Skip to main content

Cyber Security Education Using Integrative Learning Module for an Optimum Learning Experience

  • Conference paper
Advances in Visual Informatics (IVIC 2019)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 11870))

Included in the following conference series:

  • 1738 Accesses

Abstract

Since our world is getting more connected through information technology, home internet users, businesses, and the country’s security and defences are prone to threats by cyber-attacks. Therefore, it is important to improve the nation’s cyber security preparedness, increase public awareness of cyber security issues, and increase the number of trained cyber security specialists. For these reasons, cyber security education is essential in preparing computer users with the knowledge and skills that will significantly improve security and lower the risks related to the negative effect of digital ecosystems. To deliver an effective cyber security education, it is important to translate conceptual knowledge into practice and promote lifelong learning in cyber security. Scholars have proven that exposure to knowledge and practice is effective in eliminating the gaps between perceived concepts and actual knowledge. Thus, there is a need for a cyber security education system using an integrative learning module for an optimum learning experience from an early age. Therefore, this paper presents a student-centric hands-on system for learning about cyber security. The interactive system was developed based on the ADDIE model to provide lifelong cyber security education using an integrative learning module for an optimum learning experience for secondary students.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Choo, K.K.R.: The cyber threat landscape: challenges and future research directions. Comput. Secur. 30(8), 719–731 (2011)

    Article  Google Scholar 

  2. Harib, A.R.H., Sarijan, S., Hussin, N.: Information security challenges: a malaysian context. Int. J. Acad. Res. Bus. Soc. Sci. 7(9), 397–403 (2017)

    Google Scholar 

  3. Dutta, S., Mathur, R.: Cybersecurity - an integral part of STEM. In: IEEE 2nd Integrated STEM Education Conference, ISEC (2012)

    Google Scholar 

  4. Turner, G.E., Deemer, E.D., Tims, H.E., Corbett, K., Mhire, J.: Cyber value and interest development: assessment of a STEM career intervention for high school students. Electron. J. Sci. Educ. 18(1), 1–15 (2014)

    Google Scholar 

  5. Flatt, H., Schriegel, S.: Analysis of the cyber-security of industry 4.0 technologies based on RAMI 4.0 and identification of requirements. In: 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), pp. 1–4. IEEE (2016)

    Google Scholar 

  6. Conteh, N.Y., Schmick, P.J.: Cybersecurity: risks, vulnerabilities and countermeasures to prevent social engineering attacks. Int. J. Adv. Comput. Res. 6(23), 31–38 (2016)

    Article  Google Scholar 

  7. Carr, M.: Public-private partnerships in national cyber-security strategies. Int. Aff. 1, 190–209 (2016)

    Google Scholar 

  8. Jidiga, G.R., Sammulal, P.: The need of awareness in cyber security with a case study. In: 2013 4th International Conference on Computing, Communications and Networking Technologies, ICCCNT (2013)

    Google Scholar 

  9. Ramakrisnan, P., Jaafar, A.: Motivation design methodology for online knowledge sharing interface. In: Badioze Zaman, H., et al. (eds.) Advances in Visual Informatics. IVIC 2017. LNCS, vol. 10645, pp. 224–232. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-70010-6_21

    Chapter  Google Scholar 

  10. Beuran, R., Chinen, K., Tan, Y., Shinoda, Y.: Towards effective cybersecurity education and training. Sch. Inf. Sci. Japan Adv. Inst. Sci. Technol. (April), 1–16 (2016)

    Google Scholar 

  11. Kosseff, J.: Defining cyber-security. Iowa Law Rev. 103(3), 985–1031 (2018)

    Google Scholar 

  12. Bogdanoski, M., Peterski, D.: Cyber terrorism – global security threat. Int. Sci. Defence Secur. Peace J. 13, 59–72 (2013)

    Google Scholar 

  13. Goolsby, R., Shanley, L., Lovell, A.: On cybersecurity, crowdsourcing, and social cyber-attack. Office of Naval Research, Arlington, VA (2013)

    Google Scholar 

  14. Lu, Y., Da Xu, L.: Internet of things (IoT) cybersecurity research: a review of current research topics. IEEE Internet Things J. 4662(C), 1 (2018)

    Google Scholar 

  15. Pescatore, J.: Securing the internet of things survey. SANS Inst. (2014)

    Google Scholar 

  16. Grabosky, P.: Organised crime and the internet. RUSI J. 158(5), 18–25 (2013)

    Article  Google Scholar 

  17. Muniandy, L., Muniandy, B.: State of cyber security and the factors governing its protection in Malaysia. Int. J. Appl. Sci. Technol. 2(4), 106–112 (2012)

    Google Scholar 

  18. Kumar, A.: Malaysia’s cyber warfare training targets 10,000 security professionals by 2020 (2016). https://www.mis-asia.com/tech/security/malaysias-cyber-warfare-training-targets-10000-security-professionals-by-2020/. Accessed: 06 Aug 2018

  19. LeClair, J., Abraham, S., Shih, L.: An interdisciplinary approach to educating an effective cyber security workforce. Proceedings 2013 InfoSecCD 2013: Information Security Curriculum Development Conference - InfoSecCD 2013, pp. 71–78 (2013)

