Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Education

A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland Dec 2017

A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland

Journal of Cybersecurity Education, Research and Practice

In today’s business environment where all operations are enabled by technology, information security has become an established discipline as more and more businesses realize its value. The human component has been recognized to have an important role in information security since the only way to reduce security risks is through making employees more information security aware. Towards this goal the research will appreciate the importance of information security awareness by illustrating the need for more effective user training. Further to that it proposes and develops an information security toolkit as a prototype awareness raising initiative. Apart from the elements of …


Varying Instructional Approaches To Physical Extraction Of Mobile Device Memory, Joan Runs Through, Gary D. Cantrell Dec 2017

Varying Instructional Approaches To Physical Extraction Of Mobile Device Memory, Joan Runs Through, Gary D. Cantrell

Journal of Digital Forensics, Security and Law

Digital forensics is a multidisciplinary field encompassing both computer science and criminal justice. This action research compared demonstrated skill levels of university students enrolled in a semester course in small device forensics with 54 hours of instruction in mobile forensics with an emphasis on physical techniques such as JTAG and Chip-Off extraction against the skill levels of industry professionals who have completed an accelerated 40 hour advanced mobile forensics training covering much of the same material to include JTAG and Chip-Off extraction. Participant backgrounds were also examined to determine if those participants with a background in computer science had an …


Using Data To Improve Services For Infants With Hearing Loss: Linking Newborn Hearing Screening Records With Early Intervention Records, Maria Gonzalez, Lori Iarossi, Yan Wu, Ying Huang, Kirsten Siegenthaler Nov 2017

Using Data To Improve Services For Infants With Hearing Loss: Linking Newborn Hearing Screening Records With Early Intervention Records, Maria Gonzalez, Lori Iarossi, Yan Wu, Ying Huang, Kirsten Siegenthaler

Journal of Early Hearing Detection and Intervention

The purpose of this study was to match records of infants with permanent hearing loss from the New York Early Hearing Detection and Intervention Information System (NYEHDI-IS) to records of infants with permanent hearing loss receiving early intervention services from the New York State Early Intervention Program (NYSEIP) to identify areas in the state where hearing screening, diagnostic evaluations and referrals to the NYSEIP were not being made or documented in a timely manner. Data from 2014-2016 NYEHDI-IS and NYEIS information systems were matched using The Link King. There were 274 infants documented in NYEIS Information System as receiving early …


The Inevitability Of Playing Politics As Chair: Advantages And Pitfalls, Domenick Pinto Jan 2017

The Inevitability Of Playing Politics As Chair: Advantages And Pitfalls, Domenick Pinto

School of Computer Science & Engineering Faculty Publications

Politics is a term often frowned upon as it pertains to the role of an academic leader. However as chair for almost 30 years it has become an essential yet sometimes unwanted aspect of the daily rigors of the position. This workshop explores the advantages and pitfalls of “playing politics” as a department chair and allows interactivity among participants in “what if” scenarios.