Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

2019

Cybersecurity

Articles 1 - 9 of 9

Full-Text Articles in Education

Cybersecurity-Beyond Data Protection, Amy J. Ramson, Ez Tech Assist Oct 2019

Cybersecurity-Beyond Data Protection, Amy J. Ramson, Ez Tech Assist

Open Educational Resources

No abstract provided.


Using Playable Case Studies To Influence Teen Girls' Self-Efficacy And Interest In Cybersecurity, Desiree Marie Winters Aug 2019

Using Playable Case Studies To Influence Teen Girls' Self-Efficacy And Interest In Cybersecurity, Desiree Marie Winters

Theses and Dissertations

Various factors dissuade women from the field of cybersecurity. Educational interventions are needed to mitigate the negative effects of stereotypes and low perceived self-efficacy and help girls gain interest in learning about cybersecurity. This thesis focuses on an intervention targeted to increase teenage girls' interest and self-efficacy in cybersecurity: the Cybermatics Playable Case Study. Findings from a mixed-methods study in which a focus group was conducted with 7 middle school girls, interviews were conducted with 2 high school girls, and pre- and post- simulation survey was collected from all 9 participants reveal tensions between enjoyment and frustration in the girls' …


Comparing Security Self-Efficacy Amongst College Freshmen And Senior, Female And Male Cybersecurity Students, Lane H. Melton Aug 2019

Comparing Security Self-Efficacy Amongst College Freshmen And Senior, Female And Male Cybersecurity Students, Lane H. Melton

Doctoral Dissertations and Projects

This study sought to determine if there was a difference in the self-efficacy of freshman and senior, female and male Cybersecurity students relating to threats associated with various information systems. The design for this quantitative study was non-experimental, causal-comparative and known as group comparison used to determine if there was a causal relationship between variables. The method used to make that determination utilized a self-efficacy survey developed by Phelps (2005), to identify the independent variables specific level of self-efficacy. Research was conducted at a small, southern university with total of 33 participants. Each student was enrolled in the Computer Science …


Cybersecurity Education In Utah High Schools: An Analysis And Strategy For Teacher Adoption, Cariana June Cornel Aug 2019

Cybersecurity Education In Utah High Schools: An Analysis And Strategy For Teacher Adoption, Cariana June Cornel

Theses and Dissertations

The IT Education Specialist for the USBE, Brandon Jacobson, stated:I feel there is a deficiency of and therefore a need to teach Cybersecurity.Cybersecurity is the “activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation” (NICE, 2018). Practicing cybersecurity can increase awareness of cybersecurity issues, such as theft of sensitive information. Current efforts, including but not limited to, cybersecurity camps, competitions, college courses, and conferences, have been created to better prepare cyber citizens nationwide for such cybersecurity occurrences. In …


Securing The Human: Broadening Diversity In Cybersecurity, Mohammad Azhar, Sajal Bhatia, Greg Gagne, Chadi Kari, Joseph Maguire, Xenia Montrouidou, Liviana Tudor, David Vosen, Timothy T. Yuen Jul 2019

Securing The Human: Broadening Diversity In Cybersecurity, Mohammad Azhar, Sajal Bhatia, Greg Gagne, Chadi Kari, Joseph Maguire, Xenia Montrouidou, Liviana Tudor, David Vosen, Timothy T. Yuen

School of Computer Science & Engineering Faculty Publications

Recent global demand for cybersecurity professionals is promising, with the U.S. job growth rate at 28%, three times the national average [1]. Lacking qualified applicants, many organizations struggle to fill open positions [2]. In a global survey, 2,300 security managers reported that 59% of their security positions were unfilled, although 82% anticipated cyberattacks to their systems [3]. At the same time, the cybersecurity field is broadening, not only in technical concepts but also in human factors, business processes, and international law. The field has not become culturally diversified, however. Professionals hired in 2018 included only 24.9% women, 12.3% African Americans, …


Unmanned Aircraft Systems In The Cyber Domain, Randall K. Nichols, Hans C. Mumm, Wayne D. Lonstein, Julie J.C.H. Ryan, Candice Carter, John-Paul Hood Jul 2019

Unmanned Aircraft Systems In The Cyber Domain, Randall K. Nichols, Hans C. Mumm, Wayne D. Lonstein, Julie J.C.H. Ryan, Candice Carter, John-Paul Hood

NPP eBooks

Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; …


Engaging High School Students Towards A Career In Cybersecurity, Caroline Rose Ster Jun 2019

Engaging High School Students Towards A Career In Cybersecurity, Caroline Rose Ster

Journalism

The following study acknowledges the numerous jobs available in cybersecurity and searches for ways to use public relations efforts to engage high school students towards a career in cybersecurity. While the field of cybersecurity is growing and the amount of jobs are increasing, there is currently not enough people pursuing a career in cybersecurity. This lack of professionals is dangerous because there are simply not enough professionals that are seeking to progress the field, and there’s not enough people to fight the increasing number of cyberattacks. The main goal for this project was to discover public relations tactics that can …


Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle Jan 2019

Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle

CCE Theses and Dissertations

Medical literature identifies a number of technology-driven improvements in disease management such as implantable medical devices (IMDs) that are a standard treatment for candidates with specific diseases. Among patients using implantable cardiac defibrillators (ICD), for example, problems and issues are being discovered faster compared to patients without monitoring, improving safety. What is not known is why patients report not feeling safer, creating a safety paradox, and why patients identify privacy concerns in ICD monitoring.

There is a major gap in the literature regarding the factors that contribute to perceived safety and privacy in remote patient monitoring (RPM). To address this …


Undergraduate Research Experience In Cybersecurity For Underrepresented Students And Students With Limited Research Opportunities, Dazhi Yang, Dianxiang Xu, Jyh-Haw Yeh, Yibo Fan Jan 2019

Undergraduate Research Experience In Cybersecurity For Underrepresented Students And Students With Limited Research Opportunities, Dazhi Yang, Dianxiang Xu, Jyh-Haw Yeh, Yibo Fan

Educational Technology Faculty Publications and Presentations

Undergraduate research opportunities have expanded from elite universities in the United States to universities and learning institutions of all ranks and sizes. Research studies have showed some positive outcomes of the research experience for undergraduates (REU), such as enhanced research skills and competencies. However, with the widespread implementation of REU programs across the country, there are some serious and challenging issues, such as fierce competition among students for limited participation opportunities and a overlooking of underrepresented students’ needs. This study reported a nine-week REU Site program in cybersecurity designed for underrepresented students (women and minorities) and participants from institutions with …