Compete To Learn: Toward Cybersecurity As A Sport,
2023
Florida Tech
Compete To Learn: Toward Cybersecurity As A Sport, Tj Oconnor, Dane Brown, Jasmine Jackson, Bryson Payne, Suzanna Schmeelk
Journal of Cybersecurity Education, Research and Practice
To support the workforce gap of skilled cybersecurity professionals, gamified pedagogical approaches for teaching cybersecurity have exponentially grown over the last two decades. During this same period, e-sports developed into a multi-billion dollar industry and became a staple on college campuses. In this work, we explore the opportunity to integrate e-sports and gamified cybersecurity approaches into the inaugural US Cyber Games Team. During this tenure, we learned many lessons about recruiting, assessing, and training cybersecurity teams. We share our approach, materials, and lessons learned to serve as a model for fielding amateur cybersecurity teams for future competition.
How Effective Are Seta Programs Anyway: Learning And Forgetting In Security Awareness Training,
2023
Pittsburg State University
How Effective Are Seta Programs Anyway: Learning And Forgetting In Security Awareness Training, David Sikolia, David Biros, Tianjian Zhang
Journal of Cybersecurity Education, Research and Practice
Prevalent security threats caused by human errors necessitate security education, training, and awareness (SETA) programs in organizations. Despite strong theoretical foundations in behavioral cybersecurity, field evidence on the effectiveness of SETA programs in mitigating actual threats is scarce. Specifically, with a broad range of cybersecurity knowledge crammed into in a single SETA session, it is unclear how effective different types of knowledge are in mitigating human errors in a longitudinal setting. his study investigates how knowledge gained through SETA programs affects human errors in cybersecurity to fill the longitudinal void. In a baseline experiment, we establish that SETA programs reduce …
Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces,
2023
Robert Morris University
Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces, Austin Cusak
Journal of Cybersecurity Education, Research and Practice
A qualitative case study focused on understanding what steps are needed to prepare the cybersecurity workforces of 2026-2028 to work with and against emerging technologies such as Artificial Intelligence and Machine Learning. Conducted through a workshop held in two parts at a cybersecurity education conference, findings came both from a semi-structured interview with a panel of experts as well as small workgroups of professionals answering seven scenario-based questions. Data was thematically analyzed, with major findings emerging about the need to refocus cybersecurity STEM at the middle school level with problem-based learning, the disconnects between workforce operations and cybersecurity operators, the …
Sociocultural Barriers For Female Participation In Stem: A Case Of Saudi Women In Cybersecurity,
2023
Marymount University
Sociocultural Barriers For Female Participation In Stem: A Case Of Saudi Women In Cybersecurity, Alanoud Aljuaid, Xiang Michelle Liu
Journal of Cybersecurity Education, Research and Practice
The participation of women in Science, Technology, Engineering, and Mathematics (STEM) workforces is overwhelmingly low as compared to their male counterparts. The low uptake of cybersecurity careers has been documented in the previous studies conducted in the contexts of the West and Eastern worlds. However, most of the past studies mainly covered the Western world leaving more knowledge gaps in the context of Middle Eastern countries such as Saudi Arabia. Thus, to fill the existing knowledge gaps, the current study focused on women in Saudi Arabia. The aim of the study was to investigate the factors behind the underrepresentation of …
The Power Of (Virtual) Convergence: The Unrealized Potential Of Pair Programming And Remote Work,
2023
Portland State University
The Power Of (Virtual) Convergence: The Unrealized Potential Of Pair Programming And Remote Work, Mikayla Maki
University Honors Theses
Remote work is expensive. It can lead to isolation, miscommunications, and ossified organizations. These problems occur because of a synchronicity mismatch between how we need to communicate as humans, and what today's tools are capable of. This mismatch can be solved by the adoption of remote pair programming, as exemplified by the authors work at a startup (Zed). Pair programming provides the organic, synchronous, reciprocal interaction necessary to develop the sorts of relationships that remote firms currently lack.
How Are Senior Citizens Capable To Cope With The World Of Digital Natives?,
2023
DACUM Finland, Helsinki, Finland
How Are Senior Citizens Capable To Cope With The World Of Digital Natives?, Hely Westerholm, Pirjo Takanen-Körperich
International Journal for Business Education
This study discusses the continuously growing threat to the senior citizens*), later called seniors, who can be isolated from the society if their digital competences and experiences are too poor in today’s digital world. It has been noted that to cope with one’s pursuits seniors need to actively construct and maintain their capabilities in ways that are flexible in the world of the digital devices, in response to the changing vicissitudes of life. Thus, the claim above illuminates the issue that the ability to learn from experiences is highly valued in the digital world.
