Resources & Further Reading

Annotated Bibliography for Human-AI Partnership in Cybersecurity Education

This collection supports educators implementing human-AI partnership approaches in cybersecurity education. Each entry includes practical context for K-12 classroom application.

TipQuick Start: Essential Reading

New to this approach? Start with these three:

  1. Adams & Thompson (2016) — Practical heuristics for posthuman inquiry in education
  2. Newhouse et al. (2017) — The NICE Framework foundation document
  3. CYBER.org Standards — K-12 cybersecurity learning progressions

Why “Partnership” Language?

Industry professionals typically say they “use AI tools.” We deliberately chose different language—and understanding why matters for teaching.

The Problem with “Tool Use” Framing

When we say “I use a tool,” we imply:

  • The human is fully in control
  • The tool is passive until activated
  • Agency flows one direction: human → tool
  • The human remains unchanged by the interaction

But this isn’t what actually happens in cybersecurity operations.

What’s Really Happening in a SOC

Consider a Security Operations Center analyst working with a SIEM (Security Information and Event Management) system:

  1. The SIEM shapes perception — Before the analyst sees anything, the system has already decided what counts as “suspicious.” Thousands of events are filtered, correlated, and prioritized. The analyst’s awareness is bounded by what the tool surfaces.

  2. The analyst adapts to the tool — Experienced analysts learn to “think like the SIEM”—understanding its detection logic, anticipating its blind spots, structuring their investigations around its capabilities.

  3. Agency is distributed — When a threat is detected, who found it? The analyst who investigated? The SIEM that flagged it? The rule-writer who configured the detection? The answer is: the assemblage of all of them together.

  4. Neither succeeds alone — The SIEM can’t understand context, institutional knowledge, or human factors. The analyst can’t process millions of log entries. Together, they accomplish what neither could individually.

Why This Matters for Education

Teaching students that they “use AI tools” sets up a false mental model that will fail them in professional practice. They’ll either:

  • Over-rely on AI (assuming it “handles” security while they “use” it)
  • Under-utilize AI (treating it as a simple lookup tool rather than an investigative partner)
  • Miss the mutual shaping (not recognizing how AI recommendations influence their perception)

The “partnership” framing we use throughout these activities isn’t merely aspirational—it’s preparation for the actual cognitive work of modern cybersecurity operations.

Theoretical Foundation

This approach draws from posthuman educational theory, particularly:

  • Rosi Braidotti’s work on human-technology entanglement and distributed agency
  • Catherine Adams and Terrie Lynn Thompson’s practical heuristics for examining how digital technologies shape human perception and practice—what they call “interviewing” digital objects to understand their contributions to our work

These theoretical insights translate directly into developing cybersecurity expertise. When students learn to see AI as a partner with distinct capabilities, limitations, and influence on their own thinking, they’re developing the meta-cognitive awareness that distinguishes expert practitioners.

NoteFor Further Reading

The references in the Human-AI Collaboration & Posthuman Pedagogy section below provide deeper theoretical grounding for this approach.

Human-AI Collaboration & Posthuman Pedagogy

These works provide theoretical and practical foundations for understanding humans and AI as collaborative partners rather than tool-user relationships.

Researching a Posthuman World: Interviews with Digital Objects

Adams, C., & Thompson, T. L. (2016). Researching a Posthuman World: Interviews with Digital Objects. Palgrave Pivot.

Empirical

Why This Matters: Introduces eight practical heuristics for investigating human-technology relationships in educational settings. The “interviewing objects” approach directly informs how we frame AI as a team member with its own capabilities and limitations—exactly the perspective these activities develop in students.

Publisher Link

The Posthuman

Braidotti, R. (2013). The Posthuman. Polity Press.

Theoretical

Why This Matters: Foundational text redefining what it means to be human in an age of technological entanglement. Braidotti’s framework helps educators move beyond anthropocentric assumptions—essential for teaching students that effective cybersecurity emerges from human-AI assemblages, not human dominance over tools.

Publisher Link

Artificial Intelligence in Education: Promises and Implications for Teaching and Learning

Holmes, W., Bialik, M., & Fadel, C. (2019). Artificial Intelligence in Education: Promises and Implications for Teaching and Learning. Center for Curriculum Redesign.

Framework

Why This Matters: Comprehensive examination of AI’s role in education with practical implications for classroom implementation. Addresses both opportunities and challenges educators face when integrating AI, including equity considerations relevant to the low-resource implementation options in these activities.

Publisher Link

Designing Educational Technologies in the Age of AI

Luckin, R., & Cukurova, M. (2019). Designing educational technologies in the age of AI: A learning sciences-driven approach. British Journal of Educational Technology, 50(6), 2824-2838.

Empirical

Why This Matters: Establishes design principles for educational AI that positions technology as a collaborative partner. Their framework for “intelligence augmentation” aligns directly with the partnership model in these activities, where AI contributes pattern recognition while humans provide contextual judgment.

DOI: 10.1111/bjet.12861

Posthumanism and Educational Research

Snaza, N., & Weaver, J. A. (Eds.). (2014). Posthumanism and Educational Research. Routledge.

