PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
  • Sesja wygasła!
Tytuł artykułu

A multiple case study of METI cybersecurity education and training: A basis for the development of a guiding framework for educational approaches

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Cyberattacks have become a serious global concern, effecting enormous losses to different sectors. In the shipping business, major companies report violations to their operations’ integrity and security, and losing great amounts of money. While the International Maritime Organization (IMO), through the International Convention on Standards of Training, Certification and Watchkeeping for Seafarers (STCW) 1978, as amended, is yet to release a standard for the cybersecurity education and training of seafarers, some maritime education and training institutions (METIs) have acted proactively and included cybersecurity knowledge and skills in their curricular offerings. This study looked into the cybersecurity course offerings of four METIs that served as the case studies of the researchers. In particular, the following objectives were addressed: the cybersecurity knowledge and skills included in their curriculum; the importance of the cybersecurity knowledge and skills to seafarers; and the educational approaches of the METIs in delivering their topics on cybersecurity. The first and third objectives were answered using different sources of qualitative data, including document analysis, interview and direct observation. The quantitative approach, in the form of a survey questionnaire, was used to address the second objective. The METIs, though not the same in content, were found to have included cybersecurity knowledge and skills in their curriculum. These knowledge and skills were perceived to be very important by seafarers. Similar to the content of their courses, the METIs delivered their cybersecurity courses by employing varied educational approaches. To address the gap on the lack of cybersecurity course design and delivery minimum standards, a framework in the shape of a lantern is developed and proposed to guide maritime courses designers, in particular, and other course designers, in general.
Twórcy
autor
  • Maritime Academy of Asia and the Pacific, Mariveles Bataan, Philippines
autor
  • World Maritime University, Malmoe, Sweden
Bibliografia
  • 1. Adkisson, C., & McCoy, L. P. (2006). A study of teachers’ perceptions of high school mathematics instructional methods. Studies in teaching, 1-6.
  • 2. Ahvenjärvi, S. (2018). Addressing cyber security in training of the mariner of the future - the CYMET project. In International Symposium on Integrated Ship’s Information Systems & Marine Traffic Engineering Conference.
  • 3. Androjna, A., Brcko, T., Pavic, I., & Greidanus, H. (2020). Assessing Cyber Challenges of Maritime Navigation. Journal of Marine Science and Engineering, 8(10), 776. https://www.mdpi.com/2077-1312/8/10/776.
  • 4. Ani, U. D., He, H., & Tiwari, A. (2019). Human factor security: evaluating the cybersecurity capacity of the industrial workforce. Journal of Systems and Information Technology, 21(1), 2-35. https://doi.org/10.1108/JSIT-02-2018-0028.
  • 5. Bacasdoon, J. (2021). A multiple case study of METI cybersecurity education and training: a basis for the development of a guiding framework for educational approaches. (1680. ). World Maritime University Dissertations. https://commons.wmu.se/all_dissertations/1680.
  • 6. Baik, C., Larcombe, W., Brooker, A., Wyn, J., Allen, L., Brett, M., Field, R., & James, R. (2017). Enhancing Student Mental Wellbeing: A Handbook for Academic Educators.
  • 7. Bates, A. W. (2015). Teaching in a digital age: Guidelines for designing teaching and learning. BCampus.
  • 8. Bearman, M., & Dawson, P. (2013). Qualitative synthesis and systematic review in health professions education. Medical Education, 47(3), 252-260. https://doi.org/https://doi.org/10.1111/medu.12092.
  • 9. Ben-Asher, N., & Gonzalez, C. (2015, 2015/07/01/). Effects of cyber security knowledge on attack detection. Computers in Human Behavior, 48, 51-61. https://doi.org/https://doi.org/10.1016/j.chb.2015.01.039.
  • 10. Biggs, J. (2003). Aligning teachning for constructing learning. Higher Education Academy, 1(4), 1-4.
  • 11. Boyatzis, R. E., & Kolb, D. A. (1991, 1991/01/01). Assessing Individuality in Learning: the learning skills profile. Educational Psychology, 11(3-4), 279-295. https://doi.org/10.1080/0144341910110305.
  • 12. Burley, D. L., Eisenberg, J., & Goodman, S. E. (2014). Would cybersecurity professionalization help address the cybersecurity crisis? Commun. ACM, 57(2), 24–27. https://doi.org/10.1145/2556936
  • 13. Burrell, D. N., Finch, A., Simmons, J., & Burton, S. L. (2015). The Innovation and Promise of STEM-Oriented Cybersecurity Charter Schools in Urban Minority Communities in the United States as a Tool to Create a Critical Business Workforce. In New Threats and Countermeasures in Digital Crime and Cyber Terrorism (pp. 271-285). IGI Global.
  • 14. Caponi, S. L., & Belmont, K. B. (2015). Maritime cybersecurity: a growing threat goes unanswered. Intellectual Property & Technology Law Journal, 27(1), 16.
