Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (3)
- Information Security (3)
- Physical Sciences and Mathematics (3)
- Business (2)
- Curriculum and Instruction (2)
-
- Management Information Systems (2)
- Technology and Innovation (2)
- Adult and Continuing Education (1)
- Artificial Intelligence and Robotics (1)
- Educational Technology (1)
- Human Rights Law (1)
- Immigration Law (1)
- International Humanitarian Law (1)
- International and Area Studies (1)
- Law (1)
- Legal Studies (1)
- Natural Law (1)
- Online and Distance Education (1)
- Other Legal Studies (1)
- Peace and Conflict Studies (1)
- Public Affairs, Public Policy and Public Administration (1)
- Social Welfare Law (1)
- Social and Behavioral Sciences (1)
- Student Counseling and Personnel Services (1)
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Education
Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang
Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang
Journal of Cybersecurity Education, Research and Practice
Recent advances in Artificial Intelligence (AI) have brought society closer to the long-held dream of creating machines to help with both common and complex tasks and functions. From recommending movies to detecting disease in its earliest stages, AI has become an aspect of daily life many people accept without scrutiny. Despite its functionality and promise, AI has inherent security risks that users should understand and programmers must be trained to address. The ICE (integrity, confidentiality, and equity) cybersecurity labs developed by a team of cybersecurity researchers addresses these vulnerabilities to AI models through a series of hands-on, inquiry-based labs. Through …
Security Simulations In Undergraduate Education: A Review, Joseph Simpson, Aaron Brantly
Security Simulations In Undergraduate Education: A Review, Joseph Simpson, Aaron Brantly
Journal of Cybersecurity Education, Research and Practice
Several decades of research in simulation and gamification in higher education shows that simulations are highly effective in improving a range of outcomes for students including declarative knowledge and interest in the topic being taught. While there appears to be a broad array of options to provide education in an undergraduate setting related to security, no previous reviews have explored computer-based simulations covering all facets of security. Given the increasing importance and adoption of interdisciplinary educational programs, it is important to take stock of simulations as a tool to broaden the range of problems, perspectives, and solutions presented to students. …
Refugee Resettlement In The U.S.: The Hidden Realities Of The U.S. Refugee Integration Process, Bienvenue Konsimbo
Refugee Resettlement In The U.S.: The Hidden Realities Of The U.S. Refugee Integration Process, Bienvenue Konsimbo
Master of Science in Conflict Management Final Projects
From the 1946 to the 1980 Act, more than two million refugees have resettled in the U.S. (Eby, Iverson, Smyers, & Kekic, 2011p.). This has made the U.S. the largest of the 10 resettlement countries (Xu, 2007, p. 38). The U.S. department of state (DOS)’ hope is to give “the refugee a leg up on their journey to self-sufficiency” (Darrow, 2015, p. 92). For these millions of refugees, their expectations are to find “employment, education, to provide a better environment for their children, and to integrate into the community” (Xu, 2007p.38).
However, this pre-package deal is not without repercussions or …
Using Case Studies To Teach Cybersecurity Courses, Yu Cai
Using Case Studies To Teach Cybersecurity Courses, Yu Cai
Journal of Cybersecurity Education, Research and Practice
This paper introduces a holistic and case-analysis teaching model by integrating case studies into cybersecurity courses. The proposed model starts by analyzing real-world cyber breaches. Students look into the details of these attacks and learn how these attacks took place from the beginning to the end. During the process of case analysis, a list of security topics reflecting different aspects of these breaches is introduced. Through guided in-class discussion and hands-on lab assignments, student learning in lecture will be reinforced. Overall, the entire cybersecurity course is driven by case studies. The proposed model is great for teaching cybersecurity. First, the …
A Security And Privacy Framework For E-Learning, Radwan Ali, Humayun Zafar
A Security And Privacy Framework For E-Learning, Radwan Ali, Humayun Zafar
Faculty and Research Publications
Prior research in the e-learning area has appeared with a focus on its adoption aspects. Limited research has been carried out solely on the interplay between e-learning and security and privacy. Considering the wide acceptance of e-learning, and a plethora of cybersecurity breach incidents, it is surprising that the two topics have not been discussed together. An effective e-learning environment depends on stakeholders who understand the importance of security and behave responsibly within it. In this paper, we present a conceptual model that looks at some of the information security and privacy factors related to e-learning.