Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps),
2023
Southern Methodist University
Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn
SMU Data Science Review
Today, there is an increased risk to data privacy and information security due to cyberattacks that compromise data reliability and accessibility. New machine learning models are needed to detect and prevent these cyberattacks. One application of these models is cybersecurity threat detection and prevention systems that can create a baseline of a network's traffic patterns to detect anomalies without needing pre-labeled data; thus, enabling the identification of abnormal network events as threats. This research explored algorithms that can help automate anomaly detection on an enterprise network using Canadian Institute for Cybersecurity data. This study demonstrates that Neural Networks with Bayesian …
Analysis Of First-Time Completion In The Field Service Environment,
2023
Southern Methodist University
Analysis Of First-Time Completion In The Field Service Environment, Gavin Rick, Scott Englerth, Marc Carter, Hayley Horn
SMU Data Science Review
First-time completion is an important measure of service quality and efficiency in the field service industry. Customers call upon field service providers to repair their equipment in a timely manner so it can be put back into service for their business demands. Responsiveness can be measured through first-time completion and is defined as completing the repair on the first visit of a service call. This research is exploring the first-time completion in the forklift service industry. This research found the primary factors that impact first-time completion percentage in this industry include parts on hand, parts backorder process, technician experience, and …
Boyer Model Of Scholarship In Practice,
2023
Illinois State University
Boyer Model Of Scholarship In Practice, Tony Shannon
International Journal for Business Education
The four types of scholarship in the Boyer framework are relevant to teaching or training at any level of post-secondary education, both directly in terms of knowledge and indirectly through the impact of enthusiasm [2,9]. This outline is a simplified introduction to the salient features of the system, with some general examples of what each type could mean in practice. The boundaries of the types are fluid and can overlap in theory and in practice [4,6].
Report Of The Independent Review Of Freedom Of Speech In Australian Higher Education Providers,
2023
Illinois State University
Report Of The Independent Review Of Freedom Of Speech In Australian Higher Education Providers, Tony Shannon
International Journal for Business Education
This summary does not claim to be preferred in any way to a reading of the complete report with its succinct and simple recommendations, including “A Model Code for the Protection of Freedom of Speech and Academic Freedom in Australian Higher Education Providers”. The review is an important document for all institutions dedicated to teaching, particularly at the tertiary level, in having a shared understanding of freedom of speech within an institution.
The Review involved a two-stage consultation process with universities and other stakeholders between November 2018 and March 2019, and it also considered recent pertinent debates in Canada, New …
Summary Of And Comments On Strengthening Skills: Expert Review Of Australia's Vocational Education And Training System,
2023
Illinois State University
Summary Of And Comments On Strengthening Skills: Expert Review Of Australia's Vocational Education And Training System, Steven Joyce
International Journal for Business Education
The following extracts have been compiled in this order to give a feeling for the total report (168 pages). The order of what follows is quite different from Joyce. It has been summarised this way for the benefit of readers who are not involved in the VET sector on a day-to-day basis. Most of the data are from 2017-2018. The summary is by Tony Shannon; it has no official status. To give perspective to this important report, the summary and comments are in three parts, namely,
- A general view of Australian Vocational Education & Training
- Recommendations – road map
- Some …
Lumina Review Of Learning Frameworks: Tools For Building A Better Educational Experience,
2023
Illinois State University
Lumina Review Of Learning Frameworks: Tools For Building A Better Educational Experience, Tony Shannon
International Journal for Business Education
A reason for summarising this document (Travers et al, 2019) is that the Lumina Foundation in the USA is one of the few educational think-tanks which seems to be aware of the effects on the workplace from the exponentially accelerating growth in soft-computing, especially artificial intelligence, which will be seen in the next fifteen years (cf. Jankowski and Marshall. 2017).
How Does Bpm Maturity Affect Process Performance?,
2023
California State University, San Bernardino
How Does Bpm Maturity Affect Process Performance?
