skip to main content
10.1145/3290511.3290524acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicetcConference Proceedingsconference-collections
research-article

On designing a cybersecurity educational program for higher education

Published: 26 October 2018 Publication History

Abstract

Cybersecurity education is critical for preparing current and future IT professionals to deal with the multitude of security threats that occur worldwide on an ever-increasing scale. We believe that this issue can be addressed most effectively at the level of higher education, which provides the best balance of existing skills and available resources as needed for such highly-technical topics.
In this paper we present first of all a methodology for designing a cybersecurity educational program, so that it becomes easier for all interested parties to design such programs, which helps extending the global scale of cybersecurity education. Secondly, we describe in detail how we applied our methodology to design an appropriate cybersecurity program for the case of higher education in Japan, followed by a discussion of the current state of our endeavor.

References

[1]
Kessler, G. C. and Ramsay, J. Paradigms for cybersecurity education in a homeland security program. Journal of Homeland Security Education, 2 (2013), 35.
[2]
Beuran, R., Pham, C., Tang, D., Chinen, K., Tan, Y. and Shinoda, Y. CyTrONE: An Integrated Cybersecurity Training Framework. In Proceedings of the International Conference on Information Systems Security and Privacy (ICISSP 2017) (Porto, Portugal, February 19--21, 2017).
[3]
Martini, B. and Choo, K. R. Building the next generation of cybersecurity professionals (2014).
[4]
McGettrick, A., Cassel, L. N., Dark, M., Hawthorne, E. K. and Impagliazzo, J. Toward curricular guidelines for cybersecurity. In Proceedings of the Proceedings of the 45th ACM technical symposium on Computer science education (Atlanta, Georgia, USA, 2014). ACM.
[5]
Toth, P. and Klein, P. A Role-Based Model for Federal Information Technology/Cyber Security Training. NIST Special Publication, 800 (2013), 16.
[6]
Locasto, M. E., Ghosh, A. K., Jajodia, S. and Stavrou, A. The ephemeral legion: producing an expert cyber-security work force from thin air. Communications of the ACM, 54, 1 (2011), 129--131.
[7]
Nobles, C. and Burrell, D. Using Cybersecurity Communities of Practice (CoP) to Support Small and Medium Businesses. Academic Conferences and publishing limited, 2018.
[8]
Cheung, R. S., Cohen, J. P., Lo, H. Z. and Elia, F. Challenge based learning in cybersecurity education. The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2011.
[9]
Abraham, S. and Shih, L. Instructional Perspective: Towards an Integrative Learning Approach in Cybersecurity Education (2015).
[10]
Henry, A. P. Mastering the Cyber Security Skills Crisis: Realigning Educational Outcomes to Industry Requirements. ACCS DISCUSSION PAPER, 4 (2017).
[11]
Kolb, A. Y. and Kolb, D. A. Learning Styles and Learning Spaces: Enhancing Experiential Learning in Higher Education. Academy of Management Learning & Education, 4, 2 (2005), 193--212.
[12]
Franzoni, A. L., Assar, S., Defude, B. and Rojas, J. Student Learning Styles Adaptation Method Based on Teaching Strategies and Electronic Media. 2008.
[13]
Endicott-Popovsky, B. E. and Popovsky, V. M. Application of pedagogical fundamentals for the holistic development of cybersecurity professionals. ACM Inroads, 5, 1 (2014), 57--68.
[14]
Yuan, X., Yang, L., He, W., Ellis, J. T., Xu, J. and Waters, C. K. Enhancing Cybersecurity Education Using POGIL. In Proceedings of the Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education (2017). ACM.
[15]
William Butler, W. V. M., Helen G. Barker The Evolving Internet of Things (IoT) Requires New Approaches by Colleges and Universities in Educating All Students in Cyber Security. IEEE Standards University E-Magazine, 2016.
[16]
Carlton, M. Development of a cybersecurity skills index: A scenarios-based, hands-on measure of non-IT professionals' cybersecurity skills. Nova Southeastern University, 2016.
[17]
Sabeil, E., Manaf, A. B. A., Ismail, Z. and Abas, M. Cyber forensics competency-based framework-review. International Journal of New Computer Architectures and their Applications (IJNCAA), 1, 4 (2011), 991--1000.
[18]
Giannakas, F., Kambourakis, G. and Gritzalis, S. Cyberaware: A mobile game-based app for cybersecurity education and awareness. IEEE, 2015.
[19]
Weiss, R., Turbak, F., Mache, J., Nilsen, E. and Locasto, M. E. Finding the Balance Between Guidance and Independence in Cybersecurity Exercises. USENIX, 2016.
[20]
Bloom, B. S. and Krathwohl, D. R. Taxonomy of Educational Objectives: Volume 2 Affective Domain. David McKay Company Incorporated, 1971.
[21]
Anderson, L. W., Krathwohl, D. R., Airasian, P. W., Cruikshank, K. A., Mayer, R. E., Pintrich, P. R., Raths, J. and Wittrock, M. C. A taxonomy for learning, teaching, and assessing: A revision of Bloom's taxonomy of educational objectives, abridged edition. White Plains, NY: Longman (2001).
[22]
Fink, L. D. Creating significant learning experiences: An integrated approach to designing college courses. John Wiley & Sons, 2013.
[23]
Nonaka, I. and Konno, N. The concept of "ba": Building a foundation for knowledge creation. California management review, 40, 3 (1998), 40--54.
[24]
enPiT University Consortium, enPiT-Security (SecCap) Program (in Japanese). https://www.seccap.jp/.
[25]
Yagi, T., Akiyama, M. and Murayama, J. Computer Network Security. Corona Publishing, 2015.
[26]
Beuran, R., Chinen, K., Tan, Y. and Shinoda, Y. Towards Effective Cybersecurity Education and Training. IS-RR-2016-003, Japan Advanced Institute of Science and Technology (JAIST), Ishikawa, Japan, 2016.
[27]
Nomura Research Institute Secure Technologies Secure Eggs Training Program (in Japanese). http://www.nri-secure.co.jp/service/leaming/secureeggs.htrnl.
[28]
NICT National Cyber Training Center Cyber Defense Exercise with Recurrence (CYDER) Training Program (in Japanese). https://cyder.nict.go.jp/.
[29]
Japan Network Security Association Security Contest SECCON (in Japanese). http://seccon.jp/.
[30]
Web Application Security Forum Hardening Project (in Japanese). http://wasforum.jp/hardening-project/.
[31]
Industry Cross-Sectoral Committee for Cybersecurity Human Resources Development (CRIC-CSF) Final Report of Stage 1. http://cyber-risk.or.jp/sansanren/index.html.

