Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
When spending a lot of time online, all users, regardless of age, are subject to various cybersecurity threats [1]. Young individuals are a specific target for these cybercrimes due to their lack of expertise in cybersecurity and cyber-safe habits. Despite the State of Ohio’s sponsored initiatives that benefit students, including $89 million for top-notch summer and after-school activities, there has not been a lot of focus on cybersecurity education at the high school level. This NSF-sponsored initiative's main objective is to educate high school students about cybersecurity through a free summer camp that includes lectures, lab sessions, and free lunch and snacks, focusing on including students from low-income and underrepresented families. It also aims to teach students to recognize fraudulent behavior in malicious apps by exposing them to apps that behave fraudulently.more » « less
-
The enormous advancement of digital technology and the Internet usage have significantly improved our lives, but have threatened our security and privacy as well. Cyberattacks may have harmful long-term implications to individuals and organizations. High school students are accessible targets for various cybercrimes due to the lack of cybersecurity knowledge and cyber-safe practices. It is important that education about cybersecurity awareness and cyber hygiene practices must begin at a young age. Offering cybersecurity knowledge through interactive tutorials and game-based techniques may increase students' interest in this domain. To develop a security mindset and improve the perception and attitude towards cybersecurity, we created an interactive cybersecurity framework for high school students. Through this framework, we attempt to effectively educate students in cybersecurity through interactive animated visualization modules developed in Unity 3D engine, enabling learning of physical, software, and mathematical aspects of cybersecurity. Each topic in the visualization tool is explained in four stages including information, interaction, explanation, and assessment. Several surveys have been conducted to determine whether this framework enhances users' cognitive abilities.more » « less
-
The increasing use of computer technologies to perform everyday activities simplifies living, but brings the underlying cybersecurity concern to the fore. Due to the accessibility of smartphones, many teenagers are “online” for significant hours in a day. Many middle and high school students have been victims of a cybercrime through online activities. Additionally, various incidents of Internet fraud have been reported where teenagers are persuaded to buy games, music, and videos without realizing they are falling for a scam or disclosing their credit card information. Studies have shown that implementing a successful security awareness camp is crucial in boosting cybersecurity and attracting talent to this domain. This paper discusses our efforts on creating smartphone apps in the context of cyber-security to encourage safe use of apps and raise awareness among teenagers. The strategy used is to develop apps with the intention of closing security gaps. By doing this, teenagers gain a wealth of information about cybersecurity. This work aims to develop students' problem-solving skills and create a cybersecurity mindset for dealing with real-world cybersecurity-related problems such as malware or phishing assaults and to promote interest in cybersecurity careers among high school students utilizing smartphone-based interactive learning modules. We also examine gender-specific patterns and evaluate whether students' cybersecurity problem-solving skills have improved due to this novel intervention.more » « less
-
Deep learning (DL) algorithms have achieved significantly high performance in object detection tasks. At the same time, augmented reality (AR) techniques are transforming the ways that we work and connect with people. With the increasing popularity of online and hybrid learning, we propose a new framework for improving students’ learning experiences with electrical engineering lab equipment by incorporating the abovementioned technologies. The DL powered automatic object detection component integrated into the AR application is designed to recognize equipment such as multimeter, oscilloscope, wave generator, and power supply. A deep neural network model, namely MobileNet-SSD v2, is implemented for equipment detection using TensorFlow’s object detection API. When a piece of equipment is detected, the corresponding AR-based tutorial will be displayed on the screen. The mean average precision (mAP) of the developed equipment detection model is 81.4%, while the average recall of the model is 85.3%. Furthermore, to demonstrate practical application of the proposed framework, we develop a multimeter tutorial where virtual models are superimposed on real multimeters. The tutorial includes images and web links as well to help users learn more effectively. The Unity3D game engine is used as the primary development tool for this tutorial to integrate DL and AR frameworks and create immersive scenarios. The proposed framework can be a useful foundation for AR and machine-learning-based frameworks for industrial and educational training.more » « less
-
Ensuring software security is a critical task for a deliverable software system in today’s world, and its proper implementation guarantees the quality and security of the information ingested, stored, and processed by the system. It is imperative to introduce computer science and computer engineering students (CS/CE) with the secure software design practices early in their curriculum. This approach will help them understand fundamentals of secure programming, vulnerabilities in software systems, and secure software development before joining the industry workforce. In this paper, we propose an educational framework that integrates software security concepts in a software engineering design course. We envision that the framework will engage CS/CE students applying security principles and practices in different phases of the software development life cycle (SDLC) process. Our work focuses on review of common security requirements, policies, and mechanisms related to specific use cases as well as how those requirements are defined during the software design.more » « less
-
Kim, JH.; Singh, M.; Khan, J.; Tiwary, U.S.; Sur, M.; Singh, D. (Ed.)Cyberattacks and malware infestation are issues that surround most operating systems (OS) these days. In smartphones, Android OS is more susceptible to malware infection. Although Android has introduced several mechanisms to avoid cyberattacks, including Google Play Protect, dynamic permissions, and sign-in control notifications, cyberattacks on Android-based phones are prevalent and continuously increasing. Most malware apps use critical permissions to access resources and data to compromise smartphone security. One of the key reasons behind this is the lack of knowledge for the usage of permissions in users. In this paper, we introduce Permission-Educator, a cloud-based service to educate users about the permissions associated with the installed apps in an Android-based smartphone. We developed an Android app as a client that allows users to categorize the installed apps on their smartphones as system or store apps. The user can learn about permissions for a specific app and identify the app as benign or malware through the interaction of the client app with the cloud service. We integrated the service with a web server that facilitates users to upload any Android application package file, i.e. apk, to extract information regarding the Android app and display it to the user.more » « less
An official website of the United States government
