Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cybersecurity (4)
- Machine learning (2)
- Adversarial robustness (1)
- Augmentative and alternative communication devices (1)
- Autism spectrum disorder (1)
-
- Big Data (1)
- Classification (1)
- Collaborative environment (1)
- College of Engineering and Computing (1)
- College of Engineering ans Computing (1)
- Coming of age (1)
- Computer (1)
- Computer Science (1)
- Computer engineering (1)
- Data Analytics (1)
- Data Mining (1)
- Data augmentation (1)
- Data fusion (1)
- Data processing (1)
- Deep learning (1)
- Electronic eyes (1)
- Electronic nose (1)
- Electronic tongue (1)
- Employees (1)
- Encryption (1)
- Engagement factors (1)
- Engineering (1)
- Gender (1)
- Generational group (1)
- Graduate (1)
- Publication Year
- Publication
- Publication Type
Articles 1 - 30 of 170
Full-Text Articles in Engineering
Assessment Of E-Senses Performance Through Machine Learning Models For Colombian Herbal Teas Classification, Jeniffer Katerine Carrillo, Cristhian Manuel Durán, Juan Martin Cáceres, Carlos Alberto Cuastumal, Jordana Ferreira, José Ramos, Brian Bahder, Martin Oates, Antonio Ruiz
Assessment Of E-Senses Performance Through Machine Learning Models For Colombian Herbal Teas Classification, Jeniffer Katerine Carrillo, Cristhian Manuel Durán, Juan Martin Cáceres, Carlos Alberto Cuastumal, Jordana Ferreira, José Ramos, Brian Bahder, Martin Oates, Antonio Ruiz
CCE Faculty Articles
This paper describes different E-Senses systems, such as Electronic Nose, Electronic Tongue, and Electronic Eyes, which were used to build several machine learning models and assess their performance in classifying a variety of Colombian herbal tea brands such as Albahaca, Frutos Verdes, Jaibel, Toronjil, and Toute. To do this, a set of Colombian herbal tea samples were previously acquired from the instruments and processed through multivariate data analysis techniques (principal component analysis and linear discriminant analysis) to feed the support vector machine, K-nearest neighbors, decision trees, naive Bayes, and random forests algorithms. The results of the E-Senses were validated using …
Pii-Codex: A Python Library For Pii Detection, Categorization, And Severity Assessment, Eidan J. Rosado
Pii-Codex: A Python Library For Pii Detection, Categorization, And Severity Assessment, Eidan J. Rosado
CCE Faculty Articles
[Summary] There have been a number of advancements in the detection of personal identifiable information (PII) and scrubbing libraries to aid developers and researchers in their detection and anonymization efforts. With the recent shift in data handling procedures and global policy implementations regarding identifying information, it is becoming more important for data consumers to be aware of what data needs to be scrubbed, why it’s being scrubbed, and to have the means to perform said scrubbing. PII-Codex is a collection of extended theoretical, conceptual, and policy works in PII categorization and severity assessment (Milne et al., 2016; Schwartz & Solove, …
Adversarial Training Of Deep Neural Networks, Anabetsy Termini
Adversarial Training Of Deep Neural Networks, Anabetsy Termini
CCE Theses and Dissertations
Deep neural networks used for image classification are highly susceptible to adversarial attacks. The de facto method to increase adversarial robustness is to train neural networks with a mixture of adversarial images and unperturbed images. However, this method leads to robust overfitting, where the network primarily learns to recognize one specific type of attack used to generate the images while remaining vulnerable to others after training. In this dissertation, we performed a rigorous study to understand whether combinations of state of the art data augmentation methods with Stochastic Weight Averaging improve adversarial robustness and diminish adversarial overfitting across a wide …
Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King
Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King
CCE Theses and Dissertations
It is estimated that over half of all information systems security breaches are due directly or indirectly to the poor security practices of an organization’s employees. Previous research has shown neutralization techniques as having influence on the intent to violate information security policy. In this study, we proposed an expansion of the neutralization model by including the effects of business and ethical orientation of individuals on their tendencies to neutralize and compromise with information security policy. Additionally, constructs from social influences and pressures have been integrated into this model to measure the impact on the intent to violate information security …
Improving Employees’ Compliance With Password Policies, Enas Albataineh
Improving Employees’ Compliance With Password Policies, Enas Albataineh
CCE Theses and Dissertations
Employees’ lack of compliance with password policies increases password susceptibility, which leads to financial damages to the organizations as a result of information disclosure, fraud, and unauthorized transactions. However, few studies have examined what motivates employees to comply with password policies.
