Loading…
Improving cybersecurity skill development through visual programming
Purpose Cybersecurity training plays a decisive role in overcoming the global shortage of cybersecurity experts and the risks this shortage poses to organizations' assets. Seeking to make the training of those experts as efficacious and efficient as possible, this study investigates the potenti...
Saved in:
Published in: | Information and computer security 2023-06, Vol.31 (3), p.316-330 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c353t-6437700f59704bb637db35dcce18a9c4b473f9bfab0034b4adbc0aa3ce9422b83 |
---|---|
cites | cdi_FETCH-LOGICAL-c353t-6437700f59704bb637db35dcce18a9c4b473f9bfab0034b4adbc0aa3ce9422b83 |
container_end_page | 330 |
container_issue | 3 |
container_start_page | 316 |
container_title | Information and computer security |
container_volume | 31 |
creator | Glas, Magdalena Vielberth, Manfred Reittinger, Tobias Böhm, Fabian Pernul, Günther |
description | Purpose
Cybersecurity training plays a decisive role in overcoming the global shortage of cybersecurity experts and the risks this shortage poses to organizations' assets. Seeking to make the training of those experts as efficacious and efficient as possible, this study investigates the potential of visual programming languages (VPLs) for training in cyber ranges. For this matter, the VPL Blockly was integrated into an existing cyber range training to facilitate learning a code-based cybersecurity task, namely, creating code-based correlation rules for a security information and event management (SIEM) system.
Design/methodology/approach
To evaluate the VPL’s effect on the cyber range training, the authors conducted a user study as a randomized controlled trial with 30 participants. In this study, the authors compared skill development of participants creating SIEM rules using Blockly (experimental group) with participants using a textual programming approach (control group) to create the rules.
Findings
This study indicates that using a VPL in a cybersecurity training can improve the participants' perceived learning experience compared to the control group while providing equally good learning outcomes.
Originality/value
The originality of this work lies in studying the effect of using a VPL to learn a code-based cybersecurity task. Investigating this effect in comparison with the conventional textual syntax through a randomized controlled trial has not been investigated yet. |
doi_str_mv | 10.1108/ICS-11-2022-0170 |
format | article |
fullrecord | <record><control><sourceid>proquest_emera</sourceid><recordid>TN_cdi_emerald_primary_10_1108_ICS-11-2022-0170</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2828298391</sourcerecordid><originalsourceid>FETCH-LOGICAL-c353t-6437700f59704bb637db35dcce18a9c4b473f9bfab0034b4adbc0aa3ce9422b83</originalsourceid><addsrcrecordid>eNptkN9LwzAQx4MoOObefSz4HHeXtE3zKPNXYeCDCr6FJE23znadSTvYf2_GRBDkHu4O7nNf-BByjXCLCMW8XLxSRMqAMQoo4IxMGGQ5TaX4OP-dc7wksxA2AIASc57jhNyX3c73-2a7SuzBOB-cHX0zHJLw2bRtUrm9a_td57ZDMqx9P67Wyb4Jo26TiK287rqIXpGLWrfBzX76lLw_Prwtnuny5alc3C2p5RkfaJ5yIQDqTApIjcm5qAzPKmsdFlra1KSC19LU2gDwuOnKWNCaWydTxkzBp-Tm9Ddmf40uDGrTj34bIxUrYsmCS4xXcLqyvg_Bu1rtfNNpf1AI6qhLRV1xUEdd6qgrIvMT4jrndVv9R_wRzL8BiBBsRw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2828298391</pqid></control><display><type>article</type><title>Improving cybersecurity skill development through visual programming</title><source>Criminology Collection</source><source>ABI/INFORM Global (ProQuest)</source><source>Library & Information Science Abstracts (LISA)</source><source>Emerald:Jisc Collections:Emerald Subject Collections HE and FE 2024-2026:Emerald Premier (reading list)</source><source>Social Science Premium Collection (Proquest) (PQ_SDU_P3)</source><source>Library & Information Science Collection</source><source>Alma/SFX Local Collection</source><creator>Glas, Magdalena ; Vielberth, Manfred ; Reittinger, Tobias ; Böhm, Fabian ; Pernul, Günther</creator><creatorcontrib>Glas, Magdalena ; Vielberth, Manfred ; Reittinger, Tobias ; Böhm, Fabian ; Pernul, Günther</creatorcontrib><description>Purpose
Cybersecurity training plays a decisive role in overcoming the global shortage of cybersecurity experts and the risks this shortage poses to organizations' assets. Seeking to make the training of those experts as efficacious and efficient as possible, this study investigates the potential of visual programming languages (VPLs) for training in cyber ranges. For this matter, the VPL Blockly was integrated into an existing cyber range training to facilitate learning a code-based cybersecurity task, namely, creating code-based correlation rules for a security information and event management (SIEM) system.
