Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (266)
- California State University, Monterey Bay (52)
- Walden University (28)
- Singapore Management University (26)
- Kennesaw State University (21)
-
- Santa Clara University (18)
- Binghamton University (6)
- Clark University (6)
- Old Dominion University (6)
- World Maritime University (6)
- University of South Florida (5)
- Southern Methodist University (4)
- University of New Mexico (4)
- University of San Diego (4)
- Liberty University (3)
- SIT Graduate Institute/SIT Study Abroad (3)
- Utah State University (3)
- Western Kentucky University (3)
- Bowling Green State University (2)
- California State University, San Bernardino (2)
- City University of New York (CUNY) (2)
- Claremont Colleges (2)
- Columbus State University (2)
- Eastern Illinois University (2)
- Furman University (2)
- Georgia Southern University (2)
- Missouri University of Science and Technology (2)
- New Jersey Institute of Technology (2)
- Portland State University (2)
- University of Kentucky (2)
- Keyword
-
- CDC (27)
- Cara sembuhkan Ktil Kelamin (26)
- Diagnosis (26)
- IUSTI (26)
- Obat Kutil Kelamin Ampuh (26)
-
- Obat Tradisional Kutil Kelamin (26)
- Obat herbal Kutil Kelamin (26)
- Pedoman (26)
- Pengobatan (26)
- Solusi Cepat Rontokan Ktul Kelamin (26)
- Tips HIlangkan Kutil Kelamin (26)
- Monterey County (25)
- Groundwater (22)
- Obat sipilis (22)
- Obat herbal (21)
- Penyembuhan (21)
- Saran dokter (21)
- Tanpa operasi (21)
- Sipilis (20)
- Obat ambeien tradisional bawang putih (18)
- Salinas River Basin (18)
- Precipitation (17)
- Reservoir storage (16)
- Obat tradisional ambeien parah (15)
- Obat wasir tradisional mujarab (13)
- California (12)
- Cara mengobati wasir dengan bawang putih (11)
- Obat kutil kelamin di apotik kimia farma (11)
- Cara menghilangkan benjolan ambeien dengan alami (10)
- Cara mengobati bab keluar darah (10)
- Publication
-
- Roni Andriansyah (56)
- Mae Tasari (41)
- Ndas Kura (31)
- Walden Dissertations and Doctoral Studies (28)
- Monterey County Water Resources Agency Water Reports (18)
-
- Miscellaneous Documents and Reports (16)
- Research Collection School Of Computing and Information Systems (16)
- The Santa Clara (14)
- keto healthys (14)
- KSU Proceedings on Cybersecurity Education, Research and Practice (10)
- Miscellaneous Monterey and San Luis Obispo County Documents and Reports (9)
- Journal of Cybersecurity Education, Research and Practice (8)
- Northeast Journal of Complex Systems (NEJCS) (6)
- School of Professional Studies (6)
- World Maritime University Dissertations (6)
- nerti gedra (6)
- dul lah-gembor (5)
- gus-selang kangan (5)
- Branch Mathematics and Statistics Faculty and Staff Publications (4)
- Monterey County Water Resources Agency Engineering Reports (4)
- Research Collection Lee Kong Chian School Of Business (4)
- Santa Clara Magazine (4)
- USF Tampa Graduate Theses and Dissertations (4)
- aby manyu (4)
- gus abdul (4)
- gus-gat tal (4)
- gus-ken cing (4)
- gus-man jur (4)
- Independent Study Project (ISP) Collection (3)
- Jastin Fiber (3)
- Publication Type
- File Type
Articles 1 - 30 of 536
Full-Text Articles in Physical Sciences and Mathematics
Early Detection Of Fake News On Social Media, Yang Liu
Early Detection Of Fake News On Social Media, Yang Liu
Dissertations
The ever-increasing popularity and convenience of social media enable the rapid widespread of fake news, which can cause a series of negative impacts both on individuals and society. Early detection of fake news is essential to minimize its social harm. Existing machine learning approaches are incapable of detecting a fake news story soon after it starts to spread, because they require certain amounts of data to reach decent effectiveness which take time to accumulate. To solve this problem, this research first analyzes and finds that, on social media, the user characteristics of fake news spreaders distribute significantly differently from those …
Smart Factories, Dumb Policy? Managing Cybersecurity And Data Privacy Risks In The Industrial Internet Of Things, Scott J. Shackelford
Smart Factories, Dumb Policy? Managing Cybersecurity And Data Privacy Risks In The Industrial Internet Of Things, Scott J. Shackelford
Minnesota Journal of Law, Science & Technology
No abstract provided.
