Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Kennesaw State University (36)
- Singapore Management University (31)
- Walden University (14)
- Old Dominion University (10)
- University of Pittsburgh School of Law (6)
-
- Edith Cowan University (3)
- University for Business and Technology in Kosovo (3)
- University of South Florida (3)
- Air Force Institute of Technology (2)
- Georgia Southern University (2)
- Portland State University (2)
- Southern Methodist University (2)
- University of Nevada, Las Vegas (2)
- University of New Haven (2)
- Andrews University (1)
- Bentley University (1)
- Brigham Young University (1)
- Bryant University (1)
- California Polytechnic State University, San Luis Obispo (1)
- Dartmouth College (1)
- DePaul University (1)
- Fordham Law School (1)
- Governors State University (1)
- James Madison University (1)
- Liberty University (1)
- Louisiana State University (1)
- Molloy University (1)
- Rhode Island School of Design (1)
- Sacred Heart University (1)
- The University of Akron (1)
- Keyword
-
- Cybersecurity (19)
- Artificial Intelligence (8)
- Artificial intelligence (8)
- AI (6)
- Information technology (5)
-
- Machine learning (5)
- Blockchain (4)
- Cybersecurity Education (4)
- Machine Learning (4)
- Natural language processing (4)
- Technology (4)
- Algorithms (3)
- Artificial Intelligence (AI) (3)
- Business (3)
- COVID-19 (3)
- ChatGPT (3)
- Competitive Advantage (3)
- Deep learning (3)
- Information security (3)
- Law (3)
- Manufacturing (3)
- Privacy (3)
- Remote work (3)
- Science (3)
- Society (3)
- Software (3)
- AI in hospitals (2)
- AI use in LMICs hospitals (2)
- Absorptive Capacity (2)
- Artificial Intelligence-based medical device technologies (2)
- Publication
-
- Journal of Cybersecurity Education, Research and Practice (32)
- Research Collection School Of Computing and Information Systems (20)
- Walden Dissertations and Doctoral Studies (14)
- Book Chapters (5)
- Research Collection Lee Kong Chian School Of Business (5)
-
- Electronic Theses and Dissertations (3)
- Information Technology & Decision Sciences Faculty Publications (3)
- International Journal of Business and Technology (3)
- Research outputs 2022 to 2026 (3)
- African Conference on Information Systems and Technology (2)
- Asian Management Insights (2)
- Computer Science Faculty Publications (2)
- Dissertations and Theses Collection (Open Access) (2)
- Engineering Technology Faculty Publications (2)
- International Conference on Gambling & Risk Taking (2)
- Master's Theses (2)
- SMU Data Science Review (2)
- Theses and Dissertations (2)
- USF Tampa Graduate Theses and Dissertations (2)
- 2023 (1)
- Adventist Human-Subject Researchers Association (1)
- Articles (1)
- Computer Science Senior Theses (1)
- Cybersecurity Undergraduate Research Showcase (1)
- DePaul Magazine (1)
- Doctoral Dissertations and Projects (1)
- Faculty Publications: Business (1)
- Fordham Journal of Corporate & Financial Law (1)
- Graphic Communication (1)
- Information Systems and Analytics Department Faculty Conference Proceedings (1)
- Publication Type
Articles 1 - 30 of 137
Full-Text Articles in Business
Outsourcing Voting To Ai: Can Chatgpt Advise Index Funds On Proxy Voting Decisions?, Chen Wang
Outsourcing Voting To Ai: Can Chatgpt Advise Index Funds On Proxy Voting Decisions?, Chen Wang
Fordham Journal of Corporate & Financial Law
Released in November 2022, Chat Generative Pre-training Transformer (“ChatGPT”), has risen rapidly to prominence, and its versatile capabilities have already been shown in a variety of fields. Due to ChatGPT’s advanced features, such as extensive pre-training on diverse data, strong generalization ability, fine-tuning capabilities, and improved reasoning, the use of AI in the legal industry could experience a significant transformation. Since small passive funds with low-cost business models generally lack the financial resources to make informed proxy voting decisions that align with their shareholders’ interests, this Article considers the use of ChatGPT to assist small investment funds, particularly small passive …
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Journal of Nonprofit Innovation
Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.
