Integrating certifications into the cybersecurity college curriculum: The...
One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming...
View ArticlePrivacy Harm and Non-Compliance from a Legal Perspective
In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big...
View ArticleUnderstanding How to Diversify the Cybersecurity Workforce: A Qualitative...
A robust cybersecurity workforce is critical for protection against a range of malicious attacks. However, it has been noted that there are many vacancies and a shortage of individuals entering the...
View ArticleCybersecurity Challenges and Awareness of the Multi-Generational Learners in...
Increased exposure to technologies has lately emerged as one of the everyday realities of digital natives, especially K-12 students, and teachers, the digital immigrants. Protection from cybersecurity...
View ArticleExploring Network Security Educator Knowledge
It is critical for nations to have trained professionals in network security who can safeguard hardware, information systems, and electronic data. Network security education is a key knowledge unit of...
View ArticleA Mixed-Method Study Exploring Cyber Ranges and Educator Motivation
A growing number of academic institutions have invested resources to integrate cyber ranges for applying and developing cybersecurity-related knowledge and skills. Cyber range developers and...
View ArticleLike Treating the Symptom Rather than the Cause - the Omission of Courses...
The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce...
View ArticleAdoption of cybersecurity policies by local governments 2020
This paper should be of interest to the readers of this journal because it addresses a subject that has received little scholarly attention; namely, local government cybersecurity. The U.S. has over...
View ArticleWhat You See Is Not What You Know: Studying Deception in Deepfake Video...
Research indicates that deceitful videos tend to spread rapidly online and influence people’s opinions and ideas. Because of this, video misinformation via deepfake video manipulation poses a...
View ArticleAn Interdisciplinary Approach to Experiential Learning in Cyberbiosecurity...
Cyberbiosecurity and workforce development in agriculture and the life sciences (ALS) is a growing area of need in the curriculum in higher education. Students that pursue majors related to ALS often...
View ArticleLeading K-12 Community Responsiveness to Cyber Threats via Education of...
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic...
View ArticleIntegrating NIST and ISO Cybersecurity Audit and Risk Assessment Frameworks...
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and...
View ArticleInfrastructure as Code for Cybersecurity Training
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise,...
View ArticleBuilding the Operational Technology (OT) Cybersecurity Workforce: What are...
A trained workforce is needed to protect operational technology (OT) and industrial control systems (ICS) within national critical infrastructure and critical industries. However, what knowledge,...
View ArticleLeveraging VR/AR/MR/XR Technologies to Improve Cybersecurity Education,...
The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens....
View ArticleA Developed Framework for Studying Cyberethical Behaviour in North Central...
ICT advancements have enabled more online activities, resulting in several cyberethical behaviours. Literature documents prevalence of plagiarism, and online fraud, among other misbehaviours. While...
View ArticleBuilding a Diverse Cybersecurity Workforce: A Study on Attracting Learners...
Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity...
View ArticleIntegrity, Confidentiality, and Equity: Using Inquiry-Based Labs to help...
Recent advances in Artificial Intelligence (AI) have brought society closer to the long-held dream of creating machines to help with both common and complex tasks and functions. From recommending...
View ArticlePreparing UK students for the workplace: The Acceptability of a Gamified...
This pilot study aims to assess the acceptability of Open University’s training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving...
View ArticleTurnstile File Transfer: A Unidirectional System for Medium-Security Isolated...
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow...
View Article