Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Higher Education (40)
- Physical Sciences and Mathematics (39)
- Computer Sciences (38)
- Information Security (27)
- Business (20)
-
- Technology and Innovation (15)
- Social and Behavioral Sciences (14)
- Curriculum and Instruction (13)
- Engineering (12)
- Management Information Systems (12)
- Other Education (9)
- Arts and Humanities (8)
- Educational Technology (7)
- Science and Mathematics Education (7)
- Educational Methods (6)
- History (6)
- Law (6)
- Public Affairs, Public Policy and Public Administration (6)
- Educational Assessment, Evaluation, and Research (5)
- Online and Distance Education (5)
- Disability and Equity in Education (4)
- Educational Leadership (4)
- Secondary Education (4)
- Teacher Education and Professional Development (4)
- Vocational Education (4)
- Aerospace Engineering (3)
- Artificial Intelligence and Robotics (3)
- Aviation (3)
- Aviation and Space Education (3)
- Institution
-
- Kennesaw State University (18)
- The University of Maine (7)
- Kansas State University Libraries (6)
- Old Dominion University (6)
- City University of New York (CUNY) (3)
-
- Embry-Riddle Aeronautical University (3)
- Georgia Southern University (3)
- Liberty University (3)
- Brigham Young University (2)
- Fort Hays State University (2)
- Louisiana State University (2)
- Sacred Heart University (2)
- Walden University (2)
- Air Force Institute of Technology (1)
- Boise State University (1)
- California Polytechnic State University, San Luis Obispo (1)
- Cedarville University (1)
- Dakota State University (1)
- Edith Cowan University (1)
- Michigan Technological University (1)
- Nova Southeastern University (1)
- Portland State University (1)
- Purdue University (1)
- Rochester Institute of Technology (1)
- Roger Williams University (1)
- Selected Works (1)
- Singapore Management University (1)
- Taylor University (1)
- University of Texas Rio Grande Valley (1)
- Valparaiso University (1)
- Publication Year
- Publication
-
- Journal of Cybersecurity Education, Research and Practice (18)
- General University of Maine Publications (7)
- Doctoral Dissertations and Projects (3)
- NPP eBooks (3)
- Seek (3)
-
- Theses and Dissertations (3)
- Applied Aviation Sciences - Daytona Beach (2)
- Electrical & Computer Engineering Faculty Publications (2)
- Engineering Technology Faculty Publications (2)
- Publications and Research (2)
- School of Computer Science & Engineering Faculty Publications (2)
- Walden Dissertations and Doctoral Studies (2)
- A Few Things You Should Know This Week (1)
- AFIT Documents (1)
- Advanced Education Programs Faculty Publications (1)
- Alumni Publications (1)
- CCE Theses and Dissertations (1)
- Cyber Security Capstone Research Project Reports (1)
- Dissertations, Master's Theses and Master's Reports (1)
- Educational Technology Faculty Publications and Presentations (1)
- Electronic Theses and Dissertations (1)
- Journal of Science Education for Students with Disabilities (1)
- Journalism (1)
- Kelly Heider (1)
- LSU Doctoral Dissertations (1)
- LSU Master's Theses (1)
- Leadership Education Capstones (1)
- Life of the Law School (1993- ) (1)
- Masters Theses & Doctoral Dissertations (1)
- My News (2014-2020) (1)
- Publication Type
Articles 1 - 30 of 77
Full-Text Articles in Education
An Analysis And Ontology Of Teaching Methods In Cybersecurity Education, Sarah Buckley
An Analysis And Ontology Of Teaching Methods In Cybersecurity Education, Sarah Buckley
LSU Master's Theses
The growing cybersecurity workforce gap underscores the urgent need to address deficiencies in cybersecurity education: the current education system is not producing competent cybersecurity professionals, and current efforts are not informing the non-technical general public of basic cybersecurity practices. We argue that this gap is compounded by a fundamental disconnect between cybersecurity education literature and established education theory. Our research addresses this issue by examining the alignment of cybersecurity education literature concerning educational methods and tools with education literature.
