Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Business

PDF

Journal

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 602

Full-Text Articles in Physical Sciences and Mathematics

Can Corporate Sustainability Performance (Csp) Overcome Indonesia's Corporate Debt Problems?, Johnson Ferry Febrian, Nora Sri Hendriyeni Jun 2024

Can Corporate Sustainability Performance (Csp) Overcome Indonesia's Corporate Debt Problems?, Johnson Ferry Febrian, Nora Sri Hendriyeni

Jurnal Akuntansi dan Keuangan Indonesia

Based on IMF publications (2022), Indonesian companies have a risky debt level that may cause bankruptcy, so companies are required to make leverage adjustments to return the debt to its optimal level. In recent years, corporate sustainability performance (CSP) practices have been proven to improve performance and overcome financial problems such as debt by integrating sustainability aspects into business processes. Based on stakeholder theory and trade-off theory, this study aims to examine the effect of CSP on leverage adjustment and the role of competitive advantage, equity mispricing, profitability, and firm size in moderating this relationship. This study used a sample …


Strategic Pattern And Optimization Of China's Eco-Regions During Fifteenth Five-Year Plan Period, Kan Zhou, Jie Fan, Daojing Zhou, Zhedong Qian, Hu Yu, Hanchu Liu, Jian Zhang Apr 2024

Strategic Pattern And Optimization Of China's Eco-Regions During Fifteenth Five-Year Plan Period, Kan Zhou, Jie Fan, Daojing Zhou, Zhedong Qian, Hu Yu, Hanchu Liu, Jian Zhang

Bulletin of Chinese Academy of Sciences (Chinese Version)

Since the implementation of the major function oriented zoning, the ecological space of key ecological functional areas has continuously expanded, with a significant increase in vegetation coverage. Concurrently, there has been a dual change in population dynamics, characterized by a decrease in total population and an increase in the urban population. Furthermore, significant achievements have been made in economic and social development, and there has been a steady improvement in the functions of ecological security barriers, contributing to an alleviation of tension in human-environment relationships. During the 15th Five-Year Plan period, it is imperative to adhere to the functional orientation …


Factors Influencing The Perceptions Of Human-Computer Interaction Curriculum Developers In Higher Education Institutions During Curriculum Design And Delivery, Cynthia Augustine, Salah Kabanda Apr 2024

Factors Influencing The Perceptions Of Human-Computer Interaction Curriculum Developers In Higher Education Institutions During Curriculum Design And Delivery, Cynthia Augustine, Salah Kabanda

The African Journal of Information Systems

Computer science (CS) and information systems students seeking to work as software developers upon graduating are often required to create software that has a sound user experience (UX) and meets the needs of its users. This includes addressing unique user, context, and infrastructural requirements. This study sought to identify the factors that influence the perceptions of human-computer interaction (HCI) curriculum developers in higher education institutions (HEIs) in developing economies of Africa when it comes to curriculum design and delivery. A qualitative enquiry was conducted and consisted of fourteen interviews with HCI curriculum developers and UX practitioners in four African countries. …


Comparing Cognitive Theories Of Learning Transfer To Advance Cybersecurity Instruction, Assessment, And Testing, Daniel T. Hickey Ph.D., Ronald J. Kantor Apr 2024

Comparing Cognitive Theories Of Learning Transfer To Advance Cybersecurity Instruction, Assessment, And Testing, Daniel T. Hickey Ph.D., Ronald J. Kantor

Journal of Cybersecurity Education, Research and Practice

The cybersecurity threat landscape evolves quickly, continually, and consequentially. This means that the transfer of cybersecurity learning is crucial. We compared how different recognized “cognitive” transfer theories might help explain and synergize three aspects of cybersecurity education. These include teaching and training in diverse settings, assessing learning formatively & summatively, and testing & measuring achievement, proficiency, & readiness. We excluded newer sociocultural theories and their implications for inclusion as we explore those theories elsewhere. We first summarized the history of cybersecurity education and proficiency standards considering transfer theories. We then explored each theory and reviewed the most relevant cybersecurity education …


How Can Generative Ai (Genai) Enhance Or Hinder Qualitative Studies? A Critical Appraisal From South Asia, Nepal, Niroj Dahal Mar 2024

How Can Generative Ai (Genai) Enhance Or Hinder Qualitative Studies? A Critical Appraisal From South Asia, Nepal, Niroj Dahal

