Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Computer Engineering
Synthesizing Realistic Substitute Data For A Law Enforcement Database Using A Python Library, Anthony Carrola
Synthesizing Realistic Substitute Data For A Law Enforcement Database Using A Python Library, Anthony Carrola
Graduate Theses, Dissertations, and Problem Reports
In many databases, there is private or sensitive data that should not be accessible to any but a few individuals, such as HIPAA (Health Insurance Portability and Accountability Act) protected or LE (law enforcement) data. However, there is often a need to work with the data or change it for proper and thorough testing, especially for the developers . In some cases, the developers may be authorized to access and view the data, but it is rarely allowable for that data to be changed. Further, it is unlikely, especially on a large project, that all of the developers will have …
Blockchain For Trustful Collaborations Between Immigrants, Citizens And Governments, Chun-Wei Chiang
Blockchain For Trustful Collaborations Between Immigrants, Citizens And Governments, Chun-Wei Chiang
Graduate Theses, Dissertations, and Problem Reports
mmigrants usually are pro-social towards their hometowns and try to improve them. However, the lack of trust in their government can drive immigrants to work individually. As a result, their pro-social activities are usually limited in impact and scope. Although blockchain technology have the potential to solve the trust issue, people are not familiar with the technology and they have no idea why it is trustworthy. Previous research showed that the adopting user interface properly can increase people's trust in technology. This paper studies the interface factors that ease collaborations between immigrants and their home governments. We specifically focus on …