{"id":"https://openalex.org/W4410986932","doi":"https://doi.org/10.1109/educon62633.2025.11016356","title":"Incorporating Dark Web Education into Cybersecurity Curricula","display_name":"Incorporating Dark Web Education into Cybersecurity Curricula","publication_year":2025,"publication_date":"2025-04-22","ids":{"openalex":"https://openalex.org/W4410986932","doi":"https://doi.org/10.1109/educon62633.2025.11016356"},"language":"en","primary_location":{"id":"doi:10.1109/educon62633.2025.11016356","is_oa":false,"landing_page_url":"https://doi.org/10.1109/educon62633.2025.11016356","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Global Engineering Education Conference (EDUCON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011728448","display_name":"Zouheir Trabelsi","orcid":"https://orcid.org/0000-0001-8686-8975"},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Zouheir Trabelsi","raw_affiliation_strings":["College of Information Technology, United Arab Emirates University,Al Ain,UAE"],"affiliations":[{"raw_affiliation_string":"College of Information Technology, United Arab Emirates University,Al Ain,UAE","institution_ids":["https://openalex.org/I201726411"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006845093","display_name":"Firas Saidi","orcid":null},"institutions":[{"id":"https://openalex.org/I8541234","display_name":"University College of Bahrain","ror":"https://ror.org/00m2z1b30","country_code":"BH","type":"education","lineage":["https://openalex.org/I8541234"]}],"countries":["BH"],"is_corresponding":false,"raw_author_name":"Firas Saidi","raw_affiliation_strings":["University of Technology Bahrain,Salmabad,Bahrain"],"affiliations":[{"raw_affiliation_string":"University of Technology Bahrain,Salmabad,Bahrain","institution_ids":["https://openalex.org/I8541234"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092050019","display_name":"Ban Alomar","orcid":null},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Ban Alomar","raw_affiliation_strings":["College of Information Technology, United Arab Emirates University,Al Ain,UAE"],"affiliations":[{"raw_affiliation_string":"College of Information Technology, United Arab Emirates University,Al Ain,UAE","institution_ids":["https://openalex.org/I201726411"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090296895","display_name":"Tariq Qayyum","orcid":"https://orcid.org/0000-0003-3561-9674"},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Tariq Qayyum","raw_affiliation_strings":["College of Information Technology, United Arab Emirates University,Al Ain,UAE"],"affiliations":[{"raw_affiliation_string":"College of Information Technology, United Arab Emirates University,Al Ain,UAE","institution_ids":["https://openalex.org/I201726411"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5011728448"],"corresponding_institution_ids":["https://openalex.org/I201726411"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19640546,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9724000096321106,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9532999992370605,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deep-web","display_name":"Deep Web","score":0.6393139362335205},{"id":"https://openalex.org/keywords/curriculum","display_name":"Curriculum","score":0.6218208074569702},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5695192813873291},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4565037190914154},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.44283580780029297},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2621716260910034},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.1350472867488861}],"concepts":[{"id":"https://openalex.org/C46721378","wikidata":"https://www.wikidata.org/wiki/Q221989","display_name":"Deep Web","level":3,"score":0.6393139362335205},{"id":"https://openalex.org/C47177190","wikidata":"https://www.wikidata.org/wiki/Q207137","display_name":"Curriculum","level":2,"score":0.6218208074569702},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5695192813873291},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4565037190914154},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.44283580780029297},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2621716260910034},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.1350472867488861},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/educon62633.2025.11016356","is_oa":false,"landing_page_url":"https://doi.org/10.1109/educon62633.2025.11016356","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Global