Quantcast
Channel: Journal of Cybersecurity Education, Research and Practice
Browsing all 40 articles
Browse latest View live

Integrating certifications into the cybersecurity college curriculum: The...

One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming...

View Article


Privacy Harm and Non-Compliance from a Legal Perspective

In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big...

View Article


Understanding How to Diversify the Cybersecurity Workforce: A Qualitative...

A robust cybersecurity workforce is critical for protection against a range of malicious attacks. However, it has been noted that there are many vacancies and a shortage of individuals entering the...

View Article

Cybersecurity Challenges and Awareness of the Multi-Generational Learners in...

Increased exposure to technologies has lately emerged as one of the everyday realities of digital natives, especially K-12 students, and teachers, the digital immigrants. Protection from cybersecurity...

View Article

Exploring Network Security Educator Knowledge

It is critical for nations to have trained professionals in network security who can safeguard hardware, information systems, and electronic data. Network security education is a key knowledge unit of...

View Article


A Mixed-Method Study Exploring Cyber Ranges and Educator Motivation

A growing number of academic institutions have invested resources to integrate cyber ranges for applying and developing cybersecurity-related knowledge and skills. Cyber range developers and...

View Article

Like Treating the Symptom Rather than the Cause - the Omission of Courses...

The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce...

View Article

Adoption of cybersecurity policies by local governments 2020

This paper should be of interest to the readers of this journal because it addresses a subject that has received little scholarly attention; namely, local government cybersecurity. The U.S. has over...

View Article


What You See Is Not What You Know: Studying Deception in Deepfake Video...

Research indicates that deceitful videos tend to spread rapidly online and influence people’s opinions and ideas. Because of this, video misinformation via deepfake video manipulation poses a...

View Article


An Interdisciplinary Approach to Experiential Learning in Cyberbiosecurity...

Cyberbiosecurity and workforce development in agriculture and the life sciences (ALS) is a growing area of need in the curriculum in higher education. Students that pursue majors related to ALS often...

View Article

Leading K-12 Community Responsiveness to Cyber Threats via Education of...

Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic...

View Article

Integrating NIST and ISO Cybersecurity Audit and Risk Assessment Frameworks...

This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and...

View Article

Infrastructure as Code for Cybersecurity Training

An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise,...

View Article


Building the Operational Technology (OT) Cybersecurity Workforce: What are...

A trained workforce is needed to protect operational technology (OT) and industrial control systems (ICS) within national critical infrastructure and critical industries. However, what knowledge,...

View Article

Leveraging VR/AR/MR/XR Technologies to Improve Cybersecurity Education,...

The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens....

View Article


A Developed Framework for Studying Cyberethical Behaviour in North Central...

ICT advancements have enabled more online activities, resulting in several cyberethical behaviours. Literature documents prevalence of plagiarism, and online fraud, among other misbehaviours. While...

View Article

Building a Diverse Cybersecurity Workforce: A Study on Attracting Learners...

Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity...

View Article


Integrity, Confidentiality, and Equity: Using Inquiry-Based Labs to help...

Recent advances in Artificial Intelligence (AI) have brought society closer to the long-held dream of creating machines to help with both common and complex tasks and functions. From recommending...

View Article

Preparing UK students for the workplace: The Acceptability of a Gamified...

This pilot study aims to assess the acceptability of Open University’s training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving...

View Article

Turnstile File Transfer: A Unidirectional System for Medium-Security Isolated...

Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow...

View Article
Browsing all 40 articles
Browse latest View live