A Cybersecurity Educated Community

Norita Ahmad, Phillip A. Laplante, Joanna F. Defranco, Mohamad Kassab

Research output: Contribution to journalArticlepeer-review

Abstract

The need for cybersecurity education has grown significantly for all citizens. However, cybersecurity education has not been adequately addressed in fields outside of this domain. Cybersecurity concerns increase every time a new device connects to a network. As such, we need to increase involvement and advancement of cybersecurity education at all levels and in every discipline. Education, audit, and enforcement regarding cybersecurity are critical aspects and are the responsibility of all system stakeholders. It is no longer enough to rely on the security team to be responsible for combating cyber threats. Involvement and commitment from all stakeholders are essential and universal and begins with a cross-disciplinary reform in education. In this paper, the need to deliver cybersecurity education across all disciplines and at all levels is discussed. Specifically, the focus is at the following four types of users: K-12, college, technical professionals, and all other citizens. A curriculum roadmap that integrates cybersecurity throughout technical and nontechnical curricula is proposed as a foundation for future cyber education planning. The goal is to introduce students and citizens to the concept of cybersecurity, to ensure they can apply cybersecurity concepts, and to expose them to multiple approaches to solving cybersecurity related problems.

Original languageEnglish (US)
Pages (from-to)1456-1463
Number of pages8
JournalIEEE Transactions on Emerging Topics in Computing
Volume10
Issue number3
DOIs
StatePublished - 2022

Keywords

  • Computers and education
  • cyber safety
  • cybersecurity

ASJC Scopus subject areas

  • Computer Science (miscellaneous)
  • Information Systems
  • Human-Computer Interaction
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'A Cybersecurity Educated Community'. Together they form a unique fingerprint.

Cite this