Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Kennesaw State University (34)
- Butler University (16)
- New Jersey Institute of Technology (7)
- Association of Arab Universities (6)
- Southern Methodist University (5)
-
- Beirut Arab University (4)
- Stephen F. Austin State University (4)
- University for Business and Technology in Kosovo (3)
- Claremont Colleges (2)
- University of Central Florida (2)
- University of South Florida (2)
- Binghamton University (1)
- Brigham Young University (1)
- Chinese Academy of Sciences (1)
- DePaul University (1)
- Fordham Law School (1)
- Governors State University (1)
- Purdue University (1)
- Universitas Indonesia (1)
- Valparaiso University (1)
- Keyword
-
- Cybersecurity (13)
- Cybersecurity Education (4)
- COVID-19 (3)
- Artificial Intelligence (2)
- Artificial Intelligence (AI) (2)
-
- Crickets (2)
- Data Science (2)
- Machine Learning (2)
- Research (2)
- Training (2)
- - (1)
- AI (1)
- ARIMA (1)
- ARMA (1)
- Acceptance (1)
- Acconting (1)
- Administration (1)
- Advancement flap (1)
- Amputation (1)
- Anomaly detection (1)
- Anonymity (1)
- Antarctica (1)
- Anthropogenic noise (1)
- Antiracism (1)
- Anxiety (1)
- Approximate inference (1)
- Aprendizaje basado en juegos (1)
- Aprendizaje situado (1)
- Artificial intelligence (1)
- Asynchronous file transfer (1)
- Publication
-
- Journal of Cybersecurity Education, Research and Practice (33)
- Butler Journal of Undergraduate Research (16)
- Journal of Roleplaying Studies and STEAM (7)
- Middle East Journal of Communication Studies (6)
- SMU Data Science Review (5)
-
- BAU Journal - Science and Technology (4)
- Journal of Multicultural Affairs (4)
- International Journal of Business and Technology (3)
- Rosen Research Review (2)
- ASEAN Journal of Community Engagement (1)
- Bulletin of Chinese Academy of Sciences (Chinese Version) (1)
- CODEE Journal (1)
- DePaul Magazine (1)
- Fordham Journal of Corporate & Financial Law (1)
- Journal of Applied Disciplines (1)
- Journal of Aviation Technology and Engineering (1)
- Journal of Humanistic Mathematics (1)
- Journal of Nonprofit Innovation (1)
- Military Cyber Affairs (1)
- Northeast Journal of Complex Systems (NEJCS) (1)
- The African Journal of Information Systems (1)
- The Journal of Values-Based Leadership (1)
- University of South Florida (USF) M3 Publishing (1)
Articles 1 - 30 of 94
Full-Text Articles in Physical Sciences and Mathematics
Outsourcing Voting To Ai: Can Chatgpt Advise Index Funds On Proxy Voting Decisions?, Chen Wang
Outsourcing Voting To Ai: Can Chatgpt Advise Index Funds On Proxy Voting Decisions?, Chen Wang
Fordham Journal of Corporate & Financial Law
Released in November 2022, Chat Generative Pre-training Transformer (“ChatGPT”), has risen rapidly to prominence, and its versatile capabilities have already been shown in a variety of fields. Due to ChatGPT’s advanced features, such as extensive pre-training on diverse data, strong generalization ability, fine-tuning capabilities, and improved reasoning, the use of AI in the legal industry could experience a significant transformation. Since small passive funds with low-cost business models generally lack the financial resources to make informed proxy voting decisions that align with their shareholders’ interests, this Article considers the use of ChatGPT to assist small investment funds, particularly small passive …
Analyzing A Smartphone Battle Using Bass Competition Model, Maila Hallare, Alireza Hosseinkhan, Hasala Senpathy K. Gallolu Kankanamalage
Analyzing A Smartphone Battle Using Bass Competition Model, Maila Hallare, Alireza Hosseinkhan, Hasala Senpathy K. Gallolu Kankanamalage
