Securing the human: a review of literature on broadening diversity in cybersecurity education

X Mountrouidou, D Vosen, C Kari, MQ Azhar… - Proceedings of the …, 2019 - dl.acm.org
Recent global demand for cybersecurity professionals is promising, with the US job growth
rate at 28%, three times the national average [1]. In a global survey, 2,300 security …

A UK case study on cybersecurity education and accreditation

T Crick, JH Davenport, A Irons… - 2019 IEEE Frontiers in …, 2019 - ieeexplore.ieee.org
This Innovative Practice Full Paper presents a national case study-based analysis of the
numerous dimensions to cybersecurity education and how they are prioritised, implemented …

Overcoming the challenges of teaching cybersecurity in uk computer science degree programmes

T Crick, JH Davenport, P Hanna… - 2020 IEEE Frontiers …, 2020 - ieeexplore.ieee.org
This Innovative Practice Full Paper explores the diversity of challenges relating to the
teaching of cybersecurity in UK higher education degree programmes, through the lens of …

To gamify or not? on leaderboard effects, student engagement and learning outcomes in a cybersecurity intervention

M Malone, Y Wang, K James, M Anderegg… - Proceedings of the …, 2021 - dl.acm.org
We present a gamified learning experience for cybersecurity education that is designed to
provide learners with an understanding of the knowledge and techniques needed to solve …

Cybersecurity education and assessment in EDURange

R Weiss, F Turbak, J Mache, ME Locasto - IEEE Security & Privacy, 2017 - computer.org
Cybersecurity Education and Assessment in EDURange Toggle navigation IEEE Computer
Society Digital Library Jobs Tech News Resource Center Press Room Advertising About Us …

Teaching cybersecurity analysis skills in the cloud

RS Weiss, S Boesen, JF Sullivan, ME Locasto… - Proceedings of the 46th …, 2015 - dl.acm.org
This paper reports on the experience of using the EDURange framework, a cloud-based
resource for hosting on-demand interactive cybersecurity scenarios. Our framework is …

ADLES: Specifying, deploying, and sharing hands-on cyber-exercises

DC de Leon, CE Goes, MA Haney, AW Krings - Computers & Security, 2018 - Elsevier
Hands-on tutorials and exercises are recognized as an effective means for gaining much
needed cybersecurity and communication and information technology skills. These …

Improving the Representation of Undergraduate Women in Cybersecurity: A Literature Review

E Selma-Housein, B Plancher - Proceedings of the 56th ACM Technical …, 2025 - dl.acm.org
Despite cybersecurity's projected rapid growth in jobs (32%+ yearly), women remain
underrepresented, occupying only 25% of roles globally. While there have been numerous …

Cybersecurity in liberal arts general education curriculum

X Mountrouidou, X Li, Q Burke - Proceedings of the 23rd Annual ACM …, 2018 - dl.acm.org
Cybersecurity learning has been explored through different analytical lenses, across a
range of grade levels and academic institutions. From attempts to standardize learning with …

Embedding technical, personal and professional competencies in computing degree programmes

T Prickett, T Crick, JH Davenport, DS Bowers… - Proceedings of the …, 2024 - dl.acm.org
Many factors influence computing graduate employment prospects, including human capital,
social capital, individual attributes, individual career-building behaviours, perceived …