The Qualitative Report

Qualitative researchers can benefit from using generative artificial intelligence (GenAI), such as different versions of ChatGPT—GPT-3.5 or GPT-4, Google Bard—now renamed as a Gemini, and Bing Chat—now renamed as a Copilot, in their studies. The scientific community has used artificial intelligence (AI) tools in various ways. However, using GenAI has generated concerns regarding potential research unreliability, bias, and unethical outcomes in GenAI-generated research results. Considering these concerns, the purpose of this commentary is to review the current use of GenAI in qualitative research, including its strengths, limitations, and ethical dilemmas from the perspective of critical appraisal from South Asia, Nepal. …


Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D. Feb 2024

Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D.

Journal of Cybersecurity Education, Research and Practice

This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized identity, and smart contracts, and examines the application of secure blockchain across various educational functions such as enrollment management, degree auditing, and award processing. Each facet of the NIST Framework is utilized to explore the integration of blockchain technology and address persistent security concerns. The paper contributes to the literature by defining blockchain technology applications and opportunities within …


Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger Feb 2024

Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger

Journal of Cybersecurity Education, Research and Practice

This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through mentorship, collaboration, skill preparation, and other activities and touch points to increase students’ sense of belonging and connectedness in the cybersecurity profession. The goal of the project was focused on developing diverse, educated, and skilled cybersecurity personnel for employment within local industry and government to help curtail the current regional cybersecurity workforce gap that is emblematic of the lack of qualified cybersecurity personnel that presently exists nationwide. Emphasis throughout the project …


University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo Feb 2024

University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo

Journal of Cybersecurity Education, Research and Practice

This study examines cybersecurity awareness in universities by analyzing related research output across different disciplines at the University of Johannesburg. The diffusion of innovation theory is used in this study as a theoretical framework to explain how cybersecurity awareness diffuses across disciplines. The University of Johannesburg Institutional Repository database was the data source for this study. Variations in cybersecurity keyword searches and topic modeling techniques were used to identify the frequency and distribution of research output across different disciplines. The study reveals that cybersecurity awareness has diffused across various disciplines, including non-computer science disciplines such as business, accounting, and social …


The Threads That Shape Us: Fashioning A Sustainable Future From Silk, Bryne Croyle Johnson Feb 2024

The Threads That Shape Us: Fashioning A Sustainable Future From Silk, Bryne Croyle Johnson

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Silk has been used for centuries as a natural fiber, but has declined in popularity due to synthetic alternatives. In this pop-science article style paper, the history, present, and possible futures of silk are discussed at a generally accessible level. Anthropology, Biology, Sociology, and Environmental Science are brought together to present a case for a renewed interest in silk as a sustainable fiber.


History Of Clover Leaf Syndrome, Isabella Perez Feb 2024

History Of Clover Leaf Syndrome, Isabella Perez

Mako: NSU Undergraduate Student Journal

The purpose of this paper is to summarize the history of clover leaf syndrome and describe the newest advancements made to treat it. Clover leaf syndrome is more formally referred to as Kleeblattschadel syndrome. Information was gathered from several scholarly, peer-reviewed articles, and was condensed down into the key takeaways. This syndrome impacts the formation of the skull due to premature fusion of its sutures, creating a tri-lobar skull that resembles a clover leaf. This premature fusion is referred to as a type of craniosynostosis and has been linked to causing several other health complications ranging in severity. This is …


Board Of Directors Role In Data Privacy Governance: Making The Transition From Compliance Driven To Good Business Stewardship, David Warner, Lisa Mckee Feb 2024

Board Of Directors Role In Data Privacy Governance: Making The Transition From Compliance Driven To Good Business Stewardship, David Warner, Lisa Mckee

Journal of Cybersecurity Education, Research and Practice

Data collection, use, leveraging, and sharing as a business practice and advantage has proliferated over the past decade. Along with this proliferation of data collection is the increase in regulatory activity which continues to morph exponentially around the globe. Adding to this complexity are the increasing business disruptions, productivity and revenue losses, settlements, fines, and penalties which can amount to over $15 million, with many penalties now being ascribed to the organization’s leadership, to include the Board of Directors (BoD), the CEO and members of the senior leadership team (SLT). Thus, boards of directors can no longer ignore and in …


