Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Old Dominion University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 16924

Full-Text Articles in Entire DC Network

Boring But Demanding: Using Secondary Tasks To Counter The Driver Vigilance Decrement For Partially Automated Driving, Scott Mishler, Jing Chen Jun 2024

Boring But Demanding: Using Secondary Tasks To Counter The Driver Vigilance Decrement For Partially Automated Driving, Scott Mishler, Jing Chen

Psychology Faculty Publications

Objective

We investigated secondary–task–based countermeasures to the vigilance decrement during a simulated partially automated driving (PAD) task, with the goal of understanding the underlying mechanism of the vigilance decrement and maintaining driver vigilance in PAD.

Background

Partial driving automation requires a human driver to monitor the roadway, but humans are notoriously bad at monitoring tasks over long periods of time, demonstrating the vigilance decrement in such tasks. The overload explanations of the vigilance decrement predict the decrement to be worse with added secondary tasks due to increased task demands and depleted attentional resources, whereas the underload explanations predict the vigilance …


Investors' Reactions To Alliance-Engendered Acquisition Ambiguity: Evidence From Us Technology Deals, Panos Desyllas, Martin C. Goossen, Corey C. Phelps Jun 2024

Investors' Reactions To Alliance-Engendered Acquisition Ambiguity: Evidence From Us Technology Deals, Panos Desyllas, Martin C. Goossen, Corey C. Phelps

Management Faculty Publications

We study how, when target firms are engaged in strategic alliances, the ambiguity surrounding an acquisition's anticipated synergies influences investors' reactions to announcements of acquisitions. Drawing on behavioural finance research and the resource redeployment literature, we predict that investors' limited access to the information encoded in the target firms' alliances and the uncertainty around the re-deployability of their embedded resources generate a negative relationship between the number of target alliances and investors' reactions. We also hypothesize that this negative effect is exacerbated when the alliances involve foreign alliance partners but is attenuated when acquirers are experienced in acquiring targets with …


The Activist Corner - Ecojustice Insights From The Field, Coralie Boulard, Lucas Zabotin May 2024

The Activist Corner - Ecojustice Insights From The Field, Coralie Boulard, Lucas Zabotin

Green Humanities: A Journal of Ecological Thought in Literature, Philosophy & the Arts

No abstract provided.


The Artist Corner, Vijali Hamilton May 2024

The Artist Corner, Vijali Hamilton

Green Humanities: A Journal of Ecological Thought in Literature, Philosophy & the Arts

No abstract provided.


Melissa Tuckey, Melissa Tuckey May 2024

Melissa Tuckey, Melissa Tuckey

Green Humanities: A Journal of Ecological Thought in Literature, Philosophy & the Arts

No abstract provided.


Sequence, Cole Swensen May 2024

Sequence, Cole Swensen

Green Humanities: A Journal of Ecological Thought in Literature, Philosophy & the Arts

No abstract provided.


The Continual Emergence / Of Suppressed Histories, Linda Russo May 2024

The Continual Emergence / Of Suppressed Histories, Linda Russo

Green Humanities: A Journal of Ecological Thought in Literature, Philosophy & the Arts

N/A


In The Doha International Airport, A Forest, Paulina Bianca Ocampo May 2024

In The Doha International Airport, A Forest, Paulina Bianca Ocampo

Green Humanities: A Journal of Ecological Thought in Literature, Philosophy & the Arts

In the Doha International Airport, a forest calls is a poem about a culture of deep ecology in a context of coloniality, brain drain, and my own part in it. Despite over 300 years of colonization in the Philippines and the colonization of our own education system, a certain deep ecology continues to thrive in the belief of spirits in nature. Among Filipinos, even in the thick of the Anthropocene, a sense of respect and fear for nature continues to exist. It is common, for example, for Filipinos to ask these spirits for permission to pass through forested areas. However, …


Salt: A Tribute To Ghana's Fishers, Vanessa F. Jaiteh May 2024

Salt: A Tribute To Ghana's Fishers, Vanessa F. Jaiteh

Green Humanities: A Journal of Ecological Thought in Literature, Philosophy & the Arts

This poem is a tribute to my fieldwork on fisher safety, labour abuses and human rights violations in Ghana’s fisheries.


