Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 33

Full-Text Articles in Education

The Impact Of Digital Transformation On Institutional Growth. A Case Of Zimbabwean Universities, Vusumuzi Maphosa Sep 2023

The Impact Of Digital Transformation On Institutional Growth. A Case Of Zimbabwean Universities, Vusumuzi Maphosa

African Conference on Information Systems and Technology

The pressure for institutions to digitally transform has been building, and COVID-19 accelerated the transition in developing countries. The study evaluated the impact of digital transformation on Zimbabwean universities. The Microsoft digital transformation framework guided the study. Thematic analysis was used to extract meaning and generate themes from qualitative data from university ICT Directors. Results show that digital transformation positively impacted institutional growth and efficiency. Most universities invest in digital technology to increase service reliability and availability. Digital transformation teams were bolstered to support student processes and create personalised learning journeys. The digital transformation led to the adoption of several …


Digital Transformation Of Smes Through Social Media, Georgette Eugenia Otoo, Raphael Amponsah, Eric Afful-Dadzie, Emmanuel Awuni Kolog Sep 2023

Digital Transformation Of Smes Through Social Media, Georgette Eugenia Otoo, Raphael Amponsah, Eric Afful-Dadzie, Emmanuel Awuni Kolog

African Conference on Information Systems and Technology

This research paper explores the strategic integration of social media platforms by Small and Medium-sized Enterprises (SMEs) in Low- and Middle-Income Countries (LMICs) beyond marketing. Drawing from Resource-Based View and Dynamic Capabilities theories, the study investigates how social media enhances management, coordination, and control functions. Through five diverse case studies from Ghana, findings reveal SMEs’ innovative use of platforms like Instagram, WhatsApp, Slack, and Trello. These platforms foster efficient internal communication, customer engagement, project management, and talent acquisition. Challenges such as technical expertise and dynamic digital landscapes are identified.


Internet Of Things Affordance For Open Educational Resources In A Comprehensive Open Distance E-Learning, Lancelord Mncube Sep 2023

Internet Of Things Affordance For Open Educational Resources In A Comprehensive Open Distance E-Learning, Lancelord Mncube

African Conference on Information Systems and Technology

The Internet of Things (IoT) space has dual dimensions of affordance to support open educational resources (OER). The duality of affordance has little or not been well articulated in relation to OER, particularly in a Comprehensive open distance e-learning (CODEL) institution. Such an institution is a mega open distance in South Africa and beyond the continent to accommodate students globally and rely on information and communication technology (ICT) in the provision of tuition. In the CODEL institution, there is a recognizable shift as the institution encourages the appropriation of OER and phasing out the prescription of the prescribed textbooks. The …


Benefits Of Adopting Micro-Credentials For Skills Development, Oyena Nokulunga Mahlasela, Adriana A. Steyn Sep 2023

Benefits Of Adopting Micro-Credentials For Skills Development, Oyena Nokulunga Mahlasela, Adriana A. Steyn

African Conference on Information Systems and Technology

Micro-credential providers are increasing both in diversity and volume. However, employers are still concerned about their role in skill development. This study aimed to understand how micro-credentials can assist employees in skills development. A systematic literature review was conducted for studies published between (2016 to 2023). Thirty-two sources were included in the final review. After that, five recommendations for employers when adopting micro-credentials were constructed first by (1) defining the value of formal and informal education. (2) exploring micro-credentials as a tool for skills development. (3) encouraging organisations to collaborate with other institutions. (4) encouraging continuous personalised learning, known as …


Information Technology Decision Makers’ Readiness For Artificial Intelligence Governance In Institutions Of Higher Education In South Africa, John Mangundu Sep 2023

Information Technology Decision Makers’ Readiness For Artificial Intelligence Governance In Institutions Of Higher Education In South Africa, John Mangundu

