Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Marketing (443)
- Management Information Systems (375)
- Education (266)
- Physical Sciences and Mathematics (266)
- Social and Behavioral Sciences (259)
-
- Technology and Innovation (247)
- Computer Sciences (222)
- Information Security (192)
- Advertising and Promotion Management (177)
- Sales and Merchandising (116)
- Accounting (104)
- Business Administration, Management, and Operations (103)
- Communication (99)
- E-Commerce (96)
- Other Business (86)
- Business and Corporate Communications (83)
- Entrepreneurial and Small Business Operations (78)
- Arts and Humanities (66)
- Engineering (57)
- Medicine and Health Sciences (56)
- Business Law, Public Responsibility, and Ethics (49)
- Finance and Financial Management (46)
- Curriculum and Instruction (44)
- International Business (42)
- Economics (41)
- Operations and Supply Chain Management (41)
- Library and Information Science (39)
- Higher Education (37)
- Arts Management (35)
- Keyword
-
- Cybersecurity (39)
- Marketing (35)
- Social media (30)
- Interdisciplinary (29)
- Business education (28)
-
- Conference program (27)
- Posters (27)
- Presentations (27)
- Undergraduate student research (27)
- Consumer behavior (20)
- Advertising (18)
- Library marketing (14)
- Library posters (14)
- Library promotion (14)
- Pedagogy (14)
- READ (14)
- Editorial (13)
- Marketing strategy (13)
- Accounting (12)
- Business (12)
- Education (12)
- Information security (12)
- Internet (12)
- Research (12)
- Auditing (11)
- Experiential learning (11)
- Marketing education (11)
- Case study (10)
- Communication (10)
- E-commerce (10)
- Publication Year
- Publication
-
- Faculty and Research Publications (245)
- Atlantic Marketing Journal (224)
- Atlantic Marketing Association Proceedings (198)
- The African Journal of Information Systems (150)
- Journal of Cybersecurity Education, Research and Practice (104)
-
- KSU Proceedings on Cybersecurity Education, Research and Practice (89)
- Journal of Executive Education (82)
- Doctor of Business Administration Dissertations (45)
- African Conference on Information Systems and Technology (29)
- Symposium of Student Scholars Program Books (28)
- Symposium of Student Scholars (24)
- Library Marketing Materials (21)
- ENGL 1102 Showcase (9)
- KSU Distinguished Course Repository (8)
- PhD in Business Administration Dissertations (8)
- The Southeastern Librarian (8)
- Journal of Global Initiatives: Policy, Pedagogy, Perspective (7)
- The Kennesaw Journal of Undergraduate Research (7)
- Georgia Library Quarterly (6)
- Published and Grey Literature from PhD Candidates (5)
- Transforming Libraries for Graduate Students (5)
- Graduate Scholarly Works (4)
- Doctor of Data Science and Analytics Dissertations (3)
- Emerging Writers (3)
- Master of Arts in Professional Writing Capstones (3)
- The Investigator Research Magazine (3)
- The Siegel Institute Journal of Applied Ethics (3)
- Doctor of International Conflict Management Dissertations (2)
- Georgia Journal of Public Policy (2)
- KSU Press Legacy Project (2)
- Publication Type
- File Type
Articles 61 - 90 of 1334
Full-Text Articles in Business
Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd
Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd
Journal of Cybersecurity Education, Research and Practice
This paper should be of interest to the readers of this journal because it addresses a subject that has received little scholarly attention; namely, local government cybersecurity. The U.S. has over 90,000 units of local government, of which almost 39,000 are “general purpose” units (i.e., municipalities, counties, towns and townships). On average, these governments do not practice cybersecurity effectively (Norris, et al., 2019 and 2020). One possible reason is that they do not adopt and/or implement highly recommended cybersecurity policies. In this paper, we examine local government adoption or lack of adoption of cybersecurity policies using data from three surveys. …
Integrating Certifications Into The Cybersecurity College Curriculum: The Efficacy Of Education With Certifications To Increase The Cybersecurity Workforce, Binh Tran, Karen C. Benson, Lorraine Jonassen
Integrating Certifications Into The Cybersecurity College Curriculum: The Efficacy Of Education With Certifications To Increase The Cybersecurity Workforce, Binh Tran, Karen C. Benson, Lorraine Jonassen
Journal of Cybersecurity Education, Research and Practice
