16 results on '"Kappers, Wendi M."'
Search Results
2. From Degree to Chief Information Security Officer (CISO): A Framework for Consideration
- Author
-
1594384, Kappers, Wendi M, Harrell,, Martha Nanette, 1594384, Kappers, Wendi M, and Harrell,, Martha Nanette
- Abstract
Educational entities are establishing program degree content designed to ensure cybersecurity and information security assurance skills are adequate and efficient for preparing students to be successful in this very important field. Many Master’s level programs include courses that address these skills in an attempt to provide a well-rounded program of study. However, undergraduates who are in the practitioner’s world have other alternatives to gain these skills. These individuals can gain various certifications, such as the Certified Information Systems Security Professional (CISSP) or the Certified Information Security Manager (CISM). Due to a perceived gap between academics and field knowledge, it appears that academic programs may not fully consider the very specific competencies of C-Suite members (e.g. Chief Information Security Officer (CISO)) since field certification may be the only validation of such skills. Therefore, a framework from degree to industry employment acceptance is needed. To this end, the current study suggests the use of a framework in which to examine and compare C-Suite competencies versus academic preparations. Ultimately, this framework will assist researchers in examining the actual, current job tasks of C-Suite members. Since the CISO position is new to the industry, becoming a common job title within only the last few years, the reporting structure for the CISO varies widely and various organizations have differing expectations of the position [1]. Therefore, the initial phases of this study focus solely upon this position as the starting benchmark. This paper explores historical aspects of the workforce skills gap in the area of computer security while providing survey validation results from Phase I of this project. This pilot investigation invited faculty (n=5; 24% response rate) who are both practitioners and academicians to support this examination and the acceptance of said framework. Demographic data includes a comparison betw
- Published
- 2020
3. Cyber insurance effects on cyber hygiene: Does the homeostatic effect apply?
- Author
-
Kappers, Wendi M., Glassman, Aaron, and Wills, Michael S.
- Subjects
HYGIENE ,INFORMATION assurance ,INSURANCE ,INFORMATION technology security ,SMALL business - Abstract
A theoretical framework and research strategy is proposed to gain insight into perceptions and decisions as to how SMBs make decisions regarding cybersecurity hygiene measures, which could lead to betterinformed decisions regarding insurance as part of an ISA program, as well as have a bearing on policy structures and pricing for such insurance. This is because the definition of “cybersecurity hygiene habits”(CHH) as a task appears to vary within the industry and makes the practice hard to measure and evaluate. Research suggests that there may be a poorly understood connection between CHHs undertaken by organizations and their perceptions and/or adoption of cybersecurity insurance as well, thus leading to gaps or holes within business security perimeters. Homeostatic Risk Theory (HRT) has been observed in other venues in which the use of risk mitigation measures (including insurance) leads to more risky behavior; this may have a bearing on why so many organizations, particularly Small and Medium Businesses (SMBs) are very slow to adopt Information Security Assurance (ISA) measures at all or do so minimally. This paper presents a theoretical framework and proposed research, which will provide greater clarity on these issues while highlighting areas where further research is required. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
4. From Degree to Chief Information Security Officer (CISO): A Framework for Consideration.
- Author
-
Kappers, Wendi M. and Harrell, Nan
- Subjects
CHIEF information officers ,INFORMATION skills ,CURRICULUM planning ,JOB skills ,INFORMATION technology security - Abstract
Educational entities are establishing program degree content designed to ensure information security skills are adequate and efficient for preparing students to be successful. Due to a perceived gap between academics and field knowledge, programs may not fully consider the competencies of C-Suite members. This study suggests the use of the Leavitt Diamond framework in conjunction with a DACUM approach to assist researchers in examining C-Suite skills as they relate to academic studies. This framework will assist researchers in examining C-Suite skills as they relate to academic studies. Since the Chief Information Security Officer position is new to the industry with reporting structures and roles varying widely, this study focuses on that role as a benchmark. This paper explores historical aspects of the computer science skills gap and provides survey validation results from invited faculty (n=5; 24%), who are both practitioners and academicians. A comparison between degree attainment and employment position is recorded to explore academic preparatory to job skill needs. Future curriculum designs will be discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
5. Training and Resources for Gender Inclusive Teamwork
- Author
-
1594384, Beddoes, Kacey, Panther, Grace, Cutler, Stephanie, Kappers, Wendi M., 1594384, Beddoes, Kacey, Panther, Grace, Cutler, Stephanie, and Kappers, Wendi M.