Dear Little Activist Heart, Lilith Kuhn May 2024

Dear Little Activist Heart, Lilith Kuhn

Green Humanities: A Journal of Ecological Thought in Literature, Philosophy & the Arts

No abstract provided.


"Drone," "Attempting To Persuade The Musk Ox You Are Not Unlike Not A Threat Not Other", Elizabeth Bradfield May 2024

"Drone," "Attempting To Persuade The Musk Ox You Are Not Unlike Not A Threat Not Other", Elizabeth Bradfield

Green Humanities: A Journal of Ecological Thought in Literature, Philosophy & the Arts

No abstract provided.


Imaginative Acts, Environmental Futurity: Re-Envisioning The Heroic White Male Savior In Snowpiercer, Michelle Yates May 2024

Imaginative Acts, Environmental Futurity: Re-Envisioning The Heroic White Male Savior In Snowpiercer, Michelle Yates

Green Humanities: A Journal of Ecological Thought in Literature, Philosophy & the Arts

In contrast to many Hollywood climate fiction films, Snowpiercer (2013) offers a more complex representation of the white male savior. In contrast to films like WALL-E (2008) and Interstellar (2014) that recuperate and invest in white masculine privilege, Snowpiercer highlights the more destructive aspects of a patriarchal capitalist system that privileges hegemonic white masculinity. While the ending of Snowpiercer may seem bleak, it also points to the possibility of a new system, an environmental futurity that centers indigenous knowledge and the experiences of women and people of color. Though Snowpiercer is not formally an American film, its casting of recognizable …


Diverse Voices, Sticky Maps And Wicked Patterns. Using Creative Methods To Explore Environmental Justice, Clare Saunders, Daksha Patel May 2024

Diverse Voices, Sticky Maps And Wicked Patterns. Using Creative Methods To Explore Environmental Justice, Clare Saunders, Daksha Patel

Green Humanities: A Journal of Ecological Thought in Literature, Philosophy & the Arts

Environmental justice is multi-faceted. It is distributional, procedural and context inter-dependent. Achieving environmental justice therefore requires transdisciplinary thinking and collaborative practice with participants holding a variety of experiences and knowledges. This paper explores the different meanings of environmental justice in theory, and through artistic practices. It introduces and evaluates a series of creative workshops designed to enhance understanding of environmental justice. The workshops consisted of 1) image-informed co-created cross-national Zoom conversations; 2) using colours and shapes to tease out meanings of environmental justice; and 3) mapping local environmental injustices while centring more-than-humans. It proposes that these creative methods are useful …


Powering Justice: Sketches For A New Ethos In Energy Policy, Erin Rizzato Devlin May 2024

Powering Justice: Sketches For A New Ethos In Energy Policy, Erin Rizzato Devlin

Green Humanities: A Journal of Ecological Thought in Literature, Philosophy & the Arts

Energy politics lie at the heart of human activity. In a time of ecological and energy crisis, it is fundamental to realise that our reality systems are always open to change and that, in order to respond to the challenges of a changing energy landscape, we must explore the full possibilities of technology in a radical way. This research aims to consider the ethical implications of energy and technology, presenting an urgent case for cosmotechnical pluralism, that is the diversification of world-views, knowledges, technologies in the pursuit of energy justice in global politics. To reconstruct the world and its politics …


Notes On Contributors May 2024

Notes On Contributors

Green Humanities: A Journal of Ecological Thought in Literature, Philosophy & the Arts

No abstract provided.


Editors' Note May 2024

Editors' Note

Green Humanities: A Journal of Ecological Thought in Literature, Philosophy & the Arts

No abstract provided.


Cover - Green Humanities, Vol. 4, 2024 May 2024

Cover - Green Humanities, Vol. 4, 2024

Green Humanities: A Journal of Ecological Thought in Literature, Philosophy & the Arts

No abstract provided.


Exploring The Intersection Of Sexual Identity And Route Of Administration In Relation To Cannabis Use Among Young Adult Females, Sarah J. Ehlke, Samantha A. Fitzer, Jennifer L. Shipley, Abby L. Braitman May 2024

Exploring The Intersection Of Sexual Identity And Route Of Administration In Relation To Cannabis Use Among Young Adult Females, Sarah J. Ehlke, Samantha A. Fitzer, Jennifer L. Shipley, Abby L. Braitman

Psychology Faculty Publications

Background and Objective: Rates of cannabis use continue to increase with sexual minority women (SMW) reporting greater use than heterosexual women. Along with these increasing trends, the routes of administration (ROA) for cannabis are evolving. The current study examined associations between cannabis ROA and frequency of use, as well as differences across sexual identity (heterosexual vs. SMW).

