Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

2023

Journal

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 97

Full-Text Articles in Management Information Systems

An Examination Of The Relationship Between Cheating In Online Classes And Technostress: Perceptions Of Business Faculty, Stacy Boyer-Davis, Kevin Berry, Amy Cooper Dec 2023

An Examination Of The Relationship Between Cheating In Online Classes And Technostress: Perceptions Of Business Faculty, Stacy Boyer-Davis, Kevin Berry, Amy Cooper

International Journal for Business Education

This research study investigated the relationship between technostress creators (techno-complexity, techno-insecurity, techno-invasion, techno-overload, and techno-uncertainty) and faculty perceptions of student cheating in online classes. Data were collected from faculty members of the Management and Organizational Behavior Teaching Society (MOBTS), a member of the AACSB Business Education Alliance, the American Society of Business and Behavioral Sciences (ASBBS), an interdisciplinary professional organization comprised of faculty teaching in accounting, finance, management, marketing, organizational behavior, and computer information systems, and other research panels during 2021 (N = 94). Findings from regression analysis indicated that the techno-complexity subconstruct is positively related to a faculty’s perception …


The Evaluation Of Successful Implementation Of Human Resource Information In Private Organization, Sancoko Sancoko, Armeyta Widya Oryza, Niko Grataradirga Dec 2023

The Evaluation Of Successful Implementation Of Human Resource Information In Private Organization, Sancoko Sancoko, Armeyta Widya Oryza, Niko Grataradirga

Jurnal Administrasi Bisnis Terapan (JABT)

This study intend to evaluate the use of the Human Resources Information System (HRIS) in private organization. User satisfaction is one of the conditions for the successful implementation of information systems. To evaluate this system information, the author uses the conceptual Delone and Mclean information system success model(ISSM). This study employs a quantitative methodology and a survey method. The research sample consists of employees in private organizations engaged in software engineering. To analyze, SPSS is employed by the author in two stages: first validity-reliability examination, second multiple regression tests. The result demonstrated that quality system has a significant affect on …


Social Engineering Cyber Threats, Young B. Choi, Josh Rubin Dec 2023

Social Engineering Cyber Threats, Young B. Choi, Josh Rubin

Journal of Global Awareness

The article explores the pervasive threat of social engineering in cybersecurity, emphasizing its success in infiltrating information systems by manipulating individuals rather than employing traditional hacking methods. The author underscores the vulnerability arising from human trust, as individuals, especially those lacking technology education, tend to be targets. While cryptography offers partial security, social engineering complicates overall system security. Mitigation strategies include educating employees on threats, risks, and security policies, coupled with enforcing penalties for noncompliance. Additionally, employing two-factor authentication and physical token-based access adds layers of protection. The article delves into semantic attacks, classifying various exploitation methods and emphasizing the …


Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman Dec 2023

Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman

Journal of Cybersecurity Education, Research and Practice

Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …


Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu Nov 2023

Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu

Journal of Cybersecurity Education, Research and Practice

This pilot study aims to assess the acceptability of Open University’s training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post experimental design was employed. 43 self-selected participants were recruited via an online register and posters at the university (excluding IT related courses). Participants completed the Human Aspects of Information Security Questionnaire (HAIS-Q) and Fear of Missing Out (FoMO) Scale. They then completed all games and quizzes in the GICAST course before repeating the HAIS-Q and …


The Technology, Organization, And Environment Framework For Social Media Analytics In Government: The Cases Of South Africa And Germany, Brenda M. Scholtz, Khulekani Yakobi Nov 2023

The Technology, Organization, And Environment Framework For Social Media Analytics In Government: The Cases Of South Africa And Germany, Brenda M. Scholtz, Khulekani Yakobi

The African Journal of Information Systems

This paper investigates factors influencing the adoption of social media analytics (SMA) for citizen relationship management (CzRM). Three real-world cases of government departments, two in South Africa and one in Germany, were investigated, and focus group discussions were conducted. The technological, organizational, and environmental (TOE) theory and qualitative content analysis guided the data analysis. The findings revealed that in all cases, staff usually conducted a manual analysis of social media and SMA had not been implemented sufficiently to realize its full potential. Insights were obtained from TOE and factors were identified that should be considered for improving the planning of …


Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang Nov 2023

Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang

Journal of Cybersecurity Education, Research and Practice

Recent advances in Artificial Intelligence (AI) have brought society closer to the long-held dream of creating machines to help with both common and complex tasks and functions. From recommending movies to detecting disease in its earliest stages, AI has become an aspect of daily life many people accept without scrutiny. Despite its functionality and promise, AI has inherent security risks that users should understand and programmers must be trained to address. The ICE (integrity, confidentiality, and equity) cybersecurity labs developed by a team of cybersecurity researchers addresses these vulnerabilities to AI models through a series of hands-on, inquiry-based labs. Through …


