Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Kennesaw State University (114)
- University of Tennessee, Knoxville (44)
- Butler University (42)
- Beirut Arab University (41)
- Central Bank of Nigeria (34)
-
- Florida International University (30)
- The University of Maine (23)
- Stephen F. Austin State University (22)
- Southern Methodist University (19)
- Tennessee State University (15)
- Binghamton University (14)
- University of South Florida (13)
- Sacred Heart University (11)
- Department of Primary Industries and Regional Development, Western Australia (10)
- New Jersey Institute of Technology (9)
- California State University, San Bernardino (8)
- University of the Incarnate Word (8)
- Association of Arab Universities (7)
- Embry-Riddle Aeronautical University (7)
- University for Business and Technology in Kosovo (7)
- University of New Hampshire (7)
- Claremont Colleges (6)
- University of Central Florida (6)
- University of Nevada, Las Vegas (6)
- Brigham Young University (5)
- Chinese Academy of Sciences (5)
- Nova Southeastern University (4)
- American Dental Association (3)
- Cleveland State University (3)
- DePaul University (3)
- Keyword
-
- Cybersecurity (39)
- Honors college (18)
- Umaine (18)
- Umaine honors (18)
- Umaine honors college (18)
-
- Tourism (17)
- Honors education (15)
- Editorial (14)
- Education (14)
- Training (9)
- Security (7)
- Western Australia (7)
- Artificial intelligence (6)
- Climate change (6)
- Information security (6)
- Machine Learning (6)
- Sustainability (6)
- Artificial Intelligence (5)
- COVID-19 (5)
- Colvin hall (5)
- Community engagement (5)
- Cybersecurity education (5)
- Environment (5)
- Ethics (5)
- Nuclear Security (5)
- Research (5)
- STEM (5)
- Social engineering (5)
- Statistics (5)
- Student travel (5)
- Publication Year
- Publication
-
- Journal of Cybersecurity Education, Research and Practice (101)
- International Journal of Nuclear Security (44)
- Butler Journal of Undergraduate Research (42)
- BAU Journal - Science and Technology (41)
- CBN Journal of Applied Statistics (JAS) (31)
-
- Hospitality Review (30)
- Journal of Multicultural Affairs (22)
- SMU Data Science Review (19)
- Minerva (18)
- The Journal of Tennessee State University (15)
- Northeast Journal of Complex Systems (NEJCS) (14)
- The African Journal of Information Systems (11)
- Journal of the Department of Agriculture, Western Australia, Series 4 (10)
- School of Computer Science & Engineering Faculty Publications (10)
- Journal of Roleplaying Studies and STEAM (8)
- Verbum Incarnatum: An Academic Journal of Social Justice (8)
- International Journal of Business and Technology (7)
- RISK: Health, Safety & Environment (1990-2002) (7)
- Middle East Journal of Communication Studies (6)
- Spectra Undergraduate Research Journal (6)
- University of South Florida (USF) M3 Publishing (6)
- Bulletin of Chinese Academy of Sciences (Chinese Version) (5)
- International Journal of Aviation, Aeronautics, and Aerospace (5)
- Maine Policy Review (5)
- Rosen Research Review (5)
- Marriott Student Review (4)
- OSR Journal of Student Research (4)
- Business Review (3)
- Journal of Global Awareness (3)
- Journal of International Technology and Information Management (3)
Articles 1 - 30 of 602
Full-Text Articles in Physical Sciences and Mathematics
Can Corporate Sustainability Performance (Csp) Overcome Indonesia's Corporate Debt Problems?, Johnson Ferry Febrian, Nora Sri Hendriyeni
Can Corporate Sustainability Performance (Csp) Overcome Indonesia's Corporate Debt Problems?, Johnson Ferry Febrian, Nora Sri Hendriyeni
Jurnal Akuntansi dan Keuangan Indonesia
Based on IMF publications (2022), Indonesian companies have a risky debt level that may cause bankruptcy, so companies are required to make leverage adjustments to return the debt to its optimal level. In recent years, corporate sustainability performance (CSP) practices have been proven to improve performance and overcome financial problems such as debt by integrating sustainability aspects into business processes. Based on stakeholder theory and trade-off theory, this study aims to examine the effect of CSP on leverage adjustment and the role of competitive advantage, equity mispricing, profitability, and firm size in moderating this relationship. This study used a sample …
