Loading…

Improving cybersecurity skill development through visual programming

Purpose Cybersecurity training plays a decisive role in overcoming the global shortage of cybersecurity experts and the risks this shortage poses to organizations' assets. Seeking to make the training of those experts as efficacious and efficient as possible, this study investigates the potenti...

Full description

Saved in:
Bibliographic Details
Published in:Information and computer security 2023-06, Vol.31 (3), p.316-330
Main Authors: Glas, Magdalena, Vielberth, Manfred, Reittinger, Tobias, Böhm, Fabian, Pernul, Günther
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c353t-6437700f59704bb637db35dcce18a9c4b473f9bfab0034b4adbc0aa3ce9422b83
cites cdi_FETCH-LOGICAL-c353t-6437700f59704bb637db35dcce18a9c4b473f9bfab0034b4adbc0aa3ce9422b83
container_end_page 330
container_issue 3
container_start_page 316
container_title Information and computer security
container_volume 31
creator Glas, Magdalena
Vielberth, Manfred
Reittinger, Tobias
Böhm, Fabian
Pernul, Günther
description Purpose Cybersecurity training plays a decisive role in overcoming the global shortage of cybersecurity experts and the risks this shortage poses to organizations' assets. Seeking to make the training of those experts as efficacious and efficient as possible, this study investigates the potential of visual programming languages (VPLs) for training in cyber ranges. For this matter, the VPL Blockly was integrated into an existing cyber range training to facilitate learning a code-based cybersecurity task, namely, creating code-based correlation rules for a security information and event management (SIEM) system. Design/methodology/approach To evaluate the VPL’s effect on the cyber range training, the authors conducted a user study as a randomized controlled trial with 30 participants. In this study, the authors compared skill development of participants creating SIEM rules using Blockly (experimental group) with participants using a textual programming approach (control group) to create the rules. Findings This study indicates that using a VPL in a cybersecurity training can improve the participants' perceived learning experience compared to the control group while providing equally good learning outcomes. Originality/value The originality of this work lies in studying the effect of using a VPL to learn a code-based cybersecurity task. Investigating this effect in comparison with the conventional textual syntax through a randomized controlled trial has not been investigated yet.
doi_str_mv 10.1108/ICS-11-2022-0170
format article
fullrecord <record><control><sourceid>proquest_emera</sourceid><recordid>TN_cdi_emerald_primary_10_1108_ICS-11-2022-0170</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2828298391</sourcerecordid><originalsourceid>FETCH-LOGICAL-c353t-6437700f59704bb637db35dcce18a9c4b473f9bfab0034b4adbc0aa3ce9422b83</originalsourceid><addsrcrecordid>eNptkN9LwzAQx4MoOObefSz4HHeXtE3zKPNXYeCDCr6FJE23znadSTvYf2_GRBDkHu4O7nNf-BByjXCLCMW8XLxSRMqAMQoo4IxMGGQ5TaX4OP-dc7wksxA2AIASc57jhNyX3c73-2a7SuzBOB-cHX0zHJLw2bRtUrm9a_td57ZDMqx9P67Wyb4Jo26TiK287rqIXpGLWrfBzX76lLw_Prwtnuny5alc3C2p5RkfaJ5yIQDqTApIjcm5qAzPKmsdFlra1KSC19LU2gDwuOnKWNCaWydTxkzBp-Tm9Ddmf40uDGrTj34bIxUrYsmCS4xXcLqyvg_Bu1rtfNNpf1AI6qhLRV1xUEdd6qgrIvMT4jrndVv9R_wRzL8BiBBsRw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2828298391</pqid></control><display><type>article</type><title>Improving cybersecurity skill development through visual programming</title><source>Criminology Collection</source><source>ABI/INFORM Global (ProQuest)</source><source>Library &amp; Information Science Abstracts (LISA)</source><source>Emerald:Jisc Collections:Emerald Subject Collections HE and FE 2024-2026:Emerald Premier (reading list)</source><source>Social Science Premium Collection (Proquest) (PQ_SDU_P3)</source><source>Library &amp; Information Science Collection</source><source>Alma/SFX Local Collection</source><creator>Glas, Magdalena ; Vielberth, Manfred ; Reittinger, Tobias ; Böhm, Fabian ; Pernul, Günther</creator><creatorcontrib>Glas, Magdalena ; Vielberth, Manfred ; Reittinger, Tobias ; Böhm, Fabian ; Pernul, Günther</creatorcontrib><description>Purpose Cybersecurity training plays a decisive role in overcoming the global shortage of cybersecurity experts and the risks this shortage poses to organizations' assets. Seeking to make the training of those experts as efficacious and efficient as possible, this study