Increasing Teacher Competence in Cybersecurity Using the EU Security Frameworks

Full Text (PDF, 302KB), PP.60-68

Views: 0 Downloads: 0

Author(s)

Ievgeniia Kuzminykh 1,* Maryna Yevdokymenko 2 Oleksandra Yeremenko 2 Oleksandr Lemeshko 2

1. Department of Informatics, King’s College London, London, WC2B 4BG, UK

2. Department of Infocommunication Engineering, Kharkiv National University of Radio Electronics, Kharkiv, 6100, Ukraine

* Corresponding author.

DOI: https://doi.org/10.5815/ijmecs.2021.06.06

Received: 10 Apr. 2021 / Revised: 29 Jun. 2021 / Accepted: 15 Sep. 2021 / Published: 8 Dec. 2021

Index Terms

Teacher competence, Professional development, Cybersecurity framework, Group training, Self-education.

Abstract

A study was undertaken to identify the missing skill and expertise of teachers and other stakeholders in the field of EU cyber security regulatory documents and frameworks. In order to increase the knowledge in this area and promote the EU security frameworks the model for the continuous building of teacher competence has been proposed and planned to be implemented in Ukraine. The proposed model will contribute towards improving the excellence of educators and academics, as well as increase competitiveness of educational programmes on cybersecurity among similar institutions in the EU countries. Various studies focused on the development of competence of the students to prepare them for the job market and build a comprehensive portfolio, education-business partnerships and collaboration. However, the issue of developing teacher expertise to achieve high quality of education remains open. We highlighted the importance of creating a cybersecurity ecosystem through the cooperation with different stakeholders and by implementing the model for continuous development of teacher competence.
Before building the model the overview and analysis of different teacher professional development approaches were conducted. Analysis showed that for our goal the best suitable approach is a model that consists of two stages based on self-education and group education approaches with 7 processes inside. The study revealed that competence may be achieved through a number of activities which may be grouped under four generic categories: student and staff training, academic and business seminars, business-oriented roundtable debates, and research. The model uses as main methods of achieving a better quality of education in cybersecurity the development of new training courses and modernization of educational programs, and for raising awareness among businesses and regulatory bodies - the workshops and roundtables.

Cite This Paper

Ievgeniia Kuzminykh, Maryna Yevdokymenko, Oleksandra Yeremenko, Oleksandr Lemeshko, " Increasing Teacher Competence in Cybersecurity Using the EU Security Frameworks", International Journal of Modern Education and Computer Science(IJMECS), Vol.13, No.6, pp. 60-68, 2021.DOI: 10.5815/ijmecs.2021.06.06

Reference

[1] M. Baezner, “Cyber and Information warfare in the Ukrainian conflict”, report, Center for Security Studies (CSS), ETH Zürich, 2018.

[2] A. Greenberg, Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hacker, Doubleday, 2019.

[3] L. Streltsov, “The System of Cybersecurity in Ukraine: Principles, Actors, Challenges, Accomplishments”, Eur. J. Sec. Research, Vol.2, pp. 147–184, 2017, https://doi.org/10.1007/s41125-017-0020-x.

[4] V. Roller, S. Gogonyants, I. Koropatnik, “Legal background of cyber defence in Ukraine”, J. Scie. Papers Social Dev.and Sec., Vol. 9, No.4, p. 74, 2019. https://doi.org/10.33445/sds.2019.9.4.5.

[5] European Court of Auditors, “Challenges to effective EU cybersecurity policy”, briefing paper, 2019, https://www.eca.europa.eu/Lists/ECADocuments/BRP_CYBERSECURITY/BRP_CYBERSECURITY_EN.pdf.

[6] European Commission, “EU Cybersecurity plan to protect open internet and online freedom and opportunity”, press release, 2013, https://ec.europa.eu/commission/presscorner/detail/en/IP_13_94.