One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An un-tapped resource to combat these attacks lies in the students of the secondary educational system. Necessary in the cybersecurity education is a 3-tiered approach to quickly escalate the student into a workplace-ready graduate. The analogy used is a three-legged-stool, where curriculum content, hands-on skills, and certifications are equal instruments in the edification of the cybersecurity student. This paper endeavors to delve into the 3rd leg of …
Cybersecurity Challenges And Awareness Of The Multi-Generational Learners In Nepal, Raj Kumar Dhungana, Lina Gurung Dr, Hem Poudyal
Cybersecurity Challenges And Awareness Of The Multi-Generational Learners In Nepal, Raj Kumar Dhungana, Lina Gurung Dr, Hem Poudyal
Journal of Cybersecurity Education, Research and Practice
Increased exposure to technologies has lately emerged as one of the everyday realities of digital natives, especially K-12 students, and teachers, the digital immigrants. Protection from cybersecurity risks in digital learning spaces is a human right, but students are increasingly exposed to high-risk cyberspace without time to cope with cybersecurity risks. This study, using a survey (N-891 students and 157 teachers) and in-depth interviews (27 students and 14 teachers), described the students' cybersecurity-related experiences and challenges in Nepal. This study revealed that the school’s cybersecurity support system is poor and teachers has very low awareness and competencies to protect students …
What You See Is Not What You Know: Studying Deception In Deepfake Video Manipulation, Cathryn Allen, Bryson R. Payne, Tamirat Abegaz, Chuck Robertson
What You See Is Not What You Know: Studying Deception In Deepfake Video Manipulation, Cathryn Allen, Bryson R. Payne, Tamirat Abegaz, Chuck Robertson
Journal of Cybersecurity Education, Research and Practice
Research indicates that deceitful videos tend to spread rapidly online and influence people’s opinions and ideas. Because of this, video misinformation via deepfake video manipulation poses a significant online threat. This study aims to discover what factors can influence viewers’ capability to distinguish deepfake videos from genuine video footage. This work focuses on exploring deepfake videos’ potential use for deception and misinformation by exploring people’s ability to determine whether videos are deepfakes in a survey consisting of deepfake videos and original unedited videos. The participants viewed a set of four videos and were asked to judge whether the videos shown …
Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas
Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas
Journal of Cybersecurity Education, Research and Practice
The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two programs offer a required course about terrorism. Given the fluid nature of terrorism and its threat to national infrastructure, the omission is concerning. It is recommended that NSA-certified cybersecurity programs begin implementing educational content that aim to teach about this emerging crime and justice issue. One suggestion is to embrace the …
Editorial, Michael E. Whitman, Herbert J. Mattord
Editorial, Michael E. Whitman, Herbert J. Mattord
Journal of Cybersecurity Education, Research and Practice
Editorial for Volume 2023, Issue 2
Service-Oriented Framework For Developing Interoperable E-Health Systems In A Low-Income Country, Bonface Abima, Agnes Nakakawa, Geoffrey Mayoka Kituyi
Service-Oriented Framework For Developing Interoperable E-Health Systems In A Low-Income Country, Bonface Abima, Agnes Nakakawa, Geoffrey Mayoka Kituyi
The African Journal of Information Systems
e-Health solutions in low-income countries are fragmented, address institution-specific needs, and do little to address the strategic need for inter-institutional exchange of health data. Although various e-health interoperability frameworks exist, contextual factors often hinder their effective adoption in low-income countries. This underlines the need to investigate such factors and to use findings to adapt existing e-health interoperability models. Following a design science approach, this research involved conducting an exploratory survey among 90 medical and Information Technology personnel from 67 health facilities in Uganda. Findings were used to derive requirements for e-health interoperability, and to orchestrate elements of a service oriented …
Phishing Attacks: A Security Challenge For University Students Studying Remotely, Blessing Nyasvisvo, Joel M. Chigada
