Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 12 of 12
Full-Text Articles in Engineering
Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd
Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd
Journal of Cybersecurity Education, Research and Practice
This paper should be of interest to the readers of this journal because it addresses a subject that has received little scholarly attention; namely, local government cybersecurity. The U.S. has over 90,000 units of local government, of which almost 39,000 are “general purpose” units (i.e., municipalities, counties, towns and townships). On average, these governments do not practice cybersecurity effectively (Norris, et al., 2019 and 2020). One possible reason is that they do not adopt and/or implement highly recommended cybersecurity policies. In this paper, we examine local government adoption or lack of adoption of cybersecurity policies using data from three surveys. …
Ict Security Tools And Techniques Among Higher Education Institutions: A Critical Review, Miko Nuñez, Xavier-Lewis Palmer, Lucas Potter, Chris Jordan Aliac, Lemuel Clark Velasco
Ict Security Tools And Techniques Among Higher Education Institutions: A Critical Review, Miko Nuñez, Xavier-Lewis Palmer, Lucas Potter, Chris Jordan Aliac, Lemuel Clark Velasco
Electrical & Computer Engineering Faculty Publications
Higher education institutions (HEIs) are increasingly relying on digital technologies for classroom and organizational management, but this puts them at higher risk for information and communication (ICT security attacks. Recent studies show that HEIs have experienced more security breaches in ICT security composed of both cybersecurity an information security. A literature review was conducted to identify common ICT security practices in HEIs over the last decade. 11 journal articles were profiled and analyzed, revealing threats to HEIs’ security and protective measures in terms of organizational security, technological security, physical security, and standards and frameworks. Security tools and techniques were grouped …
Removing The Veil: Shining Light On The Lack Of Inclusivity In Cybersecurity Education For Students With Disabilities, Felicia Hellems, Sajal Bhatia
Removing The Veil: Shining Light On The Lack Of Inclusivity In Cybersecurity Education For Students With Disabilities, Felicia Hellems, Sajal Bhatia
School of Computer Science & Engineering Faculty Publications
There are currently over one billion people living with some form of disability worldwide. The continuous increase in new technologies in today's society comes with an increased risk in security. A fundamental knowledge of cybersecurity should be a basic right available to all users of technology. A review of literature in the fields of cybersecurity, STEM, and computer science (CS) has revealed existent gaps regarding educational methods for teaching cybersecurity to students with disabilities (SWD's). To date, SWD's are largely left without equitable access to cybersecurity education. Our goal is to identify current educational methods being used to teach SWD's …
Digital Educational Modules Development For The Career And Technical Cybersecurity Pathways During The Covid-19 Pandemic, Vukica Jovanović, Murat Kuzlu, Otilia Popescu, Petros Katsioloudis, Linda Vahala, Michael Wu, Deborah Marshall, Michael Crespo, Mary Addison
Digital Educational Modules Development For The Career And Technical Cybersecurity Pathways During The Covid-19 Pandemic, Vukica Jovanović, Murat Kuzlu, Otilia Popescu, Petros Katsioloudis, Linda Vahala, Michael Wu, Deborah Marshall, Michael Crespo, Mary Addison
Engineering Technology Faculty Publications
Virtual learning has been used now for several decades, but it has never had a bigger impact on student learning than in the era of the COVID-19 pandemic. Universities and schools faced shutdowns all around the world, and teachers had to adapt rapidly to online mode of instruction. Many educators were faced with a triage approach with no previous experience in distance learning, a lack of resources for professional development, and already existing shortages of current educational modules that could assist them in their day-to-day jobs. This gap was especially evident in areas such as career and technical education (CTE) …
Unmanned Vehicle Systems & Operations On Air, Sea, Land, Randall K. Nichols, Hans. C. Mumm, Wayne D. Lonstein, Julie J.C.H Ryan, Candice M. Carter, John-Paul Hood, Jeremy S. Shay, Randall W. Mai, Mark J. Jackson
Unmanned Vehicle Systems & Operations On Air, Sea, Land, Randall K. Nichols, Hans. C. Mumm, Wayne D. Lonstein, Julie J.C.H Ryan, Candice M. Carter, John-Paul Hood, Jeremy S. Shay, Randall W. Mai, Mark J. Jackson
NPP eBooks
