Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (30)
- Clark University (22)
- Walden University (20)
- Kennesaw State University (14)
- Old Dominion University (6)
-
- University of Texas Rio Grande Valley (5)
- New Jersey Institute of Technology (4)
- Air Force Institute of Technology (2)
- Bryant University (2)
- California State University, San Bernardino (2)
- Chulalongkorn University (2)
- University of Arkansas, Fayetteville (2)
- University of Pennsylvania Carey Law School (2)
- University of South Carolina (2)
- University of South Florida (2)
- Bowling Green State University (1)
- Brigham Young University (1)
- Chapman University (1)
- George Fox University (1)
- Grand Valley State University (1)
- Harrisburg University of Science and Technology (1)
- Illinois State University (1)
- James Madison University (1)
- Liberty University (1)
- Missouri University of Science and Technology (1)
- Nova Southeastern University (1)
- Portland State University (1)
- Syracuse University (1)
- Technological University Dublin (1)
- University of Dayton (1)
- Keyword
-
- MPA (15)
- Machine learning (12)
- Artificial intelligence (11)
- Cybersecurity (7)
- Blockchain (4)
-
- COVID-19 (4)
- MSIT (4)
- Sustainability (4)
- Crowdsourcing (3)
- Data breach (3)
- E-commerce (3)
- Future of work (3)
- Information Technology (3)
- MITB student (3)
- MSPC (3)
- Privacy (3)
- Singapore (3)
- Social media (3)
- Trauma (3)
- AI (2)
- Algorithms (2)
- Analytics (2)
- Bayesian (2)
- Big Data (2)
- Business Administration (2)
- China (2)
- Climate change (2)
- Commercial identity theft (2)
- Computer science (2)
- Culture (2)
- Publication
-
- Research Collection School Of Computing and Information Systems (25)
- School of Professional Studies (22)
- Walden Dissertations and Doctoral Studies (20)
- Journal of Cybersecurity Education, Research and Practice (8)
- KSU Proceedings on Cybersecurity Education, Research and Practice (5)
-
- Theses and Dissertations (5)
- Dissertations (4)
- Research Collection Lee Kong Chian School Of Business (3)
- All Faculty Scholarship (2)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (2)
- Computer Science Faculty Publications and Presentations (2)
- Graduate Theses and Dissertations (2)
- Information Systems Faculty Publications and Presentations (2)
- Information Systems and Analytics Department Faculty Journal Articles (2)
- Senior Theses (2)
- USF Tampa Graduate Theses and Dissertations (2)
- VMASC Publications (2)
- Articles (1)
- Business Administration Faculty Research Publications (1)
- CCE Theses and Dissertations (1)
- Civil and Environmental Engineering and Construction Faculty Research (1)
- Computer Science Faculty Publications (1)
- Dissertations and Theses Collection (Open Access) (1)
- Doctor of Business Administration (DBA) (1)
- Doctor of Data Science and Analytics Dissertations (1)
- Doctoral Dissertations and Projects (1)
- Electronic Theses, Projects, and Dissertations (1)
- Electronic Thesis and Dissertation Repository (1)
- Engineering Faculty Articles and Research (1)
- Engineering Management & Systems Engineering Theses & Dissertations (1)
- Publication Type
Articles 1 - 30 of 140
Full-Text Articles in Business
The Practical Applications Of Video Games Beyond Entertainment, Jack Martin
The Practical Applications Of Video Games Beyond Entertainment, Jack Martin
School of Professional Studies
Much of the attention directed toward video games is focused on their role as entertainment. However, researchers have found that video games can have other, more practical uses for society. This thesis is designed to examine three specific examples of the practical applications of video games: video games in education, video games as accessible technology, and the social uses of video games. This project is based on pre-existing research conducted by professionals studying the aforementioned subtopics. Anecdotal stories from educators, people with disabilities, and developers are also discussed. The thesis explores specific examples of video games being used practically, and …
Worst Time Being Poor? The Hunger Problem In U.S. During Covid-19 Pandemic, Yuanhang Hu
Worst Time Being Poor? The Hunger Problem In U.S. During Covid-19 Pandemic, Yuanhang Hu
School of Professional Studies
Food insecurity is deeply rooted in American society during and before the COVID-19 pandemic. Food Insecurity usually associates with economic indicators, such as unemployment rate, income level, etc. Currently, there are two main tools to fight the war of hunger. The first one is the government food assistance programs. And the second one is food pantries from the private sectors of the community. Both tools are facing numerous challenges due to COVID-19. The purpose of this article is to provide rational reasons to persuade the government to enhance the benefits of the Supplemental Nutrition Assistance Program (SNAP) and use administrative …