  • 15. Carlton, M., Levy, Y., Ramim, M., & Terrell, S. (2015). Development of the MyCyberSkills™ iPad app: A scenarios-based, hands-on measure of non-IT professionals’ cybersecurity skills. Proceedings of the Pre-International Conference of Information Systems (ICIS) SIGSEC-Workshop on Information Security and Privacy (WISP) 2015.
  • 16. Chao, R.-J., & Chen, Y.-H. (2009, 2009/09/01/). Evaluation of the criteria and effectiveness of distance e-learning with consistent fuzzy preference relations. Expert Systems with Applications, 36(7), 10657-10662. https://doi.org/https://doi.org/10.1016/j.eswa.2009.02.047.
  • 17. Chi, M. T. (2006). Two approaches to the study of experts’ characteristics. The Cambridge handbook of expertise and expert performance, 21-30.
  • 18. Chicioreanu, T. D., & Amza, C. G. (2018). Adapting your teaching to accommodate the Net Generation/Z-Generation of learners. The International Scientific Conference eLearning and Software for Education.
  • 19. Choi, M., Levy, Y., & Hovav, A. (2013). The role of user computer self-efficacy, cybersecurity countermeasures awareness, and cybersecurity skills influence on computer misuse. Proceedings of the Pre-International Conference of Information Systems (ICIS) SIGSEC–Workshop on Information Security and Privacy (WISP).
  • 20. Chudowsky, N., Glaser, R., & Pellegrino, J. W. (2001). Knowing what students know: The science and design of educational assessment. National Academy Press.
  • 21. Creswell, J. W., & Creswell, J. D. (2017). Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications.
  • 22. Daum, O. (2019). Cyber security in the maritime sector. J. Mar. L. & Com., 50, 1.
  • 23. Davis, B., Carmean, C., & Wagner, E. D. (2009). The evolution of the LMS: From management to learning. Santa Rosa, CA: e-Learning Guild.
  • 24. deLeon, L., & Killian, J. (2000, 2000/01/01). Comparing Modes of Delivery: Classroom and On-Line (and Other) Learning. Journal of Public Affairs Education, 6(1), 5-18. https://doi.org/10.1080/15236803.2000.12022092.
  • 25. Dillon, H., & VanDeGrift, T. (2021, 2021/07/26). Creating an Inclusive Engineering Student Culture Through Diverse Teams: Instructor-led and Student-led Approaches Virtual Conference. https://peer.asee.org/36871.
  • 26. Fisher, D., & Muirhead, P. (2005). Practical teaching skills for maritime instructors. WMU publications.
  • 27. Flick, U. (2018). Doing Triangulation and Mixed Methods. In. SAGE Publications Ltd. https://doi.org/10.4135/9781529716634.
  • 28. Fry, H., Ketteridge, S., & Marshall, S. (2008). A handbook for teaching and learning in higher education: Enhancing academic practice. Routledge.
  • 29. Furnell, S. (2021, 2021/01/01/). The cybersecurity workforce and skills. Computers & Security, 100, 102080. https://doi.org/https://doi.org/10.1016/j.cose.2020.102080.
  • 30.Ha, E.-H., & Lim, E. J. (2018, 2018/05/01/). Peer-Led Written Debriefing Versus Instructor-Led Oral Debriefing: Using Multimode Simulation. Clinical Simulation in Nursing, 18, 38-46. https://doi.org/https://doi.org/10.1016/j.ecns.2018.02.002.
  • 31.Heering, D., Maennel, O., & Venables, A. (2021). Shortcomings in cybersecurity education for seafarers. In Developments in Maritime Technology and Engineering (pp. 49-61). CRC Press.
  • 32. Hmelo-Silver, C. E., Duncan, R. G., & Chinn, C. A. (2007, 2007/04/26). Scaffolding and Achievement in Problem-Based and Inquiry Learning: A Response to Kirschner, Sweller, and. Educational Psychologist, 42(2), 99-107. https://doi.org/10.1080/00461520701263368.
  • 33. STCW Inc. 2010 Manila Amendments, (2017).
  • 34. Irons, A. (2019). Delivering cybersecurity education effectively. In Cybersecurity Education for Awareness and Compliance (pp. 135-157). IGI Global.
  • 35. Johnson, R. B., & Christensen, L. (2019). Educational research: Quantitative, qualitative, and mixed approaches. Sage publications.
  • 36. Kala, N., & Balakrishnan, M. (2019). Cyber Preparedness in Maritime Industry. Int. J. Sci. Technol. Adv, 5, 19-28.
  • 37. Karahalios, H. (2020, 2020/12/01). Appraisal of a Ship’s Cybersecurity efficiency: the case of piracy. Journal of Transportation Security, 13(3), 179-201. https://doi.org/10.1007/s12198-020-00223-1
  • 38. Kirschner, P., Sweller, J., & Clark, R. E. (2006). Why unguided learning does not work: An analysis of the failure of discovery learning, problem-based learning, experiential learning and inquiry-based learning. Educational Psychologist, 41(2), 75-86.