Analysis Of Us Airline Stocks Performance Using Latent Dirichlet Allocation (Lda), Amina Issoufou Anaroua Nov 2023

Analysis Of Us Airline Stocks Performance Using Latent Dirichlet Allocation (Lda), Amina Issoufou Anaroua

Beyond: Undergraduate Research Journal

Various events, such as changes in the interest rate or the hijacking of a commercial aircraft, can lead to significant shifts in airline stock performance. This study aimed to measure the impact of aviation-related news announcements on the stock performance of US airlines, focusing on different topics. The dataset included aviation news covering airlines, airports, regulations, safety, accidents, manufacturers, MRO, incidents, aviation training, general aviation, and others obtained from Aviation Voice. To uncover patterns that could explain the movements of US airline stocks, a natural language processing technique called Latent Dirichlet Allocation (LDA) was employed. The process involved text mining …


Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen Nov 2023

Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen

Journal of Cybersecurity Education, Research and Practice

Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and ethics, cybersecurity can foster diversity among audiences with varying educational backgrounds, thereby cultivating a richer and more resilient security landscape. A more diverse cybersecurity workforce can provide a broader range of perspectives, experiences, and skills to address the complex and ever-evolving threats of the digital age. The research focuses on enhancing cybersecurity education …


Modeling Identity Disclosure Risk Estimation Using Kenyan Situation, Peter N. Muturi, Andrew M. Kahonge, Christopher K. Chepken, Evans K. Miriti Nov 2023

Modeling Identity Disclosure Risk Estimation Using Kenyan Situation, Peter N. Muturi, Andrew M. Kahonge, Christopher K. Chepken, Evans K. Miriti

The African Journal of Information Systems

Identity disclosure risk is an essential consideration in data anonymization aimed at preserving privacy and utility. The risk is regionally dependent. Therefore, there is a need for a regional empirical approach in addition to a theoretical approach in modeling disclosure risk estimation. Reviewed literature pointed to three influencers of the risk. However, we did not find literature on the combined effects of the three influencers and their predictive power. To fill the gap, this study modeled the risk estimation predicated on the combined effect of the three predictors using the Kenyan situation. The study validated the model by conducting an …


Asesmen Transformasi Digital Galeri Nasional Indonesia, Desy Novita Sari, Luki Wijayanti Oct 2023

Asesmen Transformasi Digital Galeri Nasional Indonesia, Desy Novita Sari, Luki Wijayanti

Jurnal Ilmu Informasi, Perpustakaan dan Kearsipan

Digital transformation assessment has not received full attention and is still rarely carried out by art galleries/museums in Indonesia. Digital transformation research on library and information science (LIS) that covers GLAM's concept focuses more on libraries, archives, and museums, while art galleries are scarce, especially in Indonesia. This study aims to conduct a digital transformation assessment of art galleries, especially the National Gallery of Indonesia (Galnas). The research uses a quantitative method by applying a digital transformation framework questionnaire that had tested at 400 cultural institutions in Italy (including art galleries). This research measures the Digital Readiness Index (DRI) on …


Understanding The Role Of Social Media Marketing And Technology Adoption Model In Shaping Customer Adoption Of Digital Banking, Jonathan Bagus Pradhana Basoeki, Anna Amalyah Agus Oct 2023

Understanding The Role Of Social Media Marketing And Technology Adoption Model In Shaping Customer Adoption Of Digital Banking, Jonathan Bagus Pradhana Basoeki, Anna Amalyah Agus

The South East Asian Journal of Management

Research Aims: The present research aims to investigate factors that significantly influence customers’ behavioural intention to use digital banking products. Following prior work on social media marketing and the influence of conglomerate group benefits, in addition to providing a comprehensive understanding, the research incorporates three established theories: the Theory of Planned Behaviour, the Technology Acceptance Model, and the Unified Theory of Acceptance and Use of Technology.

Design/Methodology/Approach: The sample consists of current Allo Bank users. Data collection involved convenience sampling and a self-administered online questionnaire filled out by 262 respondents in Jakarta, Indonesia. The data analysis technique used was SEM …


A Developed Framework For Studying Cyberethical Behaviour In North Central Nigeria, Aderinola Ololade Dunmade, Adeyinka Tella, Uloma Doris Onuoha Oct 2023

A Developed Framework For Studying Cyberethical Behaviour In North Central Nigeria, Aderinola Ololade Dunmade, Adeyinka Tella, Uloma Doris Onuoha

Journal of Cybersecurity Education, Research and Practice

ICT advancements have enabled more online activities, resulting in several cyberethical behaviours. Literature documents prevalence of plagiarism, and online fraud, among other misbehaviours. While behaviour has been explained by several theories, as scholarship and research advances, frameworks are modified to include more constructs. The researchers modified Fishbein and Ajzen (2011)'s Reasoned Action Approach to study female postgraduate students' perspectives toward cyberethical behaviour in North Central Nigerian universities.

