Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Information Security (97)
- Business (89)
- Technology and Innovation (84)
- Management Information Systems (82)
- Education (13)
-
- Engineering (8)
- Curriculum and Instruction (7)
- Business Law, Public Responsibility, and Ethics (3)
- Computer Engineering (3)
- Engineering Education (3)
- Psychology (3)
- Social and Behavioral Sciences (3)
- Educational Methods (2)
- Electrical and Computer Engineering (2)
- Higher Education (2)
- Law (2)
- Management Sciences and Quantitative Methods (2)
- Accounting (1)
- Adult and Continuing Education (1)
- Applied Behavior Analysis (1)
- Automotive Engineering (1)
- Business Administration, Management, and Operations (1)
- Business Analytics (1)
- Civil and Environmental Engineering (1)
- Cognitive Psychology (1)
- Computer and Systems Architecture (1)
- Digital Communications and Networking (1)
- Educational Administration and Supervision (1)
Articles 91 - 98 of 98
Full-Text Articles in Physical Sciences and Mathematics
Towards An In-Depth Understanding Of Deep Packet Inspection Using A Suite Of Industrial Control Systems Protocol Packets, Guillermo A. Francia Iii
Towards An In-Depth Understanding Of Deep Packet Inspection Using A Suite Of Industrial Control Systems Protocol Packets, Guillermo A. Francia Iii
KSU Proceedings on Cybersecurity Education, Research and Practice
Industrial control systems (ICS) are increasingly at risk and vulnerable to internal and external threats. These systems are integral part of our nation’s critical infrastructures. Consequently, a successful cyberattack on one of these could present disastrous consequences to human life and property as well. It is imperative that cybersecurity professionals gain a good understanding of these systems particularly in the area of communication protocols. Traditional Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are made to encapsulate some of these ICS protocols which may enable malicious payload to get through the network firewall and thus, gain entry into the …
Investigating Cyberbullying In Social Media: The Case Of Twitter, Xin Tian
Investigating Cyberbullying In Social Media: The Case Of Twitter, Xin Tian
KSU Proceedings on Cybersecurity Education, Research and Practice
Social media has profoundly changed how we interact with one another and the world around us. Recent research indicates that more and more people are using social media sites such as Facebook and Twitter for a significant portion of their day for various reasons such as making new friends, socializing with old friends, receiving information, and entertaining themselves. However, social media has also caused some problems. One of the problems is called social media cyberbullying which has developed over time as new social media technologies have developed over time. Social media cyberbullying has received increasing attention in recent years as …
Towards A Model Of Senior Citizens’ Motivation To Pursue Cybersecurity Awareness Training: Lecture-Based Vs. Video-Cases Training, Carlene G. Blackwood-Brown
Towards A Model Of Senior Citizens’ Motivation To Pursue Cybersecurity Awareness Training: Lecture-Based Vs. Video-Cases Training, Carlene G. Blackwood-Brown
KSU Proceedings on Cybersecurity Education, Research and Practice
Cyber-attacks on Internet users, and in particular senior citizens, who have limited awareness of cybersecurity, have caused billions of dollars in losses annually. To mitigate the effects of cyber-attacks, several researchers have recommended that the cybersecurity awareness levels of Internet users be increased. Cybersecurity awareness training programs are most effective when they involve training that focus on making users more aware so that they can identify cyber-attacks as well as mitigate the effects of the cyber-attacks when they use the Internet. However, it is unclear about what motivates Internet users to pursue cybersecurity awareness training so that they can identify …
Towards A Comparison Of Training Methodologies On Employee’S Cybersecurity Countermeasures Awareness And Skills In Traditional Vs. Socio-Technical Programs, Jodi Goode
KSU Proceedings on Cybersecurity Education, Research and Practice
Organizations, which have established an effective technical layer of security, continue to experience difficulties triggered by cyber threats. Ultimately, the cybersecurity posture of an organization depends on appropriate actions taken by employees whose naive cybersecurity practices have been found to represent 72% to 95% of cybersecurity threats and vulnerabilities. However, employees cannot be held responsible for cybersecurity practices if they are not provided the education and training to acquire skills which allow for identification of security threats along with the proper course of action. This work-in-progress study addresses the first phase of a larger project to empirically assess if there …
Code Metrics For Predicting Risk Levels Of Android Applications, Akond A. Rahman
Code Metrics For Predicting Risk Levels Of Android Applications, Akond A. Rahman
KSU Proceedings on Cybersecurity Education, Research and Practice
Android applications pose security and privacy risks for end-users. Early prediction of risk levels that are associated with Android applications can help Android developers is releasing less risky applications to end-users. Researchers have showed how code metrics can be used as early predictors of failure prone software components. Whether or not code metrics can be used to predict risk levels of Android applications requires systematic exploration. The goal of this paper is to aid Android application developers in assessing the risk associated with developed Android applications by identifying code metrics that can be used as predictors to predict two levels …
Developing And Using Evidence-Based E-Learning Videos For Cybersecurity Education, Wu He, Xin Tian, Mohd Anwar
Developing And Using Evidence-Based E-Learning Videos For Cybersecurity Education, Wu He, Xin Tian, Mohd Anwar
KSU Proceedings on Cybersecurity Education, Research and Practice
To help people improve their knowledge and security self-efficacy in dealing with malware attacks that are relevant and meaningful to their organizations, we recently developed over 30 e-learning videos based on the major types of malware attacks we captured using the state-of-the-art anti-malware solution. The preliminary evaluation results of the videos are quite positive and indicate that these evidence-based e-learning videos have great potential to increase users’ security self-efficacy.
Training Wheels: A New Approach To Teaching Mobile Device Security, Philip Menard, Jordan Shropshire
Training Wheels: A New Approach To Teaching Mobile Device Security, Philip Menard, Jordan Shropshire
KSU Proceedings on Cybersecurity Education, Research and Practice
Despite massive investments in cyber security education, training, and awareness programs, most people retain unsafe mobile computing habits. They not only jeopardize their own data, but also risk the security of their associated organizations. It appears that conventional training programs are not ingraining sound security practices on trainees. This research questions the efficacy of legacy SETA frameworks and proposes a new cyber training tool for mobile devices. The tool is called Training Wheels. Training Wheels stands a number of cyber security training practices on their heads: instead of using punitive methods of reinforcement it provides rewards to encourage good behavior, …
Teaching Static Call Analysis To Detect Anomalous Software Behavior, Jordan Shropshire, Philip Menard
Teaching Static Call Analysis To Detect Anomalous Software Behavior, Jordan Shropshire, Philip Menard
KSU Proceedings on Cybersecurity Education, Research and Practice
Malicious code detection is a critical part of any cyber security operation. Typically, the behavior of normal applications is modeled so that deviations from normal behavior can be identified. There are multiple approach to modeling good behavior but the most common approach is to observe applications’ system call activity. System calls are messages passed between user space applications and their underlying operating systems. The detection of irregular system call activity signals the presence of malicious software behavior. This method of malware-detection has been used successfully for almost two decades. Unfortunately, it can be difficult to cover this concept at the …