Work-in-progress-design and evaluation of mixed reality programs for cybersecurity education

Chien Chung Shen, Yan Ming Chiou, Chrystalla Mouza, Teomara Rutherford

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

With the shortage of cybersecurity professionals, there is a critical need to train more young-generation cybersecurity professionals to fill the gap. In this work, we designed interactive activities that make abstract cybersecurity concepts more tangible by using exciting new mixed reality (MR) technology to teach cybersecurity skills and raise the potential interest in cybersecurity careers for middle school students. We plan to analyze the immersive experience, situational interest, and workload after the experiment to study the participants' learning performance and user experience.

Original languageEnglish (US)
Title of host publicationProceedings of 2021 7th International Conference of the Immersive Learning Research Network, iLRN 2021
EditorsDaphne Economou, Anasol Pena-Rios, Andreas Dengel, Heather Dodds, Markos Mentzelopoulos, Alexander Klippel, Kai Erenli, Mark J. W. Lee, Jonathon Richter
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781734899528
DOIs
StatePublished - May 17 2021
Externally publishedYes
Event7th International Conference of the Immersive Learning Research Network, iLRN 2021 - Virtual, Online
Duration: May 17 2021Jun 10 2021

Publication series

NameProceedings of 2021 7th International Conference of the Immersive Learning Research Network, iLRN 2021

Conference

Conference7th International Conference of the Immersive Learning Research Network, iLRN 2021
CityVirtual, Online
Period5/17/216/10/21

Keywords

  • cybersecurity education
  • mixed reality
  • STEM

ASJC Scopus subject areas

  • Arts and Humanities (miscellaneous)
  • Human-Computer Interaction
  • Media Technology
  • Education

Fingerprint

Dive into the research topics of 'Work-in-progress-design and evaluation of mixed reality programs for cybersecurity education'. Together they form a unique fingerprint.

Cite this