Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Kennesaw State University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 61 - 90 of 1334

Full-Text Articles in Business

Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd Oct 2023

Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd

Journal of Cybersecurity Education, Research and Practice

This paper should be of interest to the readers of this journal because it addresses a subject that has received little scholarly attention; namely, local government cybersecurity. The U.S. has over 90,000 units of local government, of which almost 39,000 are “general purpose” units (i.e., municipalities, counties, towns and townships). On average, these governments do not practice cybersecurity effectively (Norris, et al., 2019 and 2020). One possible reason is that they do not adopt and/or implement highly recommended cybersecurity policies. In this paper, we examine local government adoption or lack of adoption of cybersecurity policies using data from three surveys. …


Integrating Certifications Into The Cybersecurity College Curriculum: The Efficacy Of Education With Certifications To Increase The Cybersecurity Workforce, Binh Tran, Karen C. Benson, Lorraine Jonassen Oct 2023

Integrating Certifications Into The Cybersecurity College Curriculum: The Efficacy Of Education With Certifications To Increase The Cybersecurity Workforce, Binh Tran, Karen C. Benson, Lorraine Jonassen

Journal of Cybersecurity Education, Research and Practice

One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An un-tapped resource to combat these attacks lies in the students of the secondary educational system. Necessary in the cybersecurity education is a 3-tiered approach to quickly escalate the student into a workplace-ready graduate. The analogy used is a three-legged-stool, where curriculum content, hands-on skills, and certifications are equal instruments in the edification of the cybersecurity student. This paper endeavors to delve into the 3rd leg of …


Cybersecurity Challenges And Awareness Of The Multi-Generational Learners In Nepal, Raj Kumar Dhungana, Lina Gurung Dr, Hem Poudyal Oct 2023

Cybersecurity Challenges And Awareness Of The Multi-Generational Learners In Nepal, Raj Kumar Dhungana, Lina Gurung Dr, Hem Poudyal

Journal of Cybersecurity Education, Research and Practice

Increased exposure to technologies has lately emerged as one of the everyday realities of digital natives, especially K-12 students, and teachers, the digital immigrants. Protection from cybersecurity risks in digital learning spaces is a human right, but students are increasingly exposed to high-risk cyberspace without time to cope with cybersecurity risks. This study, using a survey (N-891 students and 157 teachers) and in-depth interviews (27 students and 14 teachers), described the students' cybersecurity-related experiences and challenges in Nepal. This study revealed that the school’s cybersecurity support system is poor and teachers has very low awareness and competencies to protect students …


What You See Is Not What You Know: Studying Deception In Deepfake Video Manipulation, Cathryn Allen, Bryson R. Payne, Tamirat Abegaz, Chuck Robertson Oct 2023

What You See Is Not What You Know: Studying Deception In Deepfake Video Manipulation, Cathryn Allen, Bryson R. Payne, Tamirat Abegaz, Chuck Robertson

Journal of Cybersecurity Education, Research and Practice

Research indicates that deceitful videos tend to spread rapidly online and influence people’s opinions and ideas. Because of this, video misinformation via deepfake video manipulation poses a significant online threat. This study aims to discover what factors can influence viewers’ capability to distinguish deepfake videos from genuine video footage. This work focuses on exploring deepfake videos’ potential use for deception and misinformation by exploring people’s ability to determine whether videos are deepfakes in a survey consisting of deepfake videos and original unedited videos. The participants viewed a set of four videos and were asked to judge whether the videos shown …


Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas Oct 2023

Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas

Journal of Cybersecurity Education, Research and Practice

The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two programs offer a required course about terrorism. Given the fluid nature of terrorism and its threat to national infrastructure, the omission is concerning. It is recommended that NSA-certified cybersecurity programs begin implementing educational content that aim to teach about this emerging crime and justice issue. One suggestion is to embrace the …


Editorial, Michael E. Whitman, Herbert J. Mattord Oct 2023

Editorial, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Editorial for Volume 2023, Issue 2


Service-Oriented Framework For Developing Interoperable E-Health Systems In A Low-Income Country, Bonface Abima, Agnes Nakakawa, Geoffrey Mayoka Kituyi Oct 2023

Service-Oriented Framework For Developing Interoperable E-Health Systems In A Low-Income Country, Bonface Abima, Agnes Nakakawa, Geoffrey Mayoka Kituyi

The African Journal of Information Systems

e-Health solutions in low-income countries are fragmented, address institution-specific needs, and do little to address the strategic need for inter-institutional exchange of health data. Although various e-health interoperability frameworks exist, contextual factors often hinder their effective adoption in low-income countries. This underlines the need to investigate such factors and to use findings to adapt existing e-health interoperability models. Following a design science approach, this research involved conducting an exploratory survey among 90 medical and Information Technology personnel from 67 health facilities in Uganda. Findings were used to derive requirements for e-health interoperability, and to orchestrate elements of a service oriented …


Phishing Attacks: A Security Challenge For University Students Studying Remotely, Blessing Nyasvisvo, Joel M. Chigada Sep 2023

Phishing Attacks: A Security Challenge For University Students Studying Remotely, Blessing Nyasvisvo, Joel M. Chigada

The African Journal of Information Systems

The emergence of the deadly global respiratory coronavirus disease (COVID-19) in 2019 claimed many lives and altered the way people live and behave as well as how companies operated. Considerable pressure was exerted on Institutions of Higher Learning (universities) to salvage the academic projects through the process of business model reconfiguration. Students were required to study remotely and were, therefore, exposed to phishing and scamming cyber-attacks. The effects of these attacks were examined in this study with the support of literature and empirical research leading to appropriate recommendations being proposed. Data were obtained through semi-structured interviews from students at a …


Generating Clicks: Display Advertising Within Social Media, Ronda Mariani, Thomas Tanner, Loreen Powell Sep 2023

Generating Clicks: Display Advertising Within Social Media, Ronda Mariani, Thomas Tanner, Loreen Powell

Atlantic Marketing Journal

This research study developed a comprehensive social community prototype and tested a variety of display advertising scenarios to determine which scenario motivated social media users to click. Empirical research based upon 503 users of social media led to the development of several independent variables, which were identified in the study as display advertising scenarios. The display advertising scenarios tested in the study were video, animation, engagement, and brand familiarity, as well as the size and location of the display advertising within each social media prototype web page. Data collected identified which display advertisement scenarios motivated a social media user to …


Chatgpt Unveiled: Unleashing Ai Magic In Online Shopping And Digital Marketing, Jianping Huang, Mark J. Sciuchetti Dr. Sep 2023

Chatgpt Unveiled: Unleashing Ai Magic In Online Shopping And Digital Marketing, Jianping Huang, Mark J. Sciuchetti Dr.

Atlantic Marketing Journal

This research paper explores the use of AI, specifically ChatGPT, in interactive activities within

online shopping and digital marketing. The paper examines the potential of AI-powered chatbots

to enhance customer engagement, personalization, and marketing effectiveness. Through a

literature review, case studies, and user feedback analysis, the research highlights the benefits of

AI chatbots in providing real-time assistance, personalized recommendations, and improved

customer experiences. The paper also addresses ethical and privacy concerns associated with AI

implementation and discusses future research directions. The findings are expected to suggest

that AI-powered chatbots have the potential to revolutionize online shopping and digital

marketing by …


Exploring The Role Of An Organization In Implementing A Work-From-Home Strategy, Ryan Tripod, Sumarie Roodt Sep 2023

Exploring The Role Of An Organization In Implementing A Work-From-Home Strategy, Ryan Tripod, Sumarie Roodt

African Conference on Information Systems and Technology

Organizations are trying to move quickly to adopt remote working policies into their organizations as to attract and retain top talent, reduce office space costs, and increase productivity. As many of these strategies were quickly adopted by South African ICT organizations during the COIVD-19 pandemic, organizations are still somewhat unclear on what their role is with regards to ensuring long term adoption of remote working. Thus, this study explored the role of the organization with regards to a work-from-home strategy. It was found that the organization is responsible for formalizing the chosen strategy, creating supportive policies, and adapting its management …


Developing An Integrative Theoretical Framework For Electronic Business Value Optimisation In Botswana, Meduduetso Tsumake-Tsiang, Adheesh Budree Sep 2023