Strategic Pattern And Optimization Of China's Eco-Regions During Fifteenth Five-Year Plan Period, Kan Zhou, Jie Fan, Daojing Zhou, Zhedong Qian, Hu Yu, Hanchu Liu, Jian Zhang
Strategic Pattern And Optimization Of China's Eco-Regions During Fifteenth Five-Year Plan Period, Kan Zhou, Jie Fan, Daojing Zhou, Zhedong Qian, Hu Yu, Hanchu Liu, Jian Zhang
Bulletin of Chinese Academy of Sciences (Chinese Version)
Since the implementation of the major function oriented zoning, the ecological space of key ecological functional areas has continuously expanded, with a significant increase in vegetation coverage. Concurrently, there has been a dual change in population dynamics, characterized by a decrease in total population and an increase in the urban population. Furthermore, significant achievements have been made in economic and social development, and there has been a steady improvement in the functions of ecological security barriers, contributing to an alleviation of tension in human-environment relationships. During the 15th Five-Year Plan period, it is imperative to adhere to the functional orientation …
Factors Influencing The Perceptions Of Human-Computer Interaction Curriculum Developers In Higher Education Institutions During Curriculum Design And Delivery, Cynthia Augustine, Salah Kabanda
Factors Influencing The Perceptions Of Human-Computer Interaction Curriculum Developers In Higher Education Institutions During Curriculum Design And Delivery, Cynthia Augustine, Salah Kabanda
The African Journal of Information Systems
Computer science (CS) and information systems students seeking to work as software developers upon graduating are often required to create software that has a sound user experience (UX) and meets the needs of its users. This includes addressing unique user, context, and infrastructural requirements. This study sought to identify the factors that influence the perceptions of human-computer interaction (HCI) curriculum developers in higher education institutions (HEIs) in developing economies of Africa when it comes to curriculum design and delivery. A qualitative enquiry was conducted and consisted of fourteen interviews with HCI curriculum developers and UX practitioners in four African countries. …
Comparing Cognitive Theories Of Learning Transfer To Advance Cybersecurity Instruction, Assessment, And Testing, Daniel T. Hickey Ph.D., Ronald J. Kantor
Comparing Cognitive Theories Of Learning Transfer To Advance Cybersecurity Instruction, Assessment, And Testing, Daniel T. Hickey Ph.D., Ronald J. Kantor
Journal of Cybersecurity Education, Research and Practice
The cybersecurity threat landscape evolves quickly, continually, and consequentially. This means that the transfer of cybersecurity learning is crucial. We compared how different recognized “cognitive” transfer theories might help explain and synergize three aspects of cybersecurity education. These include teaching and training in diverse settings, assessing learning formatively & summatively, and testing & measuring achievement, proficiency, & readiness. We excluded newer sociocultural theories and their implications for inclusion as we explore those theories elsewhere. We first summarized the history of cybersecurity education and proficiency standards considering transfer theories. We then explored each theory and reviewed the most relevant cybersecurity education …
How Can Generative Ai (Genai) Enhance Or Hinder Qualitative Studies? A Critical Appraisal From South Asia, Nepal, Niroj Dahal
How Can Generative Ai (Genai) Enhance Or Hinder Qualitative Studies? A Critical Appraisal From South Asia, Nepal, Niroj Dahal
The Qualitative Report
Qualitative researchers can benefit from using generative artificial intelligence (GenAI), such as different versions of ChatGPT—GPT-3.5 or GPT-4, Google Bard—now renamed as a Gemini, and Bing Chat—now renamed as a Copilot, in their studies. The scientific community has used artificial intelligence (AI) tools in various ways. However, using GenAI has generated concerns regarding potential research unreliability, bias, and unethical outcomes in GenAI-generated research results. Considering these concerns, the purpose of this commentary is to review the current use of GenAI in qualitative research, including its strengths, limitations, and ethical dilemmas from the perspective of critical appraisal from South Asia, Nepal. …
Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D.
Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D.
Journal of Cybersecurity Education, Research and Practice
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized identity, and smart contracts, and examines the application of secure blockchain across various educational functions such as enrollment management, degree auditing, and award processing. Each facet of the NIST Framework is utilized to explore the integration of blockchain technology and address persistent security concerns. The paper contributes to the literature by defining blockchain technology applications and opportunities within …
Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger
Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger
Journal of Cybersecurity Education, Research and Practice
This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through mentorship, collaboration, skill preparation, and other activities and touch points to increase students’ sense of belonging and connectedness in the cybersecurity profession. The goal of the project was focused on developing diverse, educated, and skilled cybersecurity personnel for employment within local industry and government to help curtail the current regional cybersecurity workforce gap that is emblematic of the lack of qualified cybersecurity personnel that presently exists nationwide. Emphasis throughout the project …
University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo
University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo
Journal of Cybersecurity Education, Research and Practice
This study examines cybersecurity awareness in universities by analyzing related research output across different disciplines at the University of Johannesburg. The diffusion of innovation theory is used in this study as a theoretical framework to explain how cybersecurity awareness diffuses across disciplines. The University of Johannesburg Institutional Repository database was the data source for this study. Variations in cybersecurity keyword searches and topic modeling techniques were used to identify the frequency and distribution of research output across different disciplines. The study reveals that cybersecurity awareness has diffused across various disciplines, including non-computer science disciplines such as business, accounting, and social …
The Threads That Shape Us: Fashioning A Sustainable Future From Silk, Bryne Croyle Johnson
The Threads That Shape Us: Fashioning A Sustainable Future From Silk, Bryne Croyle Johnson
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
Silk has been used for centuries as a natural fiber, but has declined in popularity due to synthetic alternatives. In this pop-science article style paper, the history, present, and possible futures of silk are discussed at a generally accessible level. Anthropology, Biology, Sociology, and Environmental Science are brought together to present a case for a renewed interest in silk as a sustainable fiber.
History Of Clover Leaf Syndrome, Isabella Perez
History Of Clover Leaf Syndrome, Isabella Perez
Mako: NSU Undergraduate Student Journal
The purpose of this paper is to summarize the history of clover leaf syndrome and describe the newest advancements made to treat it. Clover leaf syndrome is more formally referred to as Kleeblattschadel syndrome. Information was gathered from several scholarly, peer-reviewed articles, and was condensed down into the key takeaways. This syndrome impacts the formation of the skull due to premature fusion of its sutures, creating a tri-lobar skull that resembles a clover leaf. This premature fusion is referred to as a type of craniosynostosis and has been linked to causing several other health complications ranging in severity. This is …
Board Of Directors Role In Data Privacy Governance: Making The Transition From Compliance Driven To Good Business Stewardship, David Warner, Lisa Mckee
Board Of Directors Role In Data Privacy Governance: Making The Transition From Compliance Driven To Good Business Stewardship, David Warner, Lisa Mckee
Journal of Cybersecurity Education, Research and Practice
Data collection, use, leveraging, and sharing as a business practice and advantage has proliferated over the past decade. Along with this proliferation of data collection is the increase in regulatory activity which continues to morph exponentially around the globe. Adding to this complexity are the increasing business disruptions, productivity and revenue losses, settlements, fines, and penalties which can amount to over $15 million, with many penalties now being ascribed to the organization’s leadership, to include the Board of Directors (BoD), the CEO and members of the senior leadership team (SLT). Thus, boards of directors can no longer ignore and in …
Privacy Principles And Harms: Balancing Protection And Innovation, Samuel Aiello
Privacy Principles And Harms: Balancing Protection And Innovation, Samuel Aiello
Journal of Cybersecurity Education, Research and Practice
In today's digitally connected world, privacy has transformed from a fundamental human right into a multifaceted challenge. As technology enables the seamless exchange of information, the need to protect personal data has grown exponentially. Privacy has emerged as a critical concern in the digital age, as technological advancements continue to reshape how personal information is collected, stored, and utilized. This paper delves into the fundamental principles of privacy and explores the potential harm that can arise from the mishandling of personal data. It emphasizes the delicate balance between safeguarding individuals' privacy rights and fostering innovation in a data-driven society. By …
Flavors And Frailties Of Globalization, Nikhilesh Dholakia, Deniz Atik
Flavors And Frailties Of Globalization, Nikhilesh Dholakia, Deniz Atik
Markets, Globalization & Development Review
No abstract provided.
