The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper contributes to the ongoing efforts in the cybersecurity community to strengthen cyber workforce development by providing an overview of key gaps and proposing practical education strategies. Leveraging documented incidents from defense, industry, and academia and the rest of the United States government, we identify emerging cyber-education opportunities highlighting human-centric elements...
Military operations always required much coordination to be performed, however, with the technological revolution and the subsequent modernization of military equipment, military actions have become faster and more complex, requiring from the Command and Control (C2) increased agility to obtain awareness situational battlefield. Currently, this agility is being obtained with the increasing use of...
The National Initiative for Cybersecurity Education (NICE) aims to create an operational, sustainable, and continually improving program for cybersecurity awareness, education, training, and workforce development. As part of the initiative, the NICE Cybersecurity Workforce Framework aims to codify cybersecurity talent; define the cybersecurity workforce in common terms; and tie the workforce's various...
This training article introduces readers to the specific tools and skills needed to best provide cyber operations education and training to university students at the undergraduate and graduate level. It isn't a curriculum-mapping exercise but rather a detailed listing of tools and techniques that can be included in existing and new courses to best align with the NSA's new Center of Academic Excellence...
Fuzzy reasoning analysis (FRA) is known as a mathematical programming approach to strong nonlinear system prediction,In this paper,the design and implementation of a fuzzy reasoning based cyberspace security awareness model is presented. The new feature of the this method is that it can give better perception and projection of cyberspace security situational. We show that this new method, referred...
The present study examined the effects of mood on trust in automation over time. Participants (N = 72) were induced into either a positive or negative mood and then completed a computer-based task that involved the assistance of an automated aid. Results indicated that mood had a significant impact on initial trust formation, but this impact diminishes as time and interaction with the automated aid...
A collaborative education system using networked virtual reality (VR) overcomes differences of time and space between its teachers and students. The system can give cyber experiences in a virtual environment to students. We propose a collaboration system for experiment and education in biology. The proposed system uses a social computing based VR system called SecondLife. Students can learn basic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.