Abstract
Since our world is getting more connected through information technology, home internet users, businesses, and the country’s security and defences are prone to threats by cyber-attacks. Therefore, it is important to improve the nation’s cyber security preparedness, increase public awareness of cyber security issues, and increase the number of trained cyber security specialists. For these reasons, cyber security education is essential in preparing computer users with the knowledge and skills that will significantly improve security and lower the risks related to the negative effect of digital ecosystems. To deliver an effective cyber security education, it is important to translate conceptual knowledge into practice and promote lifelong learning in cyber security. Scholars have proven that exposure to knowledge and practice is effective in eliminating the gaps between perceived concepts and actual knowledge. Thus, there is a need for a cyber security education system using an integrative learning module for an optimum learning experience from an early age. Therefore, this paper presents a student-centric hands-on system for learning about cyber security. The interactive system was developed based on the ADDIE model to provide lifelong cyber security education using an integrative learning module for an optimum learning experience for secondary students.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Choo, K.K.R.: The cyber threat landscape: challenges and future research directions. Comput. Secur. 30(8), 719–731 (2011)
Harib, A.R.H., Sarijan, S., Hussin, N.: Information security challenges: a malaysian context. Int. J. Acad. Res. Bus. Soc. Sci. 7(9), 397–403 (2017)
Dutta, S., Mathur, R.: Cybersecurity - an integral part of STEM. In: IEEE 2nd Integrated STEM Education Conference, ISEC (2012)
Turner, G.E., Deemer, E.D., Tims, H.E., Corbett, K., Mhire, J.: Cyber value and interest development: assessment of a STEM career intervention for high school students. Electron. J. Sci. Educ. 18(1), 1–15 (2014)
Flatt, H., Schriegel, S.: Analysis of the cyber-security of industry 4.0 technologies based on RAMI 4.0 and identification of requirements. In: 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), pp. 1–4. IEEE (2016)
Conteh, N.Y., Schmick, P.J.: Cybersecurity: risks, vulnerabilities and countermeasures to prevent social engineering attacks. Int. J. Adv. Comput. Res. 6(23), 31–38 (2016)
Carr, M.: Public-private partnerships in national cyber-security strategies. Int. Aff. 1, 190–209 (2016)
Jidiga, G.R., Sammulal, P.: The need of awareness in cyber security with a case study. In: 2013 4th International Conference on Computing, Communications and Networking Technologies, ICCCNT (2013)
Ramakrisnan, P., Jaafar, A.: Motivation design methodology for online knowledge sharing interface. In: Badioze Zaman, H., et al. (eds.) Advances in Visual Informatics. IVIC 2017. LNCS, vol. 10645, pp. 224–232. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-70010-6_21
Beuran, R., Chinen, K., Tan, Y., Shinoda, Y.: Towards effective cybersecurity education and training. Sch. Inf. Sci. Japan Adv. Inst. Sci. Technol. (April), 1–16 (2016)
Kosseff, J.: Defining cyber-security. Iowa Law Rev. 103(3), 985–1031 (2018)
Bogdanoski, M., Peterski, D.: Cyber terrorism – global security threat. Int. Sci. Defence Secur. Peace J. 13, 59–72 (2013)
Goolsby, R., Shanley, L., Lovell, A.: On cybersecurity, crowdsourcing, and social cyber-attack. Office of Naval Research, Arlington, VA (2013)
Lu, Y., Da Xu, L.: Internet of things (IoT) cybersecurity research: a review of current research topics. IEEE Internet Things J. 4662(C), 1 (2018)
Pescatore, J.: Securing the internet of things survey. SANS Inst. (2014)
Grabosky, P.: Organised crime and the internet. RUSI J. 158(5), 18–25 (2013)
Muniandy, L., Muniandy, B.: State of cyber security and the factors governing its protection in Malaysia. Int. J. Appl. Sci. Technol. 2(4), 106–112 (2012)
Kumar, A.: Malaysia’s cyber warfare training targets 10,000 security professionals by 2020 (2016). https://www.mis-asia.com/tech/security/malaysias-cyber-warfare-training-targets-10000-security-professionals-by-2020/. Accessed: 06 Aug 2018