Privacy Principles And Harms: Balancing Protection And Innovation, Samuel Aiello Feb 2024

Privacy Principles And Harms: Balancing Protection And Innovation, Samuel Aiello

Journal of Cybersecurity Education, Research and Practice

In today's digitally connected world, privacy has transformed from a fundamental human right into a multifaceted challenge. As technology enables the seamless exchange of information, the need to protect personal data has grown exponentially. Privacy has emerged as a critical concern in the digital age, as technological advancements continue to reshape how personal information is collected, stored, and utilized. This paper delves into the fundamental principles of privacy and explores the potential harm that can arise from the mishandling of personal data. It emphasizes the delicate balance between safeguarding individuals' privacy rights and fostering innovation in a data-driven society. By …


Flavors And Frailties Of Globalization, Nikhilesh Dholakia, Deniz Atik Feb 2024

Flavors And Frailties Of Globalization, Nikhilesh Dholakia, Deniz Atik

Markets, Globalization & Development Review

No abstract provided.


Upleft: Pick Up Leftovers, Uplift Those In Need, Veronica Galles Jan 2024

Upleft: Pick Up Leftovers, Uplift Those In Need, Veronica Galles

The Journal of Purdue Undergraduate Research

No abstract provided.


A Quantitative Analysis Of Seaplane Accidents From 1982-2021, David C. Ison Jan 2024

A Quantitative Analysis Of Seaplane Accidents From 1982-2021, David C. Ison

International Journal of Aviation, Aeronautics, and Aerospace

This study aimed to assess and analyze all historical National Transportation Safety Board accident reports since 1982. For analysis, reports were bisected into seaplane (float, amphibian, and hull) and non-seaplane groups. Findings showed that there is a deficiency in the level of available detail on the seaplane fleet and cadre of seaplane pilots in the U.S. During the most recent ten years of complete data (2012-2021) showed a negative trend in all accidents and fatal accidents, although only the latter being statistically convincing. During this timeframe, seaplane accident pilots had significantly higher total time and age than other groups (non-seaplane …


Outsourcing Voting To Ai: Can Chatgpt Advise Index Funds On Proxy Voting Decisions?, Chen Wang Dec 2023

Outsourcing Voting To Ai: Can Chatgpt Advise Index Funds On Proxy Voting Decisions?, Chen Wang

Fordham Journal of Corporate & Financial Law

Released in November 2022, Chat Generative Pre-training Transformer (“ChatGPT”), has risen rapidly to prominence, and its versatile capabilities have already been shown in a variety of fields. Due to ChatGPT’s advanced features, such as extensive pre-training on diverse data, strong generalization ability, fine-tuning capabilities, and improved reasoning, the use of AI in the legal industry could experience a significant transformation. Since small passive funds with low-cost business models generally lack the financial resources to make informed proxy voting decisions that align with their shareholders’ interests, this Article considers the use of ChatGPT to assist small investment funds, particularly small passive …


Analyzing A Smartphone Battle Using Bass Competition Model, Maila Hallare, Alireza Hosseinkhan, Hasala Senpathy K. Gallolu Kankanamalage Dec 2023

Analyzing A Smartphone Battle Using Bass Competition Model, Maila Hallare, Alireza Hosseinkhan, Hasala Senpathy K. Gallolu Kankanamalage

CODEE Journal

Many examples of 2x2 nonlinear systems in a first-course in ODE or a mathematical modeling class come from physics or biology. We present an example that comes from the business or management sciences, namely, the Bass diffusion model. We believe that students will appreciate this model because it does not require a lot of background material and it is used to analyze sales data and serve as a guide in pricing decisions for a single product. In this project, we create a 2x2 ODE system that is inspired by the Bass diffusion model; we call the resulting system the Bass …


Molybdenum Versus Tungsten Based Polyoxometalates For Highly Effective Methylene Blue Removal, Roula Abi Saad, Ghassan Younes, Mohammad H. El- Dakdouki, Rami Al-Oweini Dec 2023

Molybdenum Versus Tungsten Based Polyoxometalates For Highly Effective Methylene Blue Removal, Roula Abi Saad, Ghassan Younes, Mohammad H. El- Dakdouki, Rami Al-Oweini

