Journal of The Colloquium for Information Systems Security Education

Current Issue

Vol. 13 No. 1 (2026)
Published March 21, 2026
Journal of The Colloquium for Information Systems Security Education

Cybersecurity Education in the Age of AI, Automation & Ambiguity

This volume is based on the 29th Colloquium held on-site at Seattle University in Washington State in November 2025. The event was co-hosted with The City University of Seattle, led by Morgan Zantua. The editors extend their sincere gratitude to both institutions, our authors, and the many individuals whose efforts made the event possible. We also thank our sponsors— Seattle University, The City University of Seattle, Codio, SET, and Silver Cloud Hotels—for their generous support of the event.

The 29th Colloquium was held jointly with the Conference on Cybersecurity, Education, Research, and Practice (CCERP). Papers from that conference are published separately and are available at: https://digitalcommons.kennesaw.edu/ccerp/2025/. We are grateful for their partnership and for the significant contributions their research makes to the broader cybersecurity education community.

As this journal is published in 2026, we observe the continued normalization of artificial intelligence (AI) systems as integral components of business operations, defense practices, and scientific systems, accompanied by a proportionate expansion in datacenter infrastructure and semiconductor demand. At the same time, the geopolitical landscape continues to reshape the cybersecurity threat environment, with defensive strategies across governments, industry, and critical infrastructure evolving rapidly.

The influence of social media, large language models, and increasingly sophisticated deepfake technologies continues to expand, affecting societal discourse, human psychology, and cybersecurity practices as educational institutions and organizations adapt their policies and training approaches. Although widespread quantum readiness remains distant for many organizations, threat analysis and mitigation strategies are already being developed for high-security environments. Meanwhile, immersive technologies such as virtual and augmented reality remain largely emerging for the general public, though niche applications are gaining traction and gamification continues to influence educational approaches. Education itself is undergoing significant transformation as institutions adapt to both the benefits and challenges associated with AI-enabled technologies.

This year, 30 papers were accepted from authors across the United States and around the world. The increased number of submissions reflects growing interest in The Colloquium and has further strengthened the quality of this year’s journal. We are grateful to all authors who submitted their work and encourage those whose papers were not accepted to consider submitting again in future years.

The papers presented in this volume provide valuable insights for cybersecurity educators seeking to remain current with emerging technologies and evolving challenges. Artificial intelligence is now a common component of educational practice and research methodology. In addition, disciplines such as psychology and philosophy are emerging as important elements within the broader cybersecurity landscape—particularly in areas such as social media safety for children, AI-driven changes in human behavior, the proliferation of AI-generated content competing with authentic information, and the psychological dynamics underlying cyber attack and defense.

The Editorial Board would like to thank all those who participated in The Colloquium, particularly the Program Committee members who contributed to the peer-review process. Their efforts allow us to maintain the high standards of the journal and continuously improve the editorial process. We also extend our appreciation to The Colloquium’s President, Denise Kinsey, and to the Board of Directors and Officers of CISSE for their leadership and guidance, under the chairmanship of co-founder William “Vic” Maconachy.

CISSE is granted a non-exclusive right to publish and disseminate the work. All articles are © their authors and licensed under CC BY 4.0. Usage and publication requests should be made directly to the authors.

The Editorial Board:

Erik Moore, Editor-in-Chief
Dan Likarish, Senior Editor
Denise Kinsey, Senior Editor
Alexander Kent, Associate Editor
Andrew Hurd, Associate Editor
Andrew Belón, Production Editor

Articles

Shoshana Sugerman, Sanya Joseph, Quinn Colognato, Mary Cotrupi, Aanya Mehta, Tanvi Mehta, Emily Goldman, Ishneet Kaur, Victoria Cai, Gabriel Bezerra, Adam Kaplan, Arielle Revis, Lala Liu, Samuel Leung, Elif Kulahlioglu, Rachel Schneider, Mikah Schueller, Quinn Sharp, James Porvaznik, Brian Robert Callahan
pp. 1-11 Art. 216
A Case Study for Combating Student Overuse of Generative Artificial Intelligence in Cybersecurity Educational Activities Using Augmented Reality Capture-the-Flag Development

