<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>How can CyBOK support filling the cybersecurity skills gap? An exploration of CyBOK as an OER</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Muhammad Abbas Khan Abbasi</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Joakim kävrestad</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Jönkoping Univeristy, School of Engineering.</institution>
          <addr-line>Jönkoping</addr-line>
          ,
          <country country="SE">Sweden</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>School of Informatics, University of Skövde</institution>
          ,
          <addr-line>Skövde</addr-line>
          ,
          <country country="SE">Sweden</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <abstract>
        <p>One of the main challenges in the cybersecurity industry is the skills gap. This is manifested both as a lack of qualified staff and as a lack of general cybersecurity skills among the working population at large. To better the situa-tion, high-quality learning resources that capture the inherent sociotechnical nature of cybersecurity are needed. The focus of this research is on Cybersecu-rity body of knowledge (CyBOK) which is a comprehensive and free to access cybersecurity resource that comprise 21 topical texts called knowledge areas, and additional resources such as labs, lectures, and webinars. This research studies two cases where CyBOK has been used as a learning material in higher education. The goal of the study is to both evaluate the student's perception of CyBOK and the extent to which the comprehensiveness of CyBOK facilitates student engagement in topics not directly included in the assigned course material. The results suggests that CyBOK is indeed useful as a learning material for higher education and could support student engagement with cybersecurity, but the way in which it is explained and integrated into curricula is crucial.</p>
      </abstract>
      <kwd-group>
        <kwd>OER</kwd>
        <kwd>Cybersecurity Education</kwd>
        <kwd>CyBOK</kwd>
        <kwd>OER in Higher Education</kwd>
        <kwd>cybersecurity skills gap</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>
        The demand for human expertise in cybersecurity has become increasingly driven
by necessity, as organizations face a rapidly evolving threat landscape [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1–3</xref>
        ]. With
the increase of sophisticated cyberattacks, businesses, governments, and individuals
are prioritizing cybersecurity awareness, risk mitigation, and proactive defense
strategies more than ever [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. As a result, knowledge of cybersecurity is no
longer optional but a critical requirement, shaping the need for continuous learning,
specialized training, and real-time threat intelligence to stay ahead of potential
risks. Moreover, various studies highlighted the issue of cybersecurity knowledge
and skill gap as a key factor behind most of the cyber-attacks [
        <xref ref-type="bibr" rid="ref4 ref5 ref6 ref7">4–7</xref>
        ].
According to the ENISA Threat Landscape Report 2024, Phishing and malware
injections are the most prevalent attacks [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], often exploiting a lack of awareness
about cyber threats and safe digital practices [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Similarly, many users
unknowingly fall victim to deceptive emails [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], malicious links, or compromised software,
leading to privacy breaches and the exposure of sensitive information [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. These
exposures also lead to economic and reputational damage for organization [
        <xref ref-type="bibr" rid="ref2 ref5">2, 5</xref>
        ].
Without proper education and vigilance, these threats continue to pose significant
risks, emphasizing the impor-tance of cybersecurity awareness, proactive defense
strategies, and safe online behav-ior to mitigate potential harm [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        However, the wide range of skills and the fast-changing nature of the cybersecurity
field make it difficult to keep up with major developments. While looking at the EU
perspective, research identified that the gap in cybersecurity knowledge and skills is
partly due to the lack of proper education at the high school level. Furthermore, some
computer science teachers have limited knowledge in this area due to the breadth
of the domain. These issues have contributed to a shortage of qualified
professionals and workers in the EU's cybersecurity workforce [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        To bridge this knowledge gap, access to cybersecurity knowledge resources is of
utmost need, both to support the skills development of cybersecurity professionals and
workers in other disciplines. Here, Open Educational Resources (OER) can play a
vital role in improving education in cybersecurity if the content is developed with
rigorous quality control processes and implemented through well-proven teaching
methods [
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ].
      </p>
      <p>
        One significant initiative to improve cybersecurity education through OER was
undertaken at the University of Bristol through the CyBOK (Cybersecurity Body of
Knowledge) project. The CyBOK project is funded by the National Cyber Security
Programme and supported by the UK Cyber Security Council. The project
developed a structured guide to existing cybersecurity knowledge, mapping
established literature rather than replicating it. Since its 2019 release, it has expanded to
21 Knowledge Areas (KAs) through community input, with ongoing updates to
enhance its global relevance. The general approach to the development of those KAs
has been to let experts in the respective areas collaborate with the intent of creating
the best possible material in each area. CyBOK aims to be an internationally
recognized resource for academia, industry, and government [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>Despite its structured approach, CyBOK’s integration into formal education
remains an area that requires further study. To be formally accepted and recognized,
it is necessary to assess its effectiveness in real-world learning environments. One
way to achieve this
is through academic course integration, where CyBOK modules are incorporated
into university curricula, and students’ learning experiences are evaluated.
Collecting student feedback on engagement, usability, and learning outcomes is essential
in deter-mining whether CyBOK-based content effectively supports cybersecurity
education and fills the knowledge gap in the field. As an OER covering many KAs
within cybersecurity, is it also possible that the use of some KAs in one course may
spark students' interest in pursuing knowledge in other KAs. This possible
capability of CyBOK makes it different from traditional textbooks, which are typically
contracted to one or a few topics. Understanding the extent of this effect in practice
requires further research.</p>
      <p>To that end, this study investigates the broader application of OER in cybersecurity
education by analyzing CyBOK’s role in different learning environments, ranging
from individual course components to fully integrated curricula. The research
evaluates CyBOK’s effectiveness in student learning, engagement, and knowledge
acquisition, providing insights that can inform best practices for integrating OER into
cybersecurity education. This research also assesses the extent to which students
who are exposed to selected KAs seek to explore other KAs spontaneously.</p>
      <sec id="sec-1-1">
        <title>The research provides:</title>
        <p> Empirical evidence on the effectiveness of CyBOK-based learning
 Insights into students’ preferences and engagement with OER materials
 Comparative findings across different learning environments
 Recommendations for enhancing CyBOK’s usability in academic settings
By analyzing student feedback and engagement, this study contributes to the
ongoing development of OER in cybersecurity education and informs best practices for
inte-grating CyBOK into university curricula.</p>
        <p>The following section outlines the methodology employed in this study, detailing the
research design, data collection process, and analytical approach. This is followed by
a presentation of results, where key findings from student feedback on CyBOK-based
learning are examined, and then a discussion section. The paper concludes with a
discussion of insights, emphasizing the significance of the findings, and provides
recommendations for future research, including ways to enhance the integration and
impact of CyBOK in cybersecurity education.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2 Methodology</title>
      <p>This study employs a qualitative research approach to explore the effectiveness and
perception of CyBOK-based materials in cybersecurity education. The research is
designed as a multi-case study, analyzing two different educational settings where
CyBOK content has been integrated. By gathering qualitative insights through
student surveys, this study investigated how students engage with, perceive, and
utilize Open Educational Resources (OER) in cybersecurity courses.</p>
      <p>The study examined CyBOK’s role in the following two distinct academic contexts:
1. A single CyBOK-based component integrated into a larger cybersecurity
course.</p>
      <p>2. A full campus-based course developed entirely around CyBOK.</p>
      <p>This approach allows for a comparative assessment of CyBOK’s impact in different
learning environments, ranging from supplementary learning materials to fully
integrated curricula.</p>
      <sec id="sec-2-1">
        <title>2.1 Data Collection and Analysis</title>
        <p>The data collection in this study was done using a qualitative survey. The survey was
designed to capture student experiences and perceptions of CyBOK as an Open
Educational Resource (OER) in cybersecurity education. The survey aimed to
investigate the following key aspects considering the study goals:
 Students’ understanding and perception of CyBOK
 Comparison of CyBOK with traditional learning resources
 The extent to which students engaged with additional CyBOK materials
beyond mandatory content
 Perceived strengths and limitations of CyBOK-based learning
 Suggestions for improving CyBOK as an educational resource
To address these aspects, a structured questionnaire was developed and distributed
to students who participated in CyBOK-integrated courses. The questionnaire
comprised six open-ended questions, allowing students to express their thoughts,
preferences, and critiques in detail. The following six questions were included in the
survey:
