Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Kennesaw State University (117)
- Institute of Business Administration (36)
- Kansas State University Libraries (15)
- Purdue University (11)
- University of Nevada, Las Vegas (7)
-
- University of Vermont (5)
- Singapore Management University (4)
- Portland State University (3)
- University of Nebraska at Omaha (3)
- Vocational Training Council (3)
- Western University (3)
- Cedarville University (2)
- Liberty University (2)
- Stephen F. Austin State University (2)
- Texas Southern University (2)
- Eastern Kentucky University (1)
- Embry-Riddle Aeronautical University (1)
- Florida International University (1)
- James Madison University (1)
- Johnson County Community College (1)
- Minnesota State University Moorhead (1)
- Murray State University (1)
- Old Dominion University (1)
- Olivet Nazarene University (1)
- South Dakota State University (1)
- Southern Adventist University (1)
- Southern Illinois University Carbondale (1)
- University of Central Florida (1)
- University of Dayton (1)
- University of Kentucky (1)
- Keyword
-
- Consumer behavior (4)
- Digital preservation (4)
- Banking (3)
- Business (3)
- Segmentation (3)
-
- Technology (3)
- 3D printing (2)
- Algorithms (2)
- Application software (2)
- Appraisal (2)
- Artificial Intelligence (2)
- Collaboration (2)
- Data analysis (2)
- Data mining (2)
- Decision making (2)
- Diffusion of innovation (2)
- Digitization (2)
- E-commerce (2)
- Economy (2)
- Fuzzy logic (2)
- Innovation (2)
- Interviews (2)
- Marketing education (2)
- Marketing research (2)
- Natural language processing (2)
- Player protection (2)
- Product design (2)
- Productivity (2)
- Repair (2)
- Right to Repair (2)
- Publication Year
- Publication
-
- KSU Proceedings on Cybersecurity Education, Research and Practice (84)
- International Conference on Information and Communication Technologies (33)
- Atlantic Marketing Association Proceedings (20)
- Central Plains Network for Digital Asset Management (14)
- African Conference on Information Systems and Technology (11)
-
- UVM Libraries Conference Day (5)
- 2018 Reimagine Future Learning Spaces (4)
- Charleston Library Conference (4)
- International Conference on Gambling & Risk Taking (4)
- Student Research Symposium (3)
- UNO Student Research and Creative Activity Fair (3)
- Undergraduate Student Research Internships Conference (3)
- CBER Conference (2)
- ITSA 2022 Gran Canaria - 9th Biennial Conference: Corporate Entrepreneurship and Global Tourism Strategies After Covid 19 (2)
- Practical Social and Industrial Research Symposium (2)
- Purdue Road School (2)
- Southwestern Business Administration Teaching Conference (2)
- Symposium of Student Scholars (2)
- Undergraduate Research Conference (2)
- 2010 Annual Nevada NSF EPSCoR Climate Change Conference (1)
- ASA Multidisciplinary Research Symposium (1)
- Adult Education Research Conference (1)
- CESUN Conference (1)
- Campus Research Day (1)
- Cybersecurity Undergraduate Research Showcase (1)
- Discovery@URI (1)
- Fair Trade Universities' National Convergence (1)
- Graduate Industrial Research Symposium (1)
- Helm's School of Government Conference - American Revival: Citizenship & Virtue (1)
- ICOT 18 - International Conference on Thinking - Cultivating Mindsets for Global Citizens (1)
- File Type
Articles 1 - 30 of 236
Full-Text Articles in Business
Comparative Life Cycle Assessment Of Copper Production, Xiaohan Wu
Comparative Life Cycle Assessment Of Copper Production, Xiaohan Wu
Graduate Industrial Research Symposium
Copper demand will surge significantly in the context of global renewable energy technology implementation, but its production is an energy-intensive process. It is crucial to choose the best production method to reduce environmental damage in terms of the enormous copper supply. This research develops a multi-criteria life cycle assessment model for the three main copper production routes- pyrometallurgy, hydrometallurgy, and bioleaching. We complied material and energy flow data to assess each route's life cycle greenhouse gas (GHG) emissions, cost, and resource efficiency. Results indicate bioleaching emits the least GHG emissions (4.09 kg-CO2 eq/kg copper) among the three routes. Hydrometallurgy is …
Towards Assessing Cybersecurity Posture Of Manufacturing Companies: Review And Recommendations, John Del Vecchio, Yair Levy, Ling Wang, Ajoy Kumar
Towards Assessing Cybersecurity Posture Of Manufacturing Companies: Review And Recommendations, John Del Vecchio, Yair Levy, Ling Wang, Ajoy Kumar
KSU Proceedings on Cybersecurity Education, Research and Practice
With the continued changes in the way businesses work, cyber-attack targets are in a constant state of flux between organizations, individuals, as well as various aspects of the supply chain of interconnected goods and services. As one of the 16 critical infrastructure sectors, the manufacturing sector is known for complex integrated Information Systems (ISs) that are incorporated heavily into production operations. Many of these ISs are procured and supported by third parties, also referred to as interconnected entities in the supply chain. Disruptions to manufacturing companies would not only have significant financial losses but would also have economic and safety …
