skip to main content


Search for: All records

Award ID contains: 1956428

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. This study aims to examine the impacts of organization’s cybersecurity training program on employees with qualitative data, collected from 33 college students who were attending Norfolk State University while also working either on a part-time or full-time basis participated. Open-ended questions were asked to elicit participants’ perspectives on cybersecurity training and cybersecurity protocols in organizations. Using qualitative data analysis software Nvivo 12, the authors organized and analyzed the collected data with open coding, and selective coding to recognize the major influencing impacts from cybersecurity training on employees’ routine work and behavior. Inductive and grounded theory analysis further elaborates connections between employee’s cybersecurity training and efficiency of organizations. Our findings suggest that on-the-job cybersecurity training provided by the employer is an effective investment for modern organizations to build on the organizational human capital and consequently to improve the efficiency of the organization. Findings from this study corroborates with the tenet of human capital theory that on-the-job educational program or training is economical and effective to manage the human capital challenge for modern organizations. 
    more » « less
  2. This paper explores the impact of role models on effective research assistant mentorships for students at Historically Black Colleges and Universities in the United States of America. The research is grounded in the role model theory, which premises that faculty-mentors can demonstrate to mentees how something is done in a technical sense. The data for this project is based on the end of year written reflections of twenty-five research assistants, as well as their conference posters and presentations. The impact of the mentor on students’ progress on the development of a desktop application is also examined. The methodology was a narrative analysis of this qualitative data. The conclusion is that the role model theory is appropriate in understanding under-represented minority students' mentorship and how their mentors can be bootstrap sources for future expectations. 
    more » « less
  3. This article examines the integration of cybersecurity into the sociology curriculum at a HBCU. The article is based on two of the twenty-six modules that were created and taught in a three-year project. The research questions are: • Is there increased cybersecurity awareness after the infusion of the Password and Phishing Modules? • Is there a relationship between the use of experiential pedagogy and learning outcomes? The socio-cybersecurity modules are grounded in Vygotsky’s experiential learning theory. The methodology included a pre-test survey of cybersecurity awareness, the module’s lecture and experiential activities, then a post-test survey of cybersecurity awareness. T-test analysis was performed on the data obtained from quasi-experimental survey data. Content analysis was performed on in-class assignments. Students found the experiential pedagogy helpful and demonstrated their new knowledge. Significant pedagogical research is occurring with African American students. Traditionally, this population has been sidelined in the digital race and its new employment opportunities. When exposed to cyber-education their learning outcomes are primarily significant. 
    more » « less
  4. null (Ed.)
    This research project examines the relationship between teleworking cybersecurity protocols during the COVID-19 era and employee’s perception of their efficiency and performance predictability.  COVID-19 is the infectious disease caused by the most recently discovered coronavirus and it has been declared a pandemic by the World Health Organization. Since March 2020, many employees in the United States who used operate onsite, have been working from their homes (teleworking) to mitigate the spread of the virus through social distancing. The premise of this research project is that teleworking can transform these employees into unintentional insider threats or UITs. Iinterviews were conducted through video conferencing with nine employees in Virginia, USA to examine the problem. This is an interdisciplinary research project which brings together the disciplines of sociology and computer science. Narrative Analysis was used to unpack the interviews. The major findings from the research efforts demonstrate that employees are trusting of the cybersecurity protocols that their organizations implemented but they also believe they are vulnerable, and that the protocols are not as reliable as in-person working arrangements. While the respondents perceived that the cybersecurity protocols lend to performance predictability, they seem to think it disrupts their efficiency. 
    more » « less