Design/methodology/approach
To evaluate the VPL’s effect on the cyber range training, the authors conducted a user study as a randomized controlled trial with 30 participants. In this study, the authors compared skill development of participants creating SIEM rules using Blockly (experimental group) with participants using a textual programming approach (control group) to create the rules.
Findings
This study indicates that using a VPL in a cybersecurity training can improve the participants' perceived learning experience compared to the control group while providing equally good learning outcomes.
Originality/value
The originality of this work lies in studying the effect of using a VPL to learn a code-based cybersecurity task. Investigating this effect in comparison with the conventional textual syntax through a randomized controlled trial has not been investigated yet.</description><identifier>ISSN: 2056-4961</identifier><identifier>EISSN: 2056-497X</identifier><identifier>EISSN: 2056-4961</identifier><identifier>DOI: 10.1108/ICS-11-2022-0170</identifier><language>eng</language><publisher>Bingley: Emerald Publishing Limited</publisher><subject>Computer science ; Cybersecurity ; Events planning ; Information management ; Infrastructure ; Learning ; Learning management systems ; Programming languages ; Science education ; Security systems ; Shortages ; Skills ; Syntax ; Teaching ; Training ; Visual programming languages</subject><ispartof>Information and computer security, 2023-06, Vol.31 (3), p.316-330</ispartof><rights>Emerald Publishing Limited</rights><rights>Emerald Publishing Limited.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c353t-6437700f59704bb637db35dcce18a9c4b473f9bfab0034b4adbc0aa3ce9422b83</citedby><cites>FETCH-LOGICAL-c353t-6437700f59704bb637db35dcce18a9c4b473f9bfab0034b4adbc0aa3ce9422b83</cites><orcidid>0000-0002-0023-6051 ; 0000-0003-0239-7526 ; 0000-0002-1119-4715 ; 0000-0003-1338-9003 ; 0000-0001-7458-9928</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27305,27924,27925,34135</link.rule.ids></links><search><creatorcontrib>Glas, Magdalena</creatorcontrib><creatorcontrib>Vielberth, Manfred</creatorcontrib><creatorcontrib>Reittinger, Tobias</creatorcontrib><creatorcontrib>Böhm, Fabian</creatorcontrib><creatorcontrib>Pernul, Günther</creatorcontrib><title>Improving cybersecurity skill development through visual programming</title><title>Information and computer security</title><description>Purpose
Cybersecurity training plays a decisive role in overcoming the global shortage of cybersecurity experts and the risks this shortage poses to organizations' assets. Seeking to make the training of those experts as efficacious and efficient as possible, this study investigates the potential of visual programming languages (VPLs) for training in cyber ranges. For this matter, the VPL Blockly was integrated into an existing cyber range training to facilitate learning a code-based cybersecurity task, namely, creating code-based correlation rules for a security information and event management (SIEM) system.
Design/methodology/approach
To evaluate the VPL’s effect on the cyber range training, the authors conducted a user study as a randomized controlled trial with 30 participants. In this study, the authors compared skill development of participants creating SIEM rules using Blockly (experimental group) with participants using a textual programming approach (control group) to create the rules.
Findings
This study indicates that using a VPL in a cybersecurity training can improve the participants' perceived learning experience compared to the control group while providing equally good learning outcomes.