1. How would you describe CyBOK?
2. What is your overall perception of CyBOK?
3. How do you think CyBOK compares to hard-copy books?
4. Have you used other CyBOK material beyond what was required in the
course?
5. How can CyBOK be improved?
6. What are the best aspects of CyBOK?
The qualitative nature of these questions allowed students to provide in-depth
responses, offering insights into how effectively CyBOK supports learning, engages
students, and enhances cybersecurity education. Additionally, the open-ended
format encouraged students to reflect on their independent learning habits,
particularly whether they sought additional resources beyond those required in the
course curriculum. Responses were collected anonymously to encourage honest and
unbiased feedback.</p>
        <p>The survey was distributed to students enrolled in CyBOK-integrated courses in two
different universities and learning formats. Data collection was conducted across
multiple semesters to ensure comprehensive and diverse feedback. Moreover, the
surveys were distributed electronically, ensuring accessibility for both
campusbased and remote students. The study followed ethical research guidelines,
ensuring voluntary participation, anonymity, and confidentiality of all student responses.
Before partici-pation, students were informed about the purpose of the research,
data usage, and their rights to withdraw at any stage. Data was collected from two
different courses (Case 1 and Case 2) and from two cohorts of each course. The
cases are introduced below:
Case 1: Students from the Digital Forensics for Incident Response course at the
University of ANON used CyBOK for one course module, which comprises about 2 ECTS
credits. The mode of this course is hybrid, which allows students to attend classes
virtually or on campus.</p>
        <p>Case 2: Students from the cybersecurity course at ANON school of engineering used
CyBOK as the primary resource for a complete course comprising 7.5 ECTS. The
course is a campus course.</p>
        <p>Thematic analysis, a method used to identify patterns, themes, and key insights from
qualitative data was used to analyze the survey responses. The responses were
systematically coded and categorized to highlight the following study goals:</p>
        <sec id="sec-2-1-1">
          <title>1. Common perceptions of CyBOK as an OER 2. Recurring themes related to its strengths and limitations 3. Variations in engagement levels across different learning settings 4. Recommendations for improving CyBOK-based learning materials</title>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3 Results &amp; Analysis</title>
      <p>The survey data was collected between January 2024 to March 2025, where the
collection was distributed as per the applied context mentioned above in section 2.1 as
case 1 and case 2.</p>
      <p>For case 1, the first survey yielded 5 responses, whereas the second survey received
13 responses. Likewise, case 2 received 10 responses. To analyze the responses and
finding common themes, thematic coding was applied on all received responses.
The thematic analysis comes up with five main themes in students’ feedback on
CyBOK-based learning. Table 1 below gives a summary of themes, categories, and
example codes. The analysis found the following prominent themes
1. Interactive and Engaging Experience,
2. Initial Unfamiliarity and Misconceptions,
3. Need for Updates and Practical Context,
4. Comprehensive but Abstract Content, and
5. Ease of Use and Accessibility.</p>
      <p>The following section presents each theme with illustrative quotes from the survey
responses, highlighting what each theme suggests about CyBOK’s perceived
strengths and weaknesses.</p>
      <sec id="sec-3-1">
        <title>3.1 Interactive and Engaging Experience</title>
        <p>Many students found the learning experience with CyBOK to be engaging, especially
when it was integrated into interactive class activities. Participants from the fully
CyBOK-integrated course in Case 2, , particularly highlighted the “fun and
engaging” nature of the learning, noting that it was “not too technical” for them. One
student remarked that interactive lab sessions and discussions using CyBOK were
“always more interesting than just reading from a book,” underscoring the value of
hands-on and discussion-based learning. Another student appreciated the practical
orientation, calling the CyBOK session “truly practical,” and emphasised that
“practical labs… are always better than books” for learning complex topics. These
responses indicate that when CyBOK content was delivered via active learning
methods (labs, exercises, discussions), it succeeded in capturing student interest and
engagement.</p>
        <p>However, the data also suggests limits to this engagement. Outside the structured
class exercises, few learners explored CyBOK further on their own. Most students
did not use CyBOK beyond the required coursework. A Case 1 participant said, “Did
not use beyond requirements,” when asked if they consulted CyBOK materials
outside the assignment. Another participant wrote that“No – I have not had time,”
while one student even stated to relying on “Google” rather than CyBOK for
additional infor-mation.</p>
        <p>This indicates that voluntary engagement with CyBOK was low; students generally
did not continue to interact with the resource unless it was built into an exercise or
assessment. The Interactive and Engaging theme thus has two sides: in-class,
students found CyBOK-based learning enjoyable and motivating, but this engagement
did not readily translate into motivated use of CyBOK after class. It suggests that
while an interactive delivery can create interest, CyBOK on its own has not yet
been perceived as the kind of internal motivation that makes students look into it
deeper, without prompting.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2 Initial Unfamiliarity and Misconceptions</title>
        <p>A prominent theme, especially in the partially integrated Case 1, was a lack of
familiarity with CyBOK and resulting misconceptions about its nature. Many students had
never used CyBOK before. Noble quotes are
Case 1 2023 student stated,</p>
        <p>“Not familiar with CyBOK before. Heard it for the first time,”</p>
        <sec id="sec-3-2-1">
          <title>Similarly, another Case1 2024 participant stated</title>
          <p>“Not sure I understood what it is really, yet,”
This reflects a general unfamiliarity among learners at the start. Even by the end of
the course, some were still unsure. This uncertainty sometimes led to confusion
about what CyBOK actually encompassed.</p>
          <p>In a few cases, students misunderstood CyBOK for something related just to their
course. For example, one student described CyBOK as “a malware analysis using
Volatility,” confusing CyBOK with a specific forensic tool used in the class. Another
response described CyBOK as “installation guide for Volatility and presentation of
basic concepts of the tool,” again indicating a misconception that CyBOK was a
software manual or a single-topic guide. These misunderstandings show that without a
proper introduction, students struggled to grasp CyBOK’s purpose and scope. Only a
few demonstrated a clear understanding. For instance, one respondent correctly
identified CyBOK as
“a project that aims to provide knowledge and guidelines from experts in cyber
security…a resource for individuals seeking to build a career in cybersecurity, as well as
for educators and organizations involved in cybersecurity training and research.”
