Skip to main content
Log in

First year students’ experience in a Cyber World course – an evaluation

  • Published:
Education and Information Technologies Aims and scope Submit manuscript

A Correction to this article was published on 11 September 2020

This article has been updated

Abstract

Although cybersecurity is a major present concern, it is not a required subject in University. In response, we developed Cyber World which introduces students to eight highly important cybersecurity topics (primarily taught by none cybersecurity experts). We embedded it into our critical thinking Common Course (core curriculum) which is a team-taught first-year experience required for all students. Cyber World was first taught in Fall 2018 to a cohort of over 150 students from various majors at the University of New Haven. This article presents the evaluation of our Fall taught course. In detail, we compare the performance of Cyber World students to other Common Course sections that ran in parallel and conclude that despite the higher workload students performed equally well. Furthermore, we assess the students’ development throughout the course with respect to their cybersecurity knowledge where our results indicate a significant gain of knowledge. Note, this article also presents the idea and topics of Cyber World; however a detailed explanation has been released previously.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Change history

  • 11 September 2020

    The published version of this article unfortunately contains blinded information.

Notes

  1. https://www.loyola.edu/academics/computer-science/degrees/non-majors

  2. https://niccs.us-cert.gov/about-niccs/glossary

References

  • Allen, M. (2014). Using rubrics to grade, assess, and improve student learning. Strengthening Our Roots: Quality, Opportunity & Success Professional Development Day, 82.

  • Breitinger, F., & Nickel, C. (2010). User survey on phone security and usage. In Biosig (pp. 139–144).

  • Brookhart, S.M., & Chen, F. (2015). The quality and effectiveness of descriptive rubrics. Educational Review, 67(3), 343–368.

    Article  Google Scholar 

  • Das, A., Voorhees, D., Choi, C., & Landwehr, C.E. (2017). Cybersecurity for future presidents: an interdisciplinary non-majors course. In Proceedings of the 2017 ACM SIGCSE technical symposium on computer science education (pp. 141–146).

  • Dawson, P. (2017). Assessment rubrics: towards clearer and more replicable design, research and practice. Assessment & Evaluation in Higher Education, 42 (3), 347–360.

    Article  Google Scholar 

  • Dupuis, M.J. (2017). Cyber security for everyone: an introductory course for non-technical majors. Journal of Cybersecurity Education, Research and Practice, 2017(1), s3.

    Google Scholar 

  • Educause. (2018). Top 10 IT issues, technologies, and trends. (https://www.educause.edu/research-and-publications/research/top-10-it-issues-technologies-and-trends).

  • Edwards, J.B. (2018). Added value or essential instruction?: Librarians in the twenty-first-century classroom. Reference & User Services Quarterly, 57 (4), 285–293.

    Article  Google Scholar 

  • Gibson, C., & Jacobson, T.E. (2018). Habits of mind in an uncertain information world. Reference & User Services Quarterly, 57(3), 183–192.

    Article  Google Scholar 

  • Haigh, R.W. (1985). Planning for computer literacy. The Journal of Higher Education, 56(2), 161–171.

    Article  Google Scholar 

  • Heinricher, A. (2019). Introduction: a little bit of history. In Wobbe, K., & Stoddard, E.A. (Eds.) Project-based learning in the first-year: beyond all expectations (pp. 13–18). Stylus Publishing.

  • Hendler, J., Shadbolt, N., Hall, W., Berners-Lee, T., & Weitzner, D. (2008). Web science: an interdisciplinary approach to understanding the web. Communications of the ACM, 51(7), 60–69.

    Article  Google Scholar 

  • Johnston, B., & Webber, S. (2003). Information literacy in higher education: a review and case study. Studies in Higher Education, 28(3), 335–350.

    Article  Google Scholar 

  • Karkehabadi, S. (2013). Using rubrics to measure and enhance student performance. Retrieved last accessed 2019-09-07, from https://www.nvcc.edu/assessment/_docs/FTW5.usingrubricsmeasurestuperf-spr13.pdf.

  • Korovessis, P., Furnell, S., Papadaki, M., & Haskell-Dowland, P. (2017). A toolkit approach to information security awareness and education. Journal of Cybersecurity Education, Research and Practice, 2017(2), 5.

    Google Scholar 

  • Nager, A., & Atkinson, R. (2016). The case for improving US computer science education. Information Technology & Innovation Foundation (http://www2.itif.org/2016-computer-science-education.pdf).

