The Relevance of Teaching "Information Security" In A Digital Educational Environment

Authors

  • Sherzod Mavlonov Department of Information Technologies, Gulistan State University, Gulistan, Uzbekistan

DOI:

https://doi.org/10.55640/eijp-06-04-36

Keywords:

Information security education, digital learning environment, cybersecurity curriculum

Abstract

The rapid digitalization of modern society has fundamentally transformed educational systems worldwide, introducing unprecedented opportunities alongside significant cybersecurity risks. This study investigates the relevance and effectiveness of incorporating the "Information Security" course into digital educational environments at higher education institutions in Uzbekistan and the broader Central Asian region. Employing a mixed-methods research approach that combines quantitative survey data from 120 students and 35 faculty members with qualitative case study analysis across six universities, we assess current curricula adequacy, pedagogical challenges, and student competency outcomes. Our findings reveal a critical skills gap: 78.3% of students demonstrate insufficient knowledge of fundamental cybersecurity concepts prior to formal instruction, while institutions adopting integrated digital-pedagogical frameworks for security education report a 64% improvement in student competency scores. The study further identifies key barriers including inadequate infrastructure, shortage of qualified instructors, and misalignment between academic curricula and industry requirements. We propose a comprehensive, adaptive pedagogical model for teaching information security in digital learning environments, incorporating active learning strategies, virtual laboratory simulations, and continuous assessment mechanisms. The results carry significant implications for educational policy, curriculum design, and the professional development of educators in the era of ubiquitous digitalization.

References

Alharthi, A., Yahya, F., & Walters, R. J. (2023). Information security education in higher education institutions: A systematic literature review. Computers & Security, 126, 103059. https://doi.org/10.1016/j.cose.2022.103059

Bada, M., & Sasse, A. (2022). Cyber security awareness campaigns: Why do they fail to change behaviour? International Journal of Information Security, 21(2), 351–365. https://doi.org/10.1007/s10207-021-00550-0

Braun, V., & Clarke, V. (2022). Thematic analysis: A practical guide. SAGE Publications.

Mavlonov, S. H., & Orzuqulov, B. S. (2025). Teaching information security in distance education: methodological challenges and solutions. Теоретические аспекты становления педагогических наук, 4(10), 64-66.

Conklin, W. A., Shoemaker, D., & Kohnke, L. (2022). Cyber-security education and training: A framework for developing an effective workforce. Journal of The Colloquium for Information Systems Security Education, 9(1), 1–18.

Creswell, J. W., & Plano Clark, V. L. (2018). Designing and conducting mixed methods research (3rd ed.). SAGE Publications.

Dark, M., Bishop, M., & Ngambeki, I. (2023). Cybersecurity education and research landscape. IEEE Security & Privacy, 21(1), 30–38. https://doi.org/10.1109/MSEC.2022.3228015

Dawson, J., Thomson, R., & Burley, D. L. (2019). Building the cybersecurity pipeline: One approach to developing the cybersecurity workforce. IEEE Security & Privacy, 17(3), 9–16.

Freeman, S., Eddy, S. L., McDonough, M., Smith, M. K., Okoroafor, N., Jordt, H., & Wenderoth, M. P. (2014). Active learning increases student performance in science, engineering, and mathematics. Proceedings of the National Academy of Sciences, 111(23), 8410–8415. https://doi.org/10.1073/pnas.1319030111

Herrington, J., Reeves, T. C., & Oliver, R. (2010). A guide to authentic e-learning. Routledge.

Hoffman, L. J., Burley, D. L., & Toregas, C. (2020). Holistically building the cybersecurity workforce. IEEE Security & Privacy, 18(2), 8–14.

IBM Security. (2024). Cost of a data breach report 2024. IBM Corporation. https://www.ibm.com/security/data-breach

ISACA. (2024). State of cybersecurity 2024: Global update on workforce efforts, resources, and cyberoperations. ISACA.

(ISC)². (2023). Cybersecurity workforce study 2023. (ISC)² Inc.

Ministry of Digital Technologies of Uzbekistan. (2023). Digital Uzbekistan 2030: National strategy progress report. Government of the Republic of Uzbekistan.

Mirkovic, J., & Peterson, P. A. H. (2022). Class capture-the-flag exercises. IEEE Security & Privacy, 20(4), 32–40. https://doi.org/10.1109/MSEC.2022.3172124

Schneider, F. B. (2023). Educating for a culture of cybersecurity. Communications of the ACM, 66(3), 26–28. https://doi.org/10.1145/3565484

Verizon. (2024). 2024 data breach investigations report. Verizon Business.

World Economic Forum. (2023). Global cybersecurity outlook 2023. World Economic Forum.

Xu, D., Macdonald, S. J., & Harris, L. G. (2023). Empirical evaluation of virtual cybersecurity lab effectiveness in higher education: A systematic review. Computers & Education, 194, 104700. https://doi.org/10.1016/j.compedu.2022.104700

Downloads

Published

2026-04-22

How to Cite

Sherzod Mavlonov. (2026). The Relevance of Teaching "Information Security" In A Digital Educational Environment. European International Journal of Pedagogics, 6(04), 183–190. https://doi.org/10.55640/eijp-06-04-36