Open Access
Issue
Security and Safety
Volume 3, 2024
Article Number 2024010
Number of page(s) 21
Section Information Network
DOI https://doi.org/10.1051/sands/2024010
Published online 30 July 2024
  1. Wu J. Development paradigms of cyberspace endogenous security and safety. Sci China Inf Sci 2022; 65: 156301. [CrossRef] [Google Scholar]
  2. US National Cybersecurity Strategy. Washington: The White House, 2023, https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf [Google Scholar]
  3. CISA, Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and -Default, 2023, https://www.cisa.gov/sites/default/files/2023-04/principles_approaches_for_security-by-design-default_508_0.pdf [Google Scholar]
  4. European Commission. The European Cyber Resilience Act (CRA), 2022, https://digital-strategy.ec.europa.eu/en/library/cyber-resilience-act [Google Scholar]
  5. Office of the National Cyber Director. National Cyber Workforce and Education Strategy: Unleashing America’s Cyber Talent, 2023, https://www.whitehouse.gov/wp-content/uploads/2023/07/NCWES-2023.07.31.pdf [Google Scholar]
  6. Brewer DFC. Applying security techniques to achieving safety. In: Redmill F and Anderson T, editors, Directions in Safety-critical Systems, Springer, London, 1993, 246–256. [CrossRef] [Google Scholar]
  7. Leveson NG. Safeware: System Safety and Computers. New York, NY, USA: ACM, 1995. [Google Scholar]
  8. Kriaa S, et al. A survey of approaches combining safety and security for industrial control systems. Reliab Eng Syst Safety 2015; 139: 156–178. [CrossRef] [Google Scholar]
  9. Hunter B. Integrating safety and security into the system lifecycle. In: Improving Systems and Software Engineering Conference (ISSEC), Canberra, Australia, 2009, 147. [Google Scholar]
  10. Kornecki AJ and Zalewski J. Safety and security in industrial control. In: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, New York, NY, USA, 2010, 1–77. [Google Scholar]
  11. Johnson CW. CyberSafety: On the interactions between CyberSecurity and the software engineering of safety-critical systems. In: Dale C and Anderson T, editors, Achieving System Safety, Springer-Verlag, London, UK, 2012, 85–96. [CrossRef] [Google Scholar]
  12. Cavoukian A and Chanliau MD. Privacy and Security by Design: An Enterprise, Architecture Approach. Ontario: Information and Privacy Commissioner, 2013. [Google Scholar]
  13. Katina PF and Keating CB. Cyber-physical systems governance: A framework for (Meta)cybersecurity design. In: Masys A, editor, Security by Design. Advanced Sciences and Technologies for Security Applications, Springer, Cham, 2018. [Google Scholar]
  14. Wang S. On information security, network security and cyberspace security. J Lib Sci China 2015; 41: 72–84. [Google Scholar]
  15. World Economic Forum, Global Cybersecurity Outlook 2023, https://www3.weforum.org/docs/WEF_Global_Security_Outlook_Report_2023.pdf [Google Scholar]
  16. Statista Research Department. Cybersecurity Gap Assessment Worldwide 2023, by Country, 2024, available at: https://www.statista.com/statistics/1275691/cybersecurity-jobs-gap-by-country/ [Google Scholar]
  17. Cybersecurity Talent Practical Capabilities White Paper Released, China Information Security 2022, 100. [Google Scholar]
  18. Cybersecurity Research Institute of China Academy of Cyberspace, Building a Strong National Cybersecurity Barrier – Achievements and Changes in the Development of China’s Cybersecurity Work, China Network Information, 2022. [Google Scholar]
  19. Number of Regular Students for Normal Courses/Short-cycle Courses in HEIs by Discipline in 2022, Ministry of Education of the People’s Republic of China, http://www.moe.gov.cn/jyb_sjzl/moe_560/2022/quanguo/202401/t20240110_1099511.html [Google Scholar]