Quantum Computing: Computing Of The Future Made Reality, Janelle Mathis
Quantum Computing: Computing Of The Future Made Reality, Janelle Mathis
KSU Proceedings on Cybersecurity Education, Research and Practice
Abstract—Quantum computing is an emerging new area focused on technology consisting of quantum theory aspects such as electrons, sub-atomic particles, and other materials engineered using quantum mechanics. Through quantum mechanics, these computers can solve problems that classical computers deem too complex. Today the closest computing technology compared to quantum computers are supercomputers, but similarly to classical computers, supercomputers also have faults. With supercomputers, when a problem is deemed too complex, it is due to the classical machinery components within the computer, thus causing a halt in solving the task or problem. In contrast, these problems could be solved with a …
Rfid Key Fobs In Vehicles: Unmasking Vulnerabilities & Strengthening Security, Devon Magda, Bryson R. Payne
Rfid Key Fobs In Vehicles: Unmasking Vulnerabilities & Strengthening Security, Devon Magda, Bryson R. Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
No abstract provided.
The Impact Of Individual Techno-Characteristics On Information Privacy Concerns In The Diffusion Of Mobile Contact Tracing, Jiesen Lin, Dapeng Liu, Lemuria Carter
The Impact Of Individual Techno-Characteristics On Information Privacy Concerns In The Diffusion Of Mobile Contact Tracing, Jiesen Lin, Dapeng Liu, Lemuria Carter
KSU Proceedings on Cybersecurity Education, Research and Practice
In the wake of the global health crisis, mobile contact tracing applications have emerged as important tools in managing disease spread. However, their effectiveness heavily relies on mass adoption, significantly influenced by the public's information privacy concerns. To date, systematic examination of how these privacy concerns relate to the innovation adopter categories in mobile contact tracing remains sparse. Furthermore, the influence of individual techno-characteristics on these concerns is to be explored. This research seeks to fill these gaps. Drawing on the diffusion of innovation theory, we examine the impact of the key techno-characteristics—adopter category, propensity for identification misrepresentation, and exposure …
Exploring Information Privacy Concerns During The Covid-19 Pandemic: A Juxtaposition Of Three Models, Dapeng Liu, Lemuria Carter, Jiesen Lin
Exploring Information Privacy Concerns During The Covid-19 Pandemic: A Juxtaposition Of Three Models, Dapeng Liu, Lemuria Carter, Jiesen Lin
KSU Proceedings on Cybersecurity Education, Research and Practice
Government agencies across the globe utilize mobile applications to interact with constituents. In response to the global pandemic, several nations have employed contact tracing services to manage the spread of COVID-19. Extent literature includes various models that explore information privacy. Several researchers have highlighted the need to compare the effectiveness of diverse information privacy models. To fill this gap, we explore the impact of information privacy concerns on citizens’ willingness to download a federal contact tracing app. In particular, we compare three types of prevalent information privacy concerns: global information privacy concerns (GIPC), concern for information privacy (CFIP), and internet …
How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim
How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim
Cybersecurity Undergraduate Research Showcase
The powers of OpenAI's groundbreaking AI language model, ChatGPT, startled millions of users when it was released in November. But for many, the tool's ability to further accomplish the goals of evil actors swiftly replaced their initial excitement with significant concerns. ChatGPT gives malicious actors additional ways to possibly compromise sophisticated cybersecurity software. Leaders in a sector that is currently suffering from a 38% global spike in data breaches in 2022 must acknowledge the rising influence of AI and take appropriate action. Cybercriminals are writing more complex and focused business email compromise (BEC) and other phishing emails with the assistance …
Technological Adoption And Changing World Of Work: Case Study Of Services Sector Workforce In Pakistan, Umer Khalid
Technological Adoption And Changing World Of Work: Case Study Of Services Sector Workforce In Pakistan, Umer Khalid
CBER Conference
This study seeks to investigate the impact of technological adoption and the changing world of work on employment dynamics, job quality and wage structure in the context of a developing economy – Pakistan.