Methods: Participants were 949 young adult (18–25 years old) women (29.8% SMW) who reported past month cannabis use and were recruited through Amazon Mechanical Turk. Number of cannabis use days and each ROA used (joint, pipe, blunt, bong, vape, edible, and ointment) in …


A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka Apr 2024

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka

Cybersecurity Undergraduate Research Showcase

The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …


The Vulnerabilities Of Artificial Intelligence Models And Potential Defenses, Felix Iov Apr 2024

The Vulnerabilities Of Artificial Intelligence Models And Potential Defenses, Felix Iov

Cybersecurity Undergraduate Research Showcase

The rapid integration of artificial intelligence (AI) into various commercial products has raised concerns about the security risks posed by adversarial attacks. These attacks manipulate input data to disrupt the functioning of AI models, potentially leading to severe consequences such as self-driving car crashes, financial losses, or data breaches. We will explore neural networks, their weaknesses, and potential defenses. We will discuss adversarial attacks including data poisoning, backdoor attacks, evasion attacks, and prompt injection. Then, we will explore defense strategies such as data protection, input sanitization, and adversarial training. By understanding how adversarial attacks work and the defenses against them, …


Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson Apr 2024

Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson

Cybersecurity Undergraduate Research Showcase

This paper explores the potential integration of predictive analytics AI into the United States Coast Guard's (USCG) Search and Rescue Optimal Planning System (SAROPS) for deep sea and nearshore search and rescue (SAR) operations. It begins by elucidating the concept of predictive analytics AI and its relevance in military applications, particularly in enhancing SAR procedures. The current state of SAROPS and its challenges, including complexity and accuracy issues, are outlined. By integrating predictive analytics AI into SAROPS, the paper argues for streamlined operations, reduced training burdens, and improved accuracy in locating drowning personnel. Drawing on insights from military AI applications …


Data Profits Vs. Privacy Rights: Ethical Concerns In Data Commerce, Amiah Armstrong Apr 2024

Data Profits Vs. Privacy Rights: Ethical Concerns In Data Commerce, Amiah Armstrong

Cybersecurity Undergraduate Research Showcase

In today’s digital age, the collection and sale of customer data for advertising is gaining a growing number of ethical concerns. The act of amassing extensive datasets encompassing customer preferences, behaviors, and personal information raises questions of its true purpose. It is widely acknowledged that companies track and store their customer’s digital activities under the pretext of benefiting the customer, but at what cost? Are users aware of how much of their data is being collected? Do they understand the trade-off between personalized services and the potential invasion of their privacy? This paper aims to show the advantages and disadvantages …


A Case Study Of The Crashoverride Malware, Its Effects And Possible Countermeasures, Samuel Rector Apr 2024

A Case Study Of The Crashoverride Malware, Its Effects And Possible Countermeasures, Samuel Rector

Cybersecurity Undergraduate Research Showcase

CRASHOVERRIDE is a modular malware tailor-made for electric grid Industrial Control System (ICS) equipment and was deployed by a group named ELECTRUM in a Ukrainian substation. The malware would launch a protocol exploit to flip breakers and would then wipe the system of ICS files. Finally, it would execute a Denial Of Service (DOS) attack on protective relays. In effect, months of damage and thousands out of power. However, due to oversights the malware only caused a brief power outage. Though the implications of the malware are cause for researching and implementing countermeasures against others to come. The CISA recommends …


Investigating Vulnerabilities In The Bluetooth Host Layer In Linux, Jack Dibari Apr 2024

Investigating Vulnerabilities In The Bluetooth Host Layer In Linux, Jack Dibari

Cybersecurity Undergraduate Research Showcase

This paper investigates vulnerabilities within the Bluetooth host layer in Linux systems. It examines the Bluetooth protocol's evolution, focusing on its implementation in Linux, particularly through the BlueZ host software. Various vulnerabilities, including BleedingTooth, BLESA, and SweynTooth, are analyzed.