The study focused on four variables, which were adequately captured by the model: perception, awareness, and attitude.

An adapted questionnaire collected quantitative data. This study used multistage sampling. A sample size of 989 …


Navigating The Ethical And Legal Terrains Of Ai Tool Deployment: A Comparative Legal Analysis, Roland Akindele, Stella Jesuloluwa Adewuyi Oct 2023

Navigating The Ethical And Legal Terrains Of Ai Tool Deployment: A Comparative Legal Analysis, Roland Akindele, Stella Jesuloluwa Adewuyi

Communications of the IIMA

The pervasive influence of technology has revolutionised numerous sectors across the globe, underscoring the need for a comprehensive evaluation of the tools that technology has engendered. Artificial Intelligence (AI), as a prominent technological tool, has exceeded expectations and proven immensely beneficial to humanity. Consequently, it is imperative to scrutinise the ethical and regulatory frameworks governing its application. This paper employs a doctrinal methodology to analyse the regulatory landscape and ethical guidelines surrounding AI technology in Nigeria and some selected jurisdictions. The findings highlight the necessity of establishing a robust governance system to govern the utilisation of this transformative technology. In …


The Influence Of Hybrid Working In The Context Of Agile Software Development Within The Dutch Financial Sector, Joris Zomerdijk, Benny De Waal Oct 2023

The Influence Of Hybrid Working In The Context Of Agile Software Development Within The Dutch Financial Sector, Joris Zomerdijk, Benny De Waal

Communications of the IIMA

The COVID-19 pandemic has accelerated remote working and working at the office. This hybrid working is an indispensable part of today's life even within Agile Software Development (ASD) teams. Before COVID-19 ASD teams were working closely together in an Agile way at the office. The Agile Manifesto describes 12 principles to make agile working successful. These principles are about working closely together, face-to-face contact and continuously responding to changes. To what extent does hybrid working influence these agile principles that have been indispensable in today's software development since its creation in 2001? Based on a quantitative study within 22 Dutch …


A Framework For Building Cognitive Knowledge Management Systems, Samir Jarjoui, Renita Murimi Oct 2023

A Framework For Building Cognitive Knowledge Management Systems, Samir Jarjoui, Renita Murimi

Communications of the IIMA

Knowledge Management Systems (KMSs) are a critical component of economic development and growth. The accumulation and effective utilization of knowledge capabilities allow firms to create value and improve competitiveness. However, recent technological advances in KMSs have outpaced research in this area, which continues to be siloed and characterized by a lack of cohesive frameworks and a limited focus on cognitive learning. This paper provides a conceptual framework for the development of cognitive KMSs. The proposed framework comprises of strategy, people, processes, learning, and technology that are designed to improve knowledge management and organizational memory.


Enterprise Architecture In Healthcare Networks: A Systematic Literature Review, Arjen Maris, Stijn Hoppenbrouwers, Jos Van Hillegersberg Oct 2023

Enterprise Architecture In Healthcare Networks: A Systematic Literature Review, Arjen Maris, Stijn Hoppenbrouwers, Jos Van Hillegersberg

Communications of the IIMA

Healthcare organizations collaborate, share knowledge, and need to be accountable to each other. Therefore, healthcare organizations manage a dynamic information system landscape. Enterprise Architecture (EA) is a management tool for aligning these landscapes to the primary information needs that healthcare organizations have. EA is of value in some environments, but it seems to be not well suited to the dynamics of healthcare. Despite the publication of several systematic literature reviews on EA in healthcare, a systematic literature study comparing EA applicability at various levels of cooperation (intra, inter, and network collaboration) is lacking. Therefore, we posed the following research question: …


Electronic Clinical Quality Measures Of Health Information Technology And Hospital Performance: Evidence Of U.S. Hospitals, C. Christopher Lee, Hyoun Sook Lim, Decorti Rodgers-Tonge, Lisa Frank Oct 2023

Electronic Clinical Quality Measures Of Health Information Technology And Hospital Performance: Evidence Of U.S. Hospitals, C. Christopher Lee, Hyoun Sook Lim, Decorti Rodgers-Tonge, Lisa Frank

