2014
DOI: 10.1145/2568195.2568213
|View full text |Cite
|
Sign up to set email alerts
|

Engaging learners in cybersecurity careers

Abstract: Educators and sponsors endorse competitions as a strong, positive influence on career choice. However, empirical studies of cybersecurity competitions are lacking, and evidence from computer science and mathematics competitions has been mixed. Here we report initial results from an ongoing study of the National Cyber League to provide a glimpse of the role of competitions in fostering cybersecurity career engagement. Preliminary results suggest that cyber competitions attract experienced individuals who will r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 44 publications
(13 citation statements)
references
References 8 publications
0
13
0
Order By: Relevance
“…In many cases, experts use an incident label to quickly convey a complex and diverse set of conditions and events in a simple, terse manner, especially when conversing with peers [43]. Consequently, we prefer the term vignette because it signifies the need to extract the whole story, including several scenarios or differing perspectives of a critical incident [44], [45]. These stories are frequently used by experts to convert tacit into explicit knowledge for communicating an event to less experienced people [46], [47].…”
Section: Job Performance Modeling: Step 1 -Defining Contextmentioning
confidence: 99%
“…In many cases, experts use an incident label to quickly convey a complex and diverse set of conditions and events in a simple, terse manner, especially when conversing with peers [43]. Consequently, we prefer the term vignette because it signifies the need to extract the whole story, including several scenarios or differing perspectives of a critical incident [44], [45]. These stories are frequently used by experts to convert tacit into explicit knowledge for communicating an event to less experienced people [46], [47].…”
Section: Job Performance Modeling: Step 1 -Defining Contextmentioning
confidence: 99%
“…Studies con rm multiple bene ts of cybersecurity games [16,17,21]. ey can inspire interest in computer security and motivate participants to explore the eld further.…”
Section: Introductionmentioning
confidence: 99%
“…Competitions and games of various di culty levels and focus are spreading widely, from informal online hacking communities to universities and professional security conferences. e number of participants in cybersecurity games is growing exponentially [17]. At the same time, several authors argue that although high-quality games are available, they o er li le educational value to learners [16,20].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Studies have considered the use of puzzles [11] and challenges [12] to aid learning. Significant interest has been paid to competitions [13]- [16] and the students that participate in them [17]. A limited amount of prior work [18] has also been conducted related to undergraduate research activities in cybersecurity and the benefits they produce.…”
Section: Cybersecuritymentioning
confidence: 99%