Developing An Integrative Theoretical Framework For Electronic Business Value Optimisation In Botswana, Meduduetso Tsumake-Tsiang, Adheesh Budree

African Conference on Information Systems and Technology

Organizations are trying to move quickly to adopt remote working policies into their organizations as to attract and retain top talent, reduce office space costs, and increase productivity. As many of these strategies were quickly adopted by South African ICT organizations during the COIVD-19 pandemic, organizations are still somewhat unclear on what their role is with regards to ensuring long term adoption of remote working. Thus, this study explored the role of the organization with regards to a work-from-home strategy. It was found that the organization is responsible for formalizing the chosen strategy, creating supportive policies, and adapting its management …


The Dark Side Of Mobile Money Transfer : A Case Study Of Zimbabwe, Theo Tsokota, Collector Chipfumbu, Melody Maseko Sep 2023

The Dark Side Of Mobile Money Transfer : A Case Study Of Zimbabwe, Theo Tsokota, Collector Chipfumbu, Melody Maseko

African Conference on Information Systems and Technology

Mobile money transfer has been widely presented in the literature and in practice as a way to bring the poor, unbanked and backward communities into the mainstream financial system. The main objective of this paper is to provide insights into how mobile money transfer has contributed to the negative effects on Zimbabwe's economy and its citizens. Using integrative literature this study explores the how mobile money transfers have negatively affected the economy of Zimbabwe and its citizens. The findings show that mobile money, if not properly regulated, can promote money laundering, fraud and financial irregularities, which can harm the entire …


The Sharing Economy: Understanding The Affordances Of And Barriers To The Use Of Digital Platforms, Phaswana Malatjie, Lisa F. Seymour Sep 2023

The Sharing Economy: Understanding The Affordances Of And Barriers To The Use Of Digital Platforms, Phaswana Malatjie, Lisa F. Seymour

African Conference on Information Systems and Technology

Studies exploring sharing economy services such as automotive, house-sharing, and bike rentals have predicted that these services will add billions of dollars to the global economy by 2025. Sharing economy services could reduce unemployment in Africa. Hence, there is a need to understand the affordance and the barriers to sharing economy platforms. This paper presents a literature review that helps answer the question: What are the affordances of and barriers to the use of sharing platforms? A literature review following a synthesis approach, reveals gaps around the sharing economy services relating to load-shedding, regulations and social exclusion. Potential future directions …


Social Media & Privacy: Understanding Privacy In The Age Of Content Creator Culture, Robert Tagoe, Raphael Amponsah, Emmanuel Awuni Kolog, Eric Afful-Dadzie Sep 2023

Social Media & Privacy: Understanding Privacy In The Age Of Content Creator Culture, Robert Tagoe, Raphael Amponsah, Emmanuel Awuni Kolog, Eric Afful-Dadzie

African Conference on Information Systems and Technology

In today's digital age, content creators are gaining public attention and becoming highly influential. With that increased influence, it is important to acknowledge the privacy concerns within this culture. This interpretive research study seeks to identify and understand the dynamics of privacy within the content creator culture. This research will leverage information from interviews with content creators from various social media platforms such as YouTube, Instagram, Facebook, and TikTok. Using theories to understand the phenomena, theories of privacy calculus, privacy paradox and self-disclosure, will be used to view how content creators define and navigate privacy, strategies employed to control personal …


The State Of The Digital Skills Ecosystem In Zimbabwe: An Exploratory Analysis, Annette Mangena, Gwamaka Mwalemba Sep 2023

The State Of The Digital Skills Ecosystem In Zimbabwe: An Exploratory Analysis, Annette Mangena, Gwamaka Mwalemba

African Conference on Information Systems and Technology

There are many ongoing efforts globally to address the skills requirements gaps created by the high pace of technological changes often referred to as the 4IR. The challenge is particularly acute in developing countries grappling with many high-priority socioeconomic challenges, including low levels of digital literacy. This study represents initial efforts to understand a developing country's local digital skills landscape, explicitly focusing on Zimbabwe. The study was conducted through a literature analysis to explore the digital skills discourse in Zimbabwe based on published academic papers. The findings point to a discourse focused on applied digital skills within specific fields and …


