203
Views
1
CrossRef citations to date
0
Altmetric
Articles

Cybersecurity Index for Undergraduate Computer Science Courses in the UK

ORCID Icon, &

References

  • ACM. (2017). Cybersecurity curricula 2017; IEEE-CS; AIS SIGSEC; IFIP WG 11.8.
  • Aggarwal, G., Bursztein, E., Jackson, C., & Boneh, D. (2010, August 11–13). An analysis of private browsing modes in modern browsers [Paper presentation]. Proceedings of the 19th USENIX Security Symposium, Washington, D.C.
  • Alexandron, G., Armoni, M., Gordon, M., & Harel, D. (2017). Teaching scenario-based programming: An additional paradigm for the high school computer science curriculum, Part 1. Computing in Science & Engineering, 19(5), 58–67. https://doi.org/10.1109/MCSE.2017.3421557
  • Bloom, B. S. (1956). Taxonomy of educational objectives. Handbook I: The cognitive domain. Pearson.
  • Bell, T., Andreae, P., & Lambert, L. (2010). Computer science in New Zealand high schools. Proceedings of the twelfth Australasian Conference on Computing Education, 103, 15–22.
  • Brown, N. C. C., Kölling, M., Crick, T., Jones, S. P., Humphreys, S., & Sentance, S. (2013). Bringing computer science back into schools: Lessons from the UK [Paper presentation]. SIGCSE Conference, Denver, CO.
  • Brown, N. C. C., Sentance, S., Crick, T., & Humphreys, S. (2014). Restart: The resurgence of computer science in UK schools. ACM Transactions on Computing Education, 14(2), 1–22. https://doi.org/10.1145/2602484
  • Cybermetrics. (2018, February 4). Webometrics. http://www.webometrics.info.
  • Dawson, M. (2017). Hyper-connectivity: Intricacies of national and international [Doctoral thesis, London Metropolitan].
  • Ferrari, A. (2013). DIGCOMP: A framework for developing and understanding digital competence in Europe. European Commission Institute for Prospective Technological Studies, Seville.
  • Filatov, A. (2015, February 25). Data security solution. http://pt.slideshare.net/AndSor/dss-symantec-pgp-encryption-fortress2014-arrowecs-roadshow-baltics.
  • Fu, K., Sit, E., Smith, K., & Feamster, N. (2001, August 15–17). Dos and don'ts of client authentication on the web [Paper presentation]. Proceedings of the 10th USENIX Security Symposium, Washington, D.C.
  • Gal-Ezer, J., Beeri, C., Harel, D., & Yehudai, A. (1995). A high-school program in computer science. Computer Magazine, 28(10), 73–80. https://doi.org/10.1109/2.467599
  • Ghostcrypt. (2018). Ghostcrypt. https://www.ghostcrypt.org/.
  • HESA. (2018). Higher education student statistics: UK, 2016/17. Promenade.
  • IDRIX. (2018). VeraCrypt. https://veracrypt.codeplex.com/
  • IT Services, The University of Manchester. (2014). Encryption Software. http://www.itservices.manchester.ac.uk/cybersecurity/advice/encryption/
  • Kazemian, H., Ruiz, N., & Shukla, P. (2020, April 27). Privacy in the first line of the first code. https://science.sciencemag.org/content/317/5842/1178/tab-e-letters
  • Oh, J., Lee, S., & Lee, S. (2011). Advanced evidence collection and analysis of web browser activity. Digital Investigation, 8, S62–S70. https://doi.org/10.1016/j.diin.2011.05.008
  • Passey, D. (2017). Computer science (CS) in the Compulsory Education Curriculum: Implications for future research. Education and Information Technologies, 22(2), 421–443. https://doi.org/10.1007/s10639-016-9475-z
  • Pittman, J. M., & Pike, R. E. (2016). An observational study of peer learning for high school students at a cybersecurity camp. Information Systems Education Journal, 4(3), 4–13.
  • Ramirez, R. B. (2017). Making cybersecurity interdisciplinary: Recommendations for a novel curriculum and terminology harmonization [Master’s thesis, Massachusetts Institute of Technology].
  • Reza, A., Islam, S., Jahankhani, H., & Al-Nemrat, A. (2013). Analyzing human factors for an effective information security management system. International Journal of Secure Software Engineering, 4(1), 50–74.