Upleft: Pick Up Leftovers, Uplift Those In Need, Veronica Galles
Upleft: Pick Up Leftovers, Uplift Those In Need, Veronica Galles
The Journal of Purdue Undergraduate Research
No abstract provided.
A Quantitative Analysis Of Seaplane Accidents From 1982-2021, David C. Ison
A Quantitative Analysis Of Seaplane Accidents From 1982-2021, David C. Ison
International Journal of Aviation, Aeronautics, and Aerospace
This study aimed to assess and analyze all historical National Transportation Safety Board accident reports since 1982. For analysis, reports were bisected into seaplane (float, amphibian, and hull) and non-seaplane groups. Findings showed that there is a deficiency in the level of available detail on the seaplane fleet and cadre of seaplane pilots in the U.S. During the most recent ten years of complete data (2012-2021) showed a negative trend in all accidents and fatal accidents, although only the latter being statistically convincing. During this timeframe, seaplane accident pilots had significantly higher total time and age than other groups (non-seaplane …
Outsourcing Voting To Ai: Can Chatgpt Advise Index Funds On Proxy Voting Decisions?, Chen Wang
Outsourcing Voting To Ai: Can Chatgpt Advise Index Funds On Proxy Voting Decisions?, Chen Wang
Fordham Journal of Corporate & Financial Law
Released in November 2022, Chat Generative Pre-training Transformer (“ChatGPT”), has risen rapidly to prominence, and its versatile capabilities have already been shown in a variety of fields. Due to ChatGPT’s advanced features, such as extensive pre-training on diverse data, strong generalization ability, fine-tuning capabilities, and improved reasoning, the use of AI in the legal industry could experience a significant transformation. Since small passive funds with low-cost business models generally lack the financial resources to make informed proxy voting decisions that align with their shareholders’ interests, this Article considers the use of ChatGPT to assist small investment funds, particularly small passive …
Analyzing A Smartphone Battle Using Bass Competition Model, Maila Hallare, Alireza Hosseinkhan, Hasala Senpathy K. Gallolu Kankanamalage
Analyzing A Smartphone Battle Using Bass Competition Model, Maila Hallare, Alireza Hosseinkhan, Hasala Senpathy K. Gallolu Kankanamalage
CODEE Journal
Many examples of 2x2 nonlinear systems in a first-course in ODE or a mathematical modeling class come from physics or biology. We present an example that comes from the business or management sciences, namely, the Bass diffusion model. We believe that students will appreciate this model because it does not require a lot of background material and it is used to analyze sales data and serve as a guide in pricing decisions for a single product. In this project, we create a 2x2 ODE system that is inspired by the Bass diffusion model; we call the resulting system the Bass …
Molybdenum Versus Tungsten Based Polyoxometalates For Highly Effective Methylene Blue Removal, Roula Abi Saad, Ghassan Younes, Mohammad H. El- Dakdouki, Rami Al-Oweini
Molybdenum Versus Tungsten Based Polyoxometalates For Highly Effective Methylene Blue Removal, Roula Abi Saad, Ghassan Younes, Mohammad H. El- Dakdouki, Rami Al-Oweini
BAU Journal - Science and Technology
[SiW12O40]4-(SiW12) and [Mo8O26]4- (Mo8) were synthesized and characterized by Fourier Transform Infrared spectroscopy (FTIR). The prepared polyoxometalates were studied as potential adsorbents for the removal of methylene blue (MB) from an aqueous solution. Various operational parameters—contact time, adsorbent dose, initial dye concentration, pH, and temperature— were meticulously assessed by UV/Vis spectrophotometry to study its impact on the adsorption efficacy. An inverse relationship was observed between the percentage dye removal and the initial dye concentration, highlighting the complexes' superior adsorption capabilities under lower dye loads. The …
Optimization Of The Bio-Synthesis Of Magnesium Nanoparticles From Staphylococcus Haemolyticus: A Pilot Study, Mariam Bassam, Malak Mezher, Mahmoud Khalil
Optimization Of The Bio-Synthesis Of Magnesium Nanoparticles From Staphylococcus Haemolyticus: A Pilot Study, Mariam Bassam, Malak Mezher, Mahmoud Khalil
