Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Business (2)
- Computer Sciences (2)
- Information Security (2)
- Physical Sciences and Mathematics (2)
- Artificial Intelligence and Robotics (1)
-
- Data Science (1)
- Educational Administration and Supervision (1)
- Educational Technology (1)
- Engineering (1)
- Higher Education Administration (1)
- Management Information Systems (1)
- Nuclear Engineering (1)
- OS and Networks (1)
- Online and Distance Education (1)
- Social and Behavioral Sciences (1)
- Sports Management (1)
- Systems Architecture (1)
- Technology and Innovation (1)
- Institution
Articles 1 - 4 of 4
Full-Text Articles in Education
Venue Safety Strategies: Guardrails And The Line-Of-Sight Exemption, Gil Fried, Aneurin Grant
Venue Safety Strategies: Guardrails And The Line-Of-Sight Exemption, Gil Fried, Aneurin Grant
Journal of Applied Sport Management
This piece represents a focused article on safety issues connected to railings at sporting events and why there needs to be considerable action taken to protect fans. Specifically, the authors believe the current line-of-sight exception (minimum 26") allows for railings that are dangerously inadequate to protect fans. It is argued that if sport facility managers and or venues do not proactively address this railing height issue, then architects, building inspectors, and others should seek to change the building code to eliminate the fans continued exposure to unnecessary hazards.
Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang
Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang
Journal of Cybersecurity Education, Research and Practice
Recent advances in Artificial Intelligence (AI) have brought society closer to the long-held dream of creating machines to help with both common and complex tasks and functions. From recommending movies to detecting disease in its earliest stages, AI has become an aspect of daily life many people accept without scrutiny. Despite its functionality and promise, AI has inherent security risks that users should understand and programmers must be trained to address. The ICE (integrity, confidentiality, and equity) cybersecurity labs developed by a team of cybersecurity researchers addresses these vulnerabilities to AI models through a series of hands-on, inquiry-based labs. Through …
Remote Laboratory For Nuclear Security Education, Anthony R. Galindo, Craig Marianno
Remote Laboratory For Nuclear Security Education, Anthony R. Galindo, Craig Marianno
International Journal of Nuclear Security
Laboratory experiences for online students are very limited. To fill this gap, educators in the Department of Nuclear Engineering at Texas A&M University developed a series of radiation detection experiments for their remote students. Radiation detection is only one piece of nuclear security. The objective of the current research is to describe the development and execution of three online laboratories that investigate the basic application of physical security sensors that use light, ultrasonics, and heat to detect adversaries. This laboratory complements lecture material from the department’s Nuclear Security System and Design course. Using the Remote Desktop Application, students connect to …
Future Trends And Directions For Secure Infrastructure Architecture In The Education Sector: A Systematic Review Of Recent Evidence, Isaac Atta Senior Ampofo, Isaac Atta Junior Ampofo
Future Trends And Directions For Secure Infrastructure Architecture In The Education Sector: A Systematic Review Of Recent Evidence, Isaac Atta Senior Ampofo, Isaac Atta Junior Ampofo
Journal of Research Initiatives
The most efficient approach to giving large numbers of students’ access to computational resources is through a data center. A contemporary method for building the data center's computer infrastructure is the software-defined model, which enables user tasks to be processed in a reasonable amount of time and at a reasonable cost. The researcher examines potential directions and trends for a secured infrastructure design in this article. Additionally, interoperable, highly reusable modules that can include the newest trends in the education industry are made possible by cloud-based educational software. The Reference Architecture for University Education System Using AWS Services is presented …