Such instances were rare; far more common were assumptions and misconceptions.
The Unfamiliarity and Misconceptions theme reveals CyBOK’s awareness gap: many
students started (and some even ended) the course without a firm idea of what
CyBOK is, underscoring the need for better introductory orientation when
integrating this OER.</p>
        </sec>
      </sec>
      <sec id="sec-3-3">
        <title>3.3 Need for Updates and Practical Context</title>
        <p>In both case studies, students pointed out several limitations of CyBOK’s content and
format, often accompanied by suggestions for improvement. A frequent sentiment
was that while CyBOK is valuable, it needs to be kept up-to-date and made more
practically relevant. For example, one Case 1 student noted that “it could be updated
to work with Volatility 3 and also Linux platforms,” implying that some CyBOK
materials (or related exercises) were outdated and did not reflect current tools or
operating systems. While others reflected the importance of continuous updates,
describing CyBOK as “ever-evolving” and urging that “it should be updated
continuously.” The students desire for up-to-date content aligns with the fast-changing
nature of cybersecurity knowledge, and the expectation that the resource is needed
to keep pace with emerging tools, threats, and technologies.</p>
        <p>Beyond the currency of content, practical application was a major sub-theme.
Numerous participants from both universities wanted more real-world examples,
hands-on exercises, and applied context to balance CyBOK’s theory. One student
stated, “Include more practical exercises,” and this recommendation was repeated in
various forms. Such as Case 1 2024 student added a comment that“We should have
more practical labs like this,” which suggests that the practical element was valued
but could be expanded. A Case 2 student similarly reflected that “CyBOK seems to be
lacking in real-life scenarios” and that “many terms…are not used in the industry,”
This emphasizes for content that connects to practical, and industry-relevant
contexts.</p>
        <p>When comparing CyBOK to a textbook, another student in Case 1 argued that a
textbook “goes in more detail” and that “just reading books will not give practical
knowledge to us.” This highlights a perception that CyBOK’s coverage, while broad,
might be too high-level or abstract unless accompanied by concrete use-cases or
technical depth, which also ties to the next theme (Comprehensive but Abstract
Content).</p>
        <p>Students also pointed out specific improvement ideas to enhance usability and
guidance, indicating where the learning experience fell short. For example, several
Case 2 respondents noted difficulties in knowing what to study in CyBOK. One said
“Det var otydligt vad vi skulle läsa i boken – Tydligare läsanvisningar hade
uppskattats,” which translates to “It was unclear what we were supposed to read in the
book”
Therefore, clearer reading instructions would have been appreciated for the course.
This lack of guidance on how to navigate CyBOK made the resource less
approachable. Likewise, a Case 1 student requested more upfront clarity: “Clarify what it is.”
Others suggested incorporating an interactive guide or even “AI assistance…for user
interaction” to help query CyBOK content. A few students encountered confusion
due to the platform itself – one noted it “took me an hour before I realized I was
reading the old version” of a CyBOK chapter, and recommended the removal or clearer
labelling of outdated versions. These comments highlight that improvements in
user guidance and platform design (such as better navigation, instructions, and
version control) are needed to optimise CyBOK’s usability in an educational setting.
In summary, the need for updates and a practical context theme covers all these
perceived weaknesses. Students appreciate CyBOK’s value but want it to do more
by staying current with the field, offering more hands-on examples and labs, and
providing clearer guidance to learners. This theme points to CyBOK’s perceived
weaknesses. Without adaptation or growth, it can feel static, abstract, or confusing,
and this reflects students’ wishes and expectations to make improvements in
CyBOK material from both the content creators and educators.</p>
      </sec>
      <sec id="sec-3-4">
        <title>3.4 Comprehensive but Abstract Content</title>
        <p>The analysis found that students generally recognised CyBOK as a comprehensive
repository of cybersecurity knowledge. However, some viewed that strength as a
twofold when it came to approachability. On the positive side, many comments
praised CyBOK’s scope and authority. Students described CyBOK as
“comprehensive” and “comprehensive in its coverage of network security, software security, human
factors, hardware security, etc.” One Case 1 2024 respondent found it more
comprehensive and said,
“an essential, well-structured resource that standardizes and organizes cybersecurity
knowledge, supporting lifelong learning, professional development, and global
collaboration.”
Others noted that CyBOK “gathered a lot of information in one place,” essentially
serving as a one-stop reference for various cybersecurity domains.</p>
        <p>This indicates a perceived strength in content scope. The students value that CyBOK
organizes diverse topics, such as from laws and human aspects to technical
fundamen-tals under one umbrella, which helps by saving them from searching
through different sources. Even students who were otherwise not interested
acknowledged that CyBOK is “a good initiative and has a lot of information about
cyber security gathered at one place – like seminars, laws, use cases, and more.”
In essence, CyBOK’s in-depth nature and community-vetted content were seen as
major asset where participants regarded it as a “solid body of knowledge” and a
“valuable resource for anyone involved in the field of cyber security.”
At the same time, students’ feedback revealed that this very breadth and formality
can render CyBOK challenging or “abstract” for learning. Several respondents felt
that CyBOK’s content stays at a theoretical level, making it hard to digest or apply.
