Exploring the frontiers of cybersecurity behavior: a systematic review of studies and theories

A Almansoori, M Al-Emran, K Shaalan - Applied Sciences, 2023 - mdpi.com
Cybersecurity procedures and policies are prevalent countermeasures for protecting
organizations from cybercrimes and security incidents. Without considering human …

Systematic analysis of artificial intelligence in the era of industry 4.0

W Chen, W He, J Shen, X Tian… - Journal of Management …, 2023 - Taylor & Francis
Artificial Intelligence has been playing a profound role in the global economy, social
progress, and people's daily life. With the increasing capabilities and accuracy of AI, the …

Cybersecurity knowledge and skills taught in capture the flag challenges

V Švábenský, P Čeleda, J Vykopal, S Brišáková - Computers & Security, 2021 - Elsevier
Capture the Flag challenges are a popular form of cybersecurity education, where students
solve hands-on tasks in an informal, game-like setting. The tasks feature diverse …

Experiencing cybersecurity one game at a time: A systematic review of cybersecurity digital games

M Coenraad, A Pellicone, DJ Ketelhut… - Simulation & …, 2020 - journals.sagepub.com
Background. Cybersecurity is of increasing importance in our interconnected world, yet the
field has a growing workforce deficit and an underrepresentation of women and people of …

Human factors in cybersecurity: a sco** review

T Rahman, R Rohan, D Pal… - Proceedings of the 12th …, 2021 - dl.acm.org
Humans are often considered to be the weakest link in the cybersecurity chain. However,
traditionally the Computer Science (CS) researchers have investigated the technical aspects …

A systematic literature review on cyber security education for children

RB Sağlam, V Miller… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Contribution: This article presents a systematic literature review of research concerning
cyber security education for children (under 18s) on a global scale. Background: While the …

Automated feedback for participants of hands-on cybersecurity training

V Švábenský, J Vykopal, P Čeleda, J Dovjak - Education and Information …, 2024 - Springer
Computer-supported learning technologies are essential for conducting hands-on
cybersecurity training. These technologies create environments that emulate a realistic IT …

Modeling & Simulation as Industry 4.0 enabling technology to support manufacturing process design: A real industrial application

A Cimino, MG Gnoni, F Longo, G Barone… - Procedia Computer …, 2023 - Elsevier
This research work, first, briefly describes the educational offer of University of Calabria
(UNICAL) related to Modeling & Simulation (M&S) and, secondly, presents a case study …

Teaching ethics in computing: a systematic literature review of ACM computer science education publications

N Brown, B **e, E Sarder, C Fiesler… - ACM Transactions on …, 2024 - dl.acm.org
The computing education research community now has at least 40 years of published
research on teaching ethics in higher education. To examine the state of our field, we …

Exploring cybersecurity education at the K-12 level

W Chen, Y He, X Tian, W He - SITE Interactive Conference, 2021 - learntechlib.org
K-12 cybersecurity education is receiving growing attention with the growing number of
cyberattacks and a shortage of cybersecurity professionals. However, there are many …