uri

Honeybrid method for network security in a software defined network system

This research introduces a hybrid honeypot architecture to bolster security within software-defined networks (SDNs). By combining low-interaction and high-interaction honeypots, the proposed solution effectively identifies and mitigates cyber threats, including port scanning and man-in-the-middle attacks. The architecture is structured into multiple modules that focus on detecting open ports using Vilhala honeypots and simulating targeted and random attack scenarios. This hybrid approach enables comprehensive monitoring and detailed packet-level analysis, providing enhanced protection against advanced online threats. The study also conducts a comparative analysis of different attack detection methods using tools like KFSensor and networking shell commands. The results highlight the hybrid honeypot system's efficacy in filtering malicious traffic and detecting security breaches, making it a robust solution for safeguarding SDNs.




uri

International Journal of Electronic Security and Digital Forensics




uri

An MCDM approach to compare different concepts of SMED to reduce the setup time in concrete products manufacturing: a case study

In the construction sector, moulding machines are crucial in producing concrete products, yet changing their mould can pose challenges for some businesses. This paper presents a case study aimed at reducing the setup time of HESS RH 600 moulding machine. Four alternatives are proposed and evaluated to achieve this goal. The first alternative involves converting internal to external activities, while the subsequent alternatives aim to improve the basic solution. These include building a canopy near the machine (alternative 2), installing an air reservoir (alternative 3), and a comprehensive approach involving building the canopy, installing the air reservoir, and adding a new forklift to facilitate the machine setup process (alternative 4). The analytic hierarchy process (AHP) heuristic method is used to select the best alternative solution based on prespecified criteria. It is found that the application of the single-minute exchange of die (SMED) solution without any further improvement is the most favourable.




uri

Effective inventory management among Malaysian SMEs in the manufacturing sector towards organisational performance

In several manufacturing firms, inventory constitutes most of the current assets, and this underscores the importance of inventory management as a fundamental issue for the majority of the firms irrespective of their sizes. Therefore, the purpose of this research is to assess the factors that influence the effectiveness of inventory management of Malaysian SMEs in the manufacturing sector. The study employs PLS-SEM technique to test the hypotheses. The main findings show that documentation and records, inventory control system and qualified personnel have positive effects on effective inventory management of Malaysian SMEs in the manufacturing sector. The study also reveals that effective inventory management has a mediating effect on the relationship between documentation and records, inventory control system, qualified personnel and organisational performance. Therefore, the study recommends that Malaysian SMEs in the manufacturing sector should improve their approaches to embracing effective inventory management practices in order to enhance organisational performance.




uri

Predicting green entrepreneurial intention among farmers using the theory of entrepreneurial events and institutional theory

Green entrepreneurial intention (GEI) in the agriculture sector signifies agricultural businesses' strong determination to embrace environmentally sustainable practices and innovative eco-friendly approaches. To understand farmers' GEI, the research applied theories of entrepreneurial events and institutional theory. A model was developed and empirically validated through structural equation modelling (SEM). A questionnaire survey was used to collect data from 211 farmers from the southern region of India. Findings revealed that perceived desirability, perceived feasibility, mimetic pressure, and entrepreneurial mindset positively influenced GEI. Entrepreneurial mindset played a mediating role in strengthening the farmers GEI. This study contributes to understanding GEI in agriculture and informs strategies for promoting sustainable farming practices.




uri

Measuring information quality and success in business intelligence and analytics: key dimensions and impacts

The phenomenon of cloud computing and related innovations such as Big Data have given rise to many fundamental changes that are evident in information and data. Managing, measuring and developing business value from the plethora of this new data has significant impact on many corporate agendas, particularly in relation to the successful implementation of business intelligence and analytics (BI&A). However, although the influence of Big Data has fundamentally changed the IT application landscape, the metrics for measuring success and in particular, the quality of information, have not evolved. The measurement of information quality and the antecedent factors that influence information has also been identified as an area that has suffered from a lack of research in recent decades. Given the rapid increase in data volume and the growth and ubiquitous use of BI&A systems in organisations, there is an urgent need for accurate metrics to identify information quality.




