and Trust (HCII 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12210))

Included in the following conference series:

  • 2862 Accesses

Abstract

Widespread internet device use is simultaneously increasing individual cybersecurity risk. Individual awareness of cybersecurity risk must begin early, in high school and with a curriculum that engages the student’s interest in a highly technical topic. The research project presented here explores the best way to teach cybersecurity to high school students to accomplish these goals. Researchers developed and delivered cybersecurity lectures to the students weekly, observing that each lecture and activity caused a different reaction and interest level depending on the way the topic was approached. Results from this research show the best way to engage students in cybersecurity education topics, as measured by assessment using a brain computer interface (BCI). A curriculum with eight topics was prepared, with selected subjects providing an entry point for different learning styles. Active learning activities and student outcomes show the validity of this approach, as do pre- and post-survey assessments. The results from this work can be used to further develop appropriate engaging cybersecurity education, while reducing student stress.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. EMOTIV Insight 5 Channel Mobile EEG - Emotiv, Emotiv (2018). https://www.emotiv.com/product/emotiv-insight-5-channel-mobile-eeg/. Accessed 18 May 2018

  2. Manson, D., Pike, R.: The case for depth in cybersecurity education. ACM Inroads (2015). https://dl.acm.org/citation.cfm?id=2568212. Accessed Mar 2019

  3. Dark, M.: Thinking about cybersecurity. IEEE J. Mag. (2015). https://ieeexplore.ieee.org/abstract/document/7031840. Accessed Mar 2019

  4. Nakama, D., Paullet, K.: The urgency for cybersecurity education: the impact of early college innovation in Hawaii rural communities, August 2018. https://files.eric.ed.gov/fulltext/EJ1188021.pdf

  5. Cheung, R.S.Y., Cohen, J.P.: Challenge based learning in cybersecurity education. Semant. Scholar, 01 Jan 2011. https://www.semanticscholar.org/paper/Challenge-Based-Learning-in-Cybersecurity-Education-Cheung-Cohen/1906647d669e659a6cc465367069d27a5853c820#citing-papers. Accessed 02 Apr 2019

  6. Deja, J., Cabredo, R.: Using EEG emotion models in viewer experience design: an exploratory study. In: Proceedings of the 4th International Conference on Human-Computer Interaction and User Experience in Indonesia, CHIuXiD 2018 (2018). https://doi.org/10.1145/3205946.3205958. Accessed 1 Mar 2019

  7. Bernays, R., et al.: Lost in the dark: emotion Adaption. In: Adjunct Proceedings of the 25th Annual ACM Symposium on User Interface Software and Technology - UIST Adjunct Proceedings 2012 (2012). https://doi.org/10.1145/2380296.2380331. Accessed 1 Mar 2019

  8. Rajamani, K., Ramalingam, A., Bavisetti, S., Abujelala, M.: CBREN: computer brain entertainment system using neural feedback cognitive enhancement. In: Proceedings of the 10th International Conference on Pervasive Technologies Related to Assistive Environments - PETRA 2017 (2017). https://doi.org/10.1145/3056540.3064971. Accessed 1 Mar 2019

  9. Brennan, C., McCullagh, P., Lightbody, G., Galway, L.: The BCI as a pervasive technology - a research plan. In: Proceedings of the 8th International Conference on Pervasive Computing Technologies for Healthcare (2014). https://doi.org/10.4108/icst.pervasivehealth.2014.255755 Accessed 1 Mar 2019

  10. Mehmood, R., Lee, H.: Towards building a computer aided education system for special students using wearable sensor technologies. Sensors 17(2), 317 (2017). https://doi.org/10.3390/s17020317

    Article  Google Scholar 

  11. Rebolledo-Mendez, G., Freitas, S.: Attention modeling using inputs from a brain computer interface and user-generated data in second life. In: Proceedings of the Workshop of Affective Interaction in Natural Environments (AFFINE) (2008). Accessed 1 Mar 2019

    Google Scholar 

  12. Fouad, I., Labib, F.: Using Emotiv EPOC neuroheadset to acquire data in brain-computer interface. Int. J. Adv. Res. 3(11), 1012–1017 (2015). Accessed 1 Mar 2019

    Google Scholar 

  13. Mavridou, I.: Gestures - emotions interaction: e-Viographima application for visual artistic synthesis. In: Proceedings of the 3rd International Symposium on Movement and Computing - MOCO 2016 (2016). https://doi.org/10.1145/2948910.2948953. Accessed 1 Mar 2019

  14. Folgieri, R., Zampolini, R.: BCI promises in emotional involvement in music and games. Comput. Entertain. 11(4), 1–10 (2015). https://doi.org/10.1145/2582193.2633447. Accessed 1 Mar 2019

    Article  Google Scholar 

  15. Pinto, R., Ferreira, H.: Development of a non-invasive brain computer interface for neurorehabilitation. In: Proceedings of the 3rd 2015 Workshop on ICTs for improving Patients Rehabilitation Research Techniques - REHAB 2015 (2015). https://doi.org/10.1145/2838944.2838975. Accessed 1 Mar 2019

  16. Dollman, G., De Wet, L., Beelders, T.: Effectiveness with EEG BCIs: exposure to traditional input methods as a factor of performance. In: Proceedings of the South African Institute for Computer Scientists and Information Technologists Conference on - SAICSIT 2013 (2013). https://doi.org/10.1145/2513456.2513476. Accessed 1 Mar 2019

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Patricia Morreale .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Capellan, K., Condado, M., Morais, I., Morreale, P. (2020). Analyzing Cybersecurity Understanding Using a Brain Computer Interface. In: Moallem, A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2020. Lecture Notes in Computer Science(), vol 12210. Springer, Cham. https://doi.org/10.1007/978-3-030-50309-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-50309-3_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-50308-6

  • Online ISBN: 978-3-030-50309-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics