Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Accessibility (1)
- Adult and Continuing Education (1)
- Adult and Continuing Education and Teaching (1)
- Artificial Intelligence and Robotics (1)
- Computer Sciences (1)
-
- Curriculum and Instruction (1)
- Disability and Equity in Education (1)
- Education (1)
- Educational Administration and Supervision (1)
- Educational Technology (1)
- Elementary and Middle and Secondary Education Administration (1)
- Gender Equity in Education (1)
- Higher Education (1)
- Higher Education Administration (1)
- Higher Education and Teaching (1)
- Information Security (1)
- Junior High, Intermediate, Middle School Education and Teaching (1)
- Other Educational Administration and Supervision (1)
- Other Teacher Education and Professional Development (1)
- Physical Sciences and Mathematics (1)
- Teacher Education and Professional Development (1)
- Technology and Innovation (1)
- University Extension (1)
Articles 1 - 2 of 2
Full-Text Articles in Management Information Systems
Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces, Austin Cusak
Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces, Austin Cusak
Journal of Cybersecurity Education, Research and Practice
A qualitative case study focused on understanding what steps are needed to prepare the cybersecurity workforces of 2026-2028 to work with and against emerging technologies such as Artificial Intelligence and Machine Learning. Conducted through a workshop held in two parts at a cybersecurity education conference, findings came both from a semi-structured interview with a panel of experts as well as small workgroups of professionals answering seven scenario-based questions. Data was thematically analyzed, with major findings emerging about the need to refocus cybersecurity STEM at the middle school level with problem-based learning, the disconnects between workforce operations and cybersecurity operators, the …
Cyber Threat Intelligence Discovery Using Machine Learning From The Dark Web
Cyber Threat Intelligence Discovery Using Machine Learning From The Dark Web
Communications of the IIMA
Cyber threat intelligence (CTI) is an actionable information or insight an organization uses to understand potential vulnerabilities it does have and threats it is facing. One important CTI for proactive cyber defense is exploit type with possible values system, web, network, website or Mobile. This study compares the performance of machine learning algorithms in predicating exploit types using form posts in the dark web, which is a semi- structured dataset collected from dark web. The study uses the CRISP data science approach. The results of the study show that machine learning algorithms which are function-based including support vector machine and …