skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: 2017 Proceedings of the Conference on Cybersecurity Education, Research and Practice - NSF Sponsored Graduate Student Workshop section
The published Proceedings of the Conference on Cybersecurity Education, Research and Practice, held annually at Kennesaw State University, GA, USA. CCERP is one of the first major forums for the presentation of pedagogical experience, research findings and industry best practices to support the development and conduct of Information Security curriculum in higher education. Prior to 2016 the conference was branded as the Information Security Curriculum Development Conference. We have rebranded the event to expand the scope of acceptable discussion topics, while retaining a focus on the usability of content for faculty members teaching and researching in information security and cybersecurity. The website at http://digitalcommons.kennesaw.edu/ccerp is also host to the document management system for the Conference.  more » « less
Award ID(s):
1649587
PAR ID:
10024403
Author(s) / Creator(s):
; ;
Date Published:
Journal Name:
Proceedings of the 2017 Conference on Cybersecurity Education, Research and Practice
Volume:
2016
Issue:
1
Page Range / eLocation ID:
1-60
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. The Conference on Cybersecurity Education, Research and Practice, held annually at Kennesaw State University, GA, USA. CCERP is one of the first major forums for the presentation of pedagogical experience, research findings and industry best practices to support the development and conduct of Information Security curriculum in higher education. Prior to 2016 the conference was branded as the Information Security Curriculum Development Conference. We have rebranded the event to expand the scope of acceptable discussion topics, while retaining a focus on the usability of content for faculty members teaching and researching in information security and cybersecurity. The conference's website (http://digitalcommons.kennesaw.edu/ccerp/) is also host to the document management system for the Conference. 
    more » « less
  2. Cybersecurity workforce development is the key to protecting information and information systems, and yet more than 30% of companies are short on security expertise. To address this need, the current authors have developed four cybersecurity education games to teach social engineering, secure online behavior, cyber defense methods, and cybersecurity first principles. These games are intended to recruit the next generation cybersecurity workforce by developing an innovative cybersecurity curriculum and pedagogical methods to provide high school students with hands-on activities in a game-based learning environment. Purdue University Northwest (PNW) offered high school summer camps for 181 high school students in June of 2016 and June of 2017. Out of 181 high school participants, 107 were underrepresented minority students, including African Americans, Hispanics, Asians, and Native Americans. To evaluate the effectiveness of the cybersecurity education games, post-camp surveys were conducted with 154 camp participants. The survey results indicated that the games were very effective in cybersecurity awareness training. Furthermore, the cybersecurity education games were more effective for male students than female students in raising student interest in computer science and cybersecurity. 
    more » « less
  3. Existing research has primarily delved into the realm of computer science outreach aimed at K-12 students, with a focus on both informal and non-formal approaches. However, a noticeable research gap exists when it comes to cybersecurity outreach tailored specifically for underserved secondary school students. This article addresses this void by presenting an iterative pilot of a cybersecurity curriculum. This innovative curriculum integrates a one-week summer camp and a series of 1.5-hour workshops designed to provide students with a comprehensive understanding of cybersecurity. The overarching goal of this approach is to foster wider participation in the field of computing, particularly in the realm of cybersecurity. This research aims to spark interest among students who may currently face limited access to computing resources. The cybersecurity lessons featured in this curriculum adhere to the standards set by Cyber.org, an organization supported by the Cybersecurity and Infrastructure Agency (CISA). Key topics covered include networking, the confidentiality, integrity, and availability (CIA) triad, and operating system security. This paper not only outlines the process of creating and implementing these cybersecurity lessons but also emphasizes the iterative refinement process they underwent. The discussion primarily revolves around the valuable insights gained from implementing this curriculum at two prominent public universities in the eastern United States. By bridging the research gap and focusing on practical applications, this initiative contributes significantly to the broader discourse on cybersecurity education for underserved secondary school students. 
    more » « less
  4. Contribution: A novel proactive and collaborative learning paradigm was proposed to engage learners with different backgrounds and enable effective retention and transfer of the multidisciplinary artificial intelligence (AI)-cybersecurity knowledge. Specifically, the proposed learning paradigm contains: 1) an immersive learning environment to motivate the students for exploring AI/machine learning (ML) development in the context of real-world cybersecurity scenarios by constructing learning models with tangible objects and 2) a proactive education paradigm designed with the use of collaborative learning activities based on game-based learning and social constructivism. Background: Increasing evidence shows that AI techniques can be manipulated, evaded, and misled, which can result in new and profound security implications. There is an education and training gap to foster a qualified cyber-workforce that understands the usefulness, limitations, and best practices of AI technologies in the cybersecurity domain. Efforts have been made to incorporate a comprehensive curriculum to meet the demand. There still remain essential challenges for effectively educating students on the interaction of AI and cybersecurity. Intended Outcomes: A novel proactive and collaborative learning paradigm is proposed to educate and train a qualified cyber-workforce in this new era where security breaches, privacy violations, and AI have become commonplace. Application Design: The development of this learning paradigm is grounded in the pedagogical approaches of technology-mediated learning and social constructivism. Findings: Although the research work is still ongoing, the prototype learning paradigm has shown encouraging results in promoting the learners’ engagement in applied AI learning. 
    more » « less
  5. The U.S. National Science Foundation (NSF) celebrated the 20th anniversary of its research funding programs in cybersecurity, and more generally, secure and trustworthy computing, with a panel session at its conference held in June, 2022. The panel members, distinguished researchers in different research areas of trustworthy computing, were asked to comment on what has been learned, what perhaps should be “unlearned,” what still needs to be learned, and the status of education and training in their respective areas of expertise. Laurie Williams covered enterprise security and measuring security, Gene Tsudik commented on cryptographic security, Trent Jaeger addressed computing infrastructure security, Tadayoshi Kohno reviewed security in cyberphysical systems, and Apu Kapadia provided insights on human-centered security. Michael K. Reiter chaired the panel and moderated questions from the audience. This report provides a brief summary of NSF's research programs in the area and an edited transcript of the panel discussion. 
    more » « less