How Museum Utilize Social Media On Communication, Jiake Han
How Museum Utilize Social Media On Communication, Jiake Han
School of Professional Studies
With the development of Internet, social media became more and more popular among people. Many industries realize the importance of social media in business. Traditionally, museum concentrates more on personal visual experience, which is hard to be replaced by online media. However, museums now also put more concentrate on social media platform because it expands the way of engagement. Especially, for Coronavirus, many organizations including museums have to close. Therefore, museums have to depend more on social media platforms to communicate with audiences. This research aims at finding how different kind of social media help museum communicate and engage with …
A Web-Based Ai Assistant Application Using Python And Javascript, Viet Le, Tej Bahadur, Jainee Shah, Roushan Ara
A Web-Based Ai Assistant Application Using Python And Javascript, Viet Le, Tej Bahadur, Jainee Shah, Roushan Ara
School of Professional Studies
Our research is mainly based on a chatbot which is powered by Artificial Intelligence. Nowadays, Artificial Intelligence assistants such as Apple’s Siri, Google’s Now and Amazon’s Alexa are currently fast-growing and widely integrated with many smart devices. These assistants are built with the primary purpose of being personal assistants for every individual user in certain contexts. In this research, we would highlight the development process of the chatbots, features, problems, case studies and limitations.
This research delivers the information, helps developers to build answer bots and integrate chatbots with business accounts. The aim is to assist users and allow transactions …
Narrowing The Wealth And Income Gap In Poland, China, And The United States, Cyndy Carboo, Zhiling Song, Jiawei Feng, Xudong Zhu
Narrowing The Wealth And Income Gap In Poland, China, And The United States, Cyndy Carboo, Zhiling Song, Jiawei Feng, Xudong Zhu
School of Professional Studies
With the widespread of globalization, the wealth gap continues to widen globally. Due to the enormous differences in national conditions and political systems of various countries, this article selects China, the United States, and Poland as the research objects, and uses a specific time unit as the benchmark, and mainly focuses on the four directions of medical care, education, job opportunities, and pensions. A reader could understand the correlation between the wealth gap and multiple factors deeply in this article. This article analyzes the impact of income disparity on these three countries and proposes solutions to help narrow the gap …
Transparency And Yielding Of Law Officers Reform (Taylor) Act Of 2020: Proposal For Police Reform, Marwa Alnaal, Matthew L. Anderson, Hannah Brier, Mollie Campbell, Rose Wine
Transparency And Yielding Of Law Officers Reform (Taylor) Act Of 2020: Proposal For Police Reform, Marwa Alnaal, Matthew L. Anderson, Hannah Brier, Mollie Campbell, Rose Wine
School of Professional Studies
The Transparency and Yielding of Law Officers Reform Act of 2020 (TAYLOR) proposes an example bill for law enforcement reform. During the summer of 2020, the United States witnessed civilian demonstrations nationwide calling for a change to policing. Our proposal is hoping to heed that call, offering a foundation for change that police forces and localities across the United States can utilize to rebuild trust and accountability.
The goal of the TAYLOR Act is not to defund the police; but rather, TAYLOR rethinks the priorities of the police. There can be no denying that the relationship of trust and security …
Cvs Covid-19 Screening Website: Test Automation, Savya Rawat
Cvs Covid-19 Screening Website: Test Automation, Savya Rawat
School of Professional Studies
CVS Pharmacy is an American retail corporation, also known as, and originally named, the Consumer Value Store owned by CVS Health, it is headquartered in Woonsocket, Rhode Island. CVS Pharmacy is currently the largest pharmacy chain in the United States by number of locations over 9,600 and total prescription revenue. CVS sells prescription drugs and a wide assortment of general merchandise, including over-the-counter drugs.
