Pedagogic Challenges in Teaching Cyber Security -- a UK Perspective
- URL: http://arxiv.org/abs/2212.06584v1
- Date: Tue, 13 Dec 2022 13:55:21 GMT
- Title: Pedagogic Challenges in Teaching Cyber Security -- a UK Perspective
- Authors: Lallie Harjinder, Sinclair Jane, Joy Mike, Janicke Helge, Price
Blaine, Howley Richard
- Abstract summary: Cyber security has become an issue of national concern in the UK, USA and many other countries worldwide.
We explore the issues relating to student expectations and the CSI effect in students entering cyber security.
We highlight the science vs tools debate to bring focus to some of the pedagogic tensions between students/industry and the academics who teach on the degree courses.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Cyber security has become an issue of national concern in the UK, USA and
many other countries worldwide. Universities have reacted to this by launching
numerous cyber security degree programmes. In this paper we explore the
structure of these degrees and in particular highlight the challenges faced by
academics teaching on them. We explore the issues relating to student
expectations and the CSI effect in students entering cyber security. We
highlight the science vs tools debate to bring focus to some of the pedagogic
tensions between students/industry and the academics who teach on the degree
courses. Cyber security is subject to numerous ethical issues and nowhere is
this more so than in a university environment. We analyse some of the ethical
teaching related issues in cyber security. This paper will be of interest to
professionals in industry as well as academics interested in exploring the
shape, flavour and structure of cyber security related degree courses and also
the challenges presented to the academics that teach these degrees.
Related papers
- Exploring the Cybersecurity-Resilience Gap: An Analysis of Student Attitudes and Behaviors in Higher Education [0.0]
This study addresses the gap using the Theory of Behavior as a theoretical framework.
A modified Human Aspects of Information Security Questionnaire was employed to gather 266 valid responses from undergraduate and postgraduate students.
Key dimensions of cybersecurity awareness and behavior, including password management, email usage, social media practices, and mobile device security, were assessed.
arXiv Detail & Related papers (2024-11-05T16:09:37Z) - Could ChatGPT get an Engineering Degree? Evaluating Higher Education Vulnerability to AI Assistants [175.9723801486487]
We evaluate whether two AI assistants, GPT-3.5 and GPT-4, can adequately answer assessment questions.
GPT-4 answers an average of 65.8% of questions correctly, and can even produce the correct answer across at least one prompting strategy for 85.1% of questions.
Our results call for revising program-level assessment design in higher education in light of advances in generative AI.
arXiv Detail & Related papers (2024-08-07T12:11:49Z) - Navigating the road to automotive cybersecurity compliance [39.79758414095764]
The automotive industry is compelled to adopt robust cybersecurity measures to safeguard both vehicles and data against potential threats.
The future of automotive cybersecurity lies in the continuous development of advanced protective measures and collaborative efforts among all stakeholders.
arXiv Detail & Related papers (2024-06-29T16:07:48Z) - Artificial Intelligence in Industry 4.0: A Review of Integration Challenges for Industrial Systems [45.31340537171788]
Cyber-Physical Systems (CPS) generate vast data sets that can be leveraged by Artificial Intelligence (AI) for applications including predictive maintenance and production planning.
Despite the demonstrated potential of AI, its widespread adoption in sectors like manufacturing remains limited.
arXiv Detail & Related papers (2024-05-28T20:54:41Z) - Cyber Security in Energy Informatics: A Non-technical Perspective [0.0]
This research aims to conduct a literature review focusing on non-technical issues in cyber security in the energy informatics field.
The findings show that there are seven non-technical issues have been discussed in literature, including education, awareness, policy, standards, human, and risks, challenges, and solutions.
arXiv Detail & Related papers (2024-05-03T05:39:23Z) - Practical Cybersecurity Ethics: Mapping CyBOK to Ethical Concerns [13.075370397377078]
We use ongoing work on the Cyber Security Body of Knowledge (CyBOK) to help elicit and document the responsibilities and ethics of the profession.
Based on a literature review of the ethics of cybersecurity, we use CyBOK to frame the exploration of ethical challenges in the cybersecurity profession.
Our findings indicate that there are broad ethical challenges across the whole of cybersecurity, but also that different areas of cybersecurity can face specific ethical considerations.
arXiv Detail & Related papers (2023-11-16T19:44:03Z) - Cybersecurity as a Crosscutting Concept Across an Undergrad Computer
Science Curriculum: An Experience Report [1.6317061277457001]
We advocate to integrate cybersecurity as a crosscutting concept in Computer Science curricula.
The security education was incorporated within CS courses using a partnership between the responsible course instructor and a security expert.
We conducted a post-course survey to collect student perceptions, and semi-supervised interviews with responsible course instructors and the security expert to gauge their experience.
arXiv Detail & Related papers (2023-10-11T16:07:42Z) - Want to Raise Cybersecurity Awareness? Start with Future IT
Professionals [0.4893345190925178]
Our university designed an innovative cybersecurity awareness course that is freely available online for students, employees, and the general public.
The course offers simple, actionable steps that anyone can use to implement defensive countermeasures.
To measure the course impact, we administered it to 138 computer science undergraduates within a compulsory information security and cryptography course.
arXiv Detail & Related papers (2023-07-14T20:07:27Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Proceedings of the Artificial Intelligence for Cyber Security (AICS)
Workshop at AAAI 2022 [55.573187938617636]
The workshop will focus on the application of AI to problems in cyber security.
Cyber systems generate large volumes of data, utilizing this effectively is beyond human capabilities.
arXiv Detail & Related papers (2022-02-28T18:27:41Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.