Cybersecurity Index for Undergraduate Computer Science Courses in the UK

The paper proposes a novel index to classify how well UK Computer Science courses articulate cybersecurity-related content through their course/module pages. The aim of this work is to raise awaren...

[1]  Catriel Beeri,et al.  A High School Program in Computer Science , 1995, Computer.

[2]  D. Shoemaker,et al.  The Complete Guide to Cybersecurity Risks and Controls , 2016 .

[3]  Robert Ramirez Making cyber security interdisciplinary : recommendations for a novel curriculum and terminology harmonization , 2017 .

[4]  Rodrigo Ruiz,et al.  The leakage of passwords from home banking sites: A threat to global cyber security? , 2017 .

[5]  Rodrigo Ruiz,et al.  A Study of the UK Undergraduate Computer Science Curriculum: A Vision of Cybersecurity , 2019, 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3).

[6]  Simon L. Peyton Jones,et al.  Bringing computer science back into schools: lessons from the UK , 2013, SIGCSE '13.

[7]  Dan Boneh,et al.  An Analysis of Private Browsing Modes in Modern Browsers , 2010, USENIX Security Symposium.

[8]  Sue Sentance,et al.  Grand challenges for the UK: upskilling teachers to teach computer science within the secondary curriculum , 2012, WiPSCE.

[9]  Maurice Dawson,et al.  Improving Cyber Defense Education Through National Standard Alignment: Case Studies , 2018, IoT 2018.

[10]  Rogério Winter,et al.  Lazarus: Data Leakage with PGP and Resurrection of the Revoked User , 2016, J. Cyber Secur. Mobil..

[11]  Maurice Dawson,et al.  Hyper-connectivity: intricacies of national and international cyber securities , 2017 .

[12]  Rodrigo de S. Ruiz,et al.  Security Issue on Cloned TrueCrypt Containers and Backup Headers , 2014 .

[13]  Lynn Lambert,et al.  Computer Science in New Zealand high schools , 2010, ACE '10.

[14]  Ferrari Anusca DIGCOMP: A Framework for Developing and Understanding Digital Competence in Europe. , 2013 .

[15]  Peter M. Bednar,et al.  Understanding Security Practices Deficiencies: A Contextual Analysis , 2015, HAISA.

[16]  Hamid Jahankhani,et al.  Analyzing Human Factors for an Effective Information Security Management System , 2013, Int. J. Secur. Softw. Eng..

[17]  Liwen Vaughan,et al.  Webometrics , 2005, Annu. Rev. Inf. Sci. Technol..

[18]  Nick Feamster,et al.  Dos and don'ts of client authentication on the web , 2001 .

[19]  Rodrigo de S. Ruiz Overconfidence: Personal Behaviors Regarding Privacy that Allows the Leakage of Information in Private Browsing Mode , 2015 .

[20]  Sangjin Lee,et al.  Advanced evidence collection and analysis of web browser activity , 2011, Digit. Investig..

[21]  An Observational Study of Peer Learning for High School Students at a Cybersecurity Camp. , 2016 .

[22]  NEIL C. C. BROWN,et al.  Restart: The Resurgence of Computer Science in UK Schools , 2014, TOCE.

[23]  Don Passey,et al.  Computer science (CS) in the compulsory education curriculum: Implications for future research , 2017, Education and Information Technologies.

[24]  B.M. McMillin,et al.  Safe computing , 1989, IEEE Potentials.