The purpose of this quantitative cross-sectional study was to examine what factors influence employees’ compliance with password policies. A theoretical model was developed based on Protection Motivation Theory (PMT), General Deterrence Theory (GDT), Theory of Reasoned Action (TRA), and Psychological Ownership Theory to explain employees’ compliance with password policies.
A non-probability convenience sample was employed. The sample consisted of …
Pause For A Cybersecurity Cause: Assessing The Influence Of A Waiting Period On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci
Pause For A Cybersecurity Cause: Assessing The Influence Of A Waiting Period On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci
CCE Theses and Dissertations
Social engineering costs organizations billions of dollars a year. Social engineering exploits the weakest link of information security systems, the people who are using them. Phishing is a form of social engineering in which the perpetrator depends on the victim’s instinctual thinking towards an email designed to create a fear or excitement response. It is well-documented in literature that users continue to click on phishing emails costing them and their employers significant monetary resources and data loss. Training does not appear to mitigate the effects of phishing much; other solutions are necessary to mitigate phishing.
Kahneman introduced the concepts of …
A Study Of Factors That Influence Symbol Selection On Augmentative And Alternative Communication Devices For Individuals With Autism Spectrum Disorder, William Todd Dauterman
A Study Of Factors That Influence Symbol Selection On Augmentative And Alternative Communication Devices For Individuals With Autism Spectrum Disorder, William Todd Dauterman
CCE Theses and Dissertations
According to the American Academy of Pediatrics (AAP), 1 in 59 children are diagnosed with Autism Spectrum Disorder (ASD) each year. Given the complexity of ASD and how it is manifested in individuals, the execution of proper interventions is difficult. One major area of concern is how individuals with ASD who have limited communication skills are taught to communicate using Augmentative and Alternative Communication devices (AAC). AACs are portable electronic devices that facilitate communication by using audibles, signs, gestures, and picture symbols. Traditionally, Speech-Language Pathologists (SLPs) are the primary facilitators of AAC devices and help establish the language individuals with …
An Empirical Assessment Of Users' Information Security Protection Behavior Towards Social Engineering Breaches, Nisha Jatin Patel
An Empirical Assessment Of Users' Information Security Protection Behavior Towards Social Engineering Breaches, Nisha Jatin Patel
CCE Theses and Dissertations
User behavior is one of the most significant information security risks. Information Security is all about being aware of who and what to trust and behaving accordingly. Due to technology becoming an integral part of nearly everything in people's daily lives, the organization's need for protection from security threats has continuously increased. Social engineering is the act of tricking a user into revealing information or taking action. One of the riskiest aspects of social engineering is that it depends mainly upon user errors and is not necessarily a technology shortcoming. User behavior should be one of the first apprehensions when …
College Of Computing And Engineering Graduate Catalog 2020-2021, Nova Southeastern University
College Of Computing And Engineering Graduate Catalog 2020-2021, Nova Southeastern University
College of Engineering and Computing Course Catalogs
No abstract provided.
Nsu Student Handbook 2019-2020, Nova Southeastern University
Nsu Student Handbook 2019-2020, Nova Southeastern University
College of Engineering and Computing Course Catalogs
No abstract provided.
