Pedagogic Challenges in Teaching Cyber Security -- a UK Perspective
- URL: http://arxiv.org/abs/2212.06584v1
- Date: Tue, 13 Dec 2022 13:55:21 GMT
- Title: Pedagogic Challenges in Teaching Cyber Security -- a UK Perspective
- Authors: Lallie Harjinder, Sinclair Jane, Joy Mike, Janicke Helge, Price
Blaine, Howley Richard
- Abstract summary: Cyber security has become an issue of national concern in the UK, USA and many other countries worldwide.
We explore the issues relating to student expectations and the CSI effect in students entering cyber security.
We highlight the science vs tools debate to bring focus to some of the pedagogic tensions between students/industry and the academics who teach on the degree courses.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Cyber security has become an issue of national concern in the UK, USA and
many other countries worldwide. Universities have reacted to this by launching
numerous cyber security degree programmes. In this paper we explore the
structure of these degrees and in particular highlight the challenges faced by
academics teaching on them. We explore the issues relating to student
expectations and the CSI effect in students entering cyber security. We
highlight the science vs tools debate to bring focus to some of the pedagogic
tensions between students/industry and the academics who teach on the degree
courses. Cyber security is subject to numerous ethical issues and nowhere is
this more so than in a university environment. We analyse some of the ethical
teaching related issues in cyber security. This paper will be of interest to
professionals in industry as well as academics interested in exploring the
shape, flavour and structure of cyber security related degree courses and also
the challenges presented to the academics that teach these degrees.
Related papers
- A Roadmap to Address Burnout in the Cybersecurity Profession: Outcomes from a Multifaceted Workshop [1.0188519086606078]
It is imperative to explore the causes and consequences of burnout through a socio-technical lens.
Nearly 46% of cybersecurity leaders contemplating departure from their roles.
Central to the analysis is an empirical study of former National Security Agency (NSA) tactical cyber operators.
arXiv Detail & Related papers (2025-02-14T16:55:13Z) - Open Problems in Machine Unlearning for AI Safety [61.43515658834902]
Machine unlearning -- the ability to selectively forget or suppress specific types of knowledge -- has shown promise for privacy and data removal tasks.
In this paper, we identify key limitations that prevent unlearning from serving as a comprehensive solution for AI safety.
arXiv Detail & Related papers (2025-01-09T03:59:10Z) - Cybersecurity Study Programs: What's in a Name? [0.2999888908665658]
Higher education institutions are introducing new cybersecurity programs, attracting students to this expanding field.
Top-ranked universities have not yet fully implemented the guidelines and offer programs that have "cyber" in their name but lack some essential elements of a cybersecurity program.
graduates of these programs may not meet employer expectations and may require additional training.
arXiv Detail & Related papers (2024-11-14T07:14:52Z) - Cyber Security in Energy Informatics: A Non-technical Perspective [0.0]
This research aims to conduct a literature review focusing on non-technical issues in cyber security in the energy informatics field.
The findings show that there are seven non-technical issues have been discussed in literature, including education, awareness, policy, standards, human, and risks, challenges, and solutions.
arXiv Detail & Related papers (2024-05-03T05:39:23Z) - Practical Cybersecurity Ethics: Mapping CyBOK to Ethical Concerns [13.075370397377078]
We use ongoing work on the Cyber Security Body of Knowledge (CyBOK) to help elicit and document the responsibilities and ethics of the profession.
Based on a literature review of the ethics of cybersecurity, we use CyBOK to frame the exploration of ethical challenges in the cybersecurity profession.
Our findings indicate that there are broad ethical challenges across the whole of cybersecurity, but also that different areas of cybersecurity can face specific ethical considerations.
arXiv Detail & Related papers (2023-11-16T19:44:03Z) - Cybersecurity as a Crosscutting Concept Across an Undergrad Computer
Science Curriculum: An Experience Report [1.6317061277457001]
We advocate to integrate cybersecurity as a crosscutting concept in Computer Science curricula.
The security education was incorporated within CS courses using a partnership between the responsible course instructor and a security expert.
We conducted a post-course survey to collect student perceptions, and semi-supervised interviews with responsible course instructors and the security expert to gauge their experience.
arXiv Detail & Related papers (2023-10-11T16:07:42Z) - Edge AI Empowered Physical Layer Security for 6G NTN: Potential Threats and Future Opportunities [33.36351274737824]
This paper provides an overview of the possible risks that the physical layer may encounter in the context of 6G Non-Terrestrial Networks (NTN)
With the objective of showcasing the effectiveness of cutting-edge AI technologies in bolstering physical layer security, this study reviews the most foreseeable design strategies associated with edge AI in the realm of 6G.
The findings of this paper serve as a foundation for future investigations aimed at enhancing the physical layer security of edge servers/devices in the next generation of trustworthy 6G telecommunication networks.
arXiv Detail & Related papers (2023-10-03T07:06:57Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Proceedings of the Artificial Intelligence for Cyber Security (AICS)
Workshop at AAAI 2022 [55.573187938617636]
The workshop will focus on the application of AI to problems in cyber security.
Cyber systems generate large volumes of data, utilizing this effectively is beyond human capabilities.
arXiv Detail & Related papers (2022-02-28T18:27:41Z) - Student Barriers to Active Learning in Synchronous Online Classes:
Characterization, Reflections, and Suggestions [29.903934269672572]
This work focuses on characterizing student barriers to active learning in synchronous online environments.
Through a thematic analysis, we craft a nuanced list of students' online active learning barriers within the themes of human-side, technological, and environmental barriers.
arXiv Detail & Related papers (2021-04-10T21:03:15Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.