Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Business

Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez Oct 2019

Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez

KSU Proceedings on Cybersecurity Education, Research and Practice

Cybersecurity and Information Technology Management programs have many similarities and many similar knowledge, skills, and abilities are taught across both programs. The skill mappings for the NICE Framework and the knowledge units required to become a National Security Agency and Department of Homeland Security Center of Academic Excellence in Cyber Defense Education contain many information technology management functions. This paper explores one university’s perception on how a joint Cybersecurity and Information Technology Management program could be developed to upskill students to be work force ready.


Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz Oct 2019

Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz

KSU Proceedings on Cybersecurity Education, Research and Practice

Today’s college and university cybersecurity programs often contain multiple laboratory activities on various different hardware and software-based cybersecurity tools. These include preventive tools such as firewalls, virtual private networks, and intrusion detection systems. Some of these are tools used in attacking a network, such as packet sniffers and learning how to craft cross-site scripting attacks or man-in-the-middle attacks. All of these are important in learning cybersecurity. However, there is another important component of cybersecurity education – teaching students how to protect a system or network from attackers by learning their motivations, and how they think, developing the students’ “abilities to …


Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley Oct 2018

Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to discuss a curriculum design that employs Kolb’s Experiential Learning Theory stages and Kolb’s Learning Styles in four consecutive class sessions. The challenge each class is to present students with perplexing and often frustrating network problems that someday might be encountered on the job. By using Kolb’s theory, students address those problems from the perspective of each learning style, while passing through each phase of the learning cycle. As a result, students gain stronger cognitive thinking skills and hands-on troubleshooting skills in preparation for work as network administrators or cybersecurity analysts.


Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang Oct 2017

Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang

KSU Proceedings on Cybersecurity Education, Research and Practice

Since web browsers have become essential to accomplishing everyday tasks, developing secure web applications has become a priority in order to protect user data, corporate databases and critical infrastructure against cyber-crimes . This research presents a game-like (gamification) approach to teach key concepts and skills on how to develop secure web applications. Gamification draws on motivational models, one of psychological theories. Gamification design has great potential over traditional education where we often find students demotivated and lecturers failing to engage them in learning activities. This research created game-like learning modules to teach top vulnerabilities and countermeasures for these top vulnerabilities …


Teaching Security Of Internet Of Things In Using Raspberrypi, Oliver Nichols, Li Yang, Xiaohong Yuan Oct 2016

Teaching Security Of Internet Of Things In Using Raspberrypi, Oliver Nichols, Li Yang, Xiaohong Yuan

KSU Proceedings on Cybersecurity Education, Research and Practice

The Internet of Things (IoTs) is becoming a reality in today’s society. The IoTs can find its application in multiple domains including healthcare, critical infrastructure, transportation, and home and personal use. It is important to teach students importance and techniques that are essential in protecting IoTs. We design a series of hands-on labs in a smart home setting, which can exercise attack and protection of IoTs. Our hands-on labs use a Raspberry Pi and several diverse smart things that communicate through Z-Wave technology. Using this environment, students can operate a home automation system and learn security concepts by performing these …


Teaching Static Call Analysis To Detect Anomalous Software Behavior, Jordan Shropshire, Philip Menard Oct 2016

Teaching Static Call Analysis To Detect Anomalous Software Behavior, Jordan Shropshire, Philip Menard

KSU Proceedings on Cybersecurity Education, Research and Practice

Malicious code detection is a critical part of any cyber security operation. Typically, the behavior of normal applications is modeled so that deviations from normal behavior can be identified. There are multiple approach to modeling good behavior but the most common approach is to observe applications’ system call activity. System calls are messages passed between user space applications and their underlying operating systems. The detection of irregular system call activity signals the presence of malicious software behavior. This method of malware-detection has been used successfully for almost two decades. Unfortunately, it can be difficult to cover this concept at the …


Students' Attitudes Towards Textbook Types: Are Students Really Ready For E-Textbooks?, Diane R. Edmondson, Cheryl Ward Sep 2015

Students' Attitudes Towards Textbook Types: Are Students Really Ready For E-Textbooks?, Diane R. Edmondson, Cheryl Ward

Atlantic Marketing Association Proceedings

Textbook selection is just one of the many decisions a professor has to make when teaching a class. These selection decisions are sometimes made by the individual professor while other times it is made by committee or department. In many cases, students are not taken into consideration when making these decisions. However considering many professors complain that students do not buy or use the required textbook (Kingkade 2014, Paxhia 2011, Robinson 2011), maybe it is time to think about student’s attitudes and preferences before making textbook adoption decisions. Unfortunately there are only a few studies (e.g. Daniel and Woody 2013) …


Job Shadowing Experiences As A Teaching Tool: A New Twist On A Tried And True Technique, Fred H. Mader, Deanna R.D. Mader, Elizabeth C. Alexander Sep 2015

Job Shadowing Experiences As A Teaching Tool: A New Twist On A Tried And True Technique, Fred H. Mader, Deanna R.D. Mader, Elizabeth C. Alexander

Atlantic Marketing Association Proceedings

Job shadowing has a long history of utilization. It is primarily considered a way for youth to become aware of the world-of-work through programs sponsored by schools or social organizations. For example, Junior Achievement International, in cooperation with several government agencies, has sponsored Groundhog Job Shadow Day for nearly 20 years. A quick internet search for job shadowing yielded over 24 million hits with the vast majority of those focused on programs aimed at high school students. Internet offerings detail anecdotal accounts of experiences, methods for setting up and executing programs, and extolment of the virtues of shadowing as a …


The Dos And Don'ts Of Teaching Online: Practical Advice And Suggestions For Teaching Online, Anita Whiting Sep 2015

The Dos And Don'ts Of Teaching Online: Practical Advice And Suggestions For Teaching Online, Anita Whiting

Atlantic Marketing Association Proceedings

Many colleges and universities are focusing heavily on online learning (Holzweiss, Joyner, Fuller, Henderson, & Young 2014). Over sixty-six percent of higher education institutions report that online learning is an important part of their long term strategy (Allen & Seaman, 2014). Over seven million students took online courses at higher education institutions in 2012 (Baran & Correia 2014).

Demand for online classes is growing. Students are expecting more online teaching and universities are requesting that more classes be taught online. According to Hart (2014), online teaching has become almost expected at most universities.


Greening An Integrated Marketing Communication's Course: An Assessment Of Sustainability Literacy, Pia A. Albinsson, G. David Shows Sep 2015

Greening An Integrated Marketing Communication's Course: An Assessment Of Sustainability Literacy, Pia A. Albinsson, G. David Shows

Atlantic Marketing Association Proceedings

This article showcases efforts of incorporating Sustainability Issues in an Integrated Marketing Communications (IMC) class during three semesters during the academic years of 2013/2014 and 2014/2015. The course was re-designed using Fink’s (2013) course recommendations of designing significant learning goals. In addition to the way the course was delivered (both face-to-face and online), the instructor worked with a Higher Ed publisher to customize a textbook to include sustainability issues related to the course content (i.e., reflecting IMC topics). The course re-design included sustainability assignments such as Virtual Field Trips (visiting corporate websites and other organizations to study their CSR statements …