Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Education

Ways To Make Cybersecurity Education/Opportunities More Accessible In The Philippine Public School System, Joshua Oania Dec 2023

Ways To Make Cybersecurity Education/Opportunities More Accessible In The Philippine Public School System, Joshua Oania

Cybersecurity Undergraduate Research Showcase

This paper will examine how the Philippines can make cybersecurity education more accessible in their public school system. The solutions it proposes include making cybersecurity a part of the school curriculum, creating summer/internship programs for Junior and Senior High School students in multiple different areas within cybersecurity, and providing basic infrastructure and resources for students to meet their educational needs and aspirations.


The Underrepresentation Of Black Females In Cybersecurity, Makendra Latrice Crosby Dec 2023

The Underrepresentation Of Black Females In Cybersecurity, Makendra Latrice Crosby

Cybersecurity Undergraduate Research Showcase

The significance of cybersecurity methods, strategies, and programs in protecting computers and electronic devices is crucial throughout the technological infrastructure. Despite the considerable growth in the cybersecurity field and its expansive workforce, there exists a notable underrepresentation, specifically among Black/African American females. This study examines the barriers hindering the inclusion of Black women in the cybersecurity workforce such as socioeconomic factors, limited educational access, biases, and workplace culture. The urgency of addressing these challenges calls for solutions such as education programs, mentorship initiatives, creating inclusive workplace environments, and promoting advocacy and increased awareness within the cybersecurity field. Additionally, this paper …


Digital Crime Prevention Is Possible, Michael Kennedy Dec 2023

Digital Crime Prevention Is Possible, Michael Kennedy

Cybersecurity Undergraduate Research Showcase

Purpose & Objective of paper:

My objective of this research paper is to inform others about the importance of Cybercrime prevention. I shed light on the harsh reality of the internet. This allowed me to showcase efficient methods to protect them from trending digital crimes if they were to occur. Protecting individuals, businesses, and importantly financial losses from phishing, cyberbullying, and non-payment is my ultimate purpose of this paper.

Methods of research:

My methods of research ultimately relied on public resources and books. A major reason why I decided to take that path. None of my peers would have access …


How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim Dec 2023

How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim

Cybersecurity Undergraduate Research Showcase

The powers of OpenAI's groundbreaking AI language model, ChatGPT, startled millions of users when it was released in November. But for many, the tool's ability to further accomplish the goals of evil actors swiftly replaced their initial excitement with significant concerns. ChatGPT gives malicious actors additional ways to possibly compromise sophisticated cybersecurity software. Leaders in a sector that is currently suffering from a 38% global spike in data breaches in 2022 must acknowledge the rising influence of AI and take appropriate action. Cybercriminals are writing more complex and focused business email compromise (BEC) and other phishing emails with the assistance …


Applicable Mitigation Strategies And Technology Propositions: Preventing Scamming In Marginalized Populations, Grace Nicole Sandhofer-Adams Apr 2023

Applicable Mitigation Strategies And Technology Propositions: Preventing Scamming In Marginalized Populations, Grace Nicole Sandhofer-Adams

Cybersecurity Undergraduate Research Showcase

This essay serves as a proposal for new technology and mitigation against the scamming of marginalized individuals (i.e., those over the age of 65). Research supports this outline, giving background to the types of scams, and prevention strategies currently seen in the cybersecurity landscape. It is evident that the methods we currently use to combat scamming attacks are not effective, therefore, I propose a new solution. This proposed telecommunications strategy is necessary to prevent scamming of all internet users, no matter the device. This telecommunication strategy would use artificial intelligence and machine learning to constantly improve its detection over time, …