Vol. 12 No. 1 (2025): Journal of The Colloquium for Information Systems Security Education
Journal of The Colloquium for Information Systems Security Education

The Journal of the 28th Colloquium for Information Systems Security Education (CISSE) is based on the colloquium hosted on-site at the University of Tampa in Florida in November of 2024. The editors here express their gratitude to the university and particularly to Alper Yayla and Peyman Abdollahi of the University of Tampa Center for Cybersecurity. This colloquium was also held in conjunction with a successful hackathon sponsored and run by EC-Council. Thank you Wesley Alvarez, EC-Council Director of Academics for your partnership.

CISSE is a key gathering place for leaders of cybersecurity and cybersecurity education to share research, collaborate on improving cybersecurity education. This is achieved by offering a robust forum for our national and international community that is devoted to innovating cybersecurity education, expanding a quality cybersecurity workforce, and providing a place to connect with cybersecurity peers to make a safer, more aware, and more resilient global society.

As this Journal is published in 2025, we see dramatic transformations in cybersecurity that are taking place in multiple aspects of society and technology. Artificial intelligence (AI) has amplified both cyber attack and defense practices. And AIs broad deployment in industry has created new challenges in security, privacy, and integrity of decision making. The world of coding is being significantly transformed by AI as well. Quantum encryption is being applied to practical challenges and post-quantum cryptographic solutions are being deployed in applications available to all. Geopolitical volatility is dramatically changing how we see supply chains for chips, hardware systems, software, and manufacturing, while robotics are causing disruptive innovation in manufacturing, transportation, household IoT, and beyond. Virtual Realities (Vx) and gamespaces are increasing in adoption and influence, and changing how we work and teach. In response to these and other changes, the cybersecurity workforce is transforming and expanding beyond technical defense and forensics into all departments across companies, from accounting and law to policy and procurement.

This year 24 papers were accepted from across the US and internationally. The journal publishes all submitted papers of significant value to the Colloquium members and the field, after passing a peer review process and review by the Editorial Board.

The papers this year meet the emerging challenges of society’s dramatic cyber transformations with rigorous work from multiple disciplines, all converging on improving cybersecurity education. AI is a major theme, with authors researching its use in education as well as providing innovative content on AI. Quantum computing is represented with research based on operational capabilities. The socio-psychological aspects of cyberspace are analyzed by our authors as cybersecurity capabilities expands to address the psychology of cyber conflict roles and behavior on social media. Yet enhancement of core cybersecurity education disciplines are also seeing innovation, such as curricular strategies, gamification, and project-based learning. New research for teaching particular skills like Operations technologies, and in new contexts like Occupational Therapy.

Copyright of the content remains in the hands of the authors, with free distribution encouraged. The Colloquium retains the right to publish in the Journal and elsewhere. Usage and publication requests should be made directly to the authors.

The Editorial Board would like to thank all those who participated, in particular the journal’s Program Committee members who enabled the peer review process. This allows us to maintain the high standards of the journal and improve the Editorial Board’s review process. Thanks to The Colloquium’s President, Denise Kinsey, for organizing the conference again this year. And thank you to the Board of Directors and Officers of the Colloquium, who provided essential leadership and guidance under Chairman & Co-founder William “Vic” Maconachy.

The Editorial Board:

Erik Moore, Editor-in-Chief
Dan Likarish, Senior Editor
Denise Kinsey, Senior Editor
Alexander Kent, Associate Editor
Chizoba Ubah, Associate Editor
Andrew Belón, Production Editor

Articles

Mary Ann Hoppa
pp. 6
A Cyber Bridge Experiment

DOI: 10.53735/cisse.v12i1.192

PDF
Xinli Wang, Vijay Bhuse, Yuan Cheng
pp. 10
A Zero Trust Module for Cybersecurity Education

DOI: 10.53735/cisse.v12i1.193

PDF
Ebuka Okpala, Nishant Vishwamitra, Keyan Guo, Song Liao, Long Cheng, Hongxin Hu, Xiaohong Yuan, Jeannette Wade, Sajad Khorsandroo
pp. 8
AI-Cybersecurity Education Through Designing AI-based Cyberharassment Detection Lab

DOI: 10.53735/cisse.v12i1.194

PDF
Guang Yang
pp. 4
An Improved Phase Coding Audio Steganography Algorithm

DOI: 10.53735/cisse.v12i1.195

PDF
Joshua Ball, Maura Lyons, Kendra Evans
pp. 9
Bridging the Cybersecurity Skills Gap: Aligning Educational Programs with Industry Needs