African Conference on Information Systems and Technology

Artificial intelligence (AI) can enhance the educational experience for academics and students. However, research has inadequately examined AI ethics and governance, particularly in the higher education sector of developing economies such as South Africa. AI governance ensures that envisioned AI benefits are realized while reducing AI risks. Against this backdrop of huge research deficit, the current study reports on a qualitative exploratory study that investigates the state of readiness for AI governance and AI governance maturity in South African higher education institutions. Informed by the combination of the TOE framework, the traditional IT governance model and the adapted IT governance …


Employee Attrition: Analyzing Factors Influencing Job Satisfaction Of Ibm Data Scientists, Graham Nash Apr 2023

Employee Attrition: Analyzing Factors Influencing Job Satisfaction Of Ibm Data Scientists, Graham Nash

Symposium of Student Scholars

Employee attrition is a relevant issue that every business employer must consider when gauging the effectiveness of their employees. Whether or not an employee chooses to leave their job can come from a multitude of factors. As a result, employers need to develop methods in which they can measure attrition by calculating the several qualities of their employees. Factors like their age, years with the company, which department they work in, their level of education, their job role, and even their marital status are all considered by employers to assist in predicting employee attrition. This project will be analyzing a …


Beyond The Ivory Tower: Supporting The Graduate Nonacademic Career Search Through Library Partnerships, Sarah Lane Mar 2022

Beyond The Ivory Tower: Supporting The Graduate Nonacademic Career Search Through Library Partnerships, Sarah Lane

Transforming Libraries for Graduate Students

For a variety of reasons, some graduate students ultimately determine that they would like to pursue a career outside of the ivory tower. At the same time, these scholars may be uncertain about how to translate their expertise into a nonacademic position. At Cornell University, a partnership between the Management Library and the Careers Beyond Academia office has allowed librarians to utilize their unique expertise to assist graduate students throughout their job search.

At the Management Library, business librarians have historically worked with the Career Management Center of the Johnson Graduate School of Management to assist MBA and graduate business …


Transitioning To A Master's Degree Granting University: Implications For Librarian Instruction, Outreach, And Collection Development, Mary A. Aquila Ms., :Laken T. Smith Ms., Jennifer L. Wolfe Mrs. Mar 2022

Transitioning To A Master's Degree Granting University: Implications For Librarian Instruction, Outreach, And Collection Development, Mary A. Aquila Ms., :Laken T. Smith Ms., Jennifer L. Wolfe Mrs.

Transforming Libraries for Graduate Students

Athens State University is located in Athens, Alabama in the northern part of Alabama bordering Giles County, Tennessee. It is one of the only upper-level universities serving juniors, seniors, and graduate students in the country. The student body consists primarily of non-traditional and first-generation students. In 2014, Athens State University was approved to offer a graduate program in Global Logistics and Supply Chain Management in the College of Business by the Alabama Commission on Higher Education (ACHE). Since then, Athens State University has expanded its graduate offerings to include five additional fields of study: Strategic Healthcare Management and Administration, Strategic …


Creating A Support System For Online Graduate Students Learning New Software, Marisha C. Kelly Feb 2022

Creating A Support System For Online Graduate Students Learning New Software, Marisha C. Kelly

Transforming Libraries for Graduate Students

This poster outlines strategies for creating a support system for online graduate students learning new software. The Northcentral University (NCU) Library is a 100 percent online library providing services and delivering resources to students in a remote context. According to university facts and figures, approximately 98 percent of students are enrolled in a graduate program and nearly 69 percent of those students are pursuing a doctoral degree. In May 2019, a reference and instruction librarian developed a program to support graduate students learning how to use ProQuest RefWorks, a web-based research management tool. Elements of the program include synchronous options …