Originality/value
The originality of this work lies in studying the effect of using a VPL to learn a code-based cybersecurity task. Investigating this effect in comparison with the conventional textual syntax through a randomized controlled trial has not been investigated yet.</description><subject>Computer science</subject><subject>Cybersecurity</subject><subject>Events planning</subject><subject>Information management</subject><subject>Infrastructure</subject><subject>Learning</subject><subject>Learning management systems</subject><subject>Programming languages</subject><subject>Science education</subject><subject>Security systems</subject><subject>Shortages</subject><subject>Skills</subject><subject>Syntax</subject><subject>Teaching</subject><subject>Training</subject><subject>Visual programming languages</subject><issn>2056-4961</issn><issn>2056-497X</issn><issn>2056-4961</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ALSLI</sourceid><sourceid>BGRYB</sourceid><sourceid>CNYFK</sourceid><sourceid>F2A</sourceid><sourceid>M0C</sourceid><sourceid>M0O</sourceid><sourceid>M1O</sourceid><recordid>eNptkN9LwzAQx4MoOObefSz4HHeXtE3zKPNXYeCDCr6FJE23znadSTvYf2_GRBDkHu4O7nNf-BByjXCLCMW8XLxSRMqAMQoo4IxMGGQ5TaX4OP-dc7wksxA2AIASc57jhNyX3c73-2a7SuzBOB-cHX0zHJLw2bRtUrm9a_td57ZDMqx9P67Wyb4Jo26TiK287rqIXpGLWrfBzX76lLw_Prwtnuny5alc3C2p5RkfaJ5yIQDqTApIjcm5qAzPKmsdFlra1KSC19LU2gDwuOnKWNCaWydTxkzBp-Tm9Ddmf40uDGrTj34bIxUrYsmCS4xXcLqyvg_Bu1rtfNNpf1AI6qhLRV1xUEdd6qgrIvMT4jrndVv9R_wRzL8BiBBsRw</recordid><startdate>20230626</startdate><enddate>20230626</enddate><creator>Glas, Magdalena</creator><creator>Vielberth, Manfred</creator><creator>Reittinger, Tobias</creator><creator>Böhm, Fabian</creator><creator>Pernul, Günther</creator><general>Emerald Publishing Limited</general><general>Emerald Group Publishing Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>0-V</scope><scope>0U~</scope><scope>1-H</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FI</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ALSLI</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>BGRYB</scope><scope>CCPQU</scope><scope>CNYFK</scope><scope>DWQXO</scope><scope>E3H</scope><scope>F2A</scope><scope>FYUFA</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L.0</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M0O</scope><scope>M0T</scope><scope>M1O</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PYYUZ</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-0023-6051</orcidid><orcidid>https://orcid.org/0000-0003-0239-7526</orcidid><orcidid>https://orcid.org/0000-0002-1119-4715</orcidid><orcidid>https://orcid.org/0000-0003-1338-9003</orcidid><orcidid>https://orcid.org/0000-0001-7458-9928</orcidid></search><sort><creationdate>20230626</creationdate><title>Improving cybersecurity skill development through visual programming</title><author>Glas, Magdalena ; Vielberth, Manfred ; Reittinger, Tobias ; Böhm, Fabian ; Pernul, Günther</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c353t-6437700f59704bb637db35dcce18a9c4b473f9bfab0034b4adbc0aa3ce9422b83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Computer science</topic><topic>Cybersecurity</topic><topic>Events planning</topic><topic>Information management</topic><topic>Infrastructure</topic><topic>Learning</topic><topic>Learning management systems</topic><topic>Programming languages</topic><topic>Science education</topic><topic>Security systems</topic><topic>Shortages</topic><topic>Skills</topic><topic>Syntax</topic><topic>Teaching</topic><topic>Training</topic><topic>Visual programming languages</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Glas, Magdalena</creatorcontrib><creatorcontrib>Vielberth, Manfred</creatorcontrib><creatorcontrib>Reittinger, Tobias</creatorcontrib><creatorcontrib>Böhm, Fabian</creatorcontrib><creatorcontrib>Pernul, Günther</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Social Sciences Premium Collection【Remote access available】</collection><collection>Global News & ABI/Inform Professional</collection><collection>Trade PRO</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Hospital Premium Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Social Science Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>Advanced Technologies & Aerospace Database (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>Criminology Collection</collection><collection>ProQuest One Community College</collection><collection>Library & Information Science Collection</collection><collection>ProQuest Central</collection><collection>Library & Information Sciences Abstracts (LISA)</collection><collection>Library & Information Science Abstracts (LISA)</collection><collection>Health Research Premium