Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (7)
- Kennesaw State University (4)
- California State University, San Bernardino (2)
- University of Tennessee, Knoxville (2)
- City University of New York (CUNY) (1)
-
- Claremont Colleges (1)
- Embry-Riddle Aeronautical University (1)
- Florida International University (1)
- Georgia State University (1)
- Purdue University (1)
- SIT Graduate Institute/SIT Study Abroad (1)
- SelectedWorks (1)
- Singapore Management University (1)
- University at Albany, State University of New York (1)
- University of Cincinnati College of Law (1)
- University of Connecticut (1)
- Virginia Community College System (1)
- Publication Year
- Publication
-
- George H Baker (4)
- Journal of Cybersecurity Education, Research and Practice (4)
- International Journal of Nuclear Security (2)
- Maurice Dawson (2)
- Business/Business Administration (1)
-
- Communications of the IIMA (1)
- Computer Information Systems Faculty Publications (1)
- Dylan Kissane (1)
- Faculty Articles and Other Publications (1)
- Honors Scholar Theses (1)
- Hospitality Review (1)
- Independent Study Project (ISP) Collection (1)
- Inquiry: The Journal of the Virginia Community Colleges (1)
- International Journal of Aviation, Aeronautics, and Aerospace (1)
- Journal of Humanistic Mathematics (1)
- Journal of International Technology and Information Management (1)
- PPRI Digital Library (1)
- Publications and Research (1)
- Research Collection School Of Accountancy (1)
- Todd A Finkle (1)
- Publication Type
Articles 1 - 28 of 28
Full-Text Articles in Entire DC Network
Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger
Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger
Journal of Cybersecurity Education, Research and Practice
This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through mentorship, collaboration, skill preparation, and other activities and touch points to increase students’ sense of belonging and connectedness in the cybersecurity profession. The goal of the project was focused on developing diverse, educated, and skilled cybersecurity personnel for employment within local industry and government to help curtail the current regional cybersecurity workforce gap that is emblematic of the lack of qualified cybersecurity personnel that presently exists nationwide. Emphasis throughout the project …
Towards A Domain – Specific Comparative Analysis Of Data Mining Tools, May Oo, Daniel Lozovikas, Ramesh Subramanian
Towards A Domain – Specific Comparative Analysis Of Data Mining Tools, May Oo, Daniel Lozovikas, Ramesh Subramanian
Communications of the IIMA
Advancement in technology has brought in widespread adoption and utilization of data mining tools. Successful implementation of data mining requires a careful assessment of the various data mining tools. Although several works have compared data mining tools based on usability, opensource, integrated data mining tools for statistical analysis, big/small scale, and data visualization, none of them has suggested the tools for various industry-sectors. This paper attempts to provide a comparative study of various data mining tools based on popularity and usage among various industry-sectors such as business, education, and healthcare. The factors used in the comparison are performance and scalability, …
Building A Society Of Trust: Innovation And The Future Of Youth Employment In Jordan, Pierre Cativiela
Building A Society Of Trust: Innovation And The Future Of Youth Employment In Jordan, Pierre Cativiela
Independent Study Project (ISP) Collection
The word startup is perhaps an unlikely word that comes to mind when discussing shifting dynamics in the Middle East – this is rapidly changing. In the past two decades, Arab entrepreneurs have emerged from across the region as key players in the paradigm of national economic visions. Within these plans, innovation will become the epicenter for public-private partnerships. Such collaboration will contribute to tackling youth unemployment, the region’s most pressing contemporary problem, as well as diversifying local economies. The research delves into the complexities and history of entrepreneurship in Jordan as one of the region’s pioneering nations, examining the …
An Analysis Of The Effectiveness Of Virtual Reality In Distance Learning, Rashana Weerasinghe
An Analysis Of The Effectiveness Of Virtual Reality In Distance Learning, Rashana Weerasinghe
Honors Scholar Theses
This study focuses on the applicability of emerging technologies in education. To explore this, our research was conducted through an “Intro To Emerging Technology” course taught by the OPIM Department at the University of Connecticut. The class meets in two modalities: virtual reality environment and video-conferencing platform. Our research explores the learning outcomes produced by the different classroom environments, seeking to better understand the impact of virtual reality in distance learning. The purpose of this is to identify and predict how virtual reality will be integrated into a distance learning environment and understand if it can be used as a …
Towards Pedagogy Supporting Ethics In Modelling, Marie Oldfield
Towards Pedagogy Supporting Ethics In Modelling, Marie Oldfield
Journal of Humanistic Mathematics
