Journal of Cybersecurity Education, Research and Practice

Publication Date 4-6-2026 Abstract Artificial intelligence (AI) is rapidly being adopted across public and private sectors. This offers significant gains in efficiency, decision making, and access to information. At the same time, AI introduces complex risks related to cybersecurity, privacy, bias, transparency, accountability, and equity that existing governance and security frameworks do not fu…

aiai-ethics

Publication Date 3-23-2026 Abstract Human error remains the most frequently exploited vulnerability in the cyber-security ecosystem. Despite substantial investments in technical safeguards, cybercriminals increasingly rely on social engineering, misinformation, and emotionally manipulative tactics to compromise users. This study examines behavioral changes among participants who underwent structu…

computer-sciencecybersecurity

Publication Date 2-23-2026 Abstract As cyberthreats to critical infrastructure remain prevalent, national response mechanisms must evolve beyond the technical domain to incorporate legal, communicative, strategic, and cross-sector coordination. This work explores Locked Shields, an annual exercise conducted by NATO's Cooperative Cyber Defence Centre of Excellence, as a pedagogical and conceptual …

computer-sciencecybersecurity

Publication Date 2-1-2026 Abstract The research investigates how cyber science education combines with healthcare technology during the digital age to resolve a fundamental research gap in these two advancing areas. A combined approach utilizing extensive surveys and detailed interviews evaluates the functionality of learning platforms as well as cybersecurity measures and potential uses of emerg…

edtecheducationtechnology

Publication Date 1-26-2026 Abstract This paper presents an exploratory case study detailed as a pedagogical experience report on integrating adversarial Large Language Model (LLM) scenarios into a graduate cybersecurity curriculum. In addition to prompt injection, sophisticated techniques such as jailbreaking and model inversion pose emerging threats that traditional computer security curricula o…

aicomputer-sciencecybersecuritymachine-learning

Abstract Low-power and Lossy IoT Networks (LLNs) comprise physical sensors, processing capability, power, and other technologies to exchange information between systems and devices over the internet. However, these networks are susceptible to routing attacks affecting resources, traffic flow, and topology formation. In the related work, it has been discovered that many previous studies do not con…

algorithmscomputer-science

Publication Date 12-15-2025 Abstract The Cybercamp is a Cybersecurity summer camp for high school students that has been held for the last nine years at a Hispanic Serving Institution. Since its inception in 2016 the Cybercamp has undergone several transformations in response to budget reductions and the COVID pandemic, to finally become its current version: a rich, hands-on learning experience t…

computer-sciencecybersecurity

Publication Date 11-3-2025 Abstract As wearable and implantable medical devices become integral to remote patient monitoring and precision medicine, the associated cybersecurity and privacy risks demand urgent attention. These devices are increasingly targeted by cyberattacks, potentially endangering patient safety and data integrity. To address this, we developed an experiential learning course …

cybersecuritymedical-devicesmedicine

Publication Date 11-3-2025 Abstract Abstract -As children increasingly engage with digital platforms, the need for effective cybersecurity education has become urgent. This systematic review synthesizes 81 studies published between 2017 and 2024 to examine global curricula research focus and topics, pedagogical approaches and assessment methods, and key challenges in elementary cybersecurity educ…

computer-scienceedtecheducation

Publication Date 10-6-2025 Abstract Incident responders face a variety of challenges when identifying malware using existing solutions, particularly when rapid tactical decisions are needed. Traditional malware detection methods are often signature-based, limiting their effectiveness to previously known threats detected by anti-virus (AV) engines. Online analysis tools introduce confidentiality r…

computer-sciencecybersecurity

Publication Date 9-8-2025 Abstract The cybersecurity profession continues to face a significant shortfall of qualified professionals despite steady growth in degree programs. Employers consistently cite experience as the main barrier for entry-level cybersecurity hires. This paper argues that clinic-based experiential learning offers a scalable solution to that preparation gap. A systematic liter…

computer-scienceedtecheducation
research.ioresearch.io

Sign up to keep scrolling

Create your feed subscriptions, save articles, keep scrolling.

Already have an account?