Skip to main content
Erschienen in: TechTrends 4/2021

08.02.2021 | Original Paper

Increasing Cybersecurity Career Interest through Playable Case Studies

verfasst von: Justin Scott Giboney, Jason K. McDonald, Jonathan Balzotti, Derek L. Hansen, Desiree M. Winters, Elizabeth Bonsignore

Erschienen in: TechTrends | Ausgabe 4/2021

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper we introduce an approach to cybersecurity education and helping students develop professional understanding in the form of a Playable Case Study (PCS), a form of educational simulation that draws on affordances of the broader educational simulation genre, case study instruction, and educational Alternate Reality Games (or ARGs). A PCS is an interactive simulation that allows students to “play” through an authentic scenario (case study) as a member of a professional team. We report our findings over a multi-year study of a PCS called Cybermatics, with data from 111 students from two different U.S. universities who interacted with the PCS. Cybermatics increased student understanding about certain key aspects of professional cybersecurity work, improved their confidence in being able to successfully apply certain skills associated with cybersecurity, and increased about half of the students’ interest in pursuing a cybersecurity career. Students also reported a number of reasons why their perceptions changed in these areas (both positive and negative). We also discuss design tensions we experienced in our process that might be encountered by others when creating simulations like a PCS, as they attempt to balance the authenticity of designed learning experiences while also sufficiently scaffolding them for newcomers who have little background in a discipline.
Literatur
Zurück zum Zitat Adams, M., & Makramalla, M. (2015). Cybersecurity skills training: An attacker-centric gamified approach. Technology Innovation Management Review, 5(1), 5–14.CrossRef Adams, M., & Makramalla, M. (2015). Cybersecurity skills training: An attacker-centric gamified approach. Technology Innovation Management Review, 5(1), 5–14.CrossRef
Zurück zum Zitat Battles, J., Glenn, V., & Shedd, L. (2011). Rethinking the library game: Creating an alternate reality with social media. Journal of Web Librarianship, 5(2), 114–131.CrossRef Battles, J., Glenn, V., & Shedd, L. (2011). Rethinking the library game: Creating an alternate reality with social media. Journal of Web Librarianship, 5(2), 114–131.CrossRef
Zurück zum Zitat Bonsignore, E., Hansen, D., Kraus, K., Visconti, A., Ahn, J., & Druin, A. (2013, June). Playing for real: designing alternate reality games for teenagers in learning contexts. In Proceedings of the 12th International Conference on Interaction Design and Children (pp. 237–246). New York, NY: ACM. Bonsignore, E., Hansen, D., Kraus, K., Visconti, A., Ahn, J., & Druin, A. (2013, June). Playing for real: designing alternate reality games for teenagers in learning contexts. In Proceedings of the 12th International Conference on Interaction Design and Children (pp. 237–246). New York, NY: ACM.
Zurück zum Zitat Chesler, N. C., Ruis, A. R., Collier, W., Swiecki, Z., Arastoopour, G., & Shaffer, D. W. (2015). A novel paradigm for engineering education: Virtual internships with individualized mentoring and assessment of engineering thinking. Journal of Biomechanical Engineering, 137(2), 1–8. https://doi.org/10.1115/1.4029235.CrossRef Chesler, N. C., Ruis, A. R., Collier, W., Swiecki, Z., Arastoopour, G., & Shaffer, D. W. (2015). A novel paradigm for engineering education: Virtual internships with individualized mentoring and assessment of engineering thinking. Journal of Biomechanical Engineering, 137(2), 1–8. https://​doi.​org/​10.​1115/​1.​4029235.CrossRef