Imagine Doris, who is …
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Journal of Cybersecurity Education, Research and Practice
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …
The Value Of Official Website Information In The Credit Risk Evaluation Of Smes, Cuiqing Jiang, Chang Yin, Qian Tang, Zhao Wang
The Value Of Official Website Information In The Credit Risk Evaluation Of Smes, Cuiqing Jiang, Chang Yin, Qian Tang, Zhao Wang
Research Collection School Of Computing and Information Systems
The official websites of small and medium-sized enterprises (SMEs) not only reflect the willingness of an enterprise to disclose information voluntarily, but also can provide information related to the enterprises’ historical operations and performance. This research investigates the value of official website information in the credit risk evaluation of SMEs. To study the effect of different kinds of website information on credit risk evaluation, we propose a framework to mine effective features from two kinds of information disclosed on the official website of a SME—design-based information and content-based information—in predicting its credit risk. We select the SMEs in the software …
Explorelah: Personalised And Smart Trip Planner For Mobile Tourism, Aldy Gunawan, Siu Loon Hoe, Xun Yi Lim, Linh Chi Tran, Dang Viet Anh Nguyen
Explorelah: Personalised And Smart Trip Planner For Mobile Tourism, Aldy Gunawan, Siu Loon Hoe, Xun Yi Lim, Linh Chi Tran, Dang Viet Anh Nguyen
Research Collection School Of Computing and Information Systems
Various recommender systems for mobile tourism have been developed over the years. However, most of these recommender systems tend to overwhelm users with too much information and may not be personalised to user preferences. In this paper, we introduce ExploreLah, a personalised and smart trip planner for exploring Point of Interests (POIs) in Singapore. The user preferences are categorised into five groups: shopping, art & culture, outdoor activity, adventure, and nightlife. The problem is considered as the Team Orienteering Problem with Time Windows. The algorithm is developed to generate itineraries. Simulated experiments using test cases were performed to evaluate and …
Clueless: Revolutionizing Sustainable Fashion And Combating Overconsumption, Tanya Ravichandran
Clueless: Revolutionizing Sustainable Fashion And Combating Overconsumption, Tanya Ravichandran
Graphic Communication
“Clueless” revolutionizes sustainable fashion by combating wardrobe overconsumption and the industry’s carbon footprint, using AI to suggest personalized outfits from existing wardrobes tailored to weather and wear history. It enhances user engagement through features like outfit ‘shuffle’ and provides insights into wardrobe utilization and carbon impact.
It’s more than an app; it’s a step towards a greener wardrobe and a healthier planet.