uri

COVID-19 disruptions driving sustainable tourism: a case of the Hawaiian tourism industry

This study inquires about the COVID-19-generated momentum and how it resulted in transformative opportunities for the hard-hit tourism industry in Hawai'i. It also investigates the type of sustainability-based management strategies that were favoured by actors from the industry to help navigate uncertain times and capture transformative opportunities. Findings indicate that actors from the tourism industry in Hawai'i perceived the COVID-19 pandemic as a huliau, or a point of transformation, to reflect and re-evaluate the tourism industry's responsibility and shift toward a recovery focused on sustainability. This research confirms that the pandemic-driven momentum accelerated opportunities for changing and transforming traditional business models and indicators of progress within the tourism industry in Hawai'i. Further research may explore additional Pacific Island countries to gain a deeper understanding of the problem within the region's context.




uri

Intellectual property management in technology management: a comprehensive bibliometric analysis during 2000-2022

Presently, there are many existing academic studies on the development, protection and operation of intellectual property management (IPM). Therefore, provides a comprehensive econometric analysis in order to provide scholars, with a clearer understanding of the evolution and development of IP management research during 2000 to 2022. The study is aiming to help scholars to better discern the expanding IPM research field from a multidimensional perspective. The database used for this analysis is the Web of Science Core Collection database. After retrieval through keywords and using a variety of tools such as CiteSpace, VOSviewer, Bibliometrix and HistCite, 1033 documents were refined to conduct the econometric analysis, and produce graphs. The findings indicate that the US is a highly active country/region in the field IP management research, and its expanding IP management research is branching out into other disciplines. The study also presents the future directions and possible challenges for IPM in technology management.




uri

Cognitive biases in decision making during the pandemic: insights and viewpoint from people's behaviour

In this article, we have attempted to study the ways in which the COVID-19 pandemic has gradually increased and impacted the world. The authors integrate the knowledge from cognitive psychology literature to illustrate how the limitations of the human mind might have a critical role in the decisions taken during the COVID-19 pandemic. The authors show the correlation between different biases in various contexts involved in the COVID-19 pandemic and highlight the ways in which we can nudge ourselves and various stakeholders involved in the decision-making process. This study uses a typology of biases to examine how different patterns of biases affect the decision-making behaviour of people during the pandemic. The presented model investigates the potential interrelations among environmental transformations, cognitive biases, and strategic decisions. By referring to cognitive biases, our model also helps to understand why the same performance improvement practices might incite different opinions among decision-makers.




uri

Location-Oriented Knowledge Management in a Tourism Context: Connecting Virtual Communities to Physical Locations




uri

Information Security Management: A Research Project




uri

Manufacturing Organizational Memory: Logged Conversation Thread Analysis




uri

Restructuring an Undergraduate Database Management Course for Business Students




uri

Biases and Heuristics in Judgment and Decision Making: The Dark Side of Tacit Knowledge




uri

An Assessment of Software Project Management Maturity in Mauritius




uri

A Perspective on Achieving Information Security Awareness




uri

Computer Network Simulation and Network Security Auditing in a Spatial Context of an Organization




uri

Online Securities Trading in China




uri

An Information Assurance and Security Curriculum Implementation




uri

E-learning: Incorporating Information Security Governance




uri

Role of Perceived Importance of Information Security: An Exploratory Study of Middle School Children’s Information Security Behavior




uri

Honeypot through Web (Honeyd@WEB): The Emerging of Security Application Integration 




uri

Framing the Corporate Security Problem: The Ecology of Security




uri

Intelligent System for Information Security Management: Architecture and Design




uri

The Social Cost of the Integration of Information and Communication Technologies, Information, Education, and Communication on the Young of the Republic of Mauritius




