Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Kennesaw State University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 1318

Full-Text Articles in Business

Factors Influencing The Perceptions Of Human-Computer Interaction Curriculum Developers In Higher Education Institutions During Curriculum Design And Delivery, Cynthia Augustine, Salah Kabanda Apr 2024

Factors Influencing The Perceptions Of Human-Computer Interaction Curriculum Developers In Higher Education Institutions During Curriculum Design And Delivery, Cynthia Augustine, Salah Kabanda

The African Journal of Information Systems

Computer science (CS) and information systems students seeking to work as software developers upon graduating are often required to create software that has a sound user experience (UX) and meets the needs of its users. This includes addressing unique user, context, and infrastructural requirements. This study sought to identify the factors that influence the perceptions of human-computer interaction (HCI) curriculum developers in higher education institutions (HEIs) in developing economies of Africa when it comes to curriculum design and delivery. A qualitative enquiry was conducted and consisted of fourteen interviews with HCI curriculum developers and UX practitioners in four African countries. …


Teaching Digital And Social Media Marketing Through Community Engagement: An Online Asynchronous Class Longitudinal Case Study, Joie Hain, Anita Whiting Apr 2024

Teaching Digital And Social Media Marketing Through Community Engagement: An Online Asynchronous Class Longitudinal Case Study, Joie Hain, Anita Whiting

Atlantic Marketing Journal

Abstract - While marketing educators have identified the need for community engagement projects within the marketing curriculum, there is little research on implementing a community engagement project in marketing, especially in digital marketing. Therefore, this longitudinal case study aims to demonstrate how a community engagement project was implemented into digital and social media marketing classes at one university. This case study discusses (1) how the community engagement project was developed, (2) the work conducted, and (3) the results provided to the client. This case study also provides feedback from both students and the client. Overall, students were pleased with the …


Honesty In Marketing Communications: The Role Of Humor, Can Trinh Apr 2024

Honesty In Marketing Communications: The Role Of Humor, Can Trinh

Atlantic Marketing Journal

Amid the crisis of trust in the marketplace, there have been increasing calls for advertisers to show more honesty in marketing communications. However, firms are still hesitant to follow suit out of concerns that more honesty may mean more losses than gains. Against such background, there is still scant empirical evidence about the effect of honest marketing communications on marketing outcomes to help provide practical guidance for marketers. The present research helps fill this crucial gap by examining the role of humor in honest marketing communications. Three studies in this research reveal novel insights that an interrelationship exists between humor …


The Impact Of “Humorous” Ads Featuring Social Media Influencers On Perceptions Of The Influencer, Brand, And Purchase Intention, Jason L. Snyder, Robert Forbus Apr 2024

The Impact Of “Humorous” Ads Featuring Social Media Influencers On Perceptions Of The Influencer, Brand, And Purchase Intention, Jason L. Snyder, Robert Forbus

Atlantic Marketing Journal

The present study explored the use of humor in social media ads that featured both a product being advertised and a social media influencer (SMI). Using extant literature and the theory of planned behavior as guides, the goal of the study was to explore the role of perceived humorousness on consumer perceptions of the SMI, the ad, the brand, and consumer purchase intentions. The experiment (N = 292) exposed self-identified males living in the U.S. between the ages of 18 and 40 to one of two versions of an ad for a men’s grooming product. The ads were run …


The Effect Of Consumer Socialization, Perceived Employee Identification, And Flexibility On Store Loyalty For Beauty Products, Harash Sachdev Apr 2024

The Effect Of Consumer Socialization, Perceived Employee Identification, And Flexibility On Store Loyalty For Beauty Products, Harash Sachdev

Atlantic Marketing Journal

The survey data from a Chinese university suggests that consumer socialization and digital engagement profoundly influence employees' identification with their retailers. This identification, in turn, empowers retailers to become more flexible and adaptive to consumers' ever-changing needs, resulting in higher levels of store loyalty. Furthermore, an in-depth analysis revealed that retailers’ flexibility was vital in mediating employee identification and store loyalty.