  20. The National Health Workforce Accounts database, World Health Organization, Geneva (https://apps.who.int/nhwaportal, https://www.who.int/activities/improving-health-workforce-data-and-evidence [Google Scholar]
  21. Malthus TR. An Essay on the Principle of Population, as it Affects the Future Improvement of Society. With Remarks on the Speculations of Mr. Godwin, M. Condorcet, and Other Writers. Harmondsworth: Penguin, 1970. [Google Scholar]
  22. Ramirez RB. Making Cyber Security Interdisciplinary: Recommendations for a Novel Curriculum and Terminology Harmonization. Cambridge: Massachusetts Institute of Technology, 2017. [Google Scholar]
  23. Bajaj M and Akhilesh KB. Understanding the need for cybersecurity in manufacturing environment. In: Akhilesh K and Möller D, editors, Smart Technologies, Springer, Singapore, 2020. [Google Scholar]
  24. Li W. Ecosystem thinking and institutional frameworks for cybersecurity governance in digital organizations. Frontiers 2024: 93–101. [Google Scholar]
  25. Corn GP and Emily G. Defend forward and persistent engagement. In: Goldsmith J, editor, The United States Defend Forward Cyber Strategy: A Comprehensive Legal Assessment, Oxford Academic, New York, 2022. [Google Scholar]
  26. Piètre-Cambacédès L and Bouissou M. Cross-fertilization between safety and security engineering. Reliab Eng Syst Saf 2013; 110: 110–126. [CrossRef] [Google Scholar]
  27. Ellis A. Integrating Industrial Control System (ICS) safety and security–A potential approach. In: Proceedings of the 10th IET System Safety and Cyber-Security Conference 2015. IEEE Xplore Digital Library 2015, 1–7. [Google Scholar]
  28. Riel A, et al. Integrated design for tackling safety and security challenges of smart products and digital manufacturing. CIRP Ann 2017; 66: 177–180. [CrossRef] [Google Scholar]
  29. Cybersecurity and Infrastructure Security Agency CISA, Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Secure by Design Software, 2023, available at: https://www.cisa.gov/sites/default/files/2023-10/SecureByDesign_1025_508c.pdf [Google Scholar]
  30. Von Solms S and Futcher LA. Adaption of a secure software development methodology for secure engineering design. IEEE Access 2020; 8: 125630–125637. [CrossRef] [Google Scholar]
  31. NIST. Developing Cyber-resilient Systems: A Systems Security Engineering Approach: NIST publishes SP 800-160 vol. 2, Revision 1, 2021, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160v2r1.pdf [Google Scholar]
  32. NIST, US Department of Commerce, Secure Software Development Framework, 2022, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-218.pdf [Google Scholar]
  33. Federal Communications Commission, The FCC’s Proposed Voluntary Cybersecurity Labeling Program for Internet-Enabled Devices, 2023, available at: https://docs.fcc.gov/public/attachments/DOC-395909A1.pdf [Google Scholar]
  34. European Commission. The Digital Operational Resilience Act (DORA) – Regulation (EU) 2022/2554.[EB/OL], 2023, https://www.digital-operational-resilience-act.com/ [Google Scholar]
  35. European Commission. Directive on Measures for a High Common Level of Cybersecurity Across the Union (NIS2 Directive), 2022, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:02022L2555-20221227 &qid=1713876904163 [Google Scholar]
  36. The EU Cyber Solidarity Act, 2023, https://digital-strategy.ec.europa.eu/en/library/proposed-regulation-cyber-solidarity-act [Google Scholar]
  37. US Department of Energy, National Cyber-Informed Engineering Strategy, 2022, https://www.energy.gov/sites/default/files/2022-06/FINAL%20DOE%20National%20CIE%20Strategy%20-%20June%202022_0.pdf [Google Scholar]