uri

Lean Supply Chains, JIT and Cellular Manufacturing – The Human Side




uri

Improving Information Security Risk Analysis Practices for Small- and Medium-Sized Enterprises:  A Research Agenda




uri

A Framework for Information Security Management Based on Guiding Standards: A United States Perspective




uri

SMS Based Wireless Home Appliance Control System (HACS) for Automating Appliances and Security




uri

Capturing the Mature Traveler: Assessing Web First Impressions




uri

Securing Control Signaling in Mobile IPv6 with Identity-Based Encryption




uri

An Interactive E-Learning Tool for Kids in Mauritius




uri

A Radio Frequency Identification (RFID) Container Tracking System for Port Louis Harbor: The Case of Mauritius




uri

Routing Security in Mobile Ad-hoc Networks




uri

Measuring up to ICT Teaching and Learning Standards




uri

A Packet Sniffer (PSniffer) Application for Network Security in Java




uri

Securing the Information and Communications Technology Global Supply Chain from Exploitation: Developing a Strategy for Education, Training, and Awareness




uri

Information Security in Education: Are We Continually Improving?

This paper will shed light on the lack of the development of appropriate monitoring systems in the field of education. Test banks can be easily purchased. Smart phones can take and share pictures of exams. A video of an exam given through Blackboard can easily be made. A survey to determine the extent of cheating using technology was given to several university students. Evidence is provided that shows security is lacking as evidenced by the number of students who have made use of technological advances to cheat on exams. The findings and conclusion may serve as evidence for administrators and policy makers to re-assess efforts being made to increase security in online testing.




uri

CAPTCHA – Security affecting User Experience

CAPTCHA - Completely Automated Public Turing test to tell Computers and Humans Apart - is a test with the aim to distinguish between malicious automatic software and real users in the era of Cyber security threats. Various types of CAPTCHA tests were developed, in order to address accessibility while implementing security. This research focuses on the users’ attitudes and experiences related to use of the different kinds of tests. A questionnaire accompanied by experiencing five different CAPTCHA tests was performed among 212 users. Response times for each test and rate of success were collected automatically. The findings demonstrate that none of the existing tests are ideal. Although the participants were familiar with the Text-based test, they found it the most frustrating and non-enjoyable. Half of the participants failed in the Arithmetic-based test. While most of the participants found the picture and game based test enjoyable, their response time for those tests was the largest. The age factor was encountered as influencing both the attitude of the user and the performance, while younger users are more tolerant, have a better success rate, and are faster, the elder users found the tests annoying and time-consuming.




uri

Innovating and Entrepreneurial Initiatives: Some Cases of Success

Aim/Purpose: To understand the change of entrepreneurial initiatives by analysing some new initiatives that came up the last years based on IT enabled business models Background: The theme is described from an educational perspective by offering examples of successful entrepreneurship initiatives Methodology: Description of some cases: Waynabox, Lock up, Uber, Pinterest Contribution: This project tries to become a guide for youth in order to understand various aspects: first, the entrepreneurial aspects that have to be considered before starting a business; secondly, the characteristics that successful businesses have in common; and finally how an entrepreneur can be innovative and how they can achieve the success Findings: Only the 10% of the start-ups exist more than three years. Among the causes of failure are the high saturation of the market and the market competition, which are connected to the ignorance of the real necessity of customers. The company has to identify the needs of customers. They have to define and target their customers by observing and analyzing the market and, above all, getting in touch with the customers. The business plan is something that has to be carried out before the beginning of the project, and has to exist on paper. Everything has to be planned and organised, and the objectives have to be clearly stated in order to stay focused Recommendations for Practitioners : To use existent business models as an inspiration for the creation of a new business model. It is really important to avoid copying the business model itself. One thing that a company needs to do is to make the difference offering new characteristics adapted to the current customer’s experiences Recommendation for Researchers: It is really important to have a good relation with the customer, to attend their needs and to help them with all the doubts that they can have about the company. An entrepreneur cannot be guided by his own interests. He has to invest in order to know the needs of the potential customers Impact on Society : Customer experience is key to have success in new business models




uri

The Role of Informing Systems in Securing Sanity and Wisdom of the Globalizing Society in the Context of Civilization Sustainability in the 21st Century: The Case of Poland