  • Ruiz, R. (2019). A study of the UK undergraduate computer science curriculum: A vision of cybersecurity [Paper presentation]. IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), London. https://doi.org/10.1109/ICGS3.2019.8688137
  • Ruiz, R, Amatte, F. P., & Park, K. J. B. (2012). Tornando Pública a Navegação “InPrivate” [Paper presentation]. Proceedings of the IcoFCS2012, Brasilia, Brazil.
  • Ruiz, R., Amatte, F. P., & Park, K. J. B. (2014a). Opening the “Private Browsing” data – Acquiring evidence of browsing activities [Paper presentation]. Proceedings of the International Conference on Information Security and Cyber Forensics, Kuala Terengganu.
  • Ruiz, R., Amatte, F. P., & Park, K. J. B. (2014b). Security issue on cloned truecrypt containers and backup headers [Paper presentation]. The International Conference on Cyber-Crime Investigation and Cybersecurity (ICCICS2014), Kuala Lumpur, Malaysia.
  • Ruiz, R., Park, K., Amatte, F., & Winter, R. (2015). Overconfidence: Personal behaviors regarding privacy that allows the leakage of information in private browsing mode. International Journal of Cyber-Security and Digital Forensics, 4(3), 404–416.
  • Ruiz, R., & Winter, R. (2016). Lazarus: Data Leakage with PGP and Resurrection of the Revoked User. Journal of Cybersecurity and Mobility, 5(2), 1–14. https://doi.org/10.13052/jcsm2245-1439.521
  • Ruiz, R., Winter, R., Park, K., & Amatte, F. (2017). The leakage of passwords from home banking sites: A threat to global cybersecurity? Journal of Payments Strategy and Systems, 11(2), 174–186.
  • Ruiz, R., Winter, R., Park, K., & Amatte, F. (2015). Apoc@lypse: The end of antivirus. CreateSpace Independent Publishing Plataform.
  • Sadok, M., & Bednar, P. (2015). Understanding security practices deficiencies: A contextual analysis. In S. Furnell, & N. Clarke (Eds.), Human aspects of information security and assurance conference proceedings (pp. 151–160). Plymouth.
  • Sentance, S., Dorling, M., McNicol, A., & Crick, T. (2012). Grand challenges for the UK: upskilling teachers to teach computer science within the secondary curriculum [Paper presentation]. Proceedings of the 7th Workshop in Primary and Secondary Computing Education, Hamburg.
  • Shoemaker, D., Kohnke, A., & Sigler, K. (2016). The complete guide to cybersecurity risks and controls (Internal Audit and IT Audit. CRC Press.
  • Symantec. (2016, October 5). Symantec desktop encryption user manual. https://symwisedownload.symantec.com/resources/sites/SYMWISE/content/live/DOCUMENTATION/6000/DOC6205/en_US/symcEncrDesktop_103_win_usersguide_en.pdf?__gda__=1475850268_90925006947a919661523e2f67f5cea7
  • TrueCrypt Foundation. (2013, February 15). Truecrypt. http://truecrypt.org.
  • Universities Central Council on Admissions. (2018, February 1). https://www.ucas.com/ucas-terms-explained
  • University of Exeter. (2014, April 25). Important information for users of truecrypt on windows laptops. http://www.exeter.ac.uk/ig/infosec/encryptionforlaptops/usingtruecrypt/
  • University of Michigan. (2018). Safe computing. https://www.safecomputing.umich.edu/be-aware/privacy/resources.
  • Wake Forest University. (2014, April 25). TrueCrypt install. http://users.wfu.edu/yipcw/is/truecrypt/
  • Wake Forest University School of Business. (2018). MSBA software installation. business.wfu.edu/msba-software.
  • Wang, P., Dawson, M., & Williams, K. L. (2019). Improving cyber defense education through national standard alignment: Case studies. In National security: Breakthroughs in research and practice (pp. 78–91). Information Resources Management Association, IGI Global.
  • Winter, R., & Ruiz, R. (2016). Corrosive secrecy and confidence: The paradox among bypassing cryptographic software, loss of privacy and information security. Cybersecurity Review, 66–74.
  • World Economic Forum. (2018). Global risks report 2018.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.