A Desire Fulfillment Theory Of Digital Game Enjoyment, Owen M. Schaffer
A Desire Fulfillment Theory Of Digital Game Enjoyment, Owen M. Schaffer
College of Computing and Digital Media Dissertations
Empirical research on what makes digital games enjoyable is critical for practitioners who want to design for enjoyment, including for Game Design, Gamification, and Serious Games. But existing theories of what leads to digital game enjoyment have been incomplete or lacking in empirical support showing their impact on enjoyment.
Desire Fulfillment Theory is proposed as a new theory of what leads to digital game enjoyment and tested through research with people who have recently played a digital game. This theory builds on three established theories: Expectancy Disconfirmation Theory, Theory of Basic Human Desires, and Flow Theory. These three theories are …
The Economics Of Residential Solar Panels: Comparing Tiered And Time Of Use Plans, Prashanth Nyer, Candace Ybarra, Jack B. Broughton
The Economics Of Residential Solar Panels: Comparing Tiered And Time Of Use Plans, Prashanth Nyer, Candace Ybarra, Jack B. Broughton
Business Faculty Articles and Research
This case study uses data from a Southern California Edison residential customer on a grandfathered tiered rate plan to investigate 1) whether it is economically beneficial for the customer to switch from a tiered-rate plan to a Time-of-Use (TOU) plan, 2) whether going solar now makes financial sense for new solar customers, 3) what level of usage offset (the percentage of the customer’s annual electricity consumption that is provided by the solar panels) would result in the maximum financial benefit for the customer under each of the many TOU plans, and 4) whether solar customers on TOU plans can save …
An Ai Approach To Measuring Financial Risk, Lining Yu, Wolfgang Karl Hardle, Lukas Borke, Thijs Benschop
An Ai Approach To Measuring Financial Risk, Lining Yu, Wolfgang Karl Hardle, Lukas Borke, Thijs Benschop
Sim Kee Boon Institute for Financial Economics
AI artificial intelligence brings about new quantitative techniques to assess the state of an economy. Here, we describe a new measure for systemic risk: the Financial Risk Meter (FRM). This measure is based on the penalization parameter (λ" role="presentation" style="box-sizing: border-box; display: inline; font-style: normal; font-weight: normal; line-height: normal; font-size: 18px; text-indent: 0px; text-align: left; text-transform: none; letter-spacing: normal; word-spacing: normal; overflow-wrap: normal; white-space: nowrap; float: none; direction: ltr; max-width: none; max-height: none; min-width: 0px; min-height: 0px; border: 0px; padding: 0px; margin: 0px; position: relative;">λλ) of a linear quantile lasso regression. The FRM is calculated by taking the average …
Deep Reinforcement Learning Pairs Trading, Andrew Brim
Deep Reinforcement Learning Pairs Trading, Andrew Brim
All Graduate Plan B and other Reports, Spring 1920 to Spring 2023
This research applies a deep reinforcement learning technique, Deep Q-network, to a stock market pairs trading strategy for profit. Artificial intelligent methods have long since been applied to optimize trading strategies. This work trains and tests a DQN to trade co-integrated stock market prices, in a pairs trading strategy. The results demonstrate the DQN is able to consistently produce positive returns when executing a pairs trading strategy.