Aim/Purpose: To monitor Sustainability Development Goals (SDG) established by the United Nations through the hierarchical architecture of informing systems Background: The paper discusses the case of Poland and its Gdansk region Contribution: The solution combines the big-picture of civilization with small-picture of a nation, regions, cities, and firms Findings: The presented solution can be implemented if the political will can be secured. Recommendations for Practitioners: Take the main idea of this paper and adapt to your local case. Recommendation for Researchers: Develop some prototypes of presented informing systems and test in your local environment Impact on Society: The success of the sustainability of globalizing society can be secured if the coherent informing systems can be applied to the planning, monitoring, and implementation of the UN's universal SDG. Future Research: Work on the modeling of costs and benefits of the presented solution.




uri

Medical Image Security Using Quantum Cryptography

Aim/Purpose: Medical images are very sensitive data that can be transferred to medical laboratories, professionals, and specialist for referral cases or consultation. Strict security measures must be utilized to keep these data secured in computer networks when transferred to another party. On a daily basis, unauthorized users derive ways to gain access to sensitive patient medical information. Background: One of the best ways to which medical image could be kept secured is through the use of quantum cryptography Methodology : Applying the principles of quantum mechanics to cryptography has led to a remarkable new dimension in secured network communication infrastructure. This enables two legitimate users to produce a shared secret random bit string, which can be used as a key in cryptographic applications, such as message encryption and authentication. Contribution: This paper can make it possible for the healthcare and medical professions to construct cryptographic communication systems to keep patients’ transferred data safe and secured. Findings: This work has been able to provide a way for two authorized users who are in different locations to securely establish a secret network key and to detect if eavesdropping (a fraudulent or disruption in the network) has occurred Recommendations for Practitioners: This security mechanism is recommended for healthcare providers and practitioners to ensure the privacy of patients’ medical information. Recommendation for Researchers: This paper opens a new chapter in secured medical records Impact on Society Quantum key distribution promises network security based on the fundamental laws of quantum mechanics by solving the problems of secret-key cryptography . Future Research: The use of post-quantum cryptography can be further researched.




uri

Distance Learning During the COVID-19 Crisis as Perceived by Preservice Teachers

Aim/Purpose: This study examined learning during the COVID-19 crisis, as perceived by preservice teachers at the time of their academic studies and their student teaching experience. Background: The COVID-19 crisis is unexpected. On one hand, it disrupted learning in all learning frameworks, on the other, it may create a change in learning characteristics even after the end of the crisis. This study examined the pro-ductive, challenging, and thwarting factors that preservice teachers encountered during their studies and in the course of their student teaching during the COVID-19 period, from the perspective of preservice teachers. Methodology: The study involved 287 students studying at teacher training institutions in Israel. The preservice teachers were studying online, and in addition experienced online teaching of students in schools, guided by their own teacher. The study used a mixed method. The questionnaire included closed and open questions. The data were collected in 2020. Contribution: Identifying the affecting factors may deepen the understanding of online learning/teaching and assist in the optimal implementation of online learning. Findings: Online learning experience. We found that some of the lessons at institutions of higher learning were delivered in the format of online lectures. Many pre-service teachers had difficulty sitting in front of a computer for many hours—“Zoom fatigue.” Preservice teachers who had difficulty self-regulating and self-mobilizing for study, experienced accumulating loads, which caused them feelings of stress and anxiety. The word count indicated that the words that appeared most often were “load” and “stress.” Some preservice teachers wrote that collaborating in forums with others made it easier for them. Some suggested diversifying by digital means, incorporating asynchronous units and illustrative films, and easing up on online lectures, as a substitute for face-to-face lectures. Online teaching experience in schools. The preservice teachers' descriptions show that in lessons taught in the format of lectures and communication of content, there were discipline problems and non-learning. According to the preservice teachers, discipline problems stemmed from difficulties concentrating, physical distance, load, and failure to address the students' difficulties. Recommendations for Practitioners: In choosing schools for student teaching, it is recommended to reach an understanding with the school about the online learning policy and organization. It is important to hold synchronous sessions in small groups of 5 to 10 students. The sessions should focus on the mental wellbeing of the students, and on the acquisition of knowledge and skills. Students should be prepared for participation in asynchronous digital lessons, which should be produced by professionals. It should be remembered that the change of medium from face-to-face to online learning also changes the familiar learning environment for all parties and requires modifying the ways of teaching. Recommendations for Researchers: A change in the learning medium also requires a change in the definition of objectives and goals expected of each party—students, teachers, and parents. All parties must learn to view online learning as a method that enables empowerment and the application of 21st century skills. Impact on Society: Teachers' ability to deploy 21st century skills in an online environment de-pends largely on their experience, knowledge, skills, and attitude toward these skills. Future Research: This study examined the issue from the perspective of preservice teachers. It is recommended to examine it also from the perspective of teachers and students.




