Cybersecurity as a part of digital literace: How schools can create a supportive and secure environment from the perspective od cybersecurity

Authors

  • PhDr. Martin Beneš Faculty of Education, Department of Information Technology and Technical Education, Charles University

DOI:

https://doi.org/10.14712/25337890.4734

Keywords:

school security policies, pedagogical methods, behavioral aspects of cybersecurity, educational programs, digital literacy

Abstract

The article focuses on strategies that schools can utilize to enhance cybersecurity and support digital literacy. In today‘s rapidly evolving digital world, it is essential for educational institutions to take steps to ensure a safe environment for their students, while also providing
them with the skills necessary to navigate the digital world. This article examines the key aspects required for successful integration of cybersecurity into the school environment. One of the main points is the development and implementation of security policies. The article explores how schools can create and apply policies that mitigate the risk of students encountering online threats while supporting the safe use of technology for educational purposes. This includes not only technical aspects, such as firewalls and antivirus programs, but also administrative and organizational measures, such as rules for internet and social media use. Special emphasis is placed on a multidisciplinary approach. This approach recognizes that cybersecurity is not just a technical matter, but also includes behavioral and psychological aspects. The article investigates how various disciplines, from computer science to sociology and psychology, can contribute to a better understanding and resolution of cybersecurity challenges. It also includes a discussion on the importance of awareness and education of teachers in the field of cybersecurity, which is crucial for creating a safe and supportive educational environment.

References

Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM, 42(12), 40–46.

Alkahtani, K. D. (2018). Cyber security challenges and solutions for V2X communications: A survey. Computer Networks, 151, 144–156. https://doi.org/10.1016/j.comnet.2018.12.018

Amankwa, E. (2021). Relevance of Cybersecurity Education at Pedagogy Levels in Schools. Journal of Information Security. https://doi.org/10.4236/jis.2021.124013.

Bada, M., Sasse, A. M., & Nurse, J. R. (2019). Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv preprint arXiv:1901.02672.

Black, P., & Wiliam, D. (2009). Developing the theory of formative assessment. Educational Assessment, Evaluation and Accountability, 21(1), 5–31. https://doi.org/10.1007/s11092-008-9068-5

Cabric, M. (2015). Confidentiality, Integrity, and Availability, 185–200. https://doi.org/10.1016B978-0-12-802934-3.00011-1.

Centrum inkluze o. p. s. (2016). Využití peer programů na základních školách v oblasti prevence kyberšikany: Metodická příručka pro pedagogy.

Česká bankovní asociace. (n.d.) Kybertest.cz Dawson, J., & Thomson, R. (2018). The future cybersecurity workforce: Going beyond technical skills for successful cyber performance. Frontiers in Psychology, 9, 744. https://doi.org/10.3389/fpsyg.2018.00744

Donaldson, S., Siegel, S., Williams, C., & Aslam, A. (2015). Sample Cybersecurity Policy. 335–351. https://doi.org/10.1007/978-1-4302-6083-7_19.

Döring, N. (2014). Consensual sexting among adolescents: Risk prevention through abstinence education or safer sexting? Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 8(1), Article 9. https://doi.org/10.5817/CP2014-1-9

Fernanda. (2024, March 15). Best practices for chromebook security in K-12 schools. GAT for Education. https://gatlabs.com/education/blog/best-practices-for-chro-mebook-security-in-k-12-schools/

Flowerday, S., & Tuyikeze, T. (2016). Information security policy development and implementation: The what, how and who. Comput. Secur., 61, 169–183. https://doi.org/10.1016/j.cose.2016.06.002.

Gashi, L., Luma, A., & Aliu, A. (2022). A comprehensive review of cybersecurity perspective for Wireless Sensor Networks. 2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), 392–395. https://doi.org/10.1109/ISMSIT56059.2022.9932788.

Google. (n.d.). Be internet awesome. https://beinternetawesome.withgoogle.com/en_us

Haque, M., Ahmad, S., Haque, S., Kumar, K., Mishra, K., & Mishra, B. (2023). Analyzing University Students‘ Awareness of Cybersecurity. 2023 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC), 250–257. https://doi.org/10.1109/ETNCC59188.2023.10284971.

Hattie, J., & Timperley, H. (2007). The Power of Feedback. Review of Educational Research, 77(1), 81–112. https: doi.org/10.3102/003465430298487

Herrington, J., & Oliver, R. (2000). An instructional design framework for authentic learning environments. Educational Technology Research and Development, 48(3), 23–48. https://doi.org/10.1007/BF02319856

Javidi, G., & Sheybani, E. (2018). K-12 Cybersecurity Education, Research, and Outreach. 2018 IEEE Frontiers in Education Conference (FIE), 1–5. https://doi.org/10.1109/FIE.2018.8659021

Kapp, K. M. (2012). The gamification of learning and instruction: Game-based methods and strategies for training and education. Pfeiffer, A Wiley Imprint.

Kenneally, E. E., & Claffy, K. (2010). Dialing privacy and utility: a proposed data-sharing framework to advance Internet research. IEEE Security & Privacy, 8(4), 31–39.

Kessler, G. C., & Ramsay, J. (2013). Paradigms for cybersecurity education in a homeland security program. Journal of Homeland Security Education, 2, 35–44.

Kopecký, K. (2012). Sexting among Czech preadolescents and adolescents. New Educational Review, 28(2), 39–48.

Kopecký, K., & Szotkowski, R. (2015). Kyberšikana a další formy rizikového chování českých dětí v prostředí internetu. Adiktologie, 15(3), 166–173.

