{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T04:09:32Z","timestamp":1750392572932,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":45,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819682942","type":"print"},{"value":"9789819682959","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-8295-9_1","type":"book-chapter","created":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T17:47:30Z","timestamp":1750355250000},"page":"3-20","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Large Language Models for\u00a0Cybersecurity Education: A Survey of\u00a0Current Practices and\u00a0Future Directions"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9123-9022","authenticated-orcid":false,"given":"Nan","family":"Sun","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7333-0305","authenticated-orcid":false,"given":"Yuantian","family":"Miao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3083-7365","authenticated-orcid":false,"given":"Xiaoxing","family":"Mo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2189-7801","authenticated-orcid":false,"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,20]]},"reference":[{"key":"1_CR1","unstructured":"Abla, C., Fraumeni, B.R.: Student engagement: Evidence-based strategies to boost academic and social-emotional results. McREL International (2019)"},{"issue":"1","key":"1_CR2","doi-asserted-by":"publisher","first-page":"100","DOI":"10.51594\/csitrj.v5i1.708","volume":"5","author":"TO Abrahams","year":"2024","unstructured":"Abrahams, T.O., Farayola, O.A., Kaggwa, S., Uwaoma, P.U., Hassan, A.O., Dawodu, S.O.: Cybersecurity awareness and education programs: a review of employee engagement and accountability. Comput. Sci. IT Res. J. 5(1), 100\u2013119 (2024)","journal-title":"Comput. Sci. IT Res. J."},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, G., Pal, K., Deng, Y., Liu, H., Chen, Y.C.: CyberQ: generating questions and answers for cybersecurity education using knowledge graph-augmented LLMs. In: Proceedings of the AAAI Conference on Artificial Intelligence. vol.\u00a038, pp. 23164\u201323172 (2024)","DOI":"10.1609\/aaai.v38i21.30362"},{"key":"1_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102754","volume":"119","author":"S AlDaajeh","year":"2022","unstructured":"AlDaajeh, S., Saleous, H., Alrabaee, S., Barka, E., Breitinger, F., Choo, K.: The role of national cybersecurity strategies on the improvement of cybersecurity education. Comput. Secur. 119, 102754 (2022)","journal-title":"Comput. Secur."},{"issue":"6","key":"1_CR5","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.3390\/electronics12061333","volume":"12","author":"\u00d6 Aslan","year":"2023","unstructured":"Aslan, \u00d6., Aktu\u011f, S.S., Ozkan-Okay, M., Yilmaz, A.A., Akin, E.: A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics 12(6), 1333 (2023)","journal-title":"Electronics"},{"issue":"3","key":"1_CR6","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s10676-024-09778-2","volume":"26","author":"KG Barman","year":"2024","unstructured":"Barman, K.G., Wood, N., Pawlowski, P.: Beyond transparency and explainability: on the need for adequate and contextualized user guidelines for LLM use. Ethics Inf. Technol. 26(3), 47 (2024)","journal-title":"Ethics Inf. Technol."},{"issue":"4","key":"1_CR7","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.fas.2024.01.008","volume":"30","author":"JJ Butler","year":"2024","unstructured":"Butler, J.J., et al.: From jargon to clarity: improving the readability of foot and ankle radiology reports with an artificial intelligence large language model. Foot Ankle Surg. 30(4), 331\u2013337 (2024)","journal-title":"Foot Ankle Surg."},{"key":"1_CR8","unstructured":"Chinta, S.V., et al.: FairAIED: Navigating fairness, bias, and ethics in educational AI applications. arXiv preprint arXiv:2407.18745 (2024)"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Chowdhury, G., Chowdhury, S.: AI-and LLM-driven search tools: a paradigm shift in information access for education and research. J. Inf. Sci. 01655515241284046 (2024)","DOI":"10.1177\/01655515241284046"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Dolmans, D., Schmidt, H.: The problem-based learning process. Lessons from problem-based learning, pp. 13\u201320 (2010)","DOI":"10.1093\/acprof:oso\/9780199583447.003.0003"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Ferrag, M.A., Alwahedi, F., Battah, A., Cherif, B., Mechri, A., Tihanyi, N.: Generative AI and large language models for cyber security: All insights you need. arXiv preprint arXiv:2405.12750 (2024)","DOI":"10.2139\/ssrn.4853709"},{"key":"1_CR12","unstructured":"Greco, F., Desolda, G., Vigan\u00f2, L.: Supporting the design of phishing education, training and awareness interventions: an LLM-based approach (2024)"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Hafzullah, \u0130.: LLM-driven sat impact on phishing defense: a cross-sectional analysis. In: 2024 12th International Symposium on Digital Forensics and Security (ISDFS), pp.