Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Educational Technology (5)
- Online and Distance Education (4)
- Science and Mathematics Education (4)
- Social and Behavioral Sciences (4)
- Computer Sciences (3)
-
- Curriculum and Social Inquiry (3)
- Educational Methods (3)
- Engineering (3)
- Physical Sciences and Mathematics (3)
- Accessibility (2)
- Arts and Humanities (2)
- Business (2)
- Computer Engineering (2)
- Disability and Equity in Education (2)
- Educational Assessment, Evaluation, and Research (2)
- Engineering Education (2)
- Information Security (2)
- Other Education (2)
- Social Justice (2)
- Sociology (2)
- African American Studies (1)
- Art Education (1)
- Art and Design (1)
- Disability Studies (1)
- E-Commerce (1)
- Education Law (1)
- Educational Administration and Supervision (1)
- Elementary and Middle and Secondary Education Administration (1)
- Game Design (1)
- Keyword
Articles 1 - 9 of 9
Full-Text Articles in Education
Ways To Make Cybersecurity Education/Opportunities More Accessible In The Philippine Public School System, Joshua Oania
Ways To Make Cybersecurity Education/Opportunities More Accessible In The Philippine Public School System, Joshua Oania
Cybersecurity Undergraduate Research Showcase
This paper will examine how the Philippines can make cybersecurity education more accessible in their public school system. The solutions it proposes include making cybersecurity a part of the school curriculum, creating summer/internship programs for Junior and Senior High School students in multiple different areas within cybersecurity, and providing basic infrastructure and resources for students to meet their educational needs and aspirations.
The Underrepresentation Of Black Females In Cybersecurity, Makendra Latrice Crosby
The Underrepresentation Of Black Females In Cybersecurity, Makendra Latrice Crosby
Cybersecurity Undergraduate Research Showcase
The significance of cybersecurity methods, strategies, and programs in protecting computers and electronic devices is crucial throughout the technological infrastructure. Despite the considerable growth in the cybersecurity field and its expansive workforce, there exists a notable underrepresentation, specifically among Black/African American females. This study examines the barriers hindering the inclusion of Black women in the cybersecurity workforce such as socioeconomic factors, limited educational access, biases, and workplace culture. The urgency of addressing these challenges calls for solutions such as education programs, mentorship initiatives, creating inclusive workplace environments, and promoting advocacy and increased awareness within the cybersecurity field. Additionally, this paper …
Digital Crime Prevention Is Possible, Michael Kennedy
Digital Crime Prevention Is Possible, Michael Kennedy
Cybersecurity Undergraduate Research Showcase
Purpose & Objective of paper:
My objective of this research paper is to inform others about the importance of Cybercrime prevention. I shed light on the harsh reality of the internet. This allowed me to showcase efficient methods to protect them from trending digital crimes if they were to occur. Protecting individuals, businesses, and importantly financial losses from phishing, cyberbullying, and non-payment is my ultimate purpose of this paper.
Methods of research:
My methods of research ultimately relied on public resources and books. A major reason why I decided to take that path. None of my peers would have access …
How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim
How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim
Cybersecurity Undergraduate Research Showcase
The powers of OpenAI's groundbreaking AI language model, ChatGPT, startled millions of users when it was released in November. But for many, the tool's ability to further accomplish the goals of evil actors swiftly replaced their initial excitement with significant concerns. ChatGPT gives malicious actors additional ways to possibly compromise sophisticated cybersecurity software. Leaders in a sector that is currently suffering from a 38% global spike in data breaches in 2022 must acknowledge the rising influence of AI and take appropriate action. Cybercriminals are writing more complex and focused business email compromise (BEC) and other phishing emails with the assistance …
Simulating Function Generators And Oscilloscopes In A Virtual Laboratory Environment, Yiyang Li, Yuzhong Shen, Charles I. Sukenik
Simulating Function Generators And Oscilloscopes In A Virtual Laboratory Environment, Yiyang Li, Yuzhong Shen, Charles I. Sukenik
Modeling, Simulation and Visualization Student Capstone Conference
This paper discusses the development of a virtual laboratory for simulating electronic instruments commonly used in science and engineering courses, such as function generators and digital storage oscilloscopes. Mathematical equations are used to represent continuous signals and ensure signal integrity, while C# delegates are adopted to enable communication between simulated devices. The approach allows for loose coupling between software components and high cohesion of individual components, and can be applied to other virtual laboratory developments. The virtual laboratory provides a means for students to gain hands-on experience with electronic instruments and improve their understanding of theoretical concepts.
Digital Game-Based Approach To Math Learning For Students, Gul Ayaz, Katherine Smith
Digital Game-Based Approach To Math Learning For Students, Gul Ayaz, Katherine Smith
Modeling, Simulation and Visualization Student Capstone Conference
Mathematics is an important subject that is pervasive across many disciplines. It is also a subject that has proven to be challenging to both teach and learn. Students face many challenges with learning math such as a lack of motivation and anxiety. To address these challenges, game-based learning has become a popular approach to stimulate students and create a more positive classroom environment. It can serve as an alternative or supplement to traditional teaching and can better engage students while developing a positive attitude toward learning. The use of games in a classroom can create a more exciting and engaging …
Promoting Skills In Children And Teens With Autism Spectrum Disorder Through Play And Steam, Meaghan Mcleod Mozingo, Krzysztof J. Rechowicz
Promoting Skills In Children And Teens With Autism Spectrum Disorder Through Play And Steam, Meaghan Mcleod Mozingo, Krzysztof J. Rechowicz
Modeling, Simulation and Visualization Student Capstone Conference
Individuals with autism spectrum disorder (ASD) have a low employment rate. This is caused by a lack of support from employment resources and the negative stigma associated with common characteristics associated with ASD. With limited career-building activities and events, it is difficult for individuals with ASD to identify their skills, strengths, and career opportunities. Parental support is crucial when seeking employment opportunities for their children. Through the use of play, children with ASD engaged and explored their skills with science, technology, engineering, arts, and math-centered activities. This paper highlights the events and shows the proposed redesign for an additional workshop.
Applicable Mitigation Strategies And Technology Propositions: Preventing Scamming In Marginalized Populations, Grace Nicole Sandhofer-Adams
Applicable Mitigation Strategies And Technology Propositions: Preventing Scamming In Marginalized Populations, Grace Nicole Sandhofer-Adams
Cybersecurity Undergraduate Research Showcase
This essay serves as a proposal for new technology and mitigation against the scamming of marginalized individuals (i.e., those over the age of 65). Research supports this outline, giving background to the types of scams, and prevention strategies currently seen in the cybersecurity landscape. It is evident that the methods we currently use to combat scamming attacks are not effective, therefore, I propose a new solution. This proposed telecommunications strategy is necessary to prevent scamming of all internet users, no matter the device. This telecommunication strategy would use artificial intelligence and machine learning to constantly improve its detection over time, …
How Does Suspension Affect Black People's Freedom?, Alexa Boggan
How Does Suspension Affect Black People's Freedom?, Alexa Boggan
Undergraduate Research Symposium
Education is a key to a successful future, and all students no matter their racial background or income level should have the same opportunities. Questioning the disparity in the quality of education in America leaves policy makers with the task of making local, state or national policies that will improve educational quality and accessibility--putting an end to the inequality many students are facing.