College Of Computing And Engineering Graduate Catalog 2019-2020, Nova Southeastern University
College Of Computing And Engineering Graduate Catalog 2019-2020, Nova Southeastern University
College of Engineering and Computing Course Catalogs
No abstract provided.
Sr Education Group, A Leading Education Research Publisher, Ranked Nova Southeastern University (Nsu) Within Their 2019 Lists Of Best Online Colleges, Nova Southeastern University
Sr Education Group, A Leading Education Research Publisher, Ranked Nova Southeastern University (Nsu) Within Their 2019 Lists Of Best Online Colleges, Nova Southeastern University
College of Computing and Engineering News Archive
SR Education Group, a leading education research publisher, ranked Nova Southeastern University (NSU) within their 2019 lists of best online colleges. The group recognized NSU’s College of Computing and Engineering for its Master of Science in Computer Science and Engineering program, ranking it 13 out of 19 in “Best Online Master's in Computer Science Programs.” The college was also ranked 6 out of 8 for “Best Online Master's in Information Technology (IT) Degrees.”
Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle
Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle
CCE Theses and Dissertations
Medical literature identifies a number of technology-driven improvements in disease management such as implantable medical devices (IMDs) that are a standard treatment for candidates with specific diseases. Among patients using implantable cardiac defibrillators (ICD), for example, problems and issues are being discovered faster compared to patients without monitoring, improving safety. What is not known is why patients report not feeling safer, creating a safety paradox, and why patients identify privacy concerns in ICD monitoring.
There is a major gap in the literature regarding the factors that contribute to perceived safety and privacy in remote patient monitoring (RPM). To address this …
Master Of Science In Computer Science, Nova Southeastern University
Master Of Science In Computer Science, Nova Southeastern University
College of Engineering and Computing Course Catalogs
No abstract provided.
Master In Management Information Systems, Nova Southeastern University
Master In Management Information Systems, Nova Southeastern University
College of Engineering and Computing Course Catalogs
No abstract provided.
Master Of Science In Computer Science, Nova Southeastern University
Master Of Science In Computer Science, Nova Southeastern University
College of Engineering and Computing Course Catalogs
No abstract provided.
Master Of Science In Cybersecurity Management, Nova Southeastern University
Master Of Science In Cybersecurity Management, Nova Southeastern University
College of Engineering and Computing Course Catalogs
No abstract provided.
Doctor Of Philosophy In Computer Science, Nova Southeastern University
Doctor Of Philosophy In Computer Science, Nova Southeastern University
College of Engineering and Computing Course Catalogs
No abstract provided.
Master Of Science In Information Technology, Nova Southeastern University
Master Of Science In Information Technology, Nova Southeastern University
College of Engineering and Computing Course Catalogs
No abstract provided.
Master Of Science In Information Systems, Nova Southeastern University
Master Of Science In Information Systems, Nova Southeastern University
College of Engineering and Computing Course Catalogs
No abstract provided.
Doctor Of Philosophy In Information Assurance, Nova Southeastern University
Doctor Of Philosophy In Information Assurance, Nova Southeastern University
College of Engineering and Computing Course Catalogs
No abstract provided.
Doctor Of Philosophy In Information Systems, Nova Southeastern University
Doctor Of Philosophy In Information Systems, Nova Southeastern University
College of Engineering and Computing Course Catalogs
No abstract provided.
