The Secrets of Cybersecurity Education Research, Part 2
Wherein We Find If Researchers are Building On the Shoulders of Giants
Let’s recall the motivation for this work. Existing research found only 3 out of 10 computer science studies get more research after they’re published [1]. In simple terms, this implies new studies are not building on the foundations established in prior research. The consequences are immeasurable. Thus, my curiosity was piqued when I found no similar investigation in the subject area of cybersecurity education.
This led me to ask myself a question: hey, Self…to what extent are cybersecurity laboratory research papers extended after publication.
We know the research motivating this work found computer science had roughly a 30% extended rate.
Thus, to answer my own question, I adhered to the overall research methodology outlined in [1]. That is, I (a) searched for relevant literature to establish a population; (b) created a sample data set of articles; (c) classified articles into one of three categories; and (d) performed comparative data analysis against those categories. I introduced limited modifications where necessary to apply the method to the field of cybersecurity education.