uri

An Empirical Examination of the Effects of CTO Leadership on the Alignment of the Governance of Big Data and Information Security Risk Management Effectiveness

Aim/Purpose: Board of Directors seek to use their big data as a competitive advantage. Still, scholars note the complexities of corporate governance in practice related to information security risk management (ISRM) effectiveness. Background: While the interest in ISRM and its relationship to organizational success has grown, the scholarly literature is unclear about the effects of Chief Technology Officers (CTOs) leadership styles, the alignment of the governance of big data, and ISRM effectiveness in organizations in the West-ern United States. Methodology: The research method selected for this study was a quantitative, correlational research design. Data from 139 participant survey responses from Chief Technology Officers (CTOs) in the Western United States were analyzed using 3 regression models to test for mediation following Baron and Kenny’s methodology. Contribution: Previous scholarship has established the importance of leadership styles, big data governance, and ISRM effectiveness, but not in a combined understanding of the relationship between all three variables. The researchers’ primary objective was to contribute valuable knowledge to the practical field of computer science by empirically validating the relationships between the CTOs leadership styles, the alignment of the governance of big data, and ISRM effectiveness. Findings: The results of the first regression model between CTOs leadership styles and ISRM effectiveness were statistically significant. The second regression model results between CTOs leadership styles and the alignment of the governance of big data were not statistically significant. The results of the third regression model between CTOs leadership styles, the alignment of the governance of big data, and ISRM effectiveness were statistically significant. The alignment of the governance of big data was a significant predictor in the model. At the same time, the predictive strength of all 3 CTOs leadership styles was diminished between the first regression model and the third regression model. The regression models indicated that the alignment of the governance of big data was a partial mediator of the relationship between CTOs leadership styles and ISRM effectiveness. Recommendations for Practitioners: With big data growing at an exponential rate, this research may be useful in helping other practitioners think about how to test mediation with other interconnected variables related to the alignment of the governance of big data. Overall, the alignment of governance of big data being a partial mediator of the relationship between CTOs leadership styles and ISRM effectiveness suggests the significant role that the alignment of the governance of big data plays within an organization. Recommendations for Researchers: While this exact study has not been previously conducted with these three variables with CTOs in the Western United States, overall, these results are in agreement with the literature that information security governance does not significantly mediate the relationship between IT leadership styles and ISRM. However, some of the overall findings did vary from the literature, including the predictive relationship between transactional leadership and ISRM effectiveness. With the finding of partial mediation indicated in this study, this also suggests that the alignment of the governance of big data provides a partial intervention between CTOs leadership styles and ISRM effectiveness. Impact on Society: Big data breaches are increasing year after year, exposing sensitive information that can lead to harm to citizens. This study supports the broader scholarly consensus that to achieve ISRM effectiveness, better alignment of governance policies is essential. This research highlights the importance of higher-level governance as it relates to ISRM effectiveness, implying that ineffective governance could negatively impact both leadership and ISRM effectiveness, which could potentially cause reputational harm. Future Research: This study raised questions about CTO leadership styles, the specific governance structures involved related to the alignment of big data and ISRM effectiveness. While the research around these variables independently is mature, there is an overall lack of mediation studies as it relates to the impact of the alignment of the governance of big data. With the lack of alignment around a universal framework, evolving frameworks could be tested in future research to see if similar results are obtained.




