Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Education

2022 - The Third Annual Fall Symposium Of Student Scholars Dec 2022

2022 - The Third Annual Fall Symposium Of Student Scholars

Symposium of Student Scholars Program Books

The full program book from the Fall 2022 Symposium of Student Scholars, held on November 17, 2022. Includes abstracts from the presentations and posters.


Principles Of Information Security, Alison Hedrick Oct 2022

Principles Of Information Security, Alison Hedrick

KSU Distinguished Course Repository

An introduction to the various technical and administrative aspects of Information Security and Assurance. This course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features.


Recreation Programming, Anne Demartini Aug 2022

Recreation Programming, Anne Demartini

KSU Distinguished Course Repository

This course will provide students with an overview of recreation programming across the age spectrum and diverse populations. Leisure programming trends and niche marketing are examined as well. This course also facilitates the understanding and application of the recreation program process for leisure delivery systems including an introduction to activity plans, program design, delivery and evaluation.

This class uses a hybrid format which gives students some flexibility and independence. It also allows for "flex time" for our high impact learning activies. The class performs service learning directly related to the course topic through volunteering with recreation programs both on campus …


The 1-2-3 Of Market Research For Business Startups: A Case Study In Library Instruction, Daniel Le, Marie-Louise Watson Aug 2022

The 1-2-3 Of Market Research For Business Startups: A Case Study In Library Instruction, Daniel Le, Marie-Louise Watson

Georgia Library Quarterly

This article describes a practical way to teach student entrepreneurs to search and use market data for business startup plans. The conventional way of teaching students to find articles and business intelligence based on a class assignment can be challenging for many students without an academic business background. This library instruction approach sequentially uses three databases enriched with business data and infographics to support the development of critical thinking for student entrepreneurs. It teaches entrepreneurial personality support, analysis, visualization, and market mapping.


The Legal And Ethical Environment Of Business, Cristen W. Dutcher Aug 2022

The Legal And Ethical Environment Of Business, Cristen W. Dutcher

KSU Distinguished Course Repository

This course is an introduction of the relationship between law and the business environment. The material includes an overview of the areas of law that are relevant to business, including torts, crimes, contracts, the Constitution, antitrust, real estate, court procedure, government regulation, intellectual property and remedies. The class also addresses ethical issues that may arise in a business’s internal and external activities. Many of these topics will overlap such as computer crime legislation, liability for errors in data or programming for an IT system, or the ethics of revealing information to gain an advantage in business.


Cybersecurity Educational Resources For K-12, Debra Bowen, James Jaurez, Nancy Jones, William Reid, Christopher Simpson Jul 2022

Cybersecurity Educational Resources For K-12, Debra Bowen, James Jaurez, Nancy Jones, William Reid, Christopher Simpson

Journal of Cybersecurity Education, Research and Practice

There are many resources to guide successful K-12 cybersecurity education. The objective of these resources is to prepare skilled and ethical cybersecurity students at the earliest level to meet the demands of higher-level programs. The goal of this article is to provide, as a starting point, a list of as many currently popular K-12 educational resources as possible. The resources provided are broken into five categories: 1) Career Information, 2) Curriculum, 3) Competitions, 4) CyberCamps, and 5) Labs and Gaming. Each resource listed has a link, the K-12 levels that are supported, whether the resource is free or has a …


Security Simulations In Undergraduate Education: A Review, Joseph Simpson, Aaron Brantly Jul 2022

Security Simulations In Undergraduate Education: A Review, Joseph Simpson, Aaron Brantly

Journal of Cybersecurity Education, Research and Practice

Several decades of research in simulation and gamification in higher education shows that simulations are highly effective in improving a range of outcomes for students including declarative knowledge and interest in the topic being taught. While there appears to be a broad array of options to provide education in an undergraduate setting related to security, no previous reviews have explored computer-based simulations covering all facets of security. Given the increasing importance and adoption of interdisciplinary educational programs, it is important to take stock of simulations as a tool to broaden the range of problems, perspectives, and solutions presented to students. …


Assessing The Practical Cybersecurity Skills Gained Through Criminal Justice Academic Programs To Benefit Security Operations Centers (Socs), Lucy Tsado, Jung Seob "Scott" Kim Jul 2022

Assessing The Practical Cybersecurity Skills Gained Through Criminal Justice Academic Programs To Benefit Security Operations Centers (Socs), Lucy Tsado, Jung Seob "Scott" Kim

Journal of Cybersecurity Education, Research and Practice

Private-sector and public-sector organizations have increasingly built specific business units for securing company assets, reputation, and lives, known as security operations centers (SOCs). Depending on the organization, these centers may also be referred to as global security operations centers, cybersecurity operations centers, fusion centers, and corporate command centers, among many other names. The concept of centralized function within an organization to improve an organization’s security posture has attracted both the government and the private sectors to either build their own SOCs or hire third-party SOC companies.

