Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 40

Full-Text Articles in Education

Teaching Digital And Social Media Marketing Through Community Engagement: An Online Asynchronous Class Longitudinal Case Study, Joie Hain, Anita Whiting Apr 2024

Teaching Digital And Social Media Marketing Through Community Engagement: An Online Asynchronous Class Longitudinal Case Study, Joie Hain, Anita Whiting

Atlantic Marketing Journal

Abstract - While marketing educators have identified the need for community engagement projects within the marketing curriculum, there is little research on implementing a community engagement project in marketing, especially in digital marketing. Therefore, this longitudinal case study aims to demonstrate how a community engagement project was implemented into digital and social media marketing classes at one university. This case study discusses (1) how the community engagement project was developed, (2) the work conducted, and (3) the results provided to the client. This case study also provides feedback from both students and the client. Overall, students were pleased with the …


University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo Feb 2024

University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo

Journal of Cybersecurity Education, Research and Practice

This study examines cybersecurity awareness in universities by analyzing related research output across different disciplines at the University of Johannesburg. The diffusion of innovation theory is used in this study as a theoretical framework to explain how cybersecurity awareness diffuses across disciplines. The University of Johannesburg Institutional Repository database was the data source for this study. Variations in cybersecurity keyword searches and topic modeling techniques were used to identify the frequency and distribution of research output across different disciplines. The study reveals that cybersecurity awareness has diffused across various disciplines, including non-computer science disciplines such as business, accounting, and social …


Why Students Select Their College Major: An Investigative Study, Kate N. Matthews, Diane R. Edmondson, Lucy Matthews Jan 2024

Why Students Select Their College Major: An Investigative Study, Kate N. Matthews, Diane R. Edmondson, Lucy Matthews

Atlantic Marketing Journal

With the decline in the number of traditional college-aged students, understanding the degree selection process is important for departments, colleges, and universities alike. For students, selecting the proper major early is also beneficial since it reduces time in school and tuition costs. Therefore, a better understanding of the degree selection process is worthwhile. Survey data was collected from 1,177 undergraduates at a southeastern U.S. university. Survey questions included major selection influences and other attitude and demographic items. The highest ranked reason is interest and passion followed by fit with personality type. This was similar for students who changed majors. External …


Integrating Certifications Into The Cybersecurity College Curriculum: The Efficacy Of Education With Certifications To Increase The Cybersecurity Workforce, Binh Tran, Karen C. Benson, Lorraine Jonassen Oct 2023

Integrating Certifications Into The Cybersecurity College Curriculum: The Efficacy Of Education With Certifications To Increase The Cybersecurity Workforce, Binh Tran, Karen C. Benson, Lorraine Jonassen

Journal of Cybersecurity Education, Research and Practice

One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An un-tapped resource to combat these attacks lies in the students of the secondary educational system. Necessary in the cybersecurity education is a 3-tiered approach to quickly escalate the student into a workplace-ready graduate. The analogy used is a three-legged-stool, where curriculum content, hands-on skills, and certifications are equal instruments in the edification of the cybersecurity student. This paper endeavors to delve into the 3rd leg of …


Exploring Network Security Educator Knowledge, Jennifer B. Chauvot, Deniz Gurkan, Cathy Horn Oct 2023

Exploring Network Security Educator Knowledge, Jennifer B. Chauvot, Deniz Gurkan, Cathy Horn

Journal of Cybersecurity Education, Research and Practice

It is critical for nations to have trained professionals in network security who can safeguard hardware, information systems, and electronic data. Network security education is a key knowledge unit of the National Centers of Academic Excellence in Cybersecurity and various information systems security curricula at the master's and bachelor's levels in higher education. Network security units are components of computer science curricula in high school contexts as well. Educators who teach these concepts play a significant role in developing a skilled workforce of network security experts for both governmental and non-governmental organizations. Understanding the necessary knowledge and skills of network …


Cyberbullying: Senior Prospective Teachers’ Coping Knowledge And Strategies, Kürşat Arslan, İnan Aydın Jul 2023

Cyberbullying: Senior Prospective Teachers’ Coping Knowledge And Strategies, Kürşat Arslan, İnan Aydın

Journal of Cybersecurity Education, Research and Practice

This study aimed to determine senior prospective teachers’ coping knowledge and strategies for cyberbullying in terms of demographic variables. The sample consisted of 471 prospective teachers (324 female and 147 male) studying in the 4th grade in Dokuz Eylül University Buca Education Faculty in Izmir in the 2019-2020 academic year. It was a quantitative study using a causal-comparative research design to find out whether prospective teachers’ coping knowledge differed by independent variables. The "Coping with Cyberbullying Scale" developed by Koç et al. (2016) was employed to discover prospective teachers’ coping strategies for cyberbullying. A "Personal Information" form was also prepared …