- Abstract
TARGIT (Training and Resources for Gender Inclusive Teamwork) is a collaborative development and content project for a new, open-access, online training tool. TARGIT was created by a team of engineering education researchers and faculty development specialists. The researchers summarized and condensed the body of literature about teamwork into four areas: team formation, team roles, team facilitation, and team evaluation. These areas were then turned into 4 modules by the faculty development specialists. The modules guide users through various ways in which teamwork can be problematic for women and other underrepresented groups. Users then complete interactive activities in which they apply their newly gained knowledge to situations they might encounter in the classroom.
- Published
- 2018
6. Simulation to Application. The Use of Computer Simulations to Improve Real-World Application of Learning
- Author
-
1594384, Kappers, Wendi M, Cutler, Stephanie L., 1594384, Kappers, Wendi M, and Cutler, Stephanie L.
- Abstract
Simulations have been used in training and education for years to aid students in gaining the skills needed to complete a task in a low risk environment. However, students can have trouble connecting the skills used in the simulated working environments to skills that are needed to be applied in the real-world environment, referred to as adaptive transfer. The simulations referred to in this study are simulated environments that mirror students kill application, not a simulation of an event that is meant to aid students in the development of concept knowledge around the demonstrated event. This study examines students' ability to transfer skills learned during a simulation activity to that of a real-world application setting. The study is situated within an introductory engineering computing course in which students are required to work within MyITLab to gain familiarity with using Microsoft Office Software, specifically Microsoft Excel. In this setting, students are expected to use high fidelity simulations, complete online course work based upon these simulations, and then complete a comprehensive exam to demonstrate skills learned with the real-world application. Guided by Kolb's experiential learning theory, end of course surveys were implemented to investigate student self-efficacy, the adaptive transfer process, and students' perceived ability to successfully use this software for real world productivity outside of the classroom environment. Survey questions focused upon the student experience when working with simulation software and how using the software enabled them to use Microsoft Excel effectively. Survey results were correlated with course grades from preparation simulation activities and the final application exam. The implementation of simulated activities within the course was found to reflectively engage students with the content of the activity and provide students with a true experimental environment in order to create a real-world project. By ga
- Published
- 2016
7. From Enrollment to Employment: A DACUM Approach to Information Systems and Information Security and Assurance Curriculum Design
- Author
-
1594384, Halawi, Leila, Kappers, Wendi M, Glassman, Aaron, 1594384, Halawi, Leila, Kappers, Wendi M, and Glassman, Aaron
- Abstract
Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two graduate degrees in IS and Information Security and Assurance (ISA) through the eyes of a university that has a unique relationship with Microsoft and an active Industry Advisory Board (IAB).
- Published
- 2016
8. From Enrollment to Employment: A DACUM Approach to Information Systems and Information Security and Assurance Curriculum Design
- Author
-
1779734, Halawi, Leila, Kappers, Wendi M., Glassman, Aaron, 1779734, Halawi, Leila, Kappers, Wendi M., and Glassman, Aaron
- Abstract
Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two graduate degrees in IS and Information Security and Assurance (ISA) through the eyes of a university that has a unique relationship with Microsoft and an active Industry Advisory Board (IAB).
- Published
- 2016
9. Through the Lens of the Reviewer: Information Literacy, an LMS, and Peer Review
- Author
-
Kappers, Wendi M., Ph.D. and Kappers, Wendi M., Ph.D.
- Abstract
Through the lens of the reviewer: Information literacy, an LMS, and peer review. Concurrent session presented at the 2016 American Society for Engineering Education (ASEE) Annual Conference: Jazzed about Engineering Education, June 26-29, New Orleans, LA., https://commons.erau.edu/db-itl-week/1007/thumbnail.jpg
- Published
- 2016
10. Poll Everywhere! Even in the Classroom: An Investigation into the Impact of Using PollEverwhere in a Large-Lecture Classroom
- Author
-
1594384, Kappers, Wendi M, Cutler, Stephanie L., 1594384, Kappers, Wendi M, and Cutler, Stephanie L.
- Abstract
Over the past several years, there has been a call in higher education to move from traditional lecturing to a more active classroom. However, many faculty members face multiple challenges when attempting to make a large lecture (over 100 students) an active learning environment. One way researchers have suggested engaging a large lecture is through Concept Tests and Peer Instruction, which can require additional resources to be purchased by students, such as electronic response systems or "clickers." This study will investigate the applicability of utilizing the free software PollEverywhere, which can be accessed using student cell phones (Text messages and Twitter) or personal laptop computers (www.pollev.com), as a potential method to improve student engagement by open-ended, reflective, multiple-choice, and content specific questions in a more efficient manner as perceived by students in a large-lecture classroom. The purpose of this study is to investigate the impact of implementing polling software (PollEverywhere) on student engagement in an introductory computer science large lecture classroom (n = 291). The ease of use of this technology can help with the adoption of this active learning strategy. Research needs to be done to measure the impact of this software. During the fall semester of 2013, a pilot study was completed in an introductory computing course for non-computer science majors. During lecture, students were regularly asked to use the PollEverywhere software to respond to open-ended, reflective, multiple-choice, and content specific questions. At the end of the semester, students were asked to complete the survey to gauge if using the PollEverywhere software specifically changed their views of the course or about using response systems int he class. The results were generally positive with many of the students stating they enjoyed using PollEverywhere and felt more engaged when PollEverywhere was used. More students felt more engaged with the op
- Published
- 2015
11. THROUGH THE LENS OF THE REVIEWER: INFORMATION LITERACY, AN LMS, AND PEER REVIEW.
- Author
-
Kappers, Wendi M.