Familiarity, Sensationalism, And Forward Referencing In Celebrity Clickbait: Effects On Curiosity And Click Intention, Cynthia B. Hanson Apr 2024

Familiarity, Sensationalism, And Forward Referencing In Celebrity Clickbait: Effects On Curiosity And Click Intention, Cynthia B. Hanson

Atlantic Marketing Journal

This study investigates the effects of celebrity familiarity, sensational copy, and forward referencing on curiosity and intention to click on a digital post using a 2 (familiar/unfamiliar celebrity) X 2 (high/low sensationalism) X 2 (high/low knowledge gap) experimental design. The results show that curiosity and click intention are significantly greater when the copy points to missing information and when familiarity is greater, supporting the information gap theory of curiosity and illustrating its application to the forward referencing technique used in clickbait. However, contrary to expectations, sensational copy produced lower levels of arousal, curiosity, and click intention, suggesting a backlash against …


The Impact Of The Anthem Protest Movement And Covid On Nfl Viewership, George W. Stone, Michael A. Jones, Kirsten Passyn Apr 2024

The Impact Of The Anthem Protest Movement And Covid On Nfl Viewership, George W. Stone, Michael A. Jones, Kirsten Passyn

Atlantic Marketing Journal

This research is based on 3 different surveys conducted over several NFL football seasons. The first study investigated the impact of the Anthem Protest Movement on the attitude of NFL fans. The “Anthem Protest” reemerged during the 2020 season during the “lockdown” season associated with the COVID epidemic. Co-mingled with COVID and societal unrest, many analysts were predicting irreparable harm to the NFL’s once indomitable position as America’s favorite sport resulting from this confluence of events. Given the importance of the topic in terms of future NFL fan support, this report looks back over the last several NFL seasons to …


How Politics Affects Practitioner Attitudes Of Marketing Faculty Interns, William T. Neese, W. Frank Thompson, Charla Brown Apr 2024

How Politics Affects Practitioner Attitudes Of Marketing Faculty Interns, William T. Neese, W. Frank Thompson, Charla Brown

Atlantic Marketing Journal

Marketing student internships are widely discussed in the literature, yet little has been published regarding the value of marketing faculty internships. In applied disciplines like marketing, faculty internships can bridge experience gaps between theory and practice and help provide critical information to keep the curriculum current. Unfortunately, politics can manifest itself as one barrier to academic engagement with the business community. To explore this potential problem, we first test a model that measures the influence political party combined with political ideology has on three Contempt-Anger-Disgust (CAD) outcome measures common in psychology literature. We model a statistically significant political backdrop that …


A Review Of River And Small Ship Cruising In The Mid-Atlantic, Northeastern United States, And Eastern Canadian Markets, Mark Mitchell, Michael Dowd, Paul Clark Apr 2024

A Review Of River And Small Ship Cruising In The Mid-Atlantic, Northeastern United States, And Eastern Canadian Markets, Mark Mitchell, Michael Dowd, Paul Clark

Atlantic Marketing Journal

Currently, there is a lack of cruise industry related articles in the tourism, business, and marketing literature. This manuscript provides an overview of river and small ship cruise activity in the Mid-Atlantic, Northeastern United States and Eastern Canada in three geographic clusters and waterways: (1) Mid-Atlantic Coast; (2) New England Coast and Canadian Maritimes; and (3) Eastern Canada & the Saint Lawrence Seaway. The existing cruise options in each market are identified. The operating characteristics of this region that aid and challenge cruise operators are then explored. Finally, the Product-Market Growth Matrix is used to present growth strategies available to …


The Influence Of Job Embeddedness On Voluntary Salesforce Turnover, James Deconinck, Drew Carnes, Mary Beth Deconinck Apr 2024

The Influence Of Job Embeddedness On Voluntary Salesforce Turnover, James Deconinck, Drew Carnes, Mary Beth Deconinck

Atlantic Marketing Journal

Turnover is a critical issue encountered by organizations. However, salesforce turnover is especially important for companies given the vital role played by salespeople. This study developed and tested a model of turnover among a sample of 331 business-to-business salespeople. The results indicate that perceived supervisor support, perceived organizational support, and supervisor satisfaction are important variables indirectly impacting salespersons’ search behavior and voluntary turnover through job embeddedness.


Person-Supervisor Fit Antecedents: Self Determination Theory In Salesforce Turnover Intention, Ilgim Benoit, Jeffrey R. Foreman, Bonnie S. Guy Apr 2024

Person-Supervisor Fit Antecedents: Self Determination Theory In Salesforce Turnover Intention, Ilgim Benoit, Jeffrey R. Foreman, Bonnie S. Guy

Atlantic Marketing Journal

In this paper, by utilizing Self-Determination Theory (SDT), we discuss possible antecedents for Person-Supervisor (PS) fit, which is important in decreasing turnover intentions of salespeople. Specifically, this is the first paper to discuss autonomy, relatedness and competence as social antecedent variables that are influential in predicting the PS fit, which is the congruence of values and goals of salespeople and sales managers, that ultimately decreases turnover intentions of salespeople. Survey results show that autonomy and relatedness are both positively related to salespeople’s perception of PS fit, and have indirect effects on turnover intention through PS fit. Accordingly, by enhancing relatedness, …