Phishing Attacks: A Security Challenge For University Students Studying Remotely, Blessing Nyasvisvo, Joel M. Chigada
The African Journal of Information Systems
The emergence of the deadly global respiratory coronavirus disease (COVID-19) in 2019 claimed many lives and altered the way people live and behave as well as how companies operated. Considerable pressure was exerted on Institutions of Higher Learning (universities) to salvage the academic projects through the process of business model reconfiguration. Students were required to study remotely and were, therefore, exposed to phishing and scamming cyber-attacks. The effects of these attacks were examined in this study with the support of literature and empirical research leading to appropriate recommendations being proposed. Data were obtained through semi-structured interviews from students at a …
Generating Clicks: Display Advertising Within Social Media, Ronda Mariani, Thomas Tanner, Loreen Powell
Generating Clicks: Display Advertising Within Social Media, Ronda Mariani, Thomas Tanner, Loreen Powell
Atlantic Marketing Journal
This research study developed a comprehensive social community prototype and tested a variety of display advertising scenarios to determine which scenario motivated social media users to click. Empirical research based upon 503 users of social media led to the development of several independent variables, which were identified in the study as display advertising scenarios. The display advertising scenarios tested in the study were video, animation, engagement, and brand familiarity, as well as the size and location of the display advertising within each social media prototype web page. Data collected identified which display advertisement scenarios motivated a social media user to …
Chatgpt Unveiled: Unleashing Ai Magic In Online Shopping And Digital Marketing, Jianping Huang, Mark J. Sciuchetti Dr.
Chatgpt Unveiled: Unleashing Ai Magic In Online Shopping And Digital Marketing, Jianping Huang, Mark J. Sciuchetti Dr.
Atlantic Marketing Journal
This research paper explores the use of AI, specifically ChatGPT, in interactive activities within
online shopping and digital marketing. The paper examines the potential of AI-powered chatbots
to enhance customer engagement, personalization, and marketing effectiveness. Through a
literature review, case studies, and user feedback analysis, the research highlights the benefits of
AI chatbots in providing real-time assistance, personalized recommendations, and improved
customer experiences. The paper also addresses ethical and privacy concerns associated with AI
implementation and discusses future research directions. The findings are expected to suggest
that AI-powered chatbots have the potential to revolutionize online shopping and digital
marketing by …
Exploring The Role Of An Organization In Implementing A Work-From-Home Strategy, Ryan Tripod, Sumarie Roodt
Exploring The Role Of An Organization In Implementing A Work-From-Home Strategy, Ryan Tripod, Sumarie Roodt
African Conference on Information Systems and Technology
Organizations are trying to move quickly to adopt remote working policies into their organizations as to attract and retain top talent, reduce office space costs, and increase productivity. As many of these strategies were quickly adopted by South African ICT organizations during the COIVD-19 pandemic, organizations are still somewhat unclear on what their role is with regards to ensuring long term adoption of remote working. Thus, this study explored the role of the organization with regards to a work-from-home strategy. It was found that the organization is responsible for formalizing the chosen strategy, creating supportive policies, and adapting its management …
Developing An Integrative Theoretical Framework For Electronic Business Value Optimisation In Botswana, Meduduetso Tsumake-Tsiang, Adheesh Budree
Developing An Integrative Theoretical Framework For Electronic Business Value Optimisation In Botswana, Meduduetso Tsumake-Tsiang, Adheesh Budree
African Conference on Information Systems and Technology
Organizations are trying to move quickly to adopt remote working policies into their organizations as to attract and retain top talent, reduce office space costs, and increase productivity. As many of these strategies were quickly adopted by South African ICT organizations during the COIVD-19 pandemic, organizations are still somewhat unclear on what their role is with regards to ensuring long term adoption of remote working. Thus, this study explored the role of the organization with regards to a work-from-home strategy. It was found that the organization is responsible for formalizing the chosen strategy, creating supportive policies, and adapting its management …