Now, coming to the reason why I have selected CVS pharmacy’s website cvs.com as my case study topic is because of CVS’s response to the covid-19 pandemic’s no-cost testing strategy. Whole of the world is suffering …
The Killingly Mascot Case Study, Jordan Lumpkins
The Killingly Mascot Case Study, Jordan Lumpkins
School of Professional Studies
In the summer of 2019, in Killingly, Connecticut the local Board of Education voted to retire the "Redmen" mascot name it had used for nearly a century. This legislation was widely opposed and received extensive media coverage. Within a few months, the town experienced a massive political referendum where several local Board of Education members and Councilmen were replaced by single issue politicians promising to reinstate the "Redmen" name. Now holding a majority on the Board of Education, these Board members made Killingly the first school in U.S. history to reinstate a mascot after being deemed "derogatory."
It is the …
Healthy Food Portal Business Plan And Its Function Model, Alena Raupova
Healthy Food Portal Business Plan And Its Function Model, Alena Raupova
School of Professional Studies
Business planning is a tool of paramount importance in the process of company management, on the efficiency of which the future functioning of the enterprise depends. Formation of a business plan enables the team to productively and competently use existing funds and resources in their work and apply planning as a very effective management mechanism (Hamm, 2016).
The goal of this final project is to develop a business plan for a healthy nutrition portal for Bellyful LLC. Bellyful is based in Boston, USA, and the portal will be its first product. Our client is interested in researching the prospects of …
The Impact Of Special Interest Groups On The Federal Dietary Guidelines: Consequences For American Health, Dory Mcmillan
The Impact Of Special Interest Groups On The Federal Dietary Guidelines: Consequences For American Health, Dory Mcmillan
School of Professional Studies
This research paper explores the impact of relationships between lobbyists and both the USDA and HSS, and the impact these relationships have on the Dietary Guidelines for Americans that the agencies work together to create. The paper focuses specifically on the information the guidelines present in regard to red meat consumption, and the impacts this may have on American health, and healthcare costs associated. It was hypothesized that a relationship would be found between special interest groups and the U.S. Department of Health and Human Services and/or the U.S. Department of Agriculture. Research found there was a relationship between special …
Rcap Solutions Breach Management - Case Study, Eugene Adu-Gyamfi, Gio Al Muarrawi, Kwame Ofori
Rcap Solutions Breach Management - Case Study, Eugene Adu-Gyamfi, Gio Al Muarrawi, Kwame Ofori
School of Professional Studies
Companies get hacked every day, and our in-scope company for this case study, RCAP Solution, was not an exception. Security incidents have increased both in volume and range in recent years, and cyber-attacks have become more sophisticated than ever before. There are so many reasons that drive this fact; one is that our infrastructure was not protected efficiently, but also attackers have become more knowledgeable in initiating advanced attacks at a scale. Additionally, the entrance of emerging technologies such as blockchain, machine learning, and the internet of things, added additional complexity to the already complex scene. Cybercriminals are using various …
Higher Education Responses To Crisis: A Case Study Of Clark University And The Pandemic Of 2020, Lisa Gillingham
Higher Education Responses To Crisis: A Case Study Of Clark University And The Pandemic Of 2020, Lisa Gillingham
School of Professional Studies
The COVID-19 pandemic has delivered an existential challenge to universities and other academic institutions at a time when they are already grappling with other weighty issues that may alter the fabric of higher education. COVID-19 has forced these institutions to consider and employ new ways of conducting its work with a sense urgency that is unprecedented in the recent history of the academy. The rate of learning around these models is rapid, and Higher Education is ripe for change.
