用于教育和课程设计的网络安全活动:调查

IF 4.9 Q1 PSYCHOLOGY, EXPERIMENTAL Computers in human behavior reports Pub Date : 2024-10-11 DOI:10.1016/j.chbr.2024.100501
Muhusina Ismail , Nisha Thorakkattu Madathil , Meera Alalawi , Saed Alrabaee , Mohammad Al Bataineh , Suhib Melhem , Djedjiga Mouheb
{"title":"用于教育和课程设计的网络安全活动:调查","authors":"Muhusina Ismail ,&nbsp;Nisha Thorakkattu Madathil ,&nbsp;Meera Alalawi ,&nbsp;Saed Alrabaee ,&nbsp;Mohammad Al Bataineh ,&nbsp;Suhib Melhem ,&nbsp;Djedjiga Mouheb","doi":"10.1016/j.chbr.2024.100501","DOIUrl":null,"url":null,"abstract":"<div><div>Cyber threats are one of the main concerns in this growing technology epoch. To tackle this issue, highly skilled and motivated cybersecurity professionals are increasingly in demand to prevent, detect, respond to, or even mitigate the effects of such threats. However, the world faces a workforce shortage of qualified cybersecurity professionals and practitioners. To address this dilemma, several cybersecurity educational programs have been introduced, such as specialized cybersecurity courses in computer science graduate programs. With the increasing demand, different cybersecurity courses are introduced at the high school level, undergraduate computer science and information systems programs, and even at the government level. Due to the peculiar nature of cybersecurity, educational institutions face many issues when designing a curriculum or cybersecurity activities. In this paper, we study existing cybersecurity curriculum approaches and activities. We also present case studies on cybersecurity education around the globe.</div></div>","PeriodicalId":72681,"journal":{"name":"Computers in human behavior reports","volume":"16 ","pages":"Article 100501"},"PeriodicalIF":4.9000,"publicationDate":"2024-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cybersecurity activities for education and curriculum design: A survey\",\"authors\":\"Muhusina Ismail ,&nbsp;Nisha Thorakkattu Madathil ,&nbsp;Meera Alalawi ,&nbsp;Saed Alrabaee ,&nbsp;Mohammad Al Bataineh ,&nbsp;Suhib Melhem ,&nbsp;Djedjiga Mouheb\",\"doi\":\"10.1016/j.chbr.2024.100501\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Cyber threats are one of the main concerns in this growing technology epoch. To tackle this issue, highly skilled and motivated cybersecurity professionals are increasingly in demand to prevent, detect, respond to, or even mitigate the effects of such threats. However, the world faces a workforce shortage of qualified cybersecurity professionals and practitioners. To address this dilemma, several cybersecurity educational programs have been introduced, such as specialized cybersecurity courses in computer science graduate programs. With the increasing demand, different cybersecurity courses are introduced at the high school level, undergraduate computer science and information systems programs, and even at the government level. Due to the peculiar nature of cybersecurity, educational institutions face many issues when designing a curriculum or cybersecurity activities. In this paper, we study existing cybersecurity curriculum approaches and activities. We also present case studies on cybersecurity education around the globe.</div></div>\",\"PeriodicalId\":72681,\"journal\":{\"name\":\"Computers in human behavior reports\",\"volume\":\"16 \",\"pages\":\"Article 100501\"},\"PeriodicalIF\":4.9000,\"publicationDate\":\"2024-10-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers in human behavior reports\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2451958824001349\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"PSYCHOLOGY, EXPERIMENTAL\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers in human behavior reports","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2451958824001349","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"PSYCHOLOGY, EXPERIMENTAL","Score":null,"Total":0}
引用次数: 0

摘要

在技术不断发展的今天,网络威胁是人们关注的主要问题之一。为解决这一问题,人们越来越需要技术精湛、积极进取的网络安全专业人员来预防、检测、应对甚至减轻此类威胁的影响。然而,全世界都面临着合格的网络安全专业人员和从业人员短缺的问题。为解决这一难题,一些网络安全教育计划已经推出,如计算机科学研究生课程中的网络安全专业课程。随着需求的不断增加,高中、本科计算机科学和信息系统课程,甚至政府层面都开设了不同的网络安全课程。由于网络安全的特殊性,教育机构在设计课程或网络安全活动时面临许多问题。在本文中,我们将研究现有的网络安全课程方法和活动。我们还介绍了全球网络安全教育的案例研究。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Cybersecurity activities for education and curriculum design: A survey
Cyber threats are one of the main concerns in this growing technology epoch. To tackle this issue, highly skilled and motivated cybersecurity professionals are increasingly in demand to prevent, detect, respond to, or even mitigate the effects of such threats. However, the world faces a workforce shortage of qualified cybersecurity professionals and practitioners. To address this dilemma, several cybersecurity educational programs have been introduced, such as specialized cybersecurity courses in computer science graduate programs. With the increasing demand, different cybersecurity courses are introduced at the high school level, undergraduate computer science and information systems programs, and even at the government level. Due to the peculiar nature of cybersecurity, educational institutions face many issues when designing a curriculum or cybersecurity activities. In this paper, we study existing cybersecurity curriculum approaches and activities. We also present case studies on cybersecurity education around the globe.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
7.80
自引率
0.00%
发文量
0
期刊最新文献
The impact of social media reports on nurses’ job satisfaction: A cross-section suvery I Don't matter anyway. Will more Instagram change that? Anti-mattering and Instagram Feed vs. stories addiction symptoms: The moderating roles of loneliness and life satisfaction Surprising gender biases in GPT IT really matters: Associations of computer hassles and technical support with medically certified sickness absence due to mental health complaints Effect of business intelligence on organizational competitiveness- exploring the mediation of technology anxiety
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1