Skip to main content

Teaching Cybersecurity with Experiential Learning: The Case of the Phishing and Deviance Module in Social Science Courses

  • Conference paper
  • First Online:
Intelligent Computing (SAI 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 711))

Included in the following conference series:

  • 644 Accesses

Abstract

This article examines the impact of experiential pedagogy in integrating cybersecurity into the social science undergraduate curriculum of Historically Black University. The article is based on a National Science Foundation project, where twenty-six socio-cybersecurity modules were created, and some were integrated into Sociology and Criminal Justice courses. The impact of one of the modules, “Phishing and Deviance”, on cybersecurity learning outcomes is the focus of this article. The two research questions for this article are: 1) Was cybersecurity awareness increased after the infusion of the Phishing and Deviance Modules? 2) Were cybersecurity learning outcomes impacted by using experiential pedagogy? Vygotsky’s experiential learning theory was the grounding theory that guided the integration of the modules. The methodology included a pretest survey of students’ awareness of phishing, the module’s lecture and experiential activities, then a post-test survey of cybersecurity awareness. T-test analysis was performed on the data obtained from the quasi-experimental survey data. The results from the student responses demonstrate that experiential pedagogy was helpful and allowed them to showcase their new knowledge. This curriculum development project shows significant development in African American students’ awareness of cybersecurity at our institution. Post-research endeavors have expanded the socio-cybersecurity modules using constructivist experiential learning to other disciplines and institutions. Further research efforts can include developing more expansive socio-cybersecurity content like courses and programs and measuring their impacts through tracer studies and program evaluations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Turner, C.F., Turner, C.M.: Integrating cybersecurity into the sociology curriculum: the case of the password module. J. Comput. Sci. Coll. 33(1), 109–117 (2017)

    Google Scholar 

  2. Buchanan Turner, C., Turner, C.: Analyzing the impact of experiential pedagogy in teaching socio-cybersecurity: cybersecurity across the curriculum. J. Comput. Sci. Coll. 34(5), 12–22 (2019)

    Google Scholar 

  3. Finnemore, M., Hollis, D.: Constructing norms for global cybersecurity. Am. J. Int. Law 110(3), 425–479 (2016)

    Article  Google Scholar 

  4. Odlyzko, A.: Economics, psychology, and sociology of security. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 182–189. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45126-6_13

    Chapter  Google Scholar 

  5. Spidalieri, F., McArdle, J.: Transforming the Next Generation of Military Leaders into Cyber-Strategic Leaders: the role of cybersecurity education in US service academies. Cyber Def. Rev. 1(1), 141–164 (2016)

    Google Scholar 

  6. Hern, A.: Cambridge Analytica: how did it turn clicks into votes? 6 May 2018. https://www.theguardian.com/news/2018/may/06/cambridge-analytica-how-turn-clicks-into-votes-christopher-wylie

  7. Jarvis, P., Holford, J., Griffin, C.: The Theory and Practice of Learning, 2 edn. Stylus, London and Sterling (2012)

    Google Scholar 

  8. Prawat, R.S.: Dewey and Vygotsky viewed through the rearview mirror-and dimly at that. Educ. Res. 31(5), 16–20 (2002)

    Article  Google Scholar 

  9. Vygotsky, L.S.: Research method. In: Research Method. Collected Works of L. S. Vygotsky: 4. The History of the Development of Higher Mental Functions, pp. 27–63. Plenum, New York, (1997)

    Google Scholar 

  10. Manolis, C., Burns, D.J., Assudani, R., Chinta, R.: Assessing experiential learning styles: a methodological reconstruction and validation of the Kolb learning style inventory. Learn. Individ. Differ. 23, 44–53 (2013)

    Article  Google Scholar 

  11. Korgen, K.O., Atkinson, M.P.: Sociology in Action. Sage Publications, New York (2018)

    Google Scholar 

  12. Holmes, H.M.: Integrating the learning of mathematics and science using interactive teaching and learning strategies. J. Sci. Educ. Technol. 15(3), 247–256 (2006)

    Article  Google Scholar 

  13. Gardener, M.: Modules and minicourses for integrated science. Sci. Teach. 40(2), 31–32 (1973)

    Google Scholar 

  14. Nye, B.A., Thigpin, C.G.: Examining the relationship between process-oriented staff development and classroom practices using integrated mathematics and science instructional modules. J. Elem. Sci. Educ. 5(1), 10–26 (1993)