A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad Oct 2020

A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad

KSU Proceedings on Cybersecurity Education, Research and Practice

Serious games can challenge users in competitive and entertaining ways. Educators have used serious games to increase student engagement in cybersecurity education. Serious games have been developed to teach students various cybersecurity topics such as safe online behavior, threats and attacks, malware, and more. They have been used in cybersecurity training and education at different levels. Serious games have targeted different audiences such as K-12 students, undergraduate and graduate students in academic institutions, and professionals in the cybersecurity workforce. In this paper, we provide a survey of serious games used in cybersecurity education and training. We categorize these games into …


Supporting Mba Students In A Team-Based Experiential Learning Environment, Teresa Williams Mar 2020

Supporting Mba Students In A Team-Based Experiential Learning Environment, Teresa Williams

Transforming Libraries for Graduate Students

The Lacy School of Business at Butler University (Indianapolis) has embraced an experiential approach for the school’s Master of Business Administration (MBA) degree program by combining traditional classroom instruction with opportunities for students to learn through partnerships with local businesses. Beginning with the MBA Gateway Experience course, graduate students are tasked with conducting team research to present informed recommendations to business owners and community leaders. The related support provided by the Butler Business Librarian for MBA students complements the experiential nature of the program by engaging students with the real-world challenges of collecting and evaluating business information for applied problem-solving. …


Strategic Aspects Of E-Commerce Related To V-Commerce, V-Learning, And Disaster Relief, Alan D. Smith Feb 2020

Strategic Aspects Of E-Commerce Related To V-Commerce, V-Learning, And Disaster Relief, Alan D. Smith

Atlantic Marketing Association Proceedings

No abstract provided.


Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez Oct 2019

Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez

KSU Proceedings on Cybersecurity Education, Research and Practice

Cybersecurity and Information Technology Management programs have many similarities and many similar knowledge, skills, and abilities are taught across both programs. The skill mappings for the NICE Framework and the knowledge units required to become a National Security Agency and Department of Homeland Security Center of Academic Excellence in Cyber Defense Education contain many information technology management functions. This paper explores one university’s perception on how a joint Cybersecurity and Information Technology Management program could be developed to upskill students to be work force ready.


Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz Oct 2019

Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz

KSU Proceedings on Cybersecurity Education, Research and Practice

Today’s college and university cybersecurity programs often contain multiple laboratory activities on various different hardware and software-based cybersecurity tools. These include preventive tools such as firewalls, virtual private networks, and intrusion detection systems. Some of these are tools used in attacking a network, such as packet sniffers and learning how to craft cross-site scripting attacks or man-in-the-middle attacks. All of these are important in learning cybersecurity. However, there is another important component of cybersecurity education – teaching students how to protect a system or network from attackers by learning their motivations, and how they think, developing the students’ “abilities to …


A Pedagogical Smart Learning Environment In South African Tertiary Institutions, Tope Samuel Adeyelure, Billy Mathias Kalema Aug 2019

A Pedagogical Smart Learning Environment In South African Tertiary Institutions, Tope Samuel Adeyelure, Billy Mathias Kalema

African Conference on Information Systems and Technology

With the rapid growth rate of technology innovation different sectors tends to keep up with the developing trends by implementing the latest technology with the aim of achieving their goals. Educational institutions deploy information systems in their teaching and learning environment to enhance performance. However, educational institutions usually struggle with smooth implementation of IT leading to its failure. Adopting various scientific methods such as content analysis, Principal Component Analysis and so on, contextual factors were identified for effective deployment of smart learning environments based on extensive review of exploratory research, analyzing data and study outcomes of ICT deployment educational institutes …


Marketing Competitions: Triumphs And Trepidations, Tyra M. Burton Feb 2019

Marketing Competitions: Triumphs And Trepidations, Tyra M. Burton

Atlantic Marketing Association Proceedings

No abstract provided.


Teaching Traditional College Students Professional Marketing Via Linkedin, Necall Wilson Feb 2019

Teaching Traditional College Students Professional Marketing Via Linkedin, Necall Wilson

Atlantic Marketing Association Proceedings

No abstract provided.