Education for concepts such as ethics and societal responsibility that are critical in building robust and applicable mathematical and statistical models do currently exist in isolation but have not been incorporated into the mainstream curricula at the school or university level. This is partially due to the split between fields (such as mathematics, statistics, and computer science) in an educational setting but also the speed with which education is able to keep up with industry and its requirements. I argue that principles and frameworks of socially responsible modelling should begin at school level and that this would mean that ethics …
Security Simulations In Undergraduate Education: A Review, Joseph Simpson, Aaron Brantly
Security Simulations In Undergraduate Education: A Review, Joseph Simpson, Aaron Brantly
Journal of Cybersecurity Education, Research and Practice
Several decades of research in simulation and gamification in higher education shows that simulations are highly effective in improving a range of outcomes for students including declarative knowledge and interest in the topic being taught. While there appears to be a broad array of options to provide education in an undergraduate setting related to security, no previous reviews have explored computer-based simulations covering all facets of security. Given the increasing importance and adoption of interdisciplinary educational programs, it is important to take stock of simulations as a tool to broaden the range of problems, perspectives, and solutions presented to students. …
Preparing Students For Digital Era Careers, Melissa Stange
Preparing Students For Digital Era Careers, Melissa Stange
Inquiry: The Journal of the Virginia Community Colleges
This paper will discuss why technical skills alone will not be enough for students to have successful careers in the digital age. Much of their success will hinge on critical soft skills, such as adaptability, inner strength, holistic thinking, and a collaborative spirit. Examples will be provided for inclusion with a computer science program, but in a way that is easily adaptable to other disciplines.
Proceedings Of The Cuny Games Conference 6.0, Robert O. Duncan, Joseph Bisz, Christina Boyle, Kathleen Offenholley, Maura A. Smale, Carolyn Stallard, Deborah Sturm
Proceedings Of The Cuny Games Conference 6.0, Robert O. Duncan, Joseph Bisz, Christina Boyle, Kathleen Offenholley, Maura A. Smale, Carolyn Stallard, Deborah Sturm
Publications and Research
The CUNY Games Network is an organization dedicated to encouraging research, scholarship and teaching in the developing field of games-based learning. We connect educators from every campus and discipline at CUNY and beyond who are interested in digital and non-digital games, simulations, and other forms of interactive teaching and inquiry-based learning. These proceedings summarize the CUNY Games Conference 6.0, where scholars shared research findings at a three-day event to promote and discuss game-based pedagogy in higher education. Presenters could share findings in oral presentations, posters, demos, or play testing sessions. The conference also included workshops on how to modify existing …
The Implementation Of A Cybersecurity Testbed For Education And Research, Elisabeth Dubois
The Implementation Of A Cybersecurity Testbed For Education And Research, Elisabeth Dubois
Business/Business Administration
The Cyber Innovation Lab brings with it the understanding and collection of the threats, vulnerabilities, and risks that one’s IT resources present. Due to the increasing complexity and degree of cyber threats, innovation regarding current attack vectors and defense mechanisms are needed. The lack of realistic threat landscapes and the need for accurate security analysis and defense strategies prompted the implementation of a cyber physical system for defensive research. The project depicts the processes to establish the testbed, the methodology used in classifying the architecture, threat and attack analysis, as well as preliminary results. The paper presents the testbed architecture …
Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis
Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis
Journal of Cybersecurity Education, Research and Practice
In this paper, we describe the need for and development of an introductory cyber security course. The course was designed for non-technical majors with the goal of increasing cyber security hygiene for an important segment of the population—college undergraduates. While the need for degree programs that focus on educating and training individuals for occupations in the ever-growing cyber security field is critically important, the need for improved cyber security hygiene from the average everyday person is of equal importance. This paper discusses the approach used, curriculum developed, results from two runs of the course, and frames the overall structure of …
Our Future Together Industry Perspectives: Future Of Professional Learning And Entrepreneurship, Poh Sun Seow, Pan, Gary, Clarence Goh, Kwong Sin Leong
Our Future Together Industry Perspectives: Future Of Professional Learning And Entrepreneurship, Poh Sun Seow, Pan, Gary, Clarence Goh, Kwong Sin Leong
Research Collection School Of Accountancy
This report 2017 marks the second collaboration between ISCA and ICAEW after the successful launch of “Our Future Together” report in 2016 to inspire professional accountants to critically think about what the future holds for Singapore and the accountancy profession. How should accountants embrace transformation in the digital age? How should learning be redefined for the accountancy profession? How can organisational culture encourage innovation and an enterprising spirit in accountants? This report aims to shape the discussion on how education, training and professional learning should be redefined to develop professional accountants who are future-ready, so that they can continue to …
Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia
Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia
Journal of Cybersecurity Education, Research and Practice
The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …
Status Of Nuclear Security Education And Research In Bangladesh And Looking Forward, Md. Shafiqul Islam, Md. Mobasher Ahmed
Status Of Nuclear Security Education And Research In Bangladesh And Looking Forward, Md. Shafiqul Islam, Md. Mobasher Ahmed
International Journal of Nuclear Security
Bangladesh uses category I of nuclear materials and category 1-5 of radioactive materials in the field of research, medical and industries. The Government is going to implement its first nuclear power plant under an IGA between the Bangladesh and Russian Governments. With the emerging global nuclear and radiological terrorism by potential adversaries, enhancing nuclear security is the paramount importance for the country. The paper has found no established communication channels among stakeholders in order to work in a coordinated and collaborative manner for strengthening the nuclear security. This has resulted lacking importance of education, research, training and knowledge management initiatives …
Experiences With Teaching Nuclear Security Professional Development Courses For Health Physicists, Edward Waller, Jason Timothy Harris, Craig Marianno
Experiences With Teaching Nuclear Security Professional Development Courses For Health Physicists, Edward Waller, Jason Timothy Harris, Craig Marianno
International Journal of Nuclear Security
Health physicists are professionals that are experts in the recognition, evaluation, and control of health hazards to permit the safe use and application of radiation. They typically have broad knowledge in radiation (ionizing and non-ionizing), biology, ecology and safety. With this wealth expertise we believe the health physicists would be useful partners in an effective security culture. As such over three years, a total of seven professional enrichment courses have been offered by the authors to health physics and radiation protection professionals, both nationally and internationally. Five have been through the Health Physics Society meetings, one through the International Radiation …
Foreword: Twenty-Eighth Annual Corporate Law Symposium: Rethinking Compliance, Felix B. Chang
Foreword: Twenty-Eighth Annual Corporate Law Symposium: Rethinking Compliance, Felix B. Chang
Faculty Articles and Other Publications
The University of Cincinnati College of Law devoted its 28th Annual Corporate Law Center Symposium to compliance. It was a timely choice, coinciding not only with an explosion of sector regulation in recent years but also with shifting market realities for legal employment and legal education. The Dodd-Frank Wall Street Reform and Consumer Protection Act (“Dodd-Frank”) and the Patient Protection and Affordable Care Act are two prominent examples of major legislation that has added—and will continue to add—to compliance obligations for broad swathes of industries. Meanwhile, the financial crisis has spurred profound transformations in legal employment, including cutbacks in entry …
A Cross-Sectional Investigation Of The Relationships Education, Certification, And Experience Have With Knowledge, Skills, And Abilities Among Aviation Professionals, Daryl Watkins, Jason M. Newcomer, Matthew P. Earnhardt, James W. Marion, Rose A. Opengart, Aaron M. Glassman
A Cross-Sectional Investigation Of The Relationships Education, Certification, And Experience Have With Knowledge, Skills, And Abilities Among Aviation Professionals, Daryl Watkins, Jason M. Newcomer, Matthew P. Earnhardt, James W. Marion, Rose A. Opengart, Aaron M. Glassman
International Journal of Aviation, Aeronautics, and Aerospace
The aviation industry is a complex system with many different segments and as such, makes hiring the right person a complicated endeavor. Previous research suggested that knowledge, skills, and abilities (KSAs) are composed of elements that include education, certification, and experience (ECE). The relative importance of ECE is dependent on the type of job within the aviation sector. The objective of this mixed-methods concurrent triangulation study was to examine aviation industry professionals’ perceived relationship between their ECE and the development of their KSAs. The convenience sample consisted of 404 professionals in the aviation industry who completed the KSA Composite Measure …
A Concept Paper On Networks Of Excellence For Research And Education, Suresh V. Garimella, David B. Janes, Anne Slaughter Andrew
A Concept Paper On Networks Of Excellence For Research And Education, Suresh V. Garimella, David B. Janes, Anne Slaughter Andrew
PPRI Digital Library
Research and education ecosystems, foundational components of knowledge-based economies, are relatively underdeveloped in Latin America. The entire ecosystem of a research university — including resources, corporate partnerships, and research — must capitalize on a symbiosis between the research, education and commercialization missions. A university cannot transform unilaterally nor can universities sustain the required transformation without government and industry participation. Initiatives to accelerate the development of research university ecosystems are critical for the realization of knowledge-based economies and resilient civil societies.
