Date Posted:
Contact Email: azentner@coastline.edu
Attention CAE-CD POCs for two-year colleges,
As the designated CAE-CD point-of-contact (POC), you and your faculty colleagues are invited to participate in an initiative that aims to better understand the influence that CAE-CD programs and their associated activities have on the career trajectories and preparedness of their alumni.
This national study sponsored by NCyTE Center has the objective of exploring how experiences within CAE-CD programs and specific program-related activities have shaped the career choices of alumni and prepared them for their professional lives. This study seeks to gather insights into the effectiveness of curriculum design, extracurricular involvement, internships, mentorships, and other program-specific factors in equipping students for the challenges and opportunities of their cybersecurity and technology-related careers.
Your participation in this initiative is critical. We believe that your insights and encouragement will significantly motivate program alumni to contribute to this study. The findings of this research are expected to offer valuable feedback on the strengths and areas for improvement within CAE-CD programs, thereby enabling us to better serve our current and future students.
We kindly request your assistance in the following ways:
Promote Amongst Alumni: We would appreciate it if you could inform your program alumni about this study through your department’s newsletters, emails, and social media platforms. A template message and study details will be provided to facilitate this communication.
Encouragement to Participate: Personal messages from faculty members with whom alumni have had meaningful relationships can be incredibly persuasive. We encourage you to reach out directly to your former students, emphasizing the importance of their participation in shaping the future of our programs.
Feedback and Insights: We are eager to hear your thoughts on how to best engage alumni and any suggestions you may have to increase participation rates.
Click here to participate in the study:
https://www.research.net/r/CAE-CDPOC2024
The study has the potential to significantly impact the continuous improvement of our CAE-CD programs and the success of our students. By understanding the level of impact between program experiences and career outcomes, we can tailor our efforts to provide an education that not only meets but exceeds the expectations and needs of our students and the cybersecurity workforce at large.
Please join us for an informational meeting on July 10, 2024, at 1:00pm Pacific Time via Zoom to learn more about how you can participate.
Click here to register for the informational meeting:
https://cccd-edu.zoom.us/meeting/register/tZIsd--vqjIsE9bLrO2uZDUx0ZI72VojylKg
Thank you for considering this invitation. Your support in this initiative is instrumental in enhancing the value of CAE-CD programs and in contributing to the broader academic and professional cybersecurity community. Should you have any questions or require further information, please do not hesitate to contact Tobi West directly at twest20@coastline.edu.
We look forward to your institution’s participation and to the impactful insights we can gather.
With kind regards,
Tobi West, Ph.D.
Researcher on behalf of NCyTE Center
Technology Department Chair, Coastline College
twest20@coastline.edu
If you have any questions about the rights of research subjects or research-related injury, please contact the Office of Institutional Effectiveness and Research by email at azentner@coastline.edu or by phone at 714-241-6209 x. 16413.
As the designated CAE-CD point-of-contact (POC), you and your faculty colleagues are invited to participate in an initiative that aims to better understand the influence that CAE-CD programs and their associated activities have on the career trajectories and preparedness of their alumni.
This national study sponsored by NCyTE Center has the objective of exploring how experiences within CAE-CD programs and specific program-related activities have shaped the career choices of alumni and prepared them for their professional lives. This study seeks to gather insights into the effectiveness of curriculum design, extracurricular involvement, internships, mentorships, and other program-specific factors in equipping students for the challenges and opportunities of their cybersecurity and technology-related careers.
Your participation in this initiative is critical. We believe that your insights and encouragement will significantly motivate program alumni to contribute to this study. The findings of this research are expected to offer valuable feedback on the strengths and areas for improvement within CAE-CD programs, thereby enabling us to better serve our current and future students.
We kindly request your assistance in the following ways:
Promote Amongst Alumni: We would appreciate it if you could inform your program alumni about this study through your department’s newsletters, emails, and social media platforms. A template message and study details will be provided to facilitate this communication.
Encouragement to Participate: Personal messages from faculty members with whom alumni have had meaningful relationships can be incredibly persuasive. We encourage you to reach out directly to your former students, emphasizing the importance of their participation in shaping the future of our programs.
Feedback and Insights: We are eager to hear your thoughts on how to best engage alumni and any suggestions you may have to increase participation rates.
Click here to participate in the study:
https://www.research.net/r/CAE-CDPOC2024
The study has the potential to significantly impact the continuous improvement of our CAE-CD programs and the success of our students. By understanding the level of impact between program experiences and career outcomes, we can tailor our efforts to provide an education that not only meets but exceeds the expectations and needs of our students and the cybersecurity workforce at large.