Zurück zum Zitat Cheung, R. S., Cohen, J. P., Lo, H. Z., Elia, F., & Carrillo-marquez, V. (2012). Effectiveness of cybersecurity competitions. In Proceedings of the International Conference on Security and Management (SAM) (p. 1). Cheung, R. S., Cohen, J. P., Lo, H. Z., Elia, F., & Carrillo-marquez, V. (2012). Effectiveness of cybersecurity competitions. In Proceedings of the International Conference on Security and Management (SAM) (p. 1).
Zurück zum Zitat Cornel, C., Cornel, C. M., Rowe, D. C., & Moses, S. (2016, June). A cybersecurity camp for girls. In Conference for the American Society for Engineering Education.Washington, DC: ASEE. Cornel, C., Cornel, C. M., Rowe, D. C., & Moses, S. (2016, June). A cybersecurity camp for girls. In Conference for the American Society for Engineering Education.Washington, DC: ASEE.
Zurück zum Zitat Flushman, T., Gondree, M., Peterson, Z. N. (2015, August). This is not a game: Early observations on using alternate reality games for teaching security concepts to first-year undergraduates. In 8th Workshop on Cyber Security Experimentation and Test ({CSET} 15). Berkley, CA: USENIX. Flushman, T., Gondree, M., Peterson, Z. N. (2015, August). This is not a game: Early observations on using alternate reality games for teaching security concepts to first-year undergraduates. In 8th Workshop on Cyber Security Experimentation and Test ({CSET} 15). Berkley, CA: USENIX.
Zurück zum Zitat Gavas, E., & Memon, N. (2012). Winning cybersecurity one challenge at a time. IEEE Security & Privacy, 10(4), 75–79.CrossRef Gavas, E., & Memon, N. (2012). Winning cybersecurity one challenge at a time. IEEE Security & Privacy, 10(4), 75–79.CrossRef
Zurück zum Zitat Giannakas, F., Kambourakis, G., & Gritzalis, S. (2015, November). CyberAware: A mobile game-based app for cybersecurity education and awareness. In 2015 International Conference on Interactive Mobile Communication Technologies and Learning (IMCL) (pp. 54–58). New York, NY: IEEE. Giannakas, F., Kambourakis, G., & Gritzalis, S. (2015, November). CyberAware: A mobile game-based app for cybersecurity education and awareness. In 2015 International Conference on Interactive Mobile Communication Technologies and Learning (IMCL) (pp. 54–58). New York, NY: IEEE.
Zurück zum Zitat Gibbons, A. S. (2001). Model-centered instruction. Journal of Structural Learning and Intelligent Systems, 14, 511–540. Gibbons, A. S. (2001). Model-centered instruction. Journal of Structural Learning and Intelligent Systems, 14, 511–540.
Zurück zum Zitat Giboney, J., Hansen, D. L., Johnson, T., Winters, D., McDonald, J. K., Balzotti, J., & Bonsignore, E. (2019, January). Theory of experiential career exploration technology (TECET): Increasing cybersecurity career interest through playable case studies. 52nd Hawaii International Conference on System Sciences. Wailea, HI: HICSS. Giboney, J., Hansen, D. L., Johnson, T., Winters, D., McDonald, J. K., Balzotti, J., & Bonsignore, E. (2019, January). Theory of experiential career exploration technology (TECET): Increasing cybersecurity career interest through playable case studies. 52nd Hawaii International Conference on System Sciences. Wailea, HI: HICSS.
Zurück zum Zitat Graham, M. J., Frederick, J., Byars-Winston, A., Hunter, A.-B., & Handelsman, J. (2013). Increasing persistence of college students in STEM. Science, 341(6153), 1455–1456.CrossRef Graham, M. J., Frederick, J., Byars-Winston, A., Hunter, A.-B., & Handelsman, J. (2013). Increasing persistence of college students in STEM. Science, 341(6153), 1455–1456.CrossRef
Zurück zum Zitat Gredler, M. E. (2004). Games and simulations and their relationship to learning. In D. H. Jonassen (Ed.), Handbook of research on educational communications and technology (2nd ed., pp. 571–582). Mahwah, NJ: Lawrence Erlbaum Associates Inc. Gredler, M. E. (2004). Games and simulations and their relationship to learning. In D. H. Jonassen (Ed.), Handbook of research on educational communications and technology (2nd ed., pp. 571–582). Mahwah, NJ: Lawrence Erlbaum Associates Inc.
