Articles
What You See Is Not What You Know: Studying Deception in Deepfake Video Manipulation
Cathryn Allen, Bryson R. Payne, Tamirat Abegaz, and Chuck Robertson
An Interdisciplinary Approach to Experiential Learning in Cyberbiosecurity and Agriculture Through Workforce Development
Kellie Johnson, Tiffany Drape, Joseph Oakes, Joseph Simpson, Ann Brown, Donna M. Westfall-Rudd, and Susan Duncan
Leading K-12 Community Responsiveness to Cyber Threats via Education of School Community
Michele Kielty and A. Renee Staton
Integrating NIST and ISO Cybersecurity Audit and Risk Assessment Frameworks into Cameroonian Law
Bernard Ngalim
Infrastructure as Code for Cybersecurity Training
Rui Pinto, Rolando Martins, and Carlos Novo
Building the Operational Technology (OT) Cybersecurity Workforce: What are Employers Looking for?
Christopher A. Ramezan, Paul M. Coffy, and Jared Lemons
Leveraging VR/AR/MR/XR Technologies to Improve Cybersecurity Education, Training, and Operations
Paul Wagner and Dalal Alharthi
A Developed Framework for Studying Cyberethical Behaviour in North Central Nigeria
Aderinola Ololade Dunmade, Adeyinka Tella, and Uloma Doris Onuoha
Building a Diverse Cybersecurity Workforce: A Study on Attracting Learners with Varied Educational Backgrounds
Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, and Jens Myrup Pedersen
Integrity, Confidentiality, and Equity: Using Inquiry-Based Labs to help students understand AI and Cybersecurity
Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, and Yan Huang
Preparing UK students for the workplace: The Acceptability of a Gamified Cybersecurity Training
Oliver J. Mason, Siobhan Collman, Stella Kazamia, and Ioana Boureanu
Turnstile File Transfer: A Unidirectional System for Medium-Security Isolated Clusters
Mark Monnin and Lori L. Sussman
Turkey vs Italy: Gender and Cyber Security
Esra Merve Caliskan and Irem Itegin
Board of Directors Role in Data Privacy Governance: Making the Transition from Compliance Driven to Good Business Stewardship
David Warner and Lisa McKee
University of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study
Mancha J. Sekgololo
Improving Belonging and Connectedness in the Cybersecurity Workforce: From College to the Profession
Mary Beth Klinger
Blockchain Applications in Higher Education Based on the NIST Cybersecurity Framework
Brady Lund Ph.D.
Comparing Cognitive Theories of Learning Transfer to Advance Cybersecurity Instruction, Assessment, and Testing
Daniel T. Hickey Ph.D. and Ronald J. Kantor
Cybersecurity Skills, Knowledge and Abilities for Criminal Justice Professionals: An Exploratory Study of Practitioners' Perspectives
Kate Quintana, Caroline Sutton Chubb, Daniel Olson, and Anna Kosloski
An Alternative Approach to Data Carving Portable Document Format (PDF) Files
Kevin Hughes and Michael Black
Development of Cyber Security Platform for Experiential Learning
Abhishek Vaish, Ravindra Kumar, Samo Bobek, and Simona Sternad
Collaborative Pathways to Cybersecurity Excellence: Insights from Industry and Academia in the Southeastern US
Humayun Zafar, Carole L. Hollingsworth, Tridib Bandyopadhyay, and Adriane B. Randolph
Using Gamification to Enhance Mastery of Network Security Concepts
Kevin Hilliard, Xiaohong Yuan, Kelvin Bryant, Jinsheng Xu, and Jinghua Zhang
Designing Cybersecurity Escape Rooms: A Gamified Approach to Undergraduate Learning
Thitima Srivatanakul
Leveraging Propagation Delay for Wormhole Detection in Wireless Networks
Harry May and Travis Atkison
Happy hours, not office hours: Socially engaging cybersecurity students in a large online graduate course
James T. McCafferty
Wormhole Attack Mitigation in Wireless Network Using Propagation Delay
Harry May and Travis Atkison