Note for Reviewers: Start Here
Background Information During my literature review of cybersecurity and information security articles within higher education, I identified a significant gap: many proposed courses included instructional design models but lacked a guiding learning theory or educational framework to structure learning materials and course content. Among learning theories, constructivism is the most researched in cybersecurity and information security. Additionally, gaming as a pedagogical tool is a popular topic. There is noticeable overlap in results across different search terms, especially when transitioning from cybersecurity to information security. This overlap suggests that some articles might use both terms interchangeably or encompass both areas broadly. Notably, some learning theories (e.g., connectivism) and models (ADDIE; Analysis, Design, Development, Implementation, and Evaluation) have limited or no relevant results, indicating potential gaps involving these methodologies. Study Aims This study aims to bridge the identified gaps in literature and practice by developing an introductory cybersecurity curriculum that can be facilitated by interdisciplinary instructors in an online environment. Connectivism, as described by Dr. Goldie from the University of Glasgow (2016), “is one of the most prominent network learning theories developed for e-learning environments” (p. 4). The course aims to provide a holistic learning experience, encouraging learners to form connections among learning communities (referred to as ‘lighthouses’ in this study). This course is designed to be a pioneering effort for future course designs involving connectivism, cybersecurity, and the learning design process. If successful, this model can be replicated for other courses, promoting a more systematic and theory-driven approach to online course design across various disciplines. Course and Site Overview This course and site are specifically built upon the Connectivism Learning Theory and aim to serve as a model for Texarkana College (TC) moving forward. I have built the same course in Moodle at TC (see Part III), and we are working to create AI assistants for certain Moodle shells as a final component of the Connectivism theory. Although this project is not yet complete, my hope is that the site you are reviewing will present enough information and direction to demonstrate the potential of our Distance Education program. Instructions for Reviewers Please explore the site, click on the links, provide your judgments, opinions, and enjoy learning about Connectivism and cybersecurity!
Note to Students:
Before reaching out to your instructor, I encourage you to first ask the CS-GPT any questions you may have. As it is equipped with all the course material, it should be able to provide you with the answers you need. Utilizing the CS-GPT can save time and help you quickly resolve any uncertainties, allowing you to focus on your learning journey more effectively.


MLW's LTEC Portfolio
UNT LTEC Portfolio
My research interests span a wide range of topics, including: technology proficiency, information security, technology-based learning environments, connectivism, artificial intelligence, machine learning, human resiliency, cognitive psychology, human performance improvement, ethics, conditional logic, instructional design, adaptive learning systems, and failure points in learning.

Connectivism: A Networked Learning Theory for the Digital Age
Overview of connectivism - Dr George Siemens CONNECTIVISM: 21st CENTURY’S NEW LEARNING THEORY Connectivism: A Learning Theory for the Digital Age

14:16
YouTube
Should we let students use ChatGPT? | Natasha Berg | TEDxSioux Falls
The emergence of ChatGPT in November of 2022 took the world by storm: particularly the world of education. With this technology able to generate complex pieces of writing, solve advanced math equations, generate code, and more with the push of a button, educators across the country have entered a state of panic. How are educators supposed to teach students when they have this technology at their literal fingertips? For too long, the field of education has been teetering at the precipice of serious change, and the widespread accessibility of generative AI may just be the catalyst education needs in order to progress in tandem with the rest of the world. But first, educators need to reevaluate their answer to the tough question: why do we teach? Natasha Berg, M.Ed. works as the Multimedia and Technology Integration Specialist at a local high school in South Dakota. She has spent her career learning about and developing her skills in education and educational technology. Berg believes that new and emerging technology should be integrated into classrooms as it fully prepares students to enter the 21st century workforce and helps make learning accessible to students of all abilities. This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at https://www.ted.com/tedx