The Impact Of Digital Transformation On Institutional Growth. A Case Of Zimbabwean Universities, Vusumuzi Maphosa Sep 2023

The Impact Of Digital Transformation On Institutional Growth. A Case Of Zimbabwean Universities, Vusumuzi Maphosa

African Conference on Information Systems and Technology

The pressure for institutions to digitally transform has been building, and COVID-19 accelerated the transition in developing countries. The study evaluated the impact of digital transformation on Zimbabwean universities. The Microsoft digital transformation framework guided the study. Thematic analysis was used to extract meaning and generate themes from qualitative data from university ICT Directors. Results show that digital transformation positively impacted institutional growth and efficiency. Most universities invest in digital technology to increase service reliability and availability. Digital transformation teams were bolstered to support student processes and create personalised learning journeys. The digital transformation led to the adoption of several …


Digital Transformation Of Smes Through Social Media, Georgette Eugenia Otoo, Raphael Amponsah, Eric Afful-Dadzie, Emmanuel Awuni Kolog Sep 2023

Digital Transformation Of Smes Through Social Media, Georgette Eugenia Otoo, Raphael Amponsah, Eric Afful-Dadzie, Emmanuel Awuni Kolog

African Conference on Information Systems and Technology

This research paper explores the strategic integration of social media platforms by Small and Medium-sized Enterprises (SMEs) in Low- and Middle-Income Countries (LMICs) beyond marketing. Drawing from Resource-Based View and Dynamic Capabilities theories, the study investigates how social media enhances management, coordination, and control functions. Through five diverse case studies from Ghana, findings reveal SMEs’ innovative use of platforms like Instagram, WhatsApp, Slack, and Trello. These platforms foster efficient internal communication, customer engagement, project management, and talent acquisition. Challenges such as technical expertise and dynamic digital landscapes are identified.


Internet Of Things Affordance For Open Educational Resources In A Comprehensive Open Distance E-Learning, Lancelord Mncube Sep 2023

Internet Of Things Affordance For Open Educational Resources In A Comprehensive Open Distance E-Learning, Lancelord Mncube

African Conference on Information Systems and Technology

The Internet of Things (IoT) space has dual dimensions of affordance to support open educational resources (OER). The duality of affordance has little or not been well articulated in relation to OER, particularly in a Comprehensive open distance e-learning (CODEL) institution. Such an institution is a mega open distance in South Africa and beyond the continent to accommodate students globally and rely on information and communication technology (ICT) in the provision of tuition. In the CODEL institution, there is a recognizable shift as the institution encourages the appropriation of OER and phasing out the prescription of the prescribed textbooks. The …


Benefits Of Adopting Micro-Credentials For Skills Development, Oyena Nokulunga Mahlasela, Adriana A. Steyn Sep 2023

Benefits Of Adopting Micro-Credentials For Skills Development, Oyena Nokulunga Mahlasela, Adriana A. Steyn

African Conference on Information Systems and Technology

Micro-credential providers are increasing both in diversity and volume. However, employers are still concerned about their role in skill development. This study aimed to understand how micro-credentials can assist employees in skills development. A systematic literature review was conducted for studies published between (2016 to 2023). Thirty-two sources were included in the final review. After that, five recommendations for employers when adopting micro-credentials were constructed first by (1) defining the value of formal and informal education. (2) exploring micro-credentials as a tool for skills development. (3) encouraging organisations to collaborate with other institutions. (4) encouraging continuous personalised learning, known as …


Factors Influencing The Retention Of Millennial Software Developers In South African Companies, Kim Fouche, Maureen Tanner Sep 2023

Factors Influencing The Retention Of Millennial Software Developers In South African Companies, Kim Fouche, Maureen Tanner

African Conference on Information Systems and Technology

South Africa has an Information Technology skills shortage leading to high turnover of Information Technology professionals. Not only do companies face significant costs in replacing software developers, but high mobility also affects staff morale. Millennials are known to be more loyal to their own needs and do not tend to stay at companies for long, increasing the complexities of retention. This study explores the factors that influence the retention of millennial software developers in South African companies. The qualitative study was carried out using online semi-structured interviews. The study found that work environment, lifestyle, and management style, play a key …


