Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Management Information Systems (60)
- Education (49)
- Social and Behavioral Sciences (36)
- Business Administration, Management, and Operations (35)
- Computer Sciences (35)
-
- Organizational Behavior and Theory (35)
- Physical Sciences and Mathematics (35)
- Business Analytics (34)
- Curriculum and Instruction (34)
- Teacher Education and Professional Development (33)
- Adult and Continuing Education (32)
- Educational Technology (32)
- International Business (32)
- Marketing (32)
- Information Security (31)
- Online and Distance Education (30)
- Other Teacher Education and Professional Development (30)
- Adult and Continuing Education and Teaching (29)
- Business and Corporate Communications (29)
- Educational Leadership (29)
- Educational Methods (29)
- Entrepreneurial and Small Business Operations (29)
- Other Business (29)
- Secondary Education and Teaching (29)
- Junior High, Intermediate, Middle School Education and Teaching (28)
- Secondary Education (28)
- Accounting (27)
- Advertising and Promotion Management (27)
- Institution
-
- Kennesaw State University (29)
- Illinois State University (28)
- Universitas Indonesia (14)
- California State University, San Bernardino (8)
- Fordham Law School (4)
-
- Chinese Academy of Sciences (3)
- DePaul University (3)
- Southern Methodist University (3)
- St. John's University (3)
- Association of Arab Universities (2)
- Clemson University (2)
- Embry-Riddle Aeronautical University (2)
- Nova Southeastern University (2)
- The Catholic University of America, Columbus School of Law (2)
- University of Rhode Island (2)
- University of South Florida (2)
- Walden University (2)
- Beirut Arab University (1)
- Brigham Young University (1)
- Cleveland State University (1)
- Florida International University (1)
- Georgia Southern University (1)
- Governors State University (1)
- The University of San Francisco (1)
- UFM Madrid (1)
- UL SEB (1)
- University of Louisville (1)
- University of Michigan Law School (1)
- University of Minnesota Law School (1)
- University of South Alabama (1)
- Keyword
-
- Cybersecurity (12)
- Blockchain (5)
- Cybersecurity Education (4)
- AI (3)
- Apple (2)
-
- Artificial Intelligence (2)
- Artificial Intelligence (AI) (2)
- Business education (2)
- COVID-19 (2)
- Cryptocurrency (2)
- Cyber threat (2)
- Data Mining (2)
- Digital learning (2)
- Ethereum (2)
- Gamification (2)
- Globalization (2)
- Higher education (2)
- Hotels (2)
- Innovation (2)
- Learning Outcomes (2)
- NFT (2)
- NFTs (2)
- Patents (2)
- Privacy (2)
- Regulation (2)
- Social engineering (2)
- Systematic literature review (2)
- Taxonomies (2)
- Technology (2)
- Undergraduate (2)
- Publication
-
- International Journal for Business Education (28)
- Journal of Cybersecurity Education, Research and Practice (28)
- CSID Journal of Infrastructure Development (12)
- Journal of International Technology and Information Management (8)
- Fordham Journal of Corporate & Financial Law (4)
-
- Bulletin of Chinese Academy of Sciences (Chinese Version) (3)
- Journal of Global Awareness (3)
- SMU Data Science Review (3)
- Beyond: Undergraduate Research Journal (2)
- Catholic University Journal of Law and Technology (2)
- Future Computing and Informatics Journal (2)
- ICHRIE Research Reports (2)
- Journal of Sustainable Social Change (2)
- Journal of the Patent and Trademark Resource Center Association (2)
- Markets, Globalization & Development Review (2)
- The Qualitative Report (2)
- ASEAN Journal of Community Engagement (1)
- Alabama Libraries (1)
- Asia Pacific Perspectives (1)
- BAU Journal - Science and Technology (1)
- Class, Race and Corporate Power (1)
- Commonwealth Policy Papers (1)
- DePaul Magazine (1)
- Economic and Business Review (1)
- Journal of Applied Disciplines (1)
- Journal of Applied Marketing Theory (1)
- Journal of Applied Sport Management (1)
- Journal of Global Business Insights (1)
- Journal of New Finance (1)
- Journal of Nonprofit Innovation (1)
Articles 1 - 30 of 126
Full-Text Articles in Technology and Innovation
Outsourcing Voting To Ai: Can Chatgpt Advise Index Funds On Proxy Voting Decisions?, Chen Wang
Outsourcing Voting To Ai: Can Chatgpt Advise Index Funds On Proxy Voting Decisions?, Chen Wang
Fordham Journal of Corporate & Financial Law
Released in November 2022, Chat Generative Pre-training Transformer (“ChatGPT”), has risen rapidly to prominence, and its versatile capabilities have already been shown in a variety of fields. Due to ChatGPT’s advanced features, such as extensive pre-training on diverse data, strong generalization ability, fine-tuning capabilities, and improved reasoning, the use of AI in the legal industry could experience a significant transformation. Since small passive funds with low-cost business models generally lack the financial resources to make informed proxy voting decisions that align with their shareholders’ interests, this Article considers the use of ChatGPT to assist small investment funds, particularly small passive …