Comparing Cognitive Theories Of Learning Transfer To Advance Cybersecurity Instruction, Assessment, And Testing, Daniel T. Hickey Ph.D., Ronald J. Kantor Apr 2024

Comparing Cognitive Theories Of Learning Transfer To Advance Cybersecurity Instruction, Assessment, And Testing, Daniel T. Hickey Ph.D., Ronald J. Kantor

Journal of Cybersecurity Education, Research and Practice

The cybersecurity threat landscape evolves quickly, continually, and consequentially. This means that the transfer of cybersecurity learning is crucial. We compared how different recognized “cognitive” transfer theories might help explain and synergize three aspects of cybersecurity education. These include teaching and training in diverse settings, assessing learning formatively & summatively, and testing & measuring achievement, proficiency, & readiness. We excluded newer sociocultural theories and their implications for inclusion as we explore those theories elsewhere. We first summarized the history of cybersecurity education and proficiency standards considering transfer theories. We then explored each theory and reviewed the most relevant cybersecurity education …


It Deployment And Integration – An Assessment Of Enabling And Inhibiting Factors, Lesley Matshwane, Carl Marnewick Feb 2024

It Deployment And Integration – An Assessment Of Enabling And Inhibiting Factors, Lesley Matshwane, Carl Marnewick

The African Journal of Information Systems

Although delivery of services in South Africa is the responsibility of all spheres of government, the provision of basic services lies at the doorstep of local municipalities. Local municipalities have, for many reasons, frequently been unable to live up to this mandate despite the fact that some of the challenges that they face can be addressed by using IT. This paper assesses factors enabling and inhibiting the efficient deployment and integration of IT in local municipalities. The technological, organizational and environmental (TOE) framework was deployed to assess the factors. A multiple case study in which semi-structured interviews were conducted produced …


Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D. Feb 2024

Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D.

Journal of Cybersecurity Education, Research and Practice

This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized identity, and smart contracts, and examines the application of secure blockchain across various educational functions such as enrollment management, degree auditing, and award processing. Each facet of the NIST Framework is utilized to explore the integration of blockchain technology and address persistent security concerns. The paper contributes to the literature by defining blockchain technology applications and opportunities within …


Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger Feb 2024

Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger

Journal of Cybersecurity Education, Research and Practice

This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through mentorship, collaboration, skill preparation, and other activities and touch points to increase students’ sense of belonging and connectedness in the cybersecurity profession. The goal of the project was focused on developing diverse, educated, and skilled cybersecurity personnel for employment within local industry and government to help curtail the current regional cybersecurity workforce gap that is emblematic of the lack of qualified cybersecurity personnel that presently exists nationwide. Emphasis throughout the project …


University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo Feb 2024

University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo

Journal of Cybersecurity Education, Research and Practice

This study examines cybersecurity awareness in universities by analyzing related research output across different disciplines at the University of Johannesburg. The diffusion of innovation theory is used in this study as a theoretical framework to explain how cybersecurity awareness diffuses across disciplines. The University of Johannesburg Institutional Repository database was the data source for this study. Variations in cybersecurity keyword searches and topic modeling techniques were used to identify the frequency and distribution of research output across different disciplines. The study reveals that cybersecurity awareness has diffused across various disciplines, including non-computer science disciplines such as business, accounting, and social …


Volunteerism During Covid-19: Sport Management Students’ Career Interests Against Public Health Risks, Kyu-Soo Chung, Jennifer Willet, Chris Green, Nari Shin Feb 2024

Volunteerism During Covid-19: Sport Management Students’ Career Interests Against Public Health Risks, Kyu-Soo Chung, Jennifer Willet, Chris Green, Nari Shin

Faculty and Research Publications

Employing the theory of planned behavior, this study aimed to identify how sport management students’ intentions to volunteer for a sporting event were affected by their COVID-19 preventive health factors and social consciousness. From eight U.S. universities, 415 sport management students responded to a self-administered online survey. Collected data were analyzed via hierarchical regression modeling. While the students’ health literacy and susceptibility affected their intentions positively, their social consciousness played a crucial role in producing low intentions to volunteer for a sporting event. Sport management educators should include more hands-on activities in the curriculum and collaborate with local sport agencies …


Privacy Principles And Harms: Balancing Protection And Innovation, Samuel Aiello Feb 2024