How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim
How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim
Cybersecurity Undergraduate Research Showcase
The powers of OpenAI's groundbreaking AI language model, ChatGPT, startled millions of users when it was released in November. But for many, the tool's ability to further accomplish the goals of evil actors swiftly replaced their initial excitement with significant concerns. ChatGPT gives malicious actors additional ways to possibly compromise sophisticated cybersecurity software. Leaders in a sector that is currently suffering from a 38% global spike in data breaches in 2022 must acknowledge the rising influence of AI and take appropriate action. Cybercriminals are writing more complex and focused business email compromise (BEC) and other phishing emails with the assistance …
Understanding The Impact Of Trade Policy Effect Uncertainty On Firm-Level Innovation Investment: A Deep Learning Approach, Daniel Chang, Nan Hu, Peng Liang, Morgan Swink
Understanding The Impact Of Trade Policy Effect Uncertainty On Firm-Level Innovation Investment: A Deep Learning Approach, Daniel Chang, Nan Hu, Peng Liang, Morgan Swink
Research Collection School Of Computing and Information Systems
Integrating the real options perspective and resource dependence theory, this study examines how firms adjust their innovation investments to trade policy effect uncertainty (TPEU), a less studied type of firm specific, perceived environmental uncertainty in which managers have difficulty predicting how potential policy changes will affect business operations. To develop a text-based, context-dependent, time-varying measure of firm-level perceived TPEU, we apply Bidirectional Encoder Representations from Transformers (BERT), a state-of-the-art deep learning approach. We apply BERT to analyze the texts of mandatory Management Discussion and Analysis (MD&A) sections of annual reports for a sample of 22,669 firm-year observations from 3,181 unique …
Class Participation: Using Technology To Enhance Efficiency And Fairness, Benjamin Gan, Eng Lieh Ouh
Class Participation: Using Technology To Enhance Efficiency And Fairness, Benjamin Gan, Eng Lieh Ouh
Research Collection School Of Computing and Information Systems
Class participation can be considered as contribution to discussion, attendance, presentations, unsolicited responses, questions, comments, etc. What counts may vary across individual teachers. The more students participate, the less memorization they do, and the more they engage in higher levels of thinking, including interpretation, analysis, and synthesis. However, only a handful of students in many classrooms participate regularly, a phenomenon dubbed as "consolidation of responsibility". This study provides a literature review of inclass participation, as well as pedagogies and technologies that enhance participation. Pedagogies such as active learning, group learning, project-based learning and flipped classroom. Technologies to automate attendance taking, …
Vision Paper: Advancing Of Ai Explainability For The Use Of Chatgpt In Government Agencies: Proposal Of A 4-Step Framework, Hui Shan Lee, Shankararaman, Venky, Eng Lieh Ouh
Vision Paper: Advancing Of Ai Explainability For The Use Of Chatgpt In Government Agencies: Proposal Of A 4-Step Framework, Hui Shan Lee, Shankararaman, Venky, Eng Lieh Ouh
Research Collection School Of Computing and Information Systems
This paper explores ChatGPT’s potential in aiding government agencies, drawing from a case study based on a government agency in Singapore. While ChatGPT’s text generation abilities offer promise, it brings inherent challenges, including data opacity, potential misinformation, and occasional errors. These issues are especially critical in government decision-making.Public administration’s core values of transparency and accountability magnify these concerns. Ensuring AI alignment with these principles is imperative, given the potential repercussions on policy outcomes and citizen trust.AI explainability plays a central role in ChatGPT’s adoption within government agencies. To address these concerns, we propose strategies like prompt engineering, data governance, and …
The Persuasive Effect Of Ai-Synthesized Voices, Hannah H. Chang, Anirban Mukherjee
The Persuasive Effect Of Ai-Synthesized Voices, Hannah H. Chang, Anirban Mukherjee
Research Collection Lee Kong Chian School Of Business
Artificial intelligence (AI) technology seeks to emulate humans. One aspect is AI-synthesized voices, used in voice assistants (such as Amazon Alexa, Apple Siri, and Google Assistant) to assistive technologies (such as voiceover narration in product videos). For example, there are currently more than 3.25 billion voice assistants; a number that is expected to touch about 8 billion by next year (i.e., 2023) (Statista 2022). With the extensive availability and enhanced accuracy of AI-synthesized voices, consumer research is starting to examine the impact of AI-synthesized voices on consumer information processing and decision making. The extant literature, however, is relatively limited because …
Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu
Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu
Journal of Cybersecurity Education, Research and Practice
This pilot study aims to assess the acceptability of Open University’s training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post experimental design was employed. 43 self-selected participants were recruited via an online register and posters at the university (excluding IT related courses). Participants completed the Human Aspects of Information Security Questionnaire (HAIS-Q) and Fear of Missing Out (FoMO) Scale. They then completed all games and quizzes in the GICAST course before repeating the HAIS-Q and …
Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang
Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang
Journal of Cybersecurity Education, Research and Practice