Communications of the IIMA

Electronic clinical quality measures (eCQMs) are an integral part of health information technology (HIT). This study explores the effect of eCQM implementation on hospital performance. The study proposes hospital profitability, efficiency, and quality to measure hospital performance. Based on the literature, this research hypothesizes that implementing eCQMs would positively impact hospital profitability, efficiency, and quality. The sample data are drawn from the 2017 American Hospital Association (AHA) U.S. Hospital Survey datasets (N = 6282), the 2017 AHA U.S. Hospital I.T. Survey dataset (N = 3451), and the 2017 Hospital Consumer Assessment of Healthcare Providers and Systems (HCAHPS) datasets (N = …


Towards A Domain – Specific Comparative Analysis Of Data Mining Tools, May Oo, Daniel Lozovikas, Ramesh Subramanian Oct 2023

Towards A Domain – Specific Comparative Analysis Of Data Mining Tools, May Oo, Daniel Lozovikas, Ramesh Subramanian

Communications of the IIMA

Advancement in technology has brought in widespread adoption and utilization of data mining tools. Successful implementation of data mining requires a careful assessment of the various data mining tools. Although several works have compared data mining tools based on usability, opensource, integrated data mining tools for statistical analysis, big/small scale, and data visualization, none of them has suggested the tools for various industry-sectors. This paper attempts to provide a comparative study of various data mining tools based on popularity and usage among various industry-sectors such as business, education, and healthcare. The factors used in the comparison are performance and scalability, …


Examining The Relevance Of Indian Logical Traditions And Present-Day Ai Developments, Ramesh Subramanian Oct 2023

Examining The Relevance Of Indian Logical Traditions And Present-Day Ai Developments, Ramesh Subramanian

Communications of the IIMA

This paper is an essay on the differences between “formal” Western logic and Indian logical traditions and how the latter impacts present-day AI developments. Upon the colonization of India, Western philosophers often dismissed Indian logical constructs as being underdeveloped or clumsy. Others, however, saw such denigration as emanating from Western racial prejudice rather than objectivity. This debate has persisted. I discuss the salient aspects of this debate, and then focus on the inductive aspects of Indian logic. This is especially relevant to the present, when there is an explosion of artificial intelligence based applications. I discuss the salient features of …


Forecasting Gasoline Price With Time Series Models, Xin James He Oct 2023

Forecasting Gasoline Price With Time Series Models, Xin James He

Communications of the IIMA

This research forecasts the gasoline price in U.S. and analyzes its managerial implications by means of both univariate and multivariate time series forecasting models. Gasoline price forecast is among the most difficulty time series variables during its importance to the economy and extremely volatile nature. The average regular gasoline price in U.S. reached $5.06 per gallon in the month of June 2022, as opposed to $3.41 at the beginning of 2022, a 48% increase. While gasoline prices had been rising over the first half of 2022 due to supply chain disruptions as a result of global Covid 19 lockdowns and …


Assessing Employees’ Cybersecurity Attitude Based On Working And Cybersecurity Threat Experience, Norshima Humaidi, Melissa Shahrom Oct 2023

Assessing Employees’ Cybersecurity Attitude Based On Working And Cybersecurity Threat Experience, Norshima Humaidi, Melissa Shahrom

The African Journal of Information Systems

Many cybersecurity problems are caused by human error, which is a worry in the commercial sector. Due to their attitude towards cybersecurity, many employees in the firm do not work in a way that safeguards data. This study seeks to examine employees' cybersecurity attitudes with a focus on their work experience and exposure to cybersecurity threats. Data were gathered through a survey conducted in targeted business firms located in the Klang Valley area, Malaysia. Utilizing ANOVA and two-sample tests, the study analysed 245 data samples to evaluate the hypotheses. The results show significant distinctions in employees' cybersecurity attitudes in relation …


Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi Oct 2023

Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi

Journal of Cybersecurity Education, Research and Practice

The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that this problem has not improved and nearly 44% believe it has gotten worse over the past 10 years. Threat actors are continuing to evolve their tactics, techniques, and procedures for conducting attacks on public and private targets. Education institutions and companies must adopt emerging technologies to develop security professionals and to increase cybersecurity awareness holistically. …


Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim Oct 2023

Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim

Journal of Cybersecurity Education, Research and Practice

This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …


Does Engaging Commercial Customers In A Shared Social Mission Improve Impact Sourcing Service Provider (Issp) Success? A Critically Appraised Topic, Michael F. Corbett Oct 2023

Does Engaging Commercial Customers In A Shared Social Mission Improve Impact Sourcing Service Provider (Issp) Success? A Critically Appraised Topic, Michael F. Corbett