The Dark Side Of Mobile Money Transfer : A Case Study Of Zimbabwe, Theo Tsokota, Collector Chipfumbu, Melody Maseko
The Dark Side Of Mobile Money Transfer : A Case Study Of Zimbabwe, Theo Tsokota, Collector Chipfumbu, Melody Maseko
African Conference on Information Systems and Technology
Mobile money transfer has been widely presented in the literature and in practice as a way to bring the poor, unbanked and backward communities into the mainstream financial system. The main objective of this paper is to provide insights into how mobile money transfer has contributed to the negative effects on Zimbabwe's economy and its citizens. Using integrative literature this study explores the how mobile money transfers have negatively affected the economy of Zimbabwe and its citizens. The findings show that mobile money, if not properly regulated, can promote money laundering, fraud and financial irregularities, which can harm the entire …
The Sharing Economy: Understanding The Affordances Of And Barriers To The Use Of Digital Platforms, Phaswana Malatjie, Lisa F. Seymour
The Sharing Economy: Understanding The Affordances Of And Barriers To The Use Of Digital Platforms, Phaswana Malatjie, Lisa F. Seymour
African Conference on Information Systems and Technology
Studies exploring sharing economy services such as automotive, house-sharing, and bike rentals have predicted that these services will add billions of dollars to the global economy by 2025. Sharing economy services could reduce unemployment in Africa. Hence, there is a need to understand the affordance and the barriers to sharing economy platforms. This paper presents a literature review that helps answer the question: What are the affordances of and barriers to the use of sharing platforms? A literature review following a synthesis approach, reveals gaps around the sharing economy services relating to load-shedding, regulations and social exclusion. Potential future directions …
Social Media & Privacy: Understanding Privacy In The Age Of Content Creator Culture, Robert Tagoe, Raphael Amponsah, Emmanuel Awuni Kolog, Eric Afful-Dadzie
Social Media & Privacy: Understanding Privacy In The Age Of Content Creator Culture, Robert Tagoe, Raphael Amponsah, Emmanuel Awuni Kolog, Eric Afful-Dadzie
African Conference on Information Systems and Technology
In today's digital age, content creators are gaining public attention and becoming highly influential. With that increased influence, it is important to acknowledge the privacy concerns within this culture. This interpretive research study seeks to identify and understand the dynamics of privacy within the content creator culture. This research will leverage information from interviews with content creators from various social media platforms such as YouTube, Instagram, Facebook, and TikTok. Using theories to understand the phenomena, theories of privacy calculus, privacy paradox and self-disclosure, will be used to view how content creators define and navigate privacy, strategies employed to control personal …
The State Of The Digital Skills Ecosystem In Zimbabwe: An Exploratory Analysis, Annette Mangena, Gwamaka Mwalemba
The State Of The Digital Skills Ecosystem In Zimbabwe: An Exploratory Analysis, Annette Mangena, Gwamaka Mwalemba
African Conference on Information Systems and Technology
There are many ongoing efforts globally to address the skills requirements gaps created by the high pace of technological changes often referred to as the 4IR. The challenge is particularly acute in developing countries grappling with many high-priority socioeconomic challenges, including low levels of digital literacy. This study represents initial efforts to understand a developing country's local digital skills landscape, explicitly focusing on Zimbabwe. The study was conducted through a literature analysis to explore the digital skills discourse in Zimbabwe based on published academic papers. The findings point to a discourse focused on applied digital skills within specific fields and …
The Impact Of Digital Transformation On Institutional Growth. A Case Of Zimbabwean Universities, Vusumuzi Maphosa
The Impact Of Digital Transformation On Institutional Growth. A Case Of Zimbabwean Universities, Vusumuzi Maphosa
African Conference on Information Systems and Technology