Recent advances in Artificial Intelligence (AI) have brought society closer to the long-held dream of creating machines to help with both common and complex tasks and functions. From recommending movies to detecting disease in its earliest stages, AI has become an aspect of daily life many people accept without scrutiny. Despite its functionality and promise, AI has inherent security risks that users should understand and programmers must be trained to address. The ICE (integrity, confidentiality, and equity) cybersecurity labs developed by a team of cybersecurity researchers addresses these vulnerabilities to AI models through a series of hands-on, inquiry-based labs. Through …
Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen
Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen
Journal of Cybersecurity Education, Research and Practice
Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and ethics, cybersecurity can foster diversity among audiences with varying educational backgrounds, thereby cultivating a richer and more resilient security landscape. A more diverse cybersecurity workforce can provide a broader range of perspectives, experiences, and skills to address the complex and ever-evolving threats of the digital age. The research focuses on enhancing cybersecurity education …
Accountability Responsibility As An Instrument For Performance Measurement, Burhan Rexhepi B.R
Accountability Responsibility As An Instrument For Performance Measurement, Burhan Rexhepi B.R
International Journal of Business and Technology
This paper addresses the role and importance of accounting information, in particular liability accounting and the impact of liability centers on the success of the enterprise. The success of business decision making is closely linked to the quality and accuracy of accounting information. Every entity, regardless of ownership, size and form of legal organization, the capital structure exists and functions to achieve its objectives.
We live in a time of great changes in external environmental factors, which impose the need to know modern methods and models for running a business. However, the main basis of business success depends on the …
Types Of Financial And Economic Crisis, Burhan R. Rexhepi B.R
Types Of Financial And Economic Crisis, Burhan R. Rexhepi B.R
International Journal of Business and Technology
Financial crises have caused much debate among different economists. They have attempted to explore any possibility of detecting and preventing crises before they cause the damages that will require way more time and energy to repair the situation and bring the economies back on the right track of sustainable development. The purpose of this study is to analyze different types of financial crises that have affected the economies of the world in order to draw lessons from their experiences. Analysis of this study is divided into four types of financial crises: Banking crisis, speculative bubbles and the market failures, international …
An Outlook Of Factoring Industry In The World And In Kosovo, Burhan R. Rexhepi B.R
An Outlook Of Factoring Industry In The World And In Kosovo, Burhan R. Rexhepi B.R
International Journal of Business and Technology
Factoring is the most appropriate one for both bank and SMEs as it is considering a method of raising short- term working capital for enterprise by exchanging its A/R, not collateral focused and not adding any liability into their balance sheet. Moreover, factoring is a comprehensive financial service that includes not only financing but also credit protection, accounts receivable bookkeeping and collection services. Factoring not only brings benefit to CBs as a new service for diversification and increasing turnover but also supports SMEs to access financing for roll-up their business and gaining profit from achieving advantages of competitiveness. Although it …
All Quiet On The Digital Front: The Unseen Psychological Impacts On Cybersecurity First Responders, Tammie R. Hollis
All Quiet On The Digital Front: The Unseen Psychological Impacts On Cybersecurity First Responders, Tammie R. Hollis
USF Tampa Graduate Theses and Dissertations
Driven by the increasing frequency of cyberattacks and the existing talent gap between industry needs and skilled professionals, this research study focused on the crucial human element in the domain of cybersecurity incident response. The objective of this dissertation was to offer a meaningful exploration of the lived experiences encountered by cybersecurity incident responders and an assessment of the subsequent impacts on their well-being. Additionally, this study sought to draw comparisons between the experiences of cybersecurity incident responders and their counterparts in traditional emergency response roles. Semi-structured interviews were conducted with a cohort of 22 individuals with first-hand experience working …
Human Vs Machine: Hyper-Realistic Avatars And Their Efficacy As A Communication Channel, Jill S. Schiefelbein
Human Vs Machine: Hyper-Realistic Avatars And Their Efficacy As A Communication Channel, Jill S. Schiefelbein
USF Tampa Graduate Theses and Dissertations
Hyper-realistic avatars (HRAs), a form of synthetic media, are custom-created digital embodiments of a human, created by capturing and combining that person’s video and vocal likeness. This is the first known study of the efficacy of videos delivered by hyper-realistic avatars as a communication channel in comparison to videos delivered by their human counterparts. An experiment testing how information retention, engagement, and trust vary between viewers of videos delivered by a real human, videos delivered by the HRA representing that same human, and videos delivered by the HRA that discloses to viewers that it is a hyper-realistic avatar is presented. …
Novus Ex Machina: Realise Your Organisation’S Creative Potential With Ai, Adam Tatarynowicz, Utz Claassen
Novus Ex Machina: Realise Your Organisation’S Creative Potential With Ai, Adam Tatarynowicz, Utz Claassen
Asian Management Insights
Innovation managers must learn how to harness AI’s transformative potential.