uri

Mandatory Gamified Security Awareness Training Impacts on Texas Public Middle School Students: A Qualitative Study

Aim/Purpose. The problem statement in the proposed study focuses on that, despite the growing recognition that teenagers need to undergo security awareness training, little is known about the impacts security training experts believe implementing a mandatory gamified security awareness training curriculum in public middle schools will have on the long-term security behavior of students in Texas. Background. This study was guided by the research question: What are the impacts security training experts believe implementing a mandatory gamified security aware-ness training curriculum in public middle schools will have on the long-term security behaviors of students in Texas? The study gathers opinions from experts on the impacts of security awareness training on students. Methodology. Our research used semi-structured interviews with twelve experts chosen through the use of purposive sampling. The population for the study consisted of experts in the fields of security awareness training for and teaching middle school-aged children. Candidates were recruited through the Cyber-Texas Foundation and snowball sampling techniques. Contribution. The research contributed to the body of knowledge by using interviews to explore the impacts of security awareness training on middle school students based on the opinions and views of the teachers and instructors who work with middle school students. Findings. The findings of this study demonstrate that middle school is an ideal time to provide cybersecurity training and will impact student behaviors by making them more conscious of cyber threats and preparing them to be more tech-savvy professionals. The research also showed that well-designed cybersecurity games with real-world application combined with traditional teaching techniques can help students develop positive habits. The research also suggests that teachers possess the skills to teach cybersecurity classes and the classes can be integrated into the current school day without the need for any significant changes to existing daily schedules. Recommendations for Practitioners. A well-design gamification-based curriculum implemented in Texas Middle Schools, combined with traditional teaching techniques and repeated over an extended time period, will impact students’ behaviors by making them more able to recognize and respond to cyber risks and will transform them into more secure and tech-savvy members of society. Recommendations for Researchers. The research shows middle school instructors and technology experts believe the implementation of a security awareness training program in middle schools is both possible and practical, while also beneficial to the students. The recommendation is to encourage researchers to explore ways to build curricula and games capable of appealing to students and implementing the instruction into school programs. Impact on Society. Demonstrating that training provided in middle school will make lasting impacts and improvements to student behaviors benefits children and their families in the short-term and workplaces in the long-term. The development of a more security-conscious workforce can reduce the significant number of data breaches and cyber attacks resulting from the poor security habits of companies’ users. Future Research. Future research that will add significant value to the body of knowledge includes testing the effectiveness of habit-shaping games to determine whether existing long-term games maintain student interest. Qualitative studies could interview parents of teenagers using habit-shaping games to determine the effectiveness of the applications. Another qualitative study could interview teachers to determine how teachers’ ages affect their comfort level teaching technology classes. Both studies could provide valuable insights into how to implement security awareness training in schools.




uri

Pedagogical Training During the COVID-19 Epidemic and Its Two Tracks: Remote and Face-To-Face