The seniors are obliged to closely …
A Methodology For Context—Specific Information Systems Design Theorizing,
2023
IT-Doctoral Program, Information Systems Specialty, Addis Ababa University
A Methodology For Context—Specific Information Systems Design Theorizing, Muluneh Atinaf, Salehu Anteneh, Mesfin Kifle
The African Journal of Information Systems
Prescriptive knowledge constitutes one of the important contributions of information systems design theorizing in information systems (IS) research. Existing methods for IS design theorizing apply kernel/reference theories as sources of justificatory knowledge that serve to justify and validate the knowledge produced. This has gaps in guiding how specific contexts of stakeholders and their practices can be entertained in the design process. This research attempts to address the above void, taking a socio-technically complex agricultural extension information service and the contexts that define it into account. The research builds on an existing IS design theory framework and shows how it can …
Affective Commitment, Mentoring, And Anticipated Turnover Among Millennials,
2023
The University of Southern Mississippi
Affective Commitment, Mentoring, And Anticipated Turnover Among Millennials, Keiasha Hypolite
Dissertations
ABSTRACT
Millennials comprise the largest group of individuals in the workforce, yet organizations struggle to keep millennials engaged in the workplace. Millennials move from job to job, with an average stay at one employer between 12 and 18 months (Hechl, 2017). Researchers have reported that millennials cause the majority of turnover in the workplace. Globally, human resources practitioners experience difficulties retaining millennials (Sahraee et al., 2021). Previous studies have researched millennials, affective commitment, mentoring, and turnover. However, no known research has used all four factors to solve a global problem. In their discussion of the highly competitive labor market, Ramírez …
Selecting Appropriate Technology For An Effective Online Extension Course,
2023
Utah State University
Selecting Appropriate Technology For An Effective Online Extension Course, Paul A. Hill, Amanda D. Ali, Emy A. Swadley, Russell O. Goodrich
The Journal of Extension
Technology is a strategic asset in accomplishing the land grant mission. Selecting appropriate technology for Extension program management and delivery is essential to achieving planned outcomes, but can be challenging. This article describes the technology platforms selected by a new, legislatively funded Extension program delivering an online course in a hybrid distance-learning experience. The descriptions and application of these technology platforms will assist Extension professionals in choosing technology suitable for delivery and management of their programs as they plan for impact.
Combining Frameworks To Improve Military Health System Quality And Cybersecurity,
2023
Georgetown University
Combining Frameworks To Improve Military Health System Quality And Cybersecurity, Dr. Maureen L. Schafer, Dr. Joseph H. Schafer
Military Cyber Affairs
Existing conceptual frameworks and commercially available technology could be considered to rapidly operationalize the use of Quality Measures (QM) within military health systems (Costantino et al. 2020). Purchased healthcare as well as digital healthcare services have paved the way for data collection from multiple information systems thus offering stakeholders actionable intelligence to both guide and measure healthcare outcomes. However, the collection of data secondary to Smart Devices, disparate information systems, cloud services, and the Internet of Medical Things (IOMT) is a complication for security experts that also affect clients, stakeholders, organizations, and businesses delivering patient care. We have combined three …
The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising,
2023
Liberty University
The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob
Senior Honors Theses
Cyber-attacks have continued to become more common throughout the past century as more people are exposed to the Internet. Every year, various studies, reports, and scholarly research is done to emphasis the rapid increase of attacks. In this honors thesis, the student sought to gather further information about the rise of ransomware attacks, various cyber threats, discuss the psychological manipulation that exist, and provided the reader with an ethical complement of cyber-attacks. Additionally, case studies from previous research have been analyzed and mitigation strategies have been explained to provide the reader with practical application. This research emphasizes in on key …
A Systematic Literature Review Of Ransomware Attacks In Healthcare,
2023
California State University, San Bernardino
A Systematic Literature Review Of Ransomware Attacks In Healthcare, Jasler Klien Adlaon
Electronic Theses, Projects, and Dissertations
This culminating experience project conducted a Systematic Literature Review of ransomware in the healthcare industry. Due to COVID-19, there has been an increase in ransomware attacks that took healthcare by surprise. Although ransomware is a common attack, the current healthcare infrastructure and security mechanisms could not suppress these attacks. This project identifies peer-viewed literature to answer these research questions: “What current ransomware attacks are used in healthcare systems? “What ransomware attacks are likely to appear in the future?” and “What solutions or methods have been used to prepare, prevent, and recover from these attacks?” The purpose of this research is …
Tesla Energy Division Strategic Audit,
2023
University of Nebraska-Lincoln
Tesla Energy Division Strategic Audit, Kaleb Strawhecker
Honors Theses, University of Nebraska-Lincoln
Tesla’s electric vehicle manufacturing operation is the major revenue source for the company. Tesla has established itself as a significant player amongst other automotive manufacturers, specifically in the electric vehicle sector. Many trends are favoring Tesla’s expansion. This audit takes a look at trends and changes through a PESTEL analysis along with Porter’s Five Forces. Both provide an in-depth look into what the environment around Tesla is like. Then, these are used to evaluate Tesla’s major strategies, competitive advantages, and resources it has at its disposal. Finally, the audit will address how the factors allow Tesla to take advantage of …
Organizational Inertia, Digital Capabilities, Digital Transformation, And Firm Competencies,
2023
Swiss German University
Organizational Inertia, Digital Capabilities, Digital Transformation, And Firm Competencies, Adhi Ari Utomo, Mira Maulida, Soebowo Musa
The South East Asian Journal of Management
Research Aims: This research aims to investigate the impact of organizational inertia on digital capabilities and digital transformation to optimize firm competencies.