For instance, a Case 2 student noted that without additional support, “the book
could’ve been more useful – [it] seems to be lacking in real life scenarios, [with] many
terms that are not used in the industry.” This comment points to a gap between
CyBOK’s academic tone and the hands-on language practitioners use. Another
student expressed a similar thought, by saying CyBOK “feels…abstract,” and one Case
1 participant frankly stated that “a book is better since it goes in more detail and the
purpose is to learn” – implying that CyBOK’s summaries did not provide the depth
or pedagogical structure that a dedicated textbook might. Indeed, a few students
ultimately found CyBOK “quite useless” for learning compared to other resources,
commenting that “there are more detailed manuals out there, [and] also quite good
YouTube videos.” These harsher reviews underscore the risk that, without sufficient
context or supplementary explanation, students may perceive CyBOK as too
highlevel, too dense, or not directly relevant to skill-building.</p>
        <p>This theme of Comprehensive but Abstract Content reveals a nuanced insight,
students respect CyBOK’s authoritative scope and no one disputed its accuracy or
completeness, but pedagogically, they struggled with it as a standalone learning
material. The comprehensive coverage can overwhelm, and the academic prose can
distance from practical understanding. It highlights CyBOK’s strength as a
reference and its weakness as a textbook replacement, as students see the forest of
knowledge, but some feel lost among the trees without guided pathways or
concrete examples to ground the concepts.</p>
      </sec>
      <sec id="sec-3-5">
        <title>3.5 Ease of Use and Accessibility</title>
        <p>The final theme captures overwhelmingly positive feedback regarding CyBOK’s
usability and accessibility as an Open Educational Resource (OER). Students from both
institutions appreciated that CyBOK was freely available and easy to access online,
especially in contrast to traditional textbooks. Several noted the convenience of
having a digital resource: “handy and easy to carry,” as one Case 1 student put it,
comparing CyBOK’s downloadable PDF chapters favourably against lugging
physical books. Another student, concisely summing up CyBOK’s advantages over static
hard-copy texts stated that CyBOK is</p>
        <p>“Freely accessible, continuously updated, and easily searchable online.”
A student from Case 2 praised the openness and free access in terms of cost. The
student commented, “Better to have it online because students are poor and all other
books we had to buy – we got a PDF copy instead,”. This sentiment was also made by
others who explicitly mentioned the benefit of no cost. The OER nature of CyBOK
thus met a key student need, which is affordable access to learning materials.
In terms of format and readability, many participants found CyBOK user-friendly.
Students from Case 2 in particular, who engaged deeply with CyBOK chapters,
commented on the clear structure and presentation of the material. The student
said,
“It has a good format… easy to read and has good illustrations,” noted one, while
another agreed that “the documents were easy to read and follow.” Even students at
Case 1 university who were less engaged overall still acknowledged that CyBOK was
“easy to use and understand.” The availability of search functionality in digital PDFs
or via the website and the ability to quickly find specific topics were implicit plus
points that came up in comments about information being “easy to find.”
In short, no student reported any technical or interface difficulties in accessing
CyBOK on the contrary, therefore, accessibility and clarity emerged as clear
strengths. One participant explicitly contrasted CyBOK’s format with printed
books: “The digital version is, in my opinion, superior. It reduces cost and weight to
carry around, and it’s easier to use software to make annotations and notes.”
This indicates that, for most students, CyBOK’s digital format aligned well with
their study preferences and needs.</p>
        <p>It is worth noting that a small sample of people still expressed a preference for
traditional textbooks. One responder admitted that“I personally prefer hard-copy
books,” highlighting that learning style preferences vary. Such views, however,
were in the minority. Most students valued CyBOK’s modern, open format and saw
it as “easily accessible…for all of us,” “available for free, accessible by anyone without
any restrictions.” Thus, the Ease of Use and Accessibility theme underscores
CyBOK’s key strength as an OER. Since it removes barriers to access (cost and
availability), and its format is generally student-friendly. This foundation of
accessibility is important capital, and students are grateful for a free, high-quality
resource. However, as the other themes showed, accessibility alone doesn’t guarantee
deep engagement or learning. In combination with the previous themes, it becomes
clear that while CyBOK’s form is excellent, its full educational impact depends on
how the content is integrated and brought to life in the learning process.
The table 1 below summarises the key themes identified, with their categories and
example student phrases, which are described above in detail in the respective
sections.
Outdated content/issues
Lack of practical examples
Guidance, and usability
improvements
Comprehensive but</p>
        <p>Extensive authoritative
cover</p>
        <p>Example Codes (Student
Response Keywords)
“fun and engaging”;
“interactive discussions”
“more interesting than
just reading”
“did not use beyond
requirements”
“never heard of CyBOK
before”
“not sure what it is”;
“feels like a lab guide”
“update for Volatility
3/Linux”
“lacking real life
scenarios”;
“include more practical
labs”
“unclear what to read –
need instructions”
“lot of information in one
Ease of Use and
Accessibility
age
Theoretical/abstract nature
Free and open access
Convenient and user-friendly
format
place”;
“comprehensive”
“too abstract/theoretical”;
“not enough depth”
“freely accessible online”;
“students are poor – PDF
instead”
“easy to read and
understand”;
“searchable, handy”</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4 Discussion</title>
      <p>The results indicate that students appreciated CyBOK as a high-quality, accessible
cybersecurity knowledge base, but the effectiveness of its use in teaching varied
significantly depending on how it was integrated into the course. In the fully
integrated course at university in Case 2, students reported higher engagement and
noted Cy-BOK’s relevance and clarity, whereas in the partially integrated course at
university in Case, many students remained unfamiliar with CyBOK or unsure of
its purpose. Across both contexts, students highlighted CyBOK’s strengths, such as
its comprehensive coverage and open accessibility, while also pinpointing
weaknesses, such as a lack of practical application and the need for better guidance in
using the resource. These findings align with the study’s goals of assessing student
engagement, usability, and perception of CyBOK-based materials in different course
formats. Below, this study critically examines the implications of these findings,
compares the two case contexts, and situates the discussion in the broader literature
on open educational resources (OER) and cybersecurity education.</p>
      <sec id="sec-4-1">
        <title>4.1 Implications for Engagement and Integration.</title>
        <p>
          A clear pattern is that effective integration of CyBOK into the curriculum is
important for student engagement. In the Case 2, CyBOK was used as a core learning
resource where an entire course was built around it, and students in that context
were considerably more positive about its value. They described CyBOK content as
“relevant to our course” and praised its readability and format. This suggests that
when CyBOK is closely aligned with course outcomes and when instructors
actively incorporate it into lectures, discussions, or assessments, then students develop
a stronger connection to the material. In contrast, in Case 1, where CyBOK was
used only partially, e.g., for a single lab assignment or as an optional reading,
students often did not develop the same level of familiarity or appreciation. Many Case
1 students admitted they “have not tried any [additional] resources from CyBOK”
and, in some cases, did not fully understand why they were using it. This difference
resonates with findings in OER research that students’ “feelings of connectivity
to the course” significantly influence their perception of the resource [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ].
In our study, the fully-integrated course provided that connectivity, making CyBOK
an integral part of the learning process, whereas the partial integration did not,
leaving some students feeling CyBOK was irrelevant.