[7] IoT security foundation (IoTSF), “Establishing principles for internet of things security”, brochure, 2015, https://www.iotsecurityfoundation.org/wp-content/uploads/2015/09/IoTSF-Establishing-Principles-for-IoT-Security-Download.pdf

[8] T. Strelkova, O. Lemeshko, M. Yevdokymenko, O. Yeremenko, I. Kuzminykh, “Experience of adaptation and organization of Distance Learning in Ukrainian Universities”, in Handbook of Research on Inequities in Online Education During Global Crises, L. Kyei-Blankson, J. Blankson, E. Ntuli, Eds. IGI Global, 2021, unpublished.

[9] O. Sukhodolia, “Implementation of the Concept of Critical Infrastructure Protection in Ukraine: Achievements and Challenges”, Inf. & Sec.: Int.J., Vol.40, No.2, pp. 107-119, 2018, https://doi.org/10.11610/isij.4008.

[10] D. G. Bobro, S.P. Ivanyuta, S.I. Kondratov, O.M. Sukhodolya, Organizational and Legal Aspects of Security and Resilience of Critical Infrastructure of Ukraine. Kyiv: NISS, 2019.

[11] A. Carlsson, I. Kuzminykh, R. Gustavsson, “Virtual Security Labs Supporting Distance Education in ReSeLa Framework”, in The Challenges of the Digital Transformation in Education, M. Auer, T. Tsiatsos, Eds. Springer: Cham, 2019, pp. 577-587.

[12] O. Lemeshko, O. Yeremenko, M. Yevdokymenko, I. Kuzminykh, “Features of designing the virtual laboratory in cybersecurity for distance learning”, New Collegium, Vol.3, pp.41-45, 2020.

[13] O. Yeremenko, M. Yevdokymenko, I. Kuzminykh, A. Kruhlova, “Cybersecurity Virtual Laboratory for distance learning”, poster in 7th ACM Celebration of Women in Computing: womENcourage, 24-27 September, 2020, Baku, Azerbaijan.

[14] A. Adamov, A. Carlsson, & T. Surmacz, “An Analysis of LockerGoga Ransomware”, in 2019 IEEE East-West Design & Test Symposium (EWDTS), Batumi, Georgia, 2019, https://doi.org/10.1109/EWDTS.2019.8884472.

[15] I. Kuzminykh, A. Carlsson, “Analysis of Assets for Threat Risk Model in Avatar-Oriented IoT Architecture”, in Internet of Things, Smart Spaces, and Next Generation Networks and Systems, O. Galinina, S. Andreev, S. Balandin, Y. Koucheryavy, Eds. Springer: Cham, 2018, pp. 52-63, https://doi:10.1007/978-3-030-01168-0_6.

[16] I. Kuzminykh, B. Ghita, J.M. Such, “The Challenges with Internet of Things for Business”, arXiv:2012.03589 [cs.CR], 2020, unpublished.

[17] Y. Kuzminykh, M. Fliustikova, “Mechanisms of ensuring security in Keystone service”, Problemi telekomunìkacìj, Vol.2 No.25, pp.78-96, 2019, https://doi.org/10.30837/pt.2019.2.06.

[18] M. TajDini, V. Sokolov, I. Kuzminykh, S. Shiaeles, & B. Ghita, “Wireless Sensors for Brain Activity – A Survey”, Electronics, Vol.9 No.12, 2092, 2020, https://doi.org/10.3390/electronics9122092.

[19] M. Yemini, J. Hermoni, V. Holzmann, L. Shokty, W. Jayusi, N. Natur, “The implementation of internationalisation in Israeli teacher training colleges”, Eur J Educ., Vol.2017, No. 52, pp. 546–557, 2017, https://doi.org/10.1111/ejed.12239.

[20] V. Kumar, “The Influence of Teacher’s Professional Competence on Students’ Achievement”, IOSR Journal of Engineering, Vol. 3, No.11, pp. 12-18, 2013.

[21] Liakopoulou, M. “The Professional Competence of Teachers: Which qualities, attitudes, skills and knowledge contribute to a teacher’s effectiveness?”, Int. J. Human and Soc Scie, Vol.1, No.21, pp.67-78, 2011.

[22] R. R. Bodine, P. L. Slot, P. P.M. Leseman, “Increasing teachers’ intercultural competences in teacher preparation programs and through professional development: A review”, Teaching and Teacher Edu, Vol. 98, 103236, 2021.