Optimal Control For Transboundary Pollution Under Ecological Compensation: A Stochastic Differential Game Approach, Ke Jiang, Ryan Knowles Merrill, Daming You, Pan Pan
Optimal Control For Transboundary Pollution Under Ecological Compensation: A Stochastic Differential Game Approach, Ke Jiang, Ryan Knowles Merrill, Daming You, Pan Pan
Research Collection Lee Kong Chian School Of Business
To account for previously ignored, yet widely observed uncertainty in nature's capability to replenish the natural environment in ways that should inform ideal design of ecological compensation (EC) regimes, this study constructs a stochastic differential game (SDG) model to analyze transboundary pollution control options between a compensating and compensated region. Equilibrium strategies in the stochastic, two player game inform optimal control theory and reveal a welfare distribution mechanism to form the basis of an improved cooperative game contract. A case-based numerical example serves to verify the theoretical results and supports three key insights. First, accounting for various random disturbance factors, …
Online Content Consumption: Social Endorsements, Observational Learning And Word-Of-Mouth, Qian Tang, Tingting Song, Liangfei Qiu, Ashish Agarwal
Online Content Consumption: Social Endorsements, Observational Learning And Word-Of-Mouth, Qian Tang, Tingting Song, Liangfei Qiu, Ashish Agarwal
Research Collection School Of Computing and Information Systems
The consumption of online content can occur through observational learning (OL) whereby consumers follow previous consumers’ choices or social endorsement (SE) wherein consumers receive content sharing from their social ties. As users consume content, they also generate post-consumption word-of-mouth (WOM) signals. OL, SE and WOM together shape the diffusion of the content. This study examines the drivers of SE and the effect of SE on content consumption and post-consumption WOM. In particular, we compare SE with OL. Using a random sample of 8,945 new videos posted on YouTube, we collected a multi-platform dataset consisting of data on video consumption and …
Optimal Design And Ownership Structures Of Innovative Retail Payment Systems, Zhiling Guo, Dan Ma
Optimal Design And Ownership Structures Of Innovative Retail Payment Systems, Zhiling Guo, Dan Ma
Research Collection School Of Computing and Information Systems
In response to the Fintech trend, an ongoing debate in the banking industry is how to design the new-generation interbank retail payment and settlement system. We propose a two-stage analytical model that takes into account the value-risk tradeoff in the new payment system design, as well as banks’ participation incentives and adoption timing decisions. We find that, as the system base value increases, banks tend to synchronize their investment and adoption decisions. When the system base value is low and banks are heterogeneous, bank association ownership maximizes social welfare. When both the system base value and bank heterogeneity are moderate, …
Quantum Consensus, Jorden Seet, Paul Griffin
Quantum Consensus, Jorden Seet, Paul Griffin
Research Collection School Of Computing and Information Systems
In this paper, we propose a novel consensus mechanism utilizing the quantum properties of qubits. This move from classical computing to quantum computing is shown to theoretically enhance the scalability and speed of distributed consensus as well as improve security and be a potential solution for the problem of blockchain interoperability. Using this method may circumvent the common problem known as the Blockchain Trilemma, enhancing scalability and speed without sacrificing de-centralization or byzantine fault tolerance. Consensus speed and scalability is shown by removing the need for multicast responses and exploiting quantum properties to ensure that only a single multicast is …
“Where’S The I-O?” Artificial Intelligence And Machine Learning In Talent Management Systems, Manuel F. Gonzalez, John F. Capman, Frederick L. Oswald, Evan R. Theys, David L. Tomczak
“Where’S The I-O?” Artificial Intelligence And Machine Learning In Talent Management Systems, Manuel F. Gonzalez, John F. Capman, Frederick L. Oswald, Evan R. Theys, David L. Tomczak
Personnel Assessment and Decisions
Artificial intelligence (AI) and machine learning (ML) have seen widespread adoption by organizations seeking to identify and hire high-quality job applicants. Yet the volume, variety, and velocity of professional involvement among I-O psychologists remains relatively limited when it comes to developing and evaluating AI/ML applications for talent assessment and selection. Furthermore, there is a paucity of empirical research that investigates the reliability, validity, and fairness of AI/ML tools in organizational contexts. To stimulate future involvement and research, we share our review and perspective on the current state of AI/ML in talent assessment as well as its benefits and potential pitfalls; …
These 5 Simple Keto Zone Tricks Will Pump Up Your Sales Almost Instantly, Keto Healthys
These 5 Simple Keto Zone Tricks Will Pump Up Your Sales Almost Instantly, Keto Healthys
keto healthys
Introducing A Mobile Health Care Platform In An Underserved Rural Population: Reducing Assimilations Gaps On Adoption And Use Via Nudges, Joseph Hodges
