Vol. 13 No. 1 (2026): Journal of The Colloquium for Information Systems Security Education
Journal of The Colloquium for Information Systems Security Education

Cybersecurity Education in the Age of AI, Automation & Ambiguity

This volume is based on the 29th Colloquium held on-site at Seattle University in Washington State in November 2025. The event was co-hosted with The City University of Seattle, led by Morgan Zantua. The editors extend their sincere gratitude to both institutions, our authors, and the many individuals whose efforts made the event possible. We also thank our sponsors— Seattle University, The City University of Seattle, Codio, SET, and Silver Cloud Hotels—for their generous support of the event.

The 29th Colloquium was held jointly with the Conference on Cybersecurity, Education, Research, and Practice (CCERP). Papers from that conference are published separately and are available at: https://digitalcommons.kennesaw.edu/ccerp/2025/. We are grateful for their partnership and for the significant contributions their research makes to the broader cybersecurity education community.

As this journal is published in 2026, we observe the continued normalization of artificial intelligence (AI) systems as integral components of business operations, defense practices, and scientific systems, accompanied by a proportionate expansion in datacenter infrastructure and semiconductor demand. At the same time, the geopolitical landscape continues to reshape the cybersecurity threat environment, with defensive strategies across governments, industry, and critical infrastructure evolving rapidly.

The influence of social media, large language models, and increasingly sophisticated deepfake technologies continues to expand, affecting societal discourse, human psychology, and cybersecurity practices as educational institutions and organizations adapt their policies and training approaches. Although widespread quantum readiness remains distant for many organizations, threat analysis and mitigation strategies are already being developed for high-security environments. Meanwhile, immersive technologies such as virtual and augmented reality remain largely emerging for the general public, though niche applications are gaining traction and gamification continues to influence educational approaches. Education itself is undergoing significant transformation as institutions adapt to both the benefits and challenges associated with AI-enabled technologies.

This year, 30 papers were accepted from authors across the United States and around the world. The increased number of submissions reflects growing interest in The Colloquium and has further strengthened the quality of this year’s journal. We are grateful to all authors who submitted their work and encourage those whose papers were not accepted to consider submitting again in future years.

The papers presented in this volume provide valuable insights for cybersecurity educators seeking to remain current with emerging technologies and evolving challenges. Artificial intelligence is now a common component of educational practice and research methodology. In addition, disciplines such as psychology and philosophy are emerging as important elements within the broader cybersecurity landscape—particularly in areas such as social media safety for children, AI-driven changes in human behavior, the proliferation of AI-generated content competing with authentic information, and the psychological dynamics underlying cyber attack and defense.

The Editorial Board would like to thank all those who participated in The Colloquium, particularly the Program Committee members who contributed to the peer-review process. Their efforts allow us to maintain the high standards of the journal and continuously improve the editorial process. We also extend our appreciation to The Colloquium’s President, Denise Kinsey, and to the Board of Directors and Officers of CISSE for their leadership and guidance, under the chairmanship of co-founder William “Vic” Maconachy.

CISSE is granted a non-exclusive right to publish and disseminate the work. All articles are © their authors and licensed under CC BY 4.0. Usage and publication requests should be made directly to the authors.

The Editorial Board:

Erik Moore, Editor-in-Chief
Dan Likarish, Senior Editor
Denise Kinsey, Senior Editor
Alexander Kent, Associate Editor
Andrew Hurd, Associate Editor
Andrew Belón, Production Editor

