Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Business

Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman Dec 2023

Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman

Journal of Cybersecurity Education, Research and Practice

Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …


Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi Oct 2023

Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi

Journal of Cybersecurity Education, Research and Practice

The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that this problem has not improved and nearly 44% believe it has gotten worse over the past 10 years. Threat actors are continuing to evolve their tactics, techniques, and procedures for conducting attacks on public and private targets. Education institutions and companies must adopt emerging technologies to develop security professionals and to increase cybersecurity awareness holistically. …


Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim Oct 2023

Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim

Journal of Cybersecurity Education, Research and Practice

This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …


Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd Oct 2023

Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd

Journal of Cybersecurity Education, Research and Practice

This paper should be of interest to the readers of this journal because it addresses a subject that has received little scholarly attention; namely, local government cybersecurity. The U.S. has over 90,000 units of local government, of which almost 39,000 are “general purpose” units (i.e., municipalities, counties, towns and townships). On average, these governments do not practice cybersecurity effectively (Norris, et al., 2019 and 2020). One possible reason is that they do not adopt and/or implement highly recommended cybersecurity policies. In this paper, we examine local government adoption or lack of adoption of cybersecurity policies using data from three surveys. …


Predictors Of Successful Adoption Of Technology Supported Learning In Universities In Uganda: A Students’ Perspective, Esther Namirembe, Michael Eddie Kyobe Prof. Jun 2021

Predictors Of Successful Adoption Of Technology Supported Learning In Universities In Uganda: A Students’ Perspective, Esther Namirembe, Michael Eddie Kyobe Prof.

The African Journal of Information Systems

This study identified the predictors of successful adoption of technology supported learning (TSL) among students in universities. Presumably, the perspective of the students in understanding this study is crucial because students are key users of TSL systems and are faced with challenges in the adoption of such systems in learning institutions. We argue in the present study that predictors can be identified using Gestalts approach given the complex interactions between the organizational and individual factors. The extent of interaction between the factors was accomplished using the clustering algorithm. Data was collected from 184 students from Makerere and Gulu universities. Six …


Car Hacking: Accessing And Exploiting The Can Bus Protocol, Bryson R. Payne Jun 2019

Car Hacking: Accessing And Exploiting The Can Bus Protocol, Bryson R. Payne

Journal of Cybersecurity Education, Research and Practice

With the rapid adoption of internet-connected and driver-assist technologies, and the spread of semi-autonomous to self-driving cars on roads worldwide, cybersecurity for smart cars is a timely concern and one worth exploring both in the classroom and in the real world. Highly publicized hacks against production cars, and a relatively small number of crashes involving autonomous vehicles, have brought the issue of securing smart cars to the forefront as a matter of public and individual safety, and the cybersecurity of these “data centers on wheels” is of greater concern than ever.

However, up to this point there has been a …


Development Of Digital Diary For Enhanced Parental School Involvement In Tanzania, Sekione R. Jeremiah, Joel S. Mtebe Phd May 2018

Development Of Digital Diary For Enhanced Parental School Involvement In Tanzania, Sekione R. Jeremiah, Joel S. Mtebe Phd

The African Journal of Information Systems

The study examined the use of digital diary as a tool for enhancing parental school involvement in Tanzania. The development of the digital diary followed eXtreme Programming agile method where 87 parents and 6 teachers from St. Florence school were involved. Parents and teachers were given six months to use the tool before testing for its effectiveness using data from 7 teachers and 156 parents through semi-structured interviews and questionnaires respectively. The study found that the majority of respondents (84.4% of parents and 96.7% of teachers) indicated that the digital diary was useful tool as enabled them to track children’s …


The E-Agriculture Research Landscape In South Africa: A Systematic Literature Review, Alain Nzuzi Kintoki Apr 2018

The E-Agriculture Research Landscape In South Africa: A Systematic Literature Review, Alain Nzuzi Kintoki

