Financial Characteristics Of Mobile Banking And Payment Users In The United States,
2024
University of Houston Clear Lake
Financial Characteristics Of Mobile Banking And Payment Users In The United States, Jordan Mitchell, Xiao Li, Doug Steel, Phillip Decker
Journal of Global Business Insights
This study aims to examine the personal finance characteristics of mobile banking and mobile payment users in the United States. To achieve this goal, we used the 2018 National Financial Capability Study, which surveyed over 27,000 American adults regarding their personal financial standing and behaviors. By using ordinary least squares models, our results indicated that the use of mobile banking and mobile payment technology was associated with lower age, Non-White Ethnicity, higher income, higher debt load, debt types (auto, student, credit card, and predatory), and spending more than one’s income. These results reveal that the higher one’s income, financial liabilities, …
An Exploratory Content And Sentiment Analysis Of The Guardian Metaverse Articles Using Leximancer And Natural Language Processing,
2023
Edith Cowan University
An Exploratory Content And Sentiment Analysis Of The Guardian Metaverse Articles Using Leximancer And Natural Language Processing, Sezai Tunca, Bulent Sezen, Violetta Wilk
Research outputs 2022 to 2026
The metaverse has become one of the most popular concepts of recent times. Companies and entrepreneurs are fiercely competing to invest and take part in this virtual world. Millions of people globally are anticipated to spend much of their time in the metaverse, regardless of their age, gender, ethnicity, or culture. There are few comprehensive studies on the positive/negative sentiment and effect of the newly identified, but not well defined, metaverse concept that is already fast evolving the digital landscape. Thereby, this study aimed to better understand the metaverse concept, by, firstly, identifying the positive and negative sentiment characteristics and, …
Congressional Briefing: Support America’S Circular Economy By Upcycling Bourbon & Brewing Wastes In Reauthorizing The Farm Bill,
2023
University of Louisville
Congressional Briefing: Support America’S Circular Economy By Upcycling Bourbon & Brewing Wastes In Reauthorizing The Farm Bill, Samuel Kessler
Commonwealth Policy Papers
Following state level development of a new spent grain incentive system, leading to KY House Bill 627 in 2022, CPC’s Congressional Summit dialogue considered initial components and possibilities for designing an incentive to upcycle “keystone” organic wastes in regional economies across the US. For member offices, a set of general recommendations are provided for a national spent-grain upcycling incentive pilot program. It is suggested that staff of the Bourbon caucus consult with the references in this briefing and USDA Rural Development to consider further development of an incentive program in the reauthorization of the Farm Bill.
It is further urged …
The State-Led Platformisation Of Financial Services: Frictionless Ecosystems And An Expansive Logic Of "Smartness" In Singapore,
2023
Singapore Management University
The State-Led Platformisation Of Financial Services: Frictionless Ecosystems And An Expansive Logic Of "Smartness" In Singapore, Orlando Woods, Tim Bunnell, Lily Kong
Research Collection College of Integrative Studies
This article explores the role of the state in driving the platformisation of industry, and in doing so offers a counterpoint to scholarship that focusses on the exploitative effects of private sector-led platformisation. That scholarship views platformisation as the latest incarnation of neoliberal urbanism, with the profit-maximising tendencies of the private sector driving the proliferation of platforms throughout everyday life. Notwith- standing, there remains a need to consider alternative models of platformisation. Drawing on 31 interviews with architects of Singapore’s Smart Nation initiative, we consider the state-led platformisation of financial services. We argue that state-led platformisation can open up marketplaces …
Apple “Porn” 2.0: Apple’S Vision (Pro),
2023
Nova Southeastern University
Apple “Porn” 2.0: Apple’S Vision (Pro), Suzanne E. Ferriss
Class, Race and Corporate Power
This article extends the argument made in “Apple ‘Porn’: Design Videos as Seduction and Exploitation” (Ferriss 2018) to consider the corporation’s filmed representation of its newest device: an augmented reality headset dubbed Vision Pro. It argues that Apple’s latest narratives further relegate human work and community to the margins by presenting human experience as thoroughly mediated by computer-enhanced simulation, its pinnacle achieved through its Apple Vision Pro headset that turns the home and workspace into one immersive audiovisual world. Rather than its devices and software becoming an inseparable part of our personal and shared spaces, they become the spaces. We …
Depaul Digest,
2023
DePaul University
Depaul Digest
DePaul Magazine
College of Education Professor Jason Goulah fosters hope, happiness and global citizenship through DePaul’s Institute for Daisaku Ikeda Studies in Education. Associate Journalism Professor Jill Hopke shares how to talk about climate change. News briefs from DePaul’s 10 colleges and schools: Occupational Therapy Standardized Patient Program, Financial Planning Certificate program, Business Education in Technology and Analytics Hub, Racial Justice Initiative, Teacher Quality Partnership grant, Intimate Partner Violence and Brain Injury collaboration, School of Music Career Closet, Sports Photojournalism course, DePaul Migration Collaborative’s Solutions Lab, Inclusive Screenwriting courses. New appointments: School of Music Dean John Milbauer, College of Education Dean Jennifer …
A Developed Framework For Studying Cyberethical Behaviour In North Central Nigeria,
2023
University of Ilorin, Nigeria
A Developed Framework For Studying Cyberethical Behaviour In North Central Nigeria, Aderinola Ololade Dunmade, Adeyinka Tella, Uloma Doris Onuoha
Journal of Cybersecurity Education, Research and Practice
ICT advancements have enabled more online activities, resulting in several cyberethical behaviours. Literature documents prevalence of plagiarism, and online fraud, among other misbehaviours. While behaviour has been explained by several theories, as scholarship and research advances, frameworks are modified to include more constructs. The researchers modified Fishbein and Ajzen (2011)'s Reasoned Action Approach to study female postgraduate students' perspectives toward cyberethical behaviour in North Central Nigerian universities.
