Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Engineering

The Free Education Project: Higher Education Funding, E2 Implementation, And Crowdsourcing Crypto Development, Louis Carter, John R. Ziegler, Ovidui Purice, Edward Lehner Ph.D. Dec 2019

The Free Education Project: Higher Education Funding, E2 Implementation, And Crowdsourcing Crypto Development, Louis Carter, John R. Ziegler, Ovidui Purice, Edward Lehner Ph.D.

Publications and Research

This short paper, written in three different sections, explores how a cryptocurrency’s issuance and network effects could fund higher education. Synthesizing research from the Bronx Community College Cryptocurrency Research Lab, Bernard Lietaer’s notion of creating money for the needs of society, lessons learned by Galia Benartzi and the Hearts Project, and an exploration of how communities coalesce around open-source cryptocurrency projects, the authors provide an overview of the problem of funding higher education, the ways in which money that is needed could be created, and the key components to building a highly effective developer community. These three distinct yet vitally …


Mitigating Colluding Attacks In Online Social Networks And Crowdsourcing Platforms, Georges Arsene K. Kamhoua Jun 2019

Mitigating Colluding Attacks In Online Social Networks And Crowdsourcing Platforms, Georges Arsene K. Kamhoua

FIU Electronic Theses and Dissertations

Online Social Networks (OSNs) have created new ways for people to communicate, and for companies to engage their customers -- with these new avenues for communication come new vulnerabilities that can be exploited by attackers. This dissertation aims to investigate two attack models: Identity Clone Attacks (ICA) and Reconnaissance Attacks (RA). During an ICA, attackers impersonate users in a network and attempt to infiltrate social circles and extract confidential information. In an RA, attackers gather information on a target's resources, employees, and relationships with other entities over public venues such as OSNs and company websites. This was made easier for …