Smartphones contain a significant amount of personal data. Additionally, they are always in the user's possession, which allows them to be abused for tracking (eg, GPS, Bluetooth or …
BK Payne, L Mayes, T Paredes… - Journal of …, 2021 - digitalcommons.kennesaw.edu
Abstract The Center for Cybersecurity Education and Research at Old Dominion University has expanded its use of high impact practices in the university's undergraduate …
Cybersecurity is paramount in modern cyberdefense. One important factor linked to reducing human-instigated breaches of cybersecurity includes cyber hygiene. Cyber hygiene is the …
Personal data is valuable and vulnerable to individuals who have wrong intentions as any other possessions. This can be mitigated by good cyber hygiene habits. The main aim of this …
In recent years, societies around the world have made great strides in the field of information and communication technology. Albania ranks among the countries where the development …
This paper describes an interdisciplinary effort involving faculty from five different disciplines who came together to develop an interdisciplinary, open, general education cybersecurity …
L Tsado - Journal of Cybersecurity Education …, 2019 - digitalcommons.kennesaw.edu
The human resource skills gap in cybersecurity has created an opportunity for educational institutions interested in cybersecurity education. The current number of schools designated …
M Dupuis, K Chhor, N Ly - Proceedings of the 22nd Annual Conference …, 2021 - dl.acm.org
Misinformation is not new; however, the proliferation of social media has resulted in a much broader reach and instantaneous impact. Results from such proliferation were seen during …
M Dupuis, A Jennings, K Renaud - … of the 22nd Annual Conference on …, 2021 - dl.acm.org
Fear appeals have been used for thousands of years to scare people into engaging in a specific behavior or omitting an existing one. From religion, public health campaigns …