Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cybersecurity (3)
- Higher education institutions (2)
- Literature reviews (2)
- Online learning (2)
- Articulation (1)
-
- Big data (1)
- Challenges and solutions (1)
- Collaboration (1)
- Collaborative learning (1)
- Colleges and universities (1)
- Computer security (1)
- Curriculum design (1)
- Cybersecurity careers (1)
- Diversity (1)
- E-learning (1)
- Government employees (1)
- Guided inquiry collaborative learning (1)
- Hands on (1)
- IT governance (1)
- Inclusionary project planning (1)
- Information security (1)
- Information technology (1)
- Information technology management (1)
- Infrastructure (1)
- Internet security (1)
- K-12 cybersecurity education (1)
- Learning assessment (1)
- Machine learning (1)
- Non-degree training (1)
- Organizational value (1)
Articles 1 - 9 of 9
Full-Text Articles in Education
Ict Security Tools And Techniques Among Higher Education Institutions: A Critical Review, Miko Nuñez, Xavier-Lewis Palmer, Lucas Potter, Chris Jordan Aliac, Lemuel Clark Velasco
Ict Security Tools And Techniques Among Higher Education Institutions: A Critical Review, Miko Nuñez, Xavier-Lewis Palmer, Lucas Potter, Chris Jordan Aliac, Lemuel Clark Velasco
Electrical & Computer Engineering Faculty Publications
Higher education institutions (HEIs) are increasingly relying on digital technologies for classroom and organizational management, but this puts them at higher risk for information and communication (ICT security attacks. Recent studies show that HEIs have experienced more security breaches in ICT security composed of both cybersecurity an information security. A literature review was conducted to identify common ICT security practices in HEIs over the last decade. 11 journal articles were profiled and analyzed, revealing threats to HEIs’ security and protective measures in terms of organizational security, technological security, physical security, and standards and frameworks. Security tools and techniques were grouped …
Attitudes About Cybersecurity Articulation Agreements And Transfer Students: A Statewide Survey Of Faculty Members And Advisors, Brian K. Payne, Tracy Vandecar-Burdin, Daniela Cigularova
Attitudes About Cybersecurity Articulation Agreements And Transfer Students: A Statewide Survey Of Faculty Members And Advisors, Brian K. Payne, Tracy Vandecar-Burdin, Daniela Cigularova
Sociology & Criminal Justice Faculty Publications
In this study, cybersecurity faculty and academic advisors from community colleges and 4-year universities in the southeast region of the United States completed a survey assessing attitudes about and support for articulation agreements and related transfer policies. Hypothesizing that professional structures shape attitudes and experiences, the researchers conducted an exploratory quantitative study with primarily descriptive analyses. The results reveal differences in attitudes between community college and 4-year stakeholders and between faculty and academic advisors. The results of this study are discussed in relation to faculty and advisor training and communication.
A Look Into Increasing The Number Of Veterans And Former Government Employees Converting To Career And Technical Cybersecurity Teachers, Vukica M. Jovanovic, Michael Anthony Crespo, Drew E. Brown, Deborah Marshall, Otilia Popescu, Murat Kuzlu, Petros J. Katsioloudis, Linda Vahala
A Look Into Increasing The Number Of Veterans And Former Government Employees Converting To Career And Technical Cybersecurity Teachers, Vukica M. Jovanovic, Michael Anthony Crespo, Drew E. Brown, Deborah Marshall, Otilia Popescu, Murat Kuzlu, Petros J. Katsioloudis, Linda Vahala
Engineering Technology Faculty Publications
The current state of technology with recent explosions in the digital processing of paperwork, computer networking use, and online and virtual approaches to areas, which until very recently had traditional and non-computerized ways of operating, led to a steady increase in the demand for jobs in the area of computer science and cybersecurity. The education system, the pipeline for the incoming workforce, needs to keep up with this tremendous pace in technology and the job market. The current K-12 school system has been extensively challenged to fill out necessary positions in order to address the increasing need for programs that …
Exploring Cybersecurity Education At The K-12 Level, Weiru Chen, Yuming He, Xin Tian, Wu He, E. Langran (Ed.), D. Rutledge (Ed.)
Exploring Cybersecurity Education At The K-12 Level, Weiru Chen, Yuming He, Xin Tian, Wu He, E. Langran (Ed.), D. Rutledge (Ed.)