In our research, we endeavor to bridge this gap by critically analyzing the alignment of cybersecurity education literature with education theory. …
A Pragmatic Approach To Investigating The Digital Existence Of Food Bank Users, Yaprak Dalat Ward Dr., James Ward Dr., Li-Jen Lester Dr.
A Pragmatic Approach To Investigating The Digital Existence Of Food Bank Users, Yaprak Dalat Ward Dr., James Ward Dr., Li-Jen Lester Dr.
SACAD: John Heinrichs Scholarly and Creative Activity Days
This study investigated the digital existence of the food bank users in a university town in Texas, and subsequently, aligned with the research's pragmatic focus, the researchers designed a training model for these food bank users. Two research questions guided the study: 1) What are the digital existence levels of the food bank users; and 2) what training model would best serve these food bank users? Data were collected by means of a survey from 230 individual food bank users representing households. Additional data included observations and conversations with food bank staff, and documents and materials from the site which …
Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger
Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger
Journal of Cybersecurity Education, Research and Practice
This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through mentorship, collaboration, skill preparation, and other activities and touch points to increase students’ sense of belonging and connectedness in the cybersecurity profession. The goal of the project was focused on developing diverse, educated, and skilled cybersecurity personnel for employment within local industry and government to help curtail the current regional cybersecurity workforce gap that is emblematic of the lack of qualified cybersecurity personnel that presently exists nationwide. Emphasis throughout the project …
A Pragmatic Approach To Investigating The Digital Existence Of Food Bank Users, Yaprak Dalat Ward, James Ward, Li-Jen Lester
A Pragmatic Approach To Investigating The Digital Existence Of Food Bank Users, Yaprak Dalat Ward, James Ward, Li-Jen Lester
Advanced Education Programs Faculty Publications
This study investigated the digital existence of the food bank users in a university town in Texas, and subsequently, aligned with the research's pragmatic focus, the researchers designed a training model for these food bank users. Two research questions guided the study: What are the digital existence levels of the food bank users, and what training model would best serve these food bank users? Data were collected by means of a survey from 230 individual food bank users representing households. Additional data included observations and conversations with food bank staff, and documents and materials from the site which provided deeper …
Cybercrime Victimization: Online Routine Behaviors, Guardianship, And Identity Theft Victimization In A Nationally Reflective Sample, Ifeoluwa Stella Elegbe
Cybercrime Victimization: Online Routine Behaviors, Guardianship, And Identity Theft Victimization In A Nationally Reflective Sample, Ifeoluwa Stella Elegbe
Electronic Theses and Dissertations
In this digital era, cybercrime victimization has emerged as a significant issue, with identity theft being one of the most prevalent forms. This study examines the relationship between online routine behaviors, guardianship, demographics, and identity theft victimization in a nationally representative sample of U.S. adults utilizing routine activities theory (RAT) as a conceptual
framework. The research applies statistical methods such as descriptive statistics, correlation analysis, and logistic regression models to examine theoretically oriented hypotheses. The
hypotheses suggest connections between different online habitual behaviors, steps taken to
protect oneself, demographic characteristics, and the extent to which one has been a victim …
A Systematic Review Of K-12 Cybersecurity Education Around The World, Ahmed Ibrahim, Marnie Mckee, Leslie F. Sikos, Nicola F. Johnson
A Systematic Review Of K-12 Cybersecurity Education Around The World, Ahmed Ibrahim, Marnie Mckee, Leslie F. Sikos, Nicola F. Johnson
Research outputs 2022 to 2026
This paper presents a systematic review of K-12 cybersecurity education literature from around the world. 24 academic papers dated from 2013-2023 were eligible for inclusion in the literature established within the research protocol. An additional 19 gray literature sources comprised the total. A range of recurring common topics deemed as aspects of cybersecurity behavior or practice were identified. A variety of cybersecurity competencies and skills are needed for K-12 students to apply their knowledge. As may be expected to be the case with interdisciplinary fields, studies are inherently unclear in the use of their terminology, and this is compounded in …
