Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Naturify 2300, Yarina Yiwei Dai Jun 2024

Naturify 2300, Yarina Yiwei Dai

Masters Theses

In my art practice, I explore the interplay between human desires to manipulate and anthropomorphize nature, as seen in the technological augmentation of plants and living entities. This investigation delves into how this intersection, alongside empathy towards these creations, contributes to fears of uncontrollability and the risks of addiction and excessive dependence on technology.

Bioengineering and genetic modification have cultivated unprecedented developments, allowing humans to manipulate the fundamental building blocks of life. My research speculates on this technology further, modifying the genetic code of organisms and creating bioengineered wearable entities with enhanced traits or entirely new functionalities. The primary objective …


Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …