{"id":"https://openalex.org/W2791211994","doi":"https://doi.org/10.1145/3159450.3162249","title":"A Holistic and Case-Analysis Approach for Cybersecurity Education","display_name":"A Holistic and Case-Analysis Approach for Cybersecurity Education","publication_year":2018,"publication_date":"2018-02-21","ids":{"openalex":"https://openalex.org/W2791211994","doi":"https://doi.org/10.1145/3159450.3162249","mag":"2791211994"},"language":"en","primary_location":{"id":"doi:10.1145/3159450.3162249","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3159450.3162249","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 49th ACM Technical Symposium on Computer Science Education","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101862659","display_name":"Yu Cai","orcid":"https://orcid.org/0000-0002-0659-0967"},"institutions":[{"id":"https://openalex.org/I11957088","display_name":"Michigan Technological University","ror":"https://ror.org/0036rpn28","country_code":"US","type":"education","lineage":["https://openalex.org/I11957088"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yu Cai","raw_affiliation_strings":["Michigan Technological University, Houghton, MI, USA"],"affiliations":[{"raw_affiliation_string":"Michigan Technological University, Houghton, MI, USA","institution_ids":["https://openalex.org/I11957088"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5101862659"],"corresponding_institution_ids":["https://openalex.org/I11957088"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.02067069,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1082","last_page":"1082"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9728999733924866,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.708781361579895},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6720040440559387},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.671593427658081},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5721604824066162},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5093494653701782},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.24321722984313965},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.21689093112945557}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.708781361579895},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6720040440559387},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.671593427658081},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5721604824066162},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5093494653701782},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.24321722984313965},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.21689093112945557},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3159450.3162249","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3159450.3162249","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 49th ACM Technical Symposium on Computer Science Education","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","score":0.7099999785423279,"display_name":"Quality Education"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4386482731","https://openalex.org/W4230824443","https://openalex.org/W4377970398","https://openalex.org/W3026018975","https://openalex.org/W2185673024","https://openalex.org/W1484565796","https://openalex.org/W2142794587","https://openalex.org/W2046058552"],"abstract_inverted_index":{"There":[0],"is":[1,16,74,156],"a":[2,6,28,53,80,145,181,208,225],"growing":[3],"acceptance":[4],"that":[5],"holistic":[7,30,226],"cybersecurity":[8,37,43,50,212,229],"approach":[9,35],"incorporating":[10,231],"technical,":[11],"human,":[12],"and":[13,31,86,110,126,169,190],"business":[14,87],"factors":[15,88],"needed":[17],"to":[18,68,78,83,136],"address":[19],"the":[20,102,106,121,134,137,140,176,222],"myriad":[21],"cyber":[22,99],"threats":[23],"nowadays.":[24],"This":[25],"paper":[26],"introduces":[27,52],"new":[29],"case-analysis":[32],"(HCA)":[33],"teaching":[34,49],"for":[36],"education":[38],"by":[39,204,230],"dissecting":[40],"recent":[41],"high-profile":[42],"breaches.":[44],"The":[45,91],"traditional":[46,174],"way":[47],"of":[48,55,114,123,142,147,153,211,228],"usually":[51],"list":[54,146],"technical":[56],"security":[57,148],"topics":[58,71,149],"in":[59,89,214],"an":[60,215],"isolated":[61],"context":[62],"with":[63,96,173,194],"little":[64],"or":[65],"no":[66],"effort":[67],"link":[69],"these":[70,124,129,154],"together.":[72],"It":[73],"also":[75],"not":[76],"easy":[77],"find":[79],"good":[81],"place":[82,132],"teach":[84],"human":[85],"cybersecurity.":[90],"proposed":[92,177],"HCA":[93,178],"model":[94,179],"starts":[95],"selected":[97,111,166],"real-world":[98,195],"breaches":[100,155],"including":[101],"Target":[103],"Corporation":[104],"breach,":[105,109],"Anthem":[107],"Inc.":[108],"Distributed":[112],"Denial":[113],"Service":[115],"(DDoS)":[116],"attacks.":[117],"Students":[118],"look":[119],"into":[120],"details":[122],"attacks":[125,130],"learn":[127],"how":[128],"took":[131],"from":[133],"beginning":[135],"end.":[138],"During":[139],"process":[141],"case":[143],"analysis,":[144],"reflecting":[150],"different":[151],"aspects":[152],"introduced.":[157],"Student":[158],"learning":[159],"will":[160],"be":[161],"reinforced":[162],"through":[163],"in-class":[164],"discussion,":[165],"readings":[167],"materials,":[168],"hands-on":[170],"labs.":[171],"Compared":[172],"methods,":[175],"has":[180],"few":[182],"advantages.":[183],"First,":[184],"it":[185,198,219],"can":[186,199,220],"draw":[187],"students'":[188],"attention":[189],"increase":[191],"their":[192],"interest":[193],"cases.":[196],"Second,":[197],"improve":[200],"student":[201,223],"analytical":[202],"skills":[203],"helping":[205],"them":[206],"obtain":[207],"whole":[209],"picture":[210],"systems":[213],"enterprise":[216],"environment.":[217],"Third,":[218],"help":[221],"gain":[224],"view":[227],"complicated":[232],"socio-technical":[233],"factors.":[234]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