        </p>
        <p>
          These observations underline a practical recommendation that instructors should
embed OER resources like CyBOK deeply and explicitly into the course design if
they expect students to engage with them. Simply assigning a chapter or two
without context risks CyBOK being seen as an afterthought. By contrast, designing
coursework, labs, or discussions around CyBOK content and clarifying how it maps
to learning objectives and assessments can motivate students to buy into its
inclusion. Our results also highlight the importance of instructor guidance. Students in
both cases called for clearer instructions on how to use CyBOK, e.g., reading guides,
specified sections to focus on, or objectives for what to gain from the readings.
This aligns with best practices for OER adoption, which prior research has noted that
faculty involvement and clear communication are critical for successful OER [
          <xref ref-type="bibr" rid="ref11 ref12 ref15 ref16">11, 12,
15, 16</xref>
          ]. In our context, providing a brief orientation to CyBOK, explaining its
purpose, and giving structured reading assignments could have mitigated much of the
confusion observed in the Case 1. In fact, one concrete outcome of this study has
been to inform instructors at both institutions of the need to introduce CyBOK
more effectively for example, by spending time in the first class demonstrating the
CyBOK website, explaining how chapters are organised, and perhaps distributing a
“CyBOK roadmap” showing which knowledge areas correspond to each course
module considering course goals.
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2 Addressing the Theory–Practice Gap</title>
        <p>
          Another prominent implication of our findings is the need to bridge the gap between
CyBOK’s comprehensive theoretical content and students’ desire for practical
application. This is a familiar challenge in cybersecurity education where students and
employers expect hands-on skills and real-world context, not just theoretical
knowledge. CyBOK, by design, focuses on codifying established knowledge rather than
providing tutorials or labs, and we see very few examples where they have practical
guides. Our study found that students across both universities appreciated CyBOK’s
authoritative breadth, and no student disputed its accuracy or scope, however,
many felt it was “too abstract” or “lacking real life scenarios.” This feedback
suggests that CyBOK by itself may not satisfy learners who intend for experiential
learning, which is a well-known phenomenon in STEM education where theory
needs to be complemented by practice. The literature strongly supports
incorporating active learning for cybersecurity. Studies have shown that hands-on exercises
and labs significantly enhance skill acquisition and student engagement [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. Thus,
an important recommen-dation is to supplement CyBOK with practical learning
activities. Instructors might develop lab assignments, case studies, or problem-based
learning tasks that correspond to CyBOK chapters, thereby contextualising the
theoretical content.
        </p>
        <p>Encouragingly, there are initiatives already moving in this direction. For example,
Attwood and Williams (2023) mapped UK cybersecurity job requirements to CyBOK
to identify skill gaps which implicitly recognising that CyBOK’s content needs to be
translated into skills. Likewise, the CyBOK project itself has funded the creation of
educational resources, e.g. case study libraries and course modules, to aid
instructors in applying CyBOK in teaching. Our findings point out the rationale for these
efforts, where students clearly request “practical labs”, “real-world examples”, and
more detailed explanations that connect abstract concepts to concrete situations.
Incorporating such elements should improve student satisfaction and learning
outcomes, as it addresses the currently perceived imbalance between theory and
practice in CyBOK-based instruction.</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3 Differences Between Case Studies: Partial vs Full Integration.</title>
        <p>The contrast between Case 1 and Case 2 provides valuable insights into how context
and implementation strategy influence student experiences. In Case 1 where CyBOK
was only partially integrated, e.g., used for a single project in 2023, and somewhat
more in 2024 but still alongside other materials, students’ engagement with CyBOK
was superficial. Many Case 1 students did not see CyBOK as central to the course,
evi-denced by comments like “Not sure what CyBOK is” or “just reading books will
not give practical knowledge” this implying they viewed CyBOK as just another
reading. Some even bypassed the CyBOK resource when possible and opting for
Google or other resources, and a few liked the discussion page regarding reflection,
where one Case 1 student said that the best aspect of CyBOK was “the first and last
page,” suggesting that the reflection section was great. In Case 2, with full
integration, students were more informed about CyBOK and tended to speak of it as an
integral part of their learning. They used positive descriptors, e.g., “good overarching
information”, “easy to read”, “relevant to our course”, and demonstrated
understanding of CyBOK’s purpose.</p>
        <p>Notably, Case 2 students did not report the same level of unfamiliarity; instead, their
critiques were more nuanced, focusing on the need for real-world examples or
supplementary reading instructions, rather than questioning what CyBOK is. This
suggests that full integration led to a deeper engagement and a more sophisticated
appraisal of CyBOK, where students had enough exposure to evaluate its strengths
and weaknesses, rather than simply feeling unsure about it.</p>
        <p>
          From an educational standpoint, this difference reinforces the idea that consistency
and context matter [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. In Case 1, the partial use of CyBOK, possibly only for
certain topics or as optional reading, may have led students to perceive it as
non-essential, resulting in lower motivation to invest effort in it. In Case 2, where all or
most of the course content was organised around CyBOK, students knew that
mastering CyBOK material was critical for their success, e.g., for exams or projects,
which likely encouraged them to engage more thoroughly. That said, it is
important to acknowledge that even in Case 2, engagement had its limits, e.g., no student
reported using CyBOK beyond the course’s requirements, even those who liked it
did not continue to explore it independently. This implies that while full integration
can normalize CyBOK as a go-to resource during a course, sustained usage beyond
the course may require additional incentives or personal motivation. An observation
aligned with general OER usage trends, where many learners revert to familiar
resources like Google unless strongly encouraged or advertised, or are aware
otherwise.
        </p>
      </sec>
      <sec id="sec-4-4">
        <title>4.4 Link to OER Literature.</title>
        <p>
          Our findings aligned with broader OER research in several ways. First, the positive
reactions to CyBOK’s free and open availability confirm one of the oft-cited
advantages of OER, reduced financial burden and increased accessibility for students.
Participants explicitly noted the benefit of not having to purchase textbooks and having
materials freely available anytime, which is consistent with studies that show
students value the cost savings and convenience of OER [
          <xref ref-type="bibr" rid="ref12 ref16 ref18 ref19">12, 16, 18, 19</xref>
          ]. This
underscores that, at a minimum, adopting CyBOK as an OER fulfilled its promise of
widening access to knowledge. An outcome particularly relevant in a field like
cybersecurity, where up-to-date textbooks can be expensive or quickly outdated.
Secondly, our study underlines how OER are implemented can make or break their
impact. Prior research suggests that simply making an open textbook available does
not automatically lead to positive outcomes. This demands both teacher and
students need to see the resource as relevant and be guided in its use [
          <xref ref-type="bibr" rid="ref12 ref16 ref20">12, 16, 20</xref>
          ]. In
our context, the need for “clearer reading instructions” and better integration of
CyBOK material is a concrete example of this principle. It became evident that OER
adoption is most successful when instructors actively scaffold the OER within their
pedagogy [
          <xref ref-type="bibr" rid="ref12 ref18 ref21">12, 18, 21</xref>
          ].
