Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Business

Informing Responders Using Gis And Gps, Deidre Mccarthy Oct 2017

Informing Responders Using Gis And Gps, Deidre Mccarthy

CHAR

Hurricane Katrina devastated the Gulf Coast in August 2005 and created the single largest disaster for cultural resources that the United States has witnessed since the inception of the National Historic Preservation Act (NHPA) in 1966. Notably, the NHPA created the National Register of Historic Places, our nation’s catalog of important cultural resources. The NHPA also stipulates that any federal undertaking which may adversely affect National Register eligible resources be mitigated. For the Federal Emergency Management Agency (FEMA), Katrina created the largest compliance project ever under Section 106 of the NHPA.

Although causing a great deal of damage, Katrina also …


Keynote Address: Climate Change: From Global To New York Scale, Christopher D. Thorncroft Oct 2017

Keynote Address: Climate Change: From Global To New York Scale, Christopher D. Thorncroft

CHAR

This talk is concerned with the science and impacts of climate change from global to New York scales. It will provide an assessment of how the climate has changed over the past Century based on a purely observational perspective. The scientific basis for anthroprogenic climate change will be explained and discussed including a description of the “greenhouse effect” and why it is important for life on this planet. We will briefly discuss global and local consequences of a warmer climate and what we need to be prepared for going forward in the coming decades.


Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder Oct 2017

Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder

KSU Proceedings on Cybersecurity Education, Research and Practice

Millions of people willingly expose their lives via Internet technologies every day, and even those who stay off the Internet find themselves exposed through data breaches. Trillions of private information records flow through the Internet. Marketers gather personal preferences to coerce shopping behavior, while providers gather personal information to provide enhanced services. Few users have considered where their information is going or who has access to it. Even fewer are aware of how decisions made in their own lives expose significant pieces of information, which can be used to harm the very organizations they are affiliated with by cyber attackers. …


A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi Oct 2017

A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi

KSU Proceedings on Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


Experiments With Applying Artificial Immune System In Network Attack Detection, Alexis Cooper Oct 2017

Experiments With Applying Artificial Immune System In Network Attack Detection, Alexis Cooper

KSU Proceedings on Cybersecurity Education, Research and Practice

The assurance of security within a network is difficult due to the variations of attacks. This research conducts various experiments to implement an Artificial Immune System based Intrusion Detection System to identify intrusions using the Negative Selection Algorithm. This research explores the implementation of an Artificial Immune System opposed to the industry standard of machine learning. Various experiments were conducted to identify a method to separate data to avoid false-positive results. The use of an Artificial Immune System requires a self and nonself classification to determine if an intrusion is present within the network. The results of an Artificial Immune …


A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard Nilsen, Yair Levy, Steven Terrell, Dawn Beyer Oct 2017

A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard Nilsen, Yair Levy, Steven Terrell, Dawn Beyer

KSU Proceedings on Cybersecurity Education, Research and Practice

Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and …


Voice Hacking Proof Of Concept: Using Smartphones To Spread Ransomware To Traditional Pcs, Leonardo I. Mazuran, Bryson R. Payne, Tamirat T. Abegaz Oct 2017

Voice Hacking Proof Of Concept: Using Smartphones To Spread Ransomware To Traditional Pcs, Leonardo I. Mazuran, Bryson R. Payne, Tamirat T. Abegaz

KSU Proceedings on Cybersecurity Education, Research and Practice

This paper presents a working proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue exploit, spreading …


Security Device Roles, Vabrice Wilder Oct 2017

Security Device Roles, Vabrice Wilder

KSU Proceedings on Cybersecurity Education, Research and Practice

“An abstract of this article was published in the proceedings of the Conference on Cybersecurity Education, Research & Practice, 2017”. Communication has evolved since the beginning of mankind from smoke signals to drones to now the internet. In a world filled with technology the security of one’s device is not to be taken for granted. A series of research was done in order to gather details about network devices that can aid in the protection of one’s information while being transferred through the internet. The findings included but not limited to, switches, the seven layers of OSI, routers, firewalls, load …


"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Secuity Awareness Campaign, Rachael Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky Jenkins Oct 2017

"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Secuity Awareness Campaign, Rachael Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky Jenkins

KSU Proceedings on Cybersecurity Education, Research and Practice

This article discusses the lessons learned after implementing a successful university-wide cyber security campaign. The Cyber Security Awareness Committee (CyberSAC), a group comprised of diverse units across campus, collaborated together on resources, talent, people, equipment, technology, and assessment practices to meet strategic goals for cyber safety and education. The project involves assessing student learning and behavior changes after participating in a Cyber Security Password Awareness event that was run as a year-long campaign targeting undergraduate students. The results have implications for planning and implementing university-wide initiatives in the field of cyber security, and more broadly, higher education at large.


Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang Oct 2017

Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang

KSU Proceedings on Cybersecurity Education, Research and Practice

Since web browsers have become essential to accomplishing everyday tasks, developing secure web applications has become a priority in order to protect user data, corporate databases and critical infrastructure against cyber-crimes . This research presents a game-like (gamification) approach to teach key concepts and skills on how to develop secure web applications. Gamification draws on motivational models, one of psychological theories. Gamification design has great potential over traditional education where we often find students demotivated and lecturers failing to engage them in learning activities. This research created game-like learning modules to teach top vulnerabilities and countermeasures for these top vulnerabilities …


Cloud‐Based Text Analytics Harvesting, Cleaning And Analyzing Corporate Earnings Conference Calls, Michael Chuancai Zhang, Vikram Gazula, Dan Stone, Hong Xie Oct 2017

Cloud‐Based Text Analytics Harvesting, Cleaning And Analyzing Corporate Earnings Conference Calls, Michael Chuancai Zhang, Vikram Gazula, Dan Stone, Hong Xie

Commonwealth Computational Summit

No abstract provided.


