Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cybersecurity (3)
- Higher education institutions (2)
- Literature reviews (2)
- Online learning (2)
- Articulation (1)
-
- Big data (1)
- Challenges and solutions (1)
- Collaboration (1)
- Collaborative learning (1)
- Colleges and universities (1)
- Computer security (1)
- Curriculum design (1)
- Cybersecurity careers (1)
- Diversity (1)
- E-learning (1)
- Government employees (1)
- Guided inquiry collaborative learning (1)
- Hands on (1)
- IT governance (1)
- Inclusionary project planning (1)
- Information security (1)
- Information technology (1)
- Information technology management (1)
- Infrastructure (1)
- Internet security (1)
- K-12 cybersecurity education (1)
- Learning assessment (1)
- Machine learning (1)
- Non-degree training (1)
- Organizational value (1)
- Publication
- Publication Type
Articles 1 - 13 of 13
Full-Text Articles in Education
What Students Have To Say On Data Privacy For Educational Technology, Stephanie Choi
What Students Have To Say On Data Privacy For Educational Technology, Stephanie Choi
Cybersecurity Undergraduate Research Showcase
The literature on data privacy in terms of educational technology is a growing area of study. The perspective of educators has been captured extensively. However, the literature on students’ perspectives is missing, which is what we explore in this paper. We use a pragmatic qualitative approach with an experiential lens to capture students’ attitudes towards data privacy in terms of educational technology. We identified preliminary, common themes that appeared in the survey responses. The paper concludes by calling for more research on how students perceive data privacy in terms of educational technology.
Improving Educational Delivery And Content In Juvenile Detention Centers, Yomna Elmousalami
Improving Educational Delivery And Content In Juvenile Detention Centers, Yomna Elmousalami
Undergraduate Research Symposium
Students in juvenile detention centers have the greatest need to receive improvements in educational delivery and content; however, they are one of the “truly disadvantaged” populations in terms of receiving those improvements. This work presents a qualitative data analysis based on a focus group meeting with stakeholders at a local Juvenile Detention Center. The current educational system in juvenile detention centers is based on paper worksheets, single-room style teaching methods, outdated technology, and a shortage of textbooks and teachers. In addition, detained students typically have behavioral challenges that are deemed "undesired" in society. As a result, many students miss classes …
The Underrepresentation Of Black Females In Cybersecurity, Makendra Latrice Crosby
The Underrepresentation Of Black Females In Cybersecurity, Makendra Latrice Crosby
Cybersecurity Undergraduate Research Showcase
The significance of cybersecurity methods, strategies, and programs in protecting computers and electronic devices is crucial throughout the technological infrastructure. Despite the considerable growth in the cybersecurity field and its expansive workforce, there exists a notable underrepresentation, specifically among Black/African American females. This study examines the barriers hindering the inclusion of Black women in the cybersecurity workforce such as socioeconomic factors, limited educational access, biases, and workplace culture. The urgency of addressing these challenges calls for solutions such as education programs, mentorship initiatives, creating inclusive workplace environments, and promoting advocacy and increased awareness within the cybersecurity field. Additionally, this paper …
How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim
How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim
Cybersecurity Undergraduate Research Showcase
The powers of OpenAI's groundbreaking AI language model, ChatGPT, startled millions of users when it was released in November. But for many, the tool's ability to further accomplish the goals of evil actors swiftly replaced their initial excitement with significant concerns. ChatGPT gives malicious actors additional ways to possibly compromise sophisticated cybersecurity software. Leaders in a sector that is currently suffering from a 38% global spike in data breaches in 2022 must acknowledge the rising influence of AI and take appropriate action. Cybercriminals are writing more complex and focused business email compromise (BEC) and other phishing emails with the assistance …
Ict Security Tools And Techniques Among Higher Education Institutions: A Critical Review, Miko Nuñez, Xavier-Lewis Palmer, Lucas Potter, Chris Jordan Aliac, Lemuel Clark Velasco
Ict Security Tools And Techniques Among Higher Education Institutions: A Critical Review, Miko Nuñez, Xavier-Lewis Palmer, Lucas Potter, Chris Jordan Aliac, Lemuel Clark Velasco
Electrical & Computer Engineering Faculty Publications
Higher education institutions (HEIs) are increasingly relying on digital technologies for classroom and organizational management, but this puts them at higher risk for information and communication (ICT security attacks. Recent studies show that HEIs have experienced more security breaches in ICT security composed of both cybersecurity an information security. A literature review was conducted to identify common ICT security practices in HEIs over the last decade. 11 journal articles were profiled and analyzed, revealing threats to HEIs’ security and protective measures in terms of organizational security, technological security, physical security, and standards and frameworks. Security tools and techniques were grouped …
Attitudes About Cybersecurity Articulation Agreements And Transfer Students: A Statewide Survey Of Faculty Members And Advisors, Brian K. Payne, Tracy Vandecar-Burdin, Daniela Cigularova
Attitudes About Cybersecurity Articulation Agreements And Transfer Students: A Statewide Survey Of Faculty Members And Advisors, Brian K. Payne, Tracy Vandecar-Burdin, Daniela Cigularova
Sociology & Criminal Justice Faculty Publications
In this study, cybersecurity faculty and academic advisors from community colleges and 4-year universities in the southeast region of the United States completed a survey assessing attitudes about and support for articulation agreements and related transfer policies. Hypothesizing that professional structures shape attitudes and experiences, the researchers conducted an exploratory quantitative study with primarily descriptive analyses. The results reveal differences in attitudes between community college and 4-year stakeholders and between faculty and academic advisors. The results of this study are discussed in relation to faculty and advisor training and communication.