CODEE Journal
Many examples of 2x2 nonlinear systems in a first-course in ODE or a mathematical modeling class come from physics or biology. We present an example that comes from the business or management sciences, namely, the Bass diffusion model. We believe that students will appreciate this model because it does not require a lot of background material and it is used to analyze sales data and serve as a guide in pricing decisions for a single product. In this project, we create a 2x2 ODE system that is inspired by the Bass diffusion model; we call the resulting system the Bass …
Molybdenum Versus Tungsten Based Polyoxometalates For Highly Effective Methylene Blue Removal, Roula Abi Saad, Ghassan Younes, Mohammad H. El- Dakdouki, Rami Al-Oweini
Molybdenum Versus Tungsten Based Polyoxometalates For Highly Effective Methylene Blue Removal, Roula Abi Saad, Ghassan Younes, Mohammad H. El- Dakdouki, Rami Al-Oweini
BAU Journal - Science and Technology
[SiW12O40]4-(SiW12) and [Mo8O26]4- (Mo8) were synthesized and characterized by Fourier Transform Infrared spectroscopy (FTIR). The prepared polyoxometalates were studied as potential adsorbents for the removal of methylene blue (MB) from an aqueous solution. Various operational parameters—contact time, adsorbent dose, initial dye concentration, pH, and temperature— were meticulously assessed by UV/Vis spectrophotometry to study its impact on the adsorption efficacy. An inverse relationship was observed between the percentage dye removal and the initial dye concentration, highlighting the complexes' superior adsorption capabilities under lower dye loads. The …
Optimization Of The Bio-Synthesis Of Magnesium Nanoparticles From Staphylococcus Haemolyticus: A Pilot Study, Mariam Bassam, Malak Mezher, Mahmoud Khalil
Optimization Of The Bio-Synthesis Of Magnesium Nanoparticles From Staphylococcus Haemolyticus: A Pilot Study, Mariam Bassam, Malak Mezher, Mahmoud Khalil
BAU Journal - Science and Technology
Nanotechnology is developing rapidly. This field has many influences in humans’ life. Nanoparticles (NPs) have many unique properties including the size, shape, morphology, and surface area. The synthesis of NPs could be achieved by three ways: physical, chemical, and biological. However, the biological synthesis of NPs has a priority on the other domains due to its safety and environmental friendship. In this regard, the main objective of this study was to synthesize magnesium (Mg) NPs from the bacterium S. haemolyticus which was isolated from the Lebanese wastewater. Different parameters were applied to detect the best conditions to produce the highest …
Volar V-Y Advancement Flaps In Reconstructing Fingertip Injuries, Sawsan Abiad
Volar V-Y Advancement Flaps In Reconstructing Fingertip Injuries, Sawsan Abiad
BAU Journal - Science and Technology
Fingertip injuries with exposed bones and joints require immediate or early closure for the preservation of function and avoidance of complications. The ideal procedure should maintain the length of the finger and cover the defect with non-tender, well-padded skin with normal sensation. The aim of this study was to evaluate the role of the different types of volar V-Y advancement flaps in reconstructing and resurfacing injuries of the fingertips at different levels and angles. Thirty patients (N=30) sustaining fingertip injuries of variable etiology and lost components, type III & IV according to Allen’s classification were divided into two groups (n=15) …
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Journal of Nonprofit Innovation
Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.
