Turkey vs Italy: Gender and Cyber Security
With the development of technology, security, a core human concern throughout history,has changed and branched out into new areas. Novel security concepts, including environmental security, economic...
View ArticleBoard of Directors Role in Data Privacy Governance: Making the Transition...
Data collection, use, leveraging, and sharing as a business practice and advantage has proliferated over the past decade. Along with this proliferation of data collection is the increase in regulatory...
View ArticlePrivacy Principles and Harms: Balancing Protection and Innovation
In today's digitally connected world, privacy has transformed from a fundamental human right into a multifaceted challenge. As technology enables the seamless exchange of information, the need to...
View ArticleUniversity of Johannesburg Institutional Repository Cybersecurity Output:...
This study examines cybersecurity awareness in universities by analyzing related research output across different disciplines at the University of Johannesburg. The diffusion of innovation theory is...
View ArticleImproving Belonging and Connectedness in the Cybersecurity Workforce: From...
This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through...
View ArticleBlockchain Applications in Higher Education Based on the NIST Cybersecurity...
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology’s (NIST)...
View ArticleComparing Cognitive Theories of Learning Transfer to Advance Cybersecurity...
The cybersecurity threat landscape evolves quickly, continually, and consequentially. This means that the transfer of cybersecurity learning is crucial. We compared how different recognized...
View ArticleCybersecurity Skills, Knowledge and Abilities for Criminal Justice...
Cybersecurity has become increasingly important not only in the technology sector but in criminal justice professions as well, and significant challenges have arisen as a result. However, these...
View ArticleAn Alternative Approach to Data Carving Portable Document Format (PDF) Files
Traditional data carving relies on the successful identification of headers and trailers, unique hexadecimal signatures which are exclusive to specific file types. This can present a challenge for...
View ArticleDevelopment of Cyber Security Platform for Experiential Learning
The cyber security education market has grown-up exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Fo- rum 2023 indicates a shortfall of 2.27...
View ArticleCollaborative Pathways to Cybersecurity Excellence: Insights from Industry...
This research article examines conversations happening between cybersecurity academics and industry leaders with a goal to improve the development of cybersecurity professionals. We specifically focus...
View ArticleUsing Gamification to Enhance Mastery of Network Security Concepts
Gamification has proven to be effective in engaging and encouraging people to work towards and achieve goals. Many students struggle to focus on schoolwork, due to a lack of interest, lack of...
View ArticleDesigning Cybersecurity Escape Rooms: A Gamified Approach to Undergraduate...
Gamification, including game-based learning (GBL), is a widely recognized pedagogical approach used for imparting and reinforcing cybersecurity knowledge and skills to learners. One innovative form of...
View ArticleLeveraging Propagation Delay for Wormhole Detection in Wireless Networks
Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity. This paper proposes a novel...
View ArticleHow State Universities are addressing the Shortage of Cybersecurity...
Cybersecurity threats have been a serious and growing problem for decades. In addition, a severe shortage of cybersecurity professionals has been proliferating for nearly as long. These problems exist...
View ArticleHappy hours, not office hours: Socially engaging cybersecurity students in a...
Engagement is a critical part of student learning and student success. This is especially true in online classes where students have less interaction with their classmates and instructors when...
View ArticleWormhole Attack Mitigation in Wireless Network Using Propagation Delay
This paper presents a novel approach for mitigating wormhole attacks on wireless networks using propagation delay timing. The wormhole attack is a persistent security threat that threatens the...
View ArticleBeyond Human-Centric Models in Cybersecurity Education: A Pilot Posthuman...
This study applies a posthuman lens to the National Initiative for Cybersecurity Education (NICE) Workforce Framework, examining two key Work Roles in cybersecurity education. Employing a novel...
View ArticleIntegrating Humanities into Cybersecurity Education: Enhancing Ethical,...
The increasing complexity of cybersecurity challenges necessitates a holistic educational approach that integrates both technical skills and humanistic perspectives. This article examines the...
View ArticleDigital Twin and Cybersecurity in Additive Manufacturing
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts’ porosity, cracks, surface roughness, intrinsic anisotropy,...
View Article