BAU Journal - Science and Technology

[SiW12O40]4-(SiW12) and [Mo8O26]4- (Mo8) were synthesized and characterized by Fourier Transform Infrared spectroscopy (FTIR). The prepared polyoxometalates were studied as potential adsorbents for the removal of methylene blue (MB) from an aqueous solution. Various operational parameters—contact time, adsorbent dose, initial dye concentration, pH, and temperature— were meticulously assessed by UV/Vis spectrophotometry to study its impact on the adsorption efficacy. An inverse relationship was observed between the percentage dye removal and the initial dye concentration, highlighting the complexes' superior adsorption capabilities under lower dye loads. The …


Optimization Of The Bio-Synthesis Of Magnesium Nanoparticles From Staphylococcus Haemolyticus: A Pilot Study, Mariam Bassam, Malak Mezher, Mahmoud Khalil Dec 2023

Optimization Of The Bio-Synthesis Of Magnesium Nanoparticles From Staphylococcus Haemolyticus: A Pilot Study, Mariam Bassam, Malak Mezher, Mahmoud Khalil

BAU Journal - Science and Technology

Nanotechnology is developing rapidly. This field has many influences in humans’ life. Nanoparticles (NPs) have many unique properties including the size, shape, morphology, and surface area. The synthesis of NPs could be achieved by three ways: physical, chemical, and biological. However, the biological synthesis of NPs has a priority on the other domains due to its safety and environmental friendship. In this regard, the main objective of this study was to synthesize magnesium (Mg) NPs from the bacterium S. haemolyticus which was isolated from the Lebanese wastewater. Different parameters were applied to detect the best conditions to produce the highest …


Volar V-Y Advancement Flaps In Reconstructing Fingertip Injuries, Sawsan Abiad Dec 2023

Volar V-Y Advancement Flaps In Reconstructing Fingertip Injuries, Sawsan Abiad

BAU Journal - Science and Technology

Fingertip injuries with exposed bones and joints require immediate or early closure for the preservation of function and avoidance of complications. The ideal procedure should maintain the length of the finger and cover the defect with non-tender, well-padded skin with normal sensation. The aim of this study was to evaluate the role of the different types of volar V-Y advancement flaps in reconstructing and resurfacing injuries of the fingertips at different levels and angles. Thirty patients (N=30) sustaining fingertip injuries of variable etiology and lost components, type III & IV according to Allen’s classification were divided into two groups (n=15) …


Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia Dec 2023

Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia

Journal of Nonprofit Innovation

Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.

Imagine Doris, who is …


Investigation Into A Practical Application Of Reinforcement Learning For The Stock Market, Philip Traxler, Sadik Aman, Will Rogers, Allyn Okun Dec 2023

Investigation Into A Practical Application Of Reinforcement Learning For The Stock Market, Philip Traxler, Sadik Aman, Will Rogers, Allyn Okun

SMU Data Science Review

A major problem of the financial industry is the ability to adapt their trading strategies at the same rate the market evolves. This paper proposes a solution using existing Reinforcement Learning libraries to help find new strategies at a practical scale. Using a wide domain of ticker symbols, an algorithm is trained in an environment that better represents reality. The supplied decision-making algorithm is tested using recorded data from the U.S stock market from 2000 through 2022. The results of this research show that existing techniques are statistically better than making decisions at random. With this result, this research shows …


Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman Dec 2023

Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman

Journal of Cybersecurity Education, Research and Practice

Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …


Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu Nov 2023

Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu

Journal of Cybersecurity Education, Research and Practice

This pilot study aims to assess the acceptability of Open University’s training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post experimental design was employed. 43 self-selected participants were recruited via an online register and posters at the university (excluding IT related courses). Participants completed the Human Aspects of Information Security Questionnaire (HAIS-Q) and Fear of Missing Out (FoMO) Scale. They then completed all games and quizzes in the GICAST course before repeating the HAIS-Q and …


Journal Of Roleplaying Studies And Steam (Jrpssteam) Vol. 2 [2023], (Issue 2)., Ricardo Morales-Carbajal, Cristo Leon, Sarah Lynne Bowman, Ligia-Estefania Estefania Canul-Noh, Vania C. Tovilla, Laura I. Quiroz, Elektra Diakolambrianou Nov 2023

Journal Of Roleplaying Studies And Steam (Jrpssteam) Vol. 2 [2023], (Issue 2)., Ricardo Morales-Carbajal, Cristo Leon, Sarah Lynne Bowman, Ligia-Estefania Estefania Canul-Noh, Vania C. Tovilla, Laura I. Quiroz, Elektra Diakolambrianou