Please join us for an informational meeting on July 10, 2024, at 1:00pm Pacific Time via Zoom to learn more about how you can participate.
Click here to register for the informational meeting:
https://cccd-edu.zoom.us/meeting/register/tZIsd--vqjIsE9bLrO2uZDUx0ZI72VojylKg
Thank you for considering this invitation. Your support in this initiative is instrumental in enhancing the value of CAE-CD programs and in contributing to the broader academic and professional cybersecurity community. Should you have any questions or require further information, please do not hesitate to contact Tobi West directly at twest20@coastline.edu.
We look forward to your institution’s participation and to the impactful insights we can gather.
With kind regards,
Tobi West, Ph.D.
Researcher on behalf of NCyTE Center
Technology Department Chair, Coastline College
twest20@coastline.edu
If you have any questions about the rights of research subjects or research-related injury, please contact the Office of Institutional Effectiveness and Research by email at azentner@coastline.edu or by phone at 714-241-6209 x. 16413.
Date Posted:
Contact Email: levyy@nova.edu
Dear Cybersecurity Subject Matter Expert (SME),
I am a Ph.D. candidate in Cybersecurity Management at the College of Computing and Engineering at Nova Southeastern University. Dr. Yair Levy chairs my dissertation. This work is part of the Levy CyLab Project (https://infosec.nova.edu/cylab/ [infosec.nova.edu]). My research study seeks to empirically evaluate the influence of Ferreira et al.’s (2015) five principles of persuasion on senior citizens’ susceptibility to phishing via simulated SMiShing attacks.
The main study’s simulated SMiShing attack messages will need to include an operationalized principle of persuasion per SMS message. During your evaluation of SMS messages, you will be asked to evaluate the following two general questions about each of the sample SMS messages:
To what extent do you think the SMS message is SMiShing?
Provide your opinion about the level of AGREEMENT with each of the principles of persuasion provided in the SMS message.
By providing your opinion about the particular operationalized principle of persuasion in each SMiShing message, you are helping to confirm the intended principle of persuasion was operationalized appropriately, or if not, indicate it.
By participating in this research study, you agree and understand that your responses are voluntary. All responses are anonymous, and no Personally Identifiable Information (PII) will be collected. You may stop participating at any time and for any reason.
I appreciate your assistance and contribution to this research study. If you wish to receive a copy of the study’s findings, please email me, and I will send you the academic research paper once it is accepted for publication.
If you want to participate in this study, please follow the provided link and evaluate the SMS messages. The evaluation of the SMS messages should take less than 30 minutes.
Sincerely,
Brian Bisceglia
Ph.D. Candidate in Cybersecurity Management
College of Computing and Engineering
Nova Southeastern University
Link to SME Survey: https://docs.google.com/forms/d/e/1FAIpQLSe9-cm0sNEtwDBMQdVjNAqLUtNlulMryFid9I51XO_066-XNA/viewform
I am a Ph.D. candidate in Cybersecurity Management at the College of Computing and Engineering at Nova Southeastern University. Dr. Yair Levy chairs my dissertation. This work is part of the Levy CyLab Project (https://infosec.nova.edu/cylab/ [infosec.nova.edu]). My research study seeks to empirically evaluate the influence of Ferreira et al.’s (2015) five principles of persuasion on senior citizens’ susceptibility to phishing via simulated SMiShing attacks.
The main study’s simulated SMiShing attack messages will need to include an operationalized principle of persuasion per SMS message. During your evaluation of SMS messages, you will be asked to evaluate the following two general questions about each of the sample SMS messages:
To what extent do you think the SMS message is SMiShing?
Provide your opinion about the level of AGREEMENT with each of the principles of persuasion provided in the SMS message.
By providing your opinion about the particular operationalized principle of persuasion in each SMiShing message, you are helping to confirm the intended principle of persuasion was operationalized appropriately, or if not, indicate it.
By participating in this research study, you agree and understand that your responses are voluntary. All responses are anonymous, and no Personally Identifiable Information (PII) will be collected. You may stop participating at any time and for any reason.
I appreciate your assistance and contribution to this research study. If you wish to receive a copy of the study’s findings, please email me, and I will send you the academic research paper once it is accepted for publication.
If you want to participate in this study, please follow the provided link and evaluate the SMS messages. The evaluation of the SMS messages should take less than 30 minutes.