Imagine Doris, who is …
Investigation Into A Practical Application Of Reinforcement Learning For The Stock Market, Philip Traxler, Sadik Aman, Will Rogers, Allyn Okun
Investigation Into A Practical Application Of Reinforcement Learning For The Stock Market, Philip Traxler, Sadik Aman, Will Rogers, Allyn Okun
SMU Data Science Review
A major problem of the financial industry is the ability to adapt their trading strategies at the same rate the market evolves. This paper proposes a solution using existing Reinforcement Learning libraries to help find new strategies at a practical scale. Using a wide domain of ticker symbols, an algorithm is trained in an environment that better represents reality. The supplied decision-making algorithm is tested using recorded data from the U.S stock market from 2000 through 2022. The results of this research show that existing techniques are statistically better than making decisions at random. With this result, this research shows …
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Journal of Cybersecurity Education, Research and Practice
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …
Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu
Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu
Journal of Cybersecurity Education, Research and Practice
This pilot study aims to assess the acceptability of Open University’s training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post experimental design was employed. 43 self-selected participants were recruited via an online register and posters at the university (excluding IT related courses). Participants completed the Human Aspects of Information Security Questionnaire (HAIS-Q) and Fear of Missing Out (FoMO) Scale. They then completed all games and quizzes in the GICAST course before repeating the HAIS-Q and …
Journal Of Roleplaying Studies And Steam (Jrpssteam) Vol. 2 [2023], (Issue 2)., Ricardo Morales-Carbajal, Cristo Leon, Sarah Lynne Bowman, Ligia-Estefania Estefania Canul-Noh, Vania C. Tovilla, Laura I. Quiroz, Elektra Diakolambrianou
Journal Of Roleplaying Studies And Steam (Jrpssteam) Vol. 2 [2023], (Issue 2)., Ricardo Morales-Carbajal, Cristo Leon, Sarah Lynne Bowman, Ligia-Estefania Estefania Canul-Noh, Vania C. Tovilla, Laura I. Quiroz, Elektra Diakolambrianou
Journal of Roleplaying Studies and STEAM
Editorial
Sangre, sudor, lágrimas y burocracia
Estamos muy contentos con la edición de este tercer número del Journal of Roleplaying Studies and STEAM, en primer lugar porque ¡ya contamos con ISSN!, suena a un logro menor pero debemos considerar los vericuetos burocráticos por los que hemos pasado semana tras semana para lograrlo. En segundo lugar, ¡por fin tenemos un artículo en inglés!, lo cual es motivo de celebración porque además es para nosotros un honor que sea de Elektra Diakolambrianou y Sarah Lynne Bowman, quienes en una gran muestra de confianza enviaron para dictamen su artículo denominado Dual Consciousness: What …
De Las 7 Bolas De Dragón A Los 7 Reinos De Poniente: Viajando Por La Ficción Para Transformar La Realidad, Vania C. Tovilla
De Las 7 Bolas De Dragón A Los 7 Reinos De Poniente: Viajando Por La Ficción Para Transformar La Realidad, Vania C. Tovilla
Journal of Roleplaying Studies and STEAM
resumen
El libro es una muestra de la experiencia y dedicación que tiene Issac Pérez López, quien con más de veinte años de práctica en la creación de entornos lúdicos nos sumerge en una suerte de juego donde al leer sus páginas a través de un lenguaje coloquial y cercano. . a la realidad de los docentes del “Cole” nos ejemplifica y ayuda a comprender un poco más los conceptos y pasos que involucran el término “gamificación”.
Podría ser considerado un libro de autoayuda potenciado (en el buen sentido) para los docentes que se están integrando al mundo de los …
Editorial - Sangre, Sudor, Lágrimas Y Burocracia, Mauricio Rangel
Editorial - Sangre, Sudor, Lágrimas Y Burocracia, Mauricio Rangel
Journal of Roleplaying Studies and STEAM
Estamos muy contentos con la edición de este tercer número del Journal of Roleplaying Studies and STEAM, en primer lugar porque ¡ya contamos con ISSN!, suena a un logro menor pero debemos considerar los vericuetos burocráticos por los que hemos pasado semana tras semana para lograrlo.
Aprendizaje Situado En Mundos Virtuales, Una Experiencia De Participación A Través De Juegos De Rol., Vania C. Tovilla Mgtr.
Aprendizaje Situado En Mundos Virtuales, Una Experiencia De Participación A Través De Juegos De Rol., Vania C. Tovilla Mgtr.