The study focused on four variables, which were adequately captured by the model: perception, awareness, and attitude.
An adapted questionnaire collected quantitative data. This study used multistage sampling. A sample size of 989 …
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations,
2023
University of Arizona
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Journal of Cybersecurity Education, Research and Practice
The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that this problem has not improved and nearly 44% believe it has gotten worse over the past 10 years. Threat actors are continuing to evolve their tactics, techniques, and procedures for conducting attacks on public and private targets. Education institutions and companies must adopt emerging technologies to develop security professionals and to increase cybersecurity awareness holistically. …
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law,
2023
University of the Free State
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Journal of Cybersecurity Education, Research and Practice
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …
An Interdisciplinary Approach To Experiential Learning In Cyberbiosecurity And Agriculture Through Workforce Development,
2023
Virginia Polytechnic Institute and State University
An Interdisciplinary Approach To Experiential Learning In Cyberbiosecurity And Agriculture Through Workforce Development, Kellie Johnson, Tiffany Drape, Joseph Oakes, Joseph Simpson, Ann Brown, Donna M. Westfall-Rudd, Susan Duncan
Journal of Cybersecurity Education, Research and Practice
Cyberbiosecurity and workforce development in agriculture and the life sciences (ALS) is a growing area of need in the curriculum in higher education. Students that pursue majors related to ALS often do not include training in cyber-related concepts or expose the ‘hidden curriculum’ of seeking internships and jobs. Exposing students through workforce development training and hands-on engagement with industry professionals can provide learning opportunities to bridge the two and is an area of growth and demand as the workforce evolves. The objectives of this work were 1) to learn key concepts in cybersecurity, including data security, visualization, and analysis, to …
Leading K-12 Community Responsiveness To Cyber Threats Via Education Of School Community,
2023
James Madison University
Leading K-12 Community Responsiveness To Cyber Threats Via Education Of School Community, Michele Kielty, A. Renee Staton
Journal of Cybersecurity Education, Research and Practice
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for K-12 systems and provides concrete tools for school leaders to employ in order to provide preventive education to their school communities.
Infrastructure As Code For Cybersecurity Training,
2023
Faculty of Engineering of the University of Porto
Infrastructure As Code For Cybersecurity Training, Rui Pinto, Rolando Martins, Carlos Novo
Journal of Cybersecurity Education, Research and Practice
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. These attacks tend to become increasingly specialized, meaning cybersecurity professionals must ensure proficiency in specific areas. Naturally, recommendations include creating advanced practical training scenarios considering realistic situations to help trainees gain detailed knowledge. However, the caveats of high-cost infrastructure and difficulties in the deployment process of this kind of system, primarily due to the manual process of pre-configuring software needed for the …
Building The Operational Technology (Ot) Cybersecurity Workforce: What Are Employers Looking For?,
2023
West Virginia University
Building The Operational Technology (Ot) Cybersecurity Workforce: What Are Employers Looking For?, Christopher A. Ramezan, Paul M. Coffy, Jared Lemons
Journal of Cybersecurity Education, Research and Practice
A trained workforce is needed to protect operational technology (OT) and industrial control systems (ICS) within national critical infrastructure and critical industries. However, what knowledge, skills, and credentials are employers looking for in OT cybersecurity professionals? To best train the next generation of OT cybersecurity professionals, an understanding of current OT cybersecurity position requirements is needed. Thus, this work analyzes 100 OT cybersecurity positions to provide insights on key prerequisite requirements such as prior professional experience, education, industry certifications, security clearances, programming expertise, soft verbal and written communication skills, knowledge of OT frameworks, standards, and network communication protocols, and position …
Integrating Certifications Into The Cybersecurity College Curriculum: The Efficacy Of Education With Certifications To Increase The Cybersecurity Workforce,
2023
Georgia Gwinnett College
Integrating Certifications Into The Cybersecurity College Curriculum: The Efficacy Of Education With Certifications To Increase The Cybersecurity Workforce, Binh Tran, Karen C. Benson, Lorraine Jonassen
Journal of Cybersecurity Education, Research and Practice
