Exploring the frontiers of cybersecurity behavior: a systematic review of studies and theories
Cybersecurity procedures and policies are prevalent countermeasures for protecting
organizations from cybercrimes and security incidents. Without considering human …
organizations from cybercrimes and security incidents. Without considering human …
Systematic analysis of artificial intelligence in the era of industry 4.0
Artificial Intelligence has been playing a profound role in the global economy, social
progress, and people's daily life. With the increasing capabilities and accuracy of AI, the …
progress, and people's daily life. With the increasing capabilities and accuracy of AI, the …
Cybersecurity knowledge and skills taught in capture the flag challenges
Capture the Flag challenges are a popular form of cybersecurity education, where students
solve hands-on tasks in an informal, game-like setting. The tasks feature diverse …
solve hands-on tasks in an informal, game-like setting. The tasks feature diverse …
Experiencing cybersecurity one game at a time: A systematic review of cybersecurity digital games
Background. Cybersecurity is of increasing importance in our interconnected world, yet the
field has a growing workforce deficit and an underrepresentation of women and people of …
field has a growing workforce deficit and an underrepresentation of women and people of …
Human factors in cybersecurity: a sco** review
Humans are often considered to be the weakest link in the cybersecurity chain. However,
traditionally the Computer Science (CS) researchers have investigated the technical aspects …
traditionally the Computer Science (CS) researchers have investigated the technical aspects …
A systematic literature review on cyber security education for children
Contribution: This article presents a systematic literature review of research concerning
cyber security education for children (under 18s) on a global scale. Background: While the …
cyber security education for children (under 18s) on a global scale. Background: While the …
Automated feedback for participants of hands-on cybersecurity training
Computer-supported learning technologies are essential for conducting hands-on
cybersecurity training. These technologies create environments that emulate a realistic IT …
cybersecurity training. These technologies create environments that emulate a realistic IT …
Modeling & Simulation as Industry 4.0 enabling technology to support manufacturing process design: A real industrial application
This research work, first, briefly describes the educational offer of University of Calabria
(UNICAL) related to Modeling & Simulation (M&S) and, secondly, presents a case study …
(UNICAL) related to Modeling & Simulation (M&S) and, secondly, presents a case study …
Teaching ethics in computing: a systematic literature review of ACM computer science education publications
The computing education research community now has at least 40 years of published
research on teaching ethics in higher education. To examine the state of our field, we …
research on teaching ethics in higher education. To examine the state of our field, we …
Exploring cybersecurity education at the K-12 level
K-12 cybersecurity education is receiving growing attention with the growing number of
cyberattacks and a shortage of cybersecurity professionals. However, there are many …
cyberattacks and a shortage of cybersecurity professionals. However, there are many …