Journal of Roleplaying Studies and STEAM
En tiempos actuales el uso de las tecnologías y la comunicación masiva se hace cada vez más frecuente, ya sea por medio de Internet, los teléfonos inteligentes y otros instrumentos que quizás resignifican el modo en el que los jóvenes en la actualidad conciben términos como virtualidad, aprendiendo y sobre toda la realidad, relacionándose con otros alrededor de todo el mundo. Es quizás por este auge de tecnologías que surgió en el año 2003, la herramienta virtual Second Life ; concebida como un mundo complejo y completamente virtual que permite a los usuarios aprender y vivir en otra realidad como …
Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang
Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang
Journal of Cybersecurity Education, Research and Practice
Recent advances in Artificial Intelligence (AI) have brought society closer to the long-held dream of creating machines to help with both common and complex tasks and functions. From recommending movies to detecting disease in its earliest stages, AI has become an aspect of daily life many people accept without scrutiny. Despite its functionality and promise, AI has inherent security risks that users should understand and programmers must be trained to address. The ICE (integrity, confidentiality, and equity) cybersecurity labs developed by a team of cybersecurity researchers addresses these vulnerabilities to AI models through a series of hands-on, inquiry-based labs. Through …
Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen
Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen
Journal of Cybersecurity Education, Research and Practice
Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and ethics, cybersecurity can foster diversity among audiences with varying educational backgrounds, thereby cultivating a richer and more resilient security landscape. A more diverse cybersecurity workforce can provide a broader range of perspectives, experiences, and skills to address the complex and ever-evolving threats of the digital age. The research focuses on enhancing cybersecurity education …
Accountability Responsibility As An Instrument For Performance Measurement, Burhan Rexhepi B.R
Accountability Responsibility As An Instrument For Performance Measurement, Burhan Rexhepi B.R
International Journal of Business and Technology
This paper addresses the role and importance of accounting information, in particular liability accounting and the impact of liability centers on the success of the enterprise. The success of business decision making is closely linked to the quality and accuracy of accounting information. Every entity, regardless of ownership, size and form of legal organization, the capital structure exists and functions to achieve its objectives.
We live in a time of great changes in external environmental factors, which impose the need to know modern methods and models for running a business. However, the main basis of business success depends on the …
Types Of Financial And Economic Crisis, Burhan R. Rexhepi B.R
Types Of Financial And Economic Crisis, Burhan R. Rexhepi B.R
International Journal of Business and Technology
Financial crises have caused much debate among different economists. They have attempted to explore any possibility of detecting and preventing crises before they cause the damages that will require way more time and energy to repair the situation and bring the economies back on the right track of sustainable development. The purpose of this study is to analyze different types of financial crises that have affected the economies of the world in order to draw lessons from their experiences. Analysis of this study is divided into four types of financial crises: Banking crisis, speculative bubbles and the market failures, international …
An Outlook Of Factoring Industry In The World And In Kosovo, Burhan R. Rexhepi B.R
An Outlook Of Factoring Industry In The World And In Kosovo, Burhan R. Rexhepi B.R
International Journal of Business and Technology
Factoring is the most appropriate one for both bank and SMEs as it is considering a method of raising short- term working capital for enterprise by exchanging its A/R, not collateral focused and not adding any liability into their balance sheet. Moreover, factoring is a comprehensive financial service that includes not only financing but also credit protection, accounts receivable bookkeeping and collection services. Factoring not only brings benefit to CBs as a new service for diversification and increasing turnover but also supports SMEs to access financing for roll-up their business and gaining profit from achieving advantages of competitiveness. Although it …
Depaul Digest
DePaul Magazine
College of Education Professor Jason Goulah fosters hope, happiness and global citizenship through DePaul’s Institute for Daisaku Ikeda Studies in Education. Associate Journalism Professor Jill Hopke shares how to talk about climate change. News briefs from DePaul’s 10 colleges and schools: Occupational Therapy Standardized Patient Program, Financial Planning Certificate program, Business Education in Technology and Analytics Hub, Racial Justice Initiative, Teacher Quality Partnership grant, Intimate Partner Violence and Brain Injury collaboration, School of Music Career Closet, Sports Photojournalism course, DePaul Migration Collaborative’s Solutions Lab, Inclusive Screenwriting courses. New appointments: School of Music Dean John Milbauer, College of Education Dean Jennifer …