Perceptions Of Female Cybersecurity Professionals Toward Factors That Encourage Females To The Cybersecurity Field, Kembley Kay Lingelbach
Perceptions Of Female Cybersecurity Professionals Toward Factors That Encourage Females To The Cybersecurity Field, Kembley Kay Lingelbach
CCE Theses and Dissertations
Despite multiple national, educational, and industry initiatives, women continue to be underrepresented in the cybersecurity field. Only 11% of cybersecurity professionals, globally, are female. This contributes to the growing overall shortage of workers in the field. This research addressed the significant underrepresentation of females in the cybersecurity workforce. There are many practitioner and industry studies that suggest self-efficacy, discrimination and organizational culture play important roles in the low rate of women in the cybersecurity field. A limited number of scholarly studies identify causal factors; however, there is not a general consensus or framework to explain the problem thoroughly. Moreover, there …
Exploring Generational Differences In Text Messaging Usage And Habits, Daniel Wayne Long
Exploring Generational Differences In Text Messaging Usage And Habits, Daniel Wayne Long
CCE Theses and Dissertations
Members of society today embrace multiple communication media for various purposes and intents. Text messaging has been identified as the medium of choice for continual relationship maintenance and text messaging from mobile devices overshadows all other media forms for the support of social connections. Text messaging is changing everything from how operators market their plans to how advertisers and service providers reach consumers. But just as technology usage of social media and internet access are different across generational boundaries, text messaging usage and habits may also be different for various generational groups. The majority of peer-reviewed research regarding text messaging …
Master Of Science In Information Assurance And Cybersecurity, Nova Southeastern University
Master Of Science In Information Assurance And Cybersecurity, Nova Southeastern University
College of Engineering and Computing Course Catalogs
No abstract provided.
Master Of Science In Information Assurance And Cybersecurity, Nova Southeastern University
Master Of Science In Information Assurance And Cybersecurity, Nova Southeastern University
College of Engineering and Computing Course Catalogs
No abstract provided.
Distinguished Alumni Luncheon With Dr. Wayne A. Brown, Nova Southeastern University
Distinguished Alumni Luncheon With Dr. Wayne A. Brown, Nova Southeastern University
College of Computing and Engineering News Archive
Last week on November 9th, 2017, Dr. Tao and Dr. Abramson had the pleasure of honoring CCE's distinguished alumni Dr. Wayne A. Brown as part of the NSU's Homecoming festivities.
Robert B. Batie Jr., Ph.D., Nova Southeastern University
Robert B. Batie Jr., Ph.D., Nova Southeastern University
College of Computing and Engineering News Archive
It’s a safe bet to say that Robert B. Batie Jr., Ph.D., has seen a thing or two. Given his 22 years in the U.S. Army, it’s pretty clear to understand why. That’s because in those 2+ decades he traveled to 33 foreign countries, 41 of the 50 states and visited every continent aside from Antarctica and Australia. And it was his chosen occupation while serving in the U.S. Army – Signal Corp as a Communications Security (COMSEC) Maintenance Chief – that led him to where he is today.
Cce Hosts Shbe Workshop, Nova Southeastern University
Cce Hosts Shbe Workshop, Nova Southeastern University
College of Computing and Engineering News Archive
Dr. Yong Tao, Dean and Professor, College of Computing and Engineering hosted the Interdisciplinary Data Structure for Collaborative Research in Sustainable Human-Building Ecosystems (SHBE) Workshop on June 5-6 at NSU Art Museum with the support from Bonnie Clearwater, Director and Chief Curator of NSU Art Museum. The workshop was aimed at bringing together professionals from multiple disciplines, i.e., architects, civil engineers, electrical engineers, mechanical engineers, computer scientists, social scientists, psychologists, and social/ public policy experts.
Cec Congratulates 2017 Dean's List, Nova Southeastern University
Cec Congratulates 2017 Dean's List, Nova Southeastern University
College of Computing and Engineering News Archive
College of Computing and Engineering at NSU (CCE) held its Fall 2017 Dean’s List reception on April 25. 18 undergraduate students major in computer science, computer engineering, information technology and engineering are on the 2017 Dean’s List and have achieved a minimum GPA of 3.8 for the semester. They are: Franco Criscola, Christopher Daniels, Maximiliano Hernandez, Liana Huynh, Abraham Kohn, Brogan O’Connor, Sagar Patel, Liam White, Karen Rita Ann D’Lima, Ashli Amoy Jarrett, Anthony DiFede, Corey Lee, Nicole Staley, Simon Wang, Lydia Warshaw, Albert Baldoni, Henry Koenig, Nikolas Kevorkian.