Clark University has addressed the pandemic with a plan to protect and pivot using strategies that support the continuation of its …
Teaching Applications And Implications Of Blockchain Via Project-Based Learning: A Case Study, Kevin Mentzer, Mark Frydenberg, David J. Yates
Teaching Applications And Implications Of Blockchain Via Project-Based Learning: A Case Study, Kevin Mentzer, Mark Frydenberg, David J. Yates
Information Systems and Analytics Department Faculty Journal Articles
This paper presents student projects analyzing or using blockchain technologies, created by students enrolled in courses dedicated to teaching blockchain, at two different universities during the 2018-2019 academic year. Students explored perceptions related to storing private healthcare information on a blockchain, managing the security of Internet of Things devices, maintaining public governmental records, and creating smart contracts. The course designs, which were centered around project-based learning, include self-regulated learning and peer feedback as ways to improve student learning. Students either wrote a research paper or worked in teams on a programming project to build and deploy a blockchain-based application using …
The Spatial And Temporal Impact Of Agricultural Crop Residual Burning On Local Land Surface Temperature In Three Provinces Across China From 2015 To 2017, Wenting Zhang, Mengmeng Yu, Qingqing He, Tianwei Wang, Lu Lin, Kai Cao, Wei Huang, Peihong Fu, Jiaxin Chen
The Spatial And Temporal Impact Of Agricultural Crop Residual Burning On Local Land Surface Temperature In Three Provinces Across China From 2015 To 2017, Wenting Zhang, Mengmeng Yu, Qingqing He, Tianwei Wang, Lu Lin, Kai Cao, Wei Huang, Peihong Fu, Jiaxin Chen
Research Collection School Of Computing and Information Systems
China has suffered from severe crop residue burning (CRB) for a long time. As a type of biomass burning, CRB leads to a huge alteration in climate due to the emission of greenhouse gases and particulates in the atmosphere and damages to surface characteristics on land. At present, a growing body of research focuses on the impact of biomass burning (BB) (e.g., forest fire, grass fire, and CRB) on climate change from the aspect of atmospheric process. Meanwhile, a small number of research studies have started to pay attention on the damage caused by BB (e.g. forest fire) on land …
Blockchain-Based Public Auditing And Secure Deduplication With Fair Arbitration, Haoran Yuan, Xiaofeng Chen, Jianfeng Wang, Jiaming Yuan, Hongyang Yan, Willy Susilo
Blockchain-Based Public Auditing And Secure Deduplication With Fair Arbitration, Haoran Yuan, Xiaofeng Chen, Jianfeng Wang, Jiaming Yuan, Hongyang Yan, Willy Susilo
Research Collection School Of Computing and Information Systems
Data auditing enables data owners to verify the integrity of their sensitive data stored at an untrusted cloud without retrieving them. This feature has been widely adopted by commercial cloud storage. However, the existing approaches still have some drawbacks. On the one hand, the existing schemes have a defect of fair arbitration, i.e., existing auditing schemes lack an effective method to punish the malicious cloud service provider (CSP) and compensate users whose data integrity is destroyed. On the other hand, a CSP may store redundant and repetitive data. These redundant data inevitably increase management overhead and computational cost during the …
A Predictive Analytics Approach To Building A Decision Support System For Improving Graduation Rates At A Four-Year College, Xuan Wang, Helmut Schneider, Kenneth R. Walsh
A Predictive Analytics Approach To Building A Decision Support System For Improving Graduation Rates At A Four-Year College, Xuan Wang, Helmut Schneider, Kenneth R. Walsh
Information Systems Faculty Publications and Presentations
Although graduation rates have interested stakeholders, educational researchers, and policymakers for some time, little progress has been made on the overall graduation rate at four-year state colleges. Even though selective admission based on academic indicators such as high school GPA and ACT/ SAT have widely been used in the USA for years, and recent statistics show that less than 40% of students graduate from four-year state colleges in four years in the US. The authors propose using an ensemble of analytic models that considers cost as a better form of analysis that can be used as input to decision support …
A Social Network Analysis Of Jobs And Skills, Derrick Ming Yang Lee, Dion Wei Xuan Ang, Grace Mei Ching Pua, Lee Ning Ng, Sharon Purbowo, Eugene Wen Jia Choy, Kyong Jin Shim
A Social Network Analysis Of Jobs And Skills, Derrick Ming Yang Lee, Dion Wei Xuan Ang, Grace Mei Ching Pua, Lee Ning Ng, Sharon Purbowo, Eugene Wen Jia Choy, Kyong Jin Shim
Research Collection School Of Computing and Information Systems
In this study, we analyzed job roles and skills across industries in Singapore. Using social network analysis, we identified job roles with similar required skills, and we also identified relationships between job skills. Our analysis visualizes such relationships in an intuitive way. Insights derived from our analyses are expected to assist job seekers, employers as well as recruitment agencies wanting to understand trending and required job roles and skills in today’s fast changing world.