Sincerely,
Brian Bisceglia
Ph.D. Candidate in Cybersecurity Management
College of Computing and Engineering
Nova Southeastern University
Link to SME Survey: https://docs.google.com/forms/d/e/1FAIpQLSe9-cm0sNEtwDBMQdVjNAqLUtNlulMryFid9I51XO_066-XNA/viewform
Date Posted:
Contact Email: js5065@mynsu.nova.edu
Dear Information Security Subject Matter Expert (SME),
I am conducting a research study that focuses on comparing phishing mitigation methods, specifically three phishing training methods and two phishing campaign methods, for my dissertation work. I am a PhD candidate in Cybersecurity Management at the College of Computing and Engineering of Nova Southeastern University. My dissertation is chaired by Dr. Yair Levy and this work is part of the Levy CyLab. (http://CyLab.nova.edu/). My research study is seeking to compare the mitigation methods and their impact on malicious email in organizations. The experiment that I am seeking assistance with is aimed at comparing these phishing mitigation methods in a 2x3 quasi-experimental format measured on six specific end user negative response actions and vulnerability types. A secondary outcome of this experiment is to measure the samples based on several demographic factors.
By participating in this research study, you agree and understand that your responses are voluntary. All responses are anonymous and no personally identifiable information will be collected or traced back to anyone. Of course, you may stop your participation at any time. If you agree to participate, please use the link below to access the online survey. Thank you in advance for your consideration. I appreciate your assistance and contribution to this research study. If you wish to receive the findings of the study, feel free to contact me via email and I will be more than happy to provide you with the information about the academic research publication resulting from this study.
Jackie (Chris) Scott, PhD Candidate in Cybersecurity
Management
Nova Southeastern University
Email: js5065@mynsu.nova.edu
https://docs.google.com/forms/d/e/1FAIpQLSd1sYF4lZzyMgilSytNeC3HUZrTCt7AtMe7lx4Ifg-YguFgBQ/viewform
I am conducting a research study that focuses on comparing phishing mitigation methods, specifically three phishing training methods and two phishing campaign methods, for my dissertation work. I am a PhD candidate in Cybersecurity Management at the College of Computing and Engineering of Nova Southeastern University. My dissertation is chaired by Dr. Yair Levy and this work is part of the Levy CyLab. (http://CyLab.nova.edu/). My research study is seeking to compare the mitigation methods and their impact on malicious email in organizations. The experiment that I am seeking assistance with is aimed at comparing these phishing mitigation methods in a 2x3 quasi-experimental format measured on six specific end user negative response actions and vulnerability types. A secondary outcome of this experiment is to measure the samples based on several demographic factors.
By participating in this research study, you agree and understand that your responses are voluntary. All responses are anonymous and no personally identifiable information will be collected or traced back to anyone. Of course, you may stop your participation at any time. If you agree to participate, please use the link below to access the online survey. Thank you in advance for your consideration. I appreciate your assistance and contribution to this research study. If you wish to receive the findings of the study, feel free to contact me via email and I will be more than happy to provide you with the information about the academic research publication resulting from this study.
Jackie (Chris) Scott, PhD Candidate in Cybersecurity
Management
Nova Southeastern University
Email: js5065@mynsu.nova.edu
https://docs.google.com/forms/d/e/1FAIpQLSd1sYF4lZzyMgilSytNeC3HUZrTCt7AtMe7lx4Ifg-YguFgBQ/viewform
Date Posted:
Contact Email: mkrawczyk@towson.edu
The National Centers of Academic Excellence in Cybersecurity (NCAE-C) Curriculum Task Force is seeking proposals for developing post-secondary educational materials in the following emerging areas in cybersecurity:
Zero Trust Security
Quantum-resistant Cryptography
Autonomous/Self-driving vehicle security
Software Supply Chain security
Ransomware
CFP: https://cyberedtaskforce.org/wp-content/uploads/2022/07/TaskForce-CFP.pdf
More on NCAE-C Curriculum Taskforce - https://cyberedtaskforce.org
Zero Trust Security
Quantum-resistant Cryptography
Autonomous/Self-driving vehicle security
Software Supply Chain security
Ransomware
CFP: https://cyberedtaskforce.org/wp-content/uploads/2022/07/TaskForce-CFP.pdf
More on NCAE-C Curriculum Taskforce - https://cyberedtaskforce.org
Solicitation Number: NCAE-C-001-2021 (Original NSA solicitation that funded the task-force)
Date Posted:
Contact Email: info@nationalcyberwatch.org
The National CyberWatch Center encourages you to submit to the 2022 Innovations in Cybersecurity Education program, open from Feb. 18 through May 13. Submissions in the following categories: Evidence-based Strategies, Instruction, Practice, and Program Development, helps accelerate their adoption throughout the academic community and allows you and your team to receive the proper recognition for your work. For more on the Innovations program and how to submit yours, see here:
https://www.nationalcyberwatch.org/innovations
https://www.nationalcyberwatch.org/innovations
Solicitation Number: N/A