Engineering Education Conference (EDUCON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","score":0.6299999952316284,"display_name":"Quality Education"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1542005696","https://openalex.org/W2072493824","https://openalex.org/W2073769735","https://openalex.org/W2223480334","https://openalex.org/W2567905529","https://openalex.org/W2756102459","https://openalex.org/W2909195503","https://openalex.org/W2999755721","https://openalex.org/W3205336034","https://openalex.org/W4249857552","https://openalex.org/W4293253356","https://openalex.org/W4301625489","https://openalex.org/W4323923945","https://openalex.org/W4387108032","https://openalex.org/W4390357427","https://openalex.org/W6795104974","https://openalex.org/W6991422271"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2037906003","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W1551575434"],"abstract_inverted_index":{"The":[0],"Dark":[1,34,64,79,105,146,157,197,226],"web":[2],"is":[3],"considered":[4],"the":[5,9,29,33,48,63,78,87,100,113,132,161,183,189,196,238,248,251,254],"concealed":[6],"part":[7,201],"of":[8,16,32,86,131,135,211,220,243,253],"internet":[10],"and":[11,46,58,121,143,170,218,229,241],"harbors":[12],"a":[13,68,84,117,152,209],"huge":[14],"assortment":[15],"cyber":[17,71,127],"threats":[18,75],"that":[19,187],"compromise":[20],"global":[21],"security.":[22],"One":[23],"must":[24],"understand":[25],"what":[26],"goes":[27],"into":[28,108,160,231],"technical":[30,171],"infrastructure":[31],"Web":[35,106,147,158,198,227],"to":[36,53,103,124,222],"develop":[37],"an":[38],"effective":[39],"strategy":[40],"for":[41,83,111,155,216,250],"monitoring":[42],"threats,":[43],"conducting":[44],"investigations,":[45],"implementing":[47],"appropriate":[49],"security":[50,90],"measures":[51],"necessary":[52,123],"protect":[54],"against":[55],"illegal":[56,206],"activities":[57],"data":[59],"breaches":[60],"originating":[61,76],"from":[62,77],"Web.":[65],"In":[66],"such":[67],"rapidly":[69],"changing":[70],"threat":[72],"landscape,":[73],"especially":[74],"Web,":[80],"it":[81],"calls":[82],"re-evaluation":[85],"traditional":[88],"information":[89],"curricula":[91,163,221],"at":[92],"academic":[93],"institutions.":[94],"This":[95,149],"educational":[96],"research":[97],"work":[98],"investigates":[99],"compelling":[101],"need":[102],"integrate":[104,223],"Education":[107],"Cybersecurity":[109],"programs":[110],"arming":[112],"future":[114],"workforce":[115],"with":[116],"comprehensive":[118],"knowledge":[119,142],"base":[120],"skillset":[122],"fight":[125],"modern-day":[126],"threats.":[128],"A":[129],"review":[130],"current":[133],"state":[134],"cybersecurity":[136,233,244],"education":[137,224,245],"reveals":[138],"wide":[139],"gaps":[140],"in":[141,175,202,246],"readiness":[144],"about":[145,225],"issues.":[148],"paper":[150],"presents":[151],"structured":[153],"approach":[154],"integrating":[156],"topics":[159],"existing":[162],"on":[164,167,177,182,215],"cybersecurity,":[165],"focusing":[166],"legal,":[168],"ethical,":[169],"dimensions.":[172],"We":[173],"believe":[174],"balance:":[176],"one":[178],"side,":[179],"theoretical":[180],"knowledge;":[181],"other,":[184],"hands-on":[185],"experiences":[186],"ensure":[188],"learner":[190],"takes":[191],"away":[192],"just":[193],"how":[194],"complex":[195],"is-without":[199],"taking":[200],"or":[203],"condoning":[204],"any":[205],"activities.":[207],"Equally,":[208],"set":[210],"recommendations":[212],"are":[213],"commented":[214],"educators":[217],"developers":[219],"safely":[228],"effectively":[230],"their":[232],"programs,":[234],"which":[235],"will":[236],"enhance":[237],"overall":[239],"quality":[240],"relevance":[242],"preparing":[247],"students":[249],"challenges":[252],"digital":[255],"age.":[256]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
