  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Journal of Cybersecurity and Information Management</full_title>
  <abbrev_title>JCIM</abbrev_title>
  <issn media_type="print">2690-6775</issn>
  <issn media_type="electronic">2769-7851</issn>
  <doi_data>
   <doi>10.54216/JCIM</doi>
   <resource>https://www.americaspg.com/journals/show/3403</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>Type-2 Neutrosophic Ontology for Automated Essays Scoring in Cybersecurity Education</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Computer Science and Information Technology, University of Wasit, Al Kut 52001, Iraq</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>Oday</given_name>
    <surname>Oday</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Computer Department, College of Education for Pure Sciences, Wasit University, 52001 Al-Kut, Wasit, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Esraa Saleh</given_name>
    <surname>Alomari</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">University of Information Technology and Communication, Baghdad, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Ali Nafea</given_name>
    <surname>Yousif</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Ministry of Education, Wasit Education Directorate, Kut 52001, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Oday Ali</given_name>
    <surname>Hassen</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Information Technology, Institute of Graduate Studies and Research, Alexandria University, Egypt</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Saad M.</given_name>
    <surname>Darwish</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Director of the Institute of Automation and information technology, Tambov State technical university, Russia</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Yu Yu</given_name>
    <surname>Gromov</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>Given the growing demand for cybersecurity education, the practice of protecting network and software systems from digital and electronic attacks, investing in educational cybersecurity helps significantly reduce the risk of data breaches and protect against security breaches, and given the urgent need and growing number of students worldwide, it is also a way to connect with and between customers by building trust-based relationships, especially regarding essays. Automated Essay Scoring (AES) is a scalable solution for grading large amounts of essays with multiple uses, making it ideal for cybersecurity certification programs, online courses, and standardized tests. In the field of educational cybersecurity, automated essay scoring poses unique challenges due to specialized terminology, persistent and evolving threats. These automated scoring systems use domain-defined ontologies to grade essays but struggle to manage uncertainties, such as ambiguous language and partially valid arguments, which can influence the accuracy of their scoring. Traditional ontologies often struggle to interpret such uncertainties, leading to inconsistent results. Type 2 neutrosophic clustering (T2NS) as a novel approach introduced in this paper is combined with an automated article scoring system based on the cybersecurity learning ontology to address these challenges. The main steps include extracting concepts relevant to this research area from the articles, formalizing the cybersecurity scoring criteria as ontological rules and extending the ontology using T2NS, as well as defining membership functions to measure uncertainty and inconsistency levels. This evaluation using benchmark datasets of cybersecurity articles shows that this approach significantly enhances the scoring reliability and robustness of the approach compared to the basic AES methods.&#13;
 </jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2025</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2025</year>
  </publication_date>
  <pages>
   <first_page>293</first_page>
   <last_page>304</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/JCIM.150222</doi>
   <resource>https://www.americaspg.com/articleinfo/2/show/3403</resource>
  </doi_data>
 </journal_article>
</journal>
