Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Education

Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang Nov 2023

Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang

Journal of Cybersecurity Education, Research and Practice

Recent advances in Artificial Intelligence (AI) have brought society closer to the long-held dream of creating machines to help with both common and complex tasks and functions. From recommending movies to detecting disease in its earliest stages, AI has become an aspect of daily life many people accept without scrutiny. Despite its functionality and promise, AI has inherent security risks that users should understand and programmers must be trained to address. The ICE (integrity, confidentiality, and equity) cybersecurity labs developed by a team of cybersecurity researchers addresses these vulnerabilities to AI models through a series of hands-on, inquiry-based labs. Through …


On Ensuring Information Security For Institutions Of Higher Education, Хikmatilla Nigmatov, Alisher Muhammadiyev Dec 2020

On Ensuring Information Security For Institutions Of Higher Education, Хikmatilla Nigmatov, Alisher Muhammadiyev

The Light of Islam

This article is devoted to one of the most relevant and demanded topics ­ information security. One of the reasons for this is that because of the pandemic, the world’s population has switched to a digital management system through computer networks. As a result, the main part of the system of higher, secondary, and special education switched to the forms of distance learning. In this article, we tried to answer, based on scientifc research, the questions related to what standards and safeguards should be used to ensure the security of data in computer systems and networks of higher education institutions. …