A Systematic Mapping Study On Gamification Applications For Undergraduate Cybersecurity Education, Sherri Weitl-Harms, Adam Spanier, John Hastings, Matthew Rokusek Jul 2023

A Systematic Mapping Study On Gamification Applications For Undergraduate Cybersecurity Education, Sherri Weitl-Harms, Adam Spanier, John Hastings, Matthew Rokusek

Journal of Cybersecurity Education, Research and Practice

Gamification in education presents a number of benefits that can theoretically facilitate higher engagement and motivation among students when learning complex, technical concepts. As an innovative, high-potential educational tool, many educators and researchers are attempting to implement more effective gamification into undergraduate coursework. Cyber Security Operations (CSO) education is no exception. CSO education traditionally requires comprehension of complex concepts requiring a high level of technical and abstract thinking. By properly applying gamification to complex CSO concepts, engagement in students should see an increase. While an increase is expected, no comprehensive study of CSO gamification applications (GA) has yet been undertaken …


Sociocultural Barriers For Female Participation In Stem: A Case Of Saudi Women In Cybersecurity, Alanoud Aljuaid, Xiang Michelle Liu Jul 2023

Sociocultural Barriers For Female Participation In Stem: A Case Of Saudi Women In Cybersecurity, Alanoud Aljuaid, Xiang Michelle Liu

Journal of Cybersecurity Education, Research and Practice

The participation of women in Science, Technology, Engineering, and Mathematics (STEM) workforces is overwhelmingly low as compared to their male counterparts. The low uptake of cybersecurity careers has been documented in the previous studies conducted in the contexts of the West and Eastern worlds. However, most of the past studies mainly covered the Western world leaving more knowledge gaps in the context of Middle Eastern countries such as Saudi Arabia. Thus, to fill the existing knowledge gaps, the current study focused on women in Saudi Arabia. The aim of the study was to investigate the factors behind the underrepresentation of …


Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces, Austin Cusak Jul 2023

Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces, Austin Cusak

Journal of Cybersecurity Education, Research and Practice

A qualitative case study focused on understanding what steps are needed to prepare the cybersecurity workforces of 2026-2028 to work with and against emerging technologies such as Artificial Intelligence and Machine Learning. Conducted through a workshop held in two parts at a cybersecurity education conference, findings came both from a semi-structured interview with a panel of experts as well as small workgroups of professionals answering seven scenario-based questions. Data was thematically analyzed, with major findings emerging about the need to refocus cybersecurity STEM at the middle school level with problem-based learning, the disconnects between workforce operations and cybersecurity operators, the …


The Impact Of Technology, Engagement, And Student Readiness On Student Learning In Blended Synchronous Learning Environments, Kirsten Passyn, Susan Wright Jan 2023

The Impact Of Technology, Engagement, And Student Readiness On Student Learning In Blended Synchronous Learning Environments, Kirsten Passyn, Susan Wright

Atlantic Marketing Journal

The authors investigate technology, engagement, and student readiness as determinants of student learning in a blended synchronous learning environment. The experiment was conducted in two sections of a principles of marketing course where in-person and remote students simultaneously completed short concept quizzes using a mobile polling app. In-person students achieved higher quiz scores than remote students. GPA is a predictor of scores in both environments, and the effect is more pronounced for lower GPA students in remote locations. Student surveys identify focus and engagement as primary challenges to remote learning. Technology issues are secondary.


The 1-2-3 Of Market Research For Business Startups: A Case Study In Library Instruction, Daniel Le, Marie-Louise Watson Aug 2022

The 1-2-3 Of Market Research For Business Startups: A Case Study In Library Instruction, Daniel Le, Marie-Louise Watson

Georgia Library Quarterly

This article describes a practical way to teach student entrepreneurs to search and use market data for business startup plans. The conventional way of teaching students to find articles and business intelligence based on a class assignment can be challenging for many students without an academic business background. This library instruction approach sequentially uses three databases enriched with business data and infographics to support the development of critical thinking for student entrepreneurs. It teaches entrepreneurial personality support, analysis, visualization, and market mapping.