The Relationship Between Labor Market Institutions And Innovation In 177 European Regions Over The Period 2000-2015, Gaetano Perone
The Relationship Between Labor Market Institutions And Innovation In 177 European Regions Over The Period 2000-2015, Gaetano Perone
CBER Conference
The main goal of this paper was to investigate the relationship between a set of labor market institutions (LMIs) and innovation (proxied by patent density) in 174 NUT-1 and NUT-2 European regions, over the period 2000-2015. Fixed effects with Driscoll and Kraay's (1998) standard errors (FE-DK), ordinary least squares (OLS), the generalized method of moments estimation of the fixed effects (FE-GMM), and a multilevel model (MLM) were employed.
Developing An Integrative Theoretical Framework For Electronic Business Value Optimisation In Botswana, Meduduetso Tsumake-Tsiang, Adheesh Budree
Developing An Integrative Theoretical Framework For Electronic Business Value Optimisation In Botswana, Meduduetso Tsumake-Tsiang, Adheesh Budree
African Conference on Information Systems and Technology
Organizations are trying to move quickly to adopt remote working policies into their organizations as to attract and retain top talent, reduce office space costs, and increase productivity. As many of these strategies were quickly adopted by South African ICT organizations during the COIVD-19 pandemic, organizations are still somewhat unclear on what their role is with regards to ensuring long term adoption of remote working. Thus, this study explored the role of the organization with regards to a work-from-home strategy. It was found that the organization is responsible for formalizing the chosen strategy, creating supportive policies, and adapting its management …
The Dark Side Of Mobile Money Transfer : A Case Study Of Zimbabwe, Theo Tsokota, Collector Chipfumbu, Melody Maseko
The Dark Side Of Mobile Money Transfer : A Case Study Of Zimbabwe, Theo Tsokota, Collector Chipfumbu, Melody Maseko
African Conference on Information Systems and Technology
Mobile money transfer has been widely presented in the literature and in practice as a way to bring the poor, unbanked and backward communities into the mainstream financial system. The main objective of this paper is to provide insights into how mobile money transfer has contributed to the negative effects on Zimbabwe's economy and its citizens. Using integrative literature this study explores the how mobile money transfers have negatively affected the economy of Zimbabwe and its citizens. The findings show that mobile money, if not properly regulated, can promote money laundering, fraud and financial irregularities, which can harm the entire …
Social Media & Privacy: Understanding Privacy In The Age Of Content Creator Culture, Robert Tagoe, Raphael Amponsah, Emmanuel Awuni Kolog, Eric Afful-Dadzie
Social Media & Privacy: Understanding Privacy In The Age Of Content Creator Culture, Robert Tagoe, Raphael Amponsah, Emmanuel Awuni Kolog, Eric Afful-Dadzie
African Conference on Information Systems and Technology
In today's digital age, content creators are gaining public attention and becoming highly influential. With that increased influence, it is important to acknowledge the privacy concerns within this culture. This interpretive research study seeks to identify and understand the dynamics of privacy within the content creator culture. This research will leverage information from interviews with content creators from various social media platforms such as YouTube, Instagram, Facebook, and TikTok. Using theories to understand the phenomena, theories of privacy calculus, privacy paradox and self-disclosure, will be used to view how content creators define and navigate privacy, strategies employed to control personal …
Digital Transformation Of Smes Through Social Media, Georgette Eugenia Otoo, Raphael Amponsah, Eric Afful-Dadzie, Emmanuel Awuni Kolog
Digital Transformation Of Smes Through Social Media, Georgette Eugenia Otoo, Raphael Amponsah, Eric Afful-Dadzie, Emmanuel Awuni Kolog
African Conference on Information Systems and Technology
This research paper explores the strategic integration of social media platforms by Small and Medium-sized Enterprises (SMEs) in Low- and Middle-Income Countries (LMICs) beyond marketing. Drawing from Resource-Based View and Dynamic Capabilities theories, the study investigates how social media enhances management, coordination, and control functions. Through five diverse case studies from Ghana, findings reveal SMEs’ innovative use of platforms like Instagram, WhatsApp, Slack, and Trello. These platforms foster efficient internal communication, customer engagement, project management, and talent acquisition. Challenges such as technical expertise and dynamic digital landscapes are identified.
Internet Of Things Affordance For Open Educational Resources In A Comprehensive Open Distance E-Learning, Lancelord Mncube
Internet Of Things Affordance For Open Educational Resources In A Comprehensive Open Distance E-Learning, Lancelord Mncube
African Conference on Information Systems and Technology
The Internet of Things (IoT) space has dual dimensions of affordance to support open educational resources (OER). The duality of affordance has little or not been well articulated in relation to OER, particularly in a Comprehensive open distance e-learning (CODEL) institution. Such an institution is a mega open distance in South Africa and beyond the continent to accommodate students globally and rely on information and communication technology (ICT) in the provision of tuition. In the CODEL institution, there is a recognizable shift as the institution encourages the appropriation of OER and phasing out the prescription of the prescribed textbooks. The …
Adoption Of Ict To Support Rural Small-Holder Farmers : A Systematic Review, Abdus Salaam Seat, Shaun Pather
Adoption Of Ict To Support Rural Small-Holder Farmers : A Systematic Review, Abdus Salaam Seat, Shaun Pather
African Conference on Information Systems and Technology
Access to Information and Communication Technologies (ICTs) are slowly becoming more available to rural communities given a number of innovative approaches over recent years such as the implementation of Community Networks (CNs). Consequently, ICTs are able to become more meaningful in support of livelihoods of these communities, such as in agriculture production. Potential benefits to smallholder farmers include increase yields and reduced effort. However, there is very little evidence of smallholder farmers integrating ICTs into their livelihood activity. In this paper a Systematic Literature Review is used to explore the challenges faced in this sector. A total of 83 articles …
Information Technology Decision Makers’ Readiness For Artificial Intelligence Governance In Institutions Of Higher Education In South Africa, John Mangundu
African Conference on Information Systems and Technology
Artificial intelligence (AI) can enhance the educational experience for academics and students. However, research has inadequately examined AI ethics and governance, particularly in the higher education sector of developing economies such as South Africa. AI governance ensures that envisioned AI benefits are realized while reducing AI risks. Against this backdrop of huge research deficit, the current study reports on a qualitative exploratory study that investigates the state of readiness for AI governance and AI governance maturity in South African higher education institutions. Informed by the combination of the TOE framework, the traditional IT governance model and the adapted IT governance …
Managing E-Mindful Tourism Experiences: A Co-Creation Approach, Uglješa Stankov
Managing E-Mindful Tourism Experiences: A Co-Creation Approach, Uglješa Stankov
ITSA 2022 Gran Canaria - 9th Biennial Conference: Corporate Entrepreneurship and Global Tourism Strategies After Covid 19
No abstract provided.
Can Digital Marketing On Instagram Help To Promote Sustainable Travel? Abstract, Jacques Bulchand-Gidumal Professor, Armin Brysch Professor
Can Digital Marketing On Instagram Help To Promote Sustainable Travel? Abstract, Jacques Bulchand-Gidumal Professor, Armin Brysch Professor
ITSA 2022 Gran Canaria - 9th Biennial Conference: Corporate Entrepreneurship and Global Tourism Strategies After Covid 19
The contribution of digitalization and digital platforms to tourism sustainability is a timely topic. In this research we analyze if a digital platform such as Instagram could contribute and be used as a tool to promote sustainability by destinations and by travelers. To this aim, we implement a methodology comprised of four steps: identifying the most recognized sustainable destinations in the world (i.e. Slovenia, New Zealand and Costa Rica), downloading and analyzing the last posts from the official accounts of the DMOs of these destinations, identifying the most frequently used hashtags related to sustainable tourism (#ecoturismo, #ecotourism, #sustainabletravel, #ecotravel and …
Finding The Invisible At-Risk Player - Using Technology To Help Identify Customers Spending Beyond Affordable Limits, Tony Schellinck Dr.
Finding The Invisible At-Risk Player - Using Technology To Help Identify Customers Spending Beyond Affordable Limits, Tony Schellinck Dr.
International Conference on Gambling & Risk Taking
Abstract:
This session will highlight the value of a new EGM Affordability Model specifically adapted for changes in play due to COVID-19. Affordability of play has become a critical regulatory priority that is gaining greater traction worldwide as a gaming provider responsibility. The research presented here can inform a more sophisticated approach that is easy to operationalize, does not require a burden of proof on operators, and simultaneously yields greater results in identifying players spending beyond their abilities. The authors conducted research from 2014-2020, interviewing 10,500 regular electronic machine gamblers in land-based casinos in three countries administering the PGSI and …
Exploring The Effects Of Gamblification On Esports Betting, Cecilia Diaz Dr, Violet Justine Mtonga Dr
Exploring The Effects Of Gamblification On Esports Betting, Cecilia Diaz Dr, Violet Justine Mtonga Dr
International Conference on Gambling & Risk Taking
Abstract:
There is a growing trend of gambling/betting organisations attempting to secure a position in the fast-growing and profitable sector of Esports by becoming an inherent part of the sports culture and its community of fans. This alignment is raising concerns due to the community lifestyle and consumption of experience intrinsic in sports/Esports (Gordon, Gurrieri, & Chapman, 2015).
Diffusion of gambling in society is triggered by digital/technological disruption on gambling and changing consumer behaviour and cultural trends. This environment offers innovative opportunities to experience gambling and “gambling-like” experiences online (King et al., 2010) with the extra incentive of ease of …
Rg Smart Gambling Machines: A Prevention Model To Respond To Risky Play In Real Time, Tracy Schrans
Rg Smart Gambling Machines: A Prevention Model To Respond To Risky Play In Real Time, Tracy Schrans
International Conference on Gambling & Risk Taking
Abstract:
In collaboration with industry, public health, and regulators, Focal Research developed an effective modelling process using player data and technology to identify and assist customers at-risk of having problems with their gambling. The system was originally designed using account-based player data to accurately assess play patterns. Complex algorithms scan the player data stored in an operator’s member data system, alerting operators to play behaviours typically observed among those scoring 8 or higher on the Problem Gambling Severity Index. During a live trial, the system was found to help staff interact with at-risk customers leading to measurable improvement in outcomes …
Even Flow : Using Microsoft Flows To Streamline Library Acquisitions Work, Carissa Thatcher
Even Flow : Using Microsoft Flows To Streamline Library Acquisitions Work, Carissa Thatcher
OVGTSL 2023: Ongoing Challenges, Creative Solutions
Have you seen the Power Automate icon in Microsoft 365 and wondered what that does? Or maybe you've heard about this thing called Flow but not sure what the big deal is? Would you like to up your acquisitions game, but not sure where to start? We'll kick off this session with Microsoft Power Automate and Flow basics such as naming conventions, expressions and variables. Then move on to the fun stuff, demonstrating how you can streamline your acquisitions processes through Microsoft Power Automate by harnessing the power of automating emails, populating SharePoint spreadsheets from a form, and how to …
Improving Network Security For High Schools In Carolina, Southeastern, And South Central Conference, Eden Sampson
Improving Network Security For High Schools In Carolina, Southeastern, And South Central Conference, Eden Sampson
Campus Research Day
Cybersecurity is a very important factor that is often overlooked until one becomes a victim of hackers and viruses. One of the main institutions that are caught off guard by cyber issues are high schools. Adventist high schools often fall into this issue as well. It is very dangerous because of the sensitive information handled on school networks as well as the financial loss that cyber security attacks may cause. Moreover, just a few Adventist high schools have IT staff who are qualified to protect the school from cyberattacks or to help with recovery. Therefore, our contribution is to create …
Sustainable Small House Project, Mollie Jo George
Sustainable Small House Project, Mollie Jo George
UNO Student Research and Creative Activity Fair
The Sustainable Small House Project was developed in cooperation with UNO/UNL Engineering, UNO Gerontology, and Metro Community College. This project merges both sustainable living with the small house movement to promote aging-in-place for older adults. This presentation describes the journey of Dr. Bing Chen as he envisioned the Sustainable Small House Project to its development and finally to implementation at its current location--west of Baxter Arena or adjacent to the UNO ballfield.
From a gerontological lens, the project focuses on principles of universal design which allows for aging-in-place, fall-detection and prevention using smart technologies such as Nobi, and voice-activated technologies …
Railroads And First Responders: A Gis Link, Jeremy Kramer
Railroads And First Responders: A Gis Link, Jeremy Kramer
Purdue Road School
The Louisville & Indiana Railroad (L&I) was awarded a $300,000 Consolidated Rail and Safety Improvements Program (CRISI) Grant to develop a geographic information mobile application linking L&I dispatch and first responders to aid communication and response during railroad incidents. This is an important development in promoting safety at rail-highway intersections.
How To Not Save The World From Covid-19: The Dire Consequences Of Giving Away The Vaccine Formula [Poster], Tristen Prouse
How To Not Save The World From Covid-19: The Dire Consequences Of Giving Away The Vaccine Formula [Poster], Tristen Prouse
Research in the Capitol
The debate over giving away the COVID-19 vaccine formula is a political hot topic. Violating intellectual property law (patents) to give away the vaccine is a tempting option for aiding other countries in the current global health crisis. In actuality, many problems exist with this proposed solution, including violating intellectual property law, disincentivizing innovation, undermining confidence in vaccine safety, harming America’s geopolitical objectives, and inefficiencies. The United States can and should aid the world in obtaining vaccines, but it should not do so by waiving patent law and giving away the vaccine formulas.
What Is Missing In Data Governance? Regulation, Board Oversight, And A New Role For Accountants, Christopher Hill, Bria I. James, Najib Sahyoun
What Is Missing In Data Governance? Regulation, Board Oversight, And A New Role For Accountants, Christopher Hill, Bria I. James, Najib Sahyoun
Posters-at-the-Capitol
By 2025, the world will produce 163 Zettabytes (ZB) of data on an annual basis. Data is displacing oil as the most productive commodity. However, poor data quality costs the U.S. economy $3.1 trillion annually. Data must be properly managed through data governance. A strong data governance program does not only maximize the value of the data resulting in optimal decision making, but also minimizes risks of data breaches, lawsuits, and reputational costs. In our research, we conducted a content analysis of the data governance literature by considering both professional and academic literature.
Our results showed that the U.S. does …
Underrepresented Adult Learners And The Enduring Pursuit Of Workplace Readiness: Achieving Postponed Career Aspirations & Dreams Through Enhanced Self-Efficacy, Patrick Guilbaud, T. Christa Guilbaud
Underrepresented Adult Learners And The Enduring Pursuit Of Workplace Readiness: Achieving Postponed Career Aspirations & Dreams Through Enhanced Self-Efficacy, Patrick Guilbaud, T. Christa Guilbaud
Adult Education Research Conference
Hands-on learning experiences support workplace readiness. This paper presents preliminary results of a study that examines impacts of a technology-based experiential learning activity on career aspirations of underrepresented adult learners.
A Low-Cost, Low-Power, Scada Testbed Solution For Secure Remote Monitoring, Connor Berger
A Low-Cost, Low-Power, Scada Testbed Solution For Secure Remote Monitoring, Connor Berger
Symposium of Student Scholars
Similar to software application systems adopted by companies and businesses for product logging, payroll, human resources, Supervisory Control and Data Acquisition (SCADA) systems control the distributed processes with multiple components located on different machines that communicate and coordinate actions in order to appear as a single coherent system. SCADA systems severely lack the appropriate security and hack prevention measures. We propose a low cost, low power SCADA testbed solution for secure remote monitoring. The goal of this research is to implement and test the testbed’s security by emulating attack vectors on both hardware components and communication channels to probe the …
Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss
Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss
KSU Proceedings on Cybersecurity Education, Research and Practice
Water quality refers to measurable water characteristics, including chemical, biological, physical, and radiological characteristics usually relative to human needs. Dumping waste and untreated sewage is the reason for water pollution and several diseases to the living hood. The quality of water can also have a significant impact on animals and plant ecosystems. Therefore, keeping track of water quality is a substantial national interest. Much research has been done for measuring water quality using sensors to prevent water pollution. In summary, those systems are built based on online and reagent-free water monitoring SCADA systems in wired networks. However, centralized servers, transmission …