Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

Security

Discipline
Institution
Publication Year
Publication

Articles 1 - 14 of 14

Full-Text Articles in Education

Venue Safety Strategies: Guardrails And The Line-Of-Sight Exemption, Gil Fried, Aneurin Grant Dec 2023

Venue Safety Strategies: Guardrails And The Line-Of-Sight Exemption, Gil Fried, Aneurin Grant

Journal of Applied Sport Management

This piece represents a focused article on safety issues connected to railings at sporting events and why there needs to be considerable action taken to protect fans. Specifically, the authors believe the current line-of-sight exception (minimum 26") allows for railings that are dangerously inadequate to protect fans. It is argued that if sport facility managers and or venues do not proactively address this railing height issue, then architects, building inspectors, and others should seek to change the building code to eliminate the fans continued exposure to unnecessary hazards.


Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang Nov 2023

Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang

Journal of Cybersecurity Education, Research and Practice

Recent advances in Artificial Intelligence (AI) have brought society closer to the long-held dream of creating machines to help with both common and complex tasks and functions. From recommending movies to detecting disease in its earliest stages, AI has become an aspect of daily life many people accept without scrutiny. Despite its functionality and promise, AI has inherent security risks that users should understand and programmers must be trained to address. The ICE (integrity, confidentiality, and equity) cybersecurity labs developed by a team of cybersecurity researchers addresses these vulnerabilities to AI models through a series of hands-on, inquiry-based labs. Through …


Remote Laboratory For Nuclear Security Education, Anthony R. Galindo, Craig Marianno Oct 2023

Remote Laboratory For Nuclear Security Education, Anthony R. Galindo, Craig Marianno

International Journal of Nuclear Security

Laboratory experiences for online students are very limited. To fill this gap, educators in the Department of Nuclear Engineering at Texas A&M University developed a series of radiation detection experiments for their remote students. Radiation detection is only one piece of nuclear security. The objective of the current research is to describe the development and execution of three online laboratories that investigate the basic application of physical security sensors that use light, ultrasonics, and heat to detect adversaries. This laboratory complements lecture material from the department’s Nuclear Security System and Design course. Using the Remote Desktop Application, students connect to …


Future Trends And Directions For Secure Infrastructure Architecture In The Education Sector: A Systematic Review Of Recent Evidence, Isaac Atta Senior Ampofo, Isaac Atta Junior Ampofo Jul 2023

Future Trends And Directions For Secure Infrastructure Architecture In The Education Sector: A Systematic Review Of Recent Evidence, Isaac Atta Senior Ampofo, Isaac Atta Junior Ampofo

Journal of Research Initiatives

The most efficient approach to giving large numbers of students’ access to computational resources is through a data center. A contemporary method for building the data center's computer infrastructure is the software-defined model, which enables user tasks to be processed in a reasonable amount of time and at a reasonable cost. The researcher examines potential directions and trends for a secured infrastructure design in this article. Additionally, interoperable, highly reusable modules that can include the newest trends in the education industry are made possible by cloud-based educational software. The Reference Architecture for University Education System Using AWS Services is presented …


Security Simulations In Undergraduate Education: A Review, Joseph Simpson, Aaron Brantly Jul 2022

Security Simulations In Undergraduate Education: A Review, Joseph Simpson, Aaron Brantly

Journal of Cybersecurity Education, Research and Practice

Several decades of research in simulation and gamification in higher education shows that simulations are highly effective in improving a range of outcomes for students including declarative knowledge and interest in the topic being taught. While there appears to be a broad array of options to provide education in an undergraduate setting related to security, no previous reviews have explored computer-based simulations covering all facets of security. Given the increasing importance and adoption of interdisciplinary educational programs, it is important to take stock of simulations as a tool to broaden the range of problems, perspectives, and solutions presented to students. …


Taiwanese Perceptions Of China, Taiwan, And Us Relations From 2016 To 2021, Wan-Ling Liao, Armand Christopher C. Rola Jan 2022

Taiwanese Perceptions Of China, Taiwan, And Us Relations From 2016 To 2021, Wan-Ling Liao, Armand Christopher C. Rola

Journal of Public Affairs and Development

In 2016, a dramatic shift in Taiwan's politics caught China's attention. After the inauguration of President Tsai Ing-wen, Beijing increased the pressure on Taiwan. Aside from limiting Taiwan's international space, Beijing had taken other steps. This study aims to review the policy regarding the relationship among Taiwan, the US, and China. The primary data were gathered through interviews with Taiwanese key informants of different age groups. Secondary data were gathered from official documents, online sources, journal and news articles, and books. Based on the analysis of informants' opinions on this issue, the study found that the majority of informants prefer …


