Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Online and Distance Education (3)
- Business (2)
- Computer Sciences (2)
- Curriculum and Social Inquiry (2)
- Educational Assessment, Evaluation, and Research (2)
-
- Educational Methods (2)
- Educational Technology (2)
- Information Security (2)
- Other Education (2)
- Physical Sciences and Mathematics (2)
- Social and Behavioral Sciences (2)
- Sociology (2)
- Accessibility (1)
- African American Studies (1)
- Arts and Humanities (1)
- Disability and Equity in Education (1)
- E-Commerce (1)
- Education Law (1)
- Educational Administration and Supervision (1)
- Elementary and Middle and Secondary Education Administration (1)
- Gifted Education (1)
- Inequality and Stratification (1)
- Law (1)
- Management Information Systems (1)
- Other Educational Administration and Supervision (1)
- Race and Ethnicity (1)
- Race, Ethnicity and Post-Colonial Studies (1)
- Science and Mathematics Education (1)
- Secondary Education (1)
Articles 1 - 5 of 5
Full-Text Articles in Education
Ways To Make Cybersecurity Education/Opportunities More Accessible In The Philippine Public School System, Joshua Oania
Ways To Make Cybersecurity Education/Opportunities More Accessible In The Philippine Public School System, Joshua Oania
Cybersecurity Undergraduate Research Showcase
This paper will examine how the Philippines can make cybersecurity education more accessible in their public school system. The solutions it proposes include making cybersecurity a part of the school curriculum, creating summer/internship programs for Junior and Senior High School students in multiple different areas within cybersecurity, and providing basic infrastructure and resources for students to meet their educational needs and aspirations.
The Underrepresentation Of Black Females In Cybersecurity, Makendra Latrice Crosby
The Underrepresentation Of Black Females In Cybersecurity, Makendra Latrice Crosby
Cybersecurity Undergraduate Research Showcase
The significance of cybersecurity methods, strategies, and programs in protecting computers and electronic devices is crucial throughout the technological infrastructure. Despite the considerable growth in the cybersecurity field and its expansive workforce, there exists a notable underrepresentation, specifically among Black/African American females. This study examines the barriers hindering the inclusion of Black women in the cybersecurity workforce such as socioeconomic factors, limited educational access, biases, and workplace culture. The urgency of addressing these challenges calls for solutions such as education programs, mentorship initiatives, creating inclusive workplace environments, and promoting advocacy and increased awareness within the cybersecurity field. Additionally, this paper …
Digital Crime Prevention Is Possible, Michael Kennedy
Digital Crime Prevention Is Possible, Michael Kennedy
Cybersecurity Undergraduate Research Showcase
Purpose & Objective of paper:
My objective of this research paper is to inform others about the importance of Cybercrime prevention. I shed light on the harsh reality of the internet. This allowed me to showcase efficient methods to protect them from trending digital crimes if they were to occur. Protecting individuals, businesses, and importantly financial losses from phishing, cyberbullying, and non-payment is my ultimate purpose of this paper.
Methods of research:
My methods of research ultimately relied on public resources and books. A major reason why I decided to take that path. None of my peers would have access …
How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim
How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim
Cybersecurity Undergraduate Research Showcase
The powers of OpenAI's groundbreaking AI language model, ChatGPT, startled millions of users when it was released in November. But for many, the tool's ability to further accomplish the goals of evil actors swiftly replaced their initial excitement with significant concerns. ChatGPT gives malicious actors additional ways to possibly compromise sophisticated cybersecurity software. Leaders in a sector that is currently suffering from a 38% global spike in data breaches in 2022 must acknowledge the rising influence of AI and take appropriate action. Cybercriminals are writing more complex and focused business email compromise (BEC) and other phishing emails with the assistance …
Applicable Mitigation Strategies And Technology Propositions: Preventing Scamming In Marginalized Populations, Grace Nicole Sandhofer-Adams
Applicable Mitigation Strategies And Technology Propositions: Preventing Scamming In Marginalized Populations, Grace Nicole Sandhofer-Adams
Cybersecurity Undergraduate Research Showcase
This essay serves as a proposal for new technology and mitigation against the scamming of marginalized individuals (i.e., those over the age of 65). Research supports this outline, giving background to the types of scams, and prevention strategies currently seen in the cybersecurity landscape. It is evident that the methods we currently use to combat scamming attacks are not effective, therefore, I propose a new solution. This proposed telecommunications strategy is necessary to prevent scamming of all internet users, no matter the device. This telecommunication strategy would use artificial intelligence and machine learning to constantly improve its detection over time, …