Adoption Of Ict To Support Rural Small-Holder Farmers : A Systematic Review, Abdus Salaam Seat, Shaun Pather Sep 2023

Adoption Of Ict To Support Rural Small-Holder Farmers : A Systematic Review, Abdus Salaam Seat, Shaun Pather

African Conference on Information Systems and Technology

Access to Information and Communication Technologies (ICTs) are slowly becoming more available to rural communities given a number of innovative approaches over recent years such as the implementation of Community Networks (CNs). Consequently, ICTs are able to become more meaningful in support of livelihoods of these communities, such as in agriculture production. Potential benefits to smallholder farmers include increase yields and reduced effort. However, there is very little evidence of smallholder farmers integrating ICTs into their livelihood activity. In this paper a Systematic Literature Review is used to explore the challenges faced in this sector. A total of 83 articles …


Factors Influencing The Establishment Of Technology Innovation Hubs - A Structured Literature Review, Oluwaseun Alexander Dada, Jean-Paul Van Belle Sep 2023

Factors Influencing The Establishment Of Technology Innovation Hubs - A Structured Literature Review, Oluwaseun Alexander Dada, Jean-Paul Van Belle

African Conference on Information Systems and Technology

The research context focuses on the establishment of innovation hubs within specific geographical locations, aiming to drive innovation and economic development. The research scope encompassed a thorough examination of existing literature to uncover the diverse range of factors influencing AI hub creation and success. Our research was prompted by the need to address the lack of a comprehensive understanding of these factors. With the aim of examining, we adopted the Structured Literature Review (SLR) methodology. Through our comprehensive analysis, we identified a multitude of critical factors. Based on the number of sources in which they were reported, the factors are …


Information Technology Decision Makers’ Readiness For Artificial Intelligence Governance In Institutions Of Higher Education In South Africa, John Mangundu Sep 2023

Information Technology Decision Makers’ Readiness For Artificial Intelligence Governance In Institutions Of Higher Education In South Africa, John Mangundu

African Conference on Information Systems and Technology

Artificial intelligence (AI) can enhance the educational experience for academics and students. However, research has inadequately examined AI ethics and governance, particularly in the higher education sector of developing economies such as South Africa. AI governance ensures that envisioned AI benefits are realized while reducing AI risks. Against this backdrop of huge research deficit, the current study reports on a qualitative exploratory study that investigates the state of readiness for AI governance and AI governance maturity in South African higher education institutions. Informed by the combination of the TOE framework, the traditional IT governance model and the adapted IT governance …


Smartphone Use In Financial Management Among Women’S Informal Saving Groups In Dodoma, Tanzania, Madina H. Juma, Jarkko Suhonen, Nasibu Rajabu Mramba, Matti Tedre, Alsen F. Kapinga Jul 2023

Smartphone Use In Financial Management Among Women’S Informal Saving Groups In Dodoma, Tanzania, Madina H. Juma, Jarkko Suhonen, Nasibu Rajabu Mramba, Matti Tedre, Alsen F. Kapinga

The African Journal of Information Systems

Diffusion of smartphone technology has created multiple opportunities for economic development. This research investigated the use of smartphones in financial management among women’s informal saving groups in Dodoma, Tanzania. Qualitative data were collected from 10 groups, derived from 15 interviews and 3 focus group discussions (FGDs) with 22 participants and thematic analysis was done. The findings revealed that research participants were using smartphones to access WhatsApp, the camera, mobile money applications and the calculator for coordination, recording, calculation, and payment. It was also found that untrustworthy communications, high charges and mobile fraud were challenges experienced by the groups. Familiarity, ease …


Using Machine Learning Techniques To Model Encoder/Decoder Pair For Non-Invasive Electroencephalographic Wireless Signal Transmission, Ernst Fanfan Jul 2023

Using Machine Learning Techniques To Model Encoder/Decoder Pair For Non-Invasive Electroencephalographic Wireless Signal Transmission, Ernst Fanfan