Maintaining Privacy And Security In Cyberspace: What Everyone Needs To Know, Maureen Mcdermott, Jennifer L. Reeves, Gabriela Mendez, Berta Hayes Capo, Jason Karp Dec 2021

Maintaining Privacy And Security In Cyberspace: What Everyone Needs To Know, Maureen Mcdermott, Jennifer L. Reeves, Gabriela Mendez, Berta Hayes Capo, Jason Karp

FDLA Journal

The growth of technology will always outpace legal and ethical understanding concerning maintaining privacy and security in cyberspace. Remote network security breaches are a common method for taking sensitive information from companies, K-12 school districts, institutions of higher learning, and from social media accounts. Parents, university/college personnel, teachers and other adults working in the K-12 systems are held accountable to higher standards when determining levels of technology infusion especially with distance education.


On Ensuring Information Security For Institutions Of Higher Education, Хikmatilla Nigmatov, Alisher Muhammadiyev Dec 2020

On Ensuring Information Security For Institutions Of Higher Education, Хikmatilla Nigmatov, Alisher Muhammadiyev

The Light of Islam

This article is devoted to one of the most relevant and demanded topics ­ information security. One of the reasons for this is that because of the pandemic, the world’s population has switched to a digital management system through computer networks. As a result, the main part of the system of higher, secondary, and special education switched to the forms of distance learning. In this article, we tried to answer, based on scientifc research, the questions related to what standards and safeguards should be used to ensure the security of data in computer systems and networks of higher education institutions. …


Using Case Studies To Teach Cybersecurity Courses, Yu Cai Dec 2018

Using Case Studies To Teach Cybersecurity Courses, Yu Cai

Journal of Cybersecurity Education, Research and Practice

This paper introduces a holistic and case-analysis teaching model by integrating case studies into cybersecurity courses. The proposed model starts by analyzing real-world cyber breaches. Students look into the details of these attacks and learn how these attacks took place from the beginning to the end. During the process of case analysis, a list of security topics reflecting different aspects of these breaches is introduced. Through guided in-class discussion and hands-on lab assignments, student learning in lecture will be reinforced. Overall, the entire cybersecurity course is driven by case studies. The proposed model is great for teaching cybersecurity. First, the …


The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran Nov 2016

The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran

International Journal of Nuclear Security

In the emerging field of nuclear security, those responsible for education and training are constantly seeking to identify and engage with tools and approaches that provide for a constructive learning environment. In this context, this paper explores the nature and value of Tabletop exercises (TTX) and how they can be applied in the nuclear security context. On the one hand, the paper dissects the key components of the TTX and considers the broader pedagogical benefits of this teaching method. On the other hand, the paper draws lessons from the authors’ experience of running TTXs as part of nuclear security professional …


Design With Purpose, Megan Saunders May 2016

Design With Purpose, Megan Saunders

Seek

A researcher’s efforts to develop guidelines for designing the gold standard in rehabilitation centers for wounded veterans could someday save lives.


Finding The Surprise: A Case Study Of A Faculty Learning Community, Roberta M. Michel Apr 2014

Finding The Surprise: A Case Study Of A Faculty Learning Community, Roberta M. Michel

Academic Leadership Journal in Student Research

This article details a faculty learning community (FLC) that started in 2009 on the campus of a Midwestern University and has evolved into an interdisciplinary research, teaching and social community of practice and learning called SurPriSe. SurPriSe is an acronym that reflects the interest area of the FLC; Sur for surveillance, Pri for privacy, and Se for security. This case study provides understanding of the social context, the institution and the nature of encouraging established faculty to engage in new research and pedagogical interests that are interdisciplinary.


Legal And Managerial Issues In Airport Scanning, Joan Hubbard Oct 2012

Legal And Managerial Issues In Airport Scanning, Joan Hubbard

Administrative Issues Journal

After the September 11 terrorist attacks on the U.S., the National Commission on Terrorist Attacks Upon the United States recommended that The TSA and the Congress give priority attention to improving the ability of screening checkpoints to detect explosives on passengers. As the legality of the TSA’s full-body scanner program continues to be debated, the federal government is investigating the next generation of airport screening technology. The privacy debate centers on the Department of Homeland Security’s use of full-body scanners to screen passengers at the nation’s major airports.


The Evaluation Of Education Systems: Insecurity Through Testing?, Ibpp Editor Jul 2000

The Evaluation Of Education Systems: Insecurity Through Testing?, Ibpp Editor

International Bulletin of Political Psychology

This article describes some fallacies in a common approach to employing the testing of students in evaluating education systems.