[23] H. Parkhouse, C.Y. Lu, V.R. Massaro, “Multicultural education professional development: A review of the literature”, Review of Edu. Research, Vol. 89, pp.416-458, 2019, https://doi.org/10.3102/0034654319840359.

[24] S. Civitillo, L.P. Juang, M.K. Schachner, “Challenging beliefs about cultural diversity in education: A synthesis and critical review of trainings with pre-service teachers”, Edu. Research Rev, Vol. 24, pp. 67-83, 2018.

[25] L. Moghtadaie, & M. Taji, “Explaining the requirements for teacher’s development based on professional competencies approach”, Edu. Research and Reviews, Vol.13 No.14, pp. 564-569, 2018, https://doi.org/10.5897/ERR2018.3583.

[26] S. Aimah, S. Ifadah, M. D. A. Bharati, “Building Teacher’s Pedagogical Competence and Teaching Improvement through Lesson Study”, Arab World English J., Vol.8, No.1, pp. 66-78, 2017, https://doi.org/10.24093/awej/vol8no1.6.

[27] G. Næsheim-Bjørkvik, N. Helgevold, S. Østrem, “Lesson Study as a professional tool to strengthen collaborative enquiry in mentoring sessions in Initial Teacher Education”, Eur. J. Teacher Edu, Vol.42, No.5, pp. 557-573, 2019.

[28] L. Mata, “Experimental research regarding the development of methodological competences in beginning teachers”, Procedia - Social and Behavioral Sciences, Vol.29, pp.1895 – 1904, 2011.

[29] P. T. Thu Khine, H. P. P. Win, T. M. Naing, "Towards Implementation of Blended Teaching Approaches for Higher Education in Myanmar", Int. J. Edu and Management Eng, Vol.11, No.1, pp. 19-27, 2021.

[30] M. Osaci, " Numerical Simulation Methods of Electromagnetic Field in Higher Education: Didactic Application with Graphical Interface for FDTD Method ", Int. J Modern Edu and Comp Sci, Vol.10, No.8, pp. 1-10, 2018.

[31] S. Taber Keith, “Experimental research into teaching innovations: responding to methodological and ethical challenges”, Studies in Scie. Edu, Vol.55 No. 1, pp. 69-119, 2019, https://doi.org/10.1080/03057267.2019.1658058.

[32] L. R. Betts, B. Huntington, L.‐S. Iao, G. V. Dillon, T. Baguley, P. Banyard, “Developing a competency‐based education training programme for university tutors”, J Competency-based Edu, Vol.4, No.4, e01200, 2019.

[33] C. Sturgis, “Reaching the tipping point: Insights on advancing competency education in New England”, Competency Work report, 2016, https://files.eric.ed.gov/fulltext/ED590523.pdf.

[34] S. Tharayil, M. Borrego, M. Prince, K. A. Nguyen, P. Shekhar, C. J. Finelli, & C. Waters, “Strategies to mitigate student resistance to active learning”, Int. J. STEM Edu, Vol.5 No.7. 2018, https://doi.org/10.1186/s40594-018-0102-y.

[35] V. Symeonidis, “Teacher competence frameworks in Hungary: A case study on the continuum of teacher learning”, Eur.J. Edu., Vol.54, No.4, pp. 400–412, 2019, https://doi.org/10.1111/ejed.12347.

[36] TALIS 2018 Results, “Teachers and School Leaders as Lifelong Learners”, The OECD Teaching and Learning International Survey, Vol.1, 2019, https://www.oecd-ilibrary.org/education/talis-2018-results-volume-i_1d0bc92a-en.

[37] TALIS 2018 Results, “Teachers and School Leaders as Valued Professionals”, The OECD Teaching and Learning International Survey, Vol. 2, 2020, http://www.oecd.org/education/talis-2018-results-volume-ii-19cf08df-en.htm.

[38] Educating the Next generation experts in Cyber Security (ENGENSEC): the new EU-recognized Master’s program, project, (2017), http://engensec.eu/about-the-project/.

[39] E. Villegas-Reimers, “Factors to consider when planning, implementing and assessing the professional development of teachers”, Chapter V in Teacher professional development: an international review of the literature, UNESCO: International Institute for Educational Planning, 2003.