Zurück zum Zitat Hansen, D. L., Balzotti, J., Fine, L., & Ebeling, D. (2017, January). Microcore: A playable case study for improving adolescents’ argumentative writing in a workplace context. 50th Hawaii International Conference on System Sciences. Waikoloa Village, HI: HICSS. Hansen, D. L., Balzotti, J., Fine, L., & Ebeling, D. (2017, January). Microcore: A playable case study for improving adolescents’ argumentative writing in a workplace context. 50th Hawaii International Conference on System Sciences. Waikoloa Village, HI: HICSS.
Zurück zum Zitat Heitzmann, R. (2008). Case study instruction in teacher education: Opportunity to develop students’ critical thinking, school smarts and decision making. Education, 128(4), 523–542. Heitzmann, R. (2008). Case study instruction in teacher education: Opportunity to develop students’ critical thinking, school smarts and decision making. Education, 128(4), 523–542.
Zurück zum Zitat Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design science in information systems research. MIS Quarterly, 28(1), 75–105.CrossRef Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design science in information systems research. MIS Quarterly, 28(1), 75–105.CrossRef
Zurück zum Zitat Holm, S. (1979). A simple sequentially rejective multiple test procedure. Scandinavian Journal of Statistics, 6(2), 65–70. Holm, S. (1979). A simple sequentially rejective multiple test procedure. Scandinavian Journal of Statistics, 6(2), 65–70.
Zurück zum Zitat Jagoda, P., Gilliam, M., McDonald, P., & Russell, C. (2015). Worlding through play: Alternate reality games, large-scale learning, and The Source. American Journal of Play, 8(1), 74. Jagoda, P., Gilliam, M., McDonald, P., & Russell, C. (2015). Worlding through play: Alternate reality games, large-scale learning, and The Source. American Journal of Play, 8(1), 74.
Zurück zum Zitat Johnston, J. D., Massey, A. P., & Marker-Hoffman, R. L. (2012). Using an alternate reality game to increase physical activity and decrease obesity risk of college students. Journal of Diabetes Science and Technology, 6(4), 828–838.CrossRef Johnston, J. D., Massey, A. P., & Marker-Hoffman, R. L. (2012). Using an alternate reality game to increase physical activity and decrease obesity risk of college students. Journal of Diabetes Science and Technology, 6(4), 828–838.CrossRef
Zurück zum Zitat Katsantonis, M., Fouliras, P., Mavridis, I., & (2017, April). Conceptual analysis of cyber security education based on live competitions. In,. (2017). IEEE Global Engineering Education Conference (EDUCON) (pp. 771–779). New York, NY: IEEE. Katsantonis, M., Fouliras, P., Mavridis, I., & (2017, April). Conceptual analysis of cyber security education based on live competitions. In,. (2017). IEEE Global Engineering Education Conference (EDUCON) (pp. 771–779). New York, NY: IEEE.
Zurück zum Zitat Kay, D. J., Pudas, T. J., & Young, B. (2012). Preparing the pipeline: The U.S. cyber workforce for the future. Defense Horizons, 72(August), 1–16. Kay, D. J., Pudas, T. J., & Young, B. (2012). Preparing the pipeline: The U.S. cyber workforce for the future. Defense Horizons, 72(August), 1–16.
Zurück zum Zitat Kolb, A. Y., & Kolb, D. A. (2014). Learning styles and learning spaces: Enhancing experiential learning in higher education. Academy of Management Learning & Education, 4(2), 193–212.CrossRef Kolb, A. Y., & Kolb, D. A. (2014). Learning styles and learning spaces: Enhancing experiential learning in higher education. Academy of Management Learning & Education, 4(2), 193–212.CrossRef
Zurück zum Zitat Kolb, D. A. (1984). Experiential learning: Experience as the source of learning and developmen. New Jersey: Prentice-Hall. Kolb, D. A. (1984). Experiential learning: Experience as the source of learning and developmen. New Jersey: Prentice-Hall.
Zurück zum Zitat LeClair, J., & Pheils, D. (2016). Women in cybersecurity. Albany: NY: Excelsior College. LeClair, J., & Pheils, D. (2016). Women in cybersecurity. Albany: NY: Excelsior College.