Kovacevic, A., Putnik, N., & Toskovic, O. (2020). Factors related to cyber security behavior. IEEE Access, 6, 26–27. DOI:10.1109/ACCESS.2020.3007867

Lahcen, R., Caulkins, B., Mohapatra, R., & Kumar, M. (2020). Review and insight on the behavioral aspects of cybersecurity. Cybersecurity, 3, 1–18. https://doi.org/10.1186/s42400-020-00050-w

Livingstone, S., Haddon, L., Görzig, A., & Ólafsson, K. (2011). Risks and safety on the internet: The perspective of European children. Full Findings. EU Kids Online, London School of Economics and Political Science, London.

Magazín BezpečnostPráce.info, z.s. (2022, September 1). Kybernetická a informační bezpečnost. Legislativa, Povinnosti, útoky. BezpečnostPráce.info. https://www.bezpecnostprace.info/kybernetika-informace/kyberneticka-bezpecnost-legisla-tiva-povinnost/

Maqsood, S., & Chiasson, S. (2021). Design, Development, and Evaluation of a Cybersecurity, Privacy, and Digital Literacy Game for Tweens. ACM Transactions on Privacy and Security (TOPS), 24, 1–37. https://doi.org/10.1145/3469821.

Mishra, A., Alzoubi, Y., Gill, A., & Anwar, M. (2022). Cybersecurity Enterprises Policies: A Comparative Study. Sensors (Basel, Switzerland), 22. https://doi.org/10.3390/s22020538

O2 chytrá škola. (n.d.). O nás. https://o2chytraskola.cz/

Pangrazio, L., & Cardozo-Gaibisso, L. (2020). Beyond cybersafety: The need to develop social media literacies in pre-teens. Digital Education Review, 37, 49–63. https://doi.org/10.1344/der.2020.37.49-63.

Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: gui- delines for effective information security management (3rd ed.). CRC Press.

Pencheva, D., Hallett, J., & Rashid, A. (2020). Bringing Cyber to School: Integrating Cybersecurity Into Secondary School Education. IEEE Security & Privacy, 18, 68–74. https://doi.org/10.1109/MSEC.2020.2969409.

Portál E-bezpečí. (2015). WebRangers – leták A4. https://www.e-bezpeci.cz

Portál E-bezpečí. (n.d.). https://www.e-bezpeci.cz

Pusey, P., & Sadera, W. A. (2011). Cyberethics, Cybersafety, and Cybersecurity: Preservice Teacher Knowledge, Preparedness, and the Need for Teacher Education to Make a Difference. Journal of Digital Learning in Teacher Education, 28(2), 82–88.

Reason, J. (1990). Human error. Cambridge University Press.

Safer Internet Center. (n.d.) O nás. https://www.bezpecnyinternet.cz/cs/o-nas/

Sarathchandra, D., Haltinner, K., & Lichtenberg, N. (2016). College Students‘ Cybersecurity Risk Perceptions, Awareness, and Practices. 2016 Cybersecurity Symposium (CYBERSEC), 68–73. https://doi.org/10.1109/CYBERSEC.2016.018.

Sasse, M. A., Brostoff, S., & Weirich, D. (2001). Transforming the ‚weakest link‘—a human/computer interaction approach to usable and effective security. BT Technology Journal, 19(3), 122–131.

Seale, Jim & Schoenberger, Nicole. (2018). Be Internet Awesome. Emerging Library & Information Perspectives. 1. 10.5206/elip.v1i1.366.

Schneier, B. (2000). Secrets and lies: Digital security in a networked world. John Wiley & Sons.

Sherman, A., DeLatte, D., Neary, M., Oliva, L., Phatak, D., Scheponik, T., Herman, G., & Thompson, J. (2018). Cybersecurity: Exploring core concepts through six scenarios. Cryptologia, 42, 337–377. https://doi.org/10.1080/01611194.2017.1362063.

Tetmeyer, A., & Saiedian, H. (2010). Security threats and mitigating risk for USB devices. IEEE Technology and Society Magazine, 29(4), 44–49. https://doi.org/10.1109/MTS.2010.939228

Tirumala, S., Sarrafzadeh, A., & Pang, P. (2016). A survey on internet usage and cybersecurity awareness in students. 2016 14th Annual Conference on Privacy, Security and Trust (PST), 223–228. https://doi.org/10.1109/PST.2016.7906931.

Vybíral, O. (2015). Google projekt – Web Rangers potřetí. Portál o školství v Jihomoravském kraji. https://www.jmskoly.cz

Waghere, S., Pardeshi, H., Patil, S., Kurhe, K., & Karad, P. (2023). CyberSecureHub:

Integrating Cyber Security Tools. International Journal of Advanced Research in Science, Communication and Technology. https://doi.org/10.48175/ijarsct-13144.

Walters, M.G., Gee, D., & Mohammed, S. (2019). A literature review: Digital citizenship and the elementary educator. International Journal of Technology in Education (IJTE), 2(1), 1–21.

Willard, N. E. (2007). The authority and responsibility of school officials in responding to cyberbullying. Journal of Adolescent Health, 41(6), 64–S65. https://doi.org/10.1016/j.jadohealth.2007.08.013

Williams, C., & Krueger, K. (2005). Is Your Network Safe? Why Educators Should Care about Cybersecurity And What They Should Do about It. T.H.E. Journal Technological Horizons in Education, 33, 36.

Published

2024-11-04