    Google Scholar 

  20. Moravec, T., Štěpánek, P., Valenta, P.: The influence of using e-learning tools on the results of students at the tests. Proc. - Soc. Behav. Sci. 176, 81–86 (2015)

    Article  Google Scholar 

  21. Cheung, R., Cohen, J., Lo, H., Elia, F.: Challenge based learning in cybersecurity education. In: Proceedings of International Conference on Security Management (2011)

    Google Scholar 

  22. McCrohan, K.F., Engel, K., Harvey, J.W.: Influence of awareness and training on cyber security. J. Internet Commer. 9(1), 23–41 (2010)

    Article  Google Scholar 

  23. Ning, W.: The key features and applications of newmedia interactive design. In: Proceedings of 2014 IEEE International Conference on Ubiquitous Intelligence and Computing, 2014 IEEE International Conference on Autonomic and Trusted Computing, 2014 IEEE International Conference on Scalable Computing and Communications and Its Associated System, pp. 727–731 (2014)

    Google Scholar 

  24. Kattoua, T., Al-Lozi, M., Alrowwad, A.: A review of literature on knowledge management using ICT in higher education. Int. J. Computer Technol. Appl. 7(5), 754–762 (2016)

    Google Scholar 

  25. Tarhini, A., Hone, K., Liu, X.: Measuring the moderating effect of gender and age on e-learning acceptance in England: a structural equation modeling approach for an extended technology acceptance model. J. Educ. Comput. Res. 51(2), 163–184 (2014)

    Article  Google Scholar 

  26. Salter, S.M., Karia, A., Sanfilippo, F.M., Clifford, R.M.: Effectiveness of E-learning in pharmacy education. Am. J. Pharm. Educ. 78(4), 16–22 (2014)

    Article  Google Scholar 

  27. Suri, G., Navkiran, Kaur, G., Sharma, S.: Factors influencing e-learning among university students. Int. J. Mark. Bus. Commun. 5(1) (2016)

    Google Scholar 

  28. Perrin, D.G., Perrin, E., Muirhead, B.: Advantages and disadvantages of adopting e-learning in higher education. Int. J. Instr. Technol. Distance Learn. 12(1), 29–33 (2015)

    Google Scholar 

  29. Von Solms, R., Van Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97–102 (2013)

    Article  Google Scholar 

  30. Abraham, S., Shih, L.: Towards an integrative learning approach in cybersecurity education, vol. 2, no. 2, p. 1 (2016)

    Google Scholar 

  31. Rjaibi, N., Rabai, L., Aissa, A., Louadi, M.: Cyber security measurement in depth for e-learning systems. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(11), 1–15 (2012)

    Google Scholar 

  32. Martínez-Caro, E., Cegarra-Navarro, J.G., Cepeda-Carrión, G.: An application of the performance-evaluation model for e-learning quality in higher education. Total Qual. Manag. Bus. Excell. 26(5–6), 632–647 (2015)

    Article  Google Scholar 

  33. Cheok, M.L., Wong, S.L.: Predictors of e-learning satisfaction in teaching and learning for school teachers: a literature review. Int. J. Instr. 8(1), 75–90 (2016)

    Google Scholar 

  34. LeFebvre, R.: The human element in cyber security: a study on student motivation to act. In: Proceedings of 2012 Information Security Curriculum Development Conference (Infosec Cd 2012), pp. 1–8 (2012)

    Google Scholar 

  35. Wiphasith, H., Narumol, R., Sumalee, C.: the design of the contents of an e-learning for teaching M.5 English language using ADDIE model. Int. J. Inf. Educ. Technol. 6(2), 127–131 (2014)

    Google Scholar 

  36. Nadiyah, R.S., Faaizah, S.: The development of online project based collaborative learning using ADDIE model. Proc. - Soc. Behav. Sci. 195, 1803–1812 (2015)

    Article  Google Scholar 

  37. Cheung, L.: Using the ADDIE model of instructional design to teach chest radiograph interpretation. J. Biomed. Educ. 2016, 1–6 (2016)

    Article  Google Scholar 

  38. He, R.Y.: Design and implementation of web based on laravel framework. In: ICCSET 2014, pp. 301–304 (2015)

    Google Scholar 

  39. Mahalle, P.N., Anggorojati, B., Prasad, N.R., Prasad, R.: Identity authentication and capability based access control (IACAC) for the internet of things. J. Cyber Secur. Mobil. 1, 309–348 (2013)

    Google Scholar 

Download references

Acknowledgements

This work was financially supported by the Ministry of Education, Malaysia under KTP grant KTP: LL (R2) – CS/1 (UPNM-17).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Noor Afiza Mat Razali .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Cite this paper

Mat Razali, N.A., Ishak, K.K., Fadzli, M.A.I.M., Saad, N.J.A.M. (2019). Cyber Security Education Using Integrative Learning Module for an Optimum Learning Experience. In: Badioze Zaman, H., et al. Advances in Visual Informatics. IVIC 2019. Lecture Notes in Computer Science(), vol 11870. Springer, Cham. https://doi.org/10.1007/978-3-030-34032-2_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-34032-2_35

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-34031-5

  • Online ISBN: 978-3-030-34032-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics