{"id":"https://openalex.org/W4404416943","doi":"https://doi.org/10.1093/cybsec/tyae018","title":"Toward effective learning of cybersecurity: new curriculum agenda and learning methods","display_name":"Toward effective learning of cybersecurity: new curriculum agenda and learning methods","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4404416943","doi":"https://doi.org/10.1093/cybsec/tyae018"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyae018","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyae018","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/10/1/tyae018/61182340/tyae018.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://academic.oup.com/cybersecurity/article-pdf/10/1/tyae018/61182340/tyae018.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067779756","display_name":"Andrej Jerman Bla\u017ei\u010d","orcid":"https://orcid.org/0009-0002-8629-9770"},"institutions":[{"id":"https://openalex.org/I3006985408","display_name":"Jo\u017eef Stefan Institute","ror":"https://ror.org/05060sz93","country_code":"SI","type":"facility","lineage":["https://openalex.org/I3006985408"]}],"countries":["SI"],"is_corresponding":true,"raw_author_name":"Andrej Jerman Bla\u017ei\u010d","raw_affiliation_strings":["Jo\u017eef Stefan Institute, Laboratory for Open Systems and Networks , Ljubljana 1 000 ,"],"affiliations":[{"raw_affiliation_string":"Jo\u017eef Stefan Institute, Laboratory for Open Systems and Networks , Ljubljana 1 000 ,","institution_ids":["https://openalex.org/I3006985408"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030117072","display_name":"Borka Jerman Bla\u017ei\u010d","orcid":"https://orcid.org/0000-0001-9002-4548"},"institutions":[{"id":"https://openalex.org/I4210113529","display_name":"Jo\u017eef Stefan International Postgraduate School","ror":"https://ror.org/01hdkb925","country_code":"SI","type":"education","lineage":["https://openalex.org/I4210113529"]}],"countries":["SI"],"is_corresponding":false,"raw_author_name":"Borka Jerman Bla\u017ei\u010d","raw_affiliation_strings":["Jo\u017eef Stefan Institute, Laboratory for Open Systems and Networks and Postgraduate International School, Chair of the Advanced Internet Technologies program , Jamova 39, Ljubljana, 1000 ,"],"affiliations":[{"raw_affiliation_string":"Jo\u017eef Stefan Institute, Laboratory for Open Systems and Networks and Postgraduate International School, Chair of the Advanced Internet Technologies program , Jamova 39, Ljubljana, 1000 ,","institution_ids":["https://openalex.org/I4210113529"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5067779756"],"corresponding_institution_ids":["https://openalex.org/I3006985408"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":0.4321,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.75050181,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"10","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10533","display_name":"Teaching and Learning Programming","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10533","display_name":"Teaching and Learning Programming","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9682999849319458,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11283","display_name":"Experimental Learning in Engineering","score":0.949999988079071,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/curriculum","display_name":"Curriculum","score":0.7067244052886963},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5202930569648743},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.39526161551475525},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.3592407703399658},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.35389232635498047},{"id":"https://openalex.org/keywords/engineering-ethics","display_name":"Engineering ethics","score":0.3232274055480957},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.30841028690338135},{"id":"https://openalex.org/keywords/pedagogy","display_name":"Pedagogy","score":0.22764873504638672}],"concepts":[{"id":"https://openalex.org/C47177190","wikidata":"https://www.wikidata.org/wiki/Q207137","display_name":"Curriculum","level":2,"score":0.7067244052886963},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5202930569648743},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.39526161551475525},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.3592407703399658},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.35389232635498047},{"id":"https://openalex.org/C55587333","wikidata":"https://www.wikidata.org/wiki/Q1133029","display_name":"Engineering ethics","level":1,"score":0.3232274055480957},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.30841028690338135},{"id":"https://openalex.org/C19417346","wikidata":"https://www.wikidata.org/wiki/Q7922","display_name":"Pedagogy","level":1,"score":0.22764873504638672}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/cybsec/tyae018","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyae018","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/10/1/tyae018/61182340/tyae018.