Covert Eye Op App: An Offense Based Learning Approach Towards Developing Mobile Security Awareness and Interest in Cybersecurity

Author:

Chattopadhyay Ankur1,Poe Tyler1,Nguyen Hoang1,Tsegaye Abel1,Moua Lolar2

Affiliation:

1. Computer Science, Northern Kentucky University, USA

2. Computer Science, University of Wisconsin - Green Bay (UWGB), USA

Funder

NSA/NSF

Publisher

ACM

Reference31 articles.

1. Alexander Gostev , Roman Unuchek , Maria Garnaeva , Denis Makrushin , and Anton Ivanov . 2016. IT threat evaluation in Q1 2016 . Kaspersky Lab. Retrieved July 6, 2022, from https://itcafe.hu/dl/cnt/2016-05/128009/q1_2016_mw_report_final_eng.pdf Alexander Gostev, Roman Unuchek, Maria Garnaeva, Denis Makrushin, and Anton Ivanov. 2016. IT threat evaluation in Q1 2016. Kaspersky Lab. Retrieved July 6, 2022, from https://itcafe.hu/dl/cnt/2016-05/128009/q1_2016_mw_report_final_eng.pdf

2. Mobile Devices in Education. In Toward Sustainability Through Digital Technologies and Practices in the Eurasian Region;Khalikova Anastassiya;IGI Global,2020

3. Andrew Malecki . 2018. Cybersecurity in the classroom: Bridging the gap between computer access and online safety. Cyber Security Capstone Research Project Reports, 1. Retrieved July 6, 2022 , from https://scholar.valpo.edu/cscrpr/1 Andrew Malecki. 2018. Cybersecurity in the classroom: Bridging the gap between computer access and online safety. Cyber Security Capstone Research Project Reports, 1. Retrieved July 6, 2022, from https://scholar.valpo.edu/cscrpr/1

4. Andrew Perrin . 2021. Mobile technology and home broadband 2021 . Pew Research Center . Retrieved July 6, 2022, from https://www.pewresearch.org/internet/2021/06/03/mobile-technology-and-home-broadband-2021/ Andrew Perrin. 2021. Mobile technology and home broadband 2021. Pew Research Center. Retrieved July 6, 2022, from https://www.pewresearch.org/internet/2021/06/03/mobile-technology-and-home-broadband-2021/

5. Bruce Schneier . 2008. Inside the twisted mind of the security professional. Wired. Retrieved July 6, 2022 , from https://www.wired.com/2008/03/securitymatters-0320/ Bruce Schneier. 2008. Inside the twisted mind of the security professional. Wired. Retrieved July 6, 2022, from https://www.wired.com/2008/03/securitymatters-0320/

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A Cybersecurity Summer Camp for High School Students Using Autonomous R/C Cars;Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 1;2024-03-07

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3