2020 IEEE 20th International Conference on Advanced Learning Technologies (ICALT) 2020
DOI: 10.1109/icalt49669.2020.00009
|View full text |Cite
|
Sign up to set email alerts
|

AI in Cybersecurity Education- A Systematic Literature Review of Studies on Cybersecurity MOOCs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…This finding supports the results that emerged after the online cyber security and cyber awareness training in the research. Laato et al [28] also examined the effects of variables, such as age and gender, on cyber security knowledge. At the end of the research, it was revealed that male students were more knowledgeable than female students.…”
Section: Discussionmentioning
confidence: 99%
“…This finding supports the results that emerged after the online cyber security and cyber awareness training in the research. Laato et al [28] also examined the effects of variables, such as age and gender, on cyber security knowledge. At the end of the research, it was revealed that male students were more knowledgeable than female students.…”
Section: Discussionmentioning
confidence: 99%
“…For example, work has been done in the use of serious games and the gamification of security research, particularly for the purpose of education including two summits on Gaming, Games, and Gamification in Security Education (3GSE) 3 and more recent works by Antonaci et al and Švábenskỳ et al [5], [6]. Other work has looked at the use of Massive Open Online Courses (MOOCs) to teach cybersecurity [5], [7], [8]. Many organizations provide online cybersecurity learning resources such as the Cyber Security Body of Knowledge (CYBOK) 4 and SAFECode 5 .…”
Section: Related Workmentioning
confidence: 99%
“…NIST SP 800-53 defines a vulnerability as "a weakness in ... an implementation that could be exploited by a threat source". The vulnerability counts in Section VII-D abide by the definition of vulnerability from the Common Vulnerabilities and Exposures (CVE) 7 list that is also used by the U.S. National vulnerability Database 8 . Namely, that a vulnerability is a "flaw in a software, firmware, hardware, or service component resulting from a weakness that can be exploited, causing a negative impact to the confidentiality, integrity, or availability of an impacted component or components" 9 .…”
Section: A Vulnerabilitymentioning
confidence: 99%
“…The banking [1], healthcare [2], education [3], agriculture [4], industrial automation [5], transportation [6], and many different sectors are leveraging the AI technology to reduce human intervention and automating services. The application of AI in cybersecurity and its effectiveness is worth attention as well [7]. However, the application of AI in physical security is still an under-explored area.…”
Section: Introductionmentioning
confidence: 99%