Filters








338 Hits in 5.2 sec

The SFS Summer Research Study at UMBC: Project-Based Learning Inspires Cybersecurity Students [article]

Alan Sherman, Enis Golaszewski, Edward LaFemina, Ethan Goldschen, Mohammed Khan, Lauren Mundy, Mykah Rather, Bryan Solis, Wubnyonga Tete, Edwin Valdez, Brian Weber, Damian Doyle, Casey O'Brien (+2 others)
2018 arXiv   pre-print
May 30-June 2, 2017, Scholarship for Service (SFS) scholars at the University of Maryland, Baltimore County (UMBC) analyzed the security of a targeted aspect of the UMBC computer systems.  ...  We hope that other universities can benefit from our motivational and educational strategy of teaming educators and system administrators to engage students in active project-based learning centering on  ...  Acknowledgments We thank Jack Suess and Damian Doyle (UMBC Division of Information Technology) for their enthusiastic cooperation and for providing a virtual machine of the software environment.  ... 
arXiv:1811.04794v1 fatcat:stswmg7n4rgyziik7s5rudzzcy

The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity Research [article]

Alan Sherman and R. Chong and J. Springer and R. Verma
2017 arXiv   pre-print
We explain how we conducted our project-based research course, give examples of student projects, and discuss the outcomes and lessons learned.  ...  Since fall 2012, several National Centers of Academic Excellence in Cyber Defense Research (CAE-Rs) fielded a collaborative course to engage students in solving applied cybersecurity research problems.  ...  Acknowledgments We thank Mark Loepker (NSA) for overall government program management and the many technical directors who contributed greatly to the success of the INSuRE Project, especially Trent Pitsenbarger  ... 
arXiv:1703.08859v1 fatcat:lrx2oaofmjartc7wzghybbwjm4

Transparency and the Marketplace for Student Data

N. Cameron Russell, Joel R. Reidenberg, Elizabeth Martin, Thomas Norton
2018 Social Science Research Network  
Student lists are commercially available for purchase on the basis of ethnicity, affluence, religion, lifestyle, awkwardness, and even a perceived or predicted need for family planning services.  ...  This study seeks to provide an understanding of the commercial marketplace for student data and the interaction with privacy law.  ...  We would also like to thank Fordham Law students Samuel Borenzweig and Noelle Park for their valuable and significant research assistance.  ... 
doi:10.2139/ssrn.3191436 fatcat:m5jneyg5nrhpfizsms6zq7ofqi

Digest of ACM educational activities

Yan Timanovsky
2015 ACM inroads  
Provisions in those bills call for continuation of the federal Cyber Scholarship-for-Service program, federally funded research into integrating cybersecurity in the core curriculum of computer science  ...  Overall, the education, research, and knowledge-based economy indicators paint a hopeful picture for future innovation worldwide.  ... 
doi:10.1145/2716318 fatcat:ntjymgvfqrcjfk7jcvpajc36ce

Cybersecurity Curriculum Development Using AI and Decision Support Expert System

Rania Hodhod, Columbus State University (CSU), Columbus, Georgia, USA, Shuangbao Wang, Shamim Khan
2018 Journal of clean energy technologies  
This paper presents viCyber, a cloud-based visual and intelligent tool for rapid development of cybersecurity curriculum based on the Cybersecurity Workforce Framework developed by the National Initiative  ...  for Cybersecurity Education (NICE).  ...  Hodhod is the holder of the CSU Teaching and Learning Award 2017 and was a finalist for the Faculty Research and Scholarships Award at CSU 2016.  ... 
doi:10.7763/ijcte.2018.v10.1209 fatcat:7d4grwupprhoxeqe6bfns7bdum

Experiences and Lessons Learned Creating and Validating Concept Inventories for Cybersecurity [article]

Alan T. Sherman, Geoffrey L. Herman, Linda Oliva, Peter A. H. Peterson, Enis Golaszewski, Seth Poulsen, Travis Scheponik, Akshita Gorti
2020 arXiv   pre-print
The Cybersecurity Concept Inventory (CCI) is for students who have recently completed any first course in cybersecurity; the Cybersecurity Curriculum Assessment (CCA) is for students who have recently  ...  We reflect on our ongoing journey in the educational Cybersecurity Assessment Tools (CATS) Project to create two concept inventories for cybersecurity.  ...  Support for this research was provided in part by the U.S.  ... 
arXiv:2004.05248v1 fatcat:xhrhzx25wreafj5gapyvzaa3om

Building an Informing Business School: A Case Study of USF's Muma College of Business

Grandon Gill, Matthew Mullarkey, Joseph E Mohr, Moez Limayem
2016 Informing Science  
Using an exploratory case study methodology, it then takes a detailed look at how one institution—the University of South Florida's Muma College of Business—has introduced a variety of new channels, many  ...  Ultimately, the informing business school framework may also provide a means for communicating impact to business school accrediting agencies (such as AACSB).  ...  Project selection is based upon sponsor company business need and specific learning objectives for the students.  ... 
doi:10.28945/3428 fatcat:y3pmhixm7jckblcekdbx7qx2uy

