Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Entire DC Network

Docker Technology For Small Scenario-Based Excercises In Cybersecurity, Zeinab Ahmed Oct 2023

Docker Technology For Small Scenario-Based Excercises In Cybersecurity, Zeinab Ahmed

Theses and Dissertations

This study aims to better prepare students for cybersecurity roles by providing practical tools that bridge the gap between theory and real-world applications. We investigate the role of small scenario-based exercises for students’ understanding of cybersecurity concepts. In particular, we assess the use of Docker technology to deliver training that includes a simple small scenario on html code injection. The effectiveness of scenario-based learning has long been defined and by using SBL, we are going to create hands-on activity that involves the fundamental topics in cybersecurity using Docker technology, allowing students to see the exploitation of the vulnerabilities and defense …


Exploring Different Mediums For Teaching Programming And Cybersecurity In Primary And Secondary Schools, Andrew R. Youngstrom Jan 2023

Exploring Different Mediums For Teaching Programming And Cybersecurity In Primary And Secondary Schools, Andrew R. Youngstrom

Dissertations, Master's Theses and Master's Reports

Cybersecurity and programming are becoming more and more prominent in today’s world. It is beneficial to begin teaching these topics to students at a younger age. Additionally, we see students in primary and secondary schools struggling to maintain focus in class as attention spans shrink. This paper looks at different drone models to see if any of them could be sufficient solutions to be implemented into primary and secondary schools to teach cybersecurity and programming topics to students. Besides teaching capabilities, drones must also be affordable for institutions and simple enough to construct, configure, and operate so that a teacher …


Curriculum Development In Technical Education For Boys And Girls Club, Damanpreet Singh Dec 2022

Curriculum Development In Technical Education For Boys And Girls Club, Damanpreet Singh

Culminating Experience Projects

Technical education has been and will continue to be more and more important to succeed in the future. The Boys and Girls Club, founded in 1860, is a national organization of local chapters which provide voluntary after-school programs for young individuals. The Boys and Girls Club have life-changing programs that prepare the young individuals in the club for their future whether it’s for college, career, or life. The perfect way to prepare best prepare these kids for the future is to develop their technical education. Unfortunately, the boys and girls club of Muskegon has a lack of educational resources for …


Adaptive Pedagogy Framework For Risk Management, Incident Response And Disaster Recovery Education, Hsiao-An Wang Jul 2022

Adaptive Pedagogy Framework For Risk Management, Incident Response And Disaster Recovery Education, Hsiao-An Wang

Dissertations (1934 -)

The field of Cybersecurity, both in cybersecurity education and cybersecurity workforce demands, has been growing steadily as the dangers of cyber-threats continue to rise. The gap between the supply and demand of the cybersecurity workforce has been widening throughout the past decade. In response to the increased demand, many government agencies have actively engaged in collaborative efforts with higher education institutions to produce more capable graduates to address the need. However, with the various educational utilities available to instructors, few utilities offer content related to risk management, incident response, and disaster recovery practices. Furthermore, many students lack the awareness to …


The Marshmallow Lab: A Project-Based Approach To Understanding Functional Responses, Melissa Pulley May 2020

The Marshmallow Lab: A Project-Based Approach To Understanding Functional Responses, Melissa Pulley

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

This paper presents a three-part lesson plan to improve student’s understanding of Holling’s type II functional response model. This model describes the interaction between a predator and how much it is able to consume given a constant number of prey. According to the model, while increased availability of prey allows predators to consume portionately more prey for low values, after some number of prey, predators will only be able to capture a limited number of prey even as the prey continues to increase. This phenomenon is known as saturation. Holling first develop this important ecological theory through his “disc experiment” …


Information Security Ambassadors’ Perceptions Of Peer-Led Motivation In Phishing Detection, Kingkane Malmquist Jan 2020

Information Security Ambassadors’ Perceptions Of Peer-Led Motivation In Phishing Detection, Kingkane Malmquist