Assessing The Practical Cybersecurity Skills Gained Through Criminal Justice Academic Programs To Benefit Security Operations Centers (Socs), Lucy Tsado, Jung Seob "Scott" Kim Jul 2022

Assessing The Practical Cybersecurity Skills Gained Through Criminal Justice Academic Programs To Benefit Security Operations Centers (Socs), Lucy Tsado, Jung Seob "Scott" Kim

Journal of Cybersecurity Education, Research and Practice

Private-sector and public-sector organizations have increasingly built specific business units for securing company assets, reputation, and lives, known as security operations centers (SOCs). Depending on the organization, these centers may also be referred to as global security operations centers, cybersecurity operations centers, fusion centers, and corporate command centers, among many other names. The concept of centralized function within an organization to improve an organization’s security posture has attracted both the government and the private sectors to either build their own SOCs or hire third-party SOC companies.

In this article, the need for a multidisciplinary approach to cybersecurity education at colleges …


Investigating The Impact On Student Engagement From Converting Face-To-Face Classes To Online In Response To Covid-19, Anita Whiting Jun 2022

Investigating The Impact On Student Engagement From Converting Face-To-Face Classes To Online In Response To Covid-19, Anita Whiting

Atlantic Marketing Journal

Paper investigates the impact on student engagement from converting traditional face-to-face classes to online in response to Covid-19. In particular, this study investigated the impact of conversion to online on four different types of student engagement: (1) participation engagement, (2) emotional engagement, (3) skill engagement, and (4) performance engagement. Survey data were collected from 160 business students who had their face-to-face classes converted to online due to Covid-19. Results of study show that all four types of student engagement significantly declined when classes were converted to online. Participation engagement declined the most while performance engagement declined the least. Non-traditional students …


Toward A Student-Ready Cybersecurity Program: Findings From A Survey Of Stem-Students, Lora Pitman, Brian K. Payne, Tancy Vandecar-Burdin, Lenora Thorbjornsen Jan 2022

Toward A Student-Ready Cybersecurity Program: Findings From A Survey Of Stem-Students, Lora Pitman, Brian K. Payne, Tancy Vandecar-Burdin, Lenora Thorbjornsen

Journal of Cybersecurity Education, Research and Practice

As the number of available cybersecurity jobs continues to grow, colleges strive to offer to their cybersecurity students an environment which will make them sufficiently prepared to enter the workforce after graduation. This paper explores the academic and professional needs of STEM-students in various higher education institutions across Virginia and how cybersecurity programs can cater to these needs. It also seeks to propose an evidence-based approach for improving the existing cybersecurity programs so that they can become more inclusive and student-ready. A survey of 251 college students in four higher-education institutions in Virginia showed that while there are common patterns …


Student Perspectives On Mandatory Conversion To Online Classes: A Qualitative Study, Anita Whiting, Joie S. Hain Jan 2022

Student Perspectives On Mandatory Conversion To Online Classes: A Qualitative Study, Anita Whiting, Joie S. Hain

Atlantic Marketing Journal

This qualitative research study investigates students’ perspectives on the mandatory conversion to online classes due to COVID-19. In particular, this study explores (1) students’ struggles with conversion of class to online, (2) students’ likes of converted online class, (3) students’ dislikes of converted online class, 4) students’ happiness toward converted online classes, and (5) students’ recommendations on ways to improve online classes. The study was conducted at three universities in the southeastern region of the United States. The major findings of the study are (1) almost 80 percent of students reported struggles when class was converted to online, (2) 88 …


Factors That Influence The Acceptance And Use Of Formative Feedback In An Online Undergraduate Module, Jameson Goto, Jacqueline Batchelor, Geoffrey Lautenbach Jul 2021

Factors That Influence The Acceptance And Use Of Formative Feedback In An Online Undergraduate Module, Jameson Goto, Jacqueline Batchelor, Geoffrey Lautenbach

The African Journal of Information Systems

The focus of the study was to determine the factors that influence the acceptance and use of online feedback in an undergraduate module using the modified unified theory of acceptance and use of technology (UTAUT2). The participants were third-year pre-service teachers in the Bachelor of Education degree who were taking a fully online Teaching Studies module, in addition to their specialist subject areas at one of the universities in South Africa. A survey instrument was developed from the original UTAUT2 instrument and modified where appropriate, to fit the formative feedback context. Exploratory factor analysis was used to validate the instrument. …


Importance-Performance Gap Analysis Of The University Brand Equity Dimensions, Tulay Girard, Musa Pinar Jan 2021

Importance-Performance Gap Analysis Of The University Brand Equity Dimensions, Tulay Girard, Musa Pinar

