Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 2349-8161
Online ISSN: 2349-817X


  About ISEJ
  Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Contact us
 
  For Authors
  Guidelines for Contributors
Online Submission
Statement of Ethics and Responsibilities
Review Policies
Transfer of Copyright
Archiving Policy
Call for Papers
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
Journal of Multimedia Processing and Technologies (JMPT)
International Journal of Web Application (IJWA)

 

 
Information Security Education Journal (ISEJ)
 

A Virtual and On-site Hackathon to Recruit High School Students within Cybersecurity Major
Yunkai Liu
Gannon University. Erie Pennsylvania USA
Abstract: Cybersecurity is a rapidly growing field with jobs in high demand, however, it becomes a challenge to inspire high school student interest in the discipline. Traditionally, a hackathon is an event designated to broaden participation and perceptions in computing. It is usually programming-intensive and does not fulfil the features of cybersecurity. Faculty and staff from Gannon University recently designed and implemented an innovative hackathon event which included both virtual and on-site competitions. Student feedback and growth of enrolment demonstrated the program’s efficiency and effectiveness under tight-budget circumstances. This paper is an extension of work presented at Frontier in Education (FIE) 2020 and published in its proceedings [1].
Keywords: Cybersecurity, Hackathon, K12 Education A Virtual and On-site Hackathon to Recruit High School Students within Cybersecurity Major
DOI:https://doi.org/10.6025/isej/2021/8/2/31-38
Full_Text   PDF 895 KB   Download:   169  times
References:

[1] Liu, Y., Cannell, J. C., Coffman, J. H. (2020). Gannon University Hackathon: A Combination of Virtual and Onsite Education Event to Recruit High-School Students within Cybersecurity Major. In 2020 IEEE Frontiers in Education Conference (FIE), 1- 4.
[2] Schmidt, L. (2015). Perspective on 2015 DoD cyber strategy. Rand Corp Santa Monica CA.
[3] Francis, K. A. and Wendy, G. (2016). The Federal Cybersecurity Workforce: Background and Congressional Oversight Issues for the Departments of Defense and Homeland Security. Information Security Education Journal Volume 8 Number 2 38 December 2021
[4] Etzioni, A. (2011). Cybersecurity in the private sector. Issues in Science and Technology 28.1, 58-62.
[5] Hiller, J. S. and Roberta, S. R. (2013). The challenge and imperative of private sector cybersecurity: An international comparison. Computer Law & Security Review 29.3, 236-245.
[6] Farwell, J. P. (2012). Industry’s vital role in national cyber security. Strategic Studies Quarterly 6.4, 10-41.
[7] Carr, M. (2016). Public–private partnerships in national cyber-security strategies. International Affairs 92.1, 43-62.
[8] Burrell, D. N. (2020). An Exploration of the Cybersecurity Workforce Shortage. Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications. IGI Global, 1072-1081.
[9] Ambrosin, M. et al. (2018). Security and privacy analysis of national science foundation future internet architectures. IEEE Communications Surveys & Tutorials 20.2, 1418-1442.
[10] Kallberg, J. and Thuraisingham, J. (2012). Towards cyber operations-The new role of academic cyber security research and education. In 2012 IEEE International Conference on Intelligence and Security Informatics, 132-134.
[11] Kallberg, J. (2013). Cyber Operations–Bridging from Concept to Cyber Superiority. Joint Forces Quarterly 68.
[12] Raj, R. K. and Parrish, A. (2018). Toward standards in undergraduate cybersecurity education in 2018. Computer 51.2, 72-75.
[13] Briscoe, G. (2014). Digital innovation: The hackathon phenomenon.
[14] Trainer, E. H., et al. (2016). How to hackathon: Socio-technical tradeoffs in brief, intensive collocation. The proceedings of the 19th ACM conference on computer-supported cooperative work & social computing.
[15] White, G. B., Dwayne, W., and Keith, H. (2010). The CyberPatriot national high school cyber defense competition. IEEE Security & Privacy 8.5, 59-61.
[16] Manson, D., Curl, S., and Carlin, A. (2012). CyberPatriot: Exploring university-high school partnerships. Communications of the IIMA 12.1, 6.
[17] Creutzburg, R. (2018). Cybersecurity and Forensic Challenges-A Bibliographic Review. Electronic Imaging 2018.6, 100-1.
[18] Gordon, L. A., Loeb, M. P., Lucyshyn, W. (2014). Cybersecurity Investments in the Private Sector: The Role of Governments. Georgetown Journal of International Affairs, 79–88. http://www.jstor.org/stable/43773651
[19] Brennan, J. (2020). Civic Hackathons for Youth. National Civic Review, 108 (4) 55–64. https://www.jstor.org/stable/10.32543/ naticivirevi.108.4.0055
[20] Briscoe, G. (2014). Digital innovation: The hackathon phenomenon.


Copyright 2013 socio.org.uk