The pressure for institutions to digitally transform has been building, and COVID-19 accelerated the transition in developing countries. The study evaluated the impact of digital transformation on Zimbabwean universities. The Microsoft digital transformation framework guided the study. Thematic analysis was used to extract meaning and generate themes from qualitative data from university ICT Directors. Results show that digital transformation positively impacted institutional growth and efficiency. Most universities invest in digital technology to increase service reliability and availability. Digital transformation teams were bolstered to support student processes and create personalised learning journeys. The digital transformation led to the adoption of several …
Digital Transformation Of Smes Through Social Media, Georgette Eugenia Otoo, Raphael Amponsah, Eric Afful-Dadzie, Emmanuel Awuni Kolog
Digital Transformation Of Smes Through Social Media, Georgette Eugenia Otoo, Raphael Amponsah, Eric Afful-Dadzie, Emmanuel Awuni Kolog
African Conference on Information Systems and Technology
This research paper explores the strategic integration of social media platforms by Small and Medium-sized Enterprises (SMEs) in Low- and Middle-Income Countries (LMICs) beyond marketing. Drawing from Resource-Based View and Dynamic Capabilities theories, the study investigates how social media enhances management, coordination, and control functions. Through five diverse case studies from Ghana, findings reveal SMEs’ innovative use of platforms like Instagram, WhatsApp, Slack, and Trello. These platforms foster efficient internal communication, customer engagement, project management, and talent acquisition. Challenges such as technical expertise and dynamic digital landscapes are identified.
Internet Of Things Affordance For Open Educational Resources In A Comprehensive Open Distance E-Learning, Lancelord Mncube
Internet Of Things Affordance For Open Educational Resources In A Comprehensive Open Distance E-Learning, Lancelord Mncube
African Conference on Information Systems and Technology
The Internet of Things (IoT) space has dual dimensions of affordance to support open educational resources (OER). The duality of affordance has little or not been well articulated in relation to OER, particularly in a Comprehensive open distance e-learning (CODEL) institution. Such an institution is a mega open distance in South Africa and beyond the continent to accommodate students globally and rely on information and communication technology (ICT) in the provision of tuition. In the CODEL institution, there is a recognizable shift as the institution encourages the appropriation of OER and phasing out the prescription of the prescribed textbooks. The …
Benefits Of Adopting Micro-Credentials For Skills Development, Oyena Nokulunga Mahlasela, Adriana A. Steyn
Benefits Of Adopting Micro-Credentials For Skills Development, Oyena Nokulunga Mahlasela, Adriana A. Steyn
African Conference on Information Systems and Technology
Micro-credential providers are increasing both in diversity and volume. However, employers are still concerned about their role in skill development. This study aimed to understand how micro-credentials can assist employees in skills development. A systematic literature review was conducted for studies published between (2016 to 2023). Thirty-two sources were included in the final review. After that, five recommendations for employers when adopting micro-credentials were constructed first by (1) defining the value of formal and informal education. (2) exploring micro-credentials as a tool for skills development. (3) encouraging organisations to collaborate with other institutions. (4) encouraging continuous personalised learning, known as …
Factors Influencing The Retention Of Millennial Software Developers In South African Companies, Kim Fouche, Maureen Tanner
Factors Influencing The Retention Of Millennial Software Developers In South African Companies, Kim Fouche, Maureen Tanner
African Conference on Information Systems and Technology
South Africa has an Information Technology skills shortage leading to high turnover of Information Technology professionals. Not only do companies face significant costs in replacing software developers, but high mobility also affects staff morale. Millennials are known to be more loyal to their own needs and do not tend to stay at companies for long, increasing the complexities of retention. This study explores the factors that influence the retention of millennial software developers in South African companies. The qualitative study was carried out using online semi-structured interviews. The study found that work environment, lifestyle, and management style, play a key …