        </p>
        <p>
          Our results provide a case study of this, where the Case 2 course, in which the faculty
structured the syllabus around CyBOK, achieved better student-perceived outcomes
than the less structured approach. This aligns with findings that students’
satisfaction with OER is higher when they feel the OER is well-integrated into the course
and when instructors communicate its value clearly [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
        <p>
          Furthermore, the call for more practical content and context around CyBOK connects
to the notion of “localizing” or contextualising OER for specific audiences. Authors
in [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] have argued for using context-based micro-training to develop OER in
information security. Essentially, tailoring open content to fit the learners’ environment
and needs. Our students’ feedback, e.g., “make it more beginner-friendly”, “demystify
the concept for non-players” (outsiders) highlights a similar need to adapt CyBOK’s
highly academic content to the learner’s context. Such as in this case, university
students who may lack industry experience. This could mean providing
introductory summaries, glossaries for specialised terms, or examples that relate to everyday
scenarios. These kinds of adaptations would help bridge the gap between CyBOK’s
expert-oriented
content and novice learners’ understanding, and they exemplify how educators can
add pedagogical value to OER. In essence, our findings support the
recommendation that OER like CyBOK should not be used “as-is” without pedagogical
mediation; instead, instructors should act as facilitators who interpret and supplement
the material for their students. This is in line with the broader literature urging that
OER adoption be accompanied by faculty training and support, so that teachers can
effectively integrate these resources into teaching practices [
          <xref ref-type="bibr" rid="ref11 ref12 ref15 ref20">11, 12, 15, 20</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-5">
        <title>4.5 Recommendations for CyBOK’s Implementation.</title>
        <p>Based on these themes and reflections, we present several practical
recommendations for enhancing the implementation of CyBOK in educational settings:</p>
      </sec>
      <sec id="sec-4-6">
        <title>4.5.1 Comprehensive Orientation and Ongoing Support</title>
        <p>Educators should introduce CyBOK early in the course, explaining its purpose,
structure, and relevance. This might include a dedicated orientation session,
providing students with a “user’s guide” to CyBOK, and making it clear how CyBOK
aligns with exams or assignments. Throughout the course, instructors should give
reading guides as students requested, for example, specifying which sections of a
CyBOK chapter to focus on for a given week, and providing reflection questions to
encourage critical reading. This would address the Unfamiliarity and Guidance
issues by ensuring students are never left wondering why or how they should use
CyBOK.</p>
      </sec>
      <sec id="sec-4-7">
        <title>4.5.2 Enhance Practical Engagement</title>
        <p>
          Both the content creators of CyBOK and the instructors using it can take steps to add
more practical context. CyBOK’s authors might consider adding application sections
or examples to each Knowledge Area, e.g., case studies, mini-scenarios, or pointers to
hands-on exercises where some of which could be community-contributed.
Instructors, on their part, should pair CyBOK readings with practical activities. For
instance, after students read a CyBOK chapter on Malware Forensics, the instructor
could run a lab using an open tool like Volatility, thereby connecting the conceptual
knowledge to a practical skill. Many students in our study specifically praised the
“memory forensics using Volatility” lab component, indicating that such integrations
are effective. By systematically creating lab assignments or discussion prompts
directly tied to CyBOK content, educators can prevent CyBOK from remaining an
abstract text and instead make it a springboard for active learning. This approach
would mitigate the Abstract Content issue and enhance the Interactive Experience,
potentially also motivating students to engage more deeply, since they can see
immediate, concrete outcomes from the knowledge. Previous research on student
learning and engagement in cybersecurity education has shown promising results,
highlighting increased student involvement and enhanced cybersecurity knowledge
through experiential or hands-on activities [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-8">
        <title>4.5.3 Regular Updates and Quality Control</title>
        <p>The CyBOK project should ensure that the platform clearly highlights the latest
version of each knowledge area and perhaps archives or removes outdated versions
to avoid confusion, as one student experienced in studied cases. Mechanisms for
continuous updates, which the CyBOK editorial team already endeavours to do,
should be communicated to users; for example, if a chapter has been revised
recently, noting that can reassure students that the material is current. In an
educational setting, instructors might want to supplement CyBOK with current examples
from industry news or recent inci-dents to show how the static knowledge in
CyBOK applies to evolving threats. This will address students’ calls for currency
and reinforce CyBOK’s relevance. Additionally, improvements in the user interface
could help, for instance, a better search function or a feature to create personal
notes/annotations could make CyBOK more interactive for students accustomed to
digital textbooks. While our respondents did find CyBOK easy to use overall, these
enhancements could further increase engagement, perhaps even encouraging
voluntary exploration if students find the platform userfriendly and dynamic.</p>
      </sec>
      <sec id="sec-4-9">
        <title>4.5.4 Tailoring for Different Learner Levels</title>
        <p>One challenge highlighted by our results is that CyBOK serves multiple audiences
(from novices to professionals), and some content may be too advanced or too
“technical to outsiders” for undergraduates. To handle this, educators could identify
and clarify difficult sections for students, effectively acting as interpreters of
CyBOK. For example, if a CyBOK chapter assumes prior knowledge that students
lack, the instruc-tor could prepare a short introduction or provide additional
resources to bring students up to speed. On the flip side, advanced students might
benefit from being pointed to deeper readings or research papers referenced in
CyBOK. Thus, differentiating instruction using CyBOK, giving extra support to
those who need it, and extension material to those who want more, can improve
the learning experience across the spectrum. This addresses both ends of the
Comprehensive but Abstract theme by leveraging the comprehensive content for those
ready to absorb it, while easing the abstraction for those who are not.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5 Community and Feedback Mechanisms:</title>
      <p>To continuously improve CyBOK’s educational utility, a feedback loop is essential.
The CyBOK initiative has already started gathering user feedback via surveys and
workshops. We recommend that future student cohorts be actively encouraged to
give feedback on their CyBOK learning experience, perhaps as a reflective
assignment or via built-in feedback tools in the CyBOK platform. Student suggestions in
our study, ranging from “add an AI Q&amp;A feature” to “make it like a game” show that
fresh ideas can emerge from the learner community.</p>
      <p>Involving students in the evolution of Cy-BOK, for example, through student-led
creation of study aids or examples, could also boost their engagement and sense of
ownership. This aligns with the philosophy of OER, which encourages users to adapt
and contribute back to open content.</p>
    </sec>
    <sec id="sec-6">
      <title>6 Contrast to Existing Literature and Future Work.</title>
      <p>
        The experiences from these case studies tie into the wider discourse on OER and
cybersecurity education. Our findings reinforce that OER adoption is not merely a
costsaving exercise but a pedagogical strategy that requires thoughtful
implementation. Students in our study held more favourable views of the instructors and
courses that effectively utilised OER (CyBOK) . A dynamic similarity was observed
in other contexts where students tend to rate courses using OER as more innovative
or supportive [
        <xref ref-type="bibr" rid="ref11 ref16">11, 16</xref>
        ]. However, the point is clear that simply having an OER is not
enough, it must be integrated and instructed[
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. This nuance adds to the literature
by providing a concrete example in a specialised domain such as cybersecurity, a
field where OER usage is still emerging and where the pace of change is rapid.