    Article  Google Scholar 

  15. Varma, K., Husic, F., Linn, M.C.: Targeted support for using technology-enhanced science inquiry modules. J. Sci. Educ. Technol. 17(4), 341–356 (2008)

    Article  Google Scholar 

  16. Turner, C., Taylor B., Kaza, S.: Security in computer literacy. In: Proceedings of the 42nd ACM technical symposium on Computer science education - SIGCSE 2011 (2011)

    Google Scholar 

  17. Phishing and Deviance Module: Socio-Cybersecurity Project. http://www.nsusociocybersecurity.org/modules/social-problems/phishing. Accessed 23 Dec 2022

  18. Cavanaugh, C., Dawson, K.: Design of online professional development in science content and pedagogy: a pilot study. J. Sci. Educ. Technol. 19(5), 438–446 (2010)

    Article  Google Scholar 

  19. Roebuck, J.B., Murty, K.S.: Historically Black Colleges and Universities: Their Place in American Higher Education. Praeger, Westport (1993)

    Google Scholar 

  20. U.S. Census Bureau: Types of internet subscriptions by selected characteristics 2013–2017 (2019). https://factfinder.census.gov

  21. Toldson, I.A.: Weeding out v. building up: why Justice Scalia was wrong about black scientists (editor’s contribution). J. Negro Educ. 84(4), 517–518 (2015)

    Article  Google Scholar 

  22. Bond, M.: Being an Ethical Warrior: How Labeling Theory Influences Police Officers and Their Patrol Perceptions. Public Safety, 6 February 2014

    Google Scholar 

  23. Schutt, R.K.: Investigating the Social World: The Process and Practice of Research, 9th edn. Sage, Boston (2019)

    Google Scholar 

  24. Blackboard: Phishing and Deviance Survey on Blackboard

    Google Scholar 

  25. Choong, Y.Y., Theofanos, M., Liu, H.K.: United States Federal Employees’ Password Management Behaviors a Department of Commerce Case Study. U.S. Department of Commerce (2014)

    Google Scholar 

  26. CUPS: Anti-Phishing Phil. CMU Usable Privacy and Security Laboratory, Carneige Mellon University. https://www.ucl.ac.uk/cert/antiphishing/

  27. Kremling, J., Sharp Parker, A.M.: Cyberspace, Cybersecurity and Cybercrime. Sage Publications, Los Angeles (2018)

    Google Scholar 

  28. Ramlo, S.E., Nicholas, J.B.: Divergent student views of cybersecurity. J. Cybersecur. Educ. Res. Pract. 2019(2), Article 6 (2020)

    Google Scholar 

  29. Cyber4All: New ‘Cyber4All’ Cybersecurity Minor Open 4 All Undergrads (2017). http://catalog.nec.edu/preview_program.php?catoid=11&poid=1201&returnto=246

  30. Saltzer, J., Schroeder, M.: The protection of information in computer systems. In: Proceedings of IEEE (1975)

    Google Scholar 

  31. Taylor, B., Azadegan, S.: Using security checklists and scorecards in CS Curriculum. In: National Colloquium for Information Systems Security Education, pp. 4–9 (2007)

    Google Scholar 

  32. Taylor, B., Azadegan, S.: Teaching security through active learning. In: Proceedings of Frontiers in Education: Computer Science and Engineering, Las Vegas (2007)

    Google Scholar 

  33. Brown, M.C., II.: The declining significance of historically black colleges and universities: relevance, reputation, and reality in Obamamericax. J. Negro Educ. 82(1), 3–19 (2013)

    Article  Google Scholar 

Download references

Acknowledgements

This research is based on work supported by the National Science Foundation under Grant No. 1956428.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Carlene Buchanan Turner .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Turner, C.B., Turner, C., Ashe, A. (2023). Teaching Cybersecurity with Experiential Learning: The Case of the Phishing and Deviance Module in Social Science Courses. In: Arai, K. (eds) Intelligent Computing. SAI 2023. Lecture Notes in Networks and Systems, vol 711. Springer, Cham. https://doi.org/10.1007/978-3-031-37717-4_83

Download citation

Publish with us

Policies and ethics