Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Education
Using Case Studies To Teach Cybersecurity Courses, Yu Cai
Using Case Studies To Teach Cybersecurity Courses, Yu Cai
Journal of Cybersecurity Education, Research and Practice
This paper introduces a holistic and case-analysis teaching model by integrating case studies into cybersecurity courses. The proposed model starts by analyzing real-world cyber breaches. Students look into the details of these attacks and learn how these attacks took place from the beginning to the end. During the process of case analysis, a list of security topics reflecting different aspects of these breaches is introduced. Through guided in-class discussion and hands-on lab assignments, student learning in lecture will be reinforced. Overall, the entire cybersecurity course is driven by case studies. The proposed model is great for teaching cybersecurity. First, the …
Code4her Spring 2018, Rebeccah Knoop
Code4her Spring 2018, Rebeccah Knoop
Honors Projects
CODE4her is a mentorship program with a goal of sparking interest in computer science organized by the BGSU Women in Computing (BGWIC) student organization. Participation is open to middle school girls (grades 5-8), and participants are paired with BGWIC members who serve as mentors.
Cybersecurity In The Classroom: Bridging The Gap Between Computer Access And Online Safety, Andrew Malecki
Cybersecurity In The Classroom: Bridging The Gap Between Computer Access And Online Safety, Andrew Malecki
Cyber Security Capstone Research Project Reports
According to ISACA, there will be a global shortage of 2 million cybersecurity professionals worldwide by 2019. Additionally, according to Experian Data Breach Resolution, as much as 80% of all network breaches can be traced to employee negligence. These problems will not solve themselves, and they likewise won’t improve without drastic action. An effort needs to be made to help direct interested and qualified individuals to the field of cybersecurity to move toward closing this gap. Moreover, steps need to be made to better inform the public of general safety measures while online, including the safeguarding of sensitive information.
A …
Model Ai Assignments 2018, Todd W. Neller, Zack Butler, Nate Derbinsky, Heidi Furey, Fred Martin, Michael Guerzhoy, Ariel Anders, Joshua Eckroth
Model Ai Assignments 2018, Todd W. Neller, Zack Butler, Nate Derbinsky, Heidi Furey, Fred Martin, Michael Guerzhoy, Ariel Anders, Joshua Eckroth
Computer Science Faculty Publications
The Model AI Assignments session seeks to gather and disseminate the best assignment designs of the Artificial Intelligence (AI) Education community. Recognizing that assignments form the core of student learning experience, we here present abstracts of seven AI assignments from the 2018 session that are easily adoptable, playfully engaging, and flexible for a variety of instructor needs. Assignment specifications and supporting resources may be found at http://modelai.gettysburg.edu.