One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An un-tapped resource to combat these attacks lies in the students of the secondary educational system. Necessary in the cybersecurity education is a 3-tiered approach to quickly escalate the student into a workplace-ready graduate. The analogy used is a three-legged-stool, where curriculum content, hands-on skills, and certifications are equal instruments in the edification of the cybersecurity student. This paper endeavors to delve into the 3rd leg of …
Editorial,
2023
Kennesaw State University
Editorial, Michael E. Whitman, Herbert J. Mattord
Journal of Cybersecurity Education, Research and Practice
Editorial for Volume 2023, Issue 2
Cybersecurity Challenges And Awareness Of The Multi-Generational Learners In Nepal,
2023
Kathmandu University, School of Education
Cybersecurity Challenges And Awareness Of The Multi-Generational Learners In Nepal, Raj Kumar Dhungana, Lina Gurung Dr, Hem Poudyal
Journal of Cybersecurity Education, Research and Practice
Increased exposure to technologies has lately emerged as one of the everyday realities of digital natives, especially K-12 students, and teachers, the digital immigrants. Protection from cybersecurity risks in digital learning spaces is a human right, but students are increasingly exposed to high-risk cyberspace without time to cope with cybersecurity risks. This study, using a survey (N-891 students and 157 teachers) and in-depth interviews (27 students and 14 teachers), described the students' cybersecurity-related experiences and challenges in Nepal. This study revealed that the school’s cybersecurity support system is poor and teachers has very low awareness and competencies to protect students …
A Mixed-Method Study Exploring Cyber Ranges And Educator Motivation,
2023
Regent University
A Mixed-Method Study Exploring Cyber Ranges And Educator Motivation, Cheryl Beauchamp, Holly M. Matusovich
Journal of Cybersecurity Education, Research and Practice
A growing number of academic institutions have invested resources to integrate cyber ranges for applying and developing cybersecurity-related knowledge and skills. Cyber range developers and administrators provided much of what is known about cyber range resources and possible educational applications; however, the educator provides valuable understanding of the cyber range resources they use, how they use them, what they value, and what they do not value. This study provides the cyber range user perspective of cyber ranges in cybersecurity education by describing how K-12 educators are motivated using cyber ranges. Using mixed methods, this study explored educator motivation associated with …
Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions,
2023
Old Dominion University
Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas
Journal of Cybersecurity Education, Research and Practice
The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two programs offer a required course about terrorism. Given the fluid nature of terrorism and its threat to national infrastructure, the omission is concerning. It is recommended that NSA-certified cybersecurity programs begin implementing educational content that aim to teach about this emerging crime and justice issue. One suggestion is to embrace the …
What You See Is Not What You Know: Studying Deception In Deepfake Video Manipulation,
2023
Kennesaw State University
What You See Is Not What You Know: Studying Deception In Deepfake Video Manipulation, Cathryn Allen, Bryson R. Payne, Tamirat Abegaz, Chuck Robertson
Journal of Cybersecurity Education, Research and Practice
Research indicates that deceitful videos tend to spread rapidly online and influence people’s opinions and ideas. Because of this, video misinformation via deepfake video manipulation poses a significant online threat. This study aims to discover what factors can influence viewers’ capability to distinguish deepfake videos from genuine video footage. This work focuses on exploring deepfake videos’ potential use for deception and misinformation by exploring people’s ability to determine whether videos are deepfakes in a survey consisting of deepfake videos and original unedited videos. The participants viewed a set of four videos and were asked to judge whether the videos shown …
Textbook Tasks For Social Change: Instantiation Of Development Debates And Interposition Of Pedagogical Interventions In Media Literacy Education,
2023
University of the Philippines Manila
Textbook Tasks For Social Change: Instantiation Of Development Debates And Interposition Of Pedagogical Interventions In Media Literacy Education, John N. Ponsaran
Journal of Sustainable Social Change
As materialization of their discursive stance as instructional communicators and media producers, textbook authors instantiate various development debates as well as interpose a wide range of pedagogical interventions for critical reflection and adoption by learners. This qualitative study sought to situate these development debates and the counterpart pedagogical interventions within the context of textbook task design as an application and embodiment of social justice communication. The development debates serve as the proposed contexts for media text analyses, reflective exercises, case studies, and media production, among others. Correspondingly, the interposition of interventions allows students to make sense of and act upon …
