Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Kennesaw State University

Journal

2019

Discipline
Keyword
Publication

Articles 1 - 12 of 12

Full-Text Articles in Physical Sciences and Mathematics

Cloud Computing Architecture For Elearning Systems In Secondary Schools In Tanzania, Kennedy F. Mwakisole, Mussa M. Kissaka Dr, Joel S. Mtebe Phd Oct 2019

Cloud Computing Architecture For Elearning Systems In Secondary Schools In Tanzania, Kennedy F. Mwakisole, Mussa M. Kissaka Dr, Joel S. Mtebe Phd

The African Journal of Information Systems

In recent years, schools have been investing heavily on information and communications technology (ICT) infrastructure to implement eLearning systems to enhance the quality of education in secondary schools in Tanzania. The majority of these systems are implemented using a traditional web-based eLearning approach on school premises which is costly and limits usage due to lack of scalability and flexibility. Consequently, many schools have started adopting cloud computing as a solution. However, this adaption depends on well-defined cloud eLearning architecture. This study proposed cloud architecture for implementing an eLearning system in secondary schools in Tanzania by adopting various layers proposed in …


On The Yellow Brick Road, A Path To Enterprise Architecture Maturity, Avsharn Bachoo Oct 2019

On The Yellow Brick Road, A Path To Enterprise Architecture Maturity, Avsharn Bachoo

The African Journal of Information Systems

This study concentrated on the relationship between the Enterprise Architecture (EA) maturity of an organization and the business value associated with it in the South African financial services environment. It was developed within the critical realism philosophy, which states that mechanisms generate events by accentuating the underlying EA mechanisms that lead to business value, as well as provide insights into the opportunities and challenges organizations experienced as they progressed to higher levels of maturity. Constructed using the resource-based view of the firm as the underlying theoretical framework, this research examined EA as an intangible resource and maturity as a source …


Factors Influencing Knowledge Transfer In Onshore Information Systems Outsourcing In Ethiopia, Solomon A. Nurye, Alem Molla, Temtim Assefa Desta Oct 2019

Factors Influencing Knowledge Transfer In Onshore Information Systems Outsourcing In Ethiopia, Solomon A. Nurye, Alem Molla, Temtim Assefa Desta

The African Journal of Information Systems

Knowledge transfer in onshore information systems (IS) outsourcing projects in Africa is an important but under-researched phenomenon. This study focuses on the client-vendor perspective and examines the factors that influence knowledge transfer in onshore information systems outsourcing in Ethiopia. Conceptually, knowledge-based perspectives of IS outsourcing is used to identify an initial set of factors to frame the empirical study. This is followed by semi-structured interviews with ten project managers. The findings indicate that five key factors, namely mutual absorptive capacity, mutual learning intent, mutual trust, mutual disseminative capacity and project staff turnover influence knowledge transfer in outsourced IS projects. The …


A Mathematical Model For The Effect Of Domestic Animals On Human African Trypanosomiasis (Sleeping Sickness), Sagi Shaier, Meghan Burke Aug 2019

A Mathematical Model For The Effect Of Domestic Animals On Human African Trypanosomiasis (Sleeping Sickness), Sagi Shaier, Meghan Burke

The Kennesaw Journal of Undergraduate Research

Human African Trypanosomiasis (HAT) is a parasite infection that is spread by the bites of tsetse flies and it is almost 100% fatal if left untreated (World Health Organization, “Neglected”). Our hypothesis is that by adding domestic animals to areas where humans are found (villages and plantations), we can reduce the amount of biting on humans, and therefore reduce the rate at which humans become infected. Numerical simulations supported our hypothesis, showing that increasing the number of domestic animals (pigs in our model) slows down the spread of the disease in both humans and domestic animals.


From The Editors, Michael E. Whitman, Herbert J. Mattord, Carole L. Hollingsworth Jun 2019

From The Editors, Michael E. Whitman, Herbert J. Mattord, Carole L. Hollingsworth

Journal of Cybersecurity Education, Research and Practice

No abstract provided.


Adopting The Cybersecurity Curriculum Guidelines To Develop A Secondary And Primary Academic Discipline In Cybersecurity Postsecondary Education, Wasim A. Alhamdani Jun 2019

Adopting The Cybersecurity Curriculum Guidelines To Develop A Secondary And Primary Academic Discipline In Cybersecurity Postsecondary Education, Wasim A. Alhamdani

Journal of Cybersecurity Education, Research and Practice

A suggested curriculum for secondary and primarily academic discipline in Cybersecurity Postsecondary Education is presented. This curriculum is developed based on the Association for Computing Machinery guidelines and the National Centers of Academic Excellence Cyber Operations program.