  38. Liu ZT, et al. Systematic thinking and classified implementation of high-quality development of higher education. Univ Edu Sci 2021: 4–19. [Google Scholar]
  39. Jones KS, Namin AS and Armstrong ME. The core cyber-defense knowledge, skills, and abilities that cybersecurity students should learn in school: Results from interviews with cybersecurity professionals. ACM Trans Comput Edu 2018; 18: 1–12. [CrossRef] [Google Scholar]
  40. Wirfs-Brock R. The responsible designer. IEEE Softw 2009; 26: 9–10. [CrossRef] [Google Scholar]
  41. Knowledge, skills, and abilities for specialized curricula in cyber defense: Results from interviews with cyber professionals. ACM Trans Comput Edu 2020; 20. [Google Scholar]
  42. Salleh KM, Nur HK, Noralfishah S, et al. Competency of adult learners in learning: Application of the iceberg competency model. Proc Soc Behav Sci 2015; 204: 326–34. [CrossRef] [Google Scholar]
  43. Crook C. Metacognitive abilities of learners: A study of learners’ self-evaluation. Br Edu Res J 1988; 14: 11–20. [Google Scholar]
  44. NIST, Workforce Framework for Cybersecurity (NICE Framework), 2020, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181r1.pdf [Google Scholar]
  45. Baartman LKJ and de Bruijn E. Integrating knowledge, skills and attitudes: Conceptualising learning processes towards vocational competence. Edu Res Rev 2011; 6: 125–134. [CrossRef] [Google Scholar]
  46. Lombardi F and Fanton A. From DevOps to DevSecOps is not enough. CyberDevOps: An extreme shifting-left architecture to bring cybersecurity within software security lifecycle pipeline. Softw Qual J 2023; 31: 619–654. [CrossRef] [Google Scholar]
  47. Teaching Guidance Committee for Higher Schools, Ministry of Education, National Standard on the Teaching Quality of Higher Education Institutions for Undergraduates, 2017, https://jxzlglc.syist.edu.cn/uploads/file/20240402/20240402153544-2228.pdf [Google Scholar]
  48. Sixth Discipline Review Group of the Academic Degrees Committee of the State Council, First-level Disciplines Cultivation Requirements for Doctoral and Master’s Degrees, Higher Education Press, 2014. [Google Scholar]
  49. Wu J. An Introduction to Cyberspace Mimic Defense. Beijing: Science Press, 2017. [Google Scholar]
  50. Wu J. Cyberspace Endogenous Security and Safety: Mimic Defense and Generalized Robust Control. Beijing: Science Press, 2020. [Google Scholar]
  51. Marilyn W. Computers as Components: Principles of Embedded Computing System Design. Morgan Kaufmann, 2022. [Google Scholar]
  52. Pearce JG. Telecommunications Switching. Applications of Communications Theory. Boston, MA: Springer, 1981. [Google Scholar]
  53. Zhong W, Wu W, An G, et al. Dissimilar redundancy structure design for carrier landing guidance computer and reliability analysis. In: Wang J, editor, Proceedings of the First Symposium on Aviation Maintenance and Management-Volume II. Lecture Notes in Electrical Engineering, Springer, Berlin, Heidelberg, 2014, 297. [Google Scholar]
  54. Wu J. Cyberspace’s endogenous security and safety problem and the countermeasures. Sci Sin 2022; 52: 1929–1937. [CrossRef] [Google Scholar]
  55. Shannon CE. Communication theory of secrecy systems. Bell Syst Tech J 1949; 28: 656–715. [CrossRef] [Google Scholar]
  56. Multivaluedness in networks: Shannon’s noisy-channel coding theorem. In: IEEE Transactions on Circuits and Systems II-Express Briefs, 2021, 68. [Google Scholar]
  57. Iacona A. Gödel’s incompleteness theorems. In: LOGIC: Lecture Notes for Philosophy, Mathematics, and Computer Science. Springer Undergraduate Texts in Philosophy, Springer, Cham, 2021. [Google Scholar]