In terms of cybersecurity education specifically, our study highlights a central
tension between covering foundational knowledge and developing practical skills.
CyBOK leans towards the former, and students are demanding the latter. Effective
curricula will likely blend CyBOK with experiential learning. The difference our
work makes is giving voice to students on this matter. Student feedback provides
empirical support to what educators have intuitively known, that a body of
knowledge like CyBOK is immensely valuable as a reference framework, but it will
achieve its full educational impact only when used as part of a richer learning
ecosystem along with labs, projects, etc.
      </p>
      <p>Looking forward, future research could explore developing structured course
modules or learning pathways using CyBOK, and then measuring student outcomes in
those courses versus more traditional courses. Our findings would predict that a
well-structured CyBOK-based curriculum with the improvements that are discussed
can perform on par with or better than textbook-based curricula in terms of student
satisfaction and perhaps even knowledge gains. It would also be worthwhile to
investigate the long-term effects on students who learned via CyBOK, for instance, do
they retain the knowledge areas better, or are they more likely to consult CyBOK in
their future work, compared to students who learned from a standard textbook?
Such research could validate CyBOK’s role in not just immediate education but
ongoing professional development, which is indeed one of CyBOK’s stated aims.
Finally, the differences between Case 1 and Case 2 in our study highlight that
institutional contexts such as class size, student backgrounds, and teaching style can
influence OER adoption success.</p>
      <p>
        Further comparative studies across institutions, including those in different
countries or with different student demographics, would enrich understanding of how to
tailor CyBOK’s use to various settings. For example, if students in some regions
have lower baseline familiarity with open digital resources, additional support
might be needed initially. The international CyBOK community is already
examining global adoption [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], and our study adds a student-centric perspective to that
dialogue. We contribute evidence that, from the student's point of view, the main
“barriers” were lack of initial awareness and lack of practical context, barriers that
are manageable with targeted pedagogical strategies.
      </p>
    </sec>
    <sec id="sec-7">
      <title>7 Conclusion</title>
      <p>In conclusion, our results and discussion illustrate that CyBOK, as an OER in
cybersecurity education, holds significant promise but requires careful implementation to
realise its full benefits. Students acknowledge its comprehensive, high-quality
content and appreciate its free accessibility, fulfilling key OER objectives of lowering
costs and broadening access. At the same time, their voices make it clear that
engagement and learning do not happen automatically simply because the resource is
available. The educator’s role in contextualising CyBOK through integration into
the course structure, providing guidance, and adding practical learning
opportunities is crucial. When that is done, as seen in the fully integrated case, students can
indeed find CyBOK “fun and engaging” and “essential” to their learning. When it is
not, students may tune out, misconceive the resource, or revert to familiar study
habits, undermining the OER’s impact. These findings contribute to a more
nuanced understanding of how a domainspecific OER like CyBOK is perceived by
learners, and they offer actionable insights for improving CyBOK’s use in teaching.
By addressing the identified weaknesses like improving orientation, enhancing
practical content, and maintaining ease of use, universities can better harness
CyBOK as a living, evolving body of knowledge that not only informs students but
actively engages and empowers them. This alignment of CyBOK’s strengths with
pedagogical best practices will ultimately support its mission to be “an
internationally recognized resource for academia, industry, and government”, benefiting not just
the students in these case studies but the cybersecurity education community at
large.</p>
      <p>Acknowledgments
This research has been supported by the CyBOK project through “mini-project” support.
Declaration on Generative AI
During the preparation of this work, the author(s) used Grammarly and ChatGPT in order to:
Grammar and spelling check. The author(s) reviewed and edited the content as needed and
take(s) full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Kävrestad</surname>
            <given-names>J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abbasi</surname>
            <given-names>MAK</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tarczal</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nohlberg</surname>
            <given-names>M</given-names>
          </string-name>
          <article-title>The impact of short-term memory on phishing detection ability and password behaviour</article-title>
          .
          <source>In: The 9th International Conference on Socio-Technical Perspectives in IS (STPIS'23) 27</source>
          .-
          <fpage>28</fpage>
          .
          <fpage>10</fpage>
          .
          <string-name>
            <surname>Portsmouth</surname>
          </string-name>
          , UK
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Aslam</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khan Abbasi</surname>
            <given-names>MA</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khalid</surname>
            <given-names>T</given-names>
          </string-name>
          , et al (
          <year>2022</year>
          )
          <article-title>Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance</article-title>
          .
          <source>Sensors</source>
          <volume>22</volume>
          :
          <fpage>9338</fpage>
          . https://doi.org/10.3390/s22239338
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3. (
          <year>2019</year>
          )
          <article-title>Cybersecurity Curriculum Design: A Survey</article-title>
          .
          <source>In: Lecture Notes in Computer Science</source>
          . Springer Berlin Heidelberg, Berlin, Heidelberg, pp
          <fpage>93</fpage>
          -
          <lpage>107</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Aksenova</surname>
            <given-names>ZA</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yashin</surname>
            <given-names>SN</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markova</surname>
            <given-names>OM</given-names>
          </string-name>
          , et al (
          <year>2024</year>
          <article-title>) Assessing the Impact of Digital Economy Programs on Alleviating Skill Shortages in the EU Labor Market for Digital Professionals</article-title>
          . J Knowl Econ. https://doi.org/10.1007/s13132- 024-02202-6
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Attwood</surname>
            <given-names>S</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Williams</surname>
            <given-names>A</given-names>
          </string-name>
          (
          <year>2023</year>
          )
          <article-title>Exploring the UK Cyber Skills Gap through a mapping of active job listings to the Cyber Security Body of Knowledge (CyBOK)</article-title>
          .
          <source>In: Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering</source>
          . ACM,
          <string-name>
            <surname>Oulu</surname>
            <given-names>Finland</given-names>
          </string-name>
          , pp
          <fpage>273</fpage>
          -
          <lpage>278</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Goupil</surname>
            <given-names>F</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Laskov</surname>
            <given-names>P</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pekaric</surname>
            <given-names>I</given-names>
          </string-name>
          , et al (
          <year>2022</year>
          )
          <article-title>Towards Understanding the Skill Gap in Cybersecurity</article-title>
          .
