Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (13)
- Information Security (10)
- Business (9)
- Technology and Innovation (9)
- Management Information Systems (7)
-
- Education (4)
- Environmental Sciences (2)
- Software Engineering (2)
- Computer Engineering (1)
- Computer and Systems Architecture (1)
- Curriculum and Instruction (1)
- Databases and Information Systems (1)
- Educational Assessment, Evaluation, and Research (1)
- Engineering (1)
- Higher Education (1)
- Library and Information Science (1)
- Natural Resources and Conservation (1)
- Other Computer Sciences (1)
- Other Education (1)
- Other Environmental Sciences (1)
- Scholarship of Teaching and Learning (1)
- Secondary Education (1)
- Social and Behavioral Sciences (1)
- Sustainability (1)
- Systems Architecture (1)
- Keyword
-
- Cybersecurity (4)
- Editorial (2)
- Security (2)
- Adversarial thinking (1)
- Boundary Resources (1)
-
- Collaboration (1)
- Compliance (1)
- Computer network security (1)
- Computer science (1)
- Cyber Security (1)
- Cybersecurity Assessment Tools (CATS) (1)
- Cybersecurity Mindset (1)
- Cybersecurity education (1)
- Cybersecurity training program (1)
- Developing Countries (1)
- Education (1)
- Environmental Framework (1)
- Erosion (1)
- Experiential Learning (1)
- FERPA (1)
- Game-Based Learning (1)
- Generative Capacity (1)
- Gullies (1)
- Higher Education (1)
- Higher Education Institutions (1)
- Implementation guidelines (1)
- Implementation plan (1)
- Incentives (1)
- Information Security Education (1)
- Information Systems (1)
Articles 1 - 14 of 14
Full-Text Articles in Physical Sciences and Mathematics
From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord
From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord
Journal of Cybersecurity Education, Research and Practice
Welcome to the Fall 2018 issue of the Journal of Cybersecurity Education, Research, and Practice (JCERP). On behalf of the editorial team, we thank you for taking the time to read this issue and strongly encourage you to submit an article for consideration in an upcoming edition.
Using A Game To Improve Phishing Awareness, Patrickson Weanquoi, Jaris Johnson, Jinghua Zhang
Using A Game To Improve Phishing Awareness, Patrickson Weanquoi, Jaris Johnson, Jinghua Zhang
Journal of Cybersecurity Education, Research and Practice
Cybersecurity education has become increasingly critical as we spend more of our everyday lives online. Research shows that college students are mostly unaware of the many online dangers. To teach students about cybersecurity using their preferred medium, gaming, we developed an educational 2D game called “Bird’s Life” that aims to teach college students, as well as general interest individuals, about phishing. Players will come to understand phishing attacks and how to avoid them in real-world scenarios through a fun gaming context. The game can be deployed to multiple platforms such as PC, web, and mobile devices. To measure the effect …
Using Case Studies To Teach Cybersecurity Courses, Yu Cai
Using Case Studies To Teach Cybersecurity Courses, Yu Cai
Journal of Cybersecurity Education, Research and Practice
This paper introduces a holistic and case-analysis teaching model by integrating case studies into cybersecurity courses. The proposed model starts by analyzing real-world cyber breaches. Students look into the details of these attacks and learn how these attacks took place from the beginning to the end. During the process of case analysis, a list of security topics reflecting different aspects of these breaches is introduced. Through guided in-class discussion and hands-on lab assignments, student learning in lecture will be reinforced. Overall, the entire cybersecurity course is driven by case studies. The proposed model is great for teaching cybersecurity. First, the …
An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf
An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf
Journal of Cybersecurity Education, Research and Practice
This work seeks to answer the question: Does faculty cybersecurity knowledge gained from teaching and research transfer to other IT units in the university? Specifically, do colleges and universities that excel in cybersecurity teaching and research have more secure websites? This work explores a unique setting where the knowledge of the source and recipient are both directly related and observable without outside intervention. Our study employed data from 591 U.S. colleges and universities, the National Centers of Academic Excellence (CAE) program, accepted paper data from the ACM Conference on Computer and Communications Security (CCS) and the IEEE Symposium on Security …
Cultivating Third Party Development In Platform-Centric Software Ecosystems: Extended Boundary Resources Model, Brown C. Msiska
Cultivating Third Party Development In Platform-Centric Software Ecosystems: Extended Boundary Resources Model, Brown C. Msiska
The African Journal of Information Systems
Software ecosystems provide an effective way through which software solutions can be constructed by composing software components, typically applications, developed by internal and external developers on top of a software platform. Third party development increases the potential of a software ecosystem to effectively and quickly respond to context-specific software requirements. The boundary resources model gives a theoretical account for cultivation of third party development premised on the role of platform boundary resources such as application programming interfaces (API). However, from a longitudinal case study of the DHIS2 software ecosystem, this paper observes that no matter how good the boundary resources …
From The Editors, Michael E. Whitman, Herbert J. Mattord, Carole L. Hollingsworth
From The Editors, Michael E. Whitman, Herbert J. Mattord, Carole L. Hollingsworth
Journal of Cybersecurity Education, Research and Practice
Welcome to the Spring 2018 issue of the Journal of Cybersecurity Education, Research, and Practice (JCERP). On behalf of the editorial team, we thank you for taking the time to read this issue and strongly encourage you to submit an article for consideration in an upcoming edition.