15:37
YouTube
How AI Could Save (Not Destroy) Education | Sal Khan | TED
Sal Khan, the founder and CEO of Khan Academy, thinks artificial intelligence could spark the greatest positive transformation education has ever seen. He shares the opportunities he sees for students and educators to collaborate with AI tools -- including the potential of a personal AI tutor for every student and an AI teaching assistant for every teacher -- and demos some exciting new features for their educational chatbot, Khanmigo. If you love watching TED Talks like this one, become a TED Member to support our mission of spreading ideas: https://ted.com/membership Follow TED! Twitter: https://twitter.com/TEDTalks Instagram: https://www.instagram.com/ted Facebook: https://facebook.com/TED LinkedIn: https://www.linkedin.com/company/ted-conferences TikTok: https://www.tiktok.com/@tedtoks The TED Talks channel features talks, performances and original series from the world's leading thinkers and doers. Subscribe to our channel for videos on Technology, Entertainment and Design — plus science, business, global issues, the arts and more. Visit https://TED.com to get our entire library of TED Talks, transcripts, translations, personalized talk recommendations and more. Watch more: https://go.ted.com/salkhan https://youtu.be/hJP5GqnTrNo TED's videos may be used for non-commercial purposes under a Creative Commons License, Attribution–Non Commercial–No Derivatives (or the CC BY – NC – ND 4.0 International) and in accordance with our TED Talks Usage Policy: https://www.ted.com/about/our-organization/our-policies-terms/ted-talks-usage-policy. For more information on using TED for commercial purposes (e.g. employee learning, in a film or online course), please submit a Media Request at https://media-requests.ted.com #TED #TEDTalks #education #AI #khanacademy


03:55
YouTube
Kahn and Cerf on why the ARPANET was built
Robert Kahn, winner of the Association for Computing Machinery's A.M. Turing Award, discusses the original motivations behind the creation of the ARPANET. This clip is taken from an interview conducted with Kahn by Vinton Cerf (his co-awardee) for the Computer History Museum on September 30, 2006 in McClean, Virginia. Video of the full interview is available as part of Kahn’s ACM profile at https://amturing.acm.org/award_winners/kahn_4598637.cfm.
arxiv.org
arXiv.org e-Print archive
arXiv is a free distribution service and an open-access archive for nearly 2.4 million scholarly articles in the fields of physics, mathematics, computer science, quantitative biology, quantitative finance, statistics, electrical engineering and systems science, and economics. Materials on this site are not peer-reviewed by arXiv.

CYBERSECURITY, TECHNOLOGY AND SOCIETY
CYBERSECURITY, TECHNOLOGY AND SOCIETY |
Students will explore how technology is related to cybersecurity from an interdisciplinary orientation. Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains.


DigitalCommons@Kennesaw State University
Applying High Impact Practices in an Interdisciplinary Cybersecurity Program
The Center for Cybersecurity Education and Research at Old Dominion University has expanded its use of high impact practices in the university’s undergraduate cybersecurity degree program. Strategies developed to promote student learning included learning communities, undergraduate research, a robust internship program, service learning, and electronic portfolios. This paper reviews the literature on these practices, highlights the way that they were implemented in our cybersecurity program, and discusses some of the challenges encountered with each practice. Although the prior literature on high impact practices rarely touches on cybersecurity coursework, the robust evidence of the success of those practices provides a sound rationale for applying them across the curricula. Challenges confronted included developing partnerships, introducing students to new learning strategies, and gaining buy in from faculty. Despite these challenges, the authors’ experiences with the efforts also support using high impact practices in cybersecurity programs. Recommendations for other cybersecurity programs seeking to expand the use of high impact practices include integrating experiential learning throughout the curricula, developing campus-wide partnerships, embracing the interdisciplinary nature of cybersecurity, demonstrating the purpose of the practices, providing faculty development, emphasizing writing, and embracing failure.
Old Dominion University
Research
A primary mission of ODU's Center for Cybersecurity Education and Research (CCSER) is to develop high-impact, cross-disciplinary research initiatives that center on cybersecurity and be a source of cybersecurity expertise to the University, the Hampton Roads region, and the Commonwealth of Virginia.
Cybersecurity Framework & Policies | Microsoft Cybersecurity
What is Cybersecurity? | IBM Cybersecurity as a Service Delivered | Sophos Cybersecurity Architecture: Five Principles to Follow (and One to Avoid) HackerGPT Was Trained For Cyber Security (Use with CAUTION!!) WormGPT is like ChatGPT for Hackers and Cybercrime New "Dark Web" Generative AI Chatbots?!
Psychological Techniques Used by Threat Actors
Longtchi et al. 2023 Urgency: Creates a sense of immediate action. Attention Grabbing: Uses sensory stimuli to focus the victim's attention. Visual Deception: Uses visual elements to induce trust. Incentive and Motivator: Offers rewards to encourage compliance. Persuasion: Encourages certain behaviors by exploiting liking. Quid-Pro-Quo: Promises a high payoff in exchange for taking a risk. Foot-in-the-Door: Gains compliance for a larger request by starting with smaller ones. Trusted Relationship: Takes advantage of existing trust relationships. Impersonation: Assumes a false identity to increase compliance. Contextualization: Establishes commonality with the victim to increase attack success. Pretexting: Engages the victim by referring to relevant and current events. Personalization: Uses personal information to tailor messages and build trust. Affection Trust: Establishes an affectionate relationship to make the victim more willing to take risks. Threat Actors - CompTIA Security+ SY0-701 - 2.1