Different Visions From Biosview: A Brief Report, Lucas N. Potter, Xavier-Lewis Palmer
Different Visions From Biosview: A Brief Report, Lucas N. Potter, Xavier-Lewis Palmer
Electrical & Computer Engineering Faculty Publications
In this collaborative research endeavor at the intersection of biological safety and cybersecurity for BiosView labs, the authors highlight their engagement with a diverse student cohort. The chapter delves into the motivation behind collaborations extending beyond traditional academic research environments, emphasizing inclusivity. The meticulous examination of student demographics, including gender, self-reported ethnicity, and national origin, is detailed in the methodology. A student-centric approach is central to the exploration, focusing on aligning teaching and management styles with unique student needs. The chapter elaborates on effective teaching methodologies and management practices tailored for BiosView labs. A dedicated section emphasizes the purpose of …
Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen
Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen
Journal of Cybersecurity Education, Research and Practice
Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and ethics, cybersecurity can foster diversity among audiences with varying educational backgrounds, thereby cultivating a richer and more resilient security landscape. A more diverse cybersecurity workforce can provide a broader range of perspectives, experiences, and skills to address the complex and ever-evolving threats of the digital age. The research focuses on enhancing cybersecurity education …
A Comparative Analysis Of Models Of Cybersecurity In Louisiana Public School Systems, Bonnie B. Chelette
A Comparative Analysis Of Models Of Cybersecurity In Louisiana Public School Systems, Bonnie B. Chelette
LSU Doctoral Dissertations
K-12 schools in Louisiana face unique cybersecurity challenges due to the state's high poverty rate, resource constraints, infrastructure weaknesses, and vulnerability to natural disasters. Public school systems in Louisiana have been particularly vulnerable to these attacks, with incidents of cyberattacks tripling in 2020 alone. The Louisiana Department of Education (LDOE) has implemented several cybersecurity initiatives, including the Louisiana Cybersecurity Commission and the Louisiana Cybersecurity Information Sharing and Analysis Organization (LaCISO). However, there is limited research on the effectiveness of these initiatives and cybersecurity models in Louisiana public schools. This study aims to address this gap in understanding by conducting a …
Connections Newsletter, October 19, 2023, Ums Information Technology Services
Connections Newsletter, October 19, 2023, Ums Information Technology Services
General University of Maine Publications
No abstract provided.
Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd
Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd
Journal of Cybersecurity Education, Research and Practice
This paper should be of interest to the readers of this journal because it addresses a subject that has received little scholarly attention; namely, local government cybersecurity. The U.S. has over 90,000 units of local government, of which almost 39,000 are “general purpose” units (i.e., municipalities, counties, towns and townships). On average, these governments do not practice cybersecurity effectively (Norris, et al., 2019 and 2020). One possible reason is that they do not adopt and/or implement highly recommended cybersecurity policies. In this paper, we examine local government adoption or lack of adoption of cybersecurity policies using data from three surveys. …
Integrating Certifications Into The Cybersecurity College Curriculum: The Efficacy Of Education With Certifications To Increase The Cybersecurity Workforce, Binh Tran, Karen C. Benson, Lorraine Jonassen
Integrating Certifications Into The Cybersecurity College Curriculum: The Efficacy Of Education With Certifications To Increase The Cybersecurity Workforce, Binh Tran, Karen C. Benson, Lorraine Jonassen
Journal of Cybersecurity Education, Research and Practice
One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An un-tapped resource to combat these attacks lies in the students of the secondary educational system. Necessary in the cybersecurity education is a 3-tiered approach to quickly escalate the student into a workplace-ready graduate. The analogy used is a three-legged-stool, where curriculum content, hands-on skills, and certifications are equal instruments in the edification of the cybersecurity student. This paper endeavors to delve into the 3rd leg of …