Journal of Roleplaying Studies and STEAM

Editorial

Sangre, sudor, lágrimas y burocracia

Estamos muy contentos con la edición de este tercer número del Journal of Roleplaying Studies and STEAM, en primer lugar porque ¡ya contamos con ISSN!, suena a un logro menor pero debemos considerar los vericuetos burocráticos por los que hemos pasado semana tras semana para lograrlo. En segundo lugar, ¡por fin tenemos un artículo en inglés!, lo cual es motivo de celebración porque además es para nosotros un honor que sea de Elektra Diakolambrianou y Sarah Lynne Bowman, quienes en una gran muestra de confianza enviaron para dictamen su artículo denominado Dual Consciousness: What …


De Las 7 Bolas De Dragón A Los 7 Reinos De Poniente: Viajando Por La Ficción Para Transformar La Realidad, Vania C. Tovilla Nov 2023

De Las 7 Bolas De Dragón A Los 7 Reinos De Poniente: Viajando Por La Ficción Para Transformar La Realidad, Vania C. Tovilla

Journal of Roleplaying Studies and STEAM

resumen

El libro es una muestra de la experiencia y dedicación que tiene Issac Pérez López, quien con más de veinte años de práctica en la creación de entornos lúdicos nos sumerge en una suerte de juego donde al leer sus páginas a través de un lenguaje coloquial y cercano. . a la realidad de los docentes del “Cole” nos ejemplifica y ayuda a comprender un poco más los conceptos y pasos que involucran el término “gamificación”.

Podría ser considerado un libro de autoayuda potenciado (en el buen sentido) para los docentes que se están integrando al mundo de los …


Editorial - Sangre, Sudor, Lágrimas Y Burocracia, Mauricio Rangel Nov 2023

Editorial - Sangre, Sudor, Lágrimas Y Burocracia, Mauricio Rangel

Journal of Roleplaying Studies and STEAM

Estamos muy contentos con la edición de este tercer número del Journal of Roleplaying Studies and STEAM, en primer lugar porque ¡ya contamos con ISSN!, suena a un logro menor pero debemos considerar los vericuetos burocráticos por los que hemos pasado semana tras semana para lograrlo.


Aprendizaje Situado En Mundos Virtuales, Una Experiencia De Participación A Través De Juegos De Rol., Vania C. Tovilla Mgtr. Nov 2023

Aprendizaje Situado En Mundos Virtuales, Una Experiencia De Participación A Través De Juegos De Rol., Vania C. Tovilla Mgtr.

Journal of Roleplaying Studies and STEAM

En tiempos actuales el uso de las tecnologías y la comunicación masiva se hace cada vez más frecuente, ya sea por medio de Internet, los teléfonos inteligentes y otros instrumentos que quizás resignifican el modo en el que los jóvenes en la actualidad conciben términos como virtualidad, aprendiendo y sobre toda la realidad, relacionándose con otros alrededor de todo el mundo. Es quizás por este auge de tecnologías que surgió en el año 2003, la herramienta virtual Second Life ; concebida como un mundo complejo y completamente virtual que permite a los usuarios aprender y vivir en otra realidad como …


Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang Nov 2023

Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang

Journal of Cybersecurity Education, Research and Practice

Recent advances in Artificial Intelligence (AI) have brought society closer to the long-held dream of creating machines to help with both common and complex tasks and functions. From recommending movies to detecting disease in its earliest stages, AI has become an aspect of daily life many people accept without scrutiny. Despite its functionality and promise, AI has inherent security risks that users should understand and programmers must be trained to address. The ICE (integrity, confidentiality, and equity) cybersecurity labs developed by a team of cybersecurity researchers addresses these vulnerabilities to AI models through a series of hands-on, inquiry-based labs. Through …


Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen Nov 2023

Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen

Journal of Cybersecurity Education, Research and Practice

Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and ethics, cybersecurity can foster diversity among audiences with varying educational backgrounds, thereby cultivating a richer and more resilient security landscape. A more diverse cybersecurity workforce can provide a broader range of perspectives, experiences, and skills to address the complex and ever-evolving threats of the digital age. The research focuses on enhancing cybersecurity education …