40:22
YouTube
Cyber Resilience
This session was part of the 2022 Aspen Cyber Summit. You can learn more about the Summit here: https://www.aspencybersummit.org/ The idea of cyber “resilience” is not new, but it has taken on a new meaning in the wake of ransomware attacks on critical infrastructure and Russia’s further invasion of Ukraine. Leaders from government and the private sector will discuss how the idea has evolved, what it means to them today, and how it should impact security going forward. Adam Bromwich, Vice President R&D, Symantec, by Broadcom Software Valerie Cofield, Chief Strategy Officer, Cybersecurity and Infrastructure Security Agency Sean Joyce, Principal, Global and US Cybersecurity and Privacy Leader and US Cyber, Risk and Regulatory Leader, PwC Iranga Kahangama, Assistant Secretary for Cyber, Infrastructure, Risk, and Resilience, Department of Homeland Security with Jeff Greene, Senior Director of Cybersecurity Programs, Aspen Digital, The Aspen Institute


The White House
National Cyber Workforce and Education Strategy
The Biden-Harris Administration unveiled the National Cyber Workforce and Education Strategy (NCWES), a first-of-its-kind comprehensive approach aimed at addressing both immediate and long-term cyber workforce needs. Filling the hundreds of thousands of cyber job vacancies across our nation is a national security imperative and the Administration is making generational…

The White House
Connecting Americans to Good-Paying Jobs in Cyber | ONCD | The White House
To keep all Americans secure and boost the next generation of innovation in the U.S., we must drastically scale up the cyber workforce across the country. The Office of the National Cyber Director (ONCD) developed the National Cyber Workforce and Education Strategy (NCWES) and Fact Sheet to address this national security and economic imperative. The…

udlguidelines.cast.org
UDL: The UDL Guidelines
The UDL Guidelines are a tool used in the implementation of Universal Design for Learning, a framework to improve and optimize teaching and learning for all people based on scientific insights into how humans learn. Learn more about the Universal Design for Learning framework from CAST. The UDL Guidelines can be used by educators, curriculum developers, researchers, parents, and anyone else who wants to implement the UDL framework in a learning environment. These guidelines offer a set of concrete suggestions that can be applied to any discipline or domain to ensure that all learners can access and participate in meaningful, challenging learning opportunities.

SpringerLink
Social cybersecurity: an emerging science
With the rise of online platforms where individuals could gather and spread information came the rise of online cybercrimes aimed at taking advantage of not just single individuals but collectives. In response, researchers and practitioners began trying to understand this digital playground and the way in which individuals who were socially and digitally embedded could be manipulated. What is emerging is a new scientific and engineering discipline—social cybersecurity. This paper defines this emerging area, provides case examples of the research issues and types of tools needed, and lays out a program of research in this area.

Theoretical Framework
Virtual Interactions As digital transformation reshapes education, traditional communication modes are giving way to virtual interactions, as explored by Baeva (2021) in the context of digital learning systems. Interdisciplinary Approaches Cybersecurity education is evolving, requiring interdisciplinary approaches, improved digital skills, and thorough course design to meet the needs of this emerging field. Societal Integration The principles of Connectivism align well with the growing focus on social integration and community networks in the context of cybersecurity education and practice. https://eprints.gla.ac.uk/118043/9/118043.pdf https://files.eric.ed.gov/fulltext/ED636406.pdf In examining Connectivism, Goldie (2016) remarked that the initiation of learning takes place when learners engage with and become part of a learning community (which are nodes within the connectivist model). These nodes take the form of websites, organizations, databases, journals, libraries, social media, peers, blogs, discussion boards, YouTube videos, podcasts, OER, professional associations, and other specialized lighthouses that are networked to share resources. Stephen Downes (2006), expander of connective knowledge, suggests that learning and knowledge are not solely about the content but about understanding the relationships and networks that link various pieces of information together. Perspective and ideas that were previously not considered, due to sporadic network connections or lack of a community, are able to structure their views via the technology of their choosing and present it among community members. As a result, a stable connection is formed that, when nurtured and addressed, can develop into information highways in which stored and accessible knowledge is shared among the community. However, as information shifts in and out of relevance, the skill to search for up-to-date information and discern between secondary and non-essential information is regarded as a crucial ability that enhances the learning process (Goldie, 2016). This ability is similar to the core functions described in The Framework for Improving Critical Infrastructure Cybersecurity (NIST, 2018). Labeled as Identify, Protect, Detect, Respond, and Recover (see Figure 9), these functions are meant to provide an organization with a strategy for addressing the dynamic nature of cybersecurity and the inherent risks associated with technology. Note. The vertical arrangement underscores the progressive nature of these actions, from initial risk identification to recovery, demonstrating their interconnected reliance and the systematic approach to resilient cybersecurity. https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf



