The power of interpretation: Qualitative methods in cybersecurity research

D Fujs, A Mihelič, SLR Vrhovec - … of the 14th International Conference on …, 2019 - dl.acm.org
Cybersecurity is a hot topic and researchers have published extensively on studies
conducted using a variety of different research methods. This paper aims to determine which …

Securing the human: a review of literature on broadening diversity in cybersecurity education

X Mountrouidou, D Vosen, C Kari, MQ Azhar… - Proceedings of the …, 2019 - dl.acm.org
Recent global demand for cybersecurity professionals is promising, with the US job growth
rate at 28%, three times the national average [1]. In a global survey, 2,300 security …

Evolution and hotspots of peer instruction: a visualized analysis using CiteSpace

D Bicheng, N Adnan, MB Harji, L Ravindran - Education and Information …, 2023 - Springer
This paper presents the outcome of the bibliometrics analysis of research sourced from the
Web of Science collection. A research evolution, hotspots of peer instruction, and potential …

Problem-based cybersecurity lab with knowledge graph as guidance

Y Deng, Z Zeng, K Jha, D Huang - Journal of Artificial Intelligence and …, 2021 - par.nsf.gov
Lecture-based teaching paired with laboratory-based exercises is most commonly used in
cybersecurity instruction. However, it focuses more on theories and models but fails to …

When wrong is right: The instructional power of multiple conceptions

L Margulieux, P Denny, K Cunningham… - Proceedings of the 17th …, 2021 - dl.acm.org
For many decades, educational communities, including computing education, have debated
the value of telling students what they need to know (ie, direct instruction) compared to …

Hacked: A pedagogical analysis of online vulnerability discovery exercises

D Votipka, E Zhang, ML Mazurek - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Hacking exercises are a common tool for security education, but there is limited investigation
of how they teach security concepts and whether they follow pedagogical best practices …

A critical review of cybersecurity education in the United States

J Crabb, C Hundhausen, A Gebremedhin - Proceedings of the 55th ACM …, 2024 - dl.acm.org
This work examines the state-of-the-art of cybersecurity education in the United States by
considering two sources of data. The first source consists of Programs of Study for …

A longitudinal evaluation of a best practices CS1

A Salguero, J McAuley, B Simon, L Porter - Proceedings of the 2020 acm …, 2020 - dl.acm.org
Over a decade ago, the CS1 course for students without prior programming experience at a
large research-intensive university was redesigned to incorporate three best practices in …

Cryptography in Grade 10: Core Ideas with Snap! and Unplugged

M Lodi, M Sbaraglia, S Martini - … of the 27th ACM Conference on on …, 2022 - dl.acm.org
We report our experience of an extracurricular online intervention on cryptography in Grade
10. Our first goal is to describe how we taught some fundamental cryptography ideas by …

Problem-based learning for cybersecurity education

M Shivapurkar, S Bhatia, I Ahmed - Journal of The Colloquium for …, 2020 - cisse.info
Traditional lecture-based approach with laboratory-based exercises is commonly used to
teach cybersecurity. It is useful to provide hands-on experience to students. However, it fails …