An Examination Of The Relationship Between Cheating In Online Classes And Technostress: Perceptions Of Business Faculty, Stacy Boyer-Davis, Kevin Berry, Amy Cooper
An Examination Of The Relationship Between Cheating In Online Classes And Technostress: Perceptions Of Business Faculty, Stacy Boyer-Davis, Kevin Berry, Amy Cooper
International Journal for Business Education
This research study investigated the relationship between technostress creators (techno-complexity, techno-insecurity, techno-invasion, techno-overload, and techno-uncertainty) and faculty perceptions of student cheating in online classes. Data were collected from faculty members of the Management and Organizational Behavior Teaching Society (MOBTS), a member of the AACSB Business Education Alliance, the American Society of Business and Behavioral Sciences (ASBBS), an interdisciplinary professional organization comprised of faculty teaching in accounting, finance, management, marketing, organizational behavior, and computer information systems, and other research panels during 2021 (N = 94). Findings from regression analysis indicated that the techno-complexity subconstruct is positively related to a faculty’s perception …
Assessment Of Infrastructure Development Approach In Newly Created Districts In Zambia: Case Study, Chimanga Kabwe, Musonda Innocent, Franco Muleya
Assessment Of Infrastructure Development Approach In Newly Created Districts In Zambia: Case Study, Chimanga Kabwe, Musonda Innocent, Franco Muleya
CSID Journal of Infrastructure Development
This article evaluates the infrastructure development plans in Zambia's newly established districts, primarily focusing on assessing their effectiveness. Infrastructure development encompasses various strategies, and this study investigates the factors influencing the selection of these strategies for implementing infrastructure projects in Zambia. Through structured interviews and questionnaires distributed to 500 respondents, the research highlights the critical role of community involvement. Communities play a pivotal role in identifying essential amenities, setting priorities for infrastructure construction, incorporating their ideas, and participating in the planning process for executing infrastructure projects. The analysis reveals that community members held varying perspectives on the significance of infrastructure …
The Impact Of Adopting Digital Twins In Urban Development, Mohammed Ali Berawi, Perdana Miraj, Mustika Sari
The Impact Of Adopting Digital Twins In Urban Development, Mohammed Ali Berawi, Perdana Miraj, Mustika Sari
CSID Journal of Infrastructure Development
The construction industry, which plays a pivotal role in urban development, has undergone a significant transformation in recent years. This transformation is largely marked by the rise of digitalization, a phenomenon fundamentally altering how we design, construct, and operate our urban environments. At the forefront of this paradigm shift is the notion of Digital Twins (DT), which entails a dynamic and virtual representation of tangible assets. Urban development has witnessed a growing adoption of this innovative approach to improve cities' infrastructure planning, construction, and management. Digital Twin enables real-time simulation and monitoring, enhancing performance and more informed decision-making. Therefore, implementing …
Interacting Action Of Alkali-Silica Reaction And Chloride-Induced Steel Corrosion On The Reinforced Concrete Structures – A Critical Review, Williams Dunu
CSID Journal of Infrastructure Development
The degradation of reinforced concrete (RC) structures amidst the progression of corrosion within alkali-silica reaction (ASR)-affected structures is a complex phenomenon marked by diverse causal factors and repercussions. While the initiation phase of chloride-induced steel corrosion and ASR in RC structures has received extensive scrutiny, insufficient attention has been dedicated to comprehending the propagation phase (tp). Therefore, this study addresses this gap by centering its focus on the propagation phase, driven by the imperative need to formulate efficient and sustainable maintenance, repair, and management strategies for RC structures grappling with the concurrent impacts of degradation mechanisms such as ASR and …
Integrating Technology And Traditional Systems In Regional Revitalisation; Insights From Japanese Practices, Fathelalem Ali Hija, Yasuki Shima, Yuji Arakaki