USF Tampa Graduate Theses and Dissertations
Rural communities are often overlooked when it comes to offering cutting edge consumer healthcare technologies. Mobile applications usually exclude populations in rural demographics due to the infrastructure requirements and available technology in the region. The population studied is a low income rural health plan in southwest Georgia. They are uniquely considered as they have the highest healthcare costs in the U.S. and are compared to healthcare costs among higher income populations like Vail, Colorado. Innovations, such as mobile healthcare applications, have the capacity to offset some of these costs, but even if adoption occurs, this does not guarantee use will …
Combating Intersection-Related Imposter Phenomenon In The Workplace Through Career Readiness, Simone Stewart
Combating Intersection-Related Imposter Phenomenon In The Workplace Through Career Readiness, Simone Stewart
Black Issues Conference
Research has determined that Impostor Phenomenon (IP) most likely occurs in members of minority groups, students, first generation professionals and persons for whom success came quickly. Other studies have shown that many professional women are One of the ways to combat IP is through the development of competencies needed in your career. Attend this workshop to learn how to develop strategies to approach career competency while on campus and throughout your career to keep you on top of your game!
Twitter And The Magic Pony, Singapore Management University
Twitter And The Magic Pony, Singapore Management University
Perspectives@SMU
London-based Magic Pony went from A.I. startup to a multimillion dollar cash-out in 18 months. Was selling to Twitter the right exit strategy?
Gender And Racial Diversity In Commercial Brands’ Advertising Images On Social Media, Jisun An, Haewoon Kwak
Gender And Racial Diversity In Commercial Brands’ Advertising Images On Social Media, Jisun An, Haewoon Kwak
Research Collection School Of Computing and Information Systems
Gender and racial diversity in the mediated images from the media shape our perception of different demographic groups. In this work, we investigate gender and racial diversity of 85,957 advertising images shared by the 73 top international brands on Instagram and Facebook. We hope that our analyses give guidelines on how to build a fully automated watchdog for gender and racial diversity in online advertisements.
Smrtfridge: Iot-Based, User Interaction-Driven Food Item & Quantity Sensing, Amit Sharma, Archan Misra, Vengateswaran Subramaniam, Youngki Lee
Smrtfridge: Iot-Based, User Interaction-Driven Food Item & Quantity Sensing, Amit Sharma, Archan Misra, Vengateswaran Subramaniam, Youngki Lee
Research Collection School Of Computing and Information Systems
We present SmrtFridge, a consumer-grade smart fridge prototype that demonstrates two key capabilities: (a) identify the individual food items that users place in or remove from a fridge, and (b) estimate the residual quantity of food items inside a refrigerated container (opaque or transparent). Notably, both of these inferences are performed unobtrusively, without requiring any explicit user action or tagging of food objects. To achieve these capabilities, SmrtFridge uses a novel interaction-driven, multi-modal sensing pipeline, where Infrared (IR) and RGB video sensing, triggered whenever a user interacts naturally with the fridge, is used to extract a foreground visual image of …
Automated Theme Search In Ico Whitepapers, Chuanjie Fu, Andrew Koh, Paul Griffin
Automated Theme Search In Ico Whitepapers, Chuanjie Fu, Andrew Koh, Paul Griffin
Research Collection School Of Computing and Information Systems
The authors explore how topic modeling can be used to automate the categorization of initial coin offerings (ICOs) into different topics (e.g., finance, media, information, professional services, health and social, natural resources) based solely on the content within the whitepapers. This tool has been developed by fitting a latent Dirichlet allocation (LDA) model to the text extracted from the ICO whitepapers. After evaluating the automated categorization of whitepapers using statistical and human judgment methods, it is determined that there is enough evidence to conclude that the LDA model appropriately categorizes the ICO whitepapers. The results from a two-population proportion test …
Numerical, Secondary Big Data Quality Issues, Quality Threshold Establishment, & Guidelines For Journal Policy Development, Anita Lee-Post, Ram Pakath
Numerical, Secondary Big Data Quality Issues, Quality Threshold Establishment, & Guidelines For Journal Policy Development, Anita Lee-Post, Ram Pakath
Marketing & Supply Chain Faculty Publications
An IS researcher may obtain Big Data from primary or secondary data sources. Sometimes, acquiring primary Big Data is infeasible due to availability, accessibility, cost, time, and/or complexity considerations. In this paper, we focus on Big Data-based IS research and discuss ways in which one may, post hoc, establish quality thresholds for numerical Big Data obtained from secondary sources. We also present guidelines for developing journal policies aimed at ensuring the veracity and verifiability of such data when used for research purposes.
