Try to esCAPE from Cybersecurity Incidents! A Technology-Enhanced Educational Approach
-
Published:2024-07-30
Issue:
Volume:
Page:
-
ISSN:2211-1662
-
Container-title:Technology, Knowledge and Learning
-
language:en
-
Short-container-title:Tech Know Learn
Author:
Pirta-Dreimane RūtaORCID, Brilingaitė AgnėORCID, Roponena EvitaORCID, Parish KarenORCID, Grabis JānisORCID, Lugo Ricardo GregorioORCID, Bonders MārtiņšORCID
Abstract
AbstractIncorporating gamification elements and innovative approaches in training programs are promising for addressing cybersecurity knowledge gaps. Cybersecurity education should combine hard and soft skill development when building the capacity to manage cyber incidents requiring timely communication, team collaboration, and self-efficacy in risk assessment and incident mitigation. The paper presents a design and evaluation of the technology-enhanced cybersecurity education approach CAPE which works as a hybrid escape room. It combines a virtualized infrastructure simulating the business environment and the physical environment where game participants play the role of the incident response team at the organization’s premises. The CAPE could be applied as a student-centered approach in the educational environment. The work employed a multiple-methods research approach to design a gamified approach and investigate crisis communication, collaboration, self-regulation, and technical competences in incident management scenarios. The design science methodology empowered the game’s construction with an attack surface covering physical and digital security. The undergraduate students participated in the pilot execution and completed the psychological questionnaires. The results were analyzed using statistical methods. Results of the CAPE execution showed a positive impact on student performance and increased interest in cybersecurity. The designed approach promoted field-specific competence development. The results demonstrated the significance of psychological aspects related to incident management.
Graphical abstract
Publisher
Springer Science and Business Media LLC
Reference80 articles.
1. Aggarwal, A., & Dhurkari, R. K. (2023). Association between stress and information security policy non-compliance behavior: A meta-analysis. Computers & Security, 124, 102991. https://doi.org/10.1016/j.cose.2022.102991 2. Al-Rayes, S., Al Yaqoub, F. A., Alfayez, A., Alsalman, D., Alanezi, F., Alyousef, S., & Alanzi, T. M. (2022). Gaming elements, applications, and challenges of gamification in healthcare. Informatics in Medicine Unlocked, 31, 100974. https://doi.org/10.1016/j.imu.2022.100974 3. Ashley, T. D., Kwon, R., Gourisetti, S. N. G., Katsis, C., Bonebrake, C. A., & Boyd, P. A. (2022). Gamification of cybersecurity for workforce development in critical infrastructure. IEEE Access, 10, 112487–112501. https://doi.org/10.1109/access.2022.3216711 4. Ask, T.F., Sütterlin, S., Knox, B.J., Lugo, R.G. (2021). Situational states influence on team workload demands in cyber defense exercise. Hci international 2021-late breaking papers: Cognition, inclusion, learning, and culture: 23rd hci international conference (pp. 3–20). 5. Bahuguna, A., Bisht, R. K., & Pande, J. (2019). Don’t wanna cry: A cyber crisis table top exercise for assessing the preparedness against eminent threats. International Journal of Engineering and Advanced Technology, 9, 3705–3710. https://doi.org/10.35940/ijeat.A9893.109119
|
|