Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 22 of 22

Full-Text Articles in Education

Employee Attrition: Analyzing Factors Influencing Job Satisfaction Of Ibm Data Scientists, Graham Nash Apr 2023

Employee Attrition: Analyzing Factors Influencing Job Satisfaction Of Ibm Data Scientists, Graham Nash

Symposium of Student Scholars

Employee attrition is a relevant issue that every business employer must consider when gauging the effectiveness of their employees. Whether or not an employee chooses to leave their job can come from a multitude of factors. As a result, employers need to develop methods in which they can measure attrition by calculating the several qualities of their employees. Factors like their age, years with the company, which department they work in, their level of education, their job role, and even their marital status are all considered by employers to assist in predicting employee attrition. This project will be analyzing a …


Towards The Development And Assessment Of A Method For Educating Users Into Choosing Complex, Memorable Passphrases, Juan M. Madrid, Yair Levy, Laurie Dringus, Ling Wang Nov 2022

Towards The Development And Assessment Of A Method For Educating Users Into Choosing Complex, Memorable Passphrases, Juan M. Madrid, Yair Levy, Laurie Dringus, Ling Wang

KSU Proceedings on Cybersecurity Education, Research and Practice

The currently most used method for authentication is the password because it is simple to implement, and computer users are very familiarized with it. However, passwords are vulnerable to attacks that can be mitigated by increasing the complexity of the chosen password, particularly in terms of length. One possible approach to accomplish this is through the usage of passphrases, which can be easier to remember than a standard password, thus reducing the loss of work time and productivity related to forgotten passwords. To achieve the required balance between complexity and memorability, the concept of passphrase categories can be used, i.e. …


Multidisciplinarity In Data Science Curricula, Hossana Twinomurinzi, Siyabonga Mhlongo, Kelvin J. Bwalya, Tebogo Bokaba, Steven Mbeya Aug 2022

Multidisciplinarity In Data Science Curricula, Hossana Twinomurinzi, Siyabonga Mhlongo, Kelvin J. Bwalya, Tebogo Bokaba, Steven Mbeya

African Conference on Information Systems and Technology

This paper sought to identify and compare disciplinary emphases in data science curricula across South Africa’s 26 public universities using a website scoping review method. The key findings reveal that only 12 of the 26 universities offer data science programmes that are publicly accessible on their websites. Of those 12, only 5 offer data science at the undergraduate level, and these undergraduate programmes are objectified (entirely leaning) to the science, technology, engineering, and mathematics (STEM) disciplines. Only seven of the universities offer a few non-STEM subjects with only one offering more non-STEM subjects compared to STEM subjects. The implications are …


Adapting An Online Learning Quality Assurance Framework In A Developing Country Setting: The Case Of A Hei In Malawi, Bennett Kankuzi, Menard Phiri, Robert Chanunkha, Jonathan Makuwira, Paul Makocho Aug 2022

Adapting An Online Learning Quality Assurance Framework In A Developing Country Setting: The Case Of A Hei In Malawi, Bennett Kankuzi, Menard Phiri, Robert Chanunkha, Jonathan Makuwira, Paul Makocho

African Conference on Information Systems and Technology

Covid-19 prompted many higher education institutions (HEIs), even in developing countries like Malawi, to abruptly shift from their traditional face-to-face mode of delivery to online learning. However, quality issues with online learning remain one of the greatest challenges to acceptance of online learning by many students and stakeholders. This paper presents an action research based study at the Malawi University of Science and Technology, in which an online learning quality assurance framework is adapted to a developed country setting. The adapted framework builds on the Online Learning Consortium (OLC) Quality Scorecard for the Administration of Online Programs. The contextualization and …


General Chemistry Students’ Cognitive Engagement And What They Attend To During A Three-Dimensional Modeling Activity Focused On Chemical And Physical Properties Of Coordination Complexes, Hailey Knoeferl, Tiyana Mccullough, Tia Gordon, Cassidy Terrell, Adriane Randolph, Kimberly Linenberger Cortes Apr 2022

General Chemistry Students’ Cognitive Engagement And What They Attend To During A Three-Dimensional Modeling Activity Focused On Chemical And Physical Properties Of Coordination Complexes, Hailey Knoeferl, Tiyana Mccullough, Tia Gordon, Cassidy Terrell, Adriane Randolph, Kimberly Linenberger Cortes

Symposium of Student Scholars

In chemistry, three-dimensional models are being used to help students comprehend advanced topics within the subject. Because a greater cognitive load is often related to three-dimensional models, learning what raises the cognitive load and determining the best way to measure it is critical. From there, steps can be taken to help lower the cognitive load and make the material easier for students to comprehend. To understand cognitive load concerning models, students were presented with physical three-dimensional models of various coordination complexes and asked to determine bond angles, the metal present in the complex, polarity, and to draw possible isomers and …


Internet Affects All Areas Of The World: A Quantitative Report On Canadians Internet Usage, Kristina Sims Apr 2022

Internet Affects All Areas Of The World: A Quantitative Report On Canadians Internet Usage, Kristina Sims