Barriers And Drivers Influencing The Growth Of E-Commerce In Uzbekistan, Madinakhon Tursunboeva
Barriers And Drivers Influencing The Growth Of E-Commerce In Uzbekistan, Madinakhon Tursunboeva
Theses and Dissertations
Electronic commerce (e-commerce) has become a major retail channel for businesses in developed countries. However, it is still considered an innovation in developing countries. Specifically, e-commerce in Uzbekistan is in the early stages of emergence despite its advance in recent years in terms of Internet penetration, a strong retail sector, new national regulations, and a young population. The study aimed to identify barriers and drivers influencing e-commerce growth in Uzbekistan. A Delphi research design was utilized to answer the research questions of the study, which categorized and ranked factors that Uzbekistani entrepreneurs are facing when engaging in e-commerce processes. A …
An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles
An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles
James Madison Undergraduate Research Journal (JMURJ)
A smart city is an interconnection of technological components that store, process, and wirelessly transmit information to enhance the efficiency of applications and the individuals who use those applications. Over the course of the 21st century, it is expected that an overwhelming majority of the world’s population will live in urban areas and that the number of wireless devices will increase. The resulting increase in wireless data transmission means that the privacy of data will be increasingly at risk. This paper uses a holistic problem-solving approach to evaluate the security challenges posed by the technological components that make up a …
Digital Identity: A Human-Centered Risk Awareness Study, Toufic N. Chebib
Digital Identity: A Human-Centered Risk Awareness Study, Toufic N. Chebib
USF Tampa Graduate Theses and Dissertations
Cybersecurity threats and compromises have been at the epicenter of media attention; their risk and effect on people’s digital identity is something not to be taken lightly. Though cyber threats have affected a great number of people in all age groups, this study focuses on 55 to 75-year-olds, as this age group is close to retirement or already retired. Therefore, a notable compromise impacting their digital identity can have a major impact on their life.
To help guide this study, the following research question was formulated, “What are the risk perceptions of individuals, between the ages of 55 and 75 …
Cyber-Security Risks And Liabilities In Modern Marine Insurance., Thi Hong Hanh Hoang
Cyber-Security Risks And Liabilities In Modern Marine Insurance., Thi Hong Hanh Hoang
World Maritime University Dissertations
No abstract provided.
A Geospatial Analytics Approach To Delineate Trade Areas For Quick Service Restaurants (Qsr) In Singapore, Hui Ting Lim
A Geospatial Analytics Approach To Delineate Trade Areas For Quick Service Restaurants (Qsr) In Singapore, Hui Ting Lim
Research Collection School Of Computing and Information Systems
According to Huff, trade area is defined as “a geographically delineated region containing potential customers for whom there exists a probability greater than zero of their purchasing a given class of products or services offered for sale by a particular firm or by a particular agglomeration of firms”. Several methods to delineate a store trade area have been proposed over the years. For drive-time or travel distance analysis method, the trade area is delineated according to how far or how long the customers are willing to travel to patronise the store. Another commonly used method is the Huff Model which …
Empowering Singapore’S Smes: Fintech P2p Lending — A Lifeline For Smes’ Survival?, Grace Lee, Alan Megargel
Empowering Singapore’S Smes: Fintech P2p Lending — A Lifeline For Smes’ Survival?, Grace Lee, Alan Megargel
Research Collection School Of Computing and Information Systems
The COVID-19 pandemic has sent shock waves throughout the world, pushed countries into lockdown, and wreaked havoc on the world’s people and the global economy. The damage to economies around the world caused by the COVID-19 pandemic has far exceeded that of the global financial crisis. While all businesses suffered hugely, it would be of grave consequence if the small and medium-sized enterprises (SMEs), an important segment of every country’s economy, are unable to withstand the shock wave and sustain themselves beyond this pandemic. The COVID-19 pandemic has highlighted the importance of cash flow or working capital for the viability …
Capitalising Product Associations In A Supermarket Retail Environment, Michelle L. F. Cheong, Yong Qing Chia
Capitalising Product Associations In A Supermarket Retail Environment, Michelle L. F. Cheong, Yong Qing Chia
Research Collection School Of Computing and Information Systems
This paper explores methods to capitalise on retail companies’ transactional databases, to mine meaningful product associations, and to design product placement strategies as a means to drive sales. We implemented three in-store initiatives based on our hypotheses – placing products with high associations together will induce an increase in sales of consequent; introducing an antecedent that is new to store will bring about a similar impact on sales of consequent based on established product association rules uncovered from other stores. Sales tracking over twelve weeks revealed that there were improvements in sales of consequents across all three initiatives performed in-store.