Revisiting Textbook Adoption Decisions: Are Students Finally Ready For E-Books?, Cheryl B. Ward, Diane R. Edmondson Feb 2019

Revisiting Textbook Adoption Decisions: Are Students Finally Ready For E-Books?, Cheryl B. Ward, Diane R. Edmondson

Atlantic Marketing Association Proceedings

No abstract provided.


Using Social Media To Improve Student Engagement And Learning, Tommy Hsu Feb 2019

Using Social Media To Improve Student Engagement And Learning, Tommy Hsu

Atlantic Marketing Association Proceedings

No abstract provided.


Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley Oct 2018

Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to examine the outcomes of using a Learning Management System (LMS) course as a framework for mapping the Centers of Academic Excellence in Cyber Defense (CAE-CD) 2019 Knowledge Units (KU) to college courses. The experience shared herein will be useful to faculty who are interested in performing the mapping and applying for CAE-CDE designation.


Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley Oct 2018

Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to discuss a curriculum design that employs Kolb’s Experiential Learning Theory stages and Kolb’s Learning Styles in four consecutive class sessions. The challenge each class is to present students with perplexing and often frustrating network problems that someday might be encountered on the job. By using Kolb’s theory, students address those problems from the perspective of each learning style, while passing through each phase of the learning cycle. As a result, students gain stronger cognitive thinking skills and hands-on troubleshooting skills in preparation for work as network administrators or cybersecurity analysts.


Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne Oct 2018

Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne

KSU Proceedings on Cybersecurity Education, Research and Practice

In most wireless channels, the signals propagate in all directions. For the communication between Alice and Bob, an Eavesdropper can receive the signals from both Alice and Bob as far as the Eavesdropper is in the range determined by the transmitting power. Through phased array antenna with beam tracking circuits or cooperative iteration, the signals are confined near the straight line connecting the positions of Alice and Bob, so it will largely reduce the valid placement of an Eavesdropper. Sometimes, this reduction can be prohibitive for Eavesdropper to wiretap the channel since the reduced space can be readily protected. Two …


Evaluating Two Hands-On Tools For Teaching Local Area Network Vulnerabilities, Ariana Brown, Jinsheng Xu, Xiaohong Yuan Oct 2018

Evaluating Two Hands-On Tools For Teaching Local Area Network Vulnerabilities, Ariana Brown, Jinsheng Xu, Xiaohong Yuan

KSU Proceedings on Cybersecurity Education, Research and Practice

According to the Verizon’s Data Breach Investigations Report, Local Area Network (LAN) access is the top vector for insider threats and misuses. It is critical for students to learn these vulnerabilities, understand the mechanisms of exploits, and know the countermeasures. The department of Computer Science at North Carolina A&T State University designed two different educational tools that help students learn ARP Spoofing Attacks, which is the most popular attack on LAN. The first tool, called Hacker’s Graphical User Interface (HGUI), is a visualization tool that demonstrates ARP Spoofing Attack with real time animation. The second tool is a hands-on (HandsOn) …


Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang Oct 2017

Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang

KSU Proceedings on Cybersecurity Education, Research and Practice

Since web browsers have become essential to accomplishing everyday tasks, developing secure web applications has become a priority in order to protect user data, corporate databases and critical infrastructure against cyber-crimes . This research presents a game-like (gamification) approach to teach key concepts and skills on how to develop secure web applications. Gamification draws on motivational models, one of psychological theories. Gamification design has great potential over traditional education where we often find students demotivated and lecturers failing to engage them in learning activities. This research created game-like learning modules to teach top vulnerabilities and countermeasures for these top vulnerabilities …


Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia Oct 2016

Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia

KSU Proceedings on Cybersecurity Education, Research and Practice

The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …


Teaching Security Of Internet Of Things In Using Raspberrypi, Oliver Nichols, Li Yang, Xiaohong Yuan Oct 2016

Teaching Security Of Internet Of Things In Using Raspberrypi, Oliver Nichols, Li Yang, Xiaohong Yuan

