Quantcast
Channel: Journal of Cybersecurity Education, Research and Practice
Browsing latest articles
Browse All 40 View Live

Turkey vs Italy: Gender and Cyber Security

With the development of technology, security, a core human concern throughout history,has changed and branched out into new areas. Novel security concepts, including environmental security, economic...

View Article


Board of Directors Role in Data Privacy Governance: Making the Transition...

Data collection, use, leveraging, and sharing as a business practice and advantage has proliferated over the past decade. Along with this proliferation of data collection is the increase in regulatory...

View Article


Privacy Principles and Harms: Balancing Protection and Innovation

In today's digitally connected world, privacy has transformed from a fundamental human right into a multifaceted challenge. As technology enables the seamless exchange of information, the need to...

View Article

University of Johannesburg Institutional Repository Cybersecurity Output:...

This study examines cybersecurity awareness in universities by analyzing related research output across different disciplines at the University of Johannesburg. The diffusion of innovation theory is...

View Article

Improving Belonging and Connectedness in the Cybersecurity Workforce: From...

This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through...

View Article


Blockchain Applications in Higher Education Based on the NIST Cybersecurity...

This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology’s (NIST)...

View Article

Comparing Cognitive Theories of Learning Transfer to Advance Cybersecurity...

The cybersecurity threat landscape evolves quickly, continually, and consequentially. This means that the transfer of cybersecurity learning is crucial. We compared how different recognized...

View Article

Cybersecurity Skills, Knowledge and Abilities for Criminal Justice...

Cybersecurity has become increasingly important not only in the technology sector but in criminal justice professions as well, and significant challenges have arisen as a result. However, these...

View Article


An Alternative Approach to Data Carving Portable Document Format (PDF) Files

Traditional data carving relies on the successful identification of headers and trailers, unique hexadecimal signatures which are exclusive to specific file types. This can present a challenge for...

View Article


Development of Cyber Security Platform for Experiential Learning

The cyber security education market has grown-up exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Fo- rum 2023 indicates a shortfall of 2.27...

View Article

Collaborative Pathways to Cybersecurity Excellence: Insights from Industry...

This research article examines conversations happening between cybersecurity academics and industry leaders with a goal to improve the development of cybersecurity professionals. We specifically focus...

View Article

Using Gamification to Enhance Mastery of Network Security Concepts

Gamification has proven to be effective in engaging and encouraging people to work towards and achieve goals. Many students struggle to focus on schoolwork, due to a lack of interest, lack of...

View Article

Designing Cybersecurity Escape Rooms: A Gamified Approach to Undergraduate...

Gamification, including game-based learning (GBL), is a widely recognized pedagogical approach used for imparting and reinforcing cybersecurity knowledge and skills to learners. One innovative form of...

View Article


Leveraging Propagation Delay for Wormhole Detection in Wireless Networks

Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity. This paper proposes a novel...

View Article

How State Universities are addressing the Shortage of Cybersecurity...

Cybersecurity threats have been a serious and growing problem for decades. In addition, a severe shortage of cybersecurity professionals has been proliferating for nearly as long. These problems exist...

View Article


Happy hours, not office hours: Socially engaging cybersecurity students in a...

Engagement is a critical part of student learning and student success. This is especially true in online classes where students have less interaction with their classmates and instructors when...

View Article

Wormhole Attack Mitigation in Wireless Network Using Propagation Delay

This paper presents a novel approach for mitigating wormhole attacks on wireless networks using propagation delay timing. The wormhole attack is a persistent security threat that threatens the...

View Article


Beyond Human-Centric Models in Cybersecurity Education: A Pilot Posthuman...

This study applies a posthuman lens to the National Initiative for Cybersecurity Education (NICE) Workforce Framework, examining two key Work Roles in cybersecurity education. Employing a novel...

View Article

Integrating Humanities into Cybersecurity Education: Enhancing Ethical,...

The increasing complexity of cybersecurity challenges necessitates a holistic educational approach that integrates both technical skills and humanistic perspectives. This article examines the...

View Article

Digital Twin and Cybersecurity in Additive Manufacturing

Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts’ porosity, cracks, surface roughness, intrinsic anisotropy,...

View Article
Browsing latest articles
Browse All 40 View Live