Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
null (Ed.)Cybersecurity education has grown exponentially over the past decade. This growth occurred at all levels of education – from high schools to community colleges to four-year universities. At the same time, renewed interest in helping students transfer between higher education institutions has resulted in calls from policy makers and higher education leaders to create seamless pathways for students. Aligning cybersecurity education with changes in the transfer landscape, a case study was conducted to provide a framework for understanding how to improve services to cybersecurity transfer students. The case study involved four components: a review of articulation agreement literature, a review of processes used in the authors’ home institutions, a review of our experiences with the cybersecurity articulation agreement process, and recommendations for future articulation agreements.more » « less
-
Jaishankar, K. (Ed.)Compared to other topics, cybercrime is a relatively new addition to the criminological literature. interest in the topic has grown over the past decade, with a handful of scholars leading efforts to generate empirical understanding about the topic. Common conclusions reached in these studies are that more research is needed, cybercrime is interdisciplinary in nature, and cybercrime should be addressed as an international problem. In this study, we examine a sample of 593 prior cybercrime scholarly articles to identify the types of research strategies used in them, the patterns guiding those strategies, whether the research is interdisciplinary, and the degree to which scholars engage in international cybercrime studies. Attention is also given to co-authorship as well as citation patterns. Implications for future research are provided.more » « less
-
Wu, Hongyi (Ed.)The Center for Cybersecurity Education and Research at Old Dominion University has expanded its use of high impact practices in the university’s undergraduate cybersecurity degree program. Strategies developed to promote student learning included learning communities, undergraduate research, a robust internship program, service learning, and electronic portfolios. This paper reviews the literature on these practices, highlights the way that they were implemented in our cybersecurity program, and discussions of some challenges we encountered with each practice. Recommendations for other cybersecurity programs seeking to expand the use of high impact practices are provided.more » « less
-
The study of white-collar crime has evolved over the past eight decades. So too has the nature of white-collar crime. Varieties of white-collar crime have changed as the types of occupations evolved. One change in the occupational arena that has likely impacted white-collar crime involves technological changes. In particular, with the advent of the computer, new opportunities for crime have developed within the workplace and outside of it. Few studies, however, have explored cybercrime within a white-collar crime framework. To address this void in the literature, in this study, a sample of 109 cases investigated by the U.S. Department of Justice are reviewed in order to determine how these cybercrimes can be characterized as white-collar crimes.more » « less
-
The study of cyber security is an interdisciplinary pursuit that includes STEM disciplines as well as the social sciences. While research on cyber security appears to be central in STEM disciplines, it is not yet clear how central cyber security and cyber crime is to criminal justice scholarship. In order to examine the connections between cyber security and criminal justice, in this study attention is given to the way that criminal justice scholars have embraced cyber crime research and coursework. Results show that while there are a number of cyber crime courses included in criminal justice majors there are not a large number of cyber crime research studies incorporated in mainstream criminal justice journals. ________________________________________________________________________more » « less