Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cybersecurity (3)
- Conference program (2)
- Interdisciplinary (2)
- Posters (2)
- Presentations (2)
-
- Undergraduate student research (2)
- Behavioral intention (1)
- DETERLab (1)
- Electronic portfolios (1)
- Formative feedback (1)
- Hands-on Education (1)
- Hedonic motivation (1)
- High impact practices (1)
- Higher ed (1)
- Importance-Performance Gap Analysis (1)
- Internships (1)
- Learning communities (1)
- Online learning (1)
- Pilot study (1)
- Police education (1)
- Police reform (1)
- Police training (1)
- Pre-service teachers (1)
- Recommendations (1)
- Research activities (1)
- Serious Gaming; Social Engineering; Human Factor; Information Security; Experiential Learning; Field Observation; Business and Management Environment (1)
- Service learning (1)
- Simulations (1)
- Training (1)
- UTAUT2 (1)
- Publication
- Publication Type
Articles 1 - 10 of 10
Full-Text Articles in Education
2021 - The Second Annual Fall Symposium Of Student Scholars
2021 - The Second Annual Fall Symposium Of Student Scholars
Symposium of Student Scholars Program Books
The full program book from the Fall 2021 Symposium of Student Scholars, held on November 18, 2021. Includes abstracts from the presentations and posters.
Factors That Influence The Acceptance And Use Of Formative Feedback In An Online Undergraduate Module, Jameson Goto, Jacqueline Batchelor, Geoffrey Lautenbach
Factors That Influence The Acceptance And Use Of Formative Feedback In An Online Undergraduate Module, Jameson Goto, Jacqueline Batchelor, Geoffrey Lautenbach
The African Journal of Information Systems
The focus of the study was to determine the factors that influence the acceptance and use of online feedback in an undergraduate module using the modified unified theory of acceptance and use of technology (UTAUT2). The participants were third-year pre-service teachers in the Bachelor of Education degree who were taking a fully online Teaching Studies module, in addition to their specialist subject areas at one of the universities in South Africa. A survey instrument was developed from the original UTAUT2 instrument and modified where appropriate, to fit the formative feedback context. Exploratory factor analysis was used to validate the instrument. …
Observations, Evaluations, And Recommendations For Deterlab From An Educational Perspective, Ahmed Ibrahim, Vitaly Ford
Observations, Evaluations, And Recommendations For Deterlab From An Educational Perspective, Ahmed Ibrahim, Vitaly Ford
Journal of Cybersecurity Education, Research and Practice
DETERLab is a cluster environment that provides a set of virtual machines that can be used by researchers and teachers to run cybersecurity experiments and competitions, and where it is possible to deploy different network configurations to research attack and defense mechanisms in the cyber world. While we were working to develop a pathway for producing more usable and effective cybersecurity educational resources by investigating and examining several projects, we examined DETERLab as a prospective platform to use in the classroom. Throughout our experimentation, we faced challenges that we decided to document in order to help other educators use the …
An Exploratory Study Of Mode Efficacy In Cybersecurity Training, Michael D. Workman
An Exploratory Study Of Mode Efficacy In Cybersecurity Training, Michael D. Workman
Journal of Cybersecurity Education, Research and Practice
Cybersecurity capabilities in organizations and governmental agencies continue to lag behind the threats. Given the current environment, these entities have placed renewed emphasis on cybersecurity education. However, education appears to lack its full potential in most settings. Few empirical studies have systematically tested the efficacy of various training methods and modes, and those that have been conducted have yielded inconsistent findings. Recent literature on the use of gamified simulations have suggested that they may improve cybersecurity behaviors. Similarly, live activities such as hackathons and capture the flag events have been surmised to augment learning and capabilities. We conducted an exploratory …
The Need For Police Reform, Desiree Bevineau
The Need For Police Reform, Desiree Bevineau
Emerging Writers
Law enforcement agencies are in desperate need for reform to prevent further damage to the land of the free and home of the brave. The media, newspapers and articles portray the merciless treatment of civilians by police officers. Numerous innocent individuals, specifically the ethnic community, fall prey to police violence. This article examines the history of the lack of police training and proposes solutions for how police can be trained to better serve the community.
2021- The Twenty-Fifth Annual Symposium Of Student Scholars
2021- The Twenty-Fifth Annual Symposium Of Student Scholars
Symposium of Student Scholars Program Books
The full program book from the Twenty-fifth Annual Symposium of Student Scholars, held on April 29, 2021. Includes abstracts from the presentations and posters.
Spring 2021, Joëlle Walls
Spring 2021, Joëlle Walls
The Investigator Research Magazine
Dear readers,
We are proud to present the spring issue of The Investigator and share with you the expansion of diverse research and scholarly activities occurring at Kennesaw State. Although this year was met with challenges, KSU’s research enterprise has thrived and grown.
In this issue, Pamela Whitten discussed the establishment of the Interdisciplinary Innovation Initiative, an internal funding program to spur new collaborations focused on KSU’s research themes. And alumni Carl Saint-Louis and Karen Armstrong, featured in our cover story, have returned as faculty to mentor the next generation.
This publication would not have been possible without the visual …
Applying High Impact Practices In An Interdisciplinary Cybersecurity Program, Brian K. Payne, Lisa Mayes, Tisha Paredes, Elizabeth Smith, Hongyi Wu, Chunsheng Xin
Applying High Impact Practices In An Interdisciplinary Cybersecurity Program, Brian K. Payne, Lisa Mayes, Tisha Paredes, Elizabeth Smith, Hongyi Wu, Chunsheng Xin
Journal of Cybersecurity Education, Research and Practice
The Center for Cybersecurity Education and Research at Old Dominion University has expanded its use of high impact practices in the university’s undergraduate cybersecurity degree program. Strategies developed to promote student learning included learning communities, undergraduate research, a robust internship program, service learning, and electronic portfolios. This paper reviews the literature on these practices, highlights the way that they were implemented in our cybersecurity program, and discusses some of the challenges encountered with each practice. Although the prior literature on high impact practices rarely touches on cybersecurity coursework, the robust evidence of the success of those practices provides a sound …
Importance-Performance Gap Analysis Of The University Brand Equity Dimensions, Tulay Girard, Musa Pinar
Importance-Performance Gap Analysis Of The University Brand Equity Dimensions, Tulay Girard, Musa Pinar
Atlantic Marketing Journal
This study examines the gaps between the importance students place on brand equity dimensions and their perceptions of how well their university performs on each dimension. It also assesses if the brand equity dimensions differ based on student demographics including gender, class level, and their living arrangement. Data were collected from a university in the Midwestern U.S. from undergraduate students. The findings reveal significant gaps between the importance and performance perceptions of students, and that females, students living on campus, and freshman require special
A Serious Game For Social Engineering Awareness Creation, Fabian Muhly, Philipp Leo, Stefano Caneppele
A Serious Game For Social Engineering Awareness Creation, Fabian Muhly, Philipp Leo, Stefano Caneppele
Journal of Cybersecurity Education, Research and Practice
Social engineering is a method used by offenders to deceive their targets utilizing rationales of human psychology. Offenders aim to exploit information and use them for intelligence purposes or financial gains. Generating resilience against these malicious methods is still challenging. Literature shows that serious gaming learning approaches are used more frequently to instill lasting retention effects. Serious games are interactive, experiential learning approaches that impart knowledge about rationales and concepts in a way that fosters retention. In three samples and totally 97 participants the study at hand evaluated a social engineering serious game for participants’ involvement and instruction compliance during …