skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Award ID contains: 1914613

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. null (Ed.)
    Electronic portfolios have been hailed as a useful pedological tool on numerous grounds. One commonly cited justification is that portfolios deepen student learning and help students develop a professional identity. Whether electronic portfolios are used equally across programs and the degree to which they promote digital identities across student groups remains open to question. To fill this void in the research, in this study we explore the degree to which students from three majors (cybersecurity, leadership, and criminal justice) report using electronic portfolios, with a specific focus given to the reported strengths of electronic portfolios and the way the tool shaped digital identity development. 
    more » « less
  2. null (Ed.)
    Cybersecurity education has grown exponentially over the past decade. This growth occurred at all levels of education – from high schools to community colleges to four-year universities. At the same time, renewed interest in helping students transfer between higher education institutions has resulted in calls from policy makers and higher education leaders to create seamless pathways for students. Aligning cybersecurity education with changes in the transfer landscape, a case study was conducted to provide a framework for understanding how to improve services to cybersecurity transfer students. The case study involved four components: a review of articulation agreement literature, a review of processes used in the authors’ home institutions, a review of our experiences with the cybersecurity articulation agreement process, and recommendations for future articulation agreements. 
    more » « less
  3. In this study, cybersecurity faculty and academic advisors from community colleges and 4-year universities in the southeast region of the United States completed a survey assessing attitudes about and support for articulation agreements and related transfer policies. Hypothesizing that professional structures shape attitudes and experiences, the researchers conducted an exploratory quantitative study with primarily descriptive analyses. The results reveal differences in attitudes between community college and 4-year stakeholders and between faculty and academic advisors. The results of this study are discussed in relation to faculty and advisor training and communication. 
    more » « less