International Journal of Cyber Threat Intelligence and Secure Networking

  1. Home
  2. Archives
  3. Vol. 2 No. 07 (2025): Volume 02 Issue 07
  4. Articles
International Journal of Cyber Threat Intelligence and Secure Networking

Article Details Page

THE IMPLICIT LANGUAGE OF CYBERSECURITY: EDUCATIONAL CHALLENGES AND IMPLICATIONS

Authors

  • Farah Al-Mansouri College of Information Technology, Khalifa University, UAE

DOI:

https://doi.org/10.55640/ijctisn-v02i07-01

Keywords:

Cybersecurity Education, Implicit Language, Digital Literacy, Educational Challenges

Abstract

Cybersecurity is increasingly becoming an essential component of modern digital literacy, yet its complex and often implicit language poses significant educational challenges. The specialized terminologies, metaphors, and conceptual frameworks used within the field can create barriers for learners, particularly those without prior technical backgrounds. This paper examines the implicit language embedded in cybersecurity discourse and its impact on teaching and learning. Through a critical analysis of cybersecurity curricula, instructional materials, and learner experiences, the study identifies key linguistic and cognitive obstacles. It also explores pedagogical strategies to demystify cybersecurity concepts and enhance accessibility. The findings underscore the importance of developing inclusive and context-aware educational approaches to effectively prepare diverse learners for the evolving cybersecurity landscape.

References

T. Murugavel, “The Problems of Non-English Medium Engineering Students and Possible Solutions,” The Indian Review of World Literature in English, vol. 7, no. 11, pp. 1–4, 2011.

P. J. Guo, “Non-Native English Speakers Learning Computer Programming: Barriers, Desires, and Design Opportunities,” in Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, CHI ’18, Association for Computing Machinery, New York, NY, USA, Apr. 2018, pp. 1–14.

S. Furnell and M. Bishop, “Addressing Cyber Security Skills: The Spectrum, Not the Silo,” Computer Fraud & Security, vol. 2020, no. 2, pp. 6–11, Feb. 2020.

A. P. Henry, “Mastering the Cyber Security Skills Crisis: Realigning Educational Outcomes to Industry Requirements,” UNSW, Canberra, ACCS Discussion Paper 4, 2017.

A. Martin and J. Collier, “Beyond Awareness: Reflections on Meeting the Interdisciplinary Cyber Skills Demand,” in Cyber Security Education, UK: Routledge, 2020, pp. 55–73.

J. Slay, “Training and Education for Cyber Security, Cyber Defence and Cyber Warfare,” United Service, vol. 67, no. 3, pp. 24–26, 31, Sep. 2016.

G. Austin, Cyber Security Education: Principles and Policies, UK: Routledge, Jul. 2020.

W. J. Caelli, “History and Philosophy of Cyber Security Education,” in Cyber Security Education, UK: Routledge, 2020, pp. 8–28.

R. Mason and C. Seton, “Leveling the Playing Field for International Students in IT Courses,” in Proceedings of Australasian Computing Education Conference (ACE ’21), ACM, New York, NY, USA, Feb. 2021, pp. 138–146.

T. Bretag, S. Horrocks, and J. Smith, “Developing Classroom Practices to Support NESB Students in Information Systems Courses: Some Preliminary Findings,” International Education Journal, vol. 3, no. 4, pp. 57–69, 2002.

R. Mason, G. Cooper, B. Simon, and B. Wilks, “Using Cognitive Load Theory to Select an Environment for Teaching Mobile Apps Development,” in ACE, 2015, pp. 47–56.

R. Mason, C. Seton, and G. Cooper, “Applying Cognitive Load Theory to the Redesign of a Conventional Database Systems Course,” Computer Science Education, vol. 26, no. 1, pp. 68–87, Jan. 2016.

R. Mason, “Designing Introductory Programming Courses: The Role of Cognitive Load,” Ph.D. dissertation, Southern Cross University, 2012.

R. Mason and G. Cooper, “Mindstorms Robots and the Application of Cognitive Load Theory in Introductory Programming,” Computer Science Education, vol. 23, no. 4, pp. 296–314, Dec. 2013.

T. W. Edgar and D. O. Manz, Research Methods for Cyber Security, Rockland, MA, USA: Elsevier Science & Technology Books, 2017.

R. Ramirez and N. Choucri, “Improving Interdisciplinary Communication with Standardized Cyber Security Terminology: A Literature Review,” IEEE Access, vol. 4, pp. 2216–2243, 2016.

J. R. Blair, A. O. Hall, and E. Sobiesk, “Educating Future Multidisciplinary Cybersecurity Teams,” Computer, vol. 52, no. 3, pp. 58–66, Mar. 2019.

J. R. S. Blair, A. O. Hall, and E. Sobiesk, “Holistic Cyber Education,” in Cyber Security Education, UK: Routledge, 2020, pp. 160–172.

D. Shoemaker, A. Kohnke, and K. Sigler, “What the Profession of Cybersecurity Needs to Know and Do,” The EDP Audit, Control, and Security Newsletter (EDPACS), vol. 59, no. 2, pp. 6–18, Feb. 2019.

K. Williamson, L. Given, and P. Scifleet, “Qualitative Data Analysis,” in Research Methods: Information, Systems, and Contexts, pp. 417–439, 2013.

P. Wang and H. D’Cruze, “Certifications in Cybersecurity Workforce Development: A Case Study,” International Journal of Hyperconnectivity and the Internet of Things, vol. 3, no. 2, pp. 38–57, Jul. 2019.

P. Wang and H. D’Cruze, “Cybersecurity Certification: Certified Information Systems Security Professional (CISSP),” in 16th International Conference on Information Technology–New Generations (ITNG 2019), Advances in Intelligent Systems and Computing, S. Latifi, Ed., Cham: Springer International Publishing, 2019, pp. 69–75.

Joint Task Force on Cybersecurity Education, Cybersecurity Curricula 2017, Association for Computing Machinery, New York, NY, USA, 2018.

Downloads

Published

2025-07-01

How to Cite

THE IMPLICIT LANGUAGE OF CYBERSECURITY: EDUCATIONAL CHALLENGES AND IMPLICATIONS. (2025). International Journal of Cyber Threat Intelligence and Secure Networking, 2(07), 1-6. https://doi.org/10.55640/ijctisn-v02i07-01

How to Cite

THE IMPLICIT LANGUAGE OF CYBERSECURITY: EDUCATIONAL CHALLENGES AND IMPLICATIONS. (2025). International Journal of Cyber Threat Intelligence and Secure Networking, 2(07), 1-6. https://doi.org/10.55640/ijctisn-v02i07-01

Similar Articles

1-10 of 13

You may also start an advanced similarity search for this article.