The African Journal of Information Systems

Despite the growing interest in e-agriculture research in South Africa, academic studies have not sufficiently and deeply investigated the current e-agriculture research trends in the South African context. It is unclear how primary e-agriculture research in South Africa will aid both current and future generations to create new and better ways to transform agricultural development using this modern technology. This study sought to determine the current status of e-agriculture research in the South African context. A systematic literature review was used to gather and analyze data. The results indicate that 17 papers (26.5%) were published during the first two years …


Tracing Sources Of Design Uncertainty And Controversy In Web 2.0 Facilitated Collaborative Design Process, Lockias Chitanana Dr, Desmond Wesley Govender Dr Apr 2018

Tracing Sources Of Design Uncertainty And Controversy In Web 2.0 Facilitated Collaborative Design Process, Lockias Chitanana Dr, Desmond Wesley Govender Dr

The African Journal of Information Systems

The integration of Internet-based collaborative tools such as Web 2.0 technologies to facilitate the design process has rendered collaborative design a chaotic practice filled with controversy and uncertainty, with the inevitable risk of unintended consequences. The purpose of this study was to trace the sources of design controversy in a Web 2.0 facilitated collaborative design process. The study employed an Actor Network Theory (ANT) methodological framework to explore design controversy in five design teams comprising of 4 to 6 undergraduate engineering students. Data was constituted by following the traces left by the actors, both human and nonhumans, their actions and …


Book Review - Dixie Highway: Road Building And The Making Of The Modern South, 1900-1930, Rebecca Rose Jul 2017

Book Review - Dixie Highway: Road Building And The Making Of The Modern South, 1900-1930, Rebecca Rose

Georgia Library Quarterly

No abstract provided.


Pedagogical Resources For Industrial Control Systems Security: Design, Implementation, Conveyance, And Evaluation, Guillermo A. Francia Iii, Greg Randall, Jay Snellen Jun 2017

Pedagogical Resources For Industrial Control Systems Security: Design, Implementation, Conveyance, And Evaluation, Guillermo A. Francia Iii, Greg Randall, Jay Snellen

Journal of Cybersecurity Education, Research and Practice

Industrial Control Systems (ICS), which are pervasive in our nation’s critical infrastructures, are becoming increasingly at risk and vulnerable to internal and external threats. It is imperative that the future workforce be educated and trained on the security of such systems. However, it is equally important that careful and deliberate considerations must be exercised in designing and implementing the educational and training activities that pertain to ICS. To that end, we designed and implemented pedagogical materials and tools to facilitate the teaching and learning processes in the area of ICS security. In this paper, we describe those resources, the professional …


A Model For Designing M-Agriculture Applications For Dairy Farming, Amos Gichamba, Ismail A. Lukandu Oct 2012

A Model For Designing M-Agriculture Applications For Dairy Farming, Amos Gichamba, Ismail A. Lukandu

The African Journal of Information Systems

In the recent past, developing countries have experienced major technological advancements including high mobile phone penetration. With the implementation of innovative technological solutions (e.g. mobile-based systems in key economic activities such as agriculture), there is need to develop models that software developers and researchers can use to design solutions. This paper aims to study the implementation of mobile systems in agriculture and presents a model for designing such applications. This study shows that models exist for general mobile applications design and development, although none specifically suits mobile agriculture applications. A model for designing and implementing M-Agriculture applications is presented. The …


Towards The Deployment And Adoption Of Location-Based Services For Optimal Mobile Communication Operations In Africa, Folasade Dahunsi May 2012

Towards The Deployment And Adoption Of Location-Based Services For Optimal Mobile Communication Operations In Africa, Folasade Dahunsi

The African Journal of Information Systems

Africa is the world’s second largest and second most populous continent with about one billion people. Mobile phones are a major source of communication and means of taking information and technology to rural and remote areas of the continent. With low-cost and readily available mobile phones, underprivileged, low-income earners and rural dwellers can also participate in the Information and Communication Technology (ICT) revolution. Services are introduced by mobile operators and vendors to enhance and optimize this mobile evolution. One of such service is location-based services (LBS); LBS make available personalized services based on the geographical location of the subscriber’s phone. …