An Idealist’S Approach For Smart Contract Correctness, Duy Tai Nguyen, Hong Long Pham, Jun Sun, Quang Loc Le
An Idealist’S Approach For Smart Contract Correctness, Duy Tai Nguyen, Hong Long Pham, Jun Sun, Quang Loc Le
Research Collection School Of Computing and Information Systems
In this work, we experiment an idealistic approach for smart contract correctness verification and enforcement, based on the assumption that developers are either desired or required to provide a correctness specification due to the importance of smart contracts and the fact that they are immutable after deployment. We design a static verification system with a specification language which supports fully compositional verification (with the help of function specifications, contract invariants, loop invariants and call invariants). Our approach has been implemented in a tool named iContract which automatically proves the correctness of a smart contract statically or checks the unverified part …
Depaul Digest
DePaul Magazine
College of Education Professor Jason Goulah fosters hope, happiness and global citizenship through DePaul’s Institute for Daisaku Ikeda Studies in Education. Associate Journalism Professor Jill Hopke shares how to talk about climate change. News briefs from DePaul’s 10 colleges and schools: Occupational Therapy Standardized Patient Program, Financial Planning Certificate program, Business Education in Technology and Analytics Hub, Racial Justice Initiative, Teacher Quality Partnership grant, Intimate Partner Violence and Brain Injury collaboration, School of Music Career Closet, Sports Photojournalism course, DePaul Migration Collaborative’s Solutions Lab, Inclusive Screenwriting courses. New appointments: School of Music Dean John Milbauer, College of Education Dean Jennifer …
A Developed Framework For Studying Cyberethical Behaviour In North Central Nigeria, Aderinola Ololade Dunmade, Adeyinka Tella, Uloma Doris Onuoha
A Developed Framework For Studying Cyberethical Behaviour In North Central Nigeria, Aderinola Ololade Dunmade, Adeyinka Tella, Uloma Doris Onuoha
Journal of Cybersecurity Education, Research and Practice
ICT advancements have enabled more online activities, resulting in several cyberethical behaviours. Literature documents prevalence of plagiarism, and online fraud, among other misbehaviours. While behaviour has been explained by several theories, as scholarship and research advances, frameworks are modified to include more constructs. The researchers modified Fishbein and Ajzen (2011)'s Reasoned Action Approach to study female postgraduate students' perspectives toward cyberethical behaviour in North Central Nigerian universities.
The study focused on four variables, which were adequately captured by the model: perception, awareness, and attitude.