\u00a01\u20135. IEEE (2024)","DOI":"10.1109\/ISDFS60797.2024.10527274"},{"key":"1_CR14","unstructured":"Jukes, I., McCain, T., Crockett, L.: Understanding the digital generation: Teaching and learning in the new digital landscape. Corwin Press (2010)"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Kallonas, C., Piki, A., Stavrou, E.: Empowering professionals: a generative AI approach to personalized cybersecurity learning. In: 2024 IEEE Global Engineering Education Conference (EDUCON), pp. 1\u201310. IEEE (2024)","DOI":"10.1109\/EDUCON60312.2024.10578894"},{"key":"1_CR16","unstructured":"Lan, Y.J., Chen, N.S.: Teachers\u2019 agency in the era of LLM and generative AI. Educ. Technol. Soc. 27(1), I\u2013XVIII (2024)"},{"key":"1_CR17","unstructured":"Latif, E., Fang, L., Ma, P., Zhai, X.: Knowledge distillation of LLM for education. arXiv preprint arXiv:2312.15842 (2023)"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Lee, A., King, K., Gra\u010danin, D., Azab, M.: Experiential learning through immersive XR: cybersecurity education for critical infrastructures. In: International Conference on Human-Computer Interaction, pp. 56\u201369. Springer (2024)","DOI":"10.1007\/978-3-031-61382-1_4"},{"key":"1_CR19","unstructured":"Li, Q., et al.: Adapting large language models for education: Foundational capabilities, potentials, and challenges. arXiv preprint arXiv:2401.08664 (2023)"},{"issue":"3","key":"1_CR20","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1002\/jee.20021","volume":"102","author":"M Menekse","year":"2013","unstructured":"Menekse, M., Stump, G.S., Krause, S., Chi, M.T.: Differentiated overt learning activities for effective instruction in engineering classrooms. J. Eng. Educ. 102(3), 346\u2013374 (2013)","journal-title":"J. Eng. Educ."},{"issue":"2","key":"1_CR21","doi-asserted-by":"publisher","first-page":"117","DOI":"10.3390\/info15020117","volume":"15","author":"M Mukherjee","year":"2024","unstructured":"Mukherjee, M., Le, N.T., Chow, Y.W., Susilo, W.: Strategic approaches to cybersecurity learning: a study of educational models and outcomes. Information 15(2), 117 (2024)","journal-title":"Information"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Neumann, A.T., Yin, Y., Sowe, S., Decker, S., Jarke, M.: An LLM-driven chatbot in higher education for databases and information systems. IEEE Transactions on Education (2024)","DOI":"10.1109\/TE.2024.3467912"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Ohm, M., Bungartz, C., Boes, F., Meier, M.: Assessing the impact of large language models on cybersecurity education: a study of ChatGPT\u2019s influence on student performance. In: Proceedings of the 19th International Conference on Availability, Reliability and Security, pp.\u00a01\u20137 (2024)","DOI":"10.1145\/3664476.3670446"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Orenstrakh, M.S., Karnalim, O., Suarez, C.A., Liut, M.: Detecting LLM-generated text in computing education: Comparative study for ChatGPT cases. In: 2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC), pp. 121\u2013126. IEEE (2024)","DOI":"10.1109\/COMPSAC61105.2024.00027"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Pan, S., Luo, L., Wang, Y., Chen, C., Wang, J., Wu, X.: Unifying large language models and knowledge graphs: a roadmap. IEEE Transactions on Knowledge and Data Engineering (2024)","DOI":"10.1109\/TKDE.2024.3352100"},{"issue":"6","key":"1_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2224\/sbp.9118","volume":"48","author":"X Pan","year":"2020","unstructured":"Pan, X., Shao, H.: Teacher online feedback and learning motivation: Learning engagement as a mediator. Soc. Behav. Personal. Int. J. 48(6), 1\u201310 (2020)","journal-title":"Soc. Behav. Personal. Int. J."},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Plapp, A., Wu, J., Pan, L., Chen, C., Chua, C., Zhang, J.: Strengthening cyber security education: Designing robust assessments for ChatGPT-generated answers. In: International Conference on Machine Learning for Cyber Security, pp. 17\u201327. Springer (2023)","DOI":"10.1007\/978-981-97-2458-1_2"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Santa\u00a0Barletta, V., Caivano, D., Calvano, M., Curci, A., Piccinno, A.: CRASTE: Human factors and perception in cybersecurity education (2024)","DOI":"10.2139\/ssrn.4854627"},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"Santhi, T.M., Srinivasan, K.: Chat-GPT based learning platform for creation of different attack model signatures and development of defense algorithm for cyberattack detection. IEEE Transactions on Learning Technologies (2024)","DOI":"10.1109\/TLT.2024.3417252"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Shafee, S., Bessani, A., Ferreira, P.M.: Evaluation of LLM chatbots for OSINT-based cyber threat awareness. arXiv preprint arXiv:2401.15127 (2024)","DOI":"10.2139\/ssrn.4703135"},{"key":"1_CR31","unstructured":"Shao, M., et al.: An empirical evaluation of LLMs for solving offensive security challenges. arXiv preprint arXiv:2402.11814 (2024)"},{"key":"1_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102756","volume":"119","author":"R Shillair","year":"2022","unstructured":"Shillair, R., Esteve-Gonz\u00e1lez, P., Dutton, W.H., Creese, S., Nagyfejeo, E., von Solms, B.: Cybersecurity education, awareness raising, and training initiatives: national level evidence-based results, challenges, and promise. Comput. Secur. 