Walden Dissertations and Doctoral Studies

Phishing rates are increasing yearly and continue to compromise data integrity. The need to guard business information is vital for organizations to meet their business objectives and legal obligations. The purpose of this phenomenological study was to explore security ambassadors’ perceptions of motivating their peers to adopt safe internet behaviors in a large medical campus in Minnesota. Hackman and Oldham’s job characteristic motivation theory was used to frame the study. Data were collected from semistructured interviews with 20 security ambassadors. Data coding and analysis yielded 7 themes: rewarding, value, personal interest, limited information security knowledge, increased interest, communication, and topics …


The Arts And Technology: How Educational Technology Can Bring Humanities Further Into Elementary And Primary School Systems, Coleman D. Alameda May 2018

The Arts And Technology: How Educational Technology Can Bring Humanities Further Into Elementary And Primary School Systems, Coleman D. Alameda

Senior Theses

As the world becomes more inclined to implement technology in nearly every aspect of society, the United States Department of Education must find a way to incorporate new styles of modern and high-tech teaching without pushing out certain subjects from its curriculum. I believe technology can be used to bring the Humanities further into the classroom. In today’s society American education programs are desperately trying to make up for subpar primary school scores in mathematics and science. According to the government accredited international education forum (the Organization for Economic Co-operation and Development) the United States was found to be below …


Cybersecurity In The Classroom: Bridging The Gap Between Computer Access And Online Safety, Andrew Malecki Jan 2018

Cybersecurity In The Classroom: Bridging The Gap Between Computer Access And Online Safety, Andrew Malecki

Cyber Security Capstone Research Project Reports

According to ISACA, there will be a global shortage of 2 million cybersecurity professionals worldwide by 2019. Additionally, according to Experian Data Breach Resolution, as much as 80% of all network breaches can be traced to employee negligence. These problems will not solve themselves, and they likewise won’t improve without drastic action. An effort needs to be made to help direct interested and qualified individuals to the field of cybersecurity to move toward closing this gap. Moreover, steps need to be made to better inform the public of general safety measures while online, including the safeguarding of sensitive information.

A …


A Study Of Mathematics Achievement, Placement, And Graduation Of Engineering Students, Sara Hahler Blazek Jan 2017

A Study Of Mathematics Achievement, Placement, And Graduation Of Engineering Students, Sara Hahler Blazek

Doctoral Dissertations

The purpose of this study was to determine how background knowledge impacts freshmen engineering students' success at Louisiana Tech University in terms of grades in two different freshman classes and graduation. To determine what factors impact students, three different studies were implemented. The first study used linear regression to analyze which demographic and academic variables significantly impacted freshman math and engineering courses. Using regression discontinuity, the second study determined if the university's placement requirement for Pre-Calculus was appropriate. The final study analyzed factors that impact graduation for engineering students as well as other disciplines to determine which significant variables were …


Design And Evaluation Of The Impact Of A Multi-Agent Control System (Framework) Applied To A Social Setting, Perez Antonio Perez Jan 2016

Design And Evaluation Of The Impact Of A Multi-Agent Control System (Framework) Applied To A Social Setting, Perez Antonio Perez

Open Access Theses & Dissertations

The objective of this research is to design and analyze the performance of a new mechanism to improve the advising of students in a nontraditional environment. This nontraditional environment includes: a minority serving, commuter campus with a high percentage of transfer students. Specifically, these demographics are unable to keep a tightly controlled cohort of students flowing through to the completion of the curriculum. Students in these circumstances usually have varied course loads and competing priorities due to family and financial needs or other societal responsibilities. Therefore, there is a need for an individualized approach to advising.