investigates the potential of visual programming languages (VPLs) for training in cyber ranges. For this matter, the VPL Blockly was integrated into an existing cyber range training to facilitate learning a code-based cybersecurity task, namely, creating code-based correlation rules for a security information and event management (SIEM) system. Design/methodology/approach To evaluate the VPL’s effect on the cyber range training, the authors conducted a user study as a randomized controlled trial with 30 participants. In this study, the authors compared skill development of participants creating SIEM rules using Blockly (experimental group) with participants using a textual programming approach (control group) to create the rules. Findings This study indicates that using a VPL in a cybersecurity training can improve the participants' perceived learning experience compared to the control group while providing equally good learning outcomes. Originality/value The originality of this work lies in studying the effect of using a VPL to learn a code-based cybersecurity task. Investigating this effect in comparison with the conventional textual syntax through a randomized controlled trial has not been investigated yet.</description><identifier>ISSN: 2056-4961</identifier><identifier>EISSN: 2056-497X</identifier><identifier>EISSN: 2056-4961</identifier><identifier>DOI: 10.1108/ICS-11-2022-0170</identifier><language>eng</language><publisher>Bingley: Emerald Publishing Limited</publisher><subject>Computer science ; Cybersecurity ; Events planning ; Information management ; Infrastructure ; Learning ; Learning management systems ; Programming languages ; Science education ; Security systems ; Shortages ; Skills ; Syntax ; Teaching ; Training ; Visual programming languages</subject><ispartof>Information and computer security, 2023-06, Vol.31 (3), p.316-330</ispartof><rights>Emerald Publishing Limited</rights><rights>Emerald Publishing Limited.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c353t-6437700f59704bb637db35dcce18a9c4b473f9bfab0034b4adbc0aa3ce9422b83</citedby><cites>FETCH-LOGICAL-c353t-6437700f59704bb637db35dcce18a9c4b473f9bfab0034b4adbc0aa3ce9422b83</cites><orcidid>0000-0002-0023-6051 ; 0000-0003-0239-7526 ; 0000-0002-1119-4715 ; 0000-0003-1338-9003 ; 0000-0001-7458-9928</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27305,27924,27925,34135</link.rule.ids></links><search><creatorcontrib>Glas, Magdalena</creatorcontrib><creatorcontrib>Vielberth, Manfred</creatorcontrib><creatorcontrib>Reittinger, Tobias</creatorcontrib><creatorcontrib>Böhm, Fabian</creatorcontrib><creatorcontrib>Pernul, Günther</creatorcontrib><title>Improving cybersecurity skill development through visual programming</title><title>Information and computer security</title><description>Purpose Cybersecurity training plays a decisive role in overcoming the global shortage of cybersecurity experts and the risks this shortage poses to organizations' assets. Seeking to make the training of those experts as efficacious and efficient as possible, this study investigates the potential of visual programming languages (VPLs) for training in cyber ranges. For this matter, the VPL Blockly was integrated into an existing cyber range training to facilitate learning a code-based cybersecurity task, namely, creating code-based correlation rules for a security information and event management (SIEM) system. Design/methodology/approach To evaluate the VPL’s effect on the cyber range training, the authors conducted a user study as a randomized controlled trial with 30 participants. In this study, the authors compared skill development of participants creating SIEM rules using Blockly (experimental group) with participants using a textual programming approach (control group) to create the rules. Findings This study indicates that using a VPL in a cybersecurity training can improve the participants' perceived learning experience compared to the control group while providing equally good learning outcomes. Originality/value The originality of this work lies in studying the effect of using a VPL to learn a code-based cybersecurity task. Investigating this effect in comparison with the conventional textual syntax through a randomized controlled trial has not been investigated yet.