Adoption Of Ict To Support Rural Small-Holder Farmers : A Systematic Review, Abdus Salaam Seat, Shaun Pather
Adoption Of Ict To Support Rural Small-Holder Farmers : A Systematic Review, Abdus Salaam Seat, Shaun Pather
African Conference on Information Systems and Technology
Access to Information and Communication Technologies (ICTs) are slowly becoming more available to rural communities given a number of innovative approaches over recent years such as the implementation of Community Networks (CNs). Consequently, ICTs are able to become more meaningful in support of livelihoods of these communities, such as in agriculture production. Potential benefits to smallholder farmers include increase yields and reduced effort. However, there is very little evidence of smallholder farmers integrating ICTs into their livelihood activity. In this paper a Systematic Literature Review is used to explore the challenges faced in this sector. A total of 83 articles …
Factors Influencing The Establishment Of Technology Innovation Hubs - A Structured Literature Review, Oluwaseun Alexander Dada, Jean-Paul Van Belle
Factors Influencing The Establishment Of Technology Innovation Hubs - A Structured Literature Review, Oluwaseun Alexander Dada, Jean-Paul Van Belle
African Conference on Information Systems and Technology
The research context focuses on the establishment of innovation hubs within specific geographical locations, aiming to drive innovation and economic development. The research scope encompassed a thorough examination of existing literature to uncover the diverse range of factors influencing AI hub creation and success. Our research was prompted by the need to address the lack of a comprehensive understanding of these factors. With the aim of examining, we adopted the Structured Literature Review (SLR) methodology. Through our comprehensive analysis, we identified a multitude of critical factors. Based on the number of sources in which they were reported, the factors are …
Information Technology Decision Makers’ Readiness For Artificial Intelligence Governance In Institutions Of Higher Education In South Africa, John Mangundu
African Conference on Information Systems and Technology
Artificial intelligence (AI) can enhance the educational experience for academics and students. However, research has inadequately examined AI ethics and governance, particularly in the higher education sector of developing economies such as South Africa. AI governance ensures that envisioned AI benefits are realized while reducing AI risks. Against this backdrop of huge research deficit, the current study reports on a qualitative exploratory study that investigates the state of readiness for AI governance and AI governance maturity in South African higher education institutions. Informed by the combination of the TOE framework, the traditional IT governance model and the adapted IT governance …
Smartphone Use In Financial Management Among Women’S Informal Saving Groups In Dodoma, Tanzania, Madina H. Juma, Jarkko Suhonen, Nasibu Rajabu Mramba, Matti Tedre, Alsen F. Kapinga
Smartphone Use In Financial Management Among Women’S Informal Saving Groups In Dodoma, Tanzania, Madina H. Juma, Jarkko Suhonen, Nasibu Rajabu Mramba, Matti Tedre, Alsen F. Kapinga
The African Journal of Information Systems
Diffusion of smartphone technology has created multiple opportunities for economic development. This research investigated the use of smartphones in financial management among women’s informal saving groups in Dodoma, Tanzania. Qualitative data were collected from 10 groups, derived from 15 interviews and 3 focus group discussions (FGDs) with 22 participants and thematic analysis was done. The findings revealed that research participants were using smartphones to access WhatsApp, the camera, mobile money applications and the calculator for coordination, recording, calculation, and payment. It was also found that untrustworthy communications, high charges and mobile fraud were challenges experienced by the groups. Familiarity, ease …
Using Machine Learning Techniques To Model Encoder/Decoder Pair For Non-Invasive Electroencephalographic Wireless Signal Transmission, Ernst Fanfan
Master of Science in Computer Science Theses
