Tutkimuksen kuvaus Research information

Kurssit/Courses Digitaaliset yleistaidot: Kyberturvallisuuden perusteet Kyberturvallisuus I Cyber Security I Cyber Security II Cryptography Engineering I Cryptography Engineering II

Capture the Flags (un)usual Monday morning CTF Dream vacation CTF

Welcome to participate in the cybersecurity education effectiveness research!

suomeksi

Research information

Background

Currently, there is a global shortage of cyber security experts. Companies and society need a wide variety of cybersecurity skills, but current education cannot meet the need. Too few skilled people graduate, and sometimes the skills are not sufficient or do not meet the need. Therefore, to develop cybersecurity education, we need knowledge about how cybersecurity education affects students.

Purpose

This research investigates how studying affects the students' cybersecurity

This research is going on at the University of Tampere in several cybersecurity courses and in the CTF games. Everyone participating in the courses or CTFs can participate in this research. If you are attending many security courses/CTFs, you can participate in surveys in all of them if you wish! This allows us to see the influence of studies as more cyber security courses accumulate.

Benefits

By participating in this research, you will contribute to the development of cyber security education. Questions in the surveys will help you to get a better idea of how you assess your own cybersecurity skills and how the skills develop during the course. In addition, you will get a clearer picture of which aspects of cybersecurity you are most interested in and which you think are not so important.

Participation

The participation of all kinds of students is important and answers are needed from everyone, regardless of how interested you are in the course and what kind of grade you are aiming at!

Participate by choosing the course or CTF from the menu. There you will find instructions and survey links.

Data confidentiality, processing, and storage

Participation in this research is voluntary. As background information, we collect gender, field of study, phase of studies, additional information about studies, and previously completed education. No sensitive personal data is collected.

Your "Pre" and "Post" surveys are combined with a code that you generate yourself during the survey. So only you know whose identity is behind the code.

Data collected from the surveys is used for research purposes and cybersecurity teaching development. You can stop answering at any time and you can also request the deletion of data you have already provided.

Research duration: 2022-2026

Personal data processing period: Until the publications marked in the publication plan have been published and one year after the last publication.

The research material is processed according to Fair Data principles. After the research, data is opened and stored in the IDA - Research Data Storage Service. Opening data gives other researchers access to data, and they can, for example, repeat the analysis of data. In addition, opening the research data enables the reuse of the collected material as part of another research.

Privacy notice

Contact

tiina.schafeitel-tahtinen (at) tuni.fi