Theoretical

Why This Matters: Collection exploring how posthumanist theory transforms educational practice. Multiple chapters address technology-mediated learning and challenge traditional human-centered pedagogies—providing theoretical grounding for why “AI as teammate” represents a more accurate and productive framing than “AI as tool.”

Publisher Link

Cybersecurity Education Research

Research and frameworks specifically addressing cybersecurity education, including K-12 approaches, hands-on learning, and workforce development.

K-12 Cybersecurity Learning Standards

CYBER.org. (2021). K-12 Cybersecurity Learning Standards (Version 1.0).

Official

Why This Matters: The definitive K-12 standards document that these activities align with. Provides grade-band progressions and learning objectives that educators can use to connect activities to curriculum requirements. Essential reference for understanding scope and sequence in cybersecurity education.

CYBER.org Standards

Cybersecurity Education in K-12: An Exploratory Study

Catota, F. E., Morgan, M. G., & Sicker, D. C. (2019). Cybersecurity education in a developing nation: The Ecuadorian environment. Journal of Cybersecurity, 5(1), tyz001.

Empirical

Why This Matters: Though focused on Ecuador, this study provides transferable insights into adapting cybersecurity education for resource-constrained environments—relevant for educators implementing these activities in schools with limited technology access.

DOI: 10.1093/cybsec/tyz001

Integrating Social Engineering into Cybersecurity Curricula

Mitnick, K. D., & Simon, W. L. (2002). The Art of Deception: Controlling the Human Element of Security. Wiley.

Framework

Why This Matters: Classic text on the human factors in cybersecurity that AI systems cannot fully address. Understanding social engineering—where human judgment is essential—helps explain why AI remains a partner rather than replacement in security operations, a key concept in Activity 2 (Ethics in Automated Security).

Publisher Link

NICE Framework & Workforce Standards

Official standards and research connecting cybersecurity education to workforce development and career pathways.

NICE Framework (NIST SP 800-181)

Newhouse, W., Keith, S., Scribner, B., & Witte, G. (2017). National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NIST Special Publication 800-181). National Institute of Standards and Technology.

Official

Why This Matters: The foundational workforce framework that these activities explicitly align with. Defines Work Roles, Knowledge areas, Skills, and Abilities that map directly to activity learning objectives. Essential for CTE programs and anyone connecting K-12 activities to career pathways.

NIST SP 800-181

NICE Framework Work Role Categories

NICE. (2025). NICE Framework Work Roles (Version 2.0.0). National Institute of Standards and Technology.

Official

Why This Matters: The 2025 update reorganizes work roles into five categories (Oversight and Governance, Design and Development, Implementation and Operation, Protection and Defense, Investigation) and better reflects current workforce needs, including emerging human-AI collaboration requirements. Activities reference Work Roles including Defensive Cybersecurity, Incident Response, and Cybersecurity Policy and Planning from this updated framework.

NICE Framework

Cybersecurity Workforce Development: A Capability Maturity Model

Hoffman, L. J., Burley, D. L., & Toregas, C. (2012). Holistically building the cybersecurity workforce. IEEE Security & Privacy, 10(2), 33-39.

Framework

Why This Matters: Addresses the systemic challenges in developing cybersecurity talent pipelines. Their maturity model helps educators understand how K-12 activities contribute to long-term workforce development—useful for grant writing and program justification.

DOI: 10.1109/MSP.2011.181

From K-12 to Career: Building Cybersecurity Talent Pipelines

Tobey, D., Pusey, P., & Burley, D. (2014). Engaging learners in cybersecurity careers: Lessons from the launch of the National Cyber League. ACM Inroads, 5(1), 53-56.

Empirical

Why This Matters: Demonstrates effective approaches for engaging students in cybersecurity career pathways through competition and collaboration. The team-based, scenario-driven approaches they validate align with the design of these activities.

DOI: 10.1145/2568195.2568213

The Cybersecurity Talent Gap

(ISC)². (2023). Cybersecurity Workforce Study. International Information System Security Certification Consortium.

Official

Why This Matters: Annual industry report documenting the persistent cybersecurity workforce shortage. Provides compelling data for justifying K-12 cybersecurity education programs and explaining why human-AI collaboration skills are increasingly valued by employers.

(ISC)² Research

How to Use These Resources

For Curriculum Development

Start with the CYBER.org Standards and NICE Framework to establish learning objectives, then draw on the pedagogical research to inform activity design.

For Grant Writing

The workforce development references (Hoffman et al., ISC² reports) provide evidence for program justification. The educational research supports methodology choices.

For Theoretical Grounding

If you’re writing about or presenting on these activities, the posthuman/collaboration literature (Adams & Thompson, Braidotti, Luckin & Cukurova) provides scholarly context for the human-AI partnership framing.

For Practical Implementation

The hands-on learning resources (Catota et al., Mitnick & Simon) offer concrete guidance for structuring technology-based learning experiences.

NoteSuggest a Resource

Know of a resource that should be included here? Contact ryanstraight@arizona.edu with your suggestion.