Cited By

View all
  • (2025)Enhancing Cybersecurity Education with Artificial Intelligence ContentProceedings of the 56th ACM Technical Symposium on Computer Science Education V. 110.1145/3641554.3701958(158-164)Online publication date: 12-Feb-2025
  • (2025)Practical Cybersecurity Education: A Course Model Using Experiential Learning TheoryProceedings of the 56th ACM Technical Symposium on Computer Science Education V. 110.1145/3641554.3701922(819-825)Online publication date: 12-Feb-2025
  • (2024)Strategic Approaches to Cybersecurity Learning: A Study of Educational Models and OutcomesInformation10.3390/info1502011715:2(117)Online publication date: 18-Feb-2024
  • Show More Cited By

Index Terms

  1. On designing a cybersecurity educational program for higher education

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICETC '18: Proceedings of the 10th International Conference on Education Technology and Computers
    October 2018
    391 pages
    ISBN:9781450365178
    DOI:10.1145/3290511
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 October 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. curriculum design
    2. cybersecurity education
    3. educational content
    4. pedagogical methods

    Qualifiers

    • Research-article

    Conference

    ICETC 2018

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)106
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Enhancing Cybersecurity Education with Artificial Intelligence ContentProceedings of the 56th ACM Technical Symposium on Computer Science Education V. 110.1145/3641554.3701958(158-164)Online publication date: 12-Feb-2025
    • (2025)Practical Cybersecurity Education: A Course Model Using Experiential Learning TheoryProceedings of the 56th ACM Technical Symposium on Computer Science Education V. 110.1145/3641554.3701922(819-825)Online publication date: 12-Feb-2025
    • (2024)Strategic Approaches to Cybersecurity Learning: A Study of Educational Models and OutcomesInformation10.3390/info1502011715:2(117)Online publication date: 18-Feb-2024
    • (2024)Advanced Network and System Security TeachingElectronics10.3390/electronics1401000314:1(3)Online publication date: 24-Dec-2024
    • (2024)Study on Japan’s Cybersecurity Strategy and Regional Cybersecurity Construction in the Face of Global CompetitionApplied Mathematics and Nonlinear Sciences10.2478/amns-2024-26619:1Online publication date: 4-Oct-2024
    • (2024)A Critical Review of Cybersecurity Education in the United StatesProceedings of the 55th ACM Technical Symposium on Computer Science Education V. 110.1145/3626252.3630757(241-247)Online publication date: 7-Mar-2024
    • (2024)Impact of Institutional Support on First-Year Undergraduate Students’ Cybersecurity Compliance BehaviourProceedings of Ninth International Congress on Information and Communication Technology10.1007/978-981-97-3562-4_1(1-21)Online publication date: 27-Jul-2024
    • (2021)Integrating Andragogy Theory into a Multidisciplinary Curriculum to Achieve a Connected Program for a Doctorate in Cybersecurity2021 IEEE Frontiers in Education Conference (FIE)10.1109/FIE49875.2021.9637127(1-8)Online publication date: 13-Oct-2021
    • (2020)A Case Study of a Cybersecurity ProgrammeProceedings of the 51st ACM Technical Symposium on Computer Science Education10.1145/3328778.3366918(16-22)Online publication date: 26-Feb-2020

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media