Cybersecurity Challenges And Awareness Of The Multi-Generational Learners In Nepal, Raj Kumar Dhungana, Lina Gurung Dr, Hem Poudyal
Cybersecurity Challenges And Awareness Of The Multi-Generational Learners In Nepal, Raj Kumar Dhungana, Lina Gurung Dr, Hem Poudyal
Journal of Cybersecurity Education, Research and Practice
Increased exposure to technologies has lately emerged as one of the everyday realities of digital natives, especially K-12 students, and teachers, the digital immigrants. Protection from cybersecurity risks in digital learning spaces is a human right, but students are increasingly exposed to high-risk cyberspace without time to cope with cybersecurity risks. This study, using a survey (N-891 students and 157 teachers) and in-depth interviews (27 students and 14 teachers), described the students' cybersecurity-related experiences and challenges in Nepal. This study revealed that the school’s cybersecurity support system is poor and teachers has very low awareness and competencies to protect students …
Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas
Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas
Journal of Cybersecurity Education, Research and Practice
The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two programs offer a required course about terrorism. Given the fluid nature of terrorism and its threat to national infrastructure, the omission is concerning. It is recommended that NSA-certified cybersecurity programs begin implementing educational content that aim to teach about this emerging crime and justice issue. One suggestion is to embrace the …
The Afit Engineer, Volume 5, Issue 3, Graduate School Of Engineering And Management, Air Force Institute Of Technology
The Afit Engineer, Volume 5, Issue 3, Graduate School Of Engineering And Management, Air Force Institute Of Technology
AFIT Documents
This issue of The AFIT ENgineer has a special extended section devoted to AFIT's Cyber Education program. The section includes two student-authored research briefs.
Also:
- Moving AFIT's Education Mission Forward
- Hypersonic Short Course Hosted at AFIT
- Faculty Academic Promotions
- Two AFIT material science articles featured on journal covers.
Law School News: Rwu Alumni Named To Pbn's 2023 40 Under Forty List 7/5/2023, Stacey Pacheco
Law School News: Rwu Alumni Named To Pbn's 2023 40 Under Forty List 7/5/2023, Stacey Pacheco
Life of the Law School (1993- )
No abstract provided.
Sociocultural Barriers For Female Participation In Stem: A Case Of Saudi Women In Cybersecurity, Alanoud Aljuaid, Xiang Michelle Liu
Sociocultural Barriers For Female Participation In Stem: A Case Of Saudi Women In Cybersecurity, Alanoud Aljuaid, Xiang Michelle Liu
Journal of Cybersecurity Education, Research and Practice
The participation of women in Science, Technology, Engineering, and Mathematics (STEM) workforces is overwhelmingly low as compared to their male counterparts. The low uptake of cybersecurity careers has been documented in the previous studies conducted in the contexts of the West and Eastern worlds. However, most of the past studies mainly covered the Western world leaving more knowledge gaps in the context of Middle Eastern countries such as Saudi Arabia. Thus, to fill the existing knowledge gaps, the current study focused on women in Saudi Arabia. The aim of the study was to investigate the factors behind the underrepresentation of …
The Effect Of Cybersecurity Training On Government Employee’S Knowledge Of Cybersecurity Issues And Practices, Juan Jaime Saldana Ii
The Effect Of Cybersecurity Training On Government Employee’S Knowledge Of Cybersecurity Issues And Practices, Juan Jaime Saldana Ii
Theses and Dissertations
There is an ever-pressing need for cybersecurity awareness and implementation of learning strategies in the workplace to mitigate the increased threat posed by cyber-attacks and exacerbated by an untrained workforce. The lack of cybersecurity knowledge amongst government employees has increased to critical levels due to the amount of sensitive information their agencies are responsible for. The digital compromise of a government entity often leads to a compromise of constituent data along with the disruption of public services (Axelrod, 2019; Yazdanpanahi, 2021). The need for awareness is further complicated by agencies looking to cater to a digital culture looking for a …
Five Things You Should Know This Week, Georgia Southern University
Five Things You Should Know This Week, Georgia Southern University
A Few Things You Should Know This Week
Celebrate University Awards of Excellence and Years of Service Recognition on Friday
USG required cybersecurity training due by Friday