- Subjects
INFORMATION literacy ,PEER review of students ,LEARNING Management System ,COMPUTER managed instruction ,SOCIAL factors - Abstract
This research paper describes the use of peer review to improve information literacy. Peer-reviewed assignments for learning have been seen favorably within the literature. The articulated benefits range from students feeling more engaged, having expressed less anxiety, or found to be better equipped to perform in unfamiliar areas outside their current learning environments. However, minimal research examines the benefits specifically for the feedback provider (reviewer) when a more modem tool, such as the Canvas Learning Management System (LMS) is used. During the fall 2015 semester, a study was conducted to examine the peer review process from the vantage point of the reviewer when mitigated by an LMS. Since peer review is seen as a social activity, this study is guided by a social constructivism teaching framework to investigate peer review activities for (a) linear relationships to that of a perceived social element inclusion, (b) changes in learning from the perspective of the reviewer rather than the receiver of feedback, and (c) improvement in perceived information literacy. Additionally, this research examines Canvas attributes as identified by Sondergaard & Mulder [1] (2012) of (a) Automation, (b) Simplicity, (c) Customizability, and (d) Accessibility, which support statements from the literature that indicate a lack of investigation of more modem peer review tools. Survey results, both qualitative and quantitative, were analyzed across three different peer-reviewed assignments for this examination. Of the 91 respondents, representing a 32% response rate, descriptive analysis revealed themes ranging from Changes in Student Efforts to Valued New Perspectives', whereas, expected Active Learning and Social Benefits slightly contradicted the positive tone that was originally found in the thematic review. Overwhelming positive ratings were collected regarding the use of the LMS to support and implement a peer-reviewed assignment. Perceived affects upon the peer reviewer, and how these types of assignments can support the proposed ABET General Criterion 3 Student Outcomes and General Criterion 5 Curriculum currently under revision are discussed. Lastly, these data are represented for use as an evaluation baseline for future planned investigations and for other faculty and course developers, who are considering implementation of peer-reviewed activities within first-year program courses. [ABSTRACT FROM AUTHOR]
- Published
- 2017
12. Play Education Video Games on Their Terms
- Author
-
1594384, Kappers, Wendi M, 1594384, and Kappers, Wendi M
- Abstract
It is imperative when utilizing educational video games in K-12 classrooms that student preferences with regard to game play, purpose, and design be considered in order to maximize game play efficiency for learning. As Web 2.0 content infiltrates our educational medium, student customization is key. This manuscript intends to share customization requests gleaned during an 18-week experimental study examining educational video game effects upon 7th graders enrolled in Mathematics and Mathematics 2 courses.
- Published
- 2011
13. Educational Video Game Effects Upon Mathematics Achievement and Motivation Scores: An Experimental Study Examining Differences Between the Sexes
- Author
-
1594384, Kappers, Wendi M, 1594384, and Kappers, Wendi M
- Abstract
An experimental research study using a mixed-method analysis to was conducted to examine educational video game effects on mathematics achievement and motivation between sexes. This study examined sex difference in a 7th grade mathematics (Mathematics 2/Mathematics 2 Advanced) classroom (n=60) learning algebra. Attributes and barriers relating to educational video game play, preference, and setting characteristics were explored. To examine achievement and motivation outcomes, a repeated-measure (SPSS v14) test was used. The analysis included ethnographic results from both student and teacher interview and observation sessions for data triangulation. Results revealed a statistically significant academic mathematics achievement score increase (F =21.8, df =1, 54, p.05), both sexes posted similar data outcomes with regard to mathematics class motivation after using an educational video game as treatment during an eighteen-week term in conjunction with receiving in-class instruction. Additionally, there was an increase in male variability in standard deviation score (SDmotivationpre=8.76, SDmotivation post=11.70) for mathematics class motivation. Lastly, self-reported differences between the sexes for this limited sample, with regard to game design likes and dislikes and observed female game play tendencies, were also investigated. The data presented customization as a unified, but most requested, game design need between the sexes. Between sex differences were found only to be superficial other than a female delay in game acceptance with regard to time and game play comfort.