Articles

Shoshana Sugerman, Sanya Joseph, Quinn Colognato, Mary Cotrupi, Aanya Mehta, Tanvi Mehta, Emily Goldman, Ishneet Kaur, Victoria Cai, Gabriel Bezerra, Adam Kaplan, Arielle Revis, Lala Liu, Samuel Leung, Elif Kulahlioglu, Rachel Schneider, Mikah Schueller, Quinn Sharp, James Porvaznik, Brian Robert Callahan
pp. 11
A Case Study for Combating Student Overuse of Generative Artificial Intelligence in Cybersecurity Educational Activities Using Augmented Reality Capture-the-Flag Development
PDF
Jane Blanken-Webb
pp. 5
A Deweyan Foundation for Cultivating Reflective Cyber-Attuned Habits in an Age of AI and Ambiguity
PDF
Venkat Laxmi Sateesh Nutulapati
pp. 7
A Systematic Review of Residual Risk in Cybersecurity Awareness Training
PDF
Advait Patel, Vaishnavi Gudur, Prashanthi Matam, Charit Upadhyay, Aparna Achanta, Swara Dave, Shalini Sudarsan
pp. 13
AI-Driven Cloud Security: AIOps for Threat Detection and Compliance
PDF
Hsiao-An Wang, Joshua Goldberg, Audrey Fruean, Zixuan Zou, Ruoyu Zhao, Sakib Miazi, Jens Mache, Ishan Abraham, Taylor Wolff, Jack Cook, Richard Weiss
pp. 9
An AI Agent Workflow for Generating Contextual Cybersecurity Hints
PDF
Eric McCloy, Samuel Nimako-Mensah, Albert Samigullin
pp. 25
Analysis of Cybersecurity Risks and Teenage Digital Behavior Patterns
PDF
Michael Whitman, Herbert Mattord, Kathleen Kotwica
pp. 7
Best Practices in Security Convergence: Tales from the Trenches
PDF
Amorita A. Christian, Myles Nelson, Tiffany Haney, Charles Nickerson
pp. 6
Building Nuclear-Specific Cybersecurity Expertise in Higher Education
PDF
Arunima Chaudhary, Gualtiero Colombo, Amir Javed, Junaid Haseeb, Vimal Kumar, Richard Larsen
pp. 8
CodeWars: Using LLMs for Vulnerability Analysis in Cybersecurity Education
PDF
Kushal Badal, Xiaohong Yuan, Huirong Fu, Darrin Hanna, Jason Gorski
pp. 13
Cybersecurity Education with Generative AI: Creating Interactive Labs from Microelectronic Fundamentals to IoT Security Exploitation
PDF
Joseph Lozada
pp. 8
Deepfake-Enabled Infiltration: The Threat of Synthetic Identities in Corporate Environments
PDF
Abel Ureste, Hyungbae Park, Tamirat Abegaz
pp. 7
Detecting and Mitigating AI Prompt Injection Attacks in Large Language Models (LLMs)
PDF
Christopher P. Collins, Yair Levy, Gregory Simco, Ling Wang
pp. 6
Development and Validation of a Healthcare Workers Phishing Risk Exposure (HWPRE) Taxonomy for Mobile Email
PDF
Ryan Straight, Josh Herron
pp. 7
Distributed Agency in AI-Enhanced Cybersecurity Education: A Posthuman Instructional Design Framework
PDF
Weihao Qu, Gurmeet Singh, Daniel Crawford, Bingjun Li, Jalen Smith
pp. 7
Enhancing User Resilience Against AI-Augmented Phishing: A Two-Stage Framework for Detection and Personalized Training
PDF
Verónica Elze, Taejin Kim, Brian Maeng
pp. 8
EQīLevel: Emotion-Aware Reinforcement Learning for Adaptive Academic Tutoring
PDF
Benard Birundu, Marc J. Dupuis
pp. 7
Exploring the Impact of Previous Experience, and Threats Awareness on Influencing Regular Information Backup Among USA Population
PDF
Lauren Matthews, Idongesit Mkpong-Ruffin, Deidre Evans, Chutima Boonthum-Denecke
pp. 11
From Creation to Detection: How Dataset Composition and Simple Augmentation Influence Deepfake Training
PDF
Sav Wheeler, Marc J. Dupuis
pp. 9
From Social Sharing to Security Lessons: Behaviors, Disclosure, and Cyber Threats
PDF
Vahid Heydari, Kofi Nyarko
pp. 11
Integrating Artificial Intelligence into Undergraduate Cybersecurity Education: A Course Design for Threat Detection, Explainability, and Ethical Resilience
PDF
Myles Nelson, Amorita A. Christian, Tiffany Haney, Charles Nickerson
pp. 7
Mapping the Gap: Analysis of Nuclear Cybersecurity Education in U.S. Universities
PDF
Timothy Crisp, John Hale
pp. 7
Play NICE: Incorporating Cyber Phraseology Into K-12 Education
PDF
Steven Furnell, Lucija Šmid, James Todd, Xavier Carpent, Simon Castle-Green
pp. 9
Roll With It: Awareness Raising with Cyber Defence Dice
PDF
Mujtaba Nazari, Eric Chan-Tin, Loretta Stalans, Mohammed Abuhamad
pp. 8
SecureAI: Toward Experiential Security and Privacy Training for AI Practitioners
PDF
Andrew J. Hurd, Gloria J. Kramer-Gordon, Pamela Doran
pp. 6
Securing Meaning: Language Equity in Cybersecurity Translation
PDF
Hareign Casaclang, Bianca Ionescu, Yoohwan Kim, Ju-Yeon Jo
pp. 21
Self-Hosted Workflow Automation for AI-Based Cybersecurity Operation
PDF
Aniya Hopson, Chutima Boonthum-Denecke, Idongesit Mkpong-Ruffin
pp. 7
Study of AI Object Detection: Patterns on Animals with YOLO and Adversarial Patches
PDF
Ella Luedeke, Meera Sridhar, Harini Ramaprasad
pp. 9
Teaching Critical Infrastructure Security Through Interactive Experiences: Modeling Cyberattacks in Gamified Learning
PDF
Sara Sutton, Victor Bungei, Xinli Wang, Johnfia Frank, Esther Djan
pp. 13
Teaching Endpoint Protection through Wazuh: A Project-Based Approach to Cybersecurity Education
PDF
Venkata Sai Kaushik Reddy Mitta, Marc J. Dupuis
pp. 8
Unequal Risks: Ethnicity, Region, and Cybersecurity Outcomes in the United States
PDF