Cybersecurity Interventions for Teens: Two Time-Based Approaches

<italic>Contribution:</italic> Intervention effectiveness is shown to vary in its influence on teenagers’ outcomes with cybersecurity problem-solving and engagement. In-depth, high-intensity types of intervention may be more effective for female students. <italic>Background:</italic> Instructional interventions are being developed to address both the critical shortage in cybersecurity talent and gender gaps in the cyber workforce. These interventions need rigorous evaluation. Specific types of instructional strategies are particularly effective for STEM learning. Also, gender differences are found in the benefit students derive from certain instructional methods. An important question is whether certain instructional methods are particularly effective for cybersecurity learning, and consistent in both male and female students. <italic>Research Questions:</italic> Do cybersecurity interventions affect problem-solving, cybersecurity engagement, and/or cybersecurity self-efficacy? Are there gender differences in terms of intervention effectiveness? <italic>Methodology:</italic> Study 1 (<inline-formula> <tex-math notation="LaTeX">${n}\,\, {=}$ </tex-math></inline-formula> 79) included a 60-min workshop model where participants, assigned to treatment and control groups, completed surveys pre- and post-intervention. The treatment group experienced a workshop on computer networking, without any technology. The control group did not receive the workshop. Study 2 (<inline-formula> <tex-math notation="LaTeX">${n}\,\,{=}$ </tex-math></inline-formula> 34) was a week-long intervention whose participants had formal lessons, built websites, and defended themselves from an ongoing simulated cyberattack. Participants completed a survey on cybersecurity learning and engagement three times during the intervention. <italic>Findings:</italic> Study 1 showed no main treatment effect, but females experienced greater gains in problem-solving than males. In Study 2, there was positive growth over time and females experienced greater growth in cybersecurity self-efficacy relative to males.

[1]  Jim Euchner Design , 2014, Catalysis from A to Z.

[2]  Corey Schimpf,et al.  The Underrepresentation of Women in Computing Fields: A Synthesis of Literature Using a Life Course Perspective , 2017, IEEE Transactions on Education.

[3]  Laura Amo,et al.  Addressing Gender Gaps in Teens' Cybersecurity Engagement and Self-Efficacy , 2016, IEEE Security & Privacy.

[4]  Wenliang Du,et al.  Evaluating Cybersecurity Education Interventions: Three Case Studies , 2015, IEEE Security & Privacy.

[5]  Johan van Braak,et al.  Gender and socioeconomic related differences in performance based ICT competences , 2015, Comput. Educ..

[6]  Sylvia Beyer,et al.  Why are women underrepresented in Computer Science? Gender differences in stereotypes, self-efficacy, values, and interests and predictors of future CS course-taking and grades , 2014, Comput. Sci. Educ..

[7]  C. Deckard,et al.  Analysis of a Short-Term STEM Intervention Targeting Middle School Girls and Their Parents (Research to Practice) , 2014 .

[8]  Yael M. Bamberger,et al.  Encouraging Girls into Science and Technology with Feminine Role Model: Does This Work? , 2014 .

[9]  Silvia Sara Canetto,et al.  Academic Self‐Efficacy and Performance of Underrepresented STEM Majors: Gender, Ethnic, and Social Class Patterns , 2013 .

[10]  Ann Hergatt Huffman,et al.  Using technology in higher education: The influence of gender roles on technology self-efficacy , 2013, Comput. Hum. Behav..

[11]  R. Bybee,et al.  The Case for STEM Education: Challenges and Opportunities , 2013 .

[12]  Chiungjung Huang,et al.  Gender differences in academic self-efficacy: a meta-analysis , 2013 .

[13]  N. Heilbronner The STEM Pathway for Women , 2013 .

[14]  Chandra Muller,et al.  The More Things Change, the More They Stay the Same? Prior Achievement Fails to Explain Gender Inequality in Entry Into STEM College Majors Over Time , 2012, American educational research journal.

[15]  R. Watermeyer Confirming the legitimacy of female participation in science, technology, engineering and mathematics (STEM): evaluation of a UK STEM initiative for girls , 2012 .

[16]  H. Raghav Rao,et al.  Factors Affecting Bloggers' Knowledge Sharing: An Investigation Across Gender , 2011, J. Manag. Inf. Syst..

[17]  Jane Stout,et al.  STEMing the tide: using ingroup experts to inoculate women's self-concept in science, technology, engineering, and mathematics (STEM). , 2011, Journal of personality and social psychology.

[18]  C. Hill,et al.  Why So Few? Women in Science, Technology, Engineering, and Mathematics. , 2010 .

[19]  S. Upadhyaya,et al.  Internet and Online Information Privacy: An Exploratory Study of Preteens and Early Teens , 2009, IEEE Transactions on Professional Communication.

[20]  M. Mayo Video Games: A Route to Large-Scale STEM Education? , 2009, Science.

[21]  J. Fairweather,et al.  Linking Evidence and Promising Practices in Science , Technology , Engineering , and Mathematics ( STEM ) Undergraduate Education A Status Report for The National Academies National Research Council Board of Science Education , 2008 .

[22]  Jeria L. Quesenberry Encyclopedia of Gender and Information Technology , 2007 .

[23]  Gill Kirkup,et al.  Gender and cultural differences in Internet use: A study of China and the UK , 2007, Comput. Educ..

[24]  Anne C. Frenzel,et al.  Girls and mathematics —A “hopeless” issue? A control-value approach to gender differences in emotions towards mathematics , 2007 .

[25]  Shambhu Upadhyaya,et al.  Role of Perceived Importance of Information Security: An Exploratory Study of Middle School Children's Information Security Behavior , 2006 .

[26]  JinKyu Lee,et al.  A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field , 2005, ICISS.

[27]  J. Blickenstaff Women and science careers: leaky pipeline or gender filter? , 2005 .

[28]  H. Raghav Rao,et al.  Gender Divide in the Use of Internet Applications , 2005, Int. J. E Bus. Res..

[29]  Steve Vinoski,et al.  Toward Integration The More Things Change , 2001 .

[30]  Chrisila C. Pettey,et al.  Computer-related gender differences , 2003, SIGCSE.

[31]  Frank M. Pajares,et al.  The development of academic self-efficacy. , 2002 .

[32]  A. Bandura Self-Efficacy: The Exercise of Control , 1997, Journal of Cognitive Psychotherapy.

[33]  Michael J. Kavanagh The more Things Change, the more... , 1996 .

[34]  Nancy E. Betz,et al.  Self-Efficacy and Career Choice and Development , 1995 .

[35]  Anthony S. Bryk,et al.  Hierarchical Linear Models: Applications and Data Analysis Methods , 1992 .

[36]  Carolyn Hopp,et al.  Gender Comparisons of Mathematics Attitudes and Affect: A Meta-Analysis , 1990 .

[37]  Nancy E. Betz,et al.  The Relationship of Career-Related Self-Efficacy Expectations to Perceived Career Options in College Women and Men. , 1981 .

[38]  L. Cronbach Coefficient alpha and the internal structure of tests , 1951 .