BAU Journal - Science and Technology
Nanotechnology is developing rapidly. This field has many influences in humans’ life. Nanoparticles (NPs) have many unique properties including the size, shape, morphology, and surface area. The synthesis of NPs could be achieved by three ways: physical, chemical, and biological. However, the biological synthesis of NPs has a priority on the other domains due to its safety and environmental friendship. In this regard, the main objective of this study was to synthesize magnesium (Mg) NPs from the bacterium S. haemolyticus which was isolated from the Lebanese wastewater. Different parameters were applied to detect the best conditions to produce the highest …
Volar V-Y Advancement Flaps In Reconstructing Fingertip Injuries, Sawsan Abiad
Volar V-Y Advancement Flaps In Reconstructing Fingertip Injuries, Sawsan Abiad
BAU Journal - Science and Technology
Fingertip injuries with exposed bones and joints require immediate or early closure for the preservation of function and avoidance of complications. The ideal procedure should maintain the length of the finger and cover the defect with non-tender, well-padded skin with normal sensation. The aim of this study was to evaluate the role of the different types of volar V-Y advancement flaps in reconstructing and resurfacing injuries of the fingertips at different levels and angles. Thirty patients (N=30) sustaining fingertip injuries of variable etiology and lost components, type III & IV according to Allen’s classification were divided into two groups (n=15) …
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Journal of Nonprofit Innovation
Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.
Imagine Doris, who is …
Investigation Into A Practical Application Of Reinforcement Learning For The Stock Market, Philip Traxler, Sadik Aman, Will Rogers, Allyn Okun
Investigation Into A Practical Application Of Reinforcement Learning For The Stock Market, Philip Traxler, Sadik Aman, Will Rogers, Allyn Okun
SMU Data Science Review
A major problem of the financial industry is the ability to adapt their trading strategies at the same rate the market evolves. This paper proposes a solution using existing Reinforcement Learning libraries to help find new strategies at a practical scale. Using a wide domain of ticker symbols, an algorithm is trained in an environment that better represents reality. The supplied decision-making algorithm is tested using recorded data from the U.S stock market from 2000 through 2022. The results of this research show that existing techniques are statistically better than making decisions at random. With this result, this research shows …
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Journal of Cybersecurity Education, Research and Practice
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …
Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu
Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu
Journal of Cybersecurity Education, Research and Practice
This pilot study aims to assess the acceptability of Open University’s training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post experimental design was employed. 43 self-selected participants were recruited via an online register and posters at the university (excluding IT related courses). Participants completed the Human Aspects of Information Security Questionnaire (HAIS-Q) and Fear of Missing Out (FoMO) Scale. They then completed all games and quizzes in the GICAST course before repeating the HAIS-Q and …
Journal Of Roleplaying Studies And Steam (Jrpssteam) Vol. 2 [2023], (Issue 2)., Ricardo Morales-Carbajal, Cristo Leon, Sarah Lynne Bowman, Ligia-Estefania Estefania Canul-Noh, Vania C. Tovilla, Laura I. Quiroz, Elektra Diakolambrianou
Journal Of Roleplaying Studies And Steam (Jrpssteam) Vol. 2 [2023], (Issue 2)., Ricardo Morales-Carbajal, Cristo Leon, Sarah Lynne Bowman, Ligia-Estefania Estefania Canul-Noh, Vania C. Tovilla, Laura I. Quiroz, Elektra Diakolambrianou
Journal of Roleplaying Studies and STEAM
Editorial
Sangre, sudor, lágrimas y burocracia
