ABSTRACT
Designing cyber security modules in Higher Education can be a balancing act. We aim to ensure students develop an understanding of key cyber security concepts such that they are able to contribute to security practices within the workplace. We also aim to develop understanding of more advanced and theoretical aspects of cyber security to meet a range of accreditation requirements and ensure those who wish to go on to work in security are suitably prepared. Additionally, students often have existing expectations and perceptions which must be managed. However, many general computing science degrees address security in isolated modules. As a result addressing these requirements can be challenging in the timeframe available. In this paper we present an activity designed explore student expectations of cyber security classes at two UK Universities in order to highlight the concerns of students such that curricula can consequently be amended to better meet student expectations.
- BCS. 2022. Academic Accreditation Guidelines. (2022). https://www.bcs.org/media/1209/accreditation-guidelines.pdfGoogle Scholar
- Andrew Begel and Beth Simon. 2008. Novice Software Developers, All over Again. In Proceedings of the Fourth International Workshop on Computing Education Research (Sydney, Australia) (ICER ’08). ACM, New York, NY, USA, 3–14. https://doi.org/10.1145/1404520.1404522Google ScholarDigital Library
- Tom Crick, James H. Davenport, Paul Hanna, Alastair Irons, and Tom Prickett. 2020. Overcoming the Challenges of Teaching Cybersecurity in UK Computer Science Degree Programmes. In 2020 IEEE Frontiers in Education Conference (FIE). 1–9. https://doi.org/10.1109/FIE44824.2020.9274033Google ScholarDigital Library
- Sebastian Dziallas and Sally Fincher. 2019. Accountable Disciplinary Knowledge in Computing Education: A Case-Comparative Approach. In Proceedings of the 2019 ACM Conference on International Computing Education Research (Toronto ON, Canada) (ICER ’19). ACM, New York, NY, USA, 1–9. https://doi.org/10.1145/3291279.3339403Google ScholarDigital Library
- The Quality Assurance Agency for Higher Education. 2022. Subject Benchmark Statement- Computing. (2022). https://www.qaa.ac.uk/quality-code/subject-benchmark-statements/computingGoogle Scholar
- UK Government. 2016. National Cyber Security Skills Strategy: Increasing the UK’s Cyber Security Capability. https://www.gov.uk/government/publications/national-cyber-security-strategy-2016-to-2021. [Online: accessed 14-October-2022].Google Scholar
- U.K. Government. 2016. National Cyber Security Strategy 2016-2021. https://www.gov.uk/government/publications/national-cyber-security-strategy-2016-to-2021. [Online: accessed 14-October-2022].Google Scholar
- U.K. Government. 2018. Defining the cyber security skills gap. https://publications.parliament.uk/pa/jt201719/jtselect/jtnatsec/706/70605.htm. [Online: accessed 14-October-2022].Google Scholar
- Hiscox. 2019. 2019 Cyber Readiness Report. https://www.hiscox.com/cybersecurity. [Online: accessed 14-October-2022].Google Scholar
- Päivi Kinnunen, Matthew Butler, Michael Morgan, Aletta Nylen, Anne-Kathrin Peters, Jane Sinclair, Sara Kalvala, and Erkki Pesonen. 2018. Understanding initial undergraduate expectations and identity in computing studies. European Journal of Engineering Education 43, 2 (2018), 201–218. https://doi.org/10.1080/03043797.2016.1146233Google ScholarCross Ref
- NCSC. 2016. CyberInvest. https://www.ncsc.gov.uk/information/cyber-invest. [Online: accessed 14-October-2022].Google Scholar
- Donna M. Ogle. 1986. K-W-L: A Teaching Model That Develops Active Reading of Expository Text. The Reading Teacher 39, 6 (1986), 564–570. http://www.jstor.org/stable/20199156Google ScholarCross Ref
- Cybersecurity Ventures. 2021. 2021 Cybersecurity Jobs Report. https://cybersecurityventures.com/jobs/. [Online: accessed 14-October-2022].Google Scholar
- Rossouw von Solms and Johan van Niekerk. 2013. From information security to cyber security. Computers and Security 38 (2013), 97 – 102. https://doi.org/10.1016/j.cose.2013.04.004 Cybercrime in the Digital Economy.Google ScholarDigital Library
Index Terms
- Exploring Student Perceptions and Expectations of Cyber Security
Recommendations
The Dartmouth Cyber Security Initiative: Faculty, Staff, and Students Work Together
The Dartmouth College Cyber Security Initiative (CSI) is a collaboration between faculty, staff, and students that focuses on projects to improve the security of Dartmouth's information systems. The CSI gives students experience in real-world, hands-on ...
Cyber physical systems security
Cyber Physical Systems (CPS) are networked systems of cyber (computation and communication) and physical (sensors and actuators) components that interact in a feedback loop with the possible help of human intervention, interaction and utilization. These ...
Cyber-physical systems security: Limitations, issues and future trends
AbstractTypically, Cyber-Physical Systems (CPS) involve various interconnected systems, which can monitor and manipulate real objects and processes. They are closely related to Internet of Things (IoT) systems, except that CPS focuses on the ...
Comments