61
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Cybersecurity Risk Management Scenarios for Teaching Information Security Management

ORCID Icon

References

  • Adolf, D. (2010). Security studies and higher education. Journal of Applied Security Research, 6(1), 124–134. https://doi.org/10.1080/19361610.2010.507597
  • Adolf, D., & Brown, C. J. (2013). Ethics studies in graduate-level security management education programs in the United States. Journal of Applied Security Research, 8(3), 308–342. https://doi.org/10.1080/19361610.2013.794405
  • Albert, S. (2021). Applied critical thinking in strategy: Tools and a simulation using a live case. Journal of Education for Business, 96(4), 252–259. https://doi.org/10.1080/08832323.2020.1792395
  • Alexander, C. (2008). The role of universities in preparing the next generation of security professionals. Journal of Applied Security Research, 4(1–2), 101–108. https://doi.org/10.1080/19361610802210277
  • Allison, J. (2023). Factors for enabling effective student learning within English colleges: The case of computing. PRACTICE Contemporary Issues in Practitioner Education, 5(2), 128–143. https://doi.org/10.1080/25783858.2023.2198143
  • Brooks, N. G., Greer, T. H., & Morris, S. A. (2018). Information systems security job advertisement analysis: Skills review and implications for information systems curriculum. Journal of Education for Business, 93(5), 213–221. https://doi.org/10.1080/08832323.2018.1446893
  • Chernikova, O., Heitzmann, N., Stadler, M., Holzberger, D., Seidel, T., & Fischer, F. (2020). Simulation-based learning in higher education: A meta-analysis. Review of Educational Research, 90(4), 499–541. https://doi.org/10.3102/0034654320933544
  • Crick, T., Davenport, J. H., Irons, A., & Prickett, T. (2019). A UK case study on cybersecurity education and accreditation [Paper presentation]. 2019 IEEE Frontiers in Education Conference (FIE), Covington (pp. 1–9). IEEE. https://doi.org/10.1109/FIE43999.2019.9028407
  • England, T. K., Nagel, G. L., & Salter, S. P. (2020). Using collaborative learning to develop students’ soft skills. Journal of Education for Business, 95(2), 106–114. https://doi.org/10.1080/08832323.2019.1599797
  • Garrison, J. A., Redd, S. B., & Carter, R. G. (2010). Energy security under conditions of uncertainty: Simulating a comparative bureaucratic politics approach. Journal of Political Science Education, 6(1), 19–48. https://doi.org/10.1080/15512160903467653
  • Grimaila, M. R. (2004). A novel scenario-based information security management exercise [Paper presentation]. Proceedings of the 1st Annual Conference on Information Security Curriculum development – InfoSecCD ’04 (pp. 66–70). New York. ACM Press. https://doi.org/10.1145/1059524.1059538
  • Hajny, J., Ricci, S., Piesarskas, E., Levillain, O., Galletta, L., & De Nicola, R. (2021). Framework, tools and good practices for cybersecurity curricula. IEEE Access, 9, 94723–94747. https://doi.org/10.1109/ACCESS.2021.3093952
  • Haug, J. C., Berns Wright, L., & Allen Huckabee, W. (2019). Undergraduate business students’ perceptions about engagement. Journal of Education for Business, 94(2), 81–91. https://doi.org/10.1080/08832323.2018.1504738
  • St. John, J., St. John, K., & St. John C. (2023). Learning by facilitating: A project-based interdisciplinary approach. Journal of Education for Business, 98(7), 404–411. https://doi.org/10.1080/08832323.2023.2196049
  • Joint Task Force on Computing Curricula: Association for Computing Machinery (ACM) and IEEE Computer Society. (2013). Computer science curricula 2013: Curriculum guidelines for undergraduate degree programs in computer science. Association for Computing Machinery.
  • Joint Task Force on Cybersecurity Education. (2017). Cybersecurity curricula 2017: Curriculum guidelines for post-secondary degree programs in cybersecurity. Association for Computing Machinery.
  • Jones, K. S., Namin, A. S., & Armstrong, M. E. (2018). The core cyber-defense knowledge, skills, and abilities that cybersecurity students should learn in school: Results from interviews with cybersecurity professionals. ACM Transactions on Computing Education, 18(3), 1–12. https://doi.org/10.1145/3152893