Detecting Digitally Forged Faces In Online Videos, Neilesh Sambhu
Detecting Digitally Forged Faces In Online Videos, Neilesh Sambhu
USF Tampa Graduate Theses and Dissertations
We use Rossler’s FaceForensics dataset of 1004 online videos and their corresponding forged counterparts [1] to investigate the ability to distinguish digitally forged facial images from original images automatically with deep learning. The proposed convolutional neural network is much smaller than the current state-of-the-art solutions. Nevertheless, the network maintains a high level of accuracy (99.6%), all while using the entire FaceForensics dataset and not including any temporal information. We implement majority voting and show the impact on accuracy (99.67%), where only 1 video of 300 is misclassified. We examine why the model misclassified this one video. In terms of tuning …
2019 Celebration Of Scholarship, Creativity, And Engagement, Beth Heldebrandt, Todd Bruns, Seth Yeakel, Matthew Eifrid
2019 Celebration Of Scholarship, Creativity, And Engagement, Beth Heldebrandt, Todd Bruns, Seth Yeakel, Matthew Eifrid
Programs
Scholarship, creativity, innovation, and the many forms of collaborative engagement that shape faculty life and student learning are central to the mission of Eastern Illinois University. For that reason, our faculty, department chairs, college deans, the Provost, and the entire campus community celebrate the achievements and outstanding contributions of our colleagues and students to their disciplines and professions every year. And, as the following pages illustrate, faculty engaged in continuing scholarly and creative activities that have provided outstanding mentoring experiences for our undergraduate and graduate students.
In addition to recognizing faculty performances, shows, publications, grants and other professional efforts, the …
The Wood Pellet Industry In The United States South: An Exploratory Study Of Resident Environmental, Social, And Economic Perceptions, Mason Thomas Leblanc
The Wood Pellet Industry In The United States South: An Exploratory Study Of Resident Environmental, Social, And Economic Perceptions, Mason Thomas Leblanc
LSU Master's Theses
This thesis research provides insight into the wood pellet manufacturing industry from the perspectives of residents in the US South, focusing on environmental, social, and economic constructs. The region is the largest producer and exporter of wood pellets in the world. The focus of previous research on wood pellets has focused on environmental, energy, and economic attributes. This study is the first of its kind to expand the research to investigate in-depth socio-economic dynamics and fill a general gap in knowledge of the relationship between the wood pellet industry and public supply-side issues in the region. Two rounds of a …
Investing In The New Blue Economy: The Changing Role Of International Development Organizations In Catalyzing Private Sector Investment In Support Of Regional Strategic Action Programmes For The Sustainable Development Of Coasts And Oceans, Ryan Whisnant, Veerle Vandeweerd
Investing In The New Blue Economy: The Changing Role Of International Development Organizations In Catalyzing Private Sector Investment In Support Of Regional Strategic Action Programmes For The Sustainable Development Of Coasts And Oceans, Ryan Whisnant, Veerle Vandeweerd
Journal of Ocean and Coastal Economics
Over the last 20 years, governments sharing common coastal and ocean ecosystems have developed and agreed on concrete regional action programs to stop and, in some cases, reverse a trend of deteriorating coastal and ocean resources. Implementation of these action programs requires significant investments by the public and private sectors alike, with the potential for substantial economic growth and enhanced social well-being. For this to happen, new institutional arrangements, technologies, and financial vehicles and asset classes are needed to mainstream innovative “blue economy” projects that have the potential to transition economies and communities to more sustainable development paths.
