Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

Synthesizing Realistic Substitute Data For A Law Enforcement Database Using A Python Library, Anthony Carrola Jan 2022

Synthesizing Realistic Substitute Data For A Law Enforcement Database Using A Python Library, Anthony Carrola

Graduate Theses, Dissertations, and Problem Reports

In many databases, there is private or sensitive data that should not be accessible to any but a few individuals, such as HIPAA (Health Insurance Portability and Accountability Act) protected or LE (law enforcement) data. However, there is often a need to work with the data or change it for proper and thorough testing, especially for the developers . In some cases, the developers may be authorized to access and view the data, but it is rarely allowable for that data to be changed. Further, it is unlikely, especially on a large project, that all of the developers will have …


Blockchain For Trustful Collaborations Between Immigrants, Citizens And Governments, Chun-Wei Chiang Jan 2018

Blockchain For Trustful Collaborations Between Immigrants, Citizens And Governments, Chun-Wei Chiang

Graduate Theses, Dissertations, and Problem Reports

mmigrants usually are pro-social towards their hometowns and try to improve them. However, the lack of trust in their government can drive immigrants to work individually. As a result, their pro-social activities are usually limited in impact and scope. Although blockchain technology have the potential to solve the trust issue, people are not familiar with the technology and they have no idea why it is trustworthy. Previous research showed that the adopting user interface properly can increase people's trust in technology. This paper studies the interface factors that ease collaborations between immigrants and their home governments. We specifically focus on …