  • National Resource Center. (2019). About us: mission statement. https://sc.edu/about/offices_and_divisions/national_resource_center/about/index.php. University of South Carolina.

  • Office of Institutional Research and Assessment at the University of North Carolina. (2017). Using rubrics to assess student learning outcomes at the program level. Retrieved last accessed 2019-09-07, from https://oira.unc.edu/files/2017/07/Developing-and-Using-Rubrics.pdf.

  • Ponemon Institute. (2018). Date-Added 2020-07-29 08:44:18 + 0200, Date-Modified 2020-07-29 08:48:34 + 0200, Ponemon Institute, Oct, 2018 Cost of Data Breach Study: Impact of Business Continuity Management https://www.ibm.com/downloads/cas/AEJYBPWA,.

  • Ragupathi, K., & Lee, A. (2020) In Sanger, Catherine Shea and Gleason Nancy W. (Ed.), Beyond Fairness and Consistency in Grading: The Role of Rubrics in Higher Education, (pp. 73–95). Singapore: Springer Singapore. https://doi.org/10.1007/978-981-15-1628-3_3 ISBN 978-981-15-1628-3.

  • Reddy, Y.M., & Andrade, H. (2010). A review of rubric use in higher education. Assessment & Higher Education, 35(4), 435–448.

    Article  Google Scholar 

  • Ricci, J., Breitinger, F., & Baggili, I. (2018). Survey results on adults and cybersecurity education. Education and Information Technologies, 1–19. Retrieved from https://doi.org/10.1007/s10639-018-9765-8.

  • Smith, B.F., & Brackin, R. (1993). Components of a comprehensive orientation program. In Designing successful transitions: a guide for orienting students to college (pp. 35–48).

  • Sobiesk, E., Blair, J., Conti, G., Lanham, M., & Taylor, H. (2015). Cyber education: a multi-level, multi-discipline approach. In Proceedings of the 16th annual conference on information technology education (pp. 43–47).

  • Stiller, E., & LeBlanc, C. (2006). From computer literacy to cyber-literacy. Journal of Computing Sciences in Colleges, 21(6), 4–13.

    Google Scholar 

  • Tavani, H.T. (2002). Applying an interdisciplinary approach to teaching computer ethics. IEEE Technology and Society Magazine, 21(3), 32–38.

    Article  Google Scholar 

  • Upcraft, M.L. (1993). Orienting today’s students. In NOTE 213p. Available from University of South Carolina, The Freshman Year Experience, Columbia (pp. 1–8).

  • Werner, L. (2005). Redefining computer literacy in the age of ubiquitous computing. In Proceedings of the 6th conference on Information technology education (pp. 95–99).

  • Przyborski, Kristen, Breitinger, Frank, Beck, Lauren, Harichandran, & Ronald. (2019). “CyberWorld” as a Theme for a University-wide First-year Common Course ASEE Annual Conference & Exposition.

Download references

Acknowledgements

The work reported in this paper was supported by a grant from the Davis Educational Foundation established by Stanton and Elisabeth Davis after Mr. Davis’s retirement as chairman of Shaw’s Supermarkets, Inc. We acknowledge the following faculty from the University of New Haven who participated in teaching the Cyber World Course: Ibrahim Baggili, Guy-Serge Emmanuel, Michael French, Glenn McGee, and Matthew Schmidt.

Funding

This work was supported by the Davis Educational Foundation. Any opinions, findings, and conclusions or recommendations expressed in this work are those of the authors and do not necessarily reflect the views of the Davis Educational Foundation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Frank Breitinger.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Ethical approval

All procedures performed in studies involving human participants were in accordance with the ethical standards of the Human Research Ethics Committee (HREC) and with the 1964 Helsinki declaration and its later amendments or comparable ethical standards.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original version of this article was revised: (1) In the 3rd paragraph, 1st line of the Introduction, the “blinded review” in the sentence “At the blinded for review, University of New Haven...” must be removed. (2) In the 5th line of the same paragraph, “[ref blinded for review]” is changed to [Przyborski et al. 2019].

Appendix: Rubric

Appendix: Rubric

Table 6 Rubric used to evaluate project proposal

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Breitinger, F., Tully-Doyle, R., Przyborski, K. et al. First year students’ experience in a Cyber World course – an evaluation. Educ Inf Technol 26, 1069–1087 (2021). https://doi.org/10.1007/s10639-020-10274-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10639-020-10274-5

Keywords

Navigation