Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Physical Sciences and Mathematics

Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger Feb 2024

Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger

Journal of Cybersecurity Education, Research and Practice

This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through mentorship, collaboration, skill preparation, and other activities and touch points to increase students’ sense of belonging and connectedness in the cybersecurity profession. The goal of the project was focused on developing diverse, educated, and skilled cybersecurity personnel for employment within local industry and government to help curtail the current regional cybersecurity workforce gap that is emblematic of the lack of qualified cybersecurity personnel that presently exists nationwide. Emphasis throughout the project …


Security Simulations In Undergraduate Education: A Review, Joseph Simpson, Aaron Brantly Jul 2022

Security Simulations In Undergraduate Education: A Review, Joseph Simpson, Aaron Brantly

Journal of Cybersecurity Education, Research and Practice

Several decades of research in simulation and gamification in higher education shows that simulations are highly effective in improving a range of outcomes for students including declarative knowledge and interest in the topic being taught. While there appears to be a broad array of options to provide education in an undergraduate setting related to security, no previous reviews have explored computer-based simulations covering all facets of security. Given the increasing importance and adoption of interdisciplinary educational programs, it is important to take stock of simulations as a tool to broaden the range of problems, perspectives, and solutions presented to students. …


Using Case Studies To Teach Cybersecurity Courses, Yu Cai Dec 2018

Using Case Studies To Teach Cybersecurity Courses, Yu Cai

Journal of Cybersecurity Education, Research and Practice

This paper introduces a holistic and case-analysis teaching model by integrating case studies into cybersecurity courses. The proposed model starts by analyzing real-world cyber breaches. Students look into the details of these attacks and learn how these attacks took place from the beginning to the end. During the process of case analysis, a list of security topics reflecting different aspects of these breaches is introduced. Through guided in-class discussion and hands-on lab assignments, student learning in lecture will be reinforced. Overall, the entire cybersecurity course is driven by case studies. The proposed model is great for teaching cybersecurity. First, the …


Use Of Biometrics To Determine Biochemistry Knowledge Level Differences In Reading And Processing Metabolic Pathways, Kim Kammerdiener May 2018

Use Of Biometrics To Determine Biochemistry Knowledge Level Differences In Reading And Processing Metabolic Pathways, Kim Kammerdiener

Master of Science in Chemical Sciences Theses

The areas of chemistry and biochemistry commonly use external representations to enhance learning for students. The use of schematics and representations for illustrating metabolic pathways is a familiar image in most biochemistry textbooks. These external representations can be the key to student understanding. To date, there has not been any previous research specifically focused on the areas of interest that are predominant for an individual viewing a metabolic pathway commonly found in a biochemistry textbook. Therefore, this thesis study set out to 1) investigate what individuals look at in a metabolic pathway based on their level of expertise in metabolism …


Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis Jun 2017

Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis

Journal of Cybersecurity Education, Research and Practice

In this paper, we describe the need for and development of an introductory cyber security course. The course was designed for non-technical majors with the goal of increasing cyber security hygiene for an important segment of the population—college undergraduates. While the need for degree programs that focus on educating and training individuals for occupations in the ever-growing cyber security field is critically important, the need for improved cyber security hygiene from the average everyday person is of equal importance. This paper discusses the approach used, curriculum developed, results from two runs of the course, and frames the overall structure of …


Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia Dec 2016

Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia

Journal of Cybersecurity Education, Research and Practice

The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …


Animated Database Courseware: Using Animations To Extend Conceptual Understanding Of Database Concepts, Meg Murray, Mario Guimaraes Dec 2008

Animated Database Courseware: Using Animations To Extend Conceptual Understanding Of Database Concepts, Meg Murray, Mario Guimaraes

Faculty and Research Publications

Teaching abstract concepts can be best supported with supplemental instructional materials such as software animations. Visualization and animations have been shown to increase student motivation and help students develop deeper understandings. Through an NSF funded CCLI grant, a set of animations to support the teaching of database concepts is being developed and made freely available. Current modules available cover areas such as database design, interactive SQL, stored procedures and triggers, transactions and database security. In this paper, we provide an overview of the Animated Database Courseware (ADbC) as well as provide examples of how this software might be utilized in …


Expanding The Database Curriculum, Meg Murray, Mario Guimaraes Jan 2008

Expanding The Database Curriculum, Meg Murray, Mario Guimaraes

Faculty and Research Publications

As database concepts and technologies continue to evolve there exists a need to expand the topics included in database curricula. This is challenging given the restraints on the number of courses that can be included in a typical CS or IS program. While a set of commonly identified core concepts and principles exists, there is little consensus on what supplemental materials should be included in database courses. Through an NSF proof-of-concept grant, we designed and developed courseware incorporating the use of animations to deepen and enrich standard presentations of core database concepts and to complement database teachings as found in …


Learner-Centered Assignments In Computer Literacy, Martha E. Myers, Meg C. Murray, Mario Guimaraes, Debra B. Geist Dec 2007

Learner-Centered Assignments In Computer Literacy, Martha E. Myers, Meg C. Murray, Mario Guimaraes, Debra B. Geist

Faculty and Research Publications

Literacy is a concept that is understood to be the identifier of an educated populace. In today's world, literacy includes computer literacy, as well as language and quantitative literacy. This paper describes exercises developed to improve first year students' computer literacy through more learner-centered engagement. Exercises are designed to support learner-centered goals of independent and responsible learners, appropriate breadth and depth of content, teacher as facilitator, and assessment woven into learning. Exercise topics include purchase of a personal computer, basic logic via spreadsheets, an annotated bibliography built with electronic resources, and an integrated assignment customized by and for each student.


Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray Jan 2006

Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray

Faculty and Research Publications

Computers, digitalization and the Internet have transformed modern society. Commerce, education, communication and socialization will never be the same. Surprisingly, many universities do not require a computing course in the core curriculum. Critical information technology (IT) competencies are often taken for granted, to the detriment of students who lack computing and Internet skills. This paper describes an initiative undertaken by a computer science and information systems department to assess and remediate IT skills needed by all university students, regardless of major. The project is evolving along several dimensions: identification of discipline-independent IT competencies, assessment of IT skills among current and …


Studying The Performance Of A Firewall In Network Courses, José M. Garrido Dec 2005

Studying The Performance Of A Firewall In Network Courses, José M. Garrido

Faculty and Research Publications

This paper presents a simple simulation model of a firewall to derive several performance metrics and briefly argues on the importance and value of modeling and simulation in courses that study various aspects of perimeter defense in network security.

The simulation model mentioned previously is part of an effort by faculty of our department to develop a multi-disciplinary repository of computational models that includes object-oriented discrete-event simulation models. One of the goals of this repository is to build resources that help educate students of computer science, software engineering, and information technology, in modeling and information security.

This and other network …


Move To Component Based Architectures: Introducing Microsoft's .Net Platform Into The College Classroom, Meg C. Murray Jan 2004

Move To Component Based Architectures: Introducing Microsoft's .Net Platform Into The College Classroom, Meg C. Murray

Faculty and Research Publications

A transformation has been occurring in the architectural model for computer-based application intense software systems. This new model, software-as-a-service, will have a profound impact on the design and development of software for many years to come and as such college level computing curriculums will need to incorporate the concepts and methodologies associated with this new architecture. The platform is built upon a view of interrelated, distributed peer-level software modules and components that work in tandem to achieve specified functional goals. From Microsoft's viewpoint, migration to the new platform requires a radical shift in the software development lifecycle. It is becoming …