A Developed Framework For Studying Cyberethical Behaviour In North Central Nigeria, Aderinola Ololade Dunmade, Adeyinka Tella, Uloma Doris Onuoha
A Developed Framework For Studying Cyberethical Behaviour In North Central Nigeria, Aderinola Ololade Dunmade, Adeyinka Tella, Uloma Doris Onuoha
Journal of Cybersecurity Education, Research and Practice
ICT advancements have enabled more online activities, resulting in several cyberethical behaviours. Literature documents prevalence of plagiarism, and online fraud, among other misbehaviours. While behaviour has been explained by several theories, as scholarship and research advances, frameworks are modified to include more constructs. The researchers modified Fishbein and Ajzen (2011)'s Reasoned Action Approach to study female postgraduate students' perspectives toward cyberethical behaviour in North Central Nigerian universities.
The study focused on four variables, which were adequately captured by the model: perception, awareness, and attitude.
An adapted questionnaire collected quantitative data. This study used multistage sampling. A sample size of 989 …
Palestinian Journalists' Trends Towards Freelance Platforms As An Alternative Of Traditional Work In Journalistic Work And The Gratifications Achieved "A Field Study", Amin Wafi Prof.
Middle East Journal of Communication Studies
This study aims to identify the trends of media students towards the use of digital freelancer platforms in media work as an alternative to traditional journalism by knowing the degree of interest of students in digital freelancer platforms. The degree to which they are exposed، the reasons for exposure، the most important subjects to which they are exposed، the most important platforms they pursue، the most important skill needs، motivations، and stimuli that drive them to deal with freelancer platforms as an alternative to traditional journalism. It is a descriptive study and applied the survey curriculum in the framework of …
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Journal of Cybersecurity Education, Research and Practice
The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that this problem has not improved and nearly 44% believe it has gotten worse over the past 10 years. Threat actors are continuing to evolve their tactics, techniques, and procedures for conducting attacks on public and private targets. Education institutions and companies must adopt emerging technologies to develop security professionals and to increase cybersecurity awareness holistically. …
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Journal of Cybersecurity Education, Research and Practice
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …
Infrastructure As Code For Cybersecurity Training, Rui Pinto, Rolando Martins, Carlos Novo
Infrastructure As Code For Cybersecurity Training, Rui Pinto, Rolando Martins, Carlos Novo
Journal of Cybersecurity Education, Research and Practice
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. These attacks tend to become increasingly specialized, meaning cybersecurity professionals must ensure proficiency in specific areas. Naturally, recommendations include creating advanced practical training scenarios considering realistic situations to help trainees gain detailed knowledge. However, the caveats of high-cost infrastructure and difficulties in the deployment process of this kind of system, primarily due to the manual process of pre-configuring software needed for the …
Building The Operational Technology (Ot) Cybersecurity Workforce: What Are Employers Looking For?, Christopher A. Ramezan, Paul M. Coffy, Jared Lemons
Building The Operational Technology (Ot) Cybersecurity Workforce: What Are Employers Looking For?, Christopher A. Ramezan, Paul M. Coffy, Jared Lemons
Journal of Cybersecurity Education, Research and Practice
A trained workforce is needed to protect operational technology (OT) and industrial control systems (ICS) within national critical infrastructure and critical industries. However, what knowledge, skills, and credentials are employers looking for in OT cybersecurity professionals? To best train the next generation of OT cybersecurity professionals, an understanding of current OT cybersecurity position requirements is needed. Thus, this work analyzes 100 OT cybersecurity positions to provide insights on key prerequisite requirements such as prior professional experience, education, industry certifications, security clearances, programming expertise, soft verbal and written communication skills, knowledge of OT frameworks, standards, and network communication protocols, and position …
Leading K-12 Community Responsiveness To Cyber Threats Via Education Of School Community, Michele Kielty, A. Renee Staton
Leading K-12 Community Responsiveness To Cyber Threats Via Education Of School Community, Michele Kielty, A. Renee Staton
Journal of Cybersecurity Education, Research and Practice
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for K-12 systems and provides concrete tools for school leaders to employ in order to provide preventive education to their school communities.