Cybersecurity Education: The Need For A Top-Driven, Multidisciplinary, School-Wide Approach, Lucy Tsado Jun 2019

Cybersecurity Education: The Need For A Top-Driven, Multidisciplinary, School-Wide Approach, Lucy Tsado

Journal of Cybersecurity Education, Research and Practice

The human resource skills gap in cybersecurity has created an opportunity for educational institutions interested in cybersecurity education. The current number of schools designated by the Department of Homeland Security (DHS) and National Security Agency (NSA) as Centers of Academic Excellence (CAE) to train cybersecurity experts are not sufficient to meet the shortfall in the industry. The DHS has clearly mapped out knowledge areas for cybersecurity education for both technical and non-technical disciplines; it is therefore possible for institutions not yet designated CAEs to generate cybersecurity experts, with the long-term goal of attaining the CAE designation. The purpose of this …


Car Hacking: Accessing And Exploiting The Can Bus Protocol, Bryson R. Payne Jun 2019

Car Hacking: Accessing And Exploiting The Can Bus Protocol, Bryson R. Payne

Journal of Cybersecurity Education, Research and Practice

With the rapid adoption of internet-connected and driver-assist technologies, and the spread of semi-autonomous to self-driving cars on roads worldwide, cybersecurity for smart cars is a timely concern and one worth exploring both in the classroom and in the real world. Highly publicized hacks against production cars, and a relatively small number of crashes involving autonomous vehicles, have brought the issue of securing smart cars to the forefront as a matter of public and individual safety, and the cybersecurity of these “data centers on wheels” is of greater concern than ever.

However, up to this point there has been a …


A Design Case: Assessing The Functional Needs For A Multi-Faceted Cybersecurity Learning Space, Charles J. Lesko Jr. Jun 2019

A Design Case: Assessing The Functional Needs For A Multi-Faceted Cybersecurity Learning Space, Charles J. Lesko Jr.

Journal of Cybersecurity Education, Research and Practice

Following a multi-year effort that developed not only a detailed list of functional requirements but also the preliminary physical and logical design layouts, the concept for a multi-faceted cybersecurity center was approved and the physical, as well as, additional infrastructure space was subsequently allocated. This effort briefly describes the structure and scope of the current cybersecurity program being supported and then draws out the functional requirements that were identified for the center based on the needs of the institution’s cybersecurity program. It also highlights the physical and logical design specifications of the center, as well as, the many external program …


From The Editors, Herbert J. Mattord, Michael E. Whitman Jan 2019

From The Editors, Herbert J. Mattord, Michael E. Whitman

Journal of Cybersecurity Education, Research and Practice

A message from the editors.


Investigating The Impact Of Publicly Announced Information Security Breaches On Corporate Risk Factor Disclosure Tendencies, Sandra J. Cereola, Joanna Dynowska Jan 2019

Investigating The Impact Of Publicly Announced Information Security Breaches On Corporate Risk Factor Disclosure Tendencies, Sandra J. Cereola, Joanna Dynowska

Journal of Cybersecurity Education, Research and Practice

As the reported number of data breaches increase and senators push for more disclosure regulation, the SEC staff issued a guidance in 2011 on disclosure obligations relating to cybersecurity risks and incidents. More recently, on February 26, 2018 the SEC Commission issued interpretive guidance to help assist public companies prepare disclosures regarding cybersecurity risks and incidents. As reported incidents of cybersecurity breaches occur, investors are concerned about the risks associated with these incidents and the impact they may have on financial performance. Although the SEC staff guidance warns public companies to make timely disclosure, recognizing the threat that cybercrime poses …


Sit Back, Relax, And Tell Me All Your Secrets, Sarah Kirk, Daniel Foreman, Cody Lee, Shannon W. Beasley Jan 2019

Sit Back, Relax, And Tell Me All Your Secrets, Sarah Kirk, Daniel Foreman, Cody Lee, Shannon W. Beasley

Journal of Cybersecurity Education, Research and Practice

The goal of this research is to describe an active learning opportunity that was conducted as a community service offering through our Center for Cybersecurity Education and Applied Research (CCEAR). As a secondary goal, the participants sought to gain real world experience by applying techniques and concepts studied in security classes. A local insurance company tasked the CCEAR with assembling a team of students to conduct penetration testing (including social engineering exploits) against company personnel. The endeavor allowed the insurance company to obtain information that would assess the effectiveness of employee training with regard to preventing the divulgence of sensitive …