AI in Cybersecurity Education- A Systematic Literature Review of Studies on Cybersecurity MOOCs

Machine learning (ML) techniques are changing both the offensive and defensive aspects of cybersecurity. The implications are especially strong for privacy, as ML approaches provide unprecedented opportunities to make use of collected data. Thus, education on cybersecurity and AI is needed. To investigate how AI and cybersecurity should be taught together, we look at previous studies on cybersecurity MOOCs by conducting a systematic literature review. The initial search resulted in 72 items and after screening for only peer-reviewed publications on cybersecurity online courses, 15 studies remained. Three of the studies concerned multiple cybersecurity MOOCs whereas 12 focused on individual courses. The number of published work evaluating specific cybersecurity MOOCs was found to be small compared to all available cybersecurity MOOCs. Analysis of the studies revealed that cybersecurity education is, in almost all cases, organised based on the topic instead of used tools, making it difficult for learners to find focused information on AI applications in cybersecurity. Furthermore, there is a gab in academic literature on how AI applications in cybersecurity should be taught in online courses.

[1]  Mariarosaria Taddeo,et al.  How AI can be a force for good , 2018, Science.

[2]  Lubomir T. Chitkushev,et al.  A Course on Computer and Network Security: Teaching Online Versus Face-to-Face , 2007, World Conference on Information Security Education.

[3]  Gordon W. Romney,et al.  Curriculum for Hands-on Artificial Intelligence Cybersecurity , 2019, 2019 18th International Conference on Information Technology Based Higher Education and Training (ITHET).

[4]  Rafael Valencia-García,et al.  Basis for an integrated security ontology according to a systematic review of existing proposals , 2011, Comput. Stand. Interfaces.

[5]  Roland Klemke,et al.  Gamification to empower information security education , 2017, GamiFIN.

[6]  Ivana Simonova,et al.  Innovations in teaching computer networks subjects , 2016, 2016 IEEE Conference on e-Learning, e-Management and e-Services (IC3e).

[7]  Melissa Dark,et al.  Transitioning from Face-to-Face to Online Instruction: How to Increase Presence and Cognitive/Social Interaction in an Online Information Security Risk Assessment Class , 2007, Int. J. Inf. Commun. Technol. Educ..

[8]  Alexander Maedche,et al.  Gamified crowdsourcing: Conceptualization, literature review, and future agenda , 2017, Int. J. Hum. Comput. Stud..

[9]  Hiroshi Ueda,et al.  Deployment of Multilanguage Security Awareness Education Online Course by Federated Moodle in Japan , 2017, 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC).

[10]  Barbara Kitchenham,et al.  Procedures for Performing Systematic Reviews , 2004 .

[11]  Qihui Wu,et al.  A survey of machine learning for big data processing , 2016, EURASIP Journal on Advances in Signal Processing.

[12]  Martti Lehto,et al.  Artificial intelligence in the cyber security environment , 2019 .

[13]  Wingyan Chung Developing curricular modules for cybersecurity informatics: An active learning approach , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).

[14]  Soumendra Mohanty,et al.  Cybersecurity and AI , 2018 .

[15]  Laurie A. Williams,et al.  Teaching Secure Software Development Through an Online Course , 2017, SecSE@ESORICS.

[16]  Rachelle S. Heller,et al.  Reach to Teach: Preparing Cybersecurity Experts as Adjunct Community College Faculty , 2019, CSEDU.

[17]  Yan Bai,et al.  Teaching network risk assessment to online graduate students , 2007, InfoSecCD '07.

[18]  José María de Fuentes,et al.  Design recommendations for online cybersecurity courses , 2019, Comput. Secur..

[19]  William Newhouse,et al.  National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (Portuguese translation) , 2017 .

[20]  Cheuk Hang Au,et al.  Using animation to develop a MOOC on Information Security , 2016, 2016 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM).

[21]  Roman V. Yampolskiy,et al.  Artificial Intelligence Safety and Cybersecurity: a Timeline of AI Failures , 2016, ArXiv.

[22]  Govind Bhattacharjee The Curious Cases of Unruly Robots , 2018 .

[23]  Tam N. Nguyen,et al.  Certified ethical hacker v.10 online course: a case study , 2018, IC4E.

[24]  Paul Voigt,et al.  The EU General Data Protection Regulation (GDPR) , 2017 .

[25]  D. Moher,et al.  Preferred reporting items for systematic reviews and meta-analyses: the PRISMA Statement , 2009, BMJ : British Medical Journal.