A Look Into Increasing The Number Of Veterans And Former Government Employees Converting To Career And Technical Cybersecurity Teachers, Vukica M. Jovanovic, Michael Anthony Crespo, Drew E. Brown, Deborah Marshall, Otilia Popescu, Murat Kuzlu, Petros J. Katsioloudis, Linda Vahala
A Look Into Increasing The Number Of Veterans And Former Government Employees Converting To Career And Technical Cybersecurity Teachers, Vukica M. Jovanovic, Michael Anthony Crespo, Drew E. Brown, Deborah Marshall, Otilia Popescu, Murat Kuzlu, Petros J. Katsioloudis, Linda Vahala
Engineering Technology Faculty Publications
The current state of technology with recent explosions in the digital processing of paperwork, computer networking use, and online and virtual approaches to areas, which until very recently had traditional and non-computerized ways of operating, led to a steady increase in the demand for jobs in the area of computer science and cybersecurity. The education system, the pipeline for the incoming workforce, needs to keep up with this tremendous pace in technology and the job market. The current K-12 school system has been extensively challenged to fill out necessary positions in order to address the increasing need for programs that …
Promoting Diversity In Teaching Cybersecurity Through Gicl, Yuming He, Wu He, Xiaohong Yuan, Li Yang, Theo Bastiaens (Ed.)
Promoting Diversity In Teaching Cybersecurity Through Gicl, Yuming He, Wu He, Xiaohong Yuan, Li Yang, Theo Bastiaens (Ed.)
Information Technology & Decision Sciences Faculty Publications
In summary, it is necessary to develop a diverse group of K-12 students’ interest and skills in cybersecurity as cyber threats continue to grow. Evidence shows that educating the next generation of cyber workers is a crucial job that should begin in elementary school. To ensure the effectiveness of cybersecurity education and equity at the K-12 level, teachers must create thoughtful plans for considering communities’ interests and needs, and to continually reconsider what’s working and how to adjust our strategies, approaches, design, and research plan to meet their specific needs, challenges, and strengths, particularly with students from under-served and underrepresented …
Deapsecure Computational Training For Cybersecurity Students: Improvements, Mid-Stage Evaluation, And Lessons Learned, Wirawan Purwanto, Yuming He, Jewel Ossom, Qiao Zhang, Liuwan Zhu, Karina Arcaute, Masha Sosonkina, Hongyi Wu
Deapsecure Computational Training For Cybersecurity Students: Improvements, Mid-Stage Evaluation, And Lessons Learned, Wirawan Purwanto, Yuming He, Jewel Ossom, Qiao Zhang, Liuwan Zhu, Karina Arcaute, Masha Sosonkina, Hongyi Wu
University Administration Publications
DeapSECURE is a non-degree computational training program that provides a solid high-performance computing (HPC) and big-data foundation for cybersecurity students. DeapSECURE consists of six modules covering a broad spectrum of topics such as HPC platforms, big-data analytics, machine learning, privacy-preserving methods, and parallel programming. In the second year of this program, to improve the learning experience, we implemented a number of changes, such as grouping modules into two broad categories, "big-data" and "HPC"; creating a single cybersecurity storyline across the modules; and introducing post-workshop (optional) "hackshops." Two major goals of these changes are, firstly, to effectively engage students to maintain …
Exploring Cybersecurity Education At The K-12 Level, Weiru Chen, Yuming He, Xin Tian, Wu He, E. Langran (Ed.), D. Rutledge (Ed.)
Exploring Cybersecurity Education At The K-12 Level, Weiru Chen, Yuming He, Xin Tian, Wu He, E. Langran (Ed.), D. Rutledge (Ed.)
Information Technology & Decision Sciences Faculty Publications
K-12 cybersecurity education is receiving growing attention with the growing number of cyberattacks and a shortage of cybersecurity professionals. However, there are many barriers for teachers to implement effective cybersecurity education in formal classroom environments. This study conducts a systematic literature review to examine the current state-of-the-art on K-12 cybersecurity education. Through the systematic literature review, we identified 20 closely relevant papers and recognized that a well-designed curriculum in cybersecurity education at the K-12 level is strongly needed to motivate students to pursue cybersecurity pathways and careers. The challenge and suggestions of curriculum design, teaching strategy, and learning assessment are …
Cybersecurity Education Through Technological And Engineering Literacy Standards, Philip A. Reed, Steven A. Barbato
Cybersecurity Education Through Technological And Engineering Literacy Standards, Philip A. Reed, Steven A. Barbato
STEMPS Faculty Publications
No abstract provided.
Earning A Seat At The Table: How It Departments Can Partner In Organizational Change And Innovation, Robert L. Moore, Nathan Johnson
Earning A Seat At The Table: How It Departments Can Partner In Organizational Change And Innovation, Robert L. Moore, Nathan Johnson
STEMPS Faculty Publications
Few would argue that the information technology department (ITD) is not an essential part of an organization. It is hard to envision a project that does not need the support of the ITD. Despite this importance, the ITD is not always involved in the management of projects. Often, the ITD is brought into the project late in the planning and development process. In many cases, the inclusion of the ITD in an advanced project stage can result in project failure where early involvement could have prevented it. Why is it that ITDs, while clearly a vital part of project implementation, …
Security Risks And Protection In Online Learning: A Survey, Yong Chen, Wu He
Security Risks And Protection In Online Learning: A Survey, Yong Chen, Wu He
Distance Learning Faculty & Staff Publications
This paper describes a survey of online learning which attempts to determine online learning providers' awareness of potential security risks and the protection measures that will diminish them. The authors use a combination of two methods: blog mining and a traditional literature search. The findings indicate that, while scholars have identified diverse security risks and have proposed solutions to mitigate the security threats in online learning, bloggers have not discussed security in online learning with great frequency. The differences shown in the survey results generated by the two different methods confirm that online learning providers and practitioners have not considered …