Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 5 of 5
Full-Text Articles in Physical Sciences and Mathematics
The Impact Of Artificial Intelligence And Machine Learning On Organizations Cybersecurity, Mustafa Abdulhussein
The Impact Of Artificial Intelligence And Machine Learning On Organizations Cybersecurity, Mustafa Abdulhussein
Doctoral Dissertations and Projects
As internet technology proliferate in volume and complexity, the ever-evolving landscape of malicious cyberattacks presents unprecedented security risks in cyberspace. Cybersecurity challenges have been further exacerbated by the continuous growth in the prevalence and sophistication of cyber-attacks. These threats have the capacity to disrupt business operations, erase critical data, and inflict reputational damage, constituting an existential threat to businesses, critical services, and infrastructure. The escalating threat is further compounded by the malicious use of artificial intelligence (AI) and machine learning (ML), which have increasingly become tools in the cybercriminal arsenal. In this dynamic landscape, the emergence of offensive AI introduces …
Managing Cyber Defense As A Business Threat For Small And Medium Enterprises, Binh Quang Vo
Managing Cyber Defense As A Business Threat For Small And Medium Enterprises, Binh Quang Vo
Doctoral Dissertations and Projects
The U.S small and medium businesses (SMBs) are constantly attacked by cybercriminals. Alarmingly, the number of victimized SMBs is growing considerably every year. This results in the increasing loss of billions of dollars and risks to the national economy. The problem addressed was the rising number of cyberattacks critically harming SMBs resulting in revenue loss, damages to reputation, and business closure. The purpose of this research was to reveal the contemporary barriers and challenges that impact cybersecurity competencies of SMBs. This study used semi-structured interviews of participants who are currently working as cyber professionals in SMBs across industries. The goal …
The Minority In The Minority, Black Women In Computer Science Fields: A Phenomenological Study, Blanche' D. Anderson
The Minority In The Minority, Black Women In Computer Science Fields: A Phenomenological Study, Blanche' D. Anderson
Doctoral Dissertations and Projects
The purpose of this transcendental phenomenological study was to describe the lived experiences of Black women with a bachelor’s, master’s, or doctoral degree in computer science, currently employed in the United States. The theory guiding this study was Krumboltz’s social learning theory of career decision-making, as it provides a foundation for understanding how a combination of factors leads to an individual’s educational and occupational preferences and skills. This qualitative study answered the following central research question: What are the lived experiences of Black women with a bachelor’s, master’s, or doctoral degree in computer science, currently employed in the United States? …
Understanding Student Perspective Of Undergraduate Cybersecurity Programs And Experiences Across Christian Colleges And Universities, Brandon P. Grech
Understanding Student Perspective Of Undergraduate Cybersecurity Programs And Experiences Across Christian Colleges And Universities, Brandon P. Grech
Doctoral Dissertations and Projects
The number of Christian colleges and universities that are offering cybersecurity four-year degrees is rising. The workforce is in dire need of cybersecurity professionals; however, has anybody asked the new cybersecurity professionals in the workforce how their recent academic experience prepared them for such a global need? Research is well-documented about what industry currently needs in cybersecurity professionals; however, this research focused on asking graduates what students need for the workforce. The purpose of this explorative qualitative study was to gain an understanding of the phenomena of the holistic experience (technical, nontechnical, and whole-person) strengths and shortcomings (if any) recent …
Comparing Security Self-Efficacy Amongst College Freshmen And Senior, Female And Male Cybersecurity Students, Lane H. Melton
Comparing Security Self-Efficacy Amongst College Freshmen And Senior, Female And Male Cybersecurity Students, Lane H. Melton
Doctoral Dissertations and Projects
This study sought to determine if there was a difference in the self-efficacy of freshman and senior, female and male Cybersecurity students relating to threats associated with various information systems. The design for this quantitative study was non-experimental, causal-comparative and known as group comparison used to determine if there was a causal relationship between variables. The method used to make that determination utilized a self-efficacy survey developed by Phelps (2005), to identify the independent variables specific level of self-efficacy. Research was conducted at a small, southern university with total of 33 participants. Each student was enrolled in the Computer Science …