[40] M. Binkley, O. Erstad, J. Hermna, S. Raizen, M. Ripley, M. Miller‐Ricci, M. Rumble, “Defining twenty‐first century skills”, in Assessment and teaching of 21st century skills, P. Griffin, E. Care, B. McGaw, Eds. Dordrecht, The Netherlands: Springer, 2012.

[41] F. Caena, C. Redecker, “Aligning teacher competence frameworks to 21st century challenges: The case for the European Digital Competence Framework for Educators (DigcompeDu)”, Eur. J. Edu., Vol. 54, pp.356–369, 2019.

[42] M. Baeten, M. Simons, W. Schelfhout, R. Pinxten, “Team teaching during field experiences in teacher education: Exploring the assistant teaching model”, Eur. J. Teacher Edu., Vol.41, No.3, pp.377-397, 2018.

[43] L.M. Brevik, G. B. Gudmundsdottir, A. Lund, T. Aanesland Strømme, “Transformative agency in teacher education: Fostering professional digital competence”, Teaching and Teacher Edu., Vol. 86, 102875, 2019, https://doi.org/10.1016/j.tate.2019.07.005.

[44] European Commission, “Supporting teacher competence development for better learning outcomes”, report, 2013, https://ec.europa.eu/assets/eac/education/policy/school/doc/teachercomp_en.pdf.

[45] E. Boyer, Scholarship reconsidered: Priorities of the professoriate, San Francisco, CA: Jossey-Bass, 1990.

[46] J. Fanghanel, J. Pritchard, J. Potter, & G. Wisker, “Defining and supporting the scholarship of teaching and learning (SoTL): A sector-wide study”, advanceHE project report, York: HE Academy, (2016), https://www.advance-he.ac.uk/knowledge-hub/defining-and-supporting-scholarship-teaching-and-learning-sotl-sector-wide-study.

[47] J. Glaesser, “Competence in educational theory and practice: a critical discussion”, Oxford Review of Education, Vol.45, No.1, pp. 70-85, 2019. https://doi.org/10.1080/03054985.2018.1493987.

[48] A. Baumgartner, C. Müller, R. Fengler, F. Javet, “Development of application‐oriented competency frameworks: Empirical findings from the validation of such a framework by means of an employer survey”, J. Competency-based Edu., Vol. 3 No.4, e01177, 2018, https ://doi.org/10.1002/cbe2.1177.

[49] O. Zlatkin-Troitschanskaia, H.A. Pant, C. Lautenbach, D. Molerov, M. Toepper, S. Brückner, Modeling and Measuring Competencies in Higher Education: Approaches to Challenges in Higher Education Policy and Practice, Springer VS: Wiesbaden, 2017, https://doi.org/10.1007/978-3-658-15486-8.

[50] M. Hagan‐Short, P. Addison, “Competency‐based education: Multiple approaches‐a single institution”, J. Competency-based Edu., Vol.4, No. 3, e01194, 2019, https://doi.org/10.1002/cbe2.1194.

[51] E. G. Gutsu, E. V. Kochetova, & I. V. Ivanova, “Modern methods of implementation of competent approach in the system of professional training of university teachers”, Vestnik Mininskogo universiteta, Vol.4, No.8, p.27, 2014.

[52] O. Lemeshko, M. Yevdokymenko, O. Yeremenko, I. Kuzminykh, “Cyber Resilience and Fault Tolerance of Artificial Intelligence Systems: EU Standards, Guidelines, and Reports”, in CEUR Workshop Proceedings (CPITS’20), Vol. 2746, pp.99-108, 2020.

[53] R. Arun, “The Cyber Security Ecosystem: Collaborate or Collaborate: It’s Your Choice”, 2015 [Online]: http://www.circleid.com/posts/20151013_cyber_security_ecosystem_collaborate_or_collaborate_your_choice/.

[54] S. Riley, “Cyber Hygiene & Attack Analysis Methodology”, CISO Central, 2020 [Online]: https://www.ciso-central.org/organisation/cyber-hygiene-attack-analysis.