Voice Hacking: Using Smartphones To Spread Ransomware To Traditional Pcs, Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz
Voice Hacking: Using Smartphones To Spread Ransomware To Traditional Pcs, Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz
Journal of Cybersecurity Education, Research and Practice
This paper presents a voice hacking proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue exploit, …
"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Security Awareness Campaign, Rachael L. Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky J. Jenkins
"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Security Awareness Campaign, Rachael L. Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky J. Jenkins
Journal of Cybersecurity Education, Research and Practice
This article discusses the lessons learned after implementing a successful university-wide cyber security campaign. The Cyber Security Awareness Committee (CyberSAC), a group comprised of diverse units across campus, collaborated together on resources, talent, people, equipment, technology, and assessment practices to meet strategic goals for cyber safety and education. The project involves assessing student learning and behavior changes after participating in a Cyber Security Password Awareness event that was run as a year-long campaign targeting undergraduate students. The results have implications for planning and implementing university-wide initiatives in the field of cyber security, and more broadly, higher education at large.
A Case Study In The Implementation Of A Human-Centric Higher Education Cybersecurity Program, John W. Coffey, Melanie Haveard, Geissler Golding
A Case Study In The Implementation Of A Human-Centric Higher Education Cybersecurity Program, John W. Coffey, Melanie Haveard, Geissler Golding
Journal of Cybersecurity Education, Research and Practice
This article contains a description of the implementation of a comprehensive cyber security program at a regional comprehensive university. The program was designed to create an effective cyber security management infrastructure and to train end users and other categories of security management personnel in data protection and cyber security. This work addresses the impetus for the program, the rather extensive planning and development that went into the program, its implementation, and insights gleaned from the experience. The paper concludes with a summary of the strengths and weaknesses of the initiative.
Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos
Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos
Journal of Cybersecurity Education, Research and Practice
We conducted an observational study to document student misconceptions about cybersecurity using thematic analysis of 25 think-aloud interviews. By understanding patterns in student misconceptions, we provide a basis for developing rigorous evidence-based recommendations for improving teaching and assessment methods in cybersecurity and inform future research. This study is the first to explore student cognition and reasoning about cybersecurity. We interviewed students from three diverse institutions. During these interviews, students grappled with security scenarios designed to probe their understanding of cybersecurity, especially adversarial thinking. We analyzed student statements using a structured qualitative method, novice-led paired thematic analysis, to document patterns in …
Experiential Learning Builds Cybersecurity Self-Efficacy In K-12 Students, Abdullah Konak
Experiential Learning Builds Cybersecurity Self-Efficacy In K-12 Students, Abdullah Konak
Journal of Cybersecurity Education, Research and Practice
In recent years, there have been increased efforts to recruit talented K-12 students into cybersecurity fields. These efforts led to many K-12 extracurricular programs organized by higher education institutions. In this paper, we first introduce a weeklong K-12 program focusing on critical thinking, problem-solving, and igniting interest in information security through hands-on activities performed in a state-of-the-art virtual computer laboratory. Then, we present an inquiry-based approach to design hands-on activities to achieve these goals. We claim that hands-on activities designed based on this inquiry-based framework improve K-12 students’ self-efficacy in cybersecurity as well as their problem-solving skills. The evaluation of …
Book Review - Let Us Now Praise Famous Gullies, Melissa E. Johnson
Book Review - Let Us Now Praise Famous Gullies, Melissa E. Johnson
Georgia Library Quarterly
No abstract provided.
Semantic Data Storage In Information Systems, Jean Vincent Fonou Dombeu, Raoul Kwuimi
Semantic Data Storage In Information Systems, Jean Vincent Fonou Dombeu, Raoul Kwuimi
The African Journal of Information Systems
The storage and retrieval of information are important functions of information systems (IS). These IS functions have been realized for decades, due to the maturity of the relational database technology. In recent years, the concept of Semantic Information System (SIS) has emerged as IS in which information is represented with explicit semantic based on its meaning rather than its syntax to enable its automatic and intelligent processing by computers. At present, there is a shortage of discussions on the topic of semantic data storage in IS as compared to the relational database storage counterpart. This study uses a combination of …
An Adapted Framework For Environmental Sustainability Reporting Using Mobile Technologies, Andre P. Calitz, Jaco F. Zietsman
An Adapted Framework For Environmental Sustainability Reporting Using Mobile Technologies, Andre P. Calitz, Jaco F. Zietsman
The African Journal of Information Systems
Corporate governance is the process by which organisations are directed and controlled. King IV is regarded as the cornerstone of corporate governance for businesses and emphasises the importance of sustainability reporting in South Africa. Sustainability reporting guidelines inform organisations how to disclose their most critical affects on the environment, society and the economy. The Global Reporting Initiative (GRI) G4 sustainability reporting framework recommends the Standard Disclosures that all organisations should use to report their sustainability impacts and performance. Sustainability reporting frameworks proposed for the Higher Education sector require reporting principles specific to the needs of Higher Education Institutions (HEIs). The …