Privacy Principles And Harms: Balancing Protection And Innovation, Samuel Aiello

Journal of Cybersecurity Education, Research and Practice

In today's digitally connected world, privacy has transformed from a fundamental human right into a multifaceted challenge. As technology enables the seamless exchange of information, the need to protect personal data has grown exponentially. Privacy has emerged as a critical concern in the digital age, as technological advancements continue to reshape how personal information is collected, stored, and utilized. This paper delves into the fundamental principles of privacy and explores the potential harm that can arise from the mishandling of personal data. It emphasizes the delicate balance between safeguarding individuals' privacy rights and fostering innovation in a data-driven society. By …


Board Of Directors Role In Data Privacy Governance: Making The Transition From Compliance Driven To Good Business Stewardship, David Warner, Lisa Mckee Feb 2024

Board Of Directors Role In Data Privacy Governance: Making The Transition From Compliance Driven To Good Business Stewardship, David Warner, Lisa Mckee

Journal of Cybersecurity Education, Research and Practice

Data collection, use, leveraging, and sharing as a business practice and advantage has proliferated over the past decade. Along with this proliferation of data collection is the increase in regulatory activity which continues to morph exponentially around the globe. Adding to this complexity are the increasing business disruptions, productivity and revenue losses, settlements, fines, and penalties which can amount to over $15 million, with many penalties now being ascribed to the organization’s leadership, to include the Board of Directors (BoD), the CEO and members of the senior leadership team (SLT). Thus, boards of directors can no longer ignore and in …


Towards Assessing Cybersecurity Posture Of Manufacturing Companies: Review And Recommendations, John Del Vecchio, Yair Levy, Ling Wang, Ajoy Kumar Jan 2024

Towards Assessing Cybersecurity Posture Of Manufacturing Companies: Review And Recommendations, John Del Vecchio, Yair Levy, Ling Wang, Ajoy Kumar

KSU Proceedings on Cybersecurity Education, Research and Practice

With the continued changes in the way businesses work, cyber-attack targets are in a constant state of flux between organizations, individuals, as well as various aspects of the supply chain of interconnected goods and services. As one of the 16 critical infrastructure sectors, the manufacturing sector is known for complex integrated Information Systems (ISs) that are incorporated heavily into production operations. Many of these ISs are procured and supported by third parties, also referred to as interconnected entities in the supply chain. Disruptions to manufacturing companies would not only have significant financial losses but would also have economic and safety …


Quantum Computing: Computing Of The Future Made Reality, Janelle Mathis Jan 2024

Quantum Computing: Computing Of The Future Made Reality, Janelle Mathis

KSU Proceedings on Cybersecurity Education, Research and Practice

Abstract—Quantum computing is an emerging new area focused on technology consisting of quantum theory aspects such as electrons, sub-atomic particles, and other materials engineered using quantum mechanics. Through quantum mechanics, these computers can solve problems that classical computers deem too complex. Today the closest computing technology compared to quantum computers are supercomputers, but similarly to classical computers, supercomputers also have faults. With supercomputers, when a problem is deemed too complex, it is due to the classical machinery components within the computer, thus causing a halt in solving the task or problem. In contrast, these problems could be solved with a …


Rfid Key Fobs In Vehicles: Unmasking Vulnerabilities & Strengthening Security, Devon Magda, Bryson R. Payne Jan 2024

Rfid Key Fobs In Vehicles: Unmasking Vulnerabilities & Strengthening Security, Devon Magda, Bryson R. Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

No abstract provided.


The Impact Of Individual Techno-Characteristics On Information Privacy Concerns In The Diffusion Of Mobile Contact Tracing, Jiesen Lin, Dapeng Liu, Lemuria Carter Jan 2024

The Impact Of Individual Techno-Characteristics On Information Privacy Concerns In The Diffusion Of Mobile Contact Tracing, Jiesen Lin, Dapeng Liu, Lemuria Carter

KSU Proceedings on Cybersecurity Education, Research and Practice

In the wake of the global health crisis, mobile contact tracing applications have emerged as important tools in managing disease spread. However, their effectiveness heavily relies on mass adoption, significantly influenced by the public's information privacy concerns. To date, systematic examination of how these privacy concerns relate to the innovation adopter categories in mobile contact tracing remains sparse. Furthermore, the influence of individual techno-characteristics on these concerns is to be explored. This research seeks to fill these gaps. Drawing on the diffusion of innovation theory, we examine the impact of the key techno-characteristics—adopter category, propensity for identification misrepresentation, and exposure …


Exploring Information Privacy Concerns During The Covid-19 Pandemic: A Juxtaposition Of Three Models, Dapeng Liu, Lemuria Carter, Jiesen Lin Jan 2024

