Volume 3 - Number 2, October, 2024
(download full issue)
|
4 |
Consumer Acceptance of Biometric Credit Cards as an Identify Proofing Mechanism
Laura Poe, Longwood University
|
12 |
Teaching Public Key Cryptography: A Software Approach
David Carlson, Saint Vincent College
|
21 |
Teaching Case:
Digital Forensics and Incident Response (DFIR): A Teaching Exercise
Jennifer L. Breese, Penn State Greater Allegheny
Maryam Roshanaei, Penn State Abington College
J. Andrew Landmesser, Penn State Brandywine
Brian Gardner, Penn State Schuylkill
|
35 |
Phishing: Gender Differences in Email Security Perceptions and Behaviors
J Jie Du, Grand Valley State University
Andrew Kalafut, Grand Valley State University
Gregory Schymik, Grand Valley State University
|
48 |
Feasibility of Creating a Non-Profit and Non-Governmental Organization Cybersecurity Incident Dataset Repository Using OSINT
Stanley J. Mierzwa, Kean University
Iassen Christov, Kean University
|
|
Volume 3 - Number 1, April, 2024
(download full issue)
|
4 |
A Mixed-Method Study Exploring Student Motivation for Participating in Cybersecurity CTF Competitions
Cheryl Beauchamp, Regent University
Holly Matusovich, Virginia Tech
|
27 |
Higher Education Model for Security Literacy using Bloom’s Revised Taxonomy
Garry White, Texas State University
|
37 |
Comprehensive Cybersecurity Programs: Case-Study Analysis of a Four-Year Cybersecurity Program at a Secondary Education Institution in Arizona
Paul Wagner, University of Arizona
Dalal Alharthi, University of Arizona
|
64 |
Doing Postphenomenology in Cybersecurity Education: A Methodological Invitation
Ryan Straight, University of Arizona
|