Connectivism Learning Theory
Learning and knowledge rest in diversity of opinions. Learning is a process of connecting specialized nodes or information sources. Learning may reside in non-human appliances. Capacity to know more is more critical than what is currently known. Nurturing and maintaining connections are needed to facilitate continual learning. The ability to see connections between fields, ideas, and concepts is a core skill. Currency (accurate, up-to-date knowledge) is the intent of all connectivist learning activities. Decision-making is itself a learning process. Choosing what to learn and the meaning of incoming information is seen through the lens of a shifting reality. While there is a right answer now, it may be wrong tomorrow due to alterations in the information climate affecting the decision.

Introduction
Welcome to the evaluation of "Connected Security (CS)," designed to bridge the prevalent gaps in both literature and practical application within the realm of introductory cybersecurity education. This course is deeply rooted in the Connectivism learning theory, which underscores the paramount of networks, technology, and connections in the learning process, and is crafted utilizing the ADDIE Instructional Design model. This course draws inspiration from the Workforce Education Course Manual (WECM) and adheres to its accreditation standards, particularly for the Information Technology Security 1342 (ITSY 1342) course. The learning outcomes from ITSY 1342, such as applying NIST guidelines, developing backup/recovery procedures, and utilizing encryption techniques, serve as a foundational guide in shaping the CS course. Connectivism, introduced by George Siemens in 2005 and further explored by scholars like Dr. Goldie, posits that learning transpires through the navigation and connection within information networks, facilitated by digital literacy and critical information evaluation. Siemens delineates several principles of Connectivism, including the belief that learning and knowledge rest in a diversity of opinions and that the capacity to know more is more critical than what is currently known. Principles of Connectivism Learning and knowledge rests in diversity of opinions. Learning is a process of connecting specialized nodes or information sources. Learning may reside in non-human appliances. Capacity to know more is more critical than what is currently known Nurturing and maintaining connections is needed to facilitate continual learning. Ability to see connections between fields, ideas, and concepts is a core skill. Currency (accurate, up-to-date knowledge) is the intent of all connectivist learning activities. Decision-making is itself a learning process. Choosing what to learn and the meaning of incoming information is seen through the lens of a shifting reality. While there is a right answer now, it may be wrong tomorrow due to alterations in the information climate affecting the decision. This theory is particularly pertinent in our rapidly evolving digital landscape, where the ability to adeptly manage information and foster lifelong learning skills is crucial. Dr. Goldie (2016) accentuates that the inception of learning occurs when learners connect to and engage in a learning community, which in the context of our CS course, takes the form of various nodes or 'lighthouses' such as websites, organizations, databases, and more, networked to share resources. Weekly Progression The general order of the week is structured as follows: Review the Lighthouses and Connectors: Begin by exploring and understanding the various nodes and connections available. Networked Learning Activity: Engage in activities that leverage the networked learning communities. Discussion Forum: Participate in the forum to discuss, share, and learn from peers (if applicable). Reflection Journal: Most weeks will include a reflection journal to document your intellectual growth, which will be utilized in your e-portfolio for the final week's presentation. The CS course, therefore, aims to provide a holistic learning experience, encouraging learners to form connections among learning communities or 'lighthouses.' This is also meant to be a facilitator driven course in which learners branch out and discover the numerous information highways that are available. My hope is that students will take this foundational knowledge and continue pursuing careers involving technology. Connected Security Syllabus
Research Questions
How does participation in a cybersecurity education course, grounded in Connectivism, impact participants' understanding of cybersecurity threats and the necessary protective measures? How do participants perceive the effectiveness of the Connected Security curriculum, designed using Connectivism principles, in educating about cybersecurity principles? Post-course Semi-Structured Focus Group Questions