119, 102756 (2022)","journal-title":"Comput. Secur."},{"issue":"2","key":"1_CR33","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s10462-023-10641-x","volume":"57","author":"MM Soliman","year":"2024","unstructured":"Soliman, M.M., Ahmed, E., Darwish, A., Hassanien, A.E.: Artificial intelligence powered metaverse: analysis, challenges and future perspectives. Artif. Intell. Rev. 57(2), 36 (2024)","journal-title":"Artif. Intell. Rev."},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Stamper, J., Xiao, R., Hou, X.: Enhancing LLM-based feedback: insights from intelligent tutoring systems and the learning sciences. In: International Conference on Artificial Intelligence in Education, pp. 32\u201343. Springer (2024)","DOI":"10.1007\/978-3-031-64315-6_3"},{"key":"1_CR35","doi-asserted-by":"crossref","unstructured":"Sun, N., Zhang, J., Gao, S., Zhang, L.Y., Camtepe, S., Xiang, Y.: Data analytics of crowdsourced resources for cybersecurity intelligence. In: Network and System Security: 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25\u201327, 2020, Proceedings 14, pp. 3\u201321. Springer (2020)","DOI":"10.1007\/978-3-030-65745-1_1"},{"issue":"2","key":"1_CR36","doi-asserted-by":"publisher","first-page":"1744","DOI":"10.1109\/COMST.2018.2885561","volume":"21","author":"N Sun","year":"2018","unstructured":"Sun, N., Zhang, J., Rimba, P., Gao, S., Zhang, L.Y., Xiang, Y.: Data-driven cybersecurity incident prediction: a survey. IEEE Commun. Surv. Tutorials 21(2), 1744\u20131772 (2018)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Tihanyi, N., Ferrag, M.A., Jain, R., Bisztray, T., Debbah, M.: CyberMetric: a benchmark dataset based on retrieval-augmented generation for evaluating LLMs in cybersecurity knowledge. In: 2024 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 296\u2013302. IEEE (2024)","DOI":"10.1109\/CSR61664.2024.10679494"},{"issue":"1","key":"1_CR38","first-page":"70","volume":"34","author":"G Towhidi","year":"2023","unstructured":"Towhidi, G., Pridmore, J.: Aligning cybersecurity in higher education with industry needs. J. Inf. Syst. Educ. 34(1), 70\u201383 (2023)","journal-title":"J. Inf. Syst. Educ."},{"key":"1_CR39","doi-asserted-by":"crossref","unstructured":"Wang, R.E., Demszky, D.: Is ChatGPT a good teacher coach? Measuring zero-shot performance for scoring and providing actionable insights on classroom instruction. arXiv preprint arXiv:2306.03090 (2023)","DOI":"10.35542\/osf.io\/5vrby"},{"key":"1_CR40","doi-asserted-by":"crossref","unstructured":"Wen, Q., et al.: AI for education (AI4EDU): advancing personalized education with LLM and adaptive learning. In: Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 6743\u20136744 (2024)","DOI":"10.1145\/3637528.3671498"},{"key":"1_CR41","unstructured":"Xu, H., et al.: Large language models for cyber security: A systematic literature review. arXiv preprint arXiv:2405.04760 (2024)"},{"key":"1_CR42","doi-asserted-by":"crossref","unstructured":"Yamin, M.M., Hashmi, E., Ullah, M., Katt, B.: Applications of LLMs for generating cyber security exercise scenarios (2024)","DOI":"10.21203\/rs.3.rs-3970015\/v1"},{"issue":"1","key":"1_CR43","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1111\/bjet.13370","volume":"55","author":"L Yan","year":"2024","unstructured":"Yan, L., et al.: Practical and ethical challenges of large language models in education: a systematic scoping review. Br. J. Edu. Technol. 55(1), 90\u2013112 (2024)","journal-title":"Br. J. Edu. Technol."},{"key":"1_CR44","doi-asserted-by":"crossref","unstructured":"Zhang, J., Bu, H., Wen, H., Chen, Y., Li, L., Zhu, H.: When LLMs meet cybersecurity: A systematic literature review. arXiv preprint arXiv:2405.03644 (2024)","DOI":"10.1186\/s42400-025-00361-w"},{"issue":"1","key":"1_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3427920","volume":"54","author":"L Zhang-Kennedy","year":"2021","unstructured":"Zhang-Kennedy, L., Chiasson, S.: A systematic review of multimedia tools for cybersecurity awareness and education. ACM Comput. Surv. (CSUR) 54(1), 1\u201339 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"}],"container-title":["Lecture Notes in Computer Science","Data Science: Foundations and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-8295-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T17:47:40Z","timestamp":1750355260000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-8295-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819682942","9789819682959"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-8295-9_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"20 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pakdd2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}