Näytä suppeat kuvailutiedot

dc.contributor.authorKarjalainen, Mika
dc.date.accessioned2021-06-09T07:37:05Z
dc.date.available2021-06-09T07:37:05Z
dc.date.issued2021
dc.identifier.isbn978-951-39-8738-1
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/76371
dc.description.abstractThe digitalisation of societies, working life, and education is changing their forms and practices. As a component of digitalisation and new ways of operating in a digital domain, change has also brought with it new risks for the digital operating environment. ICT infrastructure constitutes a critical new development, and cybersecurity competency needs for managing digital domains are growing and evolving. To provide the knowledge and skills needed for working life, education and training environments must also evolve in response to change. As part of cybersecurity education, cybersecurity exercises have an established position in competency development. This study examined the pedagogical principles of cybersecurity training and identified the pedagogical requirements for a comprehensive cyber arenastyle education platform. The learning of individuals was measured through both on-site and online cybersecurity exercises. Methodologies for evaluating cybersecurity exercises were studied as part of the exercise lifecycle. The study also examined the requirements for continuous learning from both curriculum design and cybersecurity in-service training perspectives. Keywords: cybersecurity, cybersecurity exercise, cybersecurity education, inservice training, cyber range, cyber arena, pedagogyen
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherJyväskylän yliopisto
dc.relation.ispartofseriesJYU dissertations
dc.relation.haspart<b>Artikkeli I:</b> Hautamäki, J., Karjalainen, M., Hämäläinen, T., & Häkkinen, P. (2019). Cyber security exercise: Literature review of pedagogical methodology. In <i>L. G. Chova, A. L. Martínez, & I. C. Torres (Eds.), INTED 2019: 13th Annual International Technology, Education and Development Conference, Proceedings (pp. 3893–3898). IATED.</i> DOI: <a href="https://doi.org/10.21125/inted.2019"target="_blank">10.21125/inted.2019</a>
dc.relation.haspart<b>Artikkeli II:</b> Karjalainen, M., Kokkonen, T. & Puuska, S. (2019). Pedagogical aspects of cyber security exercises. In <i>2019 IEEE European Symposium on Security and Privacy Workshops (Euro S&PW), 103-108. IEEE.</i> DOI: <a href="https://doi.org/10.1109/EuroSPW.2019.00018"target="_blank"> 10.1109/EuroSPW.2019.00018</a>
dc.relation.haspart<b>Artikkeli III:</b> Karjalainen, M, Puuska, S, & Kokkonen, T. (2020). Measuring learning in a cyber security exercise. In <i>ICETC'20: 2020 12th International Conference on Education Technology and Computers (pp. 205-209). ACM, New York.</i>DOI: <a href="https://doi.org/10.1145/3436756.3437046"target="_blank"> 10.1145/3436756.3437046</a>
dc.relation.haspart<b>Artikkeli IV:</b> Karjalainen, M. & Kokkonen, T. (2020). Comprehensive cyber arena: The next generation cyber range. In <i>2020 IEEE European Symposium on Security and Privacy Workshops (Euro S&PW) (pp. 11-16). IEEE.</i> DOI: <a href="https://doi.org/10.1109/EuroSPW51379.2020.00011"target="_blank"> 10.1109/EuroSPW51379.2020.00011</a>
dc.relation.haspart<b>Artikkeli V:</b> Karjalainen, M. & Kokkonen, T. (2020). Comprehensive cyber arena: The next generation cyber range. In <i>2020 IEEE European Symposium on Security and Privacy Workshops (Euro S&PW), 11-16. IEEE.</i> DOI: <a href="https://doi.org/10.25046/aj050572"target="_blank"> 10.25046/aj050572</a>
dc.relation.haspart<b>Artikkeli VI:</b> Karjalainen, M., Kokkonen, T., & Taari, N. (2021). Key elements of on-line cyber security exercise and survey of learning during the on-line cyber security exercise. In <i>Cyber Security: Critical Infrastructure Protection. Springer, to appear.</i>
dc.relation.haspart<b>Artikkeli VII:</b> Saharinen, K., Karjalainen, M., & Kokkonen, T. (2019). A design model for a degree programme in cyber security. In <i>ICETC 2019: Proceedings of the 2019 11th International Conference on Education Technology and Computers.</i> DOI: <a href="https://doi.org/10.1145/3369255.3369266"target="_blank">10.1145/3369255.3369266</a> (pp. 3–7). ACM, New York.
dc.relation.haspart<b>Artikkeli VIII:</b> Rantonen, M. & Karjalainen, M. (2020). Conversion of emerging ICT- technology info curriculum courses. <i>Journal of Strategic Innovation and Sustainability, 15(3), 70–77.</i> DOI: <a href="https://doi.org/10.21125/inted.2020.2150"target="_blank">10.21125/inted.2020.2150</a>
dc.relation.haspart<b>Artikkeli IX</b> Karjalainen, M. & Ojala, A-L. (2021). Authentic learning environment for in-service trainings of cyber security: A qualitative study. <i>International Journal of Continuing Engineering Education and Life-Long Learning. Accepted/In print.</i>
dc.rightsIn Copyright
dc.titlePedagogical Basis of Live Cybersecurity Exercises
dc.typeDiss.
dc.identifier.urnURN:ISBN:978-951-39-8738-1
dc.relation.issn2489-9003
dc.rights.copyright© The Author & University of Jyväskylä
dc.rights.accesslevelopenAccess
dc.type.publicationdoctoralThesis
dc.format.contentfulltext
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.date.digitised


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright