Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

2017

Institution
Keyword
Publication
Publication Type
File Type

Articles 31 - 60 of 264

Full-Text Articles in Business

The Santa Clara, 2017-10-26, Santa Clara University Oct 2017

The Santa Clara, 2017-10-26, Santa Clara University

The Santa Clara

No abstract provided.


2017 Program, Office Of Academic Affairs Oct 2017

2017 Program, Office Of Academic Affairs

Programs

Scholarship, creativity, innovation, and the many forms of collaborative engagement that shape faculty life and student learning are central to the mission of Eastern Illinois University. For that reason, our faculty, department chairs, college deans, the Provost, and the entire campus community celebrate the achievements and outstanding contributions of our colleagues and students to their disciplines and professions every year. And, as the following pages illustrate, faculty engaged in continuing scholarly and creative activities that have provided outstanding mentoring experiences for our undergraduate and graduate students.

In addition to recognizing faculty performances, shows, publications, grants and other professional efforts, the …


Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder Oct 2017

Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder

KSU Proceedings on Cybersecurity Education, Research and Practice

Millions of people willingly expose their lives via Internet technologies every day, and even those who stay off the Internet find themselves exposed through data breaches. Trillions of private information records flow through the Internet. Marketers gather personal preferences to coerce shopping behavior, while providers gather personal information to provide enhanced services. Few users have considered where their information is going or who has access to it. Even fewer are aware of how decisions made in their own lives expose significant pieces of information, which can be used to harm the very organizations they are affiliated with by cyber attackers. …


A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi Oct 2017

A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi

KSU Proceedings on Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


Experiments With Applying Artificial Immune System In Network Attack Detection, Alexis Cooper Oct 2017

Experiments With Applying Artificial Immune System In Network Attack Detection, Alexis Cooper

KSU Proceedings on Cybersecurity Education, Research and Practice

The assurance of security within a network is difficult due to the variations of attacks. This research conducts various experiments to implement an Artificial Immune System based Intrusion Detection System to identify intrusions using the Negative Selection Algorithm. This research explores the implementation of an Artificial Immune System opposed to the industry standard of machine learning. Various experiments were conducted to identify a method to separate data to avoid false-positive results. The use of an Artificial Immune System requires a self and nonself classification to determine if an intrusion is present within the network. The results of an Artificial Immune …


A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard Nilsen, Yair Levy, Steven Terrell, Dawn Beyer Oct 2017

A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard Nilsen, Yair Levy, Steven Terrell, Dawn Beyer

KSU Proceedings on Cybersecurity Education, Research and Practice

Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and …


Voice Hacking Proof Of Concept: Using Smartphones To Spread Ransomware To Traditional Pcs, Leonardo I. Mazuran, Bryson R. Payne, Tamirat T. Abegaz Oct 2017

Voice Hacking Proof Of Concept: Using Smartphones To Spread Ransomware To Traditional Pcs, Leonardo I. Mazuran, Bryson R. Payne, Tamirat T. Abegaz

KSU Proceedings on Cybersecurity Education, Research and Practice

This paper presents a working proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue exploit, spreading …


Security Device Roles, Vabrice Wilder Oct 2017

Security Device Roles, Vabrice Wilder

KSU Proceedings on Cybersecurity Education, Research and Practice

“An abstract of this article was published in the proceedings of the Conference on Cybersecurity Education, Research & Practice, 2017”. Communication has evolved since the beginning of mankind from smoke signals to drones to now the internet. In a world filled with technology the security of one’s device is not to be taken for granted. A series of research was done in order to gather details about network devices that can aid in the protection of one’s information while being transferred through the internet. The findings included but not limited to, switches, the seven layers of OSI, routers, firewalls, load …


"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Secuity Awareness Campaign, Rachael Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky Jenkins Oct 2017

"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Secuity Awareness Campaign, Rachael Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky Jenkins

KSU Proceedings on Cybersecurity Education, Research and Practice

This article discusses the lessons learned after implementing a successful university-wide cyber security campaign. The Cyber Security Awareness Committee (CyberSAC), a group comprised of diverse units across campus, collaborated together on resources, talent, people, equipment, technology, and assessment practices to meet strategic goals for cyber safety and education. The project involves assessing student learning and behavior changes after participating in a Cyber Security Password Awareness event that was run as a year-long campaign targeting undergraduate students. The results have implications for planning and implementing university-wide initiatives in the field of cyber security, and more broadly, higher education at large.


Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang Oct 2017

Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang

KSU Proceedings on Cybersecurity Education, Research and Practice

Since web browsers have become essential to accomplishing everyday tasks, developing secure web applications has become a priority in order to protect user data, corporate databases and critical infrastructure against cyber-crimes . This research presents a game-like (gamification) approach to teach key concepts and skills on how to develop secure web applications. Gamification draws on motivational models, one of psychological theories. Gamification design has great potential over traditional education where we often find students demotivated and lecturers failing to engage them in learning activities. This research created game-like learning modules to teach top vulnerabilities and countermeasures for these top vulnerabilities …


2017, October - Recommendations To Address The Expansion Of Seawater Intrusion In The Salinas Valley Groundwater Basin Oct 2017

2017, October - Recommendations To Address The Expansion Of Seawater Intrusion In The Salinas Valley Groundwater Basin

Monterey County Water Resources Agency Engineering Reports

This report provides a discussion of the current knowledge and related background information surrounding seawater intrusion pathways and potential impacts thereof on the Salinas Valley Groundwater Basin. The report also serves as a body of evidence to catalogue the findings used to support the six recommendations presented. Each recommendation can be implemented on its own or in concert with the others, and the relative importance of each is discussed individually in this report. However, the recommendations are conceptualized as a comprehensive solution that, along with continued operation of projects that have been constructed for the same purpose, have the strongest …


The Santa Clara, 2017-10-19, Santa Clara University Oct 2017

The Santa Clara, 2017-10-19, Santa Clara University

The Santa Clara

No abstract provided.


300-X-250-7.Jpg, Susunqq Online Oct 2017

300-X-250-7.Jpg, Susunqq Online

susunqq

Situs Judi BandarQ Paling Top Banget!

Pada kesempatan ini kita akan membagi informasi tentang situs judi bandarq paling top banget. Hal dalam permainan bandarq ini tidak bisa kita pungkiri lagi  banyak sekali penggemar nya dari kalangan mana pun ikut bermaina permainan yang satu ini. Di permainan bandarq online bisa membuat para pemain menyukai nya, apalagi pada saat bermain sangat menyenangkan. Permainan judi ini menggunakan kartu domini ( dam ) yang berbentuk persegi panjang gambar bintik – bintik bulat warna merah. Itulah ciri khas kartu domino yang sering di gunakan untuk permainan bandarq, aduq, dominoqq.

Dengan serunya permainan bandarq ini, ada …


Cloud‐Based Text Analytics Harvesting, Cleaning And Analyzing Corporate Earnings Conference Calls, Michael Chuancai Zhang, Vikram Gazula, Dan Stone, Hong Xie Oct 2017

Cloud‐Based Text Analytics Harvesting, Cleaning And Analyzing Corporate Earnings Conference Calls, Michael Chuancai Zhang, Vikram Gazula, Dan Stone, Hong Xie

Commonwealth Computational Summit

No abstract provided.


Cloud-Based Text Analytics: Harvesting, Cleaning And Analyzing Corporate Earnings Conference Calls, Michael Chuancai Zhang, Vikram Gazula, Dan Stone, Hong Xie Oct 2017

Cloud-Based Text Analytics: Harvesting, Cleaning And Analyzing Corporate Earnings Conference Calls, Michael Chuancai Zhang, Vikram Gazula, Dan Stone, Hong Xie

Commonwealth Computational Summit

Does management language cohesion in earnings conference calls matter to the capital market? As a part of the research on the above question, and taking advantage of the modern IT technologies, this project:

  • harvested 115,882 earnings conference call transcripts from SeekingAlpha.com
  • parsed and structured 89,988 transcripts using regular expressions in Stata
  • analyzed 179,976 text files using Amazon Elastic Compute Cloud (Amazon EC2), which
  • saved almost 2 years (675 days) of the project time
As this project is related to big data, text analytics, and big computing, it may be a good case to show how we can benefit from modern …


Obat Pembesar Alat Vital Di Tangerang 082114104140 Pembesar Penis Klg, Toko Raja Shop Oct 2017

Obat Pembesar Alat Vital Di Tangerang 082114104140 Pembesar Penis Klg, Toko Raja Shop

toko raja shop | Agen Jual Obat Pembesar Kualitas No 1

Obat Pembesar Alat Vital Di Tangerang, Pembesar Penis Klg, Toko Jual Obat Pembesar Asli Di Tangerang, Agen Obat Pembesar Klg, Cod Obat Pembesar Klg, Jual Obat Pembesar Alat Vital Di Tangerang, Alamat Jual Pembesar Penis Di Tangerang,


Format Pemesanan: Pembesar Penis Klg Asli. ?????

  1. Cara Pemesanan.
Nama Lengkap:
Alamat Lengkap:
Tidak. HP:
Barang Pesanan: Pembesar Penis KLG
Transfer Di Bank BRI:
Untuk Pemesanan Via Online Kalo Sudah Transfer Gratis Konfirmasi Di Bawah Ini.
  • WhatsApp: 082 114 104 140
  • Hotline; 082 114 104 140
  • PIN BBM: D40196E2



The Santa Clara, 2017-10-12, Santa Clara University Oct 2017

The Santa Clara, 2017-10-12, Santa Clara University

The Santa Clara

No abstract provided.