To accelerate the development of research and education ecosystems across the Americas, the authors propose to establish “Networks of Excellence” …
Do Moocs Pose A Threat To Higher Education?, Todd A. Finkle, Evan Masters
Do Moocs Pose A Threat To Higher Education?, Todd A. Finkle, Evan Masters
Todd A Finkle
The Credibility Crisis In Is: A Global Stakeholder Perspective, Clayton Arlen Looney, David Firth, Hope Koch, Dubravka Cecez-Kecmanovic, J.J. Po-An Hsieh, Christina Soh, Joseph S. Valacich, Edgar Whitley
The Credibility Crisis In Is: A Global Stakeholder Perspective, Clayton Arlen Looney, David Firth, Hope Koch, Dubravka Cecez-Kecmanovic, J.J. Po-An Hsieh, Christina Soh, Joseph S. Valacich, Edgar Whitley
Computer Information Systems Faculty Publications
The field of information systems (IS) faces a credibility crisis, which threatens its stature as a highly-respected academic discipline (Firth, King, Koch, Looney, Pavlou, and Trauth, 2011; Winter and Butler, 2011; among others). This article summarizes a panel discussion at the ICIS 2011 Conference, where a group of distinguished IS professors offered their unique perspectives on the challenges, origins, and solutions related to the global credibility crisis in IS. Using stakeholder theory as an organizing framework, the panel session identifies the key stakeholders influencing the credibility of the IS discipline, as well as the challenges and opportunities facing IS programs …
Extending And Accelerating Global Business-Education Partnerships, Dylan Kissane, John Farrell
Extending And Accelerating Global Business-Education Partnerships, Dylan Kissane, John Farrell
Dylan Kissane
Senior management in contemporary graduate business education must respond are the trends that are leaving a marked impact on the traditional business models of business schools. Key stakeholders in the business education ecosystem, including the students, the corporate employers and the business schools themselves, demand more of graduate education in order that their respective careers flourish, future employees have the requisite skills and experience, and business education institutions survive. Yet as in any system, survival is but a minimum requirement; successful programs seek not only to survive but to thrive, embracing the change that these three trends place on graduate …
Open Source Software To Enhance The Stem Learning Environment, Maurice E. Dawson Jr., Imad Al Saeed, Jorja Wright, Festus Onyegbula
Open Source Software To Enhance The Stem Learning Environment, Maurice E. Dawson Jr., Imad Al Saeed, Jorja Wright, Festus Onyegbula
Maurice Dawson
This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to …
Use Of Open Source Software And Virtualization In Academia To Enhance Higher Education Everywhere, Maurice E. Dawson Jr., Imad Al Saeed
Use Of Open Source Software And Virtualization In Academia To Enhance Higher Education Everywhere, Maurice E. Dawson Jr., Imad Al Saeed
Maurice Dawson
As costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow students. To do this effectively, professors and administrative staff should push toward the utilization of Open Source Software (OSS) and virtual tools to enhance or supplement currently available tools. In developing countries, OSS applications would allow students the ability to learn critical technological skills for success at small fraction of the cost. OSS also provides faculty members the ability to dissect source code and prepare students for low-level software development. It is critical that all institutions look at alternatives …
Risk-Based Critical Infrastructure Priorities For Emp And Solar Storms, George H. Baker Iii
Risk-Based Critical Infrastructure Priorities For Emp And Solar Storms, George H. Baker Iii
George H Baker
Two electromagnetic phenomena have the potential to create continental-scale disasters. The first, nuclear electromagnetic pulse (EMP), results from a nuclear detonation high above the tropopause. The second, a major solar storm, or "solar tsunami" occurs naturally when an intense wave of charged particles from the sun perturbs the earth's magnetic field. Both phenomena can debilitate electrical and electronic systems necessary for the operation of infrastructure systems and services. One reason why a U.S. protection program has yet to be initiated is that policy makers continue to wrestle with the question of where to begin, given the Department of Homeland Security’s …
Proceedings Of The 2009 Nrc Federal Facilities Council/James Madison University Symposium On Protecting Large Facility Complexes;, George H. Baker, Cheryl E. Wilkins
