2022
DOI: 10.11591/ijeecs.v25.i3.pp1749-1758
|View full text |Cite
|
Sign up to set email alerts
|

Adopting the cybersecurity concepts into curriculum: the potential effects on students’ cybersecurity knowledge

Abstract: <span>This study examines the effect of adopting cybersecurity concepts on the information and technology (IT) curriculum and determines the potential effect on students' knowledge of cybersecurity practices and level of awareness. To this end, a pilot study was first conducted to measure the current level of cybersecurity awareness. The results revealed that students do not have much knowledge of cybersecurity. Thus, a four-step approach was proposed to infuse the relevant cybersecurity topics in five m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…The author mentions the attack occurrence probability (AOP) which are programs that guarantee the reliability and security of medical equipment, this tool works under the Fennigkoh and Smith model and performs a preventive maintenance calculation against cyber-attack threats [75]- [78]. On the other hand, the author proposes a light gradient boosting machine (LightGBM) model software that is trained with different knowledge of attacks that can affect the medical organization [79], [80]. We agree with the authors as all these 1104 tools are useful to address cybersecurity, to be able to implement diagnostic evaluations and to safeguard confidential data and medical equipment that are of useful importance for human life [81].…”
Section: What Technologies Are Immersed In the Healthcare Sector To A...mentioning
confidence: 99%
“…The author mentions the attack occurrence probability (AOP) which are programs that guarantee the reliability and security of medical equipment, this tool works under the Fennigkoh and Smith model and performs a preventive maintenance calculation against cyber-attack threats [75]- [78]. On the other hand, the author proposes a light gradient boosting machine (LightGBM) model software that is trained with different knowledge of attacks that can affect the medical organization [79], [80]. We agree with the authors as all these 1104 tools are useful to address cybersecurity, to be able to implement diagnostic evaluations and to safeguard confidential data and medical equipment that are of useful importance for human life [81].…”
Section: What Technologies Are Immersed In the Healthcare Sector To A...mentioning
confidence: 99%
“…According to Rogers (2003), "compatibility" relates to the degree to which an innovation is judged to conform to the values, needs, and experiences of potential adopters, and it has been found to influence technology adoption (Ahmi et al, 2014;Azzeh et al, 2022;Siew et al, 2020). Compatibility with a company's work practices, needs, and culture are instances where AI adoption has been proven to be influenced (Chatterjee, Rana, et al, 2021).…”
Section: Compatibilitymentioning
confidence: 99%