Integrating Technology And Traditional Systems In Regional Revitalisation; Insights From Japanese Practices, Fathelalem Ali Hija, Yasuki Shima, Yuji Arakaki
BAU Journal - Science and Technology
This study examines the integration of Information and Communication Technology (ICT) solutions and advanced technology practices and their coexistence with conventional systems and initiatives that have been operating in different regions of Japan to address some of the socio-economic challenges. The methodological approach of the study includes three facets, namely government initiatives, technology involvement and local society actors. The study examines government visions and initiatives that emphasize the use of advanced technology as a key factor and tool to enable solutions and realize the target vision. The ageing population and economic stagnation are common challenges in different regions of Japan. …
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Journal of Nonprofit Innovation
Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.
Imagine Doris, who is …
Whither India’S Development: Toward Being A Super Power Or A Super Civilization?, Pradip Khandwalla
Whither India’S Development: Toward Being A Super Power Or A Super Civilization?, Pradip Khandwalla
Markets, Globalization & Development Review
This commentary was triggered by my reading a lecture delivered by Saurabh Kumar, a former student of mine at Indian Institute of Management, who later served as India’s ambassador in various countries and international bodies. He bemoaned that China had much greater status in global affairs than India. Many others in India hanker for a super power status for India. I find this concern to be somewhat misguided. India should be aiming to be a great civilization, rather than a domineering superpower. The record of all the superpowers till now has been quite spotty in humane terms. My vision for …
Social Engineering Cyber Threats, Young B. Choi, Josh Rubin
Social Engineering Cyber Threats, Young B. Choi, Josh Rubin
Journal of Global Awareness
The article explores the pervasive threat of social engineering in cybersecurity, emphasizing its success in infiltrating information systems by manipulating individuals rather than employing traditional hacking methods. The author underscores the vulnerability arising from human trust, as individuals, especially those lacking technology education, tend to be targets. While cryptography offers partial security, social engineering complicates overall system security. Mitigation strategies include educating employees on threats, risks, and security policies, coupled with enforcing penalties for noncompliance. Additionally, employing two-factor authentication and physical token-based access adds layers of protection. The article delves into semantic attacks, classifying various exploitation methods and emphasizing the …
Apple: Global Ethics And Transformational Leadership, Bisma Ahmed
Apple: Global Ethics And Transformational Leadership, Bisma Ahmed
Journal of Global Awareness
Apple Inc. is an American technological company that designs, manufactures, and sells various products such as laptops, phones, accessories, streaming services, licensing services, and so much more. The paper explores the corporate responsibility and unethical business practices that arise from the global sourcing of Apple’s products. The company established many relationships with suppliers in East Asia to meet the rigorous demands of consumers, promising high-quality products at the expense of factory workers. However, global sourcing comes with unethical business practices. There have been various cases against Apple’s suppliers. This research highlights unfair working conditions, overworking employees, and environmental pollution that …
The Coming Transformative Impact Of Large Language Models And Artificial Intelligence On Global Business And Education, Eva K. Jermakowicz
The Coming Transformative Impact Of Large Language Models And Artificial Intelligence On Global Business And Education, Eva K. Jermakowicz
Journal of Global Awareness
Rapid advances in the capabilities of Large Language Models (LLM) as a basis for Artificial Intelligence (AI) applications, and their sudden wide accessibility, have garnered significant attention recently. These technologies (e.g., ChatGPT, BARD), which have the ability to predict and generate human language, have led to excitement and concerns regarding their use in various industries. This paper explores the history of LLM, examines their applications in business and education, and delves into the critical ethical concerns and challenges of these emerging technologies to ensure that their uses are not only effective, but also responsible and equitable.