Communications of the IIMA
Organizations are increasingly confronted with the consequences of globalization, digitalization and disruptive (technological) developments. The constantly changing and dynamic social, economic, and political environment as well as the public opinion require public organizations to deliver effective and efficient services. These trends also apply to Dutch housing associations who are working together with suppliers in the process of property maintenance to increase quality and to reduce costs. Business Process Management (BPM) has the prospect of enhancing the performance of maintenance processes. Previous studies have confirmed a positive relationship between BPM-maturity and Process performance. However, in different contexts this relation is sometimes …
Cyber Threat Intelligence Discovery Using Machine Learning From The Dark Web,
2023
California State University, San Bernardino
Cyber Threat Intelligence Discovery Using Machine Learning From The Dark Web
Communications of the IIMA
Cyber threat intelligence (CTI) is an actionable information or insight an organization uses to understand potential vulnerabilities it does have and threats it is facing. One important CTI for proactive cyber defense is exploit type with possible values system, web, network, website or Mobile. This study compares the performance of machine learning algorithms in predicating exploit types using form posts in the dark web, which is a semi- structured dataset collected from dark web. The study uses the CRISP data science approach. The results of the study show that machine learning algorithms which are function-based including support vector machine and …
Privacy And Security Information Awareness And Disclosure Of Private Information By Users Of Online Social Media In The Ibadan Metropolis, Nigeria,
2023
University of Ibadan, Nigeria
Privacy And Security Information Awareness And Disclosure Of Private Information By Users Of Online Social Media In The Ibadan Metropolis, Nigeria, Funmilola Olubunmi Omotayo, Joy Oluwabukola Olayiwola
The African Journal of Information Systems
The purpose of this paper is to investigate information privacy and security awareness among online social media (OSM) users in the Ibadan metropolis, Nigeria. Building upon the social exchange theory, some factors that could influence the disclosure of private information on social media were identified. Findings from the analysis of data of 255 respondents revealed that most were aware of information privacy and security measures available on OSM, and the risks associated with the disclosure of private information on OSM. Privacy and security awareness, the perception of benefits associated with the use of OSM, the perception of risks associated with …
National Digital Infrastructure And India’S Healthcare Sector: Physician’S Perspectives,
2023
Indian Institute of Management Ahmedabad
National Digital Infrastructure And India’S Healthcare Sector: Physician’S Perspectives, Rajesh Chandwani, Saneesh Edacherian, Mukesh Sud
The Qualitative Report
Patient-centric digital infrastructure can potentially enhance the efficiency of healthcare systems. However, even in developed nations, evidence suggests low adoption rates for such infrastructure and lack of support from clinicians is considered as one of the most critical hindering factors. In this study, we examine physicians' perceptions of the proposed large-scale information technology initiative in India that aims to transform the health sector and provide universal health coverage to all residents of India. We employed the information ecology lens to understand the broader changes in the healthcare system that could result from the initiative. We use focus group discussion and …
The Futures Of Learning 3: What Kind Of Pedagogies For The 21st Century?,
2023
National University of Ireland, Galway
The Futures Of Learning 3: What Kind Of Pedagogies For The 21st Century?, Cynthia Luna Scott
International Journal for Business Education
Since the emergence of a global movement that calls for a new model of learning for the twenty first century, it has been argued that formal education must be transformed to enable new forms of learning that are needed to tackle complex global challenges. Literature on this topic offers compelling arguments for transforming pedagogy to better support acquisition of twenty-first century skills.
Reflective Journals,
2023
CESA Dean
Reflective Journals, Tony Shannon Am
International Journal for Business Education
A reflective journal helps to think honestly about one’s actual thinking. This can be uncomfortable at first!
What Kind Of Pedagogies For The 21st Century?,
2023
Illinois State University
What Kind Of Pedagogies For The 21st Century?, Cynthia Luna Scott
International Journal for Business Education
Since the emergence of a global movement that calls for a new model of learning for the twenty first century, it has been argued that formal education must be transformed to enable new forms of learning that are needed to tackle complex global challenges.