Symposium of Student Scholars

The Internet has had a significant influence on modern life with Pew research reporting that 99% of American adults between the ages of 18-29 used the internet in 2021 with reported reduced internet use for older Americans. Both positive and negative consequences can be attributed to its widespread use. In attending Kennesaw State University internet use is almost mandatory to successfully complete coursework. Witnessing how active internet use is in collegiate age populations in the US is has sparked some curiosity of use in Canadian residents. The survey on "Canadian Internet Use", in the year 2018 was designed to measure …


How Graduate Student Fellows Enhance What A Center For Digital Scholarship Does, Ben B. Chiewphasa Mar 2022

How Graduate Student Fellows Enhance What A Center For Digital Scholarship Does, Ben B. Chiewphasa

Transforming Libraries for Graduate Students

Multiple disciplines are increasingly embracing data science and digital scholarship. However, insufficient training for digital and computational methodologies within subject/departmental silos means that these needs often get overlooked. Opportunities for learning how to teach technical concepts (i.e., how to handle troubleshooting, live participatory coding, etc.) are also rare or non-existent via departmental offerings. To respond to these needs, the Navari Family Center for Digital Scholarship launched its Pedagogy Fellowship Program in Fall 2021 where Notre Dame PhD students/candidates build their instructional expertise and experience related to digital scholarship with an added bonus of enhancing their competitiveness on the job market. …


Access To Higher Education: Do Schools “Grant” Success?, Nathaniel Jones May 2021

Access To Higher Education: Do Schools “Grant” Success?, Nathaniel Jones

Symposium of Student Scholars

University education can lead to upward income mobility for low-income students. Being exposed to other student’s life experiences that are different from their own may highlight activities and actions that they may want to consider aiding their success. According to the U.S. Bureau of Labor Statistics, the median weekly earnings in 2019 for all workers in the U.S. was $969. Of those, U.S. workers who held bachelor’s degrees earned $1,248. In 2016, the Brookings Institute found that Pell Grant recipients and first-generation student loan borrowers attended universities that had lower graduation rates and higher loan default rates in comparison to …


A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad Oct 2020

A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad

KSU Proceedings on Cybersecurity Education, Research and Practice

Serious games can challenge users in competitive and entertaining ways. Educators have used serious games to increase student engagement in cybersecurity education. Serious games have been developed to teach students various cybersecurity topics such as safe online behavior, threats and attacks, malware, and more. They have been used in cybersecurity training and education at different levels. Serious games have targeted different audiences such as K-12 students, undergraduate and graduate students in academic institutions, and professionals in the cybersecurity workforce. In this paper, we provide a survey of serious games used in cybersecurity education and training. We categorize these games into …


Introduction To Latex, Elizabeth J. Weisbrod Mar 2020

Introduction To Latex, Elizabeth J. Weisbrod

Transforming Libraries for Graduate Students

LaTeX is a document preparation system used in a wide variety of disciplines. Originally written for mathematics, LaTeX is now used throughout the sciences and in fields as diverse as linguistics, economics, and political science. With LaTeX, users can create professional-looking articles, lab reports, and presentations with complex mathematical expressions.

LaTeX is widely used, especially in the sciences, but the learning curve for LaTeX is steep and can be daunting to new users. While it may be necessary for future success in the student’s discipline, getting started with LaTeX can be a significant hurdle. For graduate students, a structured introduction …


Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez Oct 2019

Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez

KSU Proceedings on Cybersecurity Education, Research and Practice

Cybersecurity and Information Technology Management programs have many similarities and many similar knowledge, skills, and abilities are taught across both programs. The skill mappings for the NICE Framework and the knowledge units required to become a National Security Agency and Department of Homeland Security Center of Academic Excellence in Cyber Defense Education contain many information technology management functions. This paper explores one university’s perception on how a joint Cybersecurity and Information Technology Management program could be developed to upskill students to be work force ready.


Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz Oct 2019

Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz

KSU Proceedings on Cybersecurity Education, Research and Practice

Today’s college and university cybersecurity programs often contain multiple laboratory activities on various different hardware and software-based cybersecurity tools. These include preventive tools such as firewalls, virtual private networks, and intrusion detection systems. Some of these are tools used in attacking a network, such as packet sniffers and learning how to craft cross-site scripting attacks or man-in-the-middle attacks. All of these are important in learning cybersecurity. However, there is another important component of cybersecurity education – teaching students how to protect a system or network from attackers by learning their motivations, and how they think, developing the students’ “abilities to …


Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley Oct 2018

Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to examine the outcomes of using a Learning Management System (LMS) course as a framework for mapping the Centers of Academic Excellence in Cyber Defense (CAE-CD) 2019 Knowledge Units (KU) to college courses. The experience shared herein will be useful to faculty who are interested in performing the mapping and applying for CAE-CDE designation.


Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley Oct 2018

Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to discuss a curriculum design that employs Kolb’s Experiential Learning Theory stages and Kolb’s Learning Styles in four consecutive class sessions. The challenge each class is to present students with perplexing and often frustrating network problems that someday might be encountered on the job. By using Kolb’s theory, students address those problems from the perspective of each learning style, while passing through each phase of the learning cycle. As a result, students gain stronger cognitive thinking skills and hands-on troubleshooting skills in preparation for work as network administrators or cybersecurity analysts.


Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne Oct 2018

Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne

KSU Proceedings on Cybersecurity Education, Research and Practice

In most wireless channels, the signals propagate in all directions. For the communication between Alice and Bob, an Eavesdropper can receive the signals from both Alice and Bob as far as the Eavesdropper is in the range determined by the transmitting power. Through phased array antenna with beam tracking circuits or cooperative iteration, the signals are confined near the straight line connecting the positions of Alice and Bob, so it will largely reduce the valid placement of an Eavesdropper. Sometimes, this reduction can be prohibitive for Eavesdropper to wiretap the channel since the reduced space can be readily protected. Two …


Evaluating Two Hands-On Tools For Teaching Local Area Network Vulnerabilities, Ariana Brown, Jinsheng Xu, Xiaohong Yuan Oct 2018

Evaluating Two Hands-On Tools For Teaching Local Area Network Vulnerabilities, Ariana Brown, Jinsheng Xu, Xiaohong Yuan

KSU Proceedings on Cybersecurity Education, Research and Practice

According to the Verizon’s Data Breach Investigations Report, Local Area Network (LAN) access is the top vector for insider threats and misuses. It is critical for students to learn these vulnerabilities, understand the mechanisms of exploits, and know the countermeasures. The department of Computer Science at North Carolina A&T State University designed two different educational tools that help students learn ARP Spoofing Attacks, which is the most popular attack on LAN. The first tool, called Hacker’s Graphical User Interface (HGUI), is a visualization tool that demonstrates ARP Spoofing Attack with real time animation. The second tool is a hands-on (HandsOn) …


Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang Oct 2017

Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang

KSU Proceedings on Cybersecurity Education, Research and Practice

Since web browsers have become essential to accomplishing everyday tasks, developing secure web applications has become a priority in order to protect user data, corporate databases and critical infrastructure against cyber-crimes . This research presents a game-like (gamification) approach to teach key concepts and skills on how to develop secure web applications. Gamification draws on motivational models, one of psychological theories. Gamification design has great potential over traditional education where we often find students demotivated and lecturers failing to engage them in learning activities. This research created game-like learning modules to teach top vulnerabilities and countermeasures for these top vulnerabilities …


Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia Oct 2016

Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia

KSU Proceedings on Cybersecurity Education, Research and Practice

The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …


Teaching Security Of Internet Of Things In Using Raspberrypi, Oliver Nichols, Li Yang, Xiaohong Yuan Oct 2016

Teaching Security Of Internet Of Things In Using Raspberrypi, Oliver Nichols, Li Yang, Xiaohong Yuan

KSU Proceedings on Cybersecurity Education, Research and Practice

The Internet of Things (IoTs) is becoming a reality in today’s society. The IoTs can find its application in multiple domains including healthcare, critical infrastructure, transportation, and home and personal use. It is important to teach students importance and techniques that are essential in protecting IoTs. We design a series of hands-on labs in a smart home setting, which can exercise attack and protection of IoTs. Our hands-on labs use a Raspberry Pi and several diverse smart things that communicate through Z-Wave technology. Using this environment, students can operate a home automation system and learn security concepts by performing these …


Developing And Using Evidence-Based E-Learning Videos For Cybersecurity Education, Wu He, Xin Tian, Mohd Anwar Oct 2016

Developing And Using Evidence-Based E-Learning Videos For Cybersecurity Education, Wu He, Xin Tian, Mohd Anwar

KSU Proceedings on Cybersecurity Education, Research and Practice

To help people improve their knowledge and security self-efficacy in dealing with malware attacks that are relevant and meaningful to their organizations, we recently developed over 30 e-learning videos based on the major types of malware attacks we captured using the state-of-the-art anti-malware solution. The preliminary evaluation results of the videos are quite positive and indicate that these evidence-based e-learning videos have great potential to increase users’ security self-efficacy.


Teaching Static Call Analysis To Detect Anomalous Software Behavior, Jordan Shropshire, Philip Menard Oct 2016

Teaching Static Call Analysis To Detect Anomalous Software Behavior, Jordan Shropshire, Philip Menard

KSU Proceedings on Cybersecurity Education, Research and Practice

Malicious code detection is a critical part of any cyber security operation. Typically, the behavior of normal applications is modeled so that deviations from normal behavior can be identified. There are multiple approach to modeling good behavior but the most common approach is to observe applications’ system call activity. System calls are messages passed between user space applications and their underlying operating systems. The detection of irregular system call activity signals the presence of malicious software behavior. This method of malware-detection has been used successfully for almost two decades. Unfortunately, it can be difficult to cover this concept at the …


Georgia Knowledge Repository: Potential For The State, Marlee Givens Mar 2011

Georgia Knowledge Repository: Potential For The State, Marlee Givens

Giving Undergraduate Research a Worldwide Voice: Institutional Repositories as Publishers

A presentation on the Georgia Knowledge Repository, a search engine of Georgia-based institutional repositories.

More information at http://www.library.gatech.edu/gkr/