The Secrets of Cybersecurity Education Research, Part 2

Wherein We Find If Researchers are Building On the Shoulders of Giants

Jason M. Pittman

--

Photo by GuerrillaBuzz on Unsplash

Let’s recall the motivation for this work. Existing research found only 3 out of 10 computer science studies get more research after they’re published [1]. In simple terms, this implies new studies are not building on the foundations established in prior research. The consequences are immeasurable. Thus, my curiosity was piqued when I found no similar investigation in the subject area of cybersecurity education.

This led me to ask myself a question: hey, Self…to what extent are cybersecurity laboratory research papers extended after publication.

We know the research motivating this work found computer science had roughly a 30% extended rate.

Thus, to answer my own question, I adhered to the overall research methodology outlined in [1]. That is, I (a) searched for relevant literature to establish a population; (b) created a sample data set of articles; (c) classified articles into one of three categories; and (d) performed comparative data analysis against those categories. I introduced limited modifications where necessary to apply the method to the field of cybersecurity education.

Where I Got My Data

--

--

Jason M. Pittman
Jason M. Pittman

Written by Jason M. Pittman

I am a forward-leaning innovator committed to solving tomorrow’s grand challenges by developing cutting-edge research and technology today.