skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Aguayo, Gabriel Castro"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. The enormous advancement of digital technology and the Internet usage have significantly improved our lives, but have threatened our security and privacy as well. Cyberattacks may have harmful long-term implications to individuals and organizations. High school students are accessible targets for various cybercrimes due to the lack of cybersecurity knowledge and cyber-safe practices. It is important that education about cybersecurity awareness and cyber hygiene practices must begin at a young age. Offering cybersecurity knowledge through interactive tutorials and game-based techniques may increase students' interest in this domain. To develop a security mindset and improve the perception and attitude towards cybersecurity, we created an interactive cybersecurity framework for high school students. Through this framework, we attempt to effectively educate students in cybersecurity through interactive animated visualization modules developed in Unity 3D engine, enabling learning of physical, software, and mathematical aspects of cybersecurity. Each topic in the visualization tool is explained in four stages including information, interaction, explanation, and assessment. Several surveys have been conducted to determine whether this framework enhances users' cognitive abilities. 
    more » « less
  2. As technology keeps overgrowing, Internet surfing becomes more popular. As a consequence, users tend to use it for social media, shopping, banking, or any other online services in which they need to put their personal information. These online activities attract malicious computer users to apply cyberattack techniques to steal other user's data. The users become attack victims due to limited understanding of cyberattacks and safety practices. In this paper, we propose a framework development for interactive and engaging cybersecurity education. With the help of the framework, the users will be able to learn different types of cyberattacks and defenses along with the safe cybersecurity practices. We also discuss the current state of the framework and conclude the paper with a discussion on limitations and future work. 
    more » « less