          <source>In: Proceedings of the 27th ACM Conference on on Innovation and Technology in Computer Science</source>
          Education Vol.
          <volume>1</volume>
          . ACM, Dublin Ireland, pp
          <fpage>477</fpage>
          -
          <lpage>483</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Blažič</surname>
            <given-names>AJ</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Blažič</surname>
            <given-names>BJ</given-names>
          </string-name>
          (
          <year>2025</year>
          )
          <article-title>Teaching and learning cybersecurity for European youth by applying interactive technology and smart education</article-title>
          .
          <source>Educ Inf Technol</source>
          <volume>30</volume>
          :
          <fpage>9093</fpage>
          -
          <lpage>9120</lpage>
          . https://doi.org/10.1007/s10639-024-13155-3
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8. European Union Agency for Cybersecurity. (
          <year>2024</year>
          )
          <article-title>ENISA threat landscape 2024: July 2023 to June 2024</article-title>
          . Publications Office, LU
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Zwilling</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klien</surname>
            <given-names>G</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lesjak</surname>
            <given-names>D</given-names>
          </string-name>
          , et al (
          <year>2022</year>
          )
          <article-title>Cyber Security Awareness, Knowledge and Behavior: A Comparative Study</article-title>
          .
          <source>Journal of Computer Information Systems</source>
          <volume>62</volume>
          :
          <fpage>82</fpage>
          -
          <lpage>97</lpage>
          . https://doi.org/10.1080/08874417.
          <year>2020</year>
          .1712269
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Yang</surname>
            <given-names>R</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zheng</surname>
            <given-names>K</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wu</surname>
            <given-names>B</given-names>
          </string-name>
          , et al (
          <year>2022</year>
          )
          <article-title>Predicting User Susceptibility to Phishing Based on Multidimensional Features</article-title>
          .
          <source>Computational Intelligence and Neuroscience</source>
          <year>2022</year>
          :
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          . https://doi.org/10.1155/
          <year>2022</year>
          /7058972
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Kävrestad</surname>
            <given-names>J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nohlberg</surname>
            <given-names>M</given-names>
          </string-name>
          (
          <year>2019</year>
          )
          <article-title>Using context based micro training to develop OER for the benefit of all</article-title>
          .
          <source>In: Proceedings of the 15th International Symposium on Open Collaboration. ACM</source>
          ,
          <string-name>
            <surname>Skövde</surname>
            <given-names>Sweden</given-names>
          </string-name>
          , pp
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Butcher</surname>
            <given-names>N</given-names>
          </string-name>
          (
          <year>2015</year>
          )
          <article-title>A Basic Guide to Open Educational Resources (OER)</article-title>
          .
          <source>Commonwealth of Learning (COL)</source>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13. CyBOK - At a Glance. In:
          <article-title>Cyber Security Body of Knowledge (CyBOK)</article-title>
          . https://www.cybok.org/ataglance/
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Fine</surname>
            <given-names>MB</given-names>
          </string-name>
          (
          <year>2020</year>
          )
          <article-title>Factors Impacting Student Perception of Open Educational Resources</article-title>
          .
          <volume>14</volume>
          :
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Herbert</surname>
            <given-names>MJ</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Clinton-Lisell</surname>
            <given-names>V</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stupnisky</surname>
            <given-names>RH</given-names>
          </string-name>
          (
          <year>2023</year>
          )
          <article-title>Faculty Motivation for OER Textbook Adoption</article-title>
          and
          <string-name>
            <given-names>Future</given-names>
            <surname>Use</surname>
          </string-name>
          .
          <source>Innov High Educ</source>
          <volume>48</volume>
          :
          <fpage>371</fpage>
          -
          <lpage>388</lpage>
          . https://doi.org/10.1007/s10755-022-09625-6
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Swain</surname>
            <given-names>BK</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pathak</surname>
            <given-names>RK</given-names>
          </string-name>
          (
          <year>2024</year>
          )
          <article-title>Benefits and challenges of using oer in higher education: a pragmatic review</article-title>
          .
          <source>Discov Educ</source>
          <volume>3</volume>
          :
          <fpage>81</fpage>
          . https://doi.org/10.1007/s44217-024-00142-6
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Ismail</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alrabaee</surname>
            <given-names>S</given-names>
          </string-name>
          (
          <year>2024</year>
          )
          <article-title>Empowering Future Cyber Defenders: Advancing Cybersecurity Education in Engineering and Computing with Experiential Learning</article-title>
          .
          <source>In: 2024 IEEE Frontiers in Education Conference (FIE)</source>
          . IEEE, Washington, DC, USA, pp
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Tls</surname>
            <given-names>DS</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kusumah</surname>
            <given-names>YS</given-names>
          </string-name>
          (
          <year>2022</year>
          )
          <article-title>Students' Satisfaction and Performance in the Open Educational Resources (OER): Integrated Online Calculus Course</article-title>
          .
          <source>IJTES</source>
          <volume>6</volume>
          :
          <fpage>124</fpage>
          -
          <lpage>144</lpage>
          . https://doi.org/10.46328/ijtes.333
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Abramovich</surname>
            <given-names>S</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McBride</surname>
            <given-names>M</given-names>
          </string-name>
          (
          <year>2018</year>
          )
          <article-title>Open education resources and perceptions of financial value</article-title>
          .
          <source>The Internet and Higher Education</source>
          <volume>39</volume>
          :
          <fpage>33</fpage>
          -
          <lpage>38</lpage>
          . https://doi.org/10.1016/j.iheduc.
          <year>2018</year>
          .
          <volume>06</volume>
          .002
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Menzli</surname>
            <given-names>LJ</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smirani</surname>
            <given-names>LK</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boulahia</surname>
            <given-names>JA</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hadjouni</surname>
            <given-names>M</given-names>
          </string-name>
          (
          <year>2022</year>
          )
          <article-title>Investigation of open educational resources adoption in higher education using Rogers' diffusion of innovation theory</article-title>
          .
          <source>Heliyon</source>
          <volume>8</volume>
          :e09885. https://doi.org/10.1016/j.heliyon.
          <year>2022</year>
          .e09885
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Mukherjee</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Le</surname>
            <given-names>NT</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chow</surname>
            <given-names>Y-W</given-names>
          </string-name>
          , Susilo W (
          <year>2024</year>
          )
          <article-title>Strategic Approaches to Cybersecurity Learning: A Study of Educational Models and Outcomes</article-title>
          .
          <source>Information</source>
          <volume>15</volume>
          :
          <fpage>117</fpage>
          . https://doi.org/10.3390/info15020117
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>