Aim/Purpose. The study aimed to examine the remote and face-to-face experience of pedagogical training in kindergarten after the third COVID-19 closure in Israel. Background. The outbreak of the COVID-19 epidemic in 2020 changed the training system, and preservice teachers were required to have their practical experience in the kindergartens both remotely and face-to-face. They had to adapt to the new requirements of teacher training programs and receive professional coaching and support from the pedagogical instructor remotely. Methodology. The sample comprised 26 early childhood preservice teachers, who received academic training that includes proficiency in digital technology. The data were collected through feedback that they wrote themselves during the training period and analyzed in the interpretive approach. Contribution. The contribution of the present study is that it examines the pedagogical coaching from the perspective of preservice teachers in a kindergarten during the COVID-19 epidemic, which forced a transition from face-to-face to remote pedagogical training, then back to face-to-face pedagogical instruction. To the best of my knowledge, no such study has been carried out to date, which makes it unique. Findings. The main findings indicate the dissatisfaction of most preservice kindergarten teachers with the remote pedagogical training (about 85%) at the physical, emotional, technological, and pedagogical levels, and the satisfaction of most preservice kindergarten teachers with face-to-face pedagogical training (about 92%) at the physical, emotional, and pedagogical levels. The main conclusion is that technology is a potential barrier in training, and that preservice kindergarten teachers need a pedagogical instructor present at a professional face-to-face meeting. Recommendations for Practitioners. The findings of the study show how important in-person learning and engagement is for everyone especially for Preservice teachers’ and may be helpful for pedagogical coaching teams. Recommendations for Researchers. Preservice teachers’ awareness of the pedagogical coaching experiences could persuade the coaching teams to avoid potential difficulties, increase emotional support, and refine the use of technology to make it a closer substitute for frontal communication. Impact on Society. Face-to-face training based on interpersonal relationship, allows to develop better during the training period.




uri

Gamified Cybersecurity Education Through the Lens of the Information Search Process: An Exploratory Study of Capture-the-Flag Competitions [Research-in-Progress]

Aim/Purpose. Capture the Flag (CTF) challenges are a popular form of cybersecurity education where students solve hands-on tasks in a game-like setting. These exercises provide learning experiences with various specific technologies and subjects, as well as a broader understanding of cybersecurity topics. Competitions reinforce and teach problem-solving skills that are applicable in various technical and non-technical environments outside of the competitions. Background. The Information Search Process (ISP) is a framework developed to under-stand the process by which an individual goes about studying a topic, identifying emotional ties connected to each step an individual takes. As the individual goes through the problem-solving process, there is a clear flow from uncertainty to clarity; the individual’s feelings, thoughts, and actions are all interconnected. This study aims to investigate the learning of cybersecurity concepts within the framework of the ISP, specifically in the context of CTF competitions. Methodology. A comprehensive research methodology designed to incorporate quantitative and qualitative analyses to draw the parallels between the participants’ emotional experiences and the affective dimensions of learning will be implemented to measure the three primary goals. Contribution. This study contributes significantly to the broader landscape of cybersecurity education and cognitive-emotional experiences in problem-solving. Findings. The study has three primary goals. First, we seek to enhance our under-standing of the emotional and intellectual aspects involved in problem-solving, as demonstrated by the ISP approach. Second, we aim to gain in-sights into how the presentation of CTF challenges influences the learning experience of participants. Lastly, we strive to contribute to the improvement of cybersecurity education by identifying actionable steps for more effective teaching of technical skills and approaches. Recommendations for Practitioners. Competitions reinforce and teach problem-solving skills applicable in various technical and non-technical environments outside of the competitions. Recommendations for Researchers. The Information Search Process (ISP) framework may enhance our understanding of the emotional and intellectual aspects involved in problem-solving as we study the emotional ties connected to each step an individual takes as the individual goes through the problem-solving process. Impact on Society. Our pursuit of advancing our understanding of cybersecurity education will better equip future generations with the skills and knowledge needed to ad-dress the evolving challenges of the digital landscape. This will better pre-pare them for real-world challenges. Future Research. Future studies would include the development of a cybersecurity curriculum on vulnerability exploitation and defense. It would include practice exploiting practical web and binary vulnerabilities, reverse engineering, system hardening, security operations, and understanding how they can be chained together.




uri

A Methodology for Increasing Business Process Maturity in Public Sector




uri

An Evolutionary Software Project Management Maturity Model for Mauritius




uri

Designing an ‘Electronic Village’ of Local Interest on Tourism: The eKoNES Framework