  58. Ashby WR. An Introduction to Cybernetics. New York: John Wiley, 1956. [Google Scholar]
  59. Wiener N. Cybernetics, or Control and Communication in the Animal and the Machine, 2nd edn., MIT Press eBooks, 1961. [Google Scholar]
  60. Boland PJ. Majority systems and the condorcet jury theorem. J R Stat Soc Ser D 1989; 38: 181–89. [Google Scholar]
  61. Verschuren P. Holism versus reductionism in modern social science research. Qual Quant 2001; 35: 389–405. [CrossRef] [Google Scholar]
  62. Meyer EF, Falkner N, Sooriamurthi R, et al. Reasoning: Logic and reasoning backwards. In: Guide to Teaching Puzzle-based Learning. Undergraduate Topics in Computer Science, Springer, London, 2014. [CrossRef] [Google Scholar]
  63. Kossiakoff A, et al. Systems Engineering Principles and Practice. John Wiley & Sons, Inc., 2020. [Google Scholar]
  64. Neumann JV. General and Logical Theory of Automata. In: Aspray W and Burks A, editors, MIT Press Cambridge, 1987, 408. [Google Scholar]
  65. Esfeld M. Holism in cartesianism and in today’s philosophy of physics. J Gen Philos Sci 1999; 30: 17–36. [CrossRef] [Google Scholar]
  66. Nidhra S. Black box and white box testing techniques – a literature review. Int J Embed Syst Appl 2012; 2: 29–50. [CrossRef] [Google Scholar]
  67. Xinhua Press, 2023 World Internet Conference Wuzhen Summit Opens in East China, 2023, https://english.news.cn/20231108/d9358db8163d4c17a94398286ec3e864/c.html [Google Scholar]
  68. Li P. Seizing the opportunity of “Digital Intelligence” reform, accelerating the transformation of the financial sector. Financ Times 2023. [Google Scholar]
  69. ESS Alliance. Cultivating Responsible Developers and Building Endogenous Secure Digital Ecosystems: The Third Symposium on Common Technologies in Cyberspace held in Xinghua, Jiangsu Province, 2023, https://www.secrss.com/articles/60353 [Google Scholar]
  70. China Daily. Zhou’s Plenary Speech at Wuzhen Summit: Security Should Evolve into a New Digital Infrastructure 2023, https://cn.chinadaily.com.cn/a/202311/08/WS654b4b39a310d5acd876df04.html [Google Scholar]
  71. Ye J. China Telecom’s cloud network convergence lays out new ecology of network security. Commun Inf Daily 2023. [Google Scholar]
  72. Wu J. Endogenous Security and Safety empowers Cyber Engineering, Science Express, 2023. [Google Scholar]
  73. Liu G and Chen Y. The obscuration and transcendence of the nature of knowledge teaching. J Chin Soc Edu 2016: 17–21. [Google Scholar]
  74. Curry L and Docherty M. Implementing competency-based education. Collect Essays Learn Teach 2017; 10: 61–73. [CrossRef] [Google Scholar]
  75. Dewey J. Experience and Education. New York: Macmillan, 1938. [Google Scholar]
  76. Bandura A. Self-efficacy: The Exercise of Control. W.H. Freeman/Times Books/Henry Holt & Co, 1997. [Google Scholar]
  77. Dewey J and Jackson PW. The School and Society and the Child and the Curriculum. Chicago: University of Chicago Press, 1990. [Google Scholar]
  78. Ruth B. Enhancing and undermining intrinsic motivation: The effects of task-involving and ego-involving evaluation on interest and performance. Br J Edu Psychol 1988; 58: 1–14. [CrossRef] [Google Scholar]
  79. Waks LJ. Learning by doing and communicating: On Chapter 1: Education as a necessity of life. In: Waks LJ and English AR, editors, John Dewey’s Democracy and Education: A Centennial Handbook, Cambridge University Press, 2017, 15–22. [CrossRef] [Google Scholar]
  80. Adam S. Cybersecurity education goes broad: Future cybersecurity leaders need a wider set of skills and knowledge. Secur Mag 2019. [Google Scholar]