Exploring Information Privacy Concerns During The Covid-19 Pandemic: A Juxtaposition Of Three Models, Dapeng Liu, Lemuria Carter, Jiesen Lin

KSU Proceedings on Cybersecurity Education, Research and Practice

Government agencies across the globe utilize mobile applications to interact with constituents. In response to the global pandemic, several nations have employed contact tracing services to manage the spread of COVID-19. Extent literature includes various models that explore information privacy. Several researchers have highlighted the need to compare the effectiveness of diverse information privacy models. To fill this gap, we explore the impact of information privacy concerns on citizens’ willingness to download a federal contact tracing app. In particular, we compare three types of prevalent information privacy concerns: global information privacy concerns (GIPC), concern for information privacy (CFIP), and internet …


A Multi-Method Examination Of Donor Overhead Aversion: Implications For Marketing A Cause, Devin Lunt, Ryan E. Freling, Lucas D. Lunt Jan 2024

A Multi-Method Examination Of Donor Overhead Aversion: Implications For Marketing A Cause, Devin Lunt, Ryan E. Freling, Lucas D. Lunt

Atlantic Marketing Journal

Overhead aversion refers to a reluctance among donors to contribute to a charitable cause when a portion of that donation is allocated to non-cause-related costs. As a consequence, there is an impact on donor intentions and behaviors. A meta-analysis shows that characteristics of potential donors and the charitable cause moderate the impact of overhead level on donation intentions and behaviors. A follow-up experiment investigates two potential mechanisms underlying overhead aversion: perceived personal impact and perceived efficiency. Results of a survey experiment suggest the negative influence of overhead costs on donative behaviors is exacerbated when potential donors doubt their ability …


Why Students Select Their College Major: An Investigative Study, Kate N. Matthews, Diane R. Edmondson, Lucy Matthews Jan 2024

Why Students Select Their College Major: An Investigative Study, Kate N. Matthews, Diane R. Edmondson, Lucy Matthews

Atlantic Marketing Journal

With the decline in the number of traditional college-aged students, understanding the degree selection process is important for departments, colleges, and universities alike. For students, selecting the proper major early is also beneficial since it reduces time in school and tuition costs. Therefore, a better understanding of the degree selection process is worthwhile. Survey data was collected from 1,177 undergraduates at a southeastern U.S. university. Survey questions included major selection influences and other attitude and demographic items. The highest ranked reason is interest and passion followed by fit with personality type. This was similar for students who changed majors. External …


Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman Dec 2023

Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman

Journal of Cybersecurity Education, Research and Practice

Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …


Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu Nov 2023

Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu

Journal of Cybersecurity Education, Research and Practice

This pilot study aims to assess the acceptability of Open University’s training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post experimental design was employed. 43 self-selected participants were recruited via an online register and posters at the university (excluding IT related courses). Participants completed the Human Aspects of Information Security Questionnaire (HAIS-Q) and Fear of Missing Out (FoMO) Scale. They then completed all games and quizzes in the GICAST course before repeating the HAIS-Q and …


The Technology, Organization, And Environment Framework For Social Media Analytics In Government: The Cases Of South Africa And Germany, Brenda M. Scholtz, Khulekani Yakobi Nov 2023

The Technology, Organization, And Environment Framework For Social Media Analytics In Government: The Cases Of South Africa And Germany, Brenda M. Scholtz, Khulekani Yakobi

The African Journal of Information Systems

This paper investigates factors influencing the adoption of social media analytics (SMA) for citizen relationship management (CzRM). Three real-world cases of government departments, two in South Africa and one in Germany, were investigated, and focus group discussions were conducted. The technological, organizational, and environmental (TOE) theory and qualitative content analysis guided the data analysis. The findings revealed that in all cases, staff usually conducted a manual analysis of social media and SMA had not been implemented sufficiently to realize its full potential. Insights were obtained from TOE and factors were identified that should be considered for improving the planning of …


Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang Nov 2023

Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang

Journal of Cybersecurity Education, Research and Practice

Recent advances in Artificial Intelligence (AI) have brought society closer to the long-held dream of creating machines to help with both common and complex tasks and functions. From recommending movies to detecting disease in its earliest stages, AI has become an aspect of daily life many people accept without scrutiny. Despite its functionality and promise, AI has inherent security risks that users should understand and programmers must be trained to address. The ICE (integrity, confidentiality, and equity) cybersecurity labs developed by a team of cybersecurity researchers addresses these vulnerabilities to AI models through a series of hands-on, inquiry-based labs. Through …