Engaged Management ReView

This topic paper examines whether engaging commercial customers through a shared social mission improves the success of social enterprises. It is based on an examination of a subset of the information technology and business process outsourcing (ITO/BPO) industries, known as impact sourcing service providers (ISSPs). ISSPs are social enterprises – B2R Technologies and Digital Divide Data are two examples – that provide call center, transaction processing, data entry, and other technology-enabled services for commercial customers from remote locations around the globe. What is unique about ISSPs is that they do this with a social mission of creating jobs and economic …


Measuring Circularity: The Gordian Knot Of The 21st Century, Arjen Wierikx, Pascal Ravesteijn, Néomie Raassens, Alex Alblas Oct 2023

Measuring Circularity: The Gordian Knot Of The 21st Century, Arjen Wierikx, Pascal Ravesteijn, Néomie Raassens, Alex Alblas

Communications of the IIMA

Organizations are currently facing substantial challenges regarding becoming circular by 2050 – also referred to as Circular Economy (CE). Subsequently, increasing complexity on all organizational levels creates uncertainty about respective organizational and technological capabilities and adequate strategies to develop these capabilities. Organizations are struggling in picking up the CE ambitions and answering the what’s in it for me question. Scholars are developing models and frameworks to enable organizations to measure CE performance. Over 125 assessment methods are available for micro level assessment – measuring up to 365 different metrics. Moreover, extant literature is available presenting barriers and opportunities for CE …


Infrastructure As Code For Cybersecurity Training, Rui Pinto, Rolando Martins, Carlos Novo Oct 2023

Infrastructure As Code For Cybersecurity Training, Rui Pinto, Rolando Martins, Carlos Novo

Journal of Cybersecurity Education, Research and Practice

An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. These attacks tend to become increasingly specialized, meaning cybersecurity professionals must ensure proficiency in specific areas. Naturally, recommendations include creating advanced practical training scenarios considering realistic situations to help trainees gain detailed knowledge. However, the caveats of high-cost infrastructure and difficulties in the deployment process of this kind of system, primarily due to the manual process of pre-configuring software needed for the …


Building The Operational Technology (Ot) Cybersecurity Workforce: What Are Employers Looking For?, Christopher A. Ramezan, Paul M. Coffy, Jared Lemons Oct 2023

Building The Operational Technology (Ot) Cybersecurity Workforce: What Are Employers Looking For?, Christopher A. Ramezan, Paul M. Coffy, Jared Lemons

Journal of Cybersecurity Education, Research and Practice

A trained workforce is needed to protect operational technology (OT) and industrial control systems (ICS) within national critical infrastructure and critical industries. However, what knowledge, skills, and credentials are employers looking for in OT cybersecurity professionals? To best train the next generation of OT cybersecurity professionals, an understanding of current OT cybersecurity position requirements is needed. Thus, this work analyzes 100 OT cybersecurity positions to provide insights on key prerequisite requirements such as prior professional experience, education, industry certifications, security clearances, programming expertise, soft verbal and written communication skills, knowledge of OT frameworks, standards, and network communication protocols, and position …


Leading K-12 Community Responsiveness To Cyber Threats Via Education Of School Community, Michele Kielty, A. Renee Staton Oct 2023

Leading K-12 Community Responsiveness To Cyber Threats Via Education Of School Community, Michele Kielty, A. Renee Staton

Journal of Cybersecurity Education, Research and Practice

Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for K-12 systems and provides concrete tools for school leaders to employ in order to provide preventive education to their school communities.


An Interdisciplinary Approach To Experiential Learning In Cyberbiosecurity And Agriculture Through Workforce Development, Kellie Johnson, Tiffany Drape, Joseph Oakes, Joseph Simpson, Ann Brown, Donna M. Westfall-Rudd, Susan Duncan Oct 2023

An Interdisciplinary Approach To Experiential Learning In Cyberbiosecurity And Agriculture Through Workforce Development, Kellie Johnson, Tiffany Drape, Joseph Oakes, Joseph Simpson, Ann Brown, Donna M. Westfall-Rudd, Susan Duncan

Journal of Cybersecurity Education, Research and Practice

Cyberbiosecurity and workforce development in agriculture and the life sciences (ALS) is a growing area of need in the curriculum in higher education. Students that pursue majors related to ALS often do not include training in cyber-related concepts or expose the ‘hidden curriculum’ of seeking internships and jobs. Exposing students through workforce development training and hands-on engagement with industry professionals can provide learning opportunities to bridge the two and is an area of growth and demand as the workforce evolves. The objectives of this work were 1) to learn key concepts in cybersecurity, including data security, visualization, and analysis, to …