</description><subject>Computer science</subject><subject>Cybersecurity</subject><subject>Events planning</subject><subject>Information management</subject><subject>Infrastructure</subject><subject>Learning</subject><subject>Learning management systems</subject><subject>Programming languages</subject><subject>Science education</subject><subject>Security systems</subject><subject>Shortages</subject><subject>Skills</subject><subject>Syntax</subject><subject>Teaching</subject><subject>Training</subject><subject>Visual programming languages</subject><issn>2056-4961</issn><issn>2056-497X</issn><issn>2056-4961</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ALSLI</sourceid><sourceid>BGRYB</sourceid><sourceid>CNYFK</sourceid><sourceid>F2A</sourceid><sourceid>M0C</sourceid><sourceid>M0O</sourceid><sourceid>M1O</sourceid><recordid>eNptkN9LwzAQx4MoOObefSz4HHeXtE3zKPNXYeCDCr6FJE23znadSTvYf2_GRBDkHu4O7nNf-BByjXCLCMW8XLxSRMqAMQoo4IxMGGQ5TaX4OP-dc7wksxA2AIASc57jhNyX3c73-2a7SuzBOB-cHX0zHJLw2bRtUrm9a_td57ZDMqx9P67Wyb4Jo26TiK287rqIXpGLWrfBzX76lLw_Prwtnuny5alc3C2p5RkfaJ5yIQDqTApIjcm5qAzPKmsdFlra1KSC19LU2gDwuOnKWNCaWydTxkzBp-Tm9Ddmf40uDGrTj34bIxUrYsmCS4xXcLqyvg_Bu1rtfNNpf1AI6qhLRV1xUEdd6qgrIvMT4jrndVv9R_wRzL8BiBBsRw</recordid><startdate>20230626</startdate><enddate>20230626</enddate><creator>Glas, Magdalena</creator><creator>Vielberth, Manfred</creator><creator>Reittinger, Tobias</creator><creator>Böhm, Fabian</creator><creator>Pernul, Günther</creator><general>Emerald Publishing Limited</general><general>Emerald Group Publishing Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>0-V</scope><scope>0U~</scope><scope>1-H</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FI</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ALSLI</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>BGRYB</scope><scope>CCPQU</scope><scope>CNYFK</scope><scope>DWQXO</scope><scope>E3H</scope><scope>F2A</scope><scope>FYUFA</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L.0</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M0O</scope><scope>M0T</scope><scope>M1O</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PYYUZ</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-0023-6051</orcidid><orcidid>https://orcid.org/0000-0003-0239-7526</orcidid><orcidid>https://orcid.org/0000-0002-1119-4715</orcidid><orcidid>https://orcid.org/0000-0003-1338-9003</orcidid><orcidid>https://orcid.org/0000-0001-7458-9928</orcidid></search><sort><creationdate>20230626</creationdate><title>Improving cybersecurity skill development through visual programming</title><author>Glas, Magdalena ; Vielberth, Manfred ; Reittinger, Tobias ; Böhm, Fabian ; Pernul, Günther</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c353t-6437700f59704bb637db35dcce18a9c4b473f9bfab0034b4adbc0aa3ce9422b83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Computer science</topic><topic>Cybersecurity</topic><topic>Events planning</topic><topic>Information management</topic><topic>Infrastructure</topic><topic>Learning</topic><topic>Learning management systems</topic><topic>Programming languages</topic><topic>Science education</topic><topic>Security systems</topic><topic>Shortages</topic><topic>Skills</topic><topic>Syntax</topic><topic>Teaching</topic><topic>Training</topic><topic>Visual programming languages</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Glas, Magdalena</creatorcontrib><creatorcontrib>Vielberth, Manfred</creatorcontrib><creatorcontrib>Reittinger, Tobias</creatorcontrib><creatorcontrib>Böhm, Fabian</creatorcontrib><creatorcontrib>Pernul, Günther</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Social Sciences Premium Collection【Remote access available】</collection><collection>Global News &amp; ABI/Inform Professional</collection><collection>Trade PRO</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Hospital Premium Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Social Science Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>Advanced Technologies &amp; Aerospace Database‎ (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>Criminology Collection</collection><collection>ProQuest One Community College</collection><collection>Library &amp; Information Science Collection</collection><collection>ProQuest Central</collection><collection>Library &amp; Information Sciences Abstracts (LISA)</collection><collection>Library &amp; Information Science Abstracts (LISA)</collection><collection>Health Research Premium Collection</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ABI/INFORM Professional Standard</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global (ProQuest)</collection><collection>Computing