Автор: Zurab Jishkariani
Организация: Scientific Cyber Security Association


Ключевые слова: Cybersecurity Education, Secondary School, Secondary School Curriculum, Educational Models, Obstacles and Difficulties
Аннотация. In the contemporary era characterized by pervasive digitization, the significance of cybersecurity has escalated markedly for individuals, the private sector, and the broader national landscape. Given the proliferation of cyber threats, encompassing hacking, identity theft, and data breaches, it is imperative that individuals possess the requisite knowledge to safeguard themselves and their online information. Nevertheless, the incorporation of cybersecurity education within the secondary school curriculum remains notably limited, rendering students susceptible to cyber threats. This research paper endeavors to scrutinize the existing landscape of cybersecurity education within secondary schools, aiming to identify optimal practices and strategies for imparting cybersecurity knowledge to young students. Additionally, the paper investigates the impediments and challenges associated with integrating cybersecurity education into secondary schools, proposing recommendations to enhance the effectiveness of cybersecurity education within this educational context.


Gitterman, A. (2004). Interactive andragogy: Principles, methods, and skills. Journal of Teaching in Social Work, 24(¾), 95-112. Retrieved from https://www.bu.edu/ssw/files/2010/11/Alex-Gitterman1.pdfMallon, M. N. (2013). Extending the learning process: Using the theory of connectivism to inspire student collaboration. CULS Proceedings, 3, 18-27. Retrieved from https://soar.wichita.edu/bitstream/handle/10057/5571/1833-6771-1-PB.pdf?sequence=1
Schell, G. P. & Janicki, T. J. (2013). Online course pedagogy and the constructivist learning model. Journal of the Southern Association for Information Systems, 1(1). Retrieved from https://dx.doi.org/10.3998/jsais.11880084.0001.104
Sobels, J. Szili, G., & Bass, D. (2015). Using constructivist teaching tools to stimulate active learning in first year environmental management undergraduates. Planet, 25(1), 21-26. Retrieved from https://doi.org/10.11120/plan.2012.00250021
Xu, W.L, Pedersen, N.L., Keller, L., Kalpouzos, G., Wang, H.X., Graff, C,. Fratiglioni, L. (2015). HHEX_23 AA Genotype Exacerbates Effect of Diabetes on Dementia and Alzheimer Disease: A Population-Based Longitudinal Study. PLOS. Retrieved from https://journals.plos.org/plosmedicine/article?id=10.1371/journal.pmed.1001853
The State of Cybersecurity Education in K-12 Schools https://cyber.org/sites/default/files/2020-06/The%20State%20of%20Cybersecurity%20Education%20in%20K-12%20Schools.pdf
CISA: Protecting Our Future: Partnering to Safeguard K-12 Organizations from Cybersecurity https://www.cisa.gov/news-events/news/cisa-releases-report-k-12-schools-help-address-evolving-cybersecurity-threats
EdTech Leadership Survey (2022): https://www.cosn.org/tools-and-resources/resource/edtech-leadership-survey-report-2022/
L. Wang, J. Yang, P. Wan Educational modules and research surveys on critical cybersecurity topics Int J Distrib Sens Netw, 16 (9) (2020), pp. 1-18 https://scholar.google.com/scholar_lookup?title=Educational%20modules%20and%20research%20surveys%20on%20critical%20cybersecurity%20topics&publication_year=2020&author=L.%20Wang&author=J.%20Yang&author=P.%20Wan
F. Katz Breadth vs. depth: Best practices teaching cybersecurity in a small public university The Cyber Defense Review, 3 (2) (2018), pp. 65-72 https://scholar.google.com/scholar_lookup?title=Breadth%20vs.%20depth%3A%20Best%20practices%20teaching%20cybersecurity%20in%20a%20small%20public%20university&publication_year=2018&author=F.%20Katz
M. Lauver Top 4 obstacles to K-12 cybersecurity https://www.securitymagazine.com/articles/97290-top-4-obstacles-to-k-12-cybersecurity
M. Coenraad, A. Pellicone, D. Jass Ketelhut, M. Cukier, J. Plane, D. Weintrop Experiencing cybersecurity one game at a time: A systematic review of cybersecurity digital games Simulation & Gaming, 51 (5) (2020), pp. 586-611 https://scholar.google.com/scholar_lookup?title=Experiencing%20cybersecurity%20one%20game%20at%20a%20time%3A%20A%20systematic%20review%20of%20cybersecurity%20digital%20games&publication_year=2020&author=M.%20Coenraad&author=A.%20Pellicone&author=D.%20Jass%20Ketelhut&author=M.%20Cukier&author=J.%20Plane&author=D.%20Weintrop