This study investigated the application and enhancement of Non-Invasive Brain-Computer Interfaces (NI-BCIs), focused on enhancing the efficiency and effectiveness of this technology for individuals with severe physical limitations. The core research goal was to improve current limitations associated with wires, noise, and invasive procedures often associated with BCI technology. The key discussed solution involves developing an optimized Encoder/Decoder (E/D) pair using machine learning techniques, particularly those borrowed from Generative Adversarial Networks (GAN) and other Deep Neural Networks, to minimize data transmission and ensure robustness against data degradation. The study highlighted the crucial role of machine learning in self-adjusting and isolating …
Cyberbullying: Senior Prospective Teachers’ Coping Knowledge And Strategies, Kürşat Arslan, İnan Aydın
Cyberbullying: Senior Prospective Teachers’ Coping Knowledge And Strategies, Kürşat Arslan, İnan Aydın
Journal of Cybersecurity Education, Research and Practice
This study aimed to determine senior prospective teachers’ coping knowledge and strategies for cyberbullying in terms of demographic variables. The sample consisted of 471 prospective teachers (324 female and 147 male) studying in the 4th grade in Dokuz Eylül University Buca Education Faculty in Izmir in the 2019-2020 academic year. It was a quantitative study using a causal-comparative research design to find out whether prospective teachers’ coping knowledge differed by independent variables. The "Coping with Cyberbullying Scale" developed by Koç et al. (2016) was employed to discover prospective teachers’ coping strategies for cyberbullying. A "Personal Information" form was also prepared …
A Systematic Mapping Study On Gamification Applications For Undergraduate Cybersecurity Education, Sherri Weitl-Harms, Adam Spanier, John Hastings, Matthew Rokusek
A Systematic Mapping Study On Gamification Applications For Undergraduate Cybersecurity Education, Sherri Weitl-Harms, Adam Spanier, John Hastings, Matthew Rokusek
Journal of Cybersecurity Education, Research and Practice
Gamification in education presents a number of benefits that can theoretically facilitate higher engagement and motivation among students when learning complex, technical concepts. As an innovative, high-potential educational tool, many educators and researchers are attempting to implement more effective gamification into undergraduate coursework. Cyber Security Operations (CSO) education is no exception. CSO education traditionally requires comprehension of complex concepts requiring a high level of technical and abstract thinking. By properly applying gamification to complex CSO concepts, engagement in students should see an increase. While an increase is expected, no comprehensive study of CSO gamification applications (GA) has yet been undertaken …
Sociocultural Barriers For Female Participation In Stem: A Case Of Saudi Women In Cybersecurity, Alanoud Aljuaid, Xiang Michelle Liu
Sociocultural Barriers For Female Participation In Stem: A Case Of Saudi Women In Cybersecurity, Alanoud Aljuaid, Xiang Michelle Liu
Journal of Cybersecurity Education, Research and Practice
The participation of women in Science, Technology, Engineering, and Mathematics (STEM) workforces is overwhelmingly low as compared to their male counterparts. The low uptake of cybersecurity careers has been documented in the previous studies conducted in the contexts of the West and Eastern worlds. However, most of the past studies mainly covered the Western world leaving more knowledge gaps in the context of Middle Eastern countries such as Saudi Arabia. Thus, to fill the existing knowledge gaps, the current study focused on women in Saudi Arabia. The aim of the study was to investigate the factors behind the underrepresentation of …
Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces, Austin Cusak
Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces, Austin Cusak
Journal of Cybersecurity Education, Research and Practice
A qualitative case study focused on understanding what steps are needed to prepare the cybersecurity workforces of 2026-2028 to work with and against emerging technologies such as Artificial Intelligence and Machine Learning. Conducted through a workshop held in two parts at a cybersecurity education conference, findings came both from a semi-structured interview with a panel of experts as well as small workgroups of professionals answering seven scenario-based questions. Data was thematically analyzed, with major findings emerging about the need to refocus cybersecurity STEM at the middle school level with problem-based learning, the disconnects between workforce operations and cybersecurity operators, the …