Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (4)
- Information Security (4)
- Physical Sciences and Mathematics (4)
- Business (3)
- Curriculum and Instruction (3)
-
- Management Information Systems (3)
- Technology and Innovation (3)
- Information Literacy (2)
- Library and Information Science (2)
- Social and Behavioral Sciences (2)
- Anthropology (1)
- Arts and Humanities (1)
- Higher Education (1)
- Online and Distance Education (1)
- Rhetoric and Composition (1)
- Scholarly Communication (1)
- Scholarly Publishing (1)
- Secondary Education and Teaching (1)
- Teacher Education and Professional Development (1)
Articles 1 - 6 of 6
Full-Text Articles in Education
Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia
Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia
KSU Proceedings on Cybersecurity Education, Research and Practice
The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …
Teaching Security Of Internet Of Things In Using Raspberrypi, Oliver Nichols, Li Yang, Xiaohong Yuan
Teaching Security Of Internet Of Things In Using Raspberrypi, Oliver Nichols, Li Yang, Xiaohong Yuan
KSU Proceedings on Cybersecurity Education, Research and Practice
The Internet of Things (IoTs) is becoming a reality in today’s society. The IoTs can find its application in multiple domains including healthcare, critical infrastructure, transportation, and home and personal use. It is important to teach students importance and techniques that are essential in protecting IoTs. We design a series of hands-on labs in a smart home setting, which can exercise attack and protection of IoTs. Our hands-on labs use a Raspberry Pi and several diverse smart things that communicate through Z-Wave technology. Using this environment, students can operate a home automation system and learn security concepts by performing these …
Developing And Using Evidence-Based E-Learning Videos For Cybersecurity Education, Wu He, Xin Tian, Mohd Anwar
Developing And Using Evidence-Based E-Learning Videos For Cybersecurity Education, Wu He, Xin Tian, Mohd Anwar
KSU Proceedings on Cybersecurity Education, Research and Practice
To help people improve their knowledge and security self-efficacy in dealing with malware attacks that are relevant and meaningful to their organizations, we recently developed over 30 e-learning videos based on the major types of malware attacks we captured using the state-of-the-art anti-malware solution. The preliminary evaluation results of the videos are quite positive and indicate that these evidence-based e-learning videos have great potential to increase users’ security self-efficacy.
Teaching Static Call Analysis To Detect Anomalous Software Behavior, Jordan Shropshire, Philip Menard
Teaching Static Call Analysis To Detect Anomalous Software Behavior, Jordan Shropshire, Philip Menard
KSU Proceedings on Cybersecurity Education, Research and Practice
Malicious code detection is a critical part of any cyber security operation. Typically, the behavior of normal applications is modeled so that deviations from normal behavior can be identified. There are multiple approach to modeling good behavior but the most common approach is to observe applications’ system call activity. System calls are messages passed between user space applications and their underlying operating systems. The detection of irregular system call activity signals the presence of malicious software behavior. This method of malware-detection has been used successfully for almost two decades. Unfortunately, it can be difficult to cover this concept at the …
Make It Happen: How Libraries Can Start A Grassroots Campus-Wide Graduate Writing Initiative, Jen Salvo-Eaton
Make It Happen: How Libraries Can Start A Grassroots Campus-Wide Graduate Writing Initiative, Jen Salvo-Eaton
Transforming Libraries for Graduate Students
The University of Missouri-Kansas City's University Libraries played a major role in starting a campus-wide Graduate Writing Initiative at the University of Missouri-Kansas City. The Graduate Writing Initiative is a campus-wide effort to improve the process, quality, and impact of graduate student writing. Despite the challenges of reaching a graduate student population of commuters, full-time workers, parents, and online learners, UMKC Libraries helped devise ways to extend the reach of the Graduate Writing Initiative to all. Currently, UMKC Libraries remains a core service of the Graduate Writing Initiative and librarians serve on the campus advisory committee. This presentation will describe …
The Grad Commons In The Academic Library: Reimagining Collaborative Learning Spaces And Services For Graduate And Professional Students Through Participatory Design, Michael Courtney, Erika L. Jenns
The Grad Commons In The Academic Library: Reimagining Collaborative Learning Spaces And Services For Graduate And Professional Students Through Participatory Design, Michael Courtney, Erika L. Jenns
Transforming Libraries for Graduate Students
During the Fall 2013 semester, the Indiana University Libraries officially launched the Grad Commons, a flexible, multipurpose space in the heart of the Herman B Wells Library’s research collection stacks to provide graduate and professional students easy access to the information resources and subject librarian expertise vital to their research. As part of a much larger vision that has sought to fulfill user needs by reimagining conjoined library spaces such as the Learning Commons, a 24/7 technology-infused learning center where students work on class assignments from start to finish, and the Scholars’ Commons, designed to stimulate scholarly conversation, interdisciplinary exchange, …