University administrations face challenges …


Intrusion Detection System Of Industrial Control Networks Using Network Telemetry, Stanislav Ponomarev Jul 2015

Intrusion Detection System Of Industrial Control Networks Using Network Telemetry, Stanislav Ponomarev

Doctoral Dissertations

Industrial Control Systems (ICSs) are designed, implemented, and deployed in most major spheres of production, business, and entertainment. ICSs are commonly split into two subsystems - Programmable Logic Controllers (PLCs) and Supervisory Control And Data Acquisition (SCADA) systems - to achieve high safety, allow engineers to observe states of an ICS, and perform various configuration updates. Before wide adoption of the Internet, ICSs used "air-gap" security measures, where the ICS network was isolated from other networks, including the Internet, by a physical disconnect [1]. This level of security allowed ICS protocol designers to concentrate on the availability and safety of …


An Extensible Technology Framework For Cyber Security Education, Frank Jordan Sheen Apr 2015

An Extensible Technology Framework For Cyber Security Education, Frank Jordan Sheen

Theses and Dissertations

Cyber security education has evolved over the last decade to include new methods of teaching and technology to prepare students. Instructors in this field of study often deal with a subject matter that has rigid principles, but changing ways of applying those principles. This makes maintaining courses difficult. This case study explored the kind of teaching methods, technology, and means used to explain these concepts. This study shows that generally, cyber security courses require more time to keep up to date. It also evaluates one effort, the NxSecLab, on how it attempted to relieve the administrative issues in teaching these …


Building Cloud-Based Information Systems Lab Architecture: Deriving Design Principles That Facilitate The Effective Construction And Evaluation Of A Cloud-Based Lab Environment, Thomas J. Trevethan Jan 2015

Building Cloud-Based Information Systems Lab Architecture: Deriving Design Principles That Facilitate The Effective Construction And Evaluation Of A Cloud-Based Lab Environment, Thomas J. Trevethan

CCE Theses and Dissertations

The problem explored in this dissertation report was that at the time of this study, there were no design principles or methodologies based on design science research (DSR) available to use for artifact construction, implementation, and effective evaluation of cloud-based networking lab environments that can be used to foster hands-on technology skills in students. Primarily based on Hevner’s 7 guidelines of DSR, Peffer’s design science research methodology (DSRM), and Gregor’s IS design theory, this study forms the groundwork for the development of procedures and specifications derived from DSR literature to facilitate the construction, implementation, and evaluation of a comprehensive cloud-based …


Impact Of A Visual Programming Experience On The Attitude Toward Programming Of Introductory Undergraduate Students, Saurabh Godbole Oct 2014

Impact Of A Visual Programming Experience On The Attitude Toward Programming Of Introductory Undergraduate Students, Saurabh Godbole

Open Access Theses

Traditionally, textual tools have been utilized to teach basic programming languages and paradigms. Research has shown that students tend to be visual learners. Using flowcharts, students can quickly understand the logic of their programs and visualize the flow of commands in the algorithm. Moreover, applying programming to physical systems through the use of a microcontroller to facilitate this type of learning can spark an interest in students to advance their programming knowledge to create novel applications. This study examined if freshmen college students' attitudes towards programming changed after completing a graphical programming lesson. Various attributes about students' attitudes were examined …


The Indiana Cybersecurity Services Center (Incsc): A Cost-Benefit Analysis For K-12 Schools, Hans Christian Vargas Silva Oct 2014

The Indiana Cybersecurity Services Center (Incsc): A Cost-Benefit Analysis For K-12 Schools, Hans Christian Vargas Silva

Open Access Theses

The aim of this thesis is to determine if there are greater benefits than costs associated in the participation of public K-12 school corporations in the Indiana Cybersecurity Services Center (INCSC). This thesis is an ex-antecost-benefit analysis policy assessment of the INCSC. The study consisted of a sample of 6 school corporations from which 5 were classified as small and 1 was large. Three methods were considered for data collection; however conducting interviews was the most effective method due to the interaction with IT personnel from each organization in order to analyze current costs related to 4 areas of …