DOI: 10.53735/cisse.v13i1.216

PDF
Jane Blanken-Webb
pp. 1-5 Art. 217
A Deweyan Foundation for Cultivating Reflective Cyber-Attuned Habits in an Age of AI and Ambiguity

DOI: 10.53735/cisse.v13i1.217

PDF
Venkat Laxmi Sateesh Nutulapati
pp. 1-7 Art. 218
A Systematic Review of Residual Risk in Cybersecurity Awareness Training

DOI: 10.53735/cisse.v13i1.218

PDF
Advait Patel, Vaishnavi Gudur, Prashanthi Matam, Charit Upadhyay, Aparna Achanta, Swara Dave, Shalini Sudarsan
pp. 1-13 Art. 219
AI-Driven Cloud Security: AIOps for Threat Detection and Compliance

DOI: 10.53735/cisse.v13i1.219

PDF
Hsiao-An Wang, Joshua Goldberg, Audrey Fruean, Zixuan Zou, Ruoyu Zhao, Sakib Miazi, Jens Mache, Ishan Abraham, Taylor Wolff, Jack Cook, Richard Weiss
pp. 1-9 Art. 220
An AI Agent Workflow for Generating Contextual Cybersecurity Hints

DOI: 10.53735/cisse.v13i1.220

PDF
Eric McCloy, Samuel Nimako-Mensah, Albert Samigullin
pp. 1-25 Art. 221
Analysis of Cybersecurity Risks and Teenage Digital Behavior Patterns

DOI: 10.53735/cisse.v13i1.221

PDF
Michael Whitman, Herbert Mattord, Kathleen Kotwica
pp. 1-7 Art. 222
Best Practices in Security Convergence: Tales from the Trenches

DOI: 10.53735/cisse.v13i1.222

PDF
Amorita A. Christian, Myles Nelson, Tiffany Haney, Charles Nickerson
pp. 1-6 Art. 223
Building Nuclear-Specific Cybersecurity Expertise in Higher Education

DOI: 10.53735/cisse.v13i1.223

PDF
Arunima Chaudhary, Gualtiero Colombo, Amir Javed, Junaid Haseeb, Vimal Kumar, Richard Larsen
pp. 1-8 Art. 224
CodeWars: Using LLMs for Vulnerability Analysis in Cybersecurity Education

DOI: 10.53735/cisse.v13i1.224

PDF
Kushal Badal, Xiaohong Yuan, Huirong Fu, Darrin Hanna, Jason Gorski
pp. 1-13 Art. 225
Cybersecurity Education with Generative AI: Creating Interactive Labs from Microelectronic Fundamentals to IoT Security Exploitation

DOI: 10.53735/cisse.v13i1.225

PDF
Joseph Lozada
pp. 1-8 Art. 226
Deepfake-Enabled Infiltration: The Threat of Synthetic Identities in Corporate Environments

DOI: 10.53735/cisse.v13i1.226

PDF
Abel Ureste, Hyungbae Park, Tamirat Abegaz
pp. 1-7 Art. 227
Detecting and Mitigating AI Prompt Injection Attacks in Large Language Models (LLMs)

DOI: 10.53735/cisse.v13i1.227

PDF
Christopher P. Collins, Yair Levy, Gregory Simco, Ling Wang
pp. 1-6 Art. 228
Development and Validation of a Healthcare Workers Phishing Risk Exposure (HWPRE) Taxonomy for Mobile Email

DOI: 10.53735/cisse.v13i1.228

PDF
Ryan Straight, Josh Herron
pp. 1-7 Art. 229
Distributed Agency in AI-Enhanced Cybersecurity Education: A Posthuman Instructional Design Framework

DOI: 10.53735/cisse.v13i1.229

PDF
Weihao Qu, Gurmeet Singh, Daniel Crawford, Bingjun Li, Jalen Smith
pp. 1-7 Art. 230
Enhancing User Resilience Against AI-Augmented Phishing: A Two-Stage Framework for Detection and Personalized Training