  • Maguire, J., English, R., & Draper, S. (2019). Data protection and privacy regulations as an inter-active-constructive practice [Paper presentation]. In Proceedings of the 3rd Conference on Computing Education Practice, New York. ACM. https://doi.org/10.1145/3294016.3294021
  • Martin, A., Rashid, A., Chivers, H., Schneider, S., Lupu, E., & Danezis, G. (2021). Introduction to CyBOK knowledge areas. Technical Report. Bristol Cyber Security Group.
  • Mehall, S. (2022). Comparing in-class scenario-based learning to scenario-based eLearning through an interactive, self-paced case study. Journal of Education for Business, 97(5), 305–311. https://doi.org/10.1080/08832323.2021.1943294
  • Meibauer, G., & Aagaard Nøhr, A. (2018). Teaching experience: How to make and use PowerPoint-based interactive simulations for undergraduate IR teaching. Journal of Political Science Education, 14(1), 42–62. https://doi.org/10.1080/15512169.2017.1377083
  • Ojasalo, J. (2011). Development process of a master’s degree program in security management. Journal of Applied Security Research, 6(3), 394–415. https://doi.org/10.1080/19361610.2011.580429
  • Omiya, T., & Kadobayashi, Y. (2019). Secu-One: A proposal of cyber security exercise tool for improving security management skill [Paper presentation]. Proceedings of the 2019 7th International Conference on Information and Education Technology - ICIET 2019 (pp. 259–268). , New York: ACM.
  • Parrish, A., Impagliazzo, J., Raj, R. K., Santos, H., Asghar, M. R., Jøsang, A., Pereira, T., & Stavrou, E. (2018). Global perspectives on cybersecurity education for 2030: A case for a meta-discipline [Paper presentation]. Proceedings Companion of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (pp. 36–54). New York: ACM. https://doi.org/10.1145/3293881.3295778
  • Ricci, S., Janout, V., Parker, S., Jerabek, J., Hajny, J., Chatzopoulou, A., & Badonnel, R. (2021). PESTLE analysis of cybersecurity education [Paper presentation]. The 16th International Conference on Availability, Reliability and Security (pp. 1–8). New York. ACM. https://doi.org/10.1145/3465481.3469184
  • Ruiz, N., Shukla, P., & Kazemian, H. (2021). Cybersecurity Index for undergraduate computer science courses in the UK. Journal of Applied Security Research, 16(4), 456–469. https://doi.org/10.1080/19361610.2020.1798173
  • Samaras, S. A., Adkins, C. L., & White, C. D. (2022). Developing critical thinking skills: Simulations vs. cases. Journal of Education for Business, 97(4), 270–276. https://doi.org/10.1080/08832323.2021.1932703
  • Sauls, J., & Gudigantala, N. (2013). Preparing information systems (IS) graduates to meet the challenges of global IT security: Some suggestions. Journal of Information Systems Education, 24(1), 71–73.
  • Scager, K., Akkerman, S. F., Pilot, A., & Wubbels, T. (2017). Teacher dilemmas in challenging students in higher education. Teaching in Higher Education, 22(3), 318–335. https://doi.org/10.1080/13562517.2016.1248392
  • Shadbolt, N. (2016). Shadbolt review of computer sciences degree accreditation and graduate employability. Department for Business, Innovation and Skills.
  • The Quality Assurance Agency. (2022). Subject benchmark statement: Computing. Technical Report March. The Quality Assurance Agency for Higher Education.
  • Trilling, R. (2018). Creating a new academic discipline: Cybersecurity management education [Paper presentation]. Proceedings of the 19th Annual SIG Conference on Information Technology Education (pp. 78–83). New York: ACM.
  • Van-Laar, E., Alexander, J. A. M., Van-Deursen, J. A., Van-Dijk., & J., De-Haan. (2017). The relation between 21st-century skills and digital skills: A systematic literature review. Computers in Human Behavior, 72, 577–588.
  • Wen, S.-F., & Katt, B. (2019). Toward a context-based approach for software security learning. Journal of Applied Security Research, 14(3), 288–307. https://doi.org/10.1080/19361610.2019.1585704
  • Yang, S. C. (2019). A curriculum model for cybersecurity master’s program: A survey of AACSB-accredited business schools in the United States. Journal of Education for Business, 94(8), 520–530. https://doi.org/10.1080/08832323.2019.1590296
  • Yang, S. C. (2021). A meta-model of cybersecurity curriculums: Assessing cybersecurity curricular frameworks for business schools. Journal of Education for Business, 96(2), 99–110. https://doi.org/10.1080/08832323.2020.1757594

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.