An Interdisciplinary Approach To Experiential Learning In Cyberbiosecurity And Agriculture Through Workforce Development, Kellie Johnson, Tiffany Drape, Joseph Oakes, Joseph Simpson, Ann Brown, Donna M. Westfall-Rudd, Susan Duncan
An Interdisciplinary Approach To Experiential Learning In Cyberbiosecurity And Agriculture Through Workforce Development, Kellie Johnson, Tiffany Drape, Joseph Oakes, Joseph Simpson, Ann Brown, Donna M. Westfall-Rudd, Susan Duncan
Journal of Cybersecurity Education, Research and Practice
Cyberbiosecurity and workforce development in agriculture and the life sciences (ALS) is a growing area of need in the curriculum in higher education. Students that pursue majors related to ALS often do not include training in cyber-related concepts or expose the ‘hidden curriculum’ of seeking internships and jobs. Exposing students through workforce development training and hands-on engagement with industry professionals can provide learning opportunities to bridge the two and is an area of growth and demand as the workforce evolves. The objectives of this work were 1) to learn key concepts in cybersecurity, including data security, visualization, and analysis, to …
A Mixed-Method Study Exploring Cyber Ranges And Educator Motivation, Cheryl Beauchamp, Holly M. Matusovich
A Mixed-Method Study Exploring Cyber Ranges And Educator Motivation, Cheryl Beauchamp, Holly M. Matusovich
Journal of Cybersecurity Education, Research and Practice
A growing number of academic institutions have invested resources to integrate cyber ranges for applying and developing cybersecurity-related knowledge and skills. Cyber range developers and administrators provided much of what is known about cyber range resources and possible educational applications; however, the educator provides valuable understanding of the cyber range resources they use, how they use them, what they value, and what they do not value. This study provides the cyber range user perspective of cyber ranges in cybersecurity education by describing how K-12 educators are motivated using cyber ranges. Using mixed methods, this study explored educator motivation associated with …
Privacy Harm And Non-Compliance From A Legal Perspective, Suvineetha Herath, Haywood Gelman, Lisa Mckee
Privacy Harm And Non-Compliance From A Legal Perspective, Suvineetha Herath, Haywood Gelman, Lisa Mckee
Journal of Cybersecurity Education, Research and Practice
In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. Consequently, data breaches are a significant threat to individual privacy. Privacy is a multifaceted concept covering many areas, including the right to access, erasure, and rectify personal data. This paper explores the legal aspects of privacy harm and how they transform into legal action. Privacy harm is the negative impact to an individual as a result of the unauthorized release, gathering, …
Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd
Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd
Journal of Cybersecurity Education, Research and Practice
This paper should be of interest to the readers of this journal because it addresses a subject that has received little scholarly attention; namely, local government cybersecurity. The U.S. has over 90,000 units of local government, of which almost 39,000 are “general purpose” units (i.e., municipalities, counties, towns and townships). On average, these governments do not practice cybersecurity effectively (Norris, et al., 2019 and 2020). One possible reason is that they do not adopt and/or implement highly recommended cybersecurity policies. In this paper, we examine local government adoption or lack of adoption of cybersecurity policies using data from three surveys. …