ZenHackAdemy: Ethical Hacking @ DIBRIS

Luca Demetrio, Giovanni Lagorio, Marina Ribaudo, Enrico Russo, Andrea Valenza
2019 Proceedings of the 11th International Conference on Computer Supported Education  
These activities resulted in growing a community of students and researchers interested in cybersecurity, and some of them have formed ZenHack, an official CTF team. 2 See for example cybersecurityventures.com  ...  Cybersecurity attacks are on the rise, and the current response is not effective enough. The need for a competent workforce, able to face attackers, is increasing.  ...  Acknowledgements This work was partly supported by Boeing company: the Boeing-Unige Scolarship Project 2018 funded students scholarships.  ... 
doi:10.5220/0007747104050413 dblp:conf/csedu/DemetrioLRRV19 fatcat:qxevyrnvobgafaal7j64xdxssa

Towards Secure FinTech: A Survey, Taxonomy, and Open Research Challenges

Sobia Mehrban, Adnan Khan, Muhammad Waqas Nadeem, Muzammil Hussain, M. Masroor Ahmed, Owais Hakeem, Shazia Saqib, M.L. Mat Kiah, Fakhar Abbas, Mujtaba Hassan
2020 IEEE Access  
These operations are usually practiced in enterprises or organizations and provide requested services by using Information Technology based applications.  ...  It provides a comprehensive analysis of current security issues, detection mechanisms and security solutions proposed for FinTech.  ...  She is also an Active Researcher and working on a funded research project. She is working as a member of a research project with the University of Management and Technology.  ... 
doi:10.1109/access.2020.2970430 fatcat:6kuqxjeqgnggzbzlok62setiea

LSP vectors: Strengthening interdisciplinary connections

Mary Risner, Sheri Spaine-Long
2020 Global business languages  
The study applied a corpus-based analysis to respond to the research questions.  ...  These articles highlight partnerships between language departments and professional schools that allow for project-based learning.  ... 
doi:10.4079/gbl.v20.12 fatcat:vkt4rag53zecbh3rmtqnhsuuxu

Retrospectives and Reflections: 20 Years of IT Professional

Sorel Reisman, Wushow Bill Chou, Frank E. Ferrante, Simon Y. Liu, San Murugesan
2018 IT Professional Magazine  
ACKNOWLEDGMENTS We thank the late professor Nick Cercone for the opportunity to get started in this field.  ...  Liu is the associate administrator of the Agricultural Research Service, a research agency with more than 2,000 research scientists.  ...  I constantly learn from my students.  ... 
doi:10.1109/mitp.2018.011291537 fatcat:dpc7vcdis5emlmujrr6zayey5y

The Visual Design of Network Data to Enhance Cyber Security Awareness of the Everyday Internet User

Fiona Carroll, Phil Legg, Bastian Bonkel
2020 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)  
Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy Martin Fejrskov, Jens Myrup Pedersen and Emmanouil Vasilomanolakis  ...  Previously Patricia was a post-doctoral researcher at the Irish Centre for Cloud Computing and Commerce and was a researcher on the Horizon 2020 RECAP project.  ...  We participate in academic and industrial initiatives, national and international collaborative technology-inspired programmes, and undertake independent bespoke technology-based & survey-based research  ... 
doi:10.1109/cybersa49311.2020.9139668 dblp:conf/cybersa/CarrollLB20 fatcat:mtrvk2uvknadrosalvit4xz67i

A COMPREHENSIVE CYBERSECURITY FRAMEWORK FOR AFGHANISTAN'S CYBERSPACE

Ahmad Nabi Ahmadi
2021 International Journal of Engineering Applied Sciences and Technology  
The aim of this paper is to propose a comprehensive cybersecurity framework for Afghanistan's cyberspace in order to protect and assure data, information and IT infrastructure security in cyberspace, enhance  ...  The country must introduce a comprehensive and appropriate cybersecurity framework and strategy to tackle all of the issues and risks related to this arena.  ...  We will host an annual Afghanistan International Cyber Week (AICW) to catalyze, stimulate, and promote exchanges on cybersecurity and cybercrime issues.  ... 
doi:10.33564/ijeast.2021.v06i02.032 fatcat:3poezfveyvazzeqsnezciswbt4

Latin American Perspectives to Internationalize Undergraduate Information Technology Education

Mihaela Sabin, Ignacio Trejos, Barbara Viola, John Impagliazzo, Renzo Angles, Mariela Curiel, Paul Leger, Jorge Murillo, Hernán Nina, José Antonio Pow-Sang
2016 Proceedings of the 2016 ITiCSE Working Group Reports on - ITiCSE '16  
Additionally, economic, political, and social issues occurring in each country influenced the development of computing-related projects and education programs.  ...  IT, as an academic discipline, is concerned with issues related to advocating for users and meeting their needs within an organizational and societal context through the selection, creation, application  ...  ACKNOWLEDGEMENTS The IT2017 task group is most grateful and appreciating to ACM and its Education Board for its ongoing support for this project, especially providing a path for conducting and analyzing  ... 
doi:10.1145/3024906.3029847 dblp:conf/iticse/SabinVIACLMNPT16 fatcat:zzx3hzkaejbk7htzw7nc6wvbga

The Power of an Idea: The International Impacts of the Grand Challenges for Engineering

C.D. Mote, Dame Ann Dowling, Ji Zhou
2016 Engineering  
service learning.  ...  They provide opportunities for graduate students at selected international universities to pursue research addressing a global Grand Challenge at a leading US university, with expenses paid for a year  ... 
doi:10.1016/j.eng.2016.01.025 fatcat:zqnuyvyiujhmpisy3ymyygv56a
« Previous Showing results 1 — 15 out of 338 results