Proceedings Of The 2009 Nrc Federal Facilities Council/James Madison University Symposium On Protecting Large Facility Complexes;, George H. Baker, Cheryl E. Wilkins
George H Baker
Large, complex facilities pose unique protection challenges involving multidisciplinary expertise and collaboration among government, academia, and the private sector. The symposium served as a forum for sharing experiences in dealing with large facility catastrophic events and risk management. The symposium was organized based on the value of interaction among different people representing diverse disciplines. In many instances, such interactions lead to solutions that would not have been developed within disciplinary stovepipes. The venue was divided into three panels addressing physical security, cyber security, and real facility case studies. We were also privileged to have three keynote speakers including Dr. Charles …
Rapid Development Of Multimedia Instructional Modules For Information Technology Education, Nanda Ganesan
Rapid Development Of Multimedia Instructional Modules For Information Technology Education, Nanda Ganesan
Journal of International Technology and Information Management
A multifaceted learning model was developed for implementing e-learning in a largely commuter campus. The primary objective of the model was to build a flexible learning environment that combined the learning effectiveness of in-class learning with the flexibility and accessibility of online learning. One of the components of the model was the multimedia instructional modules produced to teach various Information Technology courses. Several different types of modules were produced representing chalk-and-talk type of lectures, PowerPoint presentations and software tutorials. The chalk-and-talk type of lecture modules and the software tutorials that emulated the in-class learning experience contributed positively towards enhancing the …
Homeland Security: Fostering Public-Private Partnerships, George H. Baker, Cheryl J. Elliott
Homeland Security: Fostering Public-Private Partnerships, George H. Baker, Cheryl J. Elliott
George H Baker
Recent U.S. high consequence events have clarified the importance of government collaboration with industry. The benefit of such collaboration was one of the most important lessons learned from Hurricane Katrina. The resources owned and controlled by American industry dwarf those available to local, state and even the federal government departments. Better agreements and incentives to bring the full capabilities of industry squarely into the national response agenda will be indispensable in effectively responding to large-scale catastrophes. At our 2007 Symposium, General Russel Honoré, who led the National Guard response to Katrina stated, “We need the partnering between local, state, and …
Cascading Infrastructure Failures: Avoidance And Response, George H. Baker, Cheryl J. Elliott
Cascading Infrastructure Failures: Avoidance And Response, George H. Baker, Cheryl J. Elliott
George H Baker
No critical infrastructure is self-sufficient. The complexity inherent in the interdependent nature of infrastructure systems complicates planning and preparedness for system failures. Recent wide-scale disruption of infrastructure on the Gulf Coast due to weather, and in the Northeast due to electric power network failures, dramatically illustrate the problems associated with mitigating cascading effects and responding to cascading infrastructure failures once they have occurred.
The major challenge associated with preparedness for cascading failures is that they transcend system, corporate, and political boundaries and necessitate coordination among multiple, disparate experts and authorities. This symposium brought together concerned communities including government and industry …
Advances In Hospitality Education: Courseware, Audiographics, And Cyberspace, Michael L. Kasavana
Advances In Hospitality Education: Courseware, Audiographics, And Cyberspace, Michael L. Kasavana
Hospitality Review
Technology will play an increasingly larger role in the education of students within the hospitality curriculum. There are a significant number of emerging educational technologies aimed at changing the delivery of the entire curriculum. The development of technological platforms for multimedia instructional courseware, distance learning through audiographics, and virtual reality simulation are expected to alter and enhance the learning process while extending the boundaries of the traditional hospitality classroom.