This paper …
Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan Vansickle, Tamirat Abegaz, Bryson Payne
Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan Vansickle, Tamirat Abegaz, Bryson Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
Wireless access points have greatly improved users' ability to connect to the Internet. However, they often lack the security mechanisms needed to protect users. Malicious actors could create a rogue access point (RAP), using a device such as the WiFi Pineapple Nano, that could trick users into connecting to an illegitimate access point (AP). To make them look legitimate, adversaries tend to setup RAPs to include a captive portal. This is very effective, since most public networks use captive portals as a means to provide genuine access. The objective of this study is to examine the effectiveness of RAP identification …
Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li
Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li
KSU Proceedings on Cybersecurity Education, Research and Practice
The security threats to mobile application are growing explosively. Mobile app flaws and security defects could open doors for hackers to easily attack mobile apps. Secure software development must be addressed earlier in the development lifecycle rather than fixing the security holes after attacking. Early eliminating against possible security vulnerability will help us increase the security of software and mitigate the consequence of damages of data loss caused by potential malicious attacking. In this paper, we present a static security analysis approach with open source FindSecurityBugs plugin for Android StThe security threats to mobile application are growing explosively. Mobile app …
Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne
Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
This research provides a means of automating the process to reverse engineer an automobile’s CAN Bus to quickly recover CAN IDs and message values to control the various systems in a modern automobile. This approach involved the development of a Python script that uses several open-source tools to interact with the CAN Bus, and it takes advantage of several vulnerabilities associated with the CAN protocol. These vulnerabilities allow the script to conduct replay attacks against the CAN Bus and affect various systems in an automobile without the operator’s knowledge or interaction.
These replay attacks can be accomplished by capturing recorded …
A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar
A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar
KSU Proceedings on Cybersecurity Education, Research and Practice
The massive global network that connects billions of humans and millions of devices and allow them to communicate with each other is known as the internet. Over the last couple of decades, the internet has grown expeditiously and became easier to use and became a great educational tool. Now it can used as a weapon that can steal someone’s identity, expose someone’s financial information, or can destroy your networking devices. Even in the last decade, there have been more cyber attacks and threats destroying major companies by breaching the databases that have millions of personal information that can be sold …
An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam
An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam
KSU Proceedings on Cybersecurity Education, Research and Practice
The growing market of the mobile application is overtaking the web application. Mobile application development environment is open source, which attracts new inexperienced developers to gain hands on experience with applicationn development. However, the security of data and vulnerable coding practice is an issue. Among all mobile Operating systems such as, iOS (by Apple), Android (by Google) and Blackberry (RIM), Android dominates the market. The majority of malicious mobile attacks take advantage of vulnerabilities in mobile applications, such as sensitive data leakage via the inadvertent or side channel, unsecured sensitive data storage, data transition and many others. Most of these …
Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward
Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward
KSU Proceedings on Cybersecurity Education, Research and Practice
Both consumers and businesses are rapidly adopting IoT premised on convenience and control. Industry and academic literature talk about billions of embedded IoT devices being implemented with use-cases ranging from smart speakers in the home, to autonomous trucks, and trains operating in remote industrial sites. Historically information systems supporting these disparate use-cases have been categorised as Information Technology (IT) or Operational Technology (OT), but IoT represents a fusion between these traditionally distinct information security models.
This paper presents a review of IEEE and Elsevier peer reviewed papers that identifies the direction in IoT education and training around information security. It …
Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez
Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez
KSU Proceedings on Cybersecurity Education, Research and Practice
Cybersecurity and Information Technology Management programs have many similarities and many similar knowledge, skills, and abilities are taught across both programs. The skill mappings for the NICE Framework and the knowledge units required to become a National Security Agency and Department of Homeland Security Center of Academic Excellence in Cyber Defense Education contain many information technology management functions. This paper explores one university’s perception on how a joint Cybersecurity and Information Technology Management program could be developed to upskill students to be work force ready.