Design/Methodology/Approach: The dataset was produced through a quantitative survey of 125 firms in Indonesia using the Structural Equation Model (SEM) to analyse the data.
Research Findings: The results of this study indicate that organizational inertia indirectly impacts firm competencies through digital capabilities and digital transformation. Organizational inertia impacts digital capabilities, not digital transformation, whereas digital capabilities impact digital transformation and a firm’s competencies.
Theoretical Contribution/Originality: This study contributes to the literatures on organizational behaviour and strategic management by …
The Influence Of Push-Pull-Mooring Effects On E-Wallet Customer Switching In Generation Z In Dki Jakarta,
2023
IPB University
The Influence Of Push-Pull-Mooring Effects On E-Wallet Customer Switching In Generation Z In Dki Jakarta, Eka Yunita, Jono Mintarto Munandar
The South East Asian Journal of Management
Research Aims: This research aims to identify the characteristics of Generation Z e-wallet customers in DKI Jakarta; analyse the effect of push-pull-mooring effects on switching intention, the moderating effect of the mooring effects on the relationship between push effects and pull effects with switching intention, and the effect of switching intention on the switching behaviour of Generation Z e-wallet customers.
Design/Methodology/Approach: There were 262 respondents, using non-probability sampling with the purposive sampling method. The data analysis technique used is descriptive analysis and SEM-PLS.
Research Findings: The results of this study indicate that the push effects do not affect switching intention. …
Performance Of Technological Startups: The Interaction Of R&D And Founding Team Human Capital,
2023
University of Wisconsin Parkside
Performance Of Technological Startups: The Interaction Of R&D And Founding Team Human Capital, Qian Ye, Weijun Zheng
Journal of Business & Entrepreneurship
This study examines the impacts of R&D on new-born startups’ revenue during the 0-3 age period, as well as investigating the moderating role of founding team human capital in the R&D-revenue relationship. The sample is from a longitudinal panel data from the Kauffman Firm Survey (KFS), including a total of 1369 technology-based startups established in year 2004 and a total of 286 founding teams. Consistent with findings of previous research, results of this study suggest that startups who engage in R&D investments and activities in gestation/initial stage of business development have significant higher likelihood of obtaining high revenue in the …
Cyberbullying: Senior Prospective Teachers’ Coping Knowledge And Strategies,
2023
Dokuz Eylul University
Cyberbullying: Senior Prospective Teachers’ Coping Knowledge And Strategies, Kürşat Arslan, İnan Aydın
Journal of Cybersecurity Education, Research and Practice
This study aimed to determine senior prospective teachers’ coping knowledge and strategies for cyberbullying in terms of demographic variables. The sample consisted of 471 prospective teachers (324 female and 147 male) studying in the 4th grade in Dokuz Eylül University Buca Education Faculty in Izmir in the 2019-2020 academic year. It was a quantitative study using a causal-comparative research design to find out whether prospective teachers’ coping knowledge differed by independent variables. The "Coping with Cyberbullying Scale" developed by Koç et al. (2016) was employed to discover prospective teachers’ coping strategies for cyberbullying. A "Personal Information" form was also prepared …
Isscm Newsletter, Spring 2023,
2023
Wright State University
Isscm Newsletter, Spring 2023, Raj Soin College Of Business, Wright State University
ISSCM Newsletters
A nine page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.
Ais Teaching Curation Project: The Introductory Course In Information Systems,
2023
California Polytechnic State University
Ais Teaching Curation Project: The Introductory Course In Information Systems, James Burleson, Teagen Nabity-Grover, Karim Jetha
IT and Supply Chain Management Faculty Publications and Presentations
The Association for Information Systems (AIS) Teaching Curation Project aims to highlight and summarize research within the association that focuses on the major courses taught in Information Systems (IS) programs. The present literature review is a companion to a curation website specific to the introductory course in IS. In this review, we identify three major themes that pervade this literature: IS program enrollment, pedagogy, and curriculum. We use these themes to structure our summary of the research on the importance of the introductory course and various approaches to instruction. These themes also provide a framework for positioning future research. For …
Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps),
2023
Southern Methodist University
Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn
SMU Data Science Review
Today, there is an increased risk to data privacy and information security due to cyberattacks that compromise data reliability and accessibility. New machine learning models are needed to detect and prevent these cyberattacks. One application of these models is cybersecurity threat detection and prevention systems that can create a baseline of a network's traffic patterns to detect anomalies without needing pre-labeled data; thus, enabling the identification of abnormal network events as threats. This research explored algorithms that can help automate anomaly detection on an enterprise network using Canadian Institute for Cybersecurity data. This study demonstrates that Neural Networks with Bayesian …