Collection</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ABI/INFORM Professional Standard</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global (ProQuest)</collection><collection>Computing Database</collection><collection>ProQuest Criminal Justice Database</collection><collection>Healthcare Administration Database (Proquest)</collection><collection>ProQuest Library Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ABI/INFORM Collection China</collection><collection>ProQuest Central Basic</collection><jtitle>Information and computer security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Glas, Magdalena</au><au>Vielberth, Manfred</au><au>Reittinger, Tobias</au><au>Böhm, Fabian</au><au>Pernul, Günther</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Improving cybersecurity skill development through visual programming</atitle><jtitle>Information and computer security</jtitle><date>2023-06-26</date><risdate>2023</risdate><volume>31</volume><issue>3</issue><spage>316</spage><epage>330</epage><pages>316-330</pages><issn>2056-4961</issn><eissn>2056-497X</eissn><eissn>2056-4961</eissn><abstract>Purpose
Cybersecurity training plays a decisive role in overcoming the global shortage of cybersecurity experts and the risks this shortage poses to organizations' assets. Seeking to make the training of those experts as efficacious and efficient as possible, this study investigates the potential of visual programming languages (VPLs) for training in cyber ranges. For this matter, the VPL Blockly was integrated into an existing cyber range training to facilitate learning a code-based cybersecurity task, namely, creating code-based correlation rules for a security information and event management (SIEM) system.
Design/methodology/approach
To evaluate the VPL’s effect on the cyber range training, the authors conducted a user study as a randomized controlled trial with 30 participants. In this study, the authors compared skill development of participants creating SIEM rules using Blockly (experimental group) with participants using a textual programming approach (control group) to create the rules.
Findings
This study indicates that using a VPL in a cybersecurity training can improve the participants' perceived learning experience compared to the control group while providing equally good learning outcomes.
Originality/value
The originality of this work lies in studying the effect of using a VPL to learn a code-based cybersecurity task. Investigating this effect in comparison with the conventional textual syntax through a randomized controlled trial has not been investigated yet.</abstract><cop>Bingley</cop><pub>Emerald Publishing Limited</pub><doi>10.1108/ICS-11-2022-0170</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0002-0023-6051</orcidid><orcidid>https://orcid.org/0000-0003-0239-7526</orcidid><orcidid>https://orcid.org/0000-0002-1119-4715</orcidid><orcidid>https://orcid.org/0000-0003-1338-9003</orcidid><orcidid>https://orcid.org/0000-0001-7458-9928</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2056-4961 |
ispartof | Information and computer security, 2023-06, Vol.31 (3), p.316-330 |
issn | 2056-4961 2056-497X 2056-4961 |
language | eng |
recordid | cdi_emerald_primary_10_1108_ICS-11-2022-0170 |
source | Criminology Collection; ABI/INFORM Global (ProQuest); Library & Information Science Abstracts (LISA); Emerald:Jisc Collections:Emerald Subject Collections HE and FE 2024-2026:Emerald Premier (reading list); Social Science Premium Collection (Proquest) (PQ_SDU_P3); Library & Information Science Collection; Alma/SFX Local Collection |
subjects | Computer science Cybersecurity Events planning Information management Infrastructure Learning Learning management systems Programming languages Science education Security systems Shortages Skills Syntax Teaching Training Visual programming languages |
title | Improving cybersecurity skill development through visual programming |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T21%3A02%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_emera&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Improving%20cybersecurity%20skill%20development%20through%20visual%20programming&rft.jtitle=Information%20and%20computer%20security&rft.au=Glas,%20Magdalena&rft.date=2023-06-26&rft.volume=31&rft.issue=3&rft.spage=316&rft.epage=330&rft.pages=316-330&rft.issn=2056-4961&rft.eissn=2056-497X&rft_id=info:doi/10.1108/ICS-11-2022-0170&rft_dat=%3Cproquest_emera%3E2828298391%3C/proquest_emera%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c353t-6437700f59704bb637db35dcce18a9c4b473f9bfab0034b4adbc0aa3ce9422b83%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2828298391&rft_id=info:pmid/&rfr_iscdi=true |