Fostering a Cybersecurity-Educated Community: Empowering Knowledge and Awareness in the Digital Age

Inayat Khan, Abid Jameel, Inam Ullah, Muhammad Shahid Anwar

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

The rise of digital platforms and smart technologies has increased concerns regarding cybersecurity and privacy for both individuals and organizations alike. It is no longer sufficient for cybersecurity to be relegated solely to professionals; instead, it is the responsibility of all individuals to take a proactive approach against cyber threats. This includes a cross-disciplinary effort in increasing cybersecurity education available to individuals of all ages and background. In this chapter, we argue for a curriculum-based approach to cybersecurity education that not only introduces basic cybersecurity concepts but also integrates it into both technical and non-technical disciplines across four different user types: K-12 students, technical professionals, college students, and all other citizens. This curriculum roadmap aims to increase cybersecurity awareness, promote mindful cybersecurity practices, and expose individuals to a range of cybersecurity solutions for related challenges.

Original languageEnglish
Title of host publicationCybersecurity Management in Education Technologies
Subtitle of host publicationRisks and Countermeasures for Advancements in E-learning
PublisherCRC Press
Pages36-48
Number of pages13
ISBN (Electronic)9781003815563
ISBN (Print)9781032438320
DOIs
StatePublished - 1 Jan 2023
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2024 selection and editorial matter, Ahmed A. Abd El-Latif, Yassine Maleh, Mohammed A. El-Affendi and Sadique Ahmad; individual chapters, the contributors.

ASJC Scopus subject areas

  • General Social Sciences
  • General Computer Science

Fingerprint

Dive into the research topics of 'Fostering a Cybersecurity-Educated Community: Empowering Knowledge and Awareness in the Digital Age'. Together they form a unique fingerprint.

Cite this