DOČKALOVÁ BURSKÁ, Karolína, Jakub Rudolf MLYNÁRIK and Radek OŠLEJŠEK. Using data clustering to reveal trainees’ behavior in cybersecurity education. Education and Information Technologies. Springer, 2024, vol. 2024, 27 pp. ISSN 1360-2357. Available from: https://dx.doi.org/10.1007/s10639-024-12480-x.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Using data clustering to reveal trainees’ behavior in cybersecurity education
Authors DOČKALOVÁ BURSKÁ, Karolína, Jakub Rudolf MLYNÁRIK and Radek OŠLEJŠEK.
Edition Education and Information Technologies, Springer, 2024, 1360-2357.
Other information
Original language English
Type of outcome Article in a journal
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher United States of America
Confidentiality degree is not subject to a state or trade secret
WWW Article
Impact factor Impact factor: 5.500 in 2022
Organization unit Faculty of Informatics
Doi http://dx.doi.org/10.1007/s10639-024-12480-x
UT WoS 001160428500002
Keywords in English visual analytics; clustering analysis; hands-on learning; visualization
Tags Reviewed
Changed by Changed by: doc. RNDr. Radek Ošlejšek, Ph.D., učo 3636. Changed: 28/2/2024 11:48.
Abstract
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the designers in performing such analytic and evaluation tasks is ad-hoc and insufficient. With unsupervised machine learning methods, we designed a tool for clustering the trainee actions that can exhibit their strategies or help pinpoint flaws in the training design. By using a \emph{k-means++} algorithm, we explore clusters of trainees that unveil their specific behavior within the training sessions. The final visualization tool consists of views with scatter plots and radar charts. The former provides a two-dimensional correlation of selected trainee actions and displays their clusters. In contrast, the radar chart displays distinct clusters of trainees based on their more specific strategies or approaches when solving tasks. Through iterative training redesign, the tool can help designers identify improper training parameters and improve the quality of the courses accordingly. To evaluate the tool, we performed a qualitative evaluation of its outcomes with cybersecurity experts. The results confirm the usability of the selected methods in discovering significant trainee behavior. Our insights and recommendations can be beneficial for the design of tools for educators, even beyond cyber security.
Links
CZ.02.1.01/0.0/0.0/16_019/0000822, interní kód MU
(CEP code: EF16_019/0000822)
Name: Centrum excelence pro kyberkriminalitu, kyberbezpečnost a ochranu kritických informačních infrastruktur (Acronym: C4e)
Investor: Ministry of Education, Youth and Sports of the CR, CyberSecurity, CyberCrime and Critical Information Infrastructures Center of Excellence, Priority axis 1: Strengthening capacities for high-quality research
Type Name Uploaded/Created by Uploaded/Created Rights
2024-using-data-clustering-reveal-trainees-behavior-cybersecurity-education-paper.pdf Licence Creative Commons  File version Ošlejšek, R. 13/2/2024

Properties

Address within IS
https://is.muni.cz/auth/publication/2373677/2024-using-data-clustering-reveal-trainees-behavior-cybersecurity-education-paper.pdf
Address for the users outside IS
https://is.muni.cz/publication/2373677/2024-using-data-clustering-reveal-trainees-behavior-cybersecurity-education-paper.pdf
Address within Manager
https://is.muni.cz/auth/publication/2373677/2024-using-data-clustering-reveal-trainees-behavior-cybersecurity-education-paper.pdf?info
Address within Manager for the users outside IS
https://is.muni.cz/publication/2373677/2024-using-data-clustering-reveal-trainees-behavior-cybersecurity-education-paper.pdf?info
Uploaded/Created
Tue 13/2/2024 17:50, doc. RNDr. Radek Ošlejšek, Ph.D.

Rights

Right to read
  • anyone on the Internet
Right to upload
 
Right to administer:
  • a concrete person doc. RNDr. Radek Ošlejšek, Ph.D., učo 3636
  • a concrete person RNDr. Karolina Dočkalová Burská, Ph.D., učo 396296
  • a concrete person Mgr. Jakub Rudolf Mlynárik, učo 445304
Attributes
 

2024-using-data-clustering-reveal-trainees-behavior-cybersecurity-education-paper.pdf

Application
Open the file
Download file.
Address within IS
https://is.muni.cz/auth/publication/2373677/2024-using-data-clustering-reveal-trainees-behavior-cybersecurity-education-paper.pdf
Address for the users outside IS
https://is.muni.cz/publication/2373677/2024-using-data-clustering-reveal-trainees-behavior-cybersecurity-education-paper.pdf
File type
PDF (application/pdf)
Size
1,8 MB
Hash md5
11dc5e4a4a49b1e7f4bcbb23e9dac164
Uploaded/Created
Tue 13/2/2024 17:50

2024-using-data-clustering-reveal-trainees-behavior-cybersecurity-education-paper_Archive.pdf

Application
Open the file
Download file.
Address within IS
https://is.muni.cz/auth/publication/2373677/2024-using-data-clustering-reveal-trainees-behavior-cybersecurity-education-paper_Archive.pdf
Address for the users outside IS
https://is.muni.cz/publication/2373677/2024-using-data-clustering-reveal-trainees-behavior-cybersecurity-education-paper_Archive.pdf
File type
PDF/A (application/x-pdf)
Size
14,6 MB
Hash md5
87c33e3c74b3f91f77b51c506389bcc2
Uploaded/Created
Tue 13/2/2024 18:04

2024-using-data-clustering-reveal-trainees-behavior-cybersecurity-education-paper.txt

Application
Open the file
Download file.
Address within IS
https://is.muni.cz/auth/publication/2373677/2024-using-data-clustering-reveal-trainees-behavior-cybersecurity-education-paper.txt
Address for the users outside IS
https://is.muni.cz/publication/2373677/2024-using-data-clustering-reveal-trainees-behavior-cybersecurity-education-paper.txt
File type
plain text (text/plain)
Size
79,4 KB
Hash md5
6ede39f13afada2ef36e30c25129353b
Uploaded/Created
Tue 13/2/2024 18:05
Print
Report a file uploaded without authorization. Displayed: 1/9/2024 01:48