Skip to main content

Featured Collections

View all collections
Collection

George A. Gordon collection

Recent Additions

View all additions

This study examined K-12 cybersecurity and non-cybersecurity teachers' definitions of cybersecurity as guided by the NICE Framework Core. Responses were reviewed and coded. Findings indicate teachers defined cybersecurity as a skill and as protection. These findings support the need for training to ...

Artificial Intelligence (AI) is reshaping human perspectives on reality. Recent advancements in AI have introduced the phenomenon of deepfakes, large language models (LLMs), generative AI, and the production of text, images, audio, and video that can be designed to mislead individuals, creating an i...

We are entering an age in which disinformation, fake news, and falsified images, videos, and audio 1) are rapidly becoming indistinguishable from authentic media, 2) can be produced in real-time, and 3) can be deployed at scale and in quantities that businesses, news agencies, and nations alike may ...

Multi-factor authentication (also called MFA) is not as secure as we would like it to be. While MFA does protect against 99.9% of compromises (Maynes, 2020), it still has weaknesses that can be exploited by malicious actors. Over the years many implementations of MFA have been designed to circumvent...