Uk Universities Face Their Toughest Test,
2023
Global Education Editor, The Financial Times
Uk Universities Face Their Toughest Test, Andrew Jack
International Journal for Business Education
The School of Oriental and African Studies seemed a symbol of stability when it celebrated its centenary in 2016 by taking over and renovating the University of London’s imposing Senate House building in central London. It was a bold move to lure the best students. But just three years later its future has become much shakier, with its undergraduate intake down 40 percent and a £7m operating deficit. “The competition is brutal,” says Professor Stephen Hopgood, Soas’s international pro-director. “We are small and specialist, and if undergraduate fees are cut, it’s going to be very hard for an institution of …
Reinventing Cybersecurity Internships During The Covid-19 Pandemic,
2023
University of Southern Maine
Reinventing Cybersecurity Internships During The Covid-19 Pandemic, Lori L. Sussman
Journal of Cybersecurity Education, Research and Practice
The Cybersecurity Ambassador Program provides professional skills training for emerging cybersecurity professionals remotely. The goal is to reach out to underrepresented populations who may use Federal Work-Study (FWS) or grant sponsored internships to participate. Cybersecurity Ambassadors (CAs) develop skills that will serve them well as cybersecurity workers prepared to do research, lead multidisciplinary, technical teams, and educate stakeholders and community members. CAP also reinforces leadership skills so that the next generation of cybersecurity professionals becomes a sustainable source of management talent for the program and profession. The remote curriculum innovatively builds non-technical professional skills (communications, teamwork, leadership) for cybersecurity research …
Risk Perceptions About Personal Internet-Of-Things: Research Directions From A Multi-Panel Delphi Study,
2023
University of Alabama at Birmingham
Risk Perceptions About Personal Internet-Of-Things: Research Directions From A Multi-Panel Delphi Study, Paul M. Di Gangi, Barbara A. Wech, Jennifer D. Hamrick, James L. Worrell, Samuel H. Goh
Journal of Cybersecurity Education, Research and Practice
Internet-of-Things (IoT) research has primarily focused on identifying IoT devices' organizational risks with little attention to consumer perceptions about IoT device risks. The purpose of this study is to understand consumer risk perceptions for personal IoT devices and translate these perceptions into guidance for future research directions. We conduct a sequential, mixed-methods study using multi-panel Delphi and thematic analysis techniques to understand consumer risk perceptions. The results identify four themes focused on data exposure and user experiences within IoT devices. Our thematic analysis also identified several emerging risks associated with the evolution of IoT device functionality and its potential positioning …
Cybersecurity Continuity Risks: Lessons Learned From The Covid-19 Pandemic,
2023
University of West Florida
Cybersecurity Continuity Risks: Lessons Learned From The Covid-19 Pandemic, Tyler Fezzey, John H. Batchelor, Gerald F. Burch, Randall Reid
Journal of Cybersecurity Education, Research and Practice
The scope and breadth of the COVID-19 pandemic were unprecedented. This is especially true for business continuity and the related area of cybersecurity. Historically, business continuity and cybersecurity are viewed and researched as separate fields. This paper synthesizes the two disciplines as one, thus pointing out the need to address both topics simultaneously. This study identifies blind spots experienced by businesses as they navigated through the difficult time of the pandemic by using data collected during the height of the COVID-19 pandemic. One major shortcoming was that most continuity and cybersecurity plans focused on single-axis threats. The COVID-19 pandemic resulted …
Using Accounting Software For Teaching And Learning In A Second-Year Accounting Course,
2023
University of KwaZulu-Natal
Using Accounting Software For Teaching And Learning In A Second-Year Accounting Course, Lesley J. Stainbank Prof, Thanesha Reddy Jankeeparsad, Aarthi Algu
The African Journal of Information Systems
The aim of this paper is to report students’ perceptions on whether the use of accounting software enhances their understanding of the accounting cycle, and improves their information technology skills. Kolb’s experiential learning cycle is used to argue that offering a concrete learning experience increases effective learning. The study uses survey research to determine students’ perspectives of the usefulness of using accounting software in enhancing their understanding of the accounting cycle in a real business environment. The results show that students perceived the accounting example they used in the accounting software training to have some benefits in helping their understanding …
The Career Project: An Intervention To Facilitate Career Development,
2023
University of Houston
The Career Project: An Intervention To Facilitate Career Development, Dale E. Rude, Marina Sebastijanovic, Jamie K. Belinne, Troy D. Hopkins
Southwestern Business Administration Journal
Students face substantial challenges in readying for their professional lives. They must select a field, find a suitable job within that field, and lay a foundation for their career. To aid with this, we present the career project, an efficient career- and self-exploration assignment. The project comprises a resume assessment, identifying short-term and long-term career goals, backup plans, personal strengths and selling points, conducting organizational research, an informational interview with someone in their desired field, and a market assessment by a knowledgeable professional. We tested the project efficacy with 803 students (two treatment groups and two controls) during an ‘Introduction …
Revisiting Cybersecurity Awareness In The Midst Of Disruptions,
2023
Center for Educational and Instructional Technology Research Center (CEITR) / School of Advanced Studies / University of Phoenix
Revisiting Cybersecurity Awareness In The Midst Of Disruptions, Avideh Sadaghiani-Tabrizi
International Journal for Business Education
The awareness of cybersecurity and knowledge about risks from a variety of threats, which present harm or steal private information in internetworking could help in mitigation of vulnerabilities to risks of threats in safeguarding information from malware and bots. Revisiting cybersecurity awareness of every member and evaluation of organization’s posture might help to protect sensitive or private information from a network of computers, working together and forming into botnets. The purpose of the qualitative case study narrative was to explore prospects for integrating cybersecurity education into elementary school children’s curriculum through interviews of elementary schoolteachers, IT experts, and parents to …