12th Annual Georgia Legal Food Frenzy is underway
GS Behavioral Assessment Team (BAT) is available to identify resources and appropriate interventions
Help University Communications and Marketing highlight graduating students
Today begins Georgia Southern’s first Faculty & Staff Wellness Week
The Importance Of Data Privacy And Security During Emergency Remote Learning, Emma Antobam-Ntekudzi
The Importance Of Data Privacy And Security During Emergency Remote Learning, Emma Antobam-Ntekudzi
Publications and Research
The COVID-19 pandemic forever changed the world. The virus’ rapid spread forced federal and local governments to enact quarantine mandates. On March 11, 2020, the Center for Disease Control and Prevention (CDC) (2022) announced COVID-19 as a pandemic. Two days later the United States declared an official nationwide emergency. Institutions were required to shut down and persons deemed non-essential participated in quarantine. Remote working became the standard, thus affecting all aspects of individual lives and institutions, especially education. Primarily in-person universities and colleges across the world scrambled to address the COVID-19 health concerns, comply with local shutdown rules, and attempt …
Ict Security Tools And Techniques Among Higher Education Institutions: A Critical Review, Miko Nuñez, Xavier-Lewis Palmer, Lucas Potter, Chris Jordan Aliac, Lemuel Clark Velasco
Ict Security Tools And Techniques Among Higher Education Institutions: A Critical Review, Miko Nuñez, Xavier-Lewis Palmer, Lucas Potter, Chris Jordan Aliac, Lemuel Clark Velasco
Electrical & Computer Engineering Faculty Publications
Higher education institutions (HEIs) are increasingly relying on digital technologies for classroom and organizational management, but this puts them at higher risk for information and communication (ICT security attacks. Recent studies show that HEIs have experienced more security breaches in ICT security composed of both cybersecurity an information security. A literature review was conducted to identify common ICT security practices in HEIs over the last decade. 11 journal articles were profiled and analyzed, revealing threats to HEIs’ security and protective measures in terms of organizational security, technological security, physical security, and standards and frameworks. Security tools and techniques were grouped …
Exploring Different Mediums For Teaching Programming And Cybersecurity In Primary And Secondary Schools, Andrew R. Youngstrom
Exploring Different Mediums For Teaching Programming And Cybersecurity In Primary And Secondary Schools, Andrew R. Youngstrom
Dissertations, Master's Theses and Master's Reports
Cybersecurity and programming are becoming more and more prominent in today’s world. It is beneficial to begin teaching these topics to students at a younger age. Additionally, we see students in primary and secondary schools struggling to maintain focus in class as attention spans shrink. This paper looks at different drone models to see if any of them could be sufficient solutions to be implemented into primary and secondary schools to teach cybersecurity and programming topics to students. Besides teaching capabilities, drones must also be affordable for institutions and simple enough to construct, configure, and operate so that a teacher …
Important Brightspace Security Incident Update, Ums Information Technology Services
Important Brightspace Security Incident Update, Ums Information Technology Services
General University of Maine Publications
No abstract provided.
The Minority In The Minority, Black Women In Computer Science Fields: A Phenomenological Study, Blanche' D. Anderson
The Minority In The Minority, Black Women In Computer Science Fields: A Phenomenological Study, Blanche' D. Anderson
Doctoral Dissertations and Projects
The purpose of this transcendental phenomenological study was to describe the lived experiences of Black women with a bachelor’s, master’s, or doctoral degree in computer science, currently employed in the United States. The theory guiding this study was Krumboltz’s social learning theory of career decision-making, as it provides a foundation for understanding how a combination of factors leads to an individual’s educational and occupational preferences and skills. This qualitative study answered the following central research question: What are the lived experiences of Black women with a bachelor’s, master’s, or doctoral degree in computer science, currently employed in the United States? …
Brightspace Security Incident Final Report, Ums Information Technology Services
Brightspace Security Incident Final Report, Ums Information Technology Services
General University of Maine Publications
No abstract provided.