DOI: 10.53735/cisse.v12i1.196

PDF
Yan Bai, Juan Li
pp. 7
Building a Cybersecurity and AI Integrated Learning Pathway for Criminal Justice Professionals

DOI: 10.53735/cisse.v12i1.197

PDF
Marc Dupuis, Robert Honomichl, Morgan Zantua, Jenny Ju
pp. 7
Cybersecurity High School Innovations: A Path for Educators to Teach Cybersecurity Courses in their Schools

DOI: 10.53735/cisse.v12i1.198

PDF
Sajjad Bhuiyan, Joon S. Park
pp. 7
Cybersecurity Threats and Mitigation Strategies in AI Applications

DOI: 10.53735/cisse.v12i1.199

PDF
Noah M. Kenney, Annie I. Antón
pp. 6
Educating the Next Generation of Ethical AI Practitioners

DOI: 10.53735/cisse.v12i1.200

PDF
Thomas Andrew Koch, Tamirat Abegaz, Hyungbae Park
pp. 9
Efficient Machine Learning for Malware Detection

DOI: 10.53735/cisse.v12i1.201

PDF
Vahid Heydari, Kofi Nyarko
pp. 8
Empowering the Next Generation: A Strategic Roadmap for AI in Cybersecurity Education

DOI: 10.53735/cisse.v12i1.202

PDF
Maha Alotaibi, Yulia Cherdantseva, Omer Rana, Catherine Teehan
pp. 8
Empowering Youth in The Digital Age with Cyber Security Education: Results of the Interviews with Secondary School Teachers in Wales

DOI: 10.53735/cisse.v12i1.203

PDF
Nishant Vishwamitra, Ebuka Okpala, Song Liao, Keyan Guo, Sandeep Shah, Hongxin Hu, Xiaohong Yuan, Long Cheng
pp. 9
Enhancing AI-Centered Social Cybersecurity Education through Learning Platform Design

DOI: 10.53735/cisse.v12i1.204

PDF
Herbert Mattord, Michael Whitman
pp. 6
Mentoring Cybersecurity Students in Online Degree Programs

DOI: 10.53735/cisse.v12i1.205

PDF
Brian Robert Callahan, Keenan Schilp, Quinn Colognato, Emily Goldman, Shoshana Sugerman, Aanya Mehta, Angela Imanuel, Kaitlin Kaii, Hannah Rose
pp. 7
Multidisciplinary Quantum Cybersecurity Research for the Undergraduate Laboratory

DOI: 10.53735/cisse.v12i1.206

PDF
Kalam Khadka
pp. 6
Persuasion and Phishing: Analysing the Interplay of Persuasion Tactics in Cyber Threats

DOI: 10.53735/cisse.v12i1.207

PDF
Heather T. Bednarz, Jane Blanken-Webb
pp. 6
Positioning Cybersecurity as a Pillar of Safety in Occupational Therapy

DOI: 10.53735/cisse.v12i1.208

PDF
Sandra Nite, Wesley Brashear, Trenton Gray, Dhruva Chakravorty
pp. 6
Project-Based Learning in K12 Cybersecurity Education

DOI: 10.53735/cisse.v12i1.209

PDF
Joe Reddington, Elizabeth A. Quaglia
pp. 6
Reframing Cyber Security for the Next Generation of Digital Activists

DOI: 10.53735/cisse.v12i1.210

PDF
Nate Mathews, Christopher Schwartz, Matthew Wright
pp. 10
Teaching Generative AI for Cybersecurity: A Project-Based Learning Approach

DOI: 10.53735/cisse.v12i1.211

PDF
Terry Downing-Harris, Siddharth Kaza, Blair Taylor, Yeong-Tae Song
pp. 6
Teaching Secure Supply Chain Risk: Experiment in an ‘Introduction to Cybersecurity’ Course

DOI: 10.53735/cisse.v12i1.212

PDF
Paige Zaleppa, Siddharth Kaza, Blair Taylor, Md Sajidul Islam Sajid
pp. 6
Using AI Assistants in the Creation of an Academic Program of Study (PoS) in CyberAI

DOI: 10.53735/cisse.v12i1.213

PDF
Krista Stacey, Jeffrey Landry
pp. 7
Virtual Gamification in a PBS-based SETA Program

DOI: 10.53735/cisse.v12i1.214

PDF
Sean McBride, Glenn Merrell
pp. 11
What Does An OT Security Professional Need To Know?

DOI: 10.53735/cisse.v12i1.215

PDF