Abstract
This article examines the impact of experiential pedagogy in integrating cybersecurity into the social science undergraduate curriculum of Historically Black University. The article is based on a National Science Foundation project, where twenty-six socio-cybersecurity modules were created, and some were integrated into Sociology and Criminal Justice courses. The impact of one of the modules, “Phishing and Deviance”, on cybersecurity learning outcomes is the focus of this article. The two research questions for this article are: 1) Was cybersecurity awareness increased after the infusion of the Phishing and Deviance Modules? 2) Were cybersecurity learning outcomes impacted by using experiential pedagogy? Vygotsky’s experiential learning theory was the grounding theory that guided the integration of the modules. The methodology included a pretest survey of students’ awareness of phishing, the module’s lecture and experiential activities, then a post-test survey of cybersecurity awareness. T-test analysis was performed on the data obtained from the quasi-experimental survey data. The results from the student responses demonstrate that experiential pedagogy was helpful and allowed them to showcase their new knowledge. This curriculum development project shows significant development in African American students’ awareness of cybersecurity at our institution. Post-research endeavors have expanded the socio-cybersecurity modules using constructivist experiential learning to other disciplines and institutions. Further research efforts can include developing more expansive socio-cybersecurity content like courses and programs and measuring their impacts through tracer studies and program evaluations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Turner, C.F., Turner, C.M.: Integrating cybersecurity into the sociology curriculum: the case of the password module. J. Comput. Sci. Coll. 33(1), 109–117 (2017)
Buchanan Turner, C., Turner, C.: Analyzing the impact of experiential pedagogy in teaching socio-cybersecurity: cybersecurity across the curriculum. J. Comput. Sci. Coll. 34(5), 12–22 (2019)
Finnemore, M., Hollis, D.: Constructing norms for global cybersecurity. Am. J. Int. Law 110(3), 425–479 (2016)
Odlyzko, A.: Economics, psychology, and sociology of security. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 182–189. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45126-6_13
Spidalieri, F., McArdle, J.: Transforming the Next Generation of Military Leaders into Cyber-Strategic Leaders: the role of cybersecurity education in US service academies. Cyber Def. Rev. 1(1), 141–164 (2016)
Hern, A.: Cambridge Analytica: how did it turn clicks into votes? 6 May 2018. https://www.theguardian.com/news/2018/may/06/cambridge-analytica-how-turn-clicks-into-votes-christopher-wylie
Jarvis, P., Holford, J., Griffin, C.: The Theory and Practice of Learning, 2 edn. Stylus, London and Sterling (2012)
Prawat, R.S.: Dewey and Vygotsky viewed through the rearview mirror-and dimly at that. Educ. Res. 31(5), 16–20 (2002)
Vygotsky, L.S.: Research method. In: Research Method. Collected Works of L. S. Vygotsky: 4. The History of the Development of Higher Mental Functions, pp. 27–63. Plenum, New York, (1997)
Manolis, C., Burns, D.J., Assudani, R., Chinta, R.: Assessing experiential learning styles: a methodological reconstruction and validation of the Kolb learning style inventory. Learn. Individ. Differ. 23, 44–53 (2013)
Korgen, K.O., Atkinson, M.P.: Sociology in Action. Sage Publications, New York (2018)
Holmes, H.M.: Integrating the learning of mathematics and science using interactive teaching and learning strategies. J. Sci. Educ. Technol. 15(3), 247–256 (2006)
Gardener, M.: Modules and minicourses for integrated science. Sci. Teach. 40(2), 31–32 (1973)
Nye, B.A., Thigpin, C.G.: Examining the relationship between process-oriented staff development and classroom practices using integrated mathematics and science instructional modules. J. Elem. Sci. Educ. 5(1), 10–26 (1993)
Varma, K., Husic, F., Linn, M.C.: Targeted support for using technology-enhanced science inquiry modules. J. Sci. Educ. Technol. 17(4), 341–356 (2008)
Turner, C., Taylor B., Kaza, S.: Security in computer literacy. In: Proceedings of the 42nd ACM technical symposium on Computer science education - SIGCSE 2011 (2011)
Phishing and Deviance Module: Socio-Cybersecurity Project. http://www.nsusociocybersecurity.org/modules/social-problems/phishing. Accessed 23 Dec 2022
Cavanaugh, C., Dawson, K.: Design of online professional development in science content and pedagogy: a pilot study. J. Sci. Educ. Technol. 19(5), 438–446 (2010)
Roebuck, J.B., Murty, K.S.: Historically Black Colleges and Universities: Their Place in American Higher Education. Praeger, Westport (1993)
U.S. Census Bureau: Types of internet subscriptions by selected characteristics 2013–2017 (2019). https://factfinder.census.gov
Toldson, I.A.: Weeding out v. building up: why Justice Scalia was wrong about black scientists (editor’s contribution). J. Negro Educ. 84(4), 517–518 (2015)
Bond, M.: Being an Ethical Warrior: How Labeling Theory Influences Police Officers and Their Patrol Perceptions. Public Safety, 6 February 2014
Schutt, R.K.: Investigating the Social World: The Process and Practice of Research, 9th edn. Sage, Boston (2019)
Blackboard: Phishing and Deviance Survey on Blackboard
Choong, Y.Y., Theofanos, M., Liu, H.K.: United States Federal Employees’ Password Management Behaviors a Department of Commerce Case Study. U.S. Department of Commerce (2014)
CUPS: Anti-Phishing Phil. CMU Usable Privacy and Security Laboratory, Carneige Mellon University. https://www.ucl.ac.uk/cert/antiphishing/
Kremling, J., Sharp Parker, A.M.: Cyberspace, Cybersecurity and Cybercrime. Sage Publications, Los Angeles (2018)
Ramlo, S.E., Nicholas, J.B.: Divergent student views of cybersecurity. J. Cybersecur. Educ. Res. Pract. 2019(2), Article 6 (2020)
Cyber4All: New ‘Cyber4All’ Cybersecurity Minor Open 4 All Undergrads (2017). http://catalog.nec.edu/preview_program.php?catoid=11&poid=1201&returnto=246
Saltzer, J., Schroeder, M.: The protection of information in computer systems. In: Proceedings of IEEE (1975)
Taylor, B., Azadegan, S.: Using security checklists and scorecards in CS Curriculum. In: National Colloquium for Information Systems Security Education, pp. 4–9 (2007)
Taylor, B., Azadegan, S.: Teaching security through active learning. In: Proceedings of Frontiers in Education: Computer Science and Engineering, Las Vegas (2007)
Brown, M.C., II.: The declining significance of historically black colleges and universities: relevance, reputation, and reality in Obamamericax. J. Negro Educ. 82(1), 3–19 (2013)
Acknowledgements
This research is based on work supported by the National Science Foundation under Grant No. 1956428.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Turner, C.B., Turner, C., Ashe, A. (2023). Teaching Cybersecurity with Experiential Learning: The Case of the Phishing and Deviance Module in Social Science Courses. In: Arai, K. (eds) Intelligent Computing. SAI 2023. Lecture Notes in Networks and Systems, vol 711. Springer, Cham. https://doi.org/10.1007/978-3-031-37717-4_83
Download citation
DOI: https://doi.org/10.1007/978-3-031-37717-4_83
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-37716-7
Online ISBN: 978-3-031-37717-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)