Zurück zum Zitat McDonald, J. K., Hansen, D. L., Balzotti, J., Tanner, J., Winters, D., Giboney, J., & Bonsignore, E. (2019, January). Designing authentic cybersecurity learning experiences: Lessons from the Cybermatics playable case study. Proceedings of the 52nd Hawaii International Conference on System Sciences, 6, 2507–2516. Wailea, HI: HICSS. McDonald, J. K., Hansen, D. L., Balzotti, J., Tanner, J., Winters, D., Giboney, J., & Bonsignore, E. (2019, January). Designing authentic cybersecurity learning experiences: Lessons from the Cybermatics playable case study. Proceedings of the 52nd Hawaii International Conference on System Sciences, 6, 2507–2516. Wailea, HI: HICSS.
Zurück zum Zitat McGettrick, A., Cassel, L. N., Dark, M., Hawthorne, E. K., & Impagliazzo, J. (2014, March). Toward curricular guidelines for cybersecurity. In Proceedings of the 45th ACM technical symposium on Computer science education (pp. 81–82). New York, NY: SIGCSE. McGettrick, A., Cassel, L. N., Dark, M., Hawthorne, E. K., & Impagliazzo, J. (2014, March). Toward curricular guidelines for cybersecurity. In Proceedings of the 45th ACM technical symposium on Computer science education (pp. 81–82). New York, NY: SIGCSE.
Zurück zum Zitat Nagarajan, A., Allbeck, J. M., Sood, A., & Janssen, T. L. (2012, May). Exploring game design for cybersecurity training. In 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER) (pp. 256–262). New York, NY: IEEE. Nagarajan, A., Allbeck, J. M., Sood, A., & Janssen, T. L. (2012, May). Exploring game design for cybersecurity training. In 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER) (pp. 256–262). New York, NY: IEEE.
Zurück zum Zitat Niemeyer, G., Garcia, A., & Naima, R. (2009, October). Black cloud: patterns towards da future. In Proceedings of the 17th ACM International Conference on Multimedia (pp. 1073–1082). New York, NY: ACM. Niemeyer, G., Garcia, A., & Naima, R. (2009, October). Black cloud: patterns towards da future. In Proceedings of the 17th ACM International Conference on Multimedia (pp. 1073–1082). New York, NY: ACM.
Zurück zum Zitat Peffers, K., Tuunanen, T., Rothenberger, M. A., & Chatterjee, S. (2007). A design science research methodology for information systems research. Journal of Management Information Systems, 24(3), 45–77.CrossRef Peffers, K., Tuunanen, T., Rothenberger, M. A., & Chatterjee, S. (2007). A design science research methodology for information systems research. Journal of Management Information Systems, 24(3), 45–77.CrossRef
Zurück zum Zitat Pellicone, A., Bonsignore, E., Kaczmarek, K., Kraus, K., Ahn, J., & Hansen, D. (2017). Alternate reality games for learning: A frame by frame analysis. Alternate Realities Games and the Cusp of Digital Gameplay, 5, 78. Pellicone, A., Bonsignore, E., Kaczmarek, K., Kraus, K., Ahn, J., & Hansen, D. (2017). Alternate reality games for learning: A frame by frame analysis. Alternate Realities Games and the Cusp of Digital Gameplay, 5, 78.
Zurück zum Zitat Rowland, P., Podhradsky, A., & Plucker, S. (2018, January). CybHER: A Method for Empowering, Motivating, Educating and Anchoring Girls to a Cybersecurity Career Path. In Proceedings of the 51st Hawaii International Conference on System Sciences (pp. 3727–3735). Waikoloa Village, HI: HICSS. Rowland, P., Podhradsky, A., & Plucker, S. (2018, January). CybHER: A Method for Empowering, Motivating, Educating and Anchoring Girls to a Cybersecurity Career Path. In Proceedings of the 51st Hawaii International Conference on System Sciences (pp. 3727–3735). Waikoloa Village, HI: HICSS.
Zurück zum Zitat Schank, R. C. (1994). Goal-based scenarios: A radical look at education. The Journal of the Learning Sciences, 3(4), 429–453.CrossRef Schank, R. C. (1994). Goal-based scenarios: A radical look at education. The Journal of the Learning Sciences, 3(4), 429–453.CrossRef
