Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Higher Education (5)
- Computer Sciences (4)
- Physical Sciences and Mathematics (4)
- Engineering (3)
- Curriculum and Instruction (2)
-
- Social and Behavioral Sciences (2)
- Aeronautical Vehicles (1)
- Aerospace Engineering (1)
- Aviation (1)
- Aviation and Space Education (1)
- Business (1)
- Business and Corporate Communications (1)
- Communication (1)
- Computer Engineering (1)
- Criminal Law (1)
- Educational Assessment, Evaluation, and Research (1)
- Educational Leadership (1)
- Graphic Communications (1)
- Information Security (1)
- Instructional Media Design (1)
- Journalism Studies (1)
- Law (1)
- Mass Communication (1)
- Organizational Communication (1)
- Other Aerospace Engineering (1)
- Other Education (1)
- Public Relations and Advertising (1)
- Publishing (1)
- Science and Mathematics Education (1)
- Institution
- Publication
- Publication Type
Articles 1 - 9 of 9
Full-Text Articles in Education
Cybersecurity-Beyond Data Protection, Amy J. Ramson, Ez Tech Assist
Cybersecurity-Beyond Data Protection, Amy J. Ramson, Ez Tech Assist
Open Educational Resources
No abstract provided.
Using Playable Case Studies To Influence Teen Girls' Self-Efficacy And Interest In Cybersecurity, Desiree Marie Winters
Using Playable Case Studies To Influence Teen Girls' Self-Efficacy And Interest In Cybersecurity, Desiree Marie Winters
Theses and Dissertations
Various factors dissuade women from the field of cybersecurity. Educational interventions are needed to mitigate the negative effects of stereotypes and low perceived self-efficacy and help girls gain interest in learning about cybersecurity. This thesis focuses on an intervention targeted to increase teenage girls' interest and self-efficacy in cybersecurity: the Cybermatics Playable Case Study. Findings from a mixed-methods study in which a focus group was conducted with 7 middle school girls, interviews were conducted with 2 high school girls, and pre- and post- simulation survey was collected from all 9 participants reveal tensions between enjoyment and frustration in the girls' …
Comparing Security Self-Efficacy Amongst College Freshmen And Senior, Female And Male Cybersecurity Students, Lane H. Melton
Comparing Security Self-Efficacy Amongst College Freshmen And Senior, Female And Male Cybersecurity Students, Lane H. Melton
Doctoral Dissertations and Projects
This study sought to determine if there was a difference in the self-efficacy of freshman and senior, female and male Cybersecurity students relating to threats associated with various information systems. The design for this quantitative study was non-experimental, causal-comparative and known as group comparison used to determine if there was a causal relationship between variables. The method used to make that determination utilized a self-efficacy survey developed by Phelps (2005), to identify the independent variables specific level of self-efficacy. Research was conducted at a small, southern university with total of 33 participants. Each student was enrolled in the Computer Science …
Cybersecurity Education In Utah High Schools: An Analysis And Strategy For Teacher Adoption, Cariana June Cornel
Cybersecurity Education In Utah High Schools: An Analysis And Strategy For Teacher Adoption, Cariana June Cornel
Theses and Dissertations
The IT Education Specialist for the USBE, Brandon Jacobson, stated:I feel there is a deficiency of and therefore a need to teach Cybersecurity.Cybersecurity is the “activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation” (NICE, 2018). Practicing cybersecurity can increase awareness of cybersecurity issues, such as theft of sensitive information. Current efforts, including but not limited to, cybersecurity camps, competitions, college courses, and conferences, have been created to better prepare cyber citizens nationwide for such cybersecurity occurrences. In …
Securing The Human: Broadening Diversity In Cybersecurity, Mohammad Azhar, Sajal Bhatia, Greg Gagne, Chadi Kari, Joseph Maguire, Xenia Montrouidou, Liviana Tudor, David Vosen, Timothy T. Yuen
Securing The Human: Broadening Diversity In Cybersecurity, Mohammad Azhar, Sajal Bhatia, Greg Gagne, Chadi Kari, Joseph Maguire, Xenia Montrouidou, Liviana Tudor, David Vosen, Timothy T. Yuen
School of Computer Science & Engineering Faculty Publications
Recent global demand for cybersecurity professionals is promising, with the U.S. job growth rate at 28%, three times the national average [1]. Lacking qualified applicants, many organizations struggle to fill open positions [2]. In a global survey, 2,300 security managers reported that 59% of their security positions were unfilled, although 82% anticipated cyberattacks to their systems [3]. At the same time, the cybersecurity field is broadening, not only in technical concepts but also in human factors, business processes, and international law. The field has not become culturally diversified, however. Professionals hired in 2018 included only 24.9% women, 12.3% African Americans, …
Unmanned Aircraft Systems In The Cyber Domain, Randall K. Nichols, Hans C. Mumm, Wayne D. Lonstein, Julie J.C.H. Ryan, Candice Carter, John-Paul Hood
Unmanned Aircraft Systems In The Cyber Domain, Randall K. Nichols, Hans C. Mumm, Wayne D. Lonstein, Julie J.C.H. Ryan, Candice Carter, John-Paul Hood
NPP eBooks
Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; …
Engaging High School Students Towards A Career In Cybersecurity, Caroline Rose Ster
Engaging High School Students Towards A Career In Cybersecurity, Caroline Rose Ster
Journalism
The following study acknowledges the numerous jobs available in cybersecurity and searches for ways to use public relations efforts to engage high school students towards a career in cybersecurity. While the field of cybersecurity is growing and the amount of jobs are increasing, there is currently not enough people pursuing a career in cybersecurity. This lack of professionals is dangerous because there are simply not enough professionals that are seeking to progress the field, and there’s not enough people to fight the increasing number of cyberattacks. The main goal for this project was to discover public relations tactics that can …
Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle
Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle
CCE Theses and Dissertations
Medical literature identifies a number of technology-driven improvements in disease management such as implantable medical devices (IMDs) that are a standard treatment for candidates with specific diseases. Among patients using implantable cardiac defibrillators (ICD), for example, problems and issues are being discovered faster compared to patients without monitoring, improving safety. What is not known is why patients report not feeling safer, creating a safety paradox, and why patients identify privacy concerns in ICD monitoring.
There is a major gap in the literature regarding the factors that contribute to perceived safety and privacy in remote patient monitoring (RPM). To address this …
Undergraduate Research Experience In Cybersecurity For Underrepresented Students And Students With Limited Research Opportunities, Dazhi Yang, Dianxiang Xu, Jyh-Haw Yeh, Yibo Fan
Undergraduate Research Experience In Cybersecurity For Underrepresented Students And Students With Limited Research Opportunities, Dazhi Yang, Dianxiang Xu, Jyh-Haw Yeh, Yibo Fan
Educational Technology Faculty Publications and Presentations
Undergraduate research opportunities have expanded from elite universities in the United States to universities and learning institutions of all ranks and sizes. Research studies have showed some positive outcomes of the research experience for undergraduates (REU), such as enhanced research skills and competencies. However, with the widespread implementation of REU programs across the country, there are some serious and challenging issues, such as fierce competition among students for limited participation opportunities and a overlooking of underrepresented students’ needs. This study reported a nine-week REU Site program in cybersecurity designed for underrepresented students (women and minorities) and participants from institutions with …