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyae018","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyae018","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/10/1/tyae018/61182340/tyae018.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Quality Education","score":0.4399999976158142,"id":"https://metadata.un.org/sdg/4"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4404416943.pdf"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W2009012954","https://openalex.org/W2093504720","https://openalex.org/W2296183890","https://openalex.org/W2596322525","https://openalex.org/W2782445866","https://openalex.org/W2922087317","https://openalex.org/W2984798626","https://openalex.org/W2999828574","https://openalex.org/W3012082455","https://openalex.org/W3036645732","https://openalex.org/W3037687990","https://openalex.org/W3095254795","https://openalex.org/W3114846425","https://openalex.org/W3124184555","https://openalex.org/W3127505251","https://openalex.org/W3196827636","https://openalex.org/W3198863209","https://openalex.org/W3204819333","https://openalex.org/W4206601373","https://openalex.org/W4224246230","https://openalex.org/W4284878873","https://openalex.org/W4291565710","https://openalex.org/W4317871394","https://openalex.org/W4380570898","https://openalex.org/W4385713395","https://openalex.org/W4404238924","https://openalex.org/W6676541935","https://openalex.org/W6761498852","https://openalex.org/W6780096253","https://openalex.org/W6790207664","https://openalex.org/W6858408187","https://openalex.org/W6996867390","https://openalex.org/W7066115974"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2348562106","https://openalex.org/W2370820329","https://openalex.org/W2370554813","https://openalex.org/W2387560707","https://openalex.org/W2363525455","https://openalex.org/W4312355418","https://openalex.org/W4362576712","https://openalex.org/W2314810092"],"abstract_inverted_index":{"Abstract":[0],"A":[1],"recent":[2],"survey":[3],"among":[4],"high":[5,51,67,119],"school":[6,68,120,135],"teachers":[7,121],"and":[8,30,62,76,87,95,112,122,150,163,179,189],"students":[9],"in":[10,20,48,53,97,128,193],"the":[11,21,32,54,59,63,98,102,108,113,118,133,140,144,147,151,154,160,164,166,176,180,183,194],"EU":[12,55],"revealed":[13],"that":[14,31],"cybersecurity":[15],"topics":[16,26],"are":[17,191],"not":[18,36],"included":[19,96,192],"programs":[22],"addressing":[23],"computer":[24],"science":[25],"of":[27,58,107,153,175,182],"European":[28,130],"schools":[29,52,131],"teachers\u2019":[33],"knowledge":[34,125],"is":[35],"being":[37],"upgraded":[38],"regularly":[39],"for":[40,66,72,90,116,186],"this":[41],"field.":[42],"Based":[43],"on":[44],"an":[45,173],"exhaustive":[46],"study":[47],"2021\u20132023":[49],"involving":[50],"a":[56],"definition":[57],"educational":[60,85,103,110,145],"content":[61,114],"aligned":[64],"methodology":[65,178],"levels":[69],"was":[70,126],"developed":[71,99,109,177],"two":[73],"areas:":[74],"cyber-safety":[75],"cybersecurity.":[77],"Available":[78],"sources,":[79],"including":[80],"video":[81],"platforms,":[82],"quizzes,":[83],"presentations,":[84],"games,":[86],"hands-on":[88],"sources":[89],"practical":[91],"exercises,":[92],"were":[93],"evaluated":[94],"fiches":[100],"with":[101,159,172],"content.":[104],"The":[105,169],"applicability":[106],"model":[111],"prepared":[115],"upgrading":[117],"their":[123],"student\u2019s":[124],"applied":[127],"nine":[129],"during":[132],"2022\u20132023":[134],"year.":[136],"This":[137],"paper":[138,170,196],"describes":[139],"study,":[141],"briefly":[142],"presents":[143],"content,":[146],"class":[148],"preparation":[149],"assessment":[152],"achieved":[155],"learning":[156],"objectives":[157],"obtained":[158],"surveys,":[161],"interviews,":[162],"Capture":[165],"Flag":[167],"contest.":[168],"ends":[171],"evaluation":[174],"usefulness":[181],"approach.":[184],"Recommendations":[185],"future":[187],"use":[188],"development":[190],"last":[195],"section.":[197]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-11T14:59:36.786465","created_date":"2025-10-10T00:00:00"}