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Journal of Cybersecurity Education, Research and Practice
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …
Smes “Growing Smart”: The Complementarity Of Intangible And Digital Investment In Small Firms And Their Contribution To Firm Performance, Eva Erjavec, Tjaša Redek, Črt Kostevc
Smes “Growing Smart”: The Complementarity Of Intangible And Digital Investment In Small Firms And Their Contribution To Firm Performance, Eva Erjavec, Tjaša Redek, Črt Kostevc
Economic and Business Review
Like large companies, small and medium-sized companies (SMEs) are turning to new digital technologies and knowledge-based capital to bolster their productivity and growth. However, data show that smaller companies lag significantly in implementing new Industry 4.0 technologies and in the intensity of their use. Lack of skills and human capital is often cited as one of the biggest barriers. This paper examines the benefits of digital technologies, intangible capital, and in particular the role of complementary investments in new technologies and intangible capital to maximize the impact on productivity growth. The analysis draws on extensive firm-level datasets combining business and …
The Digital Engine Model: Lead Generation Through Applied Dcm Strategies, Kyle A. Huggins, John D. Hansen
The Digital Engine Model: Lead Generation Through Applied Dcm Strategies, Kyle A. Huggins, John D. Hansen
Journal of Applied Marketing Theory
Digital Content Marketing (DCM) has become a primary tool for marketers in driving lead generation in today’s digital marketing world. Leading brands are creating and curating content trying to build brand equity and trust, connecting content to consumer action through brand story. And while strong theoretical models of content marketing have been discussed in the marketing literature, like Hollebeek and Macky (2019), there is a dearth of understanding about the application and direct impact of organic digital content strategies on marketing directives. This paper investigates an applied model, called The Digital Engine, which provides instruction on proper inbound marketing techniques …
Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu
Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu
Journal of Cybersecurity Education, Research and Practice
This pilot study aims to assess the acceptability of Open University’s training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post experimental design was employed. 43 self-selected participants were recruited via an online register and posters at the university (excluding IT related courses). Participants completed the Human Aspects of Information Security Questionnaire (HAIS-Q) and Fear of Missing Out (FoMO) Scale. They then completed all games and quizzes in the GICAST course before repeating the HAIS-Q and …
Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang
Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang
Journal of Cybersecurity Education, Research and Practice
Recent advances in Artificial Intelligence (AI) have brought society closer to the long-held dream of creating machines to help with both common and complex tasks and functions. From recommending movies to detecting disease in its earliest stages, AI has become an aspect of daily life many people accept without scrutiny. Despite its functionality and promise, AI has inherent security risks that users should understand and programmers must be trained to address. The ICE (integrity, confidentiality, and equity) cybersecurity labs developed by a team of cybersecurity researchers addresses these vulnerabilities to AI models through a series of hands-on, inquiry-based labs. Through …
Analysis Of Us Airline Stocks Performance Using Latent Dirichlet Allocation (Lda), Amina Issoufou Anaroua
Analysis Of Us Airline Stocks Performance Using Latent Dirichlet Allocation (Lda), Amina Issoufou Anaroua
Beyond: Undergraduate Research Journal
Various events, such as changes in the interest rate or the hijacking of a commercial aircraft, can lead to significant shifts in airline stock performance. This study aimed to measure the impact of aviation-related news announcements on the stock performance of US airlines, focusing on different topics. The dataset included aviation news covering airlines, airports, regulations, safety, accidents, manufacturers, MRO, incidents, aviation training, general aviation, and others obtained from Aviation Voice. To uncover patterns that could explain the movements of US airline stocks, a natural language processing technique called Latent Dirichlet Allocation (LDA) was employed. The process involved text mining …
Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen
Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen
Journal of Cybersecurity Education, Research and Practice
Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and ethics, cybersecurity can foster diversity among audiences with varying educational backgrounds, thereby cultivating a richer and more resilient security landscape. A more diverse cybersecurity workforce can provide a broader range of perspectives, experiences, and skills to address the complex and ever-evolving threats of the digital age. The research focuses on enhancing cybersecurity education …
Congressional Briefing: Support America’S Circular Economy By Upcycling Bourbon & Brewing Wastes In Reauthorizing The Farm Bill, Samuel Kessler
Congressional Briefing: Support America’S Circular Economy By Upcycling Bourbon & Brewing Wastes In Reauthorizing The Farm Bill, Samuel Kessler
Commonwealth Policy Papers
Following state level development of a new spent grain incentive system, leading to KY House Bill 627 in 2022, CPC’s Congressional Summit dialogue considered initial components and possibilities for designing an incentive to upcycle “keystone” organic wastes in regional economies across the US. For member offices, a set of general recommendations are provided for a national spent-grain upcycling incentive pilot program. It is suggested that staff of the Bourbon caucus consult with the references in this briefing and USDA Rural Development to consider further development of an incentive program in the reauthorization of the Farm Bill.
