Pedagogical Basis of Live Cybersecurity Exercises
Julkaistu sarjassa
JYU DissertationsTekijät
Päivämäärä
2021Tekijänoikeudet
© The Author & University of Jyväskylä
The digitalisation of societies, working life, and education is changing their forms
and practices. As a component of digitalisation and new ways of operating in a
digital domain, change has also brought with it new risks for the digital operating
environment. ICT infrastructure constitutes a critical new development, and
cybersecurity competency needs for managing digital domains are growing and
evolving. To provide the knowledge and skills needed for working life, education
and training environments must also evolve in response to change. As part of
cybersecurity education, cybersecurity exercises have an established position in
competency development.
This study examined the pedagogical principles of cybersecurity training
and identified the pedagogical requirements for a comprehensive cyber arenastyle
education platform. The learning of individuals was measured through
both on-site and online cybersecurity exercises. Methodologies for evaluating
cybersecurity exercises were studied as part of the exercise lifecycle. The study
also examined the requirements for continuous learning from both curriculum
design and cybersecurity in-service training perspectives.
Keywords: cybersecurity, cybersecurity exercise, cybersecurity education, inservice
training, cyber range, cyber arena, pedagogy
...
Julkaisija
Jyväskylän yliopistoISBN
978-951-39-8738-1ISSN Hae Julkaisufoorumista
2489-9003Julkaisuun sisältyy osajulkaisuja
- Artikkeli I: Hautamäki, J., Karjalainen, M., Hämäläinen, T., & Häkkinen, P. (2019). Cyber security exercise: Literature review of pedagogical methodology. In L. G. Chova, A. L. Martínez, & I. C. Torres (Eds.), INTED 2019: 13th Annual International Technology, Education and Development Conference, Proceedings (pp. 3893–3898). IATED. DOI: 10.21125/inted.2019
- Artikkeli II: Karjalainen, M., Kokkonen, T. & Puuska, S. (2019). Pedagogical aspects of cyber security exercises. In 2019 IEEE European Symposium on Security and Privacy Workshops (Euro S&PW), 103-108. IEEE. DOI: 10.1109/EuroSPW.2019.00018
- Artikkeli III: Karjalainen, M, Puuska, S, & Kokkonen, T. (2020). Measuring learning in a cyber security exercise. In ICETC'20: 2020 12th International Conference on Education Technology and Computers (pp. 205-209). ACM, New York.DOI: 10.1145/3436756.3437046
- Artikkeli IV: Karjalainen, M. & Kokkonen, T. (2020). Comprehensive cyber arena: The next generation cyber range. In 2020 IEEE European Symposium on Security and Privacy Workshops (Euro S&PW) (pp. 11-16). IEEE. DOI: 10.1109/EuroSPW51379.2020.00011
- Artikkeli V: Karjalainen, M. & Kokkonen, T. (2020). Comprehensive cyber arena: The next generation cyber range. In 2020 IEEE European Symposium on Security and Privacy Workshops (Euro S&PW), 11-16. IEEE. DOI: 10.25046/aj050572
- Artikkeli VI: Karjalainen, M., Kokkonen, T., & Taari, N. (2021). Key elements of on-line cyber security exercise and survey of learning during the on-line cyber security exercise. In Cyber Security: Critical Infrastructure Protection. Springer, to appear.
- Artikkeli VII: Saharinen, K., Karjalainen, M., & Kokkonen, T. (2019). A design model for a degree programme in cyber security. In ICETC 2019: Proceedings of the 2019 11th International Conference on Education Technology and Computers. DOI: 10.1145/3369255.3369266 (pp. 3–7). ACM, New York.
- Artikkeli VIII: Rantonen, M. & Karjalainen, M. (2020). Conversion of emerging ICT- technology info curriculum courses. Journal of Strategic Innovation and Sustainability, 15(3), 70–77. DOI: 10.21125/inted.2020.2150
- Artikkeli IX Karjalainen, M. & Ojala, A-L. (2021). Authentic learning environment for in-service trainings of cyber security: A qualitative study. International Journal of Continuing Engineering Education and Life-Long Learning. Accepted/In print.
Metadata
Näytä kaikki kuvailutiedotKokoelmat
- JYU Dissertations [870]
- Väitöskirjat [3599]
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Cyber security exercise : Literature review to pedagogical methodology
Hautamäki, J.; Karjalainen, M.; Hämäläinen, Timo; Häkkinen, Päivi (IATED Academy, 2019)This paper is a literature review, where we try to find out pedagogical principles has used in different virtual or simulated industry learning environments. The purpose is to use these findings to create in the future ... -
Organizational Learning from Cybersecurity Performance : Effects on Cybersecurity Investment Decisions
Shaikh, Faheem Ahmed; Siponen, Mikko (Springer, 2023)IS literature has identified various economic, performance, and environmental factors affecting cybersecurity investment decisions. However, economic modeling approaches dominate, and research on cybersecurity performance ... -
Time, Money, and Freedom – The Costs of Internet Users’ Privacy and Security Concerns
Rauhala, Juhani (Jyväskylän yliopisto, 2021)Internet users with controversial viewpoints may be hesitant to voice their opinions online because they are concerned about consequences that could be inflicted by various entities. Firings, bans from social media, and ... -
Information Security Risk Assessments following Cybersecurity Breaches : The Mediating Role of Top Management Attention to Cybersecurity
Shaikh, Faheem Ahmed; Siponen, Mikko (Elsevier, 2023)Information Systems (IS) research on managerial response to cybersecurity breaches has largely focused on externally oriented actions such as customer redressal and crisis response. Within the firm itself, a breach may be ... -
Desired cybersecurity skills and skills acquisition methods in the organizations
Aaltola, Kirsi; Ruoslahti, Harri; Heinonen, Jarmo (Academic Conferences International Ltd, 2022)Key personnel and their competences play important roles in continuity management and improving resilience of cybersecurity in organizations. Researchers have addressed many topics and studies in the cybersecurity domain. ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.