Coinwatch: A Clone-Based Approach For Detecting Vulnerabilities In Cryptocurrencies, Qingze Hum, Wei Jin Tan, Shi Ying Tey, Latasha Lenus, Ivan Homoliak, Yun Lin, Jun Sun
Coinwatch: A Clone-Based Approach For Detecting Vulnerabilities In Cryptocurrencies, Qingze Hum, Wei Jin Tan, Shi Ying Tey, Latasha Lenus, Ivan Homoliak, Yun Lin, Jun Sun
Research Collection School Of Computing and Information Systems
Cryptocurrencies have become very popular in recent years. Thousands of new cryptocurrencies have emerged, proposing new and novel techniques that improve on Bitcoin's core innovation of the blockchain data structure and consensus mechanism. However, cryptocurrencies are a major target for cyber-attacks, as they can be sold on exchanges anonymously and most cryptocurrencies have their codebases publicly available. One particular issue is the prevalence of code clones in cryptocurrencies, which may amplify security threats. If a vulnerability is found in one cryptocurrency, it might be propagated into other cloned cryptocurrencies. In this work, we propose a systematic remedy to this problem, …
How Should We Understand The Digital Economy In Asia? Critical Assessment And Research Agenda, Kai Li, Dan J. Kim, Karl R. Lang, Robert J. Kauffman, Maurizio Naldi
How Should We Understand The Digital Economy In Asia? Critical Assessment And Research Agenda, Kai Li, Dan J. Kim, Karl R. Lang, Robert J. Kauffman, Maurizio Naldi
Research Collection School Of Computing and Information Systems
By Asian digital economy, we refer to high-tech developments, business and social transformations, and information-driven changes in the region's growth. We discuss its background and foundations, significance in Asia and contribution to removal of historical barriers in traditional business. We assess how new value chains are transforming country-level involvement in worldwide manufacturing and note "smiling curve theory" predictions about the global value chain in Asia for high-tech firms and their economies. The takeaway is that the digital economy in Asian nations involves revamping business processes through technology innovation, government policies for growth, and digital entrepreneurship. We analyze the "digital economy …
Comparing Variable Importance In Prediction Of Silence Behaviours Between Random Forest And Conditional Inference Forest Models., Stephen Barrett Dr, Geraldine Gray Dr, Colm Mcguinness Dr, Michael Knoll Dr.
Comparing Variable Importance In Prediction Of Silence Behaviours Between Random Forest And Conditional Inference Forest Models., Stephen Barrett Dr, Geraldine Gray Dr, Colm Mcguinness Dr, Michael Knoll Dr.
Articles
This paper explores variable importance metrics of Conditional Inference Trees (CIT) and classical Classification And Regression Trees (CART) based Random Forests. The paper compares both algorithms variable importance rankings and highlights why CIT should be used when dealing with data with different levels of aggregation. The models analysed explored the role of cultural factors at individual and societal level when predicting Organisational Silence behaviours.
Contingency Planning Amidst A Pandemic, Natalie C. Belford
Contingency Planning Amidst A Pandemic, Natalie C. Belford
KSU Proceedings on Cybersecurity Education, Research and Practice
Proper prior planning prevents pitifully poor performance: The purpose of this research is to address mitigation approaches - disaster recovery, contingency planning, and continuity planning - and their benefits as they relate to university operations during a worldwide pandemic predicated by the Novel Coronavirus (COVID-19). The most relevant approach pertaining to the University’s needs and its response to the Coronavirus pandemic will be determined and evaluated in detail.
Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, Chunsheng Xin
Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, Chunsheng Xin
KSU Proceedings on Cybersecurity Education, Research and Practice
Throughout the Internet, many chatbots have been deployed by various organizations to answer questions asked by customers. In recent years, we have been running cybersecurity summer camps for youth. Due to COVID-19, our in-person camp has been changed to virtual camps. As a result, we decided to develop a chatbot to reduce the number of emails, phone calls, as well as the human burden for answering the same or similar questions again and again based on questions we received from previous camps. This paper introduces our practical experience to implement an AI-powered chatbot for middle and high school cybersecurity camps …
A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad
A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad
KSU Proceedings on Cybersecurity Education, Research and Practice
Serious games can challenge users in competitive and entertaining ways. Educators have used serious games to increase student engagement in cybersecurity education. Serious games have been developed to teach students various cybersecurity topics such as safe online behavior, threats and attacks, malware, and more. They have been used in cybersecurity training and education at different levels. Serious games have targeted different audiences such as K-12 students, undergraduate and graduate students in academic institutions, and professionals in the cybersecurity workforce. In this paper, we provide a survey of serious games used in cybersecurity education and training. We categorize these games into …