It is further urged …
Apple “Porn” 2.0: Apple’S Vision (Pro), Suzanne E. Ferriss
Apple “Porn” 2.0: Apple’S Vision (Pro), Suzanne E. Ferriss
Class, Race and Corporate Power
This article extends the argument made in “Apple ‘Porn’: Design Videos as Seduction and Exploitation” (Ferriss 2018) to consider the corporation’s filmed representation of its newest device: an augmented reality headset dubbed Vision Pro. It argues that Apple’s latest narratives further relegate human work and community to the margins by presenting human experience as thoroughly mediated by computer-enhanced simulation, its pinnacle achieved through its Apple Vision Pro headset that turns the home and workspace into one immersive audiovisual world. Rather than its devices and software becoming an inseparable part of our personal and shared spaces, they become the spaces. We …
Depaul Digest
DePaul Magazine
College of Education Professor Jason Goulah fosters hope, happiness and global citizenship through DePaul’s Institute for Daisaku Ikeda Studies in Education. Associate Journalism Professor Jill Hopke shares how to talk about climate change. News briefs from DePaul’s 10 colleges and schools: Occupational Therapy Standardized Patient Program, Financial Planning Certificate program, Business Education in Technology and Analytics Hub, Racial Justice Initiative, Teacher Quality Partnership grant, Intimate Partner Violence and Brain Injury collaboration, School of Music Career Closet, Sports Photojournalism course, DePaul Migration Collaborative’s Solutions Lab, Inclusive Screenwriting courses. New appointments: School of Music Dean John Milbauer, College of Education Dean Jennifer …
A Developed Framework For Studying Cyberethical Behaviour In North Central Nigeria, Aderinola Ololade Dunmade, Adeyinka Tella, Uloma Doris Onuoha
A Developed Framework For Studying Cyberethical Behaviour In North Central Nigeria, Aderinola Ololade Dunmade, Adeyinka Tella, Uloma Doris Onuoha
Journal of Cybersecurity Education, Research and Practice
ICT advancements have enabled more online activities, resulting in several cyberethical behaviours. Literature documents prevalence of plagiarism, and online fraud, among other misbehaviours. While behaviour has been explained by several theories, as scholarship and research advances, frameworks are modified to include more constructs. The researchers modified Fishbein and Ajzen (2011)'s Reasoned Action Approach to study female postgraduate students' perspectives toward cyberethical behaviour in North Central Nigerian universities.
The study focused on four variables, which were adequately captured by the model: perception, awareness, and attitude.
An adapted questionnaire collected quantitative data. This study used multistage sampling. A sample size of 989 …
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Journal of Cybersecurity Education, Research and Practice
The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that this problem has not improved and nearly 44% believe it has gotten worse over the past 10 years. Threat actors are continuing to evolve their tactics, techniques, and procedures for conducting attacks on public and private targets. Education institutions and companies must adopt emerging technologies to develop security professionals and to increase cybersecurity awareness holistically. …
Introduction To International Business, Rajaram Veliyath
Introduction To International Business, Rajaram Veliyath
KSU Distinguished Course Repository
An introduction to the global business environment, this course examines the discrete and interactive effects of the geographic, historical, sociocultural, political/legal, economic and technological forces that shape business activities across borders and their consequences.