In this article, the need for a multidisciplinary approach to cybersecurity education at colleges …


The Acceptance And Use Of Online Learning By Law Students In A South African University: An Application Of The Utaut2 Model, Jameson Goto, Anzanilufuno Munyai Jul 2022

The Acceptance And Use Of Online Learning By Law Students In A South African University: An Application Of The Utaut2 Model, Jameson Goto, Anzanilufuno Munyai

The African Journal of Information Systems

COVID-19 forced many universities to shift from traditional face-to-face or blended learning, to full online learning. The sudden shift was not easy for both students and lecturers, who had to adapt to the new learning mode. This study aimed to evaluate the acceptance and use of online learning of university students in the law faculty at a South African university during the COVID-19 pandemic. The study employs the extended unified theory of acceptance and use of technology (UTAUT2) model particularised to the online learning context in a country with a developing economy. An online survey was administered to the student …


Looking For Inclusivity In Higher Ed? Start In The Classroom!, Michelle C. Carpenter Jun 2022

Looking For Inclusivity In Higher Ed? Start In The Classroom!, Michelle C. Carpenter

Atlantic Marketing Journal

The rallying cry for inclusivity has never been greater in higher education. As professors look for ways to ensure all sociocultural perspectives are present in their course activities, lectures and discussions, many questions remain beginning with who should be addressing these issues as well as how exactly this might be accomplished. Increasingly more faculty are opening their classrooms to this discussion, even if diversity is not a required element of their course. Exit interviews conducted in Spring 2021 with senior marketing majors at a Mid Atlantic University provided an opportunity for students to share their perceptions about inclusivity and what …


Investigating The Impact On Student Engagement From Converting Face-To-Face Classes To Online In Response To Covid-19, Anita Whiting Jun 2022

Investigating The Impact On Student Engagement From Converting Face-To-Face Classes To Online In Response To Covid-19, Anita Whiting

Atlantic Marketing Journal

Paper investigates the impact on student engagement from converting traditional face-to-face classes to online in response to Covid-19. In particular, this study investigated the impact of conversion to online on four different types of student engagement: (1) participation engagement, (2) emotional engagement, (3) skill engagement, and (4) performance engagement. Survey data were collected from 160 business students who had their face-to-face classes converted to online due to Covid-19. Results of study show that all four types of student engagement significantly declined when classes were converted to online. Participation engagement declined the most while performance engagement declined the least. Non-traditional students …


2022- The Twenty-Sixth Annual Symposium Of Student Scholars Apr 2022

2022- The Twenty-Sixth Annual Symposium Of Student Scholars

Symposium of Student Scholars Program Books

The full program book from the Twenty-sixth Annual Symposium of Student Scholars, held on April 19, 2022. Includes abstracts from the presentations and posters.


Beyond The Ivory Tower: Supporting The Graduate Nonacademic Career Search Through Library Partnerships, Sarah Lane Mar 2022

Beyond The Ivory Tower: Supporting The Graduate Nonacademic Career Search Through Library Partnerships, Sarah Lane

Transforming Libraries for Graduate Students

For a variety of reasons, some graduate students ultimately determine that they would like to pursue a career outside of the ivory tower. At the same time, these scholars may be uncertain about how to translate their expertise into a nonacademic position. At Cornell University, a partnership between the Management Library and the Careers Beyond Academia office has allowed librarians to utilize their unique expertise to assist graduate students throughout their job search.

At the Management Library, business librarians have historically worked with the Career Management Center of the Johnson Graduate School of Management to assist MBA and graduate business …


Transitioning To A Master's Degree Granting University: Implications For Librarian Instruction, Outreach, And Collection Development, Mary A. Aquila Ms., :Laken T. Smith Ms., Jennifer L. Wolfe Mrs. Mar 2022

Transitioning To A Master's Degree Granting University: Implications For Librarian Instruction, Outreach, And Collection Development, Mary A. Aquila Ms., :Laken T. Smith Ms., Jennifer L. Wolfe Mrs.