Master of Science in Computer Science Theses

This study investigated the application and enhancement of Non-Invasive Brain-Computer Interfaces (NI-BCIs), focused on enhancing the efficiency and effectiveness of this technology for individuals with severe physical limitations. The core research goal was to improve current limitations associated with wires, noise, and invasive procedures often associated with BCI technology. The key discussed solution involves developing an optimized Encoder/Decoder (E/D) pair using machine learning techniques, particularly those borrowed from Generative Adversarial Networks (GAN) and other Deep Neural Networks, to minimize data transmission and ensure robustness against data degradation. The study highlighted the crucial role of machine learning in self-adjusting and isolating …


Cyberbullying: Senior Prospective Teachers’ Coping Knowledge And Strategies, Kürşat Arslan, İnan Aydın Jul 2023

Cyberbullying: Senior Prospective Teachers’ Coping Knowledge And Strategies, Kürşat Arslan, İnan Aydın

Journal of Cybersecurity Education, Research and Practice

This study aimed to determine senior prospective teachers’ coping knowledge and strategies for cyberbullying in terms of demographic variables. The sample consisted of 471 prospective teachers (324 female and 147 male) studying in the 4th grade in Dokuz Eylül University Buca Education Faculty in Izmir in the 2019-2020 academic year. It was a quantitative study using a causal-comparative research design to find out whether prospective teachers’ coping knowledge differed by independent variables. The "Coping with Cyberbullying Scale" developed by Koç et al. (2016) was employed to discover prospective teachers’ coping strategies for cyberbullying. A "Personal Information" form was also prepared …


A Systematic Mapping Study On Gamification Applications For Undergraduate Cybersecurity Education, Sherri Weitl-Harms, Adam Spanier, John Hastings, Matthew Rokusek Jul 2023

A Systematic Mapping Study On Gamification Applications For Undergraduate Cybersecurity Education, Sherri Weitl-Harms, Adam Spanier, John Hastings, Matthew Rokusek

Journal of Cybersecurity Education, Research and Practice

Gamification in education presents a number of benefits that can theoretically facilitate higher engagement and motivation among students when learning complex, technical concepts. As an innovative, high-potential educational tool, many educators and researchers are attempting to implement more effective gamification into undergraduate coursework. Cyber Security Operations (CSO) education is no exception. CSO education traditionally requires comprehension of complex concepts requiring a high level of technical and abstract thinking. By properly applying gamification to complex CSO concepts, engagement in students should see an increase. While an increase is expected, no comprehensive study of CSO gamification applications (GA) has yet been undertaken …


Sociocultural Barriers For Female Participation In Stem: A Case Of Saudi Women In Cybersecurity, Alanoud Aljuaid, Xiang Michelle Liu Jul 2023

Sociocultural Barriers For Female Participation In Stem: A Case Of Saudi Women In Cybersecurity, Alanoud Aljuaid, Xiang Michelle Liu

Journal of Cybersecurity Education, Research and Practice

The participation of women in Science, Technology, Engineering, and Mathematics (STEM) workforces is overwhelmingly low as compared to their male counterparts. The low uptake of cybersecurity careers has been documented in the previous studies conducted in the contexts of the West and Eastern worlds. However, most of the past studies mainly covered the Western world leaving more knowledge gaps in the context of Middle Eastern countries such as Saudi Arabia. Thus, to fill the existing knowledge gaps, the current study focused on women in Saudi Arabia. The aim of the study was to investigate the factors behind the underrepresentation of …


Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces, Austin Cusak Jul 2023

Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces, Austin Cusak

Journal of Cybersecurity Education, Research and Practice

A qualitative case study focused on understanding what steps are needed to prepare the cybersecurity workforces of 2026-2028 to work with and against emerging technologies such as Artificial Intelligence and Machine Learning. Conducted through a workshop held in two parts at a cybersecurity education conference, findings came both from a semi-structured interview with a panel of experts as well as small workgroups of professionals answering seven scenario-based questions. Data was thematically analyzed, with major findings emerging about the need to refocus cybersecurity STEM at the middle school level with problem-based learning, the disconnects between workforce operations and cybersecurity operators, the …