Peremajaan Kebun Rakyat, Antara Sumsel Oct 2017

Peremajaan Kebun Rakyat, Antara Sumsel

aang sbd

Program peremajaan kebun rakyat di Kabupaten Musi Banyuasin mendapat dukungan pemerintah pusat. Penanaman perdananya secara simbolis akan dilakukan Presiden Jokowi," kata Bupati Musi Banyuasin Dodi Reza Alex, di Sekayu, Kabupaten Musi Banyuasin, Rabu.

Dia menjelaskan, program peremajaan kebun (replanting) seluas 4.446 hektare rencananya dilakukan secara simbolis di Desa Panca Tunggal, Kecamatan Sungai Lilin.

Upaya peremajaan kebun sawit di kabupaten ini menjadi perhatian pemerintah pusat karena kegiatan tersebut merupakan pertama kali dilakukan di Indonesia.

Peremajaan kebun rakyat tersebut pada tahap awal akan dilakukan di lahan milik petani sawit mandiri seluas 4.446 hektare.

"Kegiatan peremajaan kebun sawit milik petani mandiri di kabupaten …


Distributed Evolution Of Spiking Neuron Models On Apache Mahout For Time Series Analysis, Andrew Palumbo Oct 2017

Distributed Evolution Of Spiking Neuron Models On Apache Mahout For Time Series Analysis, Andrew Palumbo

Annual Symposium on Biomathematics and Ecology Education and Research

No abstract provided.


The Santa Clara, 2017-10-05, Santa Clara University Oct 2017

The Santa Clara, 2017-10-05, Santa Clara University

The Santa Clara

No abstract provided.


A Conversation Centric Approach To Understanding And Supporting The Coordination Of Social Group-Activities, Richard P. Schuler Oct 2017

A Conversation Centric Approach To Understanding And Supporting The Coordination Of Social Group-Activities, Richard P. Schuler

Dissertations

Despite the widespread and large variety of communication tools available to us such as, text messaging, Skype, email, twitter, Facebook, instant messaging, GroupMe, WhatsApp, Snapchat, etc., many people still routinely find coordinating activities with our friends to be a very frustrating experience. Everyone, has at least once, encountered the difficulties involved with deciding what to do as a group. Some friends may be busy, others may have already seen the movie that the others want to see, and some do not like Mexican food. It is a challenge everyone has faced and continue to face. This is a result of …


Regional Review: Reaching New Heights In The Region Fall 2017 (Vol.4, No.1), Heather Garcia , Editor Oct 2017

Regional Review: Reaching New Heights In The Region Fall 2017 (Vol.4, No.1), Heather Garcia , Editor

Regional Campuses Publications

Sections include:

Save the date Chat with the Chancellor, Campus News, and Awesome Achievements for each of the three regional campuses.


Santa Clara Magazine, Volume 58 Number 4, Fall 2017, Santa Clara University Oct 2017

Santa Clara Magazine, Volume 58 Number 4, Fall 2017, Santa Clara University

Santa Clara Magazine

18 - TIME FOR A BIG SHIFT We work and save for decades. And then what? A behavioral finance expert writes about the tough transition many face. By Meir Statman. Illustrations by Hanna Barczyk.

22 - WHAT WE OWE At the very least: stories that capture the contour of a life. A Pulitzer Prize– winning reporter on tales of human strife and resilience. By Tatiana Sanchez ’10.

28 - THE MOST IMPORTANT Lawsuit on the Planet It was first filed against the Obama administration and draws on decades of government records. It seeks no monetary damages. But advocates and critics …


Data Envelopment Analysis Using Glpkapi In R, Konrad Miziolek, Jordan Beary, Shreyas Vasanth, Surekha Chanamolu, Rudraxi Mitra Oct 2017

Data Envelopment Analysis Using Glpkapi In R, Konrad Miziolek, Jordan Beary, Shreyas Vasanth, Surekha Chanamolu, Rudraxi Mitra

Engineering and Technology Management Student Projects

The work done here is primarily a wrapper function written to separate some of the more difficult-to-use glpkAPI functionality from the end-user. The user, when prompted, selects the appropriate configuration of the .mod file to the task (for example, output-oriented CRS), and the data file, as a .dat. The function then loads the required glpkAPI library, and carries forward the model. It allocates the problem and workspace, reads the model file and data file the user selects, builds the problem, and solves it. The function returns primal values, and, if dual = TRUE is selected, also returns dual weights.