Connections Newsletter, October 7, 2022, Ums Information Technology Services
Connections Newsletter, October 7, 2022, Ums Information Technology Services
General University of Maine Publications
No abstract provided.
Cybersecurity Educational Resources For K-12, Debra Bowen, James Jaurez, Nancy Jones, William Reid, Christopher Simpson
Cybersecurity Educational Resources For K-12, Debra Bowen, James Jaurez, Nancy Jones, William Reid, Christopher Simpson
Journal of Cybersecurity Education, Research and Practice
There are many resources to guide successful K-12 cybersecurity education. The objective of these resources is to prepare skilled and ethical cybersecurity students at the earliest level to meet the demands of higher-level programs. The goal of this article is to provide, as a starting point, a list of as many currently popular K-12 educational resources as possible. The resources provided are broken into five categories: 1) Career Information, 2) Curriculum, 3) Competitions, 4) CyberCamps, and 5) Labs and Gaming. Each resource listed has a link, the K-12 levels that are supported, whether the resource is free or has a …
Assessing The Practical Cybersecurity Skills Gained Through Criminal Justice Academic Programs To Benefit Security Operations Centers (Socs), Lucy Tsado, Jung Seob "Scott" Kim
Assessing The Practical Cybersecurity Skills Gained Through Criminal Justice Academic Programs To Benefit Security Operations Centers (Socs), Lucy Tsado, Jung Seob "Scott" Kim
Journal of Cybersecurity Education, Research and Practice
Private-sector and public-sector organizations have increasingly built specific business units for securing company assets, reputation, and lives, known as security operations centers (SOCs). Depending on the organization, these centers may also be referred to as global security operations centers, cybersecurity operations centers, fusion centers, and corporate command centers, among many other names. The concept of centralized function within an organization to improve an organization’s security posture has attracted both the government and the private sectors to either build their own SOCs or hire third-party SOC companies.
In this article, the need for a multidisciplinary approach to cybersecurity education at colleges …
Behind The Code: Researchers Tackle The New World Of Cybersecurity, Jennifer Tidball
Behind The Code: Researchers Tackle The New World Of Cybersecurity, Jennifer Tidball
Seek
k-state.edu/seek 29 Kansas State University cybersecurity researchers want you to know the difference between the stereotype of cybersecurity and the reality of it. The stereotype: Cyberattacks are committed by hooded hackers cracking code to infiltrate our security systems. The reality: Cyberattacks certainly can happen that way, but it’s much more likely to come in the form of vulnerable and outdated hardware and software, social engineering, phishing scams and ransomware. That reality can be a pretty scary place. An outdated piece of software can make an autonomous vehicle susceptible to cyberattacks. Clever social engineering can cause an unknowing employee to provide …
Removing The Veil: Shining Light On The Lack Of Inclusivity In Cybersecurity Education For Students With Disabilities, Felicia Hellems, Sajal Bhatia
Removing The Veil: Shining Light On The Lack Of Inclusivity In Cybersecurity Education For Students With Disabilities, Felicia Hellems, Sajal Bhatia
School of Computer Science & Engineering Faculty Publications
There are currently over one billion people living with some form of disability worldwide. The continuous increase in new technologies in today's society comes with an increased risk in security. A fundamental knowledge of cybersecurity should be a basic right available to all users of technology. A review of literature in the fields of cybersecurity, STEM, and computer science (CS) has revealed existent gaps regarding educational methods for teaching cybersecurity to students with disabilities (SWD's). To date, SWD's are largely left without equitable access to cybersecurity education. Our goal is to identify current educational methods being used to teach SWD's …