{"id":"https://openalex.org/W4407951009","doi":"https://doi.org/10.1109/fie61694.2024.10893209","title":"Cybersecurity Education in High School: Exploring Cyber Assets, Cyber Value at Risk, and Authentic Assessment","display_name":"Cybersecurity Education in High School: Exploring Cyber Assets, Cyber Value at Risk, and Authentic Assessment","publication_year":2024,"publication_date":"2024-10-13","ids":{"openalex":"https://openalex.org/W4407951009","doi":"https://doi.org/10.1109/fie61694.2024.10893209"},"language":"en","primary_location":{"id":"doi:10.1109/fie61694.2024.10893209","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fie61694.2024.10893209","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Frontiers in Education Conference (FIE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5095881816","display_name":"Prashant Vajpayee","orcid":"https://orcid.org/0009-0006-1285-6676"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Prashant Vajpayee","raw_affiliation_strings":["University of North Texas,Dept. of Information Science,Denton,TX"],"affiliations":[{"raw_affiliation_string":"University of North Texas,Dept. of Information Science,Denton,TX","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009360571","display_name":"Gahangir Hossain","orcid":"https://orcid.org/0000-0002-8205-4939"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gahangir Hossain","raw_affiliation_strings":["University of North Texas,Dept. of Information Science,Denton,TX"],"affiliations":[{"raw_affiliation_string":"University of North Texas,Dept. of Information Science,Denton,TX","institution_ids":["https://openalex.org/I123534392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5095881816"],"corresponding_institution_ids":["https://openalex.org/I123534392"],"apc_list":null,"apc_paid":null,"fwci":2.2903,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.91646391,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6381163001060486},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.617032527923584},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.5261934399604797},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4831382930278778},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.41760802268981934},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3504124879837036},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3162882328033447}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6381163001060486},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.617032527923584},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.5261934399604797},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4831382930278778},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.41760802268981934},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3504124879837036},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3162882328033447},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fie61694.2024.10893209","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fie61694.2024.10893209","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Frontiers in Education Conference (FIE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","score":0.5400000214576721,"display_name":"Quality Education"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W239645738","https://openalex.org/W1585728732","https://openalex.org/W2026222769","https://openalex.org/W2107434174","https://openalex.org/W2608795543","https://openalex.org/W2760140542","https://openalex.org/W2793402936","https://openalex.org/W2920866633","https://openalex.org/W3016741745","https://openalex.org/W3030186388","https://openalex.org/W3032033268","https://openalex.org/W3046408911","https://openalex.org/W4200278732","https://openalex.org/W4280518408","https://openalex.org/W4361264961","https://openalex.org/W4395471072","https://openalex.org/W6634352666","https://openalex.org/W6685910157","https://openalex.org/W7066115974"],"related_works":["https://openalex.org/W3110311961","https://openalex.org/W4396897946","https://openalex.org/W4401664841","https://openalex.org/W2921897907","https://openalex.org/W4242728933","https://openalex.org/W2493430149","https://openalex.org/W3040950835","https://openalex.org/W2767924451","https://openalex.org/W4306412489","https://openalex.org/W2962899822"],"abstract_inverted_index":{"In":[0],"the":[1,26,51,71,108,136,144,165,173,188,195,223,246,287],"realm":[2],"of":[3,47,110,138,146,190,197,212,225,248,266,281],"cybersecurity,":[4],"a":[5,17,64,78,209],"knowledge":[6,272],"chasm":[7],"exists":[8],"among":[9],"high":[10,216,261,297],"school":[11,14,217,262,298],"students.":[12,218,263],"High":[13],"students":[15,155,299],"face":[16],"significant":[18],"gap":[19],"in":[20,187,228],"cybersecurity":[21,48,140,153,213],"knowledge,":[22],"essential":[23],"for":[24,154,172,215,222,260],"safeguarding":[25],"digital":[27,42,74],"environment.":[28],"This":[29,58],"educational":[30,275],"deficit":[31],"renders":[32],"them":[33],"vulnerable":[34],"to":[35,69,73,85,90,118,143,151,168,207,241,278,296],"cyber":[36,92,111,116,130,170,243,256,271,294],"threats,":[37],"compromising":[38],"personal":[39],"and":[40,83,87,98,122,149,159,184,201,238,254,283,305],"school-wide":[41],"security.":[43],"The":[44,113,133,162,264],"global":[45],"shortage":[46],"professionals":[49],"exacerbates":[50],"issue,":[52],"threatening":[53],"future":[54,290],"defenses":[55],"against":[56],"cyberattacks.":[57],"paper":[59,134,163,288],"introduces":[60],"Cyber":[61],"Value-at-Risk":[62],"(CVaR),":[63],"concept":[65],"adapted":[66],"from":[67],"finance,":[68],"evaluate":[70],"risk":[72],"assets.":[75],"It":[76,192],"outlines":[77],"model":[79],"using":[80,156,300],"basic":[81],"math":[82],"probability":[84],"assess":[86],"mitigate":[88],"risks":[89,171,295],"these":[91],"assets,":[93],"which":[94],"include":[95],"data,":[96],"vulnerability,":[97],"potential":[99],"negative":[100],"impacts":[101],"like":[102],"financial":[103,119,157],"or":[104],"reputational":[105],"loss":[106],"at":[107],"time":[109],"incident.":[112],"approach":[114],"equates":[115],"assets":[117],"terms-assets,":[120],"liabilities,":[121],"capital-to":[123],"demonstrate":[124],"how":[125],"additional":[126],"countermeasures":[127],"can":[128],"reduce":[129,242],"asset":[131],"value.":[132],"emphasizes":[135],"importance":[137],"consistent":[139],"practices,":[141],"akin":[142],"effects":[145],"compound":[147],"interest,":[148],"aims":[150],"demystify":[152],"literacy":[158],"mathematical":[160],"concepts.":[161],"uses":[164],"proposed":[166],"method":[167],"calculate":[169],"prominent":[174],"cyber-attacks":[175],"such":[176],"as":[177],"Phishing,":[178],"DDoS,":[179],"Data":[180],"breach,":[181],"Ransom":[182],"ware,":[183],"loT":[185,282],"Vulnerabilities":[186],"context":[189],"school.":[191],"further":[193],"explains":[194],"value":[196],"problem":[198],"based":[199],"learning":[200,211],"provides":[202],"an":[203,273],"authentic":[204],"assessment":[205],"framework":[206],"establish":[208],"practical":[210],"concepts":[214],"Finally,":[219],"it":[220],"advocates":[221],"integration":[224],"security":[226,268],"measures":[227],"internet":[229,267],"use,":[230],"covering":[231],"authentication,":[232],"authorization,":[233],"encryption,":[234],"firewall,":[235],"secure":[236],"connections,":[237],"systems'":[239],"upgrade":[240],"risks.":[244],"With":[245],"rise":[247],"online":[249],"education,":[250],"gaming,":[251],"social":[252],"media,":[253],"digitalization,":[255],"awareness":[257],"is":[258,269],"crucial":[259],"criticality":[265],"making":[270],"urgent":[274],"priority.":[276],"Due":[277],"growing":[279],"demand":[280],"artificial":[284],"intelligence":[285],"(AI),":[286],"suggests":[289],"research":[291],"about":[292],"explaining":[293],"machine":[301],"learning,":[302],"human":[303],"behavior,":[304],"system":[306],"anomalies.":[307]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
