Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Business (4)
- Physical Sciences and Mathematics (4)
- Computer Engineering (3)
- Computer Sciences (3)
- Information Security (3)
-
- Management Information Systems (3)
- Other Computer Engineering (3)
- Social and Behavioral Sciences (3)
- Technology and Innovation (3)
- Education (2)
- Electrical and Computer Engineering (2)
- Law (2)
- Cognitive Science (1)
- Communications Law (1)
- Computer Law (1)
- Computer and Systems Architecture (1)
- Computer-Aided Engineering and Design (1)
- Digital Communications and Networking (1)
- Electrical and Electronics (1)
- Electronic Devices and Semiconductor Manufacturing (1)
- Ergonomics (1)
- Industrial Engineering (1)
- Intellectual Property Law (1)
- Internet Law (1)
- Library and Information Science (1)
- Manufacturing (1)
- Materials Science and Engineering (1)
- Mechanical Engineering (1)
- Medicine and Health Sciences (1)
- Keyword
-
- Cybersecurity (2)
- 3d printing (1)
- Academic libraries (1)
- Advanced metering infrastructure (1)
- Asynchronous file transfer (1)
-
- Audits (1)
- Augmented Reality (1)
- Cellular (GSM) technology (1)
- Cognition (1)
- Constraints (1)
- Cost (1)
- Cyber policies (1)
- Cybersecurity Training and Education (1)
- Cybersecurity policies (1)
- Energy efficiency (1)
- Extended Reality (1)
- File servers (1)
- File systems (1)
- File transfer (1)
- Human-centered design (1)
- ISO (1)
- Information Security Systems (1)
- Isolated clusters (1)
- Local government (1)
- Makerspaces (1)
- Memory (1)
- Mistakes (1)
- NIST (1)
- Risk Assessment (1)
- Security Awareness Training (1)
Articles 1 - 8 of 8
Full-Text Articles in Engineering
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Journal of Cybersecurity Education, Research and Practice
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …
Survey On Wi-Fi And Cellular Communication Technology For Advanced Metering Infrastructure (Ami) In A Developing Economy, Tejumade F. Anthony, Folasade M. Dahunsi
Survey On Wi-Fi And Cellular Communication Technology For Advanced Metering Infrastructure (Ami) In A Developing Economy, Tejumade F. Anthony, Folasade M. Dahunsi
The African Journal of Information Systems
Traditional energy meters have suffered from a lack of automated analysis and inaccuracy in reading energy consumption, which has brought about smart metering systems. Developing economies such as in Africa. still experience a setback in electricity monitoring and load distribution because of existing traditional meter systems in use. Communication technologies play an important role to improve the monitoring of energy consumption and ensure a road map toward a smart grid. This paper reviews communication technologies used for Advanced Metering Infrastructure (AMI) emphasizing Wi-Fi and Cellular technologies. Metrics used to evaluate their performance include cost, energy efficiency, coverage, deployment, latency, payload, …
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Journal of Cybersecurity Education, Research and Practice
The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that this problem has not improved and nearly 44% believe it has gotten worse over the past 10 years. Threat actors are continuing to evolve their tactics, techniques, and procedures for conducting attacks on public and private targets. Education institutions and companies must adopt emerging technologies to develop security professionals and to increase cybersecurity awareness holistically. …
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Journal of Cybersecurity Education, Research and Practice
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …
Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd
Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd
Journal of Cybersecurity Education, Research and Practice
This paper should be of interest to the readers of this journal because it addresses a subject that has received little scholarly attention; namely, local government cybersecurity. The U.S. has over 90,000 units of local government, of which almost 39,000 are “general purpose” units (i.e., municipalities, counties, towns and townships). On average, these governments do not practice cybersecurity effectively (Norris, et al., 2019 and 2020). One possible reason is that they do not adopt and/or implement highly recommended cybersecurity policies. In this paper, we examine local government adoption or lack of adoption of cybersecurity policies using data from three surveys. …
Human Factors Engineering, Robert S. Keyser
Human Factors Engineering, Robert S. Keyser
KSU Distinguished Course Repository
Human Factors Engineering is a comprehensive survey of human factors theory, research, and applications which are of particular relevance to Quality and Engineering Management. Emphasis will be placed on operator constraints in the design of work processes, workplaces, and instrumentation.
Semiconductor Devices, Sheila D. Hill Pe
Semiconductor Devices, Sheila D. Hill Pe
KSU Distinguished Course Repository
3 Class Hours, 0 Laboratory Hours, 3 Credit Hours Prerequisites: CHEM 1211, CHEM 1211L, EE 1000
This course effectively applies the knowledge of chemistry and physics to understand the operating principles of various semiconductor devices. The course covers topics starting from the fundamental concepts of atomic and crystal structure, crystal growth, impurity doping and energy bands to the in-depth device operation and quantitative analysis of p-n junction diode, metal-semiconductor contacts and Schottky diode, BJTs and MOSFETs. Also fundamental operating principles of optoelectronic devices such as, LEDs and photodiodes are discussed. Simple device simulation components reinforces the understanding of various critical …
Launching A 3d Printing Program For Students: Recommendations And Best Practices For Libraries, Wilhelmina Randtke, Lee Bareford
Launching A 3d Printing Program For Students: Recommendations And Best Practices For Libraries, Wilhelmina Randtke, Lee Bareford
Georgia Library Quarterly
The Georgia Southern University Libraries launched a 3D printing program for students in July 2022. Prior to launch, library employees at two of Georgia Southern University’s campuses investigated options for implementing safe, affordable, and sustainable 3D printing in existing academic libraries without retrofitting costly ventilation systems into existing facilities. This article describes the reasons why the Georgia Southern University Libraries thought that a 3D printing program could fulfill a service need for students across university colleges and departments and outlines some of the challenges, best practices, and unique innovations that the library’s employees experienced throughout the program launch process. The …