skip to main content
10.1145/3573260.3573267acmotherconferencesArticle/Chapter ViewAbstractPublication PagescepConference Proceedingsconference-collections
research-article

Exploring Student Perceptions and Expectations of Cyber Security

Published:06 January 2023Publication History

ABSTRACT

Designing cyber security modules in Higher Education can be a balancing act. We aim to ensure students develop an understanding of key cyber security concepts such that they are able to contribute to security practices within the workplace. We also aim to develop understanding of more advanced and theoretical aspects of cyber security to meet a range of accreditation requirements and ensure those who wish to go on to work in security are suitably prepared. Additionally, students often have existing expectations and perceptions which must be managed. However, many general computing science degrees address security in isolated modules. As a result addressing these requirements can be challenging in the timeframe available. In this paper we present an activity designed explore student expectations of cyber security classes at two UK Universities in order to highlight the concerns of students such that curricula can consequently be amended to better meet student expectations.

References

  1. BCS. 2022. Academic Accreditation Guidelines. (2022). https://www.bcs.org/media/1209/accreditation-guidelines.pdfGoogle ScholarGoogle Scholar
  2. Andrew Begel and Beth Simon. 2008. Novice Software Developers, All over Again. In Proceedings of the Fourth International Workshop on Computing Education Research (Sydney, Australia) (ICER ’08). ACM, New York, NY, USA, 3–14. https://doi.org/10.1145/1404520.1404522Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Tom Crick, James H. Davenport, Paul Hanna, Alastair Irons, and Tom Prickett. 2020. Overcoming the Challenges of Teaching Cybersecurity in UK Computer Science Degree Programmes. In 2020 IEEE Frontiers in Education Conference (FIE). 1–9. https://doi.org/10.1109/FIE44824.2020.9274033Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Sebastian Dziallas and Sally Fincher. 2019. Accountable Disciplinary Knowledge in Computing Education: A Case-Comparative Approach. In Proceedings of the 2019 ACM Conference on International Computing Education Research (Toronto ON, Canada) (ICER ’19). ACM, New York, NY, USA, 1–9. https://doi.org/10.1145/3291279.3339403Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. The Quality Assurance Agency for Higher Education. 2022. Subject Benchmark Statement- Computing. (2022). https://www.qaa.ac.uk/quality-code/subject-benchmark-statements/computingGoogle ScholarGoogle Scholar
  6. UK Government. 2016. National Cyber Security Skills Strategy: Increasing the UK’s Cyber Security Capability. https://www.gov.uk/government/publications/national-cyber-security-strategy-2016-to-2021. [Online: accessed 14-October-2022].Google ScholarGoogle Scholar
  7. U.K. Government. 2016. National Cyber Security Strategy 2016-2021. https://www.gov.uk/government/publications/national-cyber-security-strategy-2016-to-2021. [Online: accessed 14-October-2022].Google ScholarGoogle Scholar
  8. U.K. Government. 2018. Defining the cyber security skills gap. https://publications.parliament.uk/pa/jt201719/jtselect/jtnatsec/706/70605.htm. [Online: accessed 14-October-2022].Google ScholarGoogle Scholar
  9. Hiscox. 2019. 2019 Cyber Readiness Report. https://www.hiscox.com/cybersecurity. [Online: accessed 14-October-2022].Google ScholarGoogle Scholar
  10. Päivi Kinnunen, Matthew Butler, Michael Morgan, Aletta Nylen, Anne-Kathrin Peters, Jane Sinclair, Sara Kalvala, and Erkki Pesonen. 2018. Understanding initial undergraduate expectations and identity in computing studies. European Journal of Engineering Education 43, 2 (2018), 201–218. https://doi.org/10.1080/03043797.2016.1146233Google ScholarGoogle ScholarCross RefCross Ref
  11. NCSC. 2016. CyberInvest. https://www.ncsc.gov.uk/information/cyber-invest. [Online: accessed 14-October-2022].Google ScholarGoogle Scholar
  12. Donna M. Ogle. 1986. K-W-L: A Teaching Model That Develops Active Reading of Expository Text. The Reading Teacher 39, 6 (1986), 564–570. http://www.jstor.org/stable/20199156Google ScholarGoogle ScholarCross RefCross Ref
  13. Cybersecurity Ventures. 2021. 2021 Cybersecurity Jobs Report. https://cybersecurityventures.com/jobs/. [Online: accessed 14-October-2022].Google ScholarGoogle Scholar
  14. Rossouw von Solms and Johan van Niekerk. 2013. From information security to cyber security. Computers and Security 38 (2013), 97 – 102. https://doi.org/10.1016/j.cose.2013.04.004 Cybercrime in the Digital Economy.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Exploring Student Perceptions and Expectations of Cyber Security

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CEP '23: Proceedings of the 7th Conference on Computing Education Practice
      January 2023
      40 pages
      ISBN:9781450398213
      DOI:10.1145/3573260

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 6 January 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate32of71submissions,45%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format