Unmanned Vehicle Systems & Operations On Air, Sea, Land is our fourth textbook in a series covering the world of Unmanned Aircraft Systems (UAS) and Counter Unmanned Aircraft Systems (CUAS). (Nichols R. K., 2018) (Nichols R. K., et al., 2019) (Nichols R. , et al., 2020)The authors have expanded their purview beyond UAS / CUAS systems. Our title shows our concern for growth and unique cyber security unmanned vehicle technology and operations for unmanned vehicles in all theaters: Air, Sea and Land – especially maritime cybersecurity and China proliferation issues. Topics include: Information Advances, Remote ID, and Extreme Persistence ISR; …
Counter Unmanned Aircraft Systems Technologies And Operations, Randall K. Nichols, Hans C. Mumm, Wayne D. Lonstein, Julie J.C.H Ryan, Candice Carter, John-Paul Hood
Counter Unmanned Aircraft Systems Technologies And Operations, Randall K. Nichols, Hans C. Mumm, Wayne D. Lonstein, Julie J.C.H Ryan, Candice Carter, John-Paul Hood
NPP eBooks
As the quarter-century mark in the 21st Century nears, new aviation-related equipment has come to the forefront, both to help us and to haunt us. (Coutu, 2020) This is particularly the case with unmanned aerial vehicles (UAVs). These vehicles have grown in popularity and accessible to everyone. Of different shapes and sizes, they are widely available for purchase at relatively low prices. They have moved from the backyard recreation status to important tools for the military, intelligence agencies, and corporate organizations. New practical applications such as military equipment and weaponry are announced on a regular basis – globally. (Coutu, 2020) …
Cybersecurity Education Through Technological And Engineering Literacy Standards, Philip A. Reed, Steven A. Barbato
Cybersecurity Education Through Technological And Engineering Literacy Standards, Philip A. Reed, Steven A. Barbato
STEMPS Faculty Publications
No abstract provided.
An Initial Look Into The Computer Science And Cybersecurity Pathways Project For Career And Technical Education Curricula, Vukica M. Jovanovic, Murat Kuzlu, Otilia Popescu, Abdul Rahman Badawi, Deborah Kay Marshall, Salih Sarp, Spyridoula Tsouganatou, Petros J. Katsioloudis, Linda Vahala, Hongyi Wu
An Initial Look Into The Computer Science And Cybersecurity Pathways Project For Career And Technical Education Curricula, Vukica M. Jovanovic, Murat Kuzlu, Otilia Popescu, Abdul Rahman Badawi, Deborah Kay Marshall, Salih Sarp, Spyridoula Tsouganatou, Petros J. Katsioloudis, Linda Vahala, Hongyi Wu
Engineering Technology Faculty Publications
Computer science and cybersecurity have gained the attention of various stakeholders, industry representatives, educators, parents and students who are thinking about their future careers. Teaching computer science courses has moved into K-12 education, no longer introduced in the college classroom. There are various reasons for this trend. One is that in this way more children have access to the curriculum that integrates computer science principles, not just those undergraduate students in specific STEM majors. Other industries need different levels of computer science and cybersecurity education. There are various programs across the nation that are focusing on introducing these topics as …
Cybersecurity Education In Utah High Schools: An Analysis And Strategy For Teacher Adoption, Cariana June Cornel
Cybersecurity Education In Utah High Schools: An Analysis And Strategy For Teacher Adoption, Cariana June Cornel
Theses and Dissertations
The IT Education Specialist for the USBE, Brandon Jacobson, stated:I feel there is a deficiency of and therefore a need to teach Cybersecurity.Cybersecurity is the “activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation” (NICE, 2018). Practicing cybersecurity can increase awareness of cybersecurity issues, such as theft of sensitive information. Current efforts, including but not limited to, cybersecurity camps, competitions, college courses, and conferences, have been created to better prepare cyber citizens nationwide for such cybersecurity occurrences. In …
Unmanned Aircraft Systems In The Cyber Domain, Randall K. Nichols, Hans C. Mumm, Wayne D. Lonstein, Julie J.C.H. Ryan, Candice Carter, John-Paul Hood
Unmanned Aircraft Systems In The Cyber Domain, Randall K. Nichols, Hans C. Mumm, Wayne D. Lonstein, Julie J.C.H. Ryan, Candice Carter, John-Paul Hood
NPP eBooks
Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; …
Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle
Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle
CCE Theses and Dissertations
Medical literature identifies a number of technology-driven improvements in disease management such as implantable medical devices (IMDs) that are a standard treatment for candidates with specific diseases. Among patients using implantable cardiac defibrillators (ICD), for example, problems and issues are being discovered faster compared to patients without monitoring, improving safety. What is not known is why patients report not feeling safer, creating a safety paradox, and why patients identify privacy concerns in ICD monitoring.
There is a major gap in the literature regarding the factors that contribute to perceived safety and privacy in remote patient monitoring (RPM). To address this …
Data Defenders, Madison Claire Cannon