dc.contributor.author | Karjalainen, Mika | |
dc.date.accessioned | 2021-06-09T07:37:05Z | |
dc.date.available | 2021-06-09T07:37:05Z | |
dc.date.issued | 2021 | |
dc.identifier.isbn | 978-951-39-8738-1 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/76371 | |
dc.description.abstract | The digitalisation of societies, working life, and education is changing their forms
and practices. As a component of digitalisation and new ways of operating in a
digital domain, change has also brought with it new risks for the digital operating
environment. ICT infrastructure constitutes a critical new development, and
cybersecurity competency needs for managing digital domains are growing and
evolving. To provide the knowledge and skills needed for working life, education
and training environments must also evolve in response to change. As part of
cybersecurity education, cybersecurity exercises have an established position in
competency development.
This study examined the pedagogical principles of cybersecurity training
and identified the pedagogical requirements for a comprehensive cyber arenastyle
education platform. The learning of individuals was measured through
both on-site and online cybersecurity exercises. Methodologies for evaluating
cybersecurity exercises were studied as part of the exercise lifecycle. The study
also examined the requirements for continuous learning from both curriculum
design and cybersecurity in-service training perspectives.
Keywords: cybersecurity, cybersecurity exercise, cybersecurity education, inservice
training, cyber range, cyber arena, pedagogy | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Jyväskylän yliopisto | |
dc.relation.ispartofseries | JYU dissertations | |
dc.relation.haspart | <b>Artikkeli I:</b> Hautamäki, J., Karjalainen, M., Hämäläinen, T., & Häkkinen, P. (2019). Cyber security exercise: Literature review of pedagogical methodology. In <i>L. G. Chova, A. L. Martínez, & I. C. Torres (Eds.), INTED 2019: 13th Annual
International Technology, Education and Development Conference, Proceedings
(pp. 3893–3898). IATED.</i> DOI: <a href="https://doi.org/10.21125/inted.2019"target="_blank">10.21125/inted.2019</a> | |
dc.relation.haspart | <b>Artikkeli II:</b> Karjalainen, M., Kokkonen, T. & Puuska, S. (2019). Pedagogical aspects of
cyber security exercises. In <i>2019 IEEE European Symposium on Security and Privacy Workshops (Euro S&PW), 103-108. IEEE.</i> DOI: <a href="https://doi.org/10.1109/EuroSPW.2019.00018"target="_blank"> 10.1109/EuroSPW.2019.00018</a> | |
dc.relation.haspart | <b>Artikkeli III:</b> Karjalainen, M, Puuska, S, & Kokkonen, T. (2020). Measuring learning in a
cyber security exercise. In <i>ICETC'20: 2020 12th International Conference on Education Technology and Computers (pp. 205-209). ACM, New York.</i>DOI: <a href="https://doi.org/10.1145/3436756.3437046"target="_blank"> 10.1145/3436756.3437046</a> | |
dc.relation.haspart | <b>Artikkeli IV:</b> Karjalainen, M. & Kokkonen, T. (2020). Comprehensive cyber arena: The
next generation cyber range. In <i>2020 IEEE European Symposium on Security and Privacy Workshops (Euro S&PW) (pp. 11-16). IEEE.</i> DOI: <a href="https://doi.org/10.1109/EuroSPW51379.2020.00011"target="_blank"> 10.1109/EuroSPW51379.2020.00011</a> | |
dc.relation.haspart | <b>Artikkeli V:</b> Karjalainen, M. & Kokkonen, T. (2020). Comprehensive cyber arena: The
next generation cyber range. In <i>2020 IEEE European Symposium on Security
and Privacy Workshops (Euro S&PW), 11-16. IEEE.</i> DOI: <a href="https://doi.org/10.25046/aj050572"target="_blank"> 10.25046/aj050572</a> | |
dc.relation.haspart | <b>Artikkeli VI:</b> Karjalainen, M., Kokkonen, T., & Taari, N. (2021). Key elements of on-line
cyber security exercise and survey of learning during the on-line cyber security exercise. In <i>Cyber Security: Critical Infrastructure Protection. Springer, to appear.</i> | |
dc.relation.haspart | <b>Artikkeli VII:</b> Saharinen, K., Karjalainen, M., & Kokkonen, T. (2019). A design model for
a degree programme in cyber security. In <i>ICETC 2019: Proceedings of the 2019 11th International Conference on Education Technology and Computers.</i> DOI: <a href="https://doi.org/10.1145/3369255.3369266"target="_blank">10.1145/3369255.3369266</a>
(pp. 3–7). ACM, New York. | |
dc.relation.haspart | <b>Artikkeli VIII:</b> Rantonen, M. & Karjalainen, M. (2020). Conversion of emerging ICT-
technology info curriculum courses. <i>Journal of Strategic Innovation and Sustainability, 15(3), 70–77.</i> DOI: <a href="https://doi.org/10.21125/inted.2020.2150"target="_blank">10.21125/inted.2020.2150</a> | |
dc.relation.haspart | <b>Artikkeli IX</b> Karjalainen, M. & Ojala, A-L. (2021). Authentic learning environment for
in-service trainings of cyber security: A qualitative study. <i>International Journal of Continuing Engineering Education and Life-Long Learning.
Accepted/In print.</i> | |
dc.rights | In Copyright | |
dc.title | Pedagogical Basis of Live Cybersecurity Exercises | |
dc.type | Diss. | |
dc.identifier.urn | URN:ISBN:978-951-39-8738-1 | |
dc.contributor.tiedekunta | Faculty of Information Technology | en |
dc.contributor.tiedekunta | Informaatioteknologian tiedekunta | fi |
dc.contributor.yliopisto | University of Jyväskylä | en |
dc.contributor.yliopisto | Jyväskylän yliopisto | fi |
dc.relation.issn | 2489-9003 | |
dc.rights.copyright | © The Author & University of Jyväskylä | |
dc.rights.accesslevel | openAccess | |
dc.type.publication | doctoralThesis | |
dc.format.content | fulltext | |
dc.rights.url | https://rightsstatements.org/page/InC/1.0/ | |