An adapted questionnaire collected quantitative data. This study used multistage sampling. A sample size of 989 …
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Journal of Cybersecurity Education, Research and Practice
The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that this problem has not improved and nearly 44% believe it has gotten worse over the past 10 years. Threat actors are continuing to evolve their tactics, techniques, and procedures for conducting attacks on public and private targets. Education institutions and companies must adopt emerging technologies to develop security professionals and to increase cybersecurity awareness holistically. …
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Journal of Cybersecurity Education, Research and Practice
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …
Infrastructure As Code For Cybersecurity Training, Rui Pinto, Rolando Martins, Carlos Novo
Infrastructure As Code For Cybersecurity Training, Rui Pinto, Rolando Martins, Carlos Novo
Journal of Cybersecurity Education, Research and Practice
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. These attacks tend to become increasingly specialized, meaning cybersecurity professionals must ensure proficiency in specific areas. Naturally, recommendations include creating advanced practical training scenarios considering realistic situations to help trainees gain detailed knowledge. However, the caveats of high-cost infrastructure and difficulties in the deployment process of this kind of system, primarily due to the manual process of pre-configuring software needed for the …
Building The Operational Technology (Ot) Cybersecurity Workforce: What Are Employers Looking For?, Christopher A. Ramezan, Paul M. Coffy, Jared Lemons
Building The Operational Technology (Ot) Cybersecurity Workforce: What Are Employers Looking For?, Christopher A. Ramezan, Paul M. Coffy, Jared Lemons
Journal of Cybersecurity Education, Research and Practice
A trained workforce is needed to protect operational technology (OT) and industrial control systems (ICS) within national critical infrastructure and critical industries. However, what knowledge, skills, and credentials are employers looking for in OT cybersecurity professionals? To best train the next generation of OT cybersecurity professionals, an understanding of current OT cybersecurity position requirements is needed. Thus, this work analyzes 100 OT cybersecurity positions to provide insights on key prerequisite requirements such as prior professional experience, education, industry certifications, security clearances, programming expertise, soft verbal and written communication skills, knowledge of OT frameworks, standards, and network communication protocols, and position …
Leading K-12 Community Responsiveness To Cyber Threats Via Education Of School Community, Michele Kielty, A. Renee Staton
Leading K-12 Community Responsiveness To Cyber Threats Via Education Of School Community, Michele Kielty, A. Renee Staton
Journal of Cybersecurity Education, Research and Practice
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for K-12 systems and provides concrete tools for school leaders to employ in order to provide preventive education to their school communities.
An Interdisciplinary Approach To Experiential Learning In Cyberbiosecurity And Agriculture Through Workforce Development, Kellie Johnson, Tiffany Drape, Joseph Oakes, Joseph Simpson, Ann Brown, Donna M. Westfall-Rudd, Susan Duncan
An Interdisciplinary Approach To Experiential Learning In Cyberbiosecurity And Agriculture Through Workforce Development, Kellie Johnson, Tiffany Drape, Joseph Oakes, Joseph Simpson, Ann Brown, Donna M. Westfall-Rudd, Susan Duncan
Journal of Cybersecurity Education, Research and Practice
Cyberbiosecurity and workforce development in agriculture and the life sciences (ALS) is a growing area of need in the curriculum in higher education. Students that pursue majors related to ALS often do not include training in cyber-related concepts or expose the ‘hidden curriculum’ of seeking internships and jobs. Exposing students through workforce development training and hands-on engagement with industry professionals can provide learning opportunities to bridge the two and is an area of growth and demand as the workforce evolves. The objectives of this work were 1) to learn key concepts in cybersecurity, including data security, visualization, and analysis, to …
Integrating Certifications Into The Cybersecurity College Curriculum: The Efficacy Of Education With Certifications To Increase The Cybersecurity Workforce, Binh Tran, Karen C. Benson, Lorraine Jonassen
Integrating Certifications Into The Cybersecurity College Curriculum: The Efficacy Of Education With Certifications To Increase The Cybersecurity Workforce, Binh Tran, Karen C. Benson, Lorraine Jonassen
Journal of Cybersecurity Education, Research and Practice
One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An un-tapped resource to combat these attacks lies in the students of the secondary educational system. Necessary in the cybersecurity education is a 3-tiered approach to quickly escalate the student into a workplace-ready graduate. The analogy used is a three-legged-stool, where curriculum content, hands-on skills, and certifications are equal instruments in the edification of the cybersecurity student. This paper endeavors to delve into the 3rd leg of …