LeClair, J., Abraham, S., Shih, L.: An interdisciplinary approach to educating an effective cyber security workforce. Proceedings 2013 InfoSecCD 2013: Information Security Curriculum Development Conference - InfoSecCD 2013, pp. 71–78 (2013)
Moravec, T., Štěpánek, P., Valenta, P.: The influence of using e-learning tools on the results of students at the tests. Proc. - Soc. Behav. Sci. 176, 81–86 (2015)
Cheung, R., Cohen, J., Lo, H., Elia, F.: Challenge based learning in cybersecurity education. In: Proceedings of International Conference on Security Management (2011)
McCrohan, K.F., Engel, K., Harvey, J.W.: Influence of awareness and training on cyber security. J. Internet Commer. 9(1), 23–41 (2010)
Ning, W.: The key features and applications of newmedia interactive design. In: Proceedings of 2014 IEEE International Conference on Ubiquitous Intelligence and Computing, 2014 IEEE International Conference on Autonomic and Trusted Computing, 2014 IEEE International Conference on Scalable Computing and Communications and Its Associated System, pp. 727–731 (2014)
Kattoua, T., Al-Lozi, M., Alrowwad, A.: A review of literature on knowledge management using ICT in higher education. Int. J. Computer Technol. Appl. 7(5), 754–762 (2016)
Tarhini, A., Hone, K., Liu, X.: Measuring the moderating effect of gender and age on e-learning acceptance in England: a structural equation modeling approach for an extended technology acceptance model. J. Educ. Comput. Res. 51(2), 163–184 (2014)
Salter, S.M., Karia, A., Sanfilippo, F.M., Clifford, R.M.: Effectiveness of E-learning in pharmacy education. Am. J. Pharm. Educ. 78(4), 16–22 (2014)
Suri, G., Navkiran, Kaur, G., Sharma, S.: Factors influencing e-learning among university students. Int. J. Mark. Bus. Commun. 5(1) (2016)
Perrin, D.G., Perrin, E., Muirhead, B.: Advantages and disadvantages of adopting e-learning in higher education. Int. J. Instr. Technol. Distance Learn. 12(1), 29–33 (2015)
Von Solms, R., Van Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97–102 (2013)
Abraham, S., Shih, L.: Towards an integrative learning approach in cybersecurity education, vol. 2, no. 2, p. 1 (2016)
Rjaibi, N., Rabai, L., Aissa, A., Louadi, M.: Cyber security measurement in depth for e-learning systems. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(11), 1–15 (2012)
Martínez-Caro, E., Cegarra-Navarro, J.G., Cepeda-Carrión, G.: An application of the performance-evaluation model for e-learning quality in higher education. Total Qual. Manag. Bus. Excell. 26(5–6), 632–647 (2015)
Cheok, M.L., Wong, S.L.: Predictors of e-learning satisfaction in teaching and learning for school teachers: a literature review. Int. J. Instr. 8(1), 75–90 (2016)
LeFebvre, R.: The human element in cyber security: a study on student motivation to act. In: Proceedings of 2012 Information Security Curriculum Development Conference (Infosec Cd 2012), pp. 1–8 (2012)
Wiphasith, H., Narumol, R., Sumalee, C.: the design of the contents of an e-learning for teaching M.5 English language using ADDIE model. Int. J. Inf. Educ. Technol. 6(2), 127–131 (2014)
Nadiyah, R.S., Faaizah, S.: The development of online project based collaborative learning using ADDIE model. Proc. - Soc. Behav. Sci. 195, 1803–1812 (2015)
Cheung, L.: Using the ADDIE model of instructional design to teach chest radiograph interpretation. J. Biomed. Educ. 2016, 1–6 (2016)
He, R.Y.: Design and implementation of web based on laravel framework. In: ICCSET 2014, pp. 301–304 (2015)
Mahalle, P.N., Anggorojati, B., Prasad, N.R., Prasad, R.: Identity authentication and capability based access control (IACAC) for the internet of things. J. Cyber Secur. Mobil. 1, 309–348 (2013)
Acknowledgements
This work was financially supported by the Ministry of Education, Malaysia under KTP grant KTP: LL (R2) – CS/1 (UPNM-17).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Mat Razali, N.A., Ishak, K.K., Fadzli, M.A.I.M., Saad, N.J.A.M. (2019). Cyber Security Education Using Integrative Learning Module for an Optimum Learning Experience. In: Badioze Zaman, H., et al. Advances in Visual Informatics. IVIC 2019. Lecture Notes in Computer Science(), vol 11870. Springer, Cham. https://doi.org/10.1007/978-3-030-34032-2_35
Download citation
DOI: https://doi.org/10.1007/978-3-030-34032-2_35
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34031-5
Online ISBN: 978-3-030-34032-2
eBook Packages: Computer ScienceComputer Science (R0)