KSU Proceedings on Cybersecurity Education, Research and Practice

The Internet of Things (IoTs) is becoming a reality in today’s society. The IoTs can find its application in multiple domains including healthcare, critical infrastructure, transportation, and home and personal use. It is important to teach students importance and techniques that are essential in protecting IoTs. We design a series of hands-on labs in a smart home setting, which can exercise attack and protection of IoTs. Our hands-on labs use a Raspberry Pi and several diverse smart things that communicate through Z-Wave technology. Using this environment, students can operate a home automation system and learn security concepts by performing these …


Teaching Static Call Analysis To Detect Anomalous Software Behavior, Jordan Shropshire, Philip Menard Oct 2016

Teaching Static Call Analysis To Detect Anomalous Software Behavior, Jordan Shropshire, Philip Menard

KSU Proceedings on Cybersecurity Education, Research and Practice

Malicious code detection is a critical part of any cyber security operation. Typically, the behavior of normal applications is modeled so that deviations from normal behavior can be identified. There are multiple approach to modeling good behavior but the most common approach is to observe applications’ system call activity. System calls are messages passed between user space applications and their underlying operating systems. The detection of irregular system call activity signals the presence of malicious software behavior. This method of malware-detection has been used successfully for almost two decades. Unfortunately, it can be difficult to cover this concept at the …


Transforming Services: A Year Of Investigating User-Centered Marketing Strategies And Information Literacy Programming For Graduate Students, Lisa M. Martin, Porcia N. Vaughn Apr 2016

Transforming Services: A Year Of Investigating User-Centered Marketing Strategies And Information Literacy Programming For Graduate Students, Lisa M. Martin, Porcia N. Vaughn

Transforming Libraries for Graduate Students

The University of Houston (UH) is a Carnegie-designated Tier One public research university that strives to serve more than 7,000 graduate and professional students. Graduate students have been historically underserved by the UH Libraries, however, in recent years the Libraries have made expanding services to graduate students a strategic initiative. UH Library administration has designated targeting specific user groups, including graduate students, with revitalized marketing and innovative programing a high priority.

Two project teams were established within the Liaison Services Department to investigate the role of liaison services in graduate education. Project Team 1 investigated best practices for marketing existing …


Collegiate Competition And The Propensity For Gender Bias, Deborah H. Lester, Aberdeen Leila Borders, Terry W. Loe, Keith Tudor Sep 2015

Collegiate Competition And The Propensity For Gender Bias, Deborah H. Lester, Aberdeen Leila Borders, Terry W. Loe, Keith Tudor

Atlantic Marketing Association Proceedings

Since the dawn of time gender has played a starring role in human behavior. The behavioral implications of an individual’s sex have permeated research findings in a wide variety of academic disciplines. This preliminary investigation will explore the concept and definition of gender, gender bias, and gender stereotype on actions and conduct. Specifically, this inquiry will determine the scope and types of gender bias/stereotypes that exist in the business world with a primary concentration on the area of professional sales. The ultimate objective is to discover the type and level of influence a person’s gender contributes to evaluation, performance and …


Students' Attitudes Towards Textbook Types: Are Students Really Ready For E-Textbooks?, Diane R. Edmondson, Cheryl Ward Sep 2015

Students' Attitudes Towards Textbook Types: Are Students Really Ready For E-Textbooks?, Diane R. Edmondson, Cheryl Ward

Atlantic Marketing Association Proceedings

Textbook selection is just one of the many decisions a professor has to make when teaching a class. These selection decisions are sometimes made by the individual professor while other times it is made by committee or department. In many cases, students are not taken into consideration when making these decisions. However considering many professors complain that students do not buy or use the required textbook (Kingkade 2014, Paxhia 2011, Robinson 2011), maybe it is time to think about student’s attitudes and preferences before making textbook adoption decisions. Unfortunately there are only a few studies (e.g. Daniel and Woody 2013) …