Atlantic Marketing Journal

This study examines the gaps between the importance students place on brand equity dimensions and their perceptions of how well their university performs on each dimension. It also assesses if the brand equity dimensions differ based on student demographics including gender, class level, and their living arrangement. Data were collected from a university in the Midwestern U.S. from undergraduate students. The findings reveal significant gaps between the importance and performance perceptions of students, and that females, students living on campus, and freshman require special


Hello, Are You There? Creating And Measuring Online Student Engagement, Kirsten Passyn Jan 2021

Hello, Are You There? Creating And Measuring Online Student Engagement, Kirsten Passyn

Atlantic Marketing Journal

Engaging students in an online environment is frustrating for faculty and a concern of administration. Faculty and students report lower levels of satisfaction and lower engagement in online versus face to face learning. Dropout rates in fully online courses are often two times higher than face to face courses. This research attempted to engage online students by embedding a gamification-based scavenger hunt in an online course. Engagement was measured using a combination of quantitative and qualitative measurements. Although the scavenger hunt didn't significantly engage low performing students, it did motivate and deepen top-performing students' engagement. Interestingly, qualitative-based engagement measures proved …


Cyberbullying Among University Students: The Kenyan Experience, Joshua R A Ndiege, Gabriel Okello, Patrick K. Wamuyu Mar 2020

Cyberbullying Among University Students: The Kenyan Experience, Joshua R A Ndiege, Gabriel Okello, Patrick K. Wamuyu

The African Journal of Information Systems

Although considerable literature has grown around cyberbullying, there are still only limited studies on this within developing economies, especially African countries. In particular, studies on cyberbullying in Africa have failed to have a direct focus on the prevalence of this phenomenon among students in universities. Not only does cyberbullying have an emotional-social impact, it has ramifications on the learning process as well. This subject remains of utmost relevance within academia, and a number of institutions continue to grapple with its impact. The study reported here is an exploratory investigation of 396 students from one of the private universities within Nairobi, …


Divergent Student Views Of Cybersecurity, Susan E. Ramlo, John B. Nicholas Jan 2020

Divergent Student Views Of Cybersecurity, Susan E. Ramlo, John B. Nicholas

Journal of Cybersecurity Education, Research and Practice

Cybersecurity is a worldwide issue and concern. Prior studies indicate that many people do not use cybersecurity best practices. Although these prior studies used large-scale surveys or interviews, this study used Q methodology [Q] because Q provides greater insight than Likert-format surveys. In fact, Q was created to scientifically study subjectivity. Within a Q study, various stages as well as philosophical, epistemological, and ontological principles represent a complete methodology. At first, Q researchers collect items that represent the broad range of communications about the topic (called the concourse). Although the items can be pictures, scents, or other means of communication, …


A Guide For Early Career Success In Academic Research, Obinna O. Obilo, William B. Locander, David A. Locander Jan 2020

A Guide For Early Career Success In Academic Research, Obinna O. Obilo, William B. Locander, David A. Locander

Atlantic Marketing Journal

Balancing the research, teaching, and service facets is important to achieving success in academia. Doctoral programs should prepare their students to successfully navigate and balance all three of these facets. We focus on the research facet in this study and draw from the experience of a panel of accomplished researchers within the discipline, to compile a set of guidelines for doctoral students and new faculty. Analyzing the qualitative results from the panel interviews, we find that to ensure success within the research facet, one must effectively manage three emergent focal distinctions; a relationship with: oneself, others, and with the work.


Revisiting Textbook Adoption Decisions: Are Students Finally Ready For E-Books?, Cheryl B. Ward, Diane R. Edmondson Dec 2019

Revisiting Textbook Adoption Decisions: Are Students Finally Ready For E-Books?, Cheryl B. Ward, Diane R. Edmondson

Atlantic Marketing Journal

This study re-examines students’ attitudes and preferences to the four primary textbook types (hardback, paperback, loose leaf, and E-book). One hundred eighty-three students currently taking Principles of Marketing from a large public university in the southeastern United States completed the survey. Unlike the 2014 study, where students overwhelming preferred paperback textbooks, even when this textbook is at a higher price than other alternatives, the 2018 study found that the textbook choice depended on if an access code to publisher’s online course materials was required. When access codes were required, students preferred paperback textbooks, followed closely by E-books. When no access …


Full Issue - Jgi V.14, N.1 Jul 2019

Full Issue - Jgi V.14, N.1

Journal of Global Initiatives: Policy, Pedagogy, Perspective

Full issue of Journal of Global Initiatives volume 14, number 1 - Special Issue: The Impact of Communication Technologies on Study Abroad.


