Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Education

Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia Dec 2016

Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia

Journal of Cybersecurity Education, Research and Practice

The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …


“You Can Count On It!” Using County Auditors' Data For Marketing Research Group Projects: A Case Study, Julie M. Szendrey Oct 2016

“You Can Count On It!” Using County Auditors' Data For Marketing Research Group Projects: A Case Study, Julie M. Szendrey

Atlantic Marketing Journal

The purpose of this research was to develop an efficient and effective process for marketing educators to use in the teaching of an undergraduate marketing research course. Instructors should consider the use of readily available auditors’ data for pedagogical usage in a semester-long courses. The research process posed by Neuman (2007) was followed in the development of a course assignment utilizing the use of auditors’ data. Students analyzed and presented their project results using SPSS software tools learned during the course and through videos provided by the American Marketing Association certificate offerings. Final group presentations also included the discussion of …


Turning Guest Speakers' Visits Into Active Learning Opportunities, Vassilis Dalakas Oct 2016

Turning Guest Speakers' Visits Into Active Learning Opportunities, Vassilis Dalakas

Atlantic Marketing Journal

While guest speakers have a lot to offer, the traditional format of their visits to marketing classes may hinder student engagement. This paper describes an idea used in marketing classes intended to increase active learning and to maximize impact of guest speakers’ visits. It involves creating assignments for the students to prepare prior to a speaker’s visit. As a result, the students end up preparing thoughtful questions, they are engaged in their discussion with the speaker, and they make a more conscious effort to link course material to the insight from the speaker.


Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia Oct 2016

Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia

KSU Proceedings on Cybersecurity Education, Research and Practice

The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …


Teaching Security Of Internet Of Things In Using Raspberrypi, Oliver Nichols, Li Yang, Xiaohong Yuan Oct 2016

Teaching Security Of Internet Of Things In Using Raspberrypi, Oliver Nichols, Li Yang, Xiaohong Yuan

KSU Proceedings on Cybersecurity Education, Research and Practice

The Internet of Things (IoTs) is becoming a reality in today’s society. The IoTs can find its application in multiple domains including healthcare, critical infrastructure, transportation, and home and personal use. It is important to teach students importance and techniques that are essential in protecting IoTs. We design a series of hands-on labs in a smart home setting, which can exercise attack and protection of IoTs. Our hands-on labs use a Raspberry Pi and several diverse smart things that communicate through Z-Wave technology. Using this environment, students can operate a home automation system and learn security concepts by performing these …


Teaching Static Call Analysis To Detect Anomalous Software Behavior, Jordan Shropshire, Philip Menard Oct 2016

Teaching Static Call Analysis To Detect Anomalous Software Behavior, Jordan Shropshire, Philip Menard

KSU Proceedings on Cybersecurity Education, Research and Practice

Malicious code detection is a critical part of any cyber security operation. Typically, the behavior of normal applications is modeled so that deviations from normal behavior can be identified. There are multiple approach to modeling good behavior but the most common approach is to observe applications’ system call activity. System calls are messages passed between user space applications and their underlying operating systems. The detection of irregular system call activity signals the presence of malicious software behavior. This method of malware-detection has been used successfully for almost two decades. Unfortunately, it can be difficult to cover this concept at the …


2016 - The Twenty-First Annual Symposium Of Student Scholars Apr 2016

2016 - The Twenty-First Annual Symposium Of Student Scholars

Symposium of Student Scholars Program Books

The full program book from the Twenty-first Annual Symposium of Student Scholars, held on April 21, 2016. Includes abstracts from the presentations and posters.


Transforming Services: A Year Of Investigating User-Centered Marketing Strategies And Information Literacy Programming For Graduate Students, Lisa M. Martin, Porcia N. Vaughn Apr 2016

Transforming Services: A Year Of Investigating User-Centered Marketing Strategies And Information Literacy Programming For Graduate Students, Lisa M. Martin, Porcia N. Vaughn

Transforming Libraries for Graduate Students

The University of Houston (UH) is a Carnegie-designated Tier One public research university that strives to serve more than 7,000 graduate and professional students. Graduate students have been historically underserved by the UH Libraries, however, in recent years the Libraries have made expanding services to graduate students a strategic initiative. UH Library administration has designated targeting specific user groups, including graduate students, with revitalized marketing and innovative programing a high priority.

Two project teams were established within the Liaison Services Department to investigate the role of liaison services in graduate education. Project Team 1 investigated best practices for marketing existing …


Perceptions Of Information And Communications Technology (Ict) For Instructional Delivery At A University: From Technophobic To Technologically Savvy, Desmond Wesley Govender Dr, Lockias Chitanana Mr Apr 2016

Perceptions Of Information And Communications Technology (Ict) For Instructional Delivery At A University: From Technophobic To Technologically Savvy, Desmond Wesley Govender Dr, Lockias Chitanana Mr

The African Journal of Information Systems

Changing academics’ perceptions of information and communications technology (ICT) in developing countries has always been a challenge. A university in Zimbawe has witnessed an about-turn in lecturers’ perceptions and beliefs about technology, from being negative (technophobic) to positive (technologically savvy) users of technology. This paper reports on the interplay of factors that resulted in lecturers’ buy-in to the use of e-learning as a mode of instructional delivery. The study employed actor network theory (ANT) as both a methodological and analytical framework to trace the trajectory of the e-learning programme at this university. The conspicuous actors were followed using questionnaires, participant …


The Role Of Educational Technology In Design And Delivery Of Curricula Programmes: A Case Of Steps At A University Of Technology, Patient Rambe Dr Apr 2016

The Role Of Educational Technology In Design And Delivery Of Curricula Programmes: A Case Of Steps At A University Of Technology, Patient Rambe Dr

The African Journal of Information Systems

While Universities of Technologies (UoTs) regard the adoption of educational technology for the creation of effective learning environments as one of their defining features, there is limited research on these universities’ innovative use of technologies to transform their curricula design and delivery. This research explores the extent to which educational technology has been integrated into the implementation of new and recurriculated educational programmes under the Strategic Transformation of Educational Programmes and Structures (STEPS) at a UoT. The research employed document analysis and interview data from middle level managers (Deans), curriculum designers and educational technologists. The findings suggest that, except for …