Information Technology & Decision Sciences Faculty Publications
K-12 cybersecurity education is receiving growing attention with the growing number of cyberattacks and a shortage of cybersecurity professionals. However, there are many barriers for teachers to implement effective cybersecurity education in formal classroom environments. This study conducts a systematic literature review to examine the current state-of-the-art on K-12 cybersecurity education. Through the systematic literature review, we identified 20 closely relevant papers and recognized that a well-designed curriculum in cybersecurity education at the K-12 level is strongly needed to motivate students to pursue cybersecurity pathways and careers. The challenge and suggestions of curriculum design, teaching strategy, and learning assessment are …
Promoting Diversity In Teaching Cybersecurity Through Gicl, Yuming He, Wu He, Xiaohong Yuan, Li Yang, Theo Bastiaens (Ed.)
Promoting Diversity In Teaching Cybersecurity Through Gicl, Yuming He, Wu He, Xiaohong Yuan, Li Yang, Theo Bastiaens (Ed.)
Information Technology & Decision Sciences Faculty Publications
In summary, it is necessary to develop a diverse group of K-12 students’ interest and skills in cybersecurity as cyber threats continue to grow. Evidence shows that educating the next generation of cyber workers is a crucial job that should begin in elementary school. To ensure the effectiveness of cybersecurity education and equity at the K-12 level, teachers must create thoughtful plans for considering communities’ interests and needs, and to continually reconsider what’s working and how to adjust our strategies, approaches, design, and research plan to meet their specific needs, challenges, and strengths, particularly with students from under-served and underrepresented …
Deapsecure Computational Training For Cybersecurity Students: Improvements, Mid-Stage Evaluation, And Lessons Learned, Wirawan Purwanto, Yuming He, Jewel Ossom, Qiao Zhang, Liuwan Zhu, Karina Arcaute, Masha Sosonkina, Hongyi Wu
Deapsecure Computational Training For Cybersecurity Students: Improvements, Mid-Stage Evaluation, And Lessons Learned, Wirawan Purwanto, Yuming He, Jewel Ossom, Qiao Zhang, Liuwan Zhu, Karina Arcaute, Masha Sosonkina, Hongyi Wu
University Administration Publications
DeapSECURE is a non-degree computational training program that provides a solid high-performance computing (HPC) and big-data foundation for cybersecurity students. DeapSECURE consists of six modules covering a broad spectrum of topics such as HPC platforms, big-data analytics, machine learning, privacy-preserving methods, and parallel programming. In the second year of this program, to improve the learning experience, we implemented a number of changes, such as grouping modules into two broad categories, "big-data" and "HPC"; creating a single cybersecurity storyline across the modules; and introducing post-workshop (optional) "hackshops." Two major goals of these changes are, firstly, to effectively engage students to maintain …
Cybersecurity Education Through Technological And Engineering Literacy Standards, Philip A. Reed, Steven A. Barbato
Cybersecurity Education Through Technological And Engineering Literacy Standards, Philip A. Reed, Steven A. Barbato
STEMPS Faculty Publications
No abstract provided.
Earning A Seat At The Table: How It Departments Can Partner In Organizational Change And Innovation, Robert L. Moore, Nathan Johnson
Earning A Seat At The Table: How It Departments Can Partner In Organizational Change And Innovation, Robert L. Moore, Nathan Johnson
STEMPS Faculty Publications
Few would argue that the information technology department (ITD) is not an essential part of an organization. It is hard to envision a project that does not need the support of the ITD. Despite this importance, the ITD is not always involved in the management of projects. Often, the ITD is brought into the project late in the planning and development process. In many cases, the inclusion of the ITD in an advanced project stage can result in project failure where early involvement could have prevented it. Why is it that ITDs, while clearly a vital part of project implementation, …
Security Risks And Protection In Online Learning: A Survey, Yong Chen, Wu He
Security Risks And Protection In Online Learning: A Survey, Yong Chen, Wu He
Distance Learning Faculty & Staff Publications
This paper describes a survey of online learning which attempts to determine online learning providers' awareness of potential security risks and the protection measures that will diminish them. The authors use a combination of two methods: blog mining and a traditional literature search. The findings indicate that, while scholars have identified diverse security risks and have proposed solutions to mitigate the security threats in online learning, bloggers have not discussed security in online learning with great frequency. The differences shown in the survey results generated by the two different methods confirm that online learning providers and practitioners have not considered …