Estamos muy contentos con la edición de este tercer número del Journal of Roleplaying Studies and STEAM, en primer lugar porque ¡ya contamos con ISSN!, suena a un logro menor pero debemos considerar los vericuetos burocráticos por los que hemos pasado semana tras semana para lograrlo. En segundo lugar, ¡por fin tenemos un artículo en inglés!, lo cual es motivo de celebración porque además es para nosotros un honor que sea de Elektra Diakolambrianou y Sarah Lynne Bowman, quienes en una gran muestra de confianza enviaron para dictamen su artículo denominado Dual Consciousness: What …
De Las 7 Bolas De Dragón A Los 7 Reinos De Poniente: Viajando Por La Ficción Para Transformar La Realidad, Vania C. Tovilla
De Las 7 Bolas De Dragón A Los 7 Reinos De Poniente: Viajando Por La Ficción Para Transformar La Realidad, Vania C. Tovilla
Journal of Roleplaying Studies and STEAM
resumen
El libro es una muestra de la experiencia y dedicación que tiene Issac Pérez López, quien con más de veinte años de práctica en la creación de entornos lúdicos nos sumerge en una suerte de juego donde al leer sus páginas a través de un lenguaje coloquial y cercano. . a la realidad de los docentes del “Cole” nos ejemplifica y ayuda a comprender un poco más los conceptos y pasos que involucran el término “gamificación”.
Podría ser considerado un libro de autoayuda potenciado (en el buen sentido) para los docentes que se están integrando al mundo de los …
Editorial - Sangre, Sudor, Lágrimas Y Burocracia, Mauricio Rangel
Editorial - Sangre, Sudor, Lágrimas Y Burocracia, Mauricio Rangel
Journal of Roleplaying Studies and STEAM
Estamos muy contentos con la edición de este tercer número del Journal of Roleplaying Studies and STEAM, en primer lugar porque ¡ya contamos con ISSN!, suena a un logro menor pero debemos considerar los vericuetos burocráticos por los que hemos pasado semana tras semana para lograrlo.
Aprendizaje Situado En Mundos Virtuales, Una Experiencia De Participación A Través De Juegos De Rol., Vania C. Tovilla Mgtr.
Aprendizaje Situado En Mundos Virtuales, Una Experiencia De Participación A Través De Juegos De Rol., Vania C. Tovilla Mgtr.
Journal of Roleplaying Studies and STEAM
En tiempos actuales el uso de las tecnologías y la comunicación masiva se hace cada vez más frecuente, ya sea por medio de Internet, los teléfonos inteligentes y otros instrumentos que quizás resignifican el modo en el que los jóvenes en la actualidad conciben términos como virtualidad, aprendiendo y sobre toda la realidad, relacionándose con otros alrededor de todo el mundo. Es quizás por este auge de tecnologías que surgió en el año 2003, la herramienta virtual Second Life ; concebida como un mundo complejo y completamente virtual que permite a los usuarios aprender y vivir en otra realidad como …
Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang
Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang
Journal of Cybersecurity Education, Research and Practice
Recent advances in Artificial Intelligence (AI) have brought society closer to the long-held dream of creating machines to help with both common and complex tasks and functions. From recommending movies to detecting disease in its earliest stages, AI has become an aspect of daily life many people accept without scrutiny. Despite its functionality and promise, AI has inherent security risks that users should understand and programmers must be trained to address. The ICE (integrity, confidentiality, and equity) cybersecurity labs developed by a team of cybersecurity researchers addresses these vulnerabilities to AI models through a series of hands-on, inquiry-based labs. Through …
Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen
Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen
Journal of Cybersecurity Education, Research and Practice
Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and ethics, cybersecurity can foster diversity among audiences with varying educational backgrounds, thereby cultivating a richer and more resilient security landscape. A more diverse cybersecurity workforce can provide a broader range of perspectives, experiences, and skills to address the complex and ever-evolving threats of the digital age. The research focuses on enhancing cybersecurity education …