DOI: 10.53735/cisse.v13i1.230

PDF
Verónica Elze, Taejin Kim, Brian Maeng
pp. 1-8 Art. 231
EQīLevel: Emotion-Aware Reinforcement Learning for Adaptive Academic Tutoring

DOI: 10.53735/cisse.v13i1.231

PDF
Benard Birundu, Marc J. Dupuis
pp. 1-7 Art. 232
Exploring the Impact of Previous Experience, and Threats Awareness on Influencing Regular Information Backup Among USA Population

DOI: 10.53735/cisse.v13i1.232

PDF
Lauren Matthews, Idongesit Mkpong-Ruffin, Deidre Evans, Chutima Boonthum-Denecke
pp. 1-11 Art. 233
From Creation to Detection: How Dataset Composition and Simple Augmentation Influence Deepfake Training

DOI: 10.53735/cisse.v13i1.233

PDF
Sav Wheeler, Marc J. Dupuis
pp. 1-9 Art. 234
From Social Sharing to Security Lessons: Behaviors, Disclosure, and Cyber Threats

DOI: 10.53735/cisse.v13i1.234

PDF
Vahid Heydari, Kofi Nyarko
pp. 1-11 Art. 235
Integrating Artificial Intelligence into Undergraduate Cybersecurity Education: A Course Design for Threat Detection, Explainability, and Ethical Resilience

DOI: 10.53735/cisse.v13i1.235

PDF
Myles Nelson, Amorita A. Christian, Tiffany Haney, Charles Nickerson
pp. 1-7 Art. 236
Mapping the Gap: Analysis of Nuclear Cybersecurity Education in U.S. Universities

DOI: 10.53735/cisse.v13i1.236

PDF
Timothy Crisp, John Hale
pp. 1-7 Art. 237
Play NICE: Incorporating Cyber Phraseology Into K-12 Education

DOI: 10.53735/cisse.v13i1.237

PDF
Steven Furnell, Lucija Šmid, James Todd, Xavier Carpent, Simon Castle-Green
pp. 1-9 Art. 238
Roll With It: Awareness Raising with Cyber Defence Dice

DOI: 10.53735/cisse.v13i1.238

PDF
Mujtaba Nazari, Eric Chan-Tin, Loretta Stalans, Mohammed Abuhamad
pp. 1-8 Art. 239
SecureAI: Toward Experiential Security and Privacy Training for AI Practitioners

DOI: 10.53735/cisse.v13i1.239

PDF
Andrew J. Hurd, Gloria J. Kramer-Gordon, Pamela Doran
pp. 1-6 Art. 240
Securing Meaning: Language Equity in Cybersecurity Translation

DOI: 10.53735/cisse.v13i1.240

PDF
Hareign Casaclang, Bianca Ionescu, Yoohwan Kim, Ju-Yeon Jo
pp. 1-21 Art. 241
Self-Hosted Workflow Automation for AI-Based Cybersecurity Operation

DOI: 10.53735/cisse.v13i1.241

PDF
Aniya Hopson, Chutima Boonthum-Denecke, Idongesit Mkpong-Ruffin
pp. 1-7 Art. 242
Study of AI Object Detection: Patterns on Animals with YOLO and Adversarial Patches

DOI: 10.53735/cisse.v13i1.242

PDF
Ella Luedeke, Meera Sridhar, Harini Ramaprasad
pp. 1-9 Art. 243
Teaching Critical Infrastructure Security Through Interactive Experiences: Modeling Cyberattacks in Gamified Learning

DOI: 10.53735/cisse.v13i1.243

PDF
Sara Sutton, Victor Bungei, Xinli Wang, Johnfia Frank, Esther Djan
pp. 1-13 Art. 244
Teaching Endpoint Protection through Wazuh: A Project-Based Approach to Cybersecurity Education

DOI: 10.53735/cisse.v13i1.244

PDF
Venkata Sai Kaushik Reddy Mitta, Marc J. Dupuis
pp. 1-8 Art. 245
Unequal Risks: Ethnicity, Region, and Cybersecurity Outcomes in the United States

DOI: 10.53735/cisse.v13i1.245

PDF
View All Issues