Analyzing Cyber Threats Affecting The Financial Industry, Anna Skelton Oct 2017

Analyzing Cyber Threats Affecting The Financial Industry, Anna Skelton

Student Works

As critical infrastructure, financial institutions must execute the highest level of cybersecurity as the threat of a crippling cyberattack continues to develop. Malicious actors, including disenfranchised employees, state sponsored actors, and traditional hackers, all have motivations to target the financial industry, and do so frequently. However, the threat changes slightly between resource rich large institutions and their smaller, community bank counterparts. The complex and multifaceted threat must be fully understood in order to properly address and analyze solution options to preserve the security of these institutions and the economy that they contribute to.


Exploring Rwanda's Continuing Education Capacity For Information Communications Technology (Ict) Skills, Li Keen Lim Oct 2017

Exploring Rwanda's Continuing Education Capacity For Information Communications Technology (Ict) Skills, Li Keen Lim

Independent Study Project (ISP) Collection

As Rwanda strives to become the ICT hub of the region, it will need to develop its greatest asset: its people, in ICT skills. This exploratory study used 30 semi-structured interviews, observation and secondary data from different sources, schools, students and NGOs, to answer a simple question: how does an everyday, working adult Rwandan learn new computers skills for a new computer age? This study found that a wide variety of suppliers fulfil different niches that give prospective students a range of prices, content, schedules, certification, practices, etc., and that demand is increasing for a host of different reasons. It …


Ethical Business Practice, Accountability, And Quality Assurance: Primary Drivers For Sustainable Tourism Development In Iceland, Abigail Harrison Oct 2017

Ethical Business Practice, Accountability, And Quality Assurance: Primary Drivers For Sustainable Tourism Development In Iceland, Abigail Harrison

Independent Study Project (ISP) Collection

The tourism industry in Iceland has grown exponentially in the last decade, causing changes to the natural landscape and drastically shifting revenue streams in the economy. This rapid growth coupled with the recent development of Iceland’s tourism industry makes it the perfect case study for how to effectively mitigate tourism influxes. This unprecedented rate of growth impels the creation of sustainability measures within this industry in order to ensure a lasting vision of Icelandic tourism in the future. Both the government and private sector have already begun to institute sustainability measures in society and in business. The primary aim of …


Why We Should Have Seen That Coming: Comments On Microsoft’S Tay “Experiment,” And Wider Implications, K. W. Miller, Marty J. Wolf, Frances S. Grodzinsky Oct 2017

Why We Should Have Seen That Coming: Comments On Microsoft’S Tay “Experiment,” And Wider Implications, K. W. Miller, Marty J. Wolf, Frances S. Grodzinsky

School of Computer Science & Engineering Faculty Publications

In this paper we examine the case of Tay, the Microsoft AI chatbot that was launched in March, 2016. After less than 24 hours, Microsoft shut down the experiment because the chatbot was generating tweets that were judged to be inappropriate since they included racist, sexist, and anti-Semitic language. We contend that the case of Tay illustrates a problem with the very nature of learning software (LS is a term that describes any software that changes its program in response to its interactions) that interacts directly with the public, and the developer’s role and responsibility associated with it. We make …


Russia's Northern Rook: Nord Stream 2 On The European Energy Chessboard, David E. Wilson Oct 2017

Russia's Northern Rook: Nord Stream 2 On The European Energy Chessboard, David E. Wilson

Independent Study Project (ISP) Collection

The Nord Stream 2 pipeline proposes to connect Germany to the world’s largest natural gas reserves in Russia, allowing the state-owned Russian energy behemoth Gazprom to double its export capacity through the ‘Northern Corridor’ transit route to Europe. This project has been the subject of sharp disapproval from Central and Eastern European countries, as well as the United States, which fear the prospect of increasing dependence on gas imports from a Russia perceived as politically aggressive and unreliable. This paper will identify the geopolitical and geoeconomic implications involved in the construction of Nord Stream 2 by adopting a geostrategic worldview …


Vungle Inc. Improves Monetization Using Big-Data Analytics, Bert De Reyck, Ioannis Fragkos, Yael Gruksha-Cockayne, Casey Lichtendahl, Hammond Guerin, Andre Kritzer Oct 2017

Vungle Inc. Improves Monetization Using Big-Data Analytics, Bert De Reyck, Ioannis Fragkos, Yael Gruksha-Cockayne, Casey Lichtendahl, Hammond Guerin, Andre Kritzer

Research Collection Lee Kong Chian School Of Business

The advent of big data has created opportunities for firms to customize their products and services to unprecedented levels of granularity. Using big data to personalize an offering in real time, however, remains a major challenge. In the mobile advertising industry, once a customer enters the network, an ad-serving decision must be made in a matter of milliseconds. In this work, we describe the design and implementation of an ad-serving algorithm that incorporates machine-learning methods to make personalized ad-serving decisions within milliseconds. We developed this algorithm for Vungle Inc., one of the largest global mobile ad networks. Our approach also …