  81. Bergström P, Rönnlund M and Tieva Å. Making the transition from teacher-centered teaching to students’ active learning: Developing transformative agency. In: Lippman PC and Matthews EA, editors, Creating Dynamic Places for Learning, Springer, Singapore, 2023. [Google Scholar]
  82. Cronin-Golomb LM and Bauer PJ. Self-motivated and directed learning across the lifespan. Acta Psychol 2023; 232: 103816. [CrossRef] [PubMed] [Google Scholar]
  83. Bardach L, et al. The power of feedback and reflection: Testing an online scenario-based learning intervention for student teachers. Comput Edu 2021; 169: 104194. [CrossRef] [Google Scholar]
  84. Bruce BC and Bloch N. Learning by doing. In: Seel NM, editors, Encyclopedia of the Sciences of Learning, Springer, Boston, MA, 2012. [Google Scholar]
  85. Kolb DA. Experiential Learning. Englewood Cliffs: Prentice Hall, 1984. [Google Scholar]
  86. Dillenbourg P. Collaborative Learning: Cognitive and Computational Approaches. New York: Elsevier Science, 1999. [Google Scholar]
  87. Schwartz P. Problem-based Learning. Routledge 2013. [Google Scholar]
  88. Seren Smith M, Warnes S and Vanhoestenberghe A. Scenario-based learning. In: Davies JP and Pachler N, editors, Teaching and Learning in Higher Education: Perspectives from UCL, UCL IOE Press, London, UK, 2018, 144–156. [Google Scholar]
  89. Enhancing student learning in cybersecurity education using an out-of-class learning approach. J Inf Technol Edu: Innov Pract (JITE: IIP) 2019; 18. [Google Scholar]
  90. Cyber competitions: A survey of competitions, tools, and systems to support cybersecurity education. Edu Inf Technol 2023; 28. [Google Scholar]
  91. Jiang B, et al. Digital twin-based modeling of endogenous security and safety cyber range, Netw Secur Technol Appl 2023: 10–13. [Google Scholar]
  92. Game-based learning platform to enhance cybersecurity education. Edu Inf Technol 2022; 27. [Google Scholar]
  93. CyExec – Training Platform for Cybersecurity Education Based on a Virtual Environment. Int J Learn Technol Learn Environ 2020; 3. [Google Scholar]
  94. Chen G. Practice and reflection on “Four-in-One” cultivation of innovative talents in cybersecurity. China Inf Secur 2023: 36–38. [Google Scholar]
  95. Brooks NG, Greer TH and Morris SA. Information systems security job advertisement analysis: Skills review and implications for information systems curriculum. J Edu Bus 2018; 93: 213–221. [CrossRef] [Google Scholar]
  96. Xue X. Model driven educational big data mining for enhancing europass and its enlightenment to China credit bank. Open Edu Res 2018; 24: 112–118. [Google Scholar]
  97. Tagare D, Janakiraman S, Exter M, et al. Dispositions that computing professionals value in the workplace. In: Proceedings of the 2023 ACM Conference on International Computing Education Research–Volume 1, 2023, 270–283. [Google Scholar]
  98. Formosa P, Wilson M and Richards D. A principlist framework for cybersecurity ethics. Comput Secur 2021; 109: 102382. [CrossRef] [Google Scholar]
  99. Luyens SMM, et al. Student-centered instruction: inquiry-, problem-, project-, and case-based learning. Int Encycl Edu (Fourth Edn) 2023: 701–711. [Google Scholar]
  100. Wahsheh LA and Mekonnen B. Practical cyber security training exercises. In: 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 2019, 48–53. [Google Scholar]
  101. Lu C. Cyberspace security dilemma and the construction of governance institution. Contemp Int Relat 2018; 11: 52–53. [Google Scholar]
  102. Lin J. The construction of China’s new engineering disciplines for the future. Tsinghua J Edu 2017; 38: 26–35. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.