14 research outputs found

    Using Cybersecurity Body of Knowledge (CyBOK) Case Studies to Enhance Student Learning

    Get PDF
    One of the central aspects of specialization in modern software engineering is security engineering. With contemporary systems being networked and entrusted with mission-critical functionality, cybersecurity is an essential quality that must be developed into the system from the first moment. This comprises issues such as privacy, authentication, robustness against vulnerabilities, and hardness against external attacks. To do so, software engineering specialists with appreciation for the detailed intricacies of security engineering as well as broad experience are required. The Cybersecurity Body of Knowledge (CyBOK, [1]) has been developed to serve, among other uses, as an instructional reference for educators to prepare the next generation of security engineers in this respect. While the CyBOK describes the intricacies of security engineering in plentiful detail, it remains up to the instructor to convey this curriculum in a way that fosters understanding and forms experience as well as competencies in the learner. To aid the instructors who use the CyBOK, we have devised a library of 18 case studies that are specifically designed to target CyBOK knowledge areas. The case studies are sufficiently detailed to allow adoption with minimal overhead on the instructor. In this paper, we describe the case study mapping to the CyBOK, and classroom results of one exemplary case study, demonstrating improved understanding by students

    Incorporating UTAUT Predictors for Understanding Home Care Patients’ and Clinician’s Acceptance of Healthcare Telemedicine Equipment

    Get PDF
    Telemedicine programs within health care are experiencing significant growth as healthcare organizations seek to reduce expenditures and improve efficiency. The high costs of treating chronic diseases, compounded by an aging population, has given focus to creating technology-enabled alternatives to support, enhance, or expand patient services. As investments in telemedicine products and services grow at a rapid pace, user technology acceptance has become a key issue in successful implementation. Drawing from the Unified Theory of Acceptance in Technology (UTAUT), this study investigated the predictors of behavioral intention to use Telehealth equipment by patients, clinicians, and agency personnel at Henry Ford e-Home Health Care. Survey data were provided by 126 participants recruited from an eligible population who were either currently using the Telehealth equipment or were familiar with it. Structural equation modeling was used to study the overall fit of the UTAUT model in predicting behavioral intention. Participant type, self-efficacy, anxiety and attitude were tested as moderators. Implications for increasing adoption of Telehealth technology are discussed

    The complete guide to cybersecurity risks and controls

    No full text
    xv, 326 p. ; 24 cm

    An Understanding of the Practices of an Appreciative Leader

    No full text
    This qualitative research project is a follow-up to the original book Appreciative Leaders: In the eye of the Beholder written 10 years ago. Our work aims to understand what it means to be an appreciative leader today and the practices of appreciative leaders. We interviewed 50 appreciative leaders to learn how they best lead, what they value, how they develop feedback- rich environments and working relationships, and the positive affect of bringing out the best in others

    How to build a cyber resilient organization

    No full text

    Teaching Secure Acquisition in Higher Education

    No full text
    corecore