Cloud-Based Text Analytics: Harvesting, Cleaning And Analyzing Corporate Earnings Conference Calls, Michael Chuancai Zhang, Vikram Gazula, Dan Stone, Hong Xie Oct 2017

Cloud-Based Text Analytics: Harvesting, Cleaning And Analyzing Corporate Earnings Conference Calls, Michael Chuancai Zhang, Vikram Gazula, Dan Stone, Hong Xie

Commonwealth Computational Summit

Does management language cohesion in earnings conference calls matter to the capital market? As a part of the research on the above question, and taking advantage of the modern IT technologies, this project:

  • harvested 115,882 earnings conference call transcripts from SeekingAlpha.com
  • parsed and structured 89,988 transcripts using regular expressions in Stata
  • analyzed 179,976 text files using Amazon Elastic Compute Cloud (Amazon EC2), which
  • saved almost 2 years (675 days) of the project time
As this project is related to big data, text analytics, and big computing, it may be a good case to show how we can benefit from modern …


Distributed Evolution Of Spiking Neuron Models On Apache Mahout For Time Series Analysis, Andrew Palumbo Oct 2017

Distributed Evolution Of Spiking Neuron Models On Apache Mahout For Time Series Analysis, Andrew Palumbo

Annual Symposium on Biomathematics and Ecology Education and Research

No abstract provided.


Detecting Deception In Asynchronous Text, Fletcher Glancy May 2017

Detecting Deception In Asynchronous Text, Fletcher Glancy

Annual ADFSL Conference on Digital Forensics, Security and Law

Glancy and Yadav (2010) developed a computational fraud detection model (CFDM) that successfully detected financial reporting fraud in the text of the management’s discussion and analysis (MDA) portion of annual filings with the United States Securities and Exchange Commission (SEC). This work extends the use of the CFDM to additional genres, demonstrates the generalizability of the CFDM and the use of text mining for quantitatively detecting deception in asynchronous text. It also demonstrates that writers committing fraud use words differently from truth tellers.


Migrating Behavior Search’S User Interface From Swing To Javafx, An Nguyen Dang May 2017

Migrating Behavior Search’S User Interface From Swing To Javafx, An Nguyen Dang

Celebration of Learning

Agent-based models (ABMs) is a genre of computer modeling that simulates actions and interactions between individual entities (agents). ABM is widely used to simulate behavior in many fields, including biology, ecology, chemistry, physics, economics, and social science. NetLogo is a well-known agent-based programming language that provides a powerful platform to build and examine ABMs. However, to fully analyze a model one must run the model many times with different parameters, which can be a very daunting task. Therefore, Dr. Forrest Stonedahl developed BehaviorSearch, a software tool to help with automating the exploration of ABMs. The software interfaces with the NetLogo …


Genuine Or Reproduction: A Comparision Of 3d Imaging Techniques, Erica A. Loughner, Jordan C. Oldham Apr 2017

Genuine Or Reproduction: A Comparision Of 3d Imaging Techniques, Erica A. Loughner, Jordan C. Oldham

The Research and Scholarship Symposium (2013-2019)

Advancements in technology associated with 3D imaging for both print and digital applications are transforming many aspects of geology. Museums, researchers, and educators are now using 3D models to depict and reproduce fossils, minerals, and crystals for study, thereby reducing the risk of damage to valuable original specimens. This project examined which of the two processes available to Cedarville University geology program produces the best quality digital image and, subsequently, the best 3D printed object of a macroscopic-sized specimen. The first method utilizes the camera on a smartphone to take overlapping photos of the entire specimen (fossil or mineral) – …


2017 Symposium Overview, Cedarville University Apr 2017

2017 Symposium Overview, Cedarville University

The Research and Scholarship Symposium (2013-2019)

Click the "Download" button in the top right corner to view the abstract booklet.


Developing And Supporting The Diversity Of Chairperson Roles, Jean Pawl, Richard Griner, Deborah Richardson, Elizabeth Nesmith Mar 2017

Developing And Supporting The Diversity Of Chairperson Roles, Jean Pawl, Richard Griner, Deborah Richardson, Elizabeth Nesmith

Academic Chairpersons Conference Proceedings

A monthly Chair Professional Development program at Augusta University provides opportunity to mentor new chairpersons and foster collegiality amongst all chairpersons at a university with both liberal arts and health sciences programs. The merits and challenges of this program that addresses needs of such a diverse group will be highlighted


Current & Future Economic Value Of Kankakee River To Indiana, R. Derek Bjonback Feb 2017

Current & Future Economic Value Of Kankakee River To Indiana, R. Derek Bjonback

Kankakee River Watershed Conference

Author Keywords:

economic trends, watershed, water uses, recreation water use, drainage, irrigation, industrial water use


Understanding The Social And Human Dimension Of Energy Management In Shipping, Martin Viktorelius Jan 2017

Understanding The Social And Human Dimension Of Energy Management In Shipping, Martin Viktorelius

MARENER 2017

No abstract provided.