Cybersecurity Education: The Need For A Top-Driven, Multidisciplinary, School-Wide Approach, Lucy Tsado Jun 2019

Cybersecurity Education: The Need For A Top-Driven, Multidisciplinary, School-Wide Approach, Lucy Tsado

Journal of Cybersecurity Education, Research and Practice

The human resource skills gap in cybersecurity has created an opportunity for educational institutions interested in cybersecurity education. The current number of schools designated by the Department of Homeland Security (DHS) and National Security Agency (NSA) as Centers of Academic Excellence (CAE) to train cybersecurity experts are not sufficient to meet the shortfall in the industry. The DHS has clearly mapped out knowledge areas for cybersecurity education for both technical and non-technical disciplines; it is therefore possible for institutions not yet designated CAEs to generate cybersecurity experts, with the long-term goal of attaining the CAE designation. The purpose of this …


News - University Of Georgia School Of Law, Rachel S. Evans Apr 2019

News - University Of Georgia School Of Law, Rachel S. Evans

Georgia Library Quarterly

No abstract provided.


Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos Jul 2018

Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos

Journal of Cybersecurity Education, Research and Practice

We conducted an observational study to document student misconceptions about cybersecurity using thematic analysis of 25 think-aloud interviews. By understanding patterns in student misconceptions, we provide a basis for developing rigorous evidence-based recommendations for improving teaching and assessment methods in cybersecurity and inform future research. This study is the first to explore student cognition and reasoning about cybersecurity. We interviewed students from three diverse institutions. During these interviews, students grappled with security scenarios designed to probe their understanding of cybersecurity, especially adversarial thinking. We analyzed student statements using a structured qualitative method, novice-led paired thematic analysis, to document patterns in …


Acceptance Of Ict: Applicability Of The Unified Theory Of Acceptance And Use Of Technology (Utaut) To South African Students, Janet Liebenberg, Trudie Benade, Suria Ellis May 2018

Acceptance Of Ict: Applicability Of The Unified Theory Of Acceptance And Use Of Technology (Utaut) To South African Students, Janet Liebenberg, Trudie Benade, Suria Ellis

The African Journal of Information Systems

We are told that university students are Digital Natives and the diffusion of digital technologies into education holds prospective advantages. However, will students in Africa be prepared to engage with and accept the technology? This study aimed to determine the applicability of the Unified Theory of Acceptance and Use of Technology (UTAUT) model within a South African higher education setting and to clarify the factors that are influencing students’ intentions to make use of two digital technologies: an eBook and SLMS. 738 ICT students completed a questionnaire to gauge their responses to Performance expectancy (PEx), Effort expectancy (EfEx), Facilitating conditions …


Grant Tenure To Tenure, Joshua Tryon May 2018

Grant Tenure To Tenure, Joshua Tryon

Emerging Writers

Finalist in the 2018 Emerging Writers Academic Category. This essay argues for the protection of tenure for University educators.


A Course Project Designed To Aid Students’ Understanding Of The Structure Of Advertisements: An Application Of The Who Says What To Whom Over What Channel With What Effect Model, Paul J. Costanzo Jan 2018

A Course Project Designed To Aid Students’ Understanding Of The Structure Of Advertisements: An Application Of The Who Says What To Whom Over What Channel With What Effect Model, Paul J. Costanzo

Atlantic Marketing Journal

The author describes a project using a classic communication and attitude-change model and explains how instructors teaching a course in promotional strategy, advertising, or integrated marketing communications can use it to help students better understand the critical elements of an effective advertisement. The author provides an overview of the research on the classic model and describes how the model is still useful today. One benefit for the instructor who adopts this project in their respective course is that students are required to synthesize knowledge of the model with information provided in the current advertising literature and then use this knowledge …


At What Cost? The Ethics Of Student Debt, Kevin D. Gecowets Jun 2017

At What Cost? The Ethics Of Student Debt, Kevin D. Gecowets

The Siegel Institute Journal of Applied Ethics

This paper summarizes recent research into the cost of higher education, and specifically the effects of growing student debt loads. It explores the utility of debt related to access to degree programs, entry into the job market, and economic impact in later life. It is not an economic analysis of higher education financing, but a consideration of the costs and benefits of education financing today. The central ethical consideration of “who benefits” applied to the current state of play in higher education financing leads to the questions: With constantly rising debt loads for individual students and the general population, is …