Transforming Libraries for Graduate Students

Athens State University is located in Athens, Alabama in the northern part of Alabama bordering Giles County, Tennessee. It is one of the only upper-level universities serving juniors, seniors, and graduate students in the country. The student body consists primarily of non-traditional and first-generation students. In 2014, Athens State University was approved to offer a graduate program in Global Logistics and Supply Chain Management in the College of Business by the Alabama Commission on Higher Education (ACHE). Since then, Athens State University has expanded its graduate offerings to include five additional fields of study: Strategic Healthcare Management and Administration, Strategic …


Creating A Support System For Online Graduate Students Learning New Software, Marisha C. Kelly Feb 2022

Creating A Support System For Online Graduate Students Learning New Software, Marisha C. Kelly

Transforming Libraries for Graduate Students

This poster outlines strategies for creating a support system for online graduate students learning new software. The Northcentral University (NCU) Library is a 100 percent online library providing services and delivering resources to students in a remote context. According to university facts and figures, approximately 98 percent of students are enrolled in a graduate program and nearly 69 percent of those students are pursuing a doctoral degree. In May 2019, a reference and instruction librarian developed a program to support graduate students learning how to use ProQuest RefWorks, a web-based research management tool. Elements of the program include synchronous options …


Faculty And Advisor Advice For Cybersecurity Students: Liberal Arts, Interdisciplinarity, Experience, Lifelong Learning, Technical Skills, And Hard Work, Brian K. Payne, Bria Cross, Tancy Vandecar-Burdin Feb 2022

Faculty And Advisor Advice For Cybersecurity Students: Liberal Arts, Interdisciplinarity, Experience, Lifelong Learning, Technical Skills, And Hard Work, Brian K. Payne, Bria Cross, Tancy Vandecar-Burdin

Journal of Cybersecurity Education, Research and Practice

The value of academic advising has been increasingly emphasized in higher education. In this study, attention is given to the most significant types of advice that a sample of cybersecurity faculty and advisors from the Commonwealth of Virginia recommend giving to cybersecurity students. The results show that faculty and advisors recommended that students be aware of six different aspects of cybersecurity education including the value of experience, the need for lifelong learning, the importance of hard work, the need to develop technical skills, the interdisciplinary nature of cybersecurity, and the need to develop liberal arts or professional/soft skills. Implications of …


Toward A Student-Ready Cybersecurity Program: Findings From A Survey Of Stem-Students, Lora Pitman, Brian K. Payne, Tancy Vandecar-Burdin, Lenora Thorbjornsen Jan 2022

Toward A Student-Ready Cybersecurity Program: Findings From A Survey Of Stem-Students, Lora Pitman, Brian K. Payne, Tancy Vandecar-Burdin, Lenora Thorbjornsen

Journal of Cybersecurity Education, Research and Practice

As the number of available cybersecurity jobs continues to grow, colleges strive to offer to their cybersecurity students an environment which will make them sufficiently prepared to enter the workforce after graduation. This paper explores the academic and professional needs of STEM-students in various higher education institutions across Virginia and how cybersecurity programs can cater to these needs. It also seeks to propose an evidence-based approach for improving the existing cybersecurity programs so that they can become more inclusive and student-ready. A survey of 251 college students in four higher-education institutions in Virginia showed that while there are common patterns …


The Impact Of A Gencyber Camp On In-Service Teachers’ Tpack, Kevin M. Thomas, Jessica Ivy, Kristin Cook, Robert R. Kelley Jan 2022

The Impact Of A Gencyber Camp On In-Service Teachers’ Tpack, Kevin M. Thomas, Jessica Ivy, Kristin Cook, Robert R. Kelley

Journal of Cybersecurity Education, Research and Practice

The purpose of this study was to examine the impact of a GenCyber camp curriculum on teachers’ technology, pedagogy, and content knowledge (TPACK). The camp was designed to engage participants in developing the knowledge and skills to incorporate GenCyber Cybersecurity First Principles and GenCyber Cybersecurity Concepts (GenCyber, 2019) into their curriculums. Participants (37 middle and high school teachers from a variety of disciplines) attended one of two weeklong camps held at a Midwestern liberal arts university. Using the TPACK Self-Reflection and TPACK Self-Assessment Surveys, pre- and post-camp data were collected from participants. Findings indicate that participants demonstrated an increase in …