Cybersecurity Pedagogy and Practice Journal
4 |
A Mixed-Method Study Exploring Student Motivation for Participating in Cybersecurity CTF Competitions
Cheryl Beauchamp, Regent University Holly Matusovich, Virginia Tech |
27 |
Higher Education Model for Security Literacy using Bloom’s Revised Taxonomy
Garry White, Texas State University |
37 |
Comprehensive Cybersecurity Programs: Case-Study Analysis of a Four-Year Cybersecurity Program at a Secondary Education Institution in Arizona
Paul Wagner, University of Arizona Dalal Alharthi, University of Arizona |
64 |
Doing Postphenomenology in Cybersecurity Education: A Methodological Invitation
Ryan Straight, University of Arizona |
ISSN#: 2832-1006
Submissions to CPPJ are accepted via two different paths. The first path is via direct submissions at https://iscap.us/papers . The second submission route is via the ISCAP annual conference . All submissions (direct or via the annual conference) are subjected to a double-blind, peer review process, where reviewers do not know the names and affiliations of paper authors, and paper authors do not know the names and affiliations of reviewers. All submissions (articles, teaching tips, and teaching cases & notes) to the journal will be refereed by a rigorous evaluation process involving at least three blind reviews by qualified academic, industrial, or governmental computing professionals. Submissions will be judged not only on the suitability of the content but also on the readability and clarity of the prose. Currently, the acceptance rate for the journal is under 35%.