Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Education

What Students Have To Say On Data Privacy For Educational Technology, Stephanie Choi Apr 2024

What Students Have To Say On Data Privacy For Educational Technology, Stephanie Choi

Cybersecurity Undergraduate Research Showcase

The literature on data privacy in terms of educational technology is a growing area of study. The perspective of educators has been captured extensively. However, the literature on students’ perspectives is missing, which is what we explore in this paper. We use a pragmatic qualitative approach with an experiential lens to capture students’ attitudes towards data privacy in terms of educational technology. We identified preliminary, common themes that appeared in the survey responses. The paper concludes by calling for more research on how students perceive data privacy in terms of educational technology.


The Security Of Deep Neural Networks, Jalaya Allen Apr 2024

The Security Of Deep Neural Networks, Jalaya Allen

Cybersecurity Undergraduate Research Showcase

Our society has transitioned from our primitive lifestyle to soon, an increasingly automatic one. That idea is further exemplified as we shift into an AI era, better known as Artificial intelligence. Artificial Intelligence is classified as computer systems that can perform tasks that typically require human intelligence. However, a common thought or question that most might have is, how is this done? How does AI process information the way we want it to and have access to so much information? AI is trained by systems called AI models. These modeling programs are trained on data to recognize patterns or make …


Analyzing The Role Of Cybersecurity In Correctional Facilities, Jaysia I. Leeheung Apr 2024

Analyzing The Role Of Cybersecurity In Correctional Facilities, Jaysia I. Leeheung

Cybersecurity Undergraduate Research Showcase

In recent years, the use of technology has evolved in correctional facilities which may result in more vulnerabilities in correctional facilities systems. This study analyzes the types of security measures used in correctional facilities to stop cyber attacks such as firewalls, artificial intelligence, and facial recognition systems. The analysis also examines new challenges correctional facilities may face in cyber security and prevention strategies that will enhance cyber protection in correctional facilities. Additionally, this analysis compares the implementation of cyber security methods between jails and prisons.


Improving Educational Delivery And Content In Juvenile Detention Centers, Yomna Elmousalami Mar 2024

Improving Educational Delivery And Content In Juvenile Detention Centers, Yomna Elmousalami

Undergraduate Research Symposium

Students in juvenile detention centers have the greatest need to receive improvements in educational delivery and content; however, they are one of the “truly disadvantaged” populations in terms of receiving those improvements. This work presents a qualitative data analysis based on a focus group meeting with stakeholders at a local Juvenile Detention Center. The current educational system in juvenile detention centers is based on paper worksheets, single-room style teaching methods, outdated technology, and a shortage of textbooks and teachers. In addition, detained students typically have behavioral challenges that are deemed "undesired" in society. As a result, many students miss classes …