Zurück zum Zitat Shackelford, S. J., Proia, A. A., Martell, B., & Craig, A. N. (2015). Toward a global cybersecurity standard of care?: Exploring the implications of the 2014 NIST Cybersecurity framework on shaping reasonable national and international cybersecurity practices. Texas International Law Journal, 50(2), 303–354. Shackelford, S. J., Proia, A. A., Martell, B., & Craig, A. N. (2015). Toward a global cybersecurity standard of care?: Exploring the implications of the 2014 NIST Cybersecurity framework on shaping reasonable national and international cybersecurity practices. Texas International Law Journal, 50(2), 303–354.
Zurück zum Zitat Shaffer, D. W. (2004). Pedagogical praxis: The professions as models for postindustrial education. Teachers College Record, 106(7), 1401–1421.CrossRef Shaffer, D. W. (2004). Pedagogical praxis: The professions as models for postindustrial education. Teachers College Record, 106(7), 1401–1421.CrossRef
Zurück zum Zitat Shaffer, D. W. (2005). Epistemic games. Innovate: Journal of Online Education, 1(6), 2. Shaffer, D. W. (2005). Epistemic games. Innovate: Journal of Online Education, 1(6), 2.
Zurück zum Zitat Shumba, R., Ferguson-Boucher, K., Sweedyk, E., Taylor, C., Franklin, G., Turner, C., ... & Hall, L. (2013, June). Cybersecurity, women and minorities: findings and recommendations from a preliminary investigation. In Proceedings of the ITiCSE working group reports conference on Innovation and technology in computer science education-working group reports (pp. 1–14). New York, NY: ACM. Shumba, R., Ferguson-Boucher, K., Sweedyk, E., Taylor, C., Franklin, G., Turner, C., ... & Hall, L. (2013, June). Cybersecurity, women and minorities: findings and recommendations from a preliminary investigation. In Proceedings of the ITiCSE working group reports conference on Innovation and technology in computer science education-working group reports (pp. 1–14). New York, NY: ACM.
Zurück zum Zitat Tims, H. E., Turner, G. E., Corbett, K., Deemer, E. D., & Mhire, J. (2014). Cyber value and interest development: Assessment of a STEM career intervention for high school students. Electronic Journal of Science Education, 18(1), 1–15. Tims, H. E., Turner, G. E., Corbett, K., Deemer, E. D., & Mhire, J. (2014). Cyber value and interest development: Assessment of a STEM career intervention for high school students. Electronic Journal of Science Education, 18(1), 1–15.
Zurück zum Zitat Tobey, D. H., Pusey, P., & Burley, D. L. (2014). Engaging learners in cybersecurity careers: Lessons from the launch of the national cyber league. ACM Inroads, 5(1), 53–56.CrossRef Tobey, D. H., Pusey, P., & Burley, D. L. (2014). Engaging learners in cybersecurity careers: Lessons from the launch of the national cyber league. ACM Inroads, 5(1), 53–56.CrossRef
Zurück zum Zitat Vogel, R. (2016). Closing the cybersecurity skills gap. Salus Journal, 4(2), 32–46. Vogel, R. (2016). Closing the cybersecurity skills gap. Salus Journal, 4(2), 32–46.
Zurück zum Zitat Werther, J., Zhivich, M., Leek, T., & Zeldovich, N. (2011). Experiences in cyber security education: The MIT Lincoln Laboratory capture-the-flag exercise. In Proceedings of the 4th conference on Cyber Security Experimentation and Test (p. 12). New York, NY: ACM. Werther, J., Zhivich, M., Leek, T., & Zeldovich, N. (2011). Experiences in cyber security education: The MIT Lincoln Laboratory capture-the-flag exercise. In Proceedings of the 4th conference on Cyber Security Experimentation and Test (p. 12). New York, NY: ACM.
Metadaten
Titel
Increasing Cybersecurity Career Interest through Playable Case Studies
verfasst von
Justin Scott Giboney
Jason K. McDonald
Jonathan Balzotti
Derek L. Hansen
Desiree M. Winters
Elizabeth Bonsignore
Publikationsdatum
08.02.2021
Verlag
Springer US
Erschienen in
TechTrends / Ausgabe 4/2021
Print ISSN: 8756-3894
Elektronische ISSN: 1559-7075
DOI
https://doi.org/10.1007/s11528-021-00585-w

Weitere Artikel der Ausgabe 4/2021

TechTrends 4/2021 Zur Ausgabe

Column: Editor’s Notes

Introducing the July 2021 Issue

Premium Partner