Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Technology and Innovation

An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles Nov 2020

An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles

James Madison Undergraduate Research Journal (JMURJ)

A smart city is an interconnection of technological components that store, process, and wirelessly transmit information to enhance the efficiency of applications and the individuals who use those applications. Over the course of the 21st century, it is expected that an overwhelming majority of the world’s population will live in urban areas and that the number of wireless devices will increase. The resulting increase in wireless data transmission means that the privacy of data will be increasingly at risk. This paper uses a holistic problem-solving approach to evaluate the security challenges posed by the technological components that make up a …


Preparing Students For Digital Era Careers, Melissa Stange Aug 2020

Preparing Students For Digital Era Careers, Melissa Stange

Inquiry: The Journal of the Virginia Community Colleges

This paper will discuss why technical skills alone will not be enough for students to have successful careers in the digital age. Much of their success will hinge on critical soft skills, such as adaptability, inner strength, holistic thinking, and a collaborative spirit. Examples will be provided for inclusion with a computer science program, but in a way that is easily adaptable to other disciplines.


Specialization: Do Your Job Well Helping Students Who Are Considering A Career In Programming Know How To Invest Their Time., Scott Pulley Jul 2020

Specialization: Do Your Job Well Helping Students Who Are Considering A Career In Programming Know How To Invest Their Time., Scott Pulley

Marriott Student Review

The article examines the effects of specialization on the hiring process for undergraduates studying programming whether in information systems or computer science.


Evaluating And Securing Text-Based Java Code Through Static Code Analysis, Jeong Yang, Young Lee, Amanda Fernandez, Joshua Sanchez Jun 2020

Evaluating And Securing Text-Based Java Code Through Static Code Analysis, Jeong Yang, Young Lee, Amanda Fernandez, Joshua Sanchez

Journal of Cybersecurity Education, Research and Practice

As the cyber security landscape dynamically evolves and security professionals work to keep apace, modern-day educators face the issue of equipping a new generation for this dynamic landscape. With cyber-attacks and vulnerabilities substantially increased over the past years in frequency and severity, it is important to design and build secure software applications from the group up. Therefore, defensive secure coding techniques covering security concepts must be taught from beginning computer science programming courses to exercise building secure applications. Using static analysis, this study thoroughly analyzed Java source code in two textbooks used at a collegiate level, with the goal of …


Malaware Defensive: A Game To Train Users To Combat Malware, Tyler Moon, Tamirat Abegaz, Bryson Payne, Abi Salimi Jun 2020

Malaware Defensive: A Game To Train Users To Combat Malware, Tyler Moon, Tamirat Abegaz, Bryson Payne, Abi Salimi

Journal of Cybersecurity Education, Research and Practice

Several research findings indicate that basic cyber hygiene can potentially deter the majority of cyber threats. One of the ways cybersecurity professionals can prepare users to ensure proper hygiene is to help them develop their ability to spot the difference between normal and abnormal behavior in a computer system. Malware disrupts the normal behavior of a computer system. The lack of appropriate user training has been one of the main reasons behind the exposure of computer systems to threats, from social engineering to viruses, trojans, and ransomware. Basic knowledge about common behavioral characteristics of malware could help users identify potentially …


Divergent Student Views Of Cybersecurity, Susan E. Ramlo, John B. Nicholas Jan 2020

Divergent Student Views Of Cybersecurity, Susan E. Ramlo, John B. Nicholas

Journal of Cybersecurity Education, Research and Practice

Cybersecurity is a worldwide issue and concern. Prior studies indicate that many people do not use cybersecurity best practices. Although these prior studies used large-scale surveys or interviews, this study used Q methodology [Q] because Q provides greater insight than Likert-format surveys. In fact, Q was created to scientifically study subjectivity. Within a Q study, various stages as well as philosophical, epistemological, and ontological principles represent a complete methodology. At first, Q researchers collect items that represent the broad range of communications about the topic (called the concourse). Although the items can be pictures, scents, or other means of communication, …


Teaching About The Dark Web In Criminal Justice Or Related Programs At The Community College And University Levels., Scott H. Belshaw, Brooke Nodeland, Lorrin Underwood, Alexandrea Colaiuta Jan 2020

Teaching About The Dark Web In Criminal Justice Or Related Programs At The Community College And University Levels., Scott H. Belshaw, Brooke Nodeland, Lorrin Underwood, Alexandrea Colaiuta

Journal of Cybersecurity Education, Research and Practice

Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This article discusses the need to incorporate courses discussing the Dark Web in criminal justice. A review of existing cyber-criminal justice programs in Texas and nationally suggests that most community colleges and 4-year universities have yet to develop courses/programs in understanding and investigating the Dark Web on the internet. The Dark Web serves as the …


An Assessment Of Practical Hands-On Lab Activities In Network Security Management, Te-Shun Chou, Nicholas Hempenius Jan 2020

An Assessment Of Practical Hands-On Lab Activities In Network Security Management, Te-Shun Chou, Nicholas Hempenius

Journal of Cybersecurity Education, Research and Practice

With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network security management for students assist them in becoming network security professionals.

The objective of this paper is to introduce a variety of techniques related to network security management, such as Simple Network Management Protocol (SNMP), event management, security policy management, risk management, access control, and remote monitoring. With the …


Quantum Computing: Principles And Applications, Yoshito Kanamori, Seong-Moo Yoo Jan 2020

Quantum Computing: Principles And Applications, Yoshito Kanamori, Seong-Moo Yoo

Journal of International Technology and Information Management

The development of quantum computers over the past few years is probably one of the significant advancements in the history of quantum computing. D-Wave quantum computer has been available for more than eight years. IBM has made its quantum computer accessible via its cloud service. Also, Microsoft, Google, Intel, and NASA have been heavily investing in the development of quantum computers and their applications. The quantum computer seems to be no longer just for physicists and computer scientists but also for information system researchers. This paper introduces the basic concepts of quantum computing and describes well-known quantum applications for non-physicists. …


Editorial Jan 2020

Editorial

Journal of Cybersecurity Education, Research and Practice

Editorial.


Editorial, Michael E. Whitman, Herbert J. Mattord, Hossain Shahriar Jan 2020

Editorial, Michael E. Whitman, Herbert J. Mattord, Hossain Shahriar

Journal of Cybersecurity Education, Research and Practice

No abstract provided.


Gdom: Granulometry For The Detection Of Obfuscated Malware, John A. Aruta, N. Paul Schembari Jan 2020

Gdom: Granulometry For The Detection Of Obfuscated Malware, John A. Aruta, N. Paul Schembari

Journal of Cybersecurity Education, Research and Practice

We describe the results of a master's thesis in malware detection and discuss the connection to the learning goals of the project. As part of the thesis, we studied obfuscation of malware, conversion of files into images, image processing, and machine learning, a process of benefit to both the student and faculty.

Malware detection becomes significantly more difficult when the malicious specimen is obfuscated or transformed in an attempt to avoid detection. However, computer files have been shown to exhibit evidence of structure when converted into images, so with image processing filters such as granulometry, it is possible to generate …