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Journal of Cybersecurity Education, Research and Practice
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …
Infrastructure As Code For Cybersecurity Training, Rui Pinto, Rolando Martins, Carlos Novo
Infrastructure As Code For Cybersecurity Training, Rui Pinto, Rolando Martins, Carlos Novo
Journal of Cybersecurity Education, Research and Practice
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. These attacks tend to become increasingly specialized, meaning cybersecurity professionals must ensure proficiency in specific areas. Naturally, recommendations include creating advanced practical training scenarios considering realistic situations to help trainees gain detailed knowledge. However, the caveats of high-cost infrastructure and difficulties in the deployment process of this kind of system, primarily due to the manual process of pre-configuring software needed for the …
Building The Operational Technology (Ot) Cybersecurity Workforce: What Are Employers Looking For?, Christopher A. Ramezan, Paul M. Coffy, Jared Lemons
Building The Operational Technology (Ot) Cybersecurity Workforce: What Are Employers Looking For?, Christopher A. Ramezan, Paul M. Coffy, Jared Lemons
Journal of Cybersecurity Education, Research and Practice
A trained workforce is needed to protect operational technology (OT) and industrial control systems (ICS) within national critical infrastructure and critical industries. However, what knowledge, skills, and credentials are employers looking for in OT cybersecurity professionals? To best train the next generation of OT cybersecurity professionals, an understanding of current OT cybersecurity position requirements is needed. Thus, this work analyzes 100 OT cybersecurity positions to provide insights on key prerequisite requirements such as prior professional experience, education, industry certifications, security clearances, programming expertise, soft verbal and written communication skills, knowledge of OT frameworks, standards, and network communication protocols, and position …
Leading K-12 Community Responsiveness To Cyber Threats Via Education Of School Community, Michele Kielty, A. Renee Staton
Leading K-12 Community Responsiveness To Cyber Threats Via Education Of School Community, Michele Kielty, A. Renee Staton
Journal of Cybersecurity Education, Research and Practice
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for K-12 systems and provides concrete tools for school leaders to employ in order to provide preventive education to their school communities.
An Interdisciplinary Approach To Experiential Learning In Cyberbiosecurity And Agriculture Through Workforce Development, Kellie Johnson, Tiffany Drape, Joseph Oakes, Joseph Simpson, Ann Brown, Donna M. Westfall-Rudd, Susan Duncan
An Interdisciplinary Approach To Experiential Learning In Cyberbiosecurity And Agriculture Through Workforce Development, Kellie Johnson, Tiffany Drape, Joseph Oakes, Joseph Simpson, Ann Brown, Donna M. Westfall-Rudd, Susan Duncan
Journal of Cybersecurity Education, Research and Practice
Cyberbiosecurity and workforce development in agriculture and the life sciences (ALS) is a growing area of need in the curriculum in higher education. Students that pursue majors related to ALS often do not include training in cyber-related concepts or expose the ‘hidden curriculum’ of seeking internships and jobs. Exposing students through workforce development training and hands-on engagement with industry professionals can provide learning opportunities to bridge the two and is an area of growth and demand as the workforce evolves. The objectives of this work were 1) to learn key concepts in cybersecurity, including data security, visualization, and analysis, to …
A Mixed-Method Study Exploring Cyber Ranges And Educator Motivation, Cheryl Beauchamp, Holly M. Matusovich
A Mixed-Method Study Exploring Cyber Ranges And Educator Motivation, Cheryl Beauchamp, Holly M. Matusovich
Journal of Cybersecurity Education, Research and Practice
A growing number of academic institutions have invested resources to integrate cyber ranges for applying and developing cybersecurity-related knowledge and skills. Cyber range developers and administrators provided much of what is known about cyber range resources and possible educational applications; however, the educator provides valuable understanding of the cyber range resources they use, how they use them, what they value, and what they do not value. This study provides the cyber range user perspective of cyber ranges in cybersecurity education by describing how K-12 educators are motivated using cyber ranges. Using mixed methods, this study explored educator motivation associated with …