Profiling Cybercriminals: Behavioral Analysis And Motivations Behind Cybercrime Activities, A'Shya Latrice Reynolds Apr 2024

Profiling Cybercriminals: Behavioral Analysis And Motivations Behind Cybercrime Activities, A'Shya Latrice Reynolds

Cybersecurity Undergraduate Research Showcase

The study of cybercriminal behavior and motivations is crucial for understanding and combating the evolving landscape of digital crime. This paper delves into the intricate realm of cybercrime profiling, employing a multidisciplinary approach to dissect the behavioral patterns and underlying motivations of cybercriminals. Drawing from psychology, sociology, and criminology, the research examines the intricate interplay of individual traits, social dynamics, and technological factors that shape cybercriminal activities.

Through analysis of case studies and research, this paper uncovers the diverse range of motivations driving individuals towards engaging in cybercrime. From financial gain and ideological extremism to thrill-seeking and revenge, cybercriminals exhibit …


High-Resolution And Quality Settings With Latent Consistency Models, Steven Chen, Junrui Zhang, Rui Ning Apr 2024

High-Resolution And Quality Settings With Latent Consistency Models, Steven Chen, Junrui Zhang, Rui Ning

Cybersecurity Undergraduate Research Showcase

Diffusion Models have become powerful generative models which is capable of synthesizing high-quality images across various domains. This paper explores Stable Diffusion and mostly focuses on Latent Diffusion Models. Latent Consistency Models can enhance the inference with minimal iterations. It demonstrates the performance in image in-painting and class-conditional synthesis tasks. Throughout the experiment different datasets and parameter configurations, the paper highlights the image quality, processing time, and parameter. It also discussed the future directions including adding trigger-based implementation and emotional-based themes to replace the prompt.


What Students Have To Say On Data Privacy For Educational Technology, Stephanie Choi Apr 2024

What Students Have To Say On Data Privacy For Educational Technology, Stephanie Choi

Cybersecurity Undergraduate Research Showcase

The literature on data privacy in terms of educational technology is a growing area of study. The perspective of educators has been captured extensively. However, the literature on students’ perspectives is missing, which is what we explore in this paper. We use a pragmatic qualitative approach with an experiential lens to capture students’ attitudes towards data privacy in terms of educational technology. We identified preliminary, common themes that appeared in the survey responses. The paper concludes by calling for more research on how students perceive data privacy in terms of educational technology.


The Security Of Deep Neural Networks, Jalaya Allen Apr 2024

The Security Of Deep Neural Networks, Jalaya Allen

Cybersecurity Undergraduate Research Showcase

Our society has transitioned from our primitive lifestyle to soon, an increasingly automatic one. That idea is further exemplified as we shift into an AI era, better known as Artificial intelligence. Artificial Intelligence is classified as computer systems that can perform tasks that typically require human intelligence. However, a common thought or question that most might have is, how is this done? How does AI process information the way we want it to and have access to so much information? AI is trained by systems called AI models. These modeling programs are trained on data to recognize patterns or make …


The Ethical And Legal Implications Of Iot Data In Business Organizations, Kennedy Bellamy Apr 2024

The Ethical And Legal Implications Of Iot Data In Business Organizations, Kennedy Bellamy

Cybersecurity Undergraduate Research Showcase

The Internet of Things (IoT) has transformed how our day to day lives by implementing and evolving technology that allows data to be exchanged between interconnected devices without the need for human involvement. This paper investigates the implications of IoT expansion and development in corporate organizations, focusing on both the opportunities and challenges it brings. IoT encompasses a wide range of data kinds, from sensor readings to user interactions, across industries such as manufacturing, healthcare, and retail. However, greater connection raises ethical and legal challenges, especially over data privacy, ownership, and control. Potential breaches of privacy and illegal data access …


Analyzing The Role Of Cybersecurity In Correctional Facilities, Jaysia I. Leeheung Apr 2024

Analyzing The Role Of Cybersecurity In Correctional Facilities, Jaysia I. Leeheung

Cybersecurity Undergraduate Research Showcase

In recent years, the use of technology has evolved in correctional facilities which may result in more vulnerabilities in correctional facilities systems. This study analyzes the types of security measures used in correctional facilities to stop cyber attacks such as firewalls, artificial intelligence, and facial recognition systems. The analysis also examines new challenges correctional facilities may face in cyber security and prevention strategies that will enhance cyber protection in correctional facilities. Additionally, this analysis compares the implementation of cyber security methods between jails and prisons.