  • 39. Läänemets, U., & Kalamees-Ruubel, K. (2013). The taba-tyler rationales. Journal of the American Association for the Advancement of Curriculum Studies (JAAACS), 9(2).
  • 40. Levy, Y. (2005). A case study of management skills comparison in online and on-campus MBA programs. International Journal of Information and Communication Technology Education (IJICTE), 1(3), 1-20.
  • 41. Light, G., Calkins, S., & Cox, R. (2009). Learning and teaching in higher education: The reflective professional. Sage.
  • 42. Malik, M., Fatima, G., & Sarwar, A. (2017). E-Learning: Students' Perspectives about Asynchronous and Synchronous Resources at Higher Education Level. Bulletin of Education and Research, 39(2), 183-195.
  • 43. Morgan, S. (2020). Cybercrime to cost the world $10.5 trillion annually by 2025. Cybercrime Magazine, 13(11).
  • 44. Mraković, I., & Vojinović, R. (2019). Maritime cyber security analysis–how to reduce threats? Transactions on maritime science, 8(01), 132-139.
  • 45. Murati, R., & Ceka, A. (2017). The use of technology in educational teaching. Journal of Education and Practice, 8(6), 197-199.
  • 46. Palupi, D. (2018). What Type of Curriculum Development Models Do We Follow? An Indonesia’s 2013 Curriculum Case. Indonesian Journal of Curriculum and Educational Technology Studies, 6(2), 98-105.
  • 47. Print, M. (1993). Curriculum development and design / Murray Print. Allen & Unwin.
  • 48. Ramsden, P. (2003). Learning to teach in higher education. Routledge.
  • 49. Rashid, A., Danezis, G., Chivers, H., Lupu, E., Martin, A., Lewis, M., & Peersman, C. (2018). Scoping the Cyber Security Body of Knowledge. IEEE Security & Privacy, 16(3), 96-102. https://doi.org/10.1109/MSP.2018.2701150.
  • 50. Robson, C. (2002). Real world research: A resource for social scientists and practitioner-researchers. Wiley-Blackwell.
  • 51. Robson, C., & McCartan, K. (2016). Real world research : a resource for users of social research methods in applied settings : fourth edition. John Wiley & Sons.
  • 52. Salah, K., Hammoud, M., & Zeadally, S. (2015). Teaching Cybersecurity Using the Cloud. IEEE Transactions on Learning Technologies, 8(4), 383-392. https://doi.org/10.1109/TLT.2015.2424692.
  • 53. Schlesinger, S. L., Heuwieser, W., & Schüller, L.-K. (2021). Comparison of Self-Directed and Instructor-Led Practice Sessions for Teaching Clinical Skills in Food Animal Reproductive Medicine. Journal of Veterinary Medical Education, 48(3), 310-318.
  • 54. Scruggs, T. E., & Mastropieri, M. A. (2007, 2007/05/15). Science Learning in Special Education: The Case for Constructed Versus Instructed Learning. Exceptionality, 15(2), 57-74. https://doi.org/10.1080/09362830701294144.
  • 55. Smith, A., Ling, P., & Hill, D. (2006). The adoption of multiple modes of delivery in Australian universities. Journal of University Teaching & Learning Practice, 3(2), 4-19.
  • 56. Stassen, M., Doherty, K., & Poe, M. (2001). Course-based review and assessment: Methods for understanding student learning www.umass.edu/oapa/sites/default/files/pdf/handbooks/course_based_assessment_handbook.pdf.
  • 57. Tadlaoui, M. A., & Chekou, M. (2021). A blended learning approach for teaching python programming language: towards a post pandemic pedagogy. International Journal of Advanced Computer Research, 11(52), 13.
  • 58. Tam, K., Moara-Nkwe, K., & Jones, K. D. (2021). The use of cyber ranges in the maritime context: Assessing maritime-cyber risks, raising awareness, and providing training. Maritime Technology and Research, 3(1), 16-30.
  • 59. Tang, C., & Biggs, J. (2007). Teaching for quality learning at university: what the student does. Society for Research into Higher Education & Open University Press.
  • 60. Trigwell, K. (2006). An analysis of the relations between learning and teaching approaches. Lifelong learning: Concepts and contexts, 108-116.
  • 61. Wehr, J. (1988, 1988/06//). Instructor-led or computer-based: which will work best for you? Training & Development Journal, 42(6), 18+.https://link.gale.com/apps/doc/A6919245/AONE?u=anon~7a8d862b&sid=googleScholar&xid=a4d3fff8.
  • 62. Xu, L., Huang, D., & Tsai, W. T. (2014). Cloud-Based Virtual Laboratory for Network Security Education. IEEE Transactions on Education, 57(3), 145-150. https://doi.org/10.1109/TE.2013.2282285.
  • 63. Yin, R. K. (2018). Case study research and applications. Sage.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-5b301d0e-3c9c-4500-8cc5-f9fdb838e6f1
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.