Database</collection><collection>ProQuest Criminal Justice Database</collection><collection>Healthcare Administration Database (Proquest)</collection><collection>ProQuest Library Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ABI/INFORM Collection China</collection><collection>ProQuest Central Basic</collection><jtitle>Information and computer security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Glas, Magdalena</au><au>Vielberth, Manfred</au><au>Reittinger, Tobias</au><au>Böhm, Fabian</au><au>Pernul, Günther</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Improving cybersecurity skill development through visual programming</atitle><jtitle>Information and computer security</jtitle><date>2023-06-26</date><risdate>2023</risdate><volume>31</volume><issue>3</issue><spage>316</spage><epage>330</epage><pages>316-330</pages><issn>2056-4961</issn><eissn>2056-497X</eissn><eissn>2056-4961</eissn><abstract>Purpose Cybersecurity training plays a decisive role in overcoming the global shortage of cybersecurity experts and the risks this shortage poses to organizations' assets. Seeking to make the training of those experts as efficacious and efficient as possible, this study investigates the potential of visual programming languages (VPLs) for training in cyber ranges. For this matter, the VPL Blockly was integrated into an existing cyber range training to facilitate learning a code-based cybersecurity task, namely, creating code-based correlation rules for a security information and event management (SIEM) system. Design/methodology/approach To evaluate the VPL’s effect on the cyber range training, the authors conducted a user study as a randomized controlled trial with 30 participants. In this study, the authors compared skill development of participants creating SIEM rules using Blockly (experimental group) with participants using a textual programming approach (control group) to create the rules. Findings This study indicates that using a VPL in a cybersecurity training can improve the participants' perceived learning experience compared to the control group while providing equally good learning outcomes. Originality/value The originality of this work lies in studying the effect of using a VPL to learn a code-based cybersecurity task. Investigating this effect in comparison with the conventional textual syntax through a randomized controlled trial has not been investigated yet.</abstract><cop>Bingley</cop><pub>Emerald Publishing Limited</pub><doi>10.1108/ICS-11-2022-0170</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0002-0023-6051</orcidid><orcidid>https://orcid.org/0000-0003-0239-7526</orcidid><orcidid>https://orcid.org/0000-0002-1119-4715</orcidid><orcidid>https://orcid.org/0000-0003-1338-9003</orcidid><orcidid>https://orcid.org/0000-0001-7458-9928</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2056-4961
ispartof Information and computer security, 2023-06, Vol.31 (3), p.316-330
issn 2056-4961
2056-497X
2056-4961
language eng
recordid cdi_emerald_primary_10_1108_ICS-11-2022-0170
source Criminology Collection; ABI/INFORM Global (ProQuest); Library & Information Science Abstracts (LISA); Emerald:Jisc Collections:Emerald Subject Collections HE and FE 2024-2026:Emerald Premier (reading list); Social Science Premium Collection (Proquest) (PQ_SDU_P3); Library & Information Science Collection; Alma/SFX Local Collection
subjects Computer science
Cybersecurity
Events planning
Information management
Infrastructure
Learning
Learning management systems
Programming languages
Science education
Security systems
Shortages
Skills
Syntax
Teaching
Training
Visual programming languages
title Improving cybersecurity skill development through visual programming
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T21%3A02%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_emera&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Improving%20cybersecurity%20skill%20development%20through%20visual%20programming&rft.jtitle=Information%20and%20computer%20security&rft.au=Glas,%20Magdalena&rft.date=2023-06-26&rft.volume=31&rft.issue=3&rft.spage=316&rft.epage=330&rft.pages=316-330&rft.issn=2056-4961&rft.eissn=2056-497X&rft_id=info:doi/10.1108/ICS-11-2022-0170&rft_dat=%3Cproquest_emera%3E2828298391%3C/proquest_emera%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c353t-6437700f59704bb637db35dcce18a9c4b473f9bfab0034b4adbc0aa3ce9422b83%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2828298391&rft_id=info:pmid/&rfr_iscdi=true