Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Education

Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang Nov 2023

Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang

Journal of Cybersecurity Education, Research and Practice

Recent advances in Artificial Intelligence (AI) have brought society closer to the long-held dream of creating machines to help with both common and complex tasks and functions. From recommending movies to detecting disease in its earliest stages, AI has become an aspect of daily life many people accept without scrutiny. Despite its functionality and promise, AI has inherent security risks that users should understand and programmers must be trained to address. The ICE (integrity, confidentiality, and equity) cybersecurity labs developed by a team of cybersecurity researchers addresses these vulnerabilities to AI models through a series of hands-on, inquiry-based labs. Through …


Security Simulations In Undergraduate Education: A Review, Joseph Simpson, Aaron Brantly Jul 2022

Security Simulations In Undergraduate Education: A Review, Joseph Simpson, Aaron Brantly

Journal of Cybersecurity Education, Research and Practice

Several decades of research in simulation and gamification in higher education shows that simulations are highly effective in improving a range of outcomes for students including declarative knowledge and interest in the topic being taught. While there appears to be a broad array of options to provide education in an undergraduate setting related to security, no previous reviews have explored computer-based simulations covering all facets of security. Given the increasing importance and adoption of interdisciplinary educational programs, it is important to take stock of simulations as a tool to broaden the range of problems, perspectives, and solutions presented to students. …


Refugee Resettlement In The U.S.: The Hidden Realities Of The U.S. Refugee Integration Process, Bienvenue Konsimbo Dec 2019

Refugee Resettlement In The U.S.: The Hidden Realities Of The U.S. Refugee Integration Process, Bienvenue Konsimbo

Master of Science in Conflict Management Final Projects

From the 1946 to the 1980 Act, more than two million refugees have resettled in the U.S. (Eby, Iverson, Smyers, & Kekic, 2011p.). This has made the U.S. the largest of the 10 resettlement countries (Xu, 2007, p. 38). The U.S. department of state (DOS)’ hope is to give “the refugee a leg up on their journey to self-sufficiency” (Darrow, 2015, p. 92). For these millions of refugees, their expectations are to find “employment, education, to provide a better environment for their children, and to integrate into the community” (Xu, 2007p.38).

However, this pre-package deal is not without repercussions or …


Using Case Studies To Teach Cybersecurity Courses, Yu Cai Dec 2018

Using Case Studies To Teach Cybersecurity Courses, Yu Cai

Journal of Cybersecurity Education, Research and Practice

This paper introduces a holistic and case-analysis teaching model by integrating case studies into cybersecurity courses. The proposed model starts by analyzing real-world cyber breaches. Students look into the details of these attacks and learn how these attacks took place from the beginning to the end. During the process of case analysis, a list of security topics reflecting different aspects of these breaches is introduced. Through guided in-class discussion and hands-on lab assignments, student learning in lecture will be reinforced. Overall, the entire cybersecurity course is driven by case studies. The proposed model is great for teaching cybersecurity. First, the …


A Security And Privacy Framework For E-Learning, Radwan Ali, Humayun Zafar Aug 2017

A Security And Privacy Framework For E-Learning, Radwan Ali, Humayun Zafar

Faculty and Research Publications

Prior research in the e-learning area has appeared with a focus on its adoption aspects. Limited research has been carried out solely on the interplay between e-learning and security and privacy. Considering the wide acceptance of e-learning, and a plethora of cybersecurity breach incidents, it is surprising that the two topics have not been discussed together. An effective e-learning environment depends on stakeholders who understand the importance of security and behave responsibly within it. In this paper, we present a conceptual model that looks at some of the information security and privacy factors related to e-learning.