- Published
- 2009
14. FROM ENROLLMENT TO EMPLOYMENT: A DACUM APPROACH TO INFORMATION SYSTEMS AND INFORMATION SECURITY AND ASSURANCE CURRICULUM DESIGN.
- Author
-
Halawi, Leila, Kappers, Wendi M., and Glassman, Aaron
- Subjects
EMPLOYMENT ,INFORMATION technology security ,CURRICULUM planning ,INFORMATION & communication technologies ,ADVISORY boards - Abstract
Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a "Developing a Curriculum," DACUM, process to support curriculum design for two graduate degrees in IS and Information Security and Assurance (ISA) through the eyes of a university that has a unique relationship with Microsoft and an active Industry Advisory Board (IAB). [ABSTRACT FROM AUTHOR]
- Published
- 2016
15. Simulation to Application: Exploring student's ability to transfer skills.
- Author
-
Cutler, Stephanie L. and Kappers, Wendi M.
- Subjects
- *
COMPUTER engineering , *WORK environment , *SIMULATION software , *CLASSROOM environment - Abstract
Simulations have been used in training and education for years to aid students in gaining the skills needed to complete a task in a low risk environment. However, students can have trouble connecting the skills used in the simulated working environments to skills that are needed to be applied in the real-world environment, referred to as adaptive transfer. The simulations referred to in this study are simulated environments that mirror student skill application, not a simulation of an event that is meant to aid students in the development of concept knowledge around the demonstrated event. This study examines students' ability to transfer skills learned during a simulation activity to that of a real-world application setting. The study is situated within an introductory engineering computing course in which students are required to work within MyITLab to gain familiarity with using Microsoft Office Software, specifically Microsoft Excel. In this setting, students are expected to use high fidelity simulations, complete online course work based upon these simulations, and then complete a comprehensive exam to demonstrate skills learned with the real-world application. Guided by Kolb's experiential learning theory1, end of course surveys were implemented to investigate student self-efficacy, the adaptive transfer process, and students' perceived ability to successfully use this software for real world productivity outside of the classroom environment. Survey questions focused upon the student experience when working with simulation software and how using the software enabled them to use Microsoft Excel effectively. Survey results were correlated with course grades from preparation simulation activities and the final application exam. By gaining a better understanding of how students transfer knowledge from the simulated activity environment to the application environment, while capturing individual learning preferences, instructors will be able to better aid students to more effectively transition skills between different types of environments and create a more holistic learning environment that convert theoretical understanding into practical application. The lessons learned from this study will be used to inform the implementation of improved practices when the course is delivered the following term. [ABSTRACT FROM AUTHOR]
- Published
- 2015
16. Poll Everywhere! Even in the Classroom: An investigation into the impact of using PollEverywhere in a large-lecture classroom.
- Author
-
Kappers, Wendi M. and Cutler, Stephanie
- Subjects
- *
TEACHING methods research , *SOCIAL surveys , *STUDENT engagement , *STUDENT participation , *ACADEMIC motivation , *HIGHER education - Abstract
Over the past several years, there has been a call in higher education to move from traditional lecturing to a more active classroom. However, many faculty members face multiple challenges when attempting to make a large lecture (over 100 students) an active learning environment¹. One way researchers have suggested engaging a large lecture is through Concept Tests and Peer Instruction2, 3, which can require additional resources to be purchased by the students, such as electronic response systems or "clickers"4-6. This study will investigate the applicability of utilizing the free software PollEverywhere, which can be accessed using student cell phones (Text messages and Twitter) or personal laptop computers (www.pollev.com), as a potential method to improve student engagement by open-ended, reflective, multiple-choice, and content specific questions in a more efficient manner as perceived by students in a large-lecture classroom. The purpose of this study is to investigate the impact of implementing polling software (PollEverywhere) on student engagement in an introductory computer science large lecture classroom (n = 291). The ease of use of this technology can help with the adoption of this active learning strategy. Research needs to be done to measure the impact of this software. During the fall semester of 2013, a pilot study was completed in an introductory computing course for noncomputer science majors. During lecture, students were regularly asked to use the PollEverywhere software to respond to open-ended, reflective, multiple-choice, and content specific questions. At the end of the semester, students were asked to complete the survey to gauge if using the PollEverywhere software specifically changed their views of the course or about using response systems in the class. The results were generally positive with many of the students stating they enjoyed using PollEverywhere and felt more engaged when PollEverywhere was used. More students felt more engaged with the open-ended questions than with multiple choice questions. Being able to ask open-ended questions is a benefit of using PollEverywhere over a traditional clicker system as well. The pilot study results uncovered a number of supportive elements for using PollEverywhere which will be investigated further in the next stage of the study. [ABSTRACT FROM AUTHOR]
- Published
- 2014
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.