Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cybersecurity (3)
- Editorial (2)
- Access control (1)
- And remote monitoring (1)
- Criminal justice (1)
-
- Cyber hygiene (1)
- Cybersecurity education (1)
- Dark net (1)
- Dark web (1)
- Event management (1)
- Firewall (1)
- Granulometry (1)
- Grover (1)
- Intrusion detection and response (1)
- K-means clustering (1)
- Log management (1)
- Logistic regression (1)
- Malware awareness (1)
- Malware detection (1)
- Mixed method (1)
- Obfuscated malware (1)
- Perspectives (1)
- Q methodology (1)
- QKD (1)
- Quantum computer (1)
- Quantum gate (1)
- Risk management (1)
- SNMP (1)
- Security policy management (1)
- Security training (1)
Articles 1 - 8 of 8
Full-Text Articles in Management Information Systems
Malaware Defensive: A Game To Train Users To Combat Malware, Tyler Moon, Tamirat Abegaz, Bryson Payne, Abi Salimi
Malaware Defensive: A Game To Train Users To Combat Malware, Tyler Moon, Tamirat Abegaz, Bryson Payne, Abi Salimi
Journal of Cybersecurity Education, Research and Practice
Several research findings indicate that basic cyber hygiene can potentially deter the majority of cyber threats. One of the ways cybersecurity professionals can prepare users to ensure proper hygiene is to help them develop their ability to spot the difference between normal and abnormal behavior in a computer system. Malware disrupts the normal behavior of a computer system. The lack of appropriate user training has been one of the main reasons behind the exposure of computer systems to threats, from social engineering to viruses, trojans, and ransomware. Basic knowledge about common behavioral characteristics of malware could help users identify potentially …
Divergent Student Views Of Cybersecurity, Susan E. Ramlo, John B. Nicholas
Divergent Student Views Of Cybersecurity, Susan E. Ramlo, John B. Nicholas
Journal of Cybersecurity Education, Research and Practice
Cybersecurity is a worldwide issue and concern. Prior studies indicate that many people do not use cybersecurity best practices. Although these prior studies used large-scale surveys or interviews, this study used Q methodology [Q] because Q provides greater insight than Likert-format surveys. In fact, Q was created to scientifically study subjectivity. Within a Q study, various stages as well as philosophical, epistemological, and ontological principles represent a complete methodology. At first, Q researchers collect items that represent the broad range of communications about the topic (called the concourse). Although the items can be pictures, scents, or other means of communication, …
Teaching About The Dark Web In Criminal Justice Or Related Programs At The Community College And University Levels., Scott H. Belshaw, Brooke Nodeland, Lorrin Underwood, Alexandrea Colaiuta
Teaching About The Dark Web In Criminal Justice Or Related Programs At The Community College And University Levels., Scott H. Belshaw, Brooke Nodeland, Lorrin Underwood, Alexandrea Colaiuta
Journal of Cybersecurity Education, Research and Practice
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This article discusses the need to incorporate courses discussing the Dark Web in criminal justice. A review of existing cyber-criminal justice programs in Texas and nationally suggests that most community colleges and 4-year universities have yet to develop courses/programs in understanding and investigating the Dark Web on the internet. The Dark Web serves as the …
An Assessment Of Practical Hands-On Lab Activities In Network Security Management, Te-Shun Chou, Nicholas Hempenius
An Assessment Of Practical Hands-On Lab Activities In Network Security Management, Te-Shun Chou, Nicholas Hempenius
Journal of Cybersecurity Education, Research and Practice
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network security management for students assist them in becoming network security professionals.
The objective of this paper is to introduce a variety of techniques related to network security management, such as Simple Network Management Protocol (SNMP), event management, security policy management, risk management, access control, and remote monitoring. With the …
Quantum Computing: Principles And Applications, Yoshito Kanamori, Seong-Moo Yoo
Quantum Computing: Principles And Applications, Yoshito Kanamori, Seong-Moo Yoo
Journal of International Technology and Information Management
The development of quantum computers over the past few years is probably one of the significant advancements in the history of quantum computing. D-Wave quantum computer has been available for more than eight years. IBM has made its quantum computer accessible via its cloud service. Also, Microsoft, Google, Intel, and NASA have been heavily investing in the development of quantum computers and their applications. The quantum computer seems to be no longer just for physicists and computer scientists but also for information system researchers. This paper introduces the basic concepts of quantum computing and describes well-known quantum applications for non-physicists. …
Gdom: Granulometry For The Detection Of Obfuscated Malware, John A. Aruta, N. Paul Schembari
Gdom: Granulometry For The Detection Of Obfuscated Malware, John A. Aruta, N. Paul Schembari
Journal of Cybersecurity Education, Research and Practice
We describe the results of a master's thesis in malware detection and discuss the connection to the learning goals of the project. As part of the thesis, we studied obfuscation of malware, conversion of files into images, image processing, and machine learning, a process of benefit to both the student and faculty.
Malware detection becomes significantly more difficult when the malicious specimen is obfuscated or transformed in an attempt to avoid detection. However, computer files have been shown to exhibit evidence of structure when converted into images, so with image processing filters such as granulometry, it is possible to generate …
Editorial, Michael E. Whitman, Herbert J. Mattord, Hossain Shahriar
Editorial, Michael E. Whitman, Herbert J. Mattord, Hossain Shahriar
Journal of Cybersecurity Education, Research and Practice
No abstract provided.