Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

PDF

2013

Institution
Keyword
Publication
Publication Type

Articles 31 - 60 of 72

Full-Text Articles in Computer Engineering

Data Mining The Harness Track And Predicting Outcomes, Robert P. Schumaker Apr 2013

Data Mining The Harness Track And Predicting Outcomes, Robert P. Schumaker

Journal of International Technology and Information Management

This paper presented the S&C Racing system that uses Support Vector Regression (SVR) to predict harness race finishes and analyzed it on fifteen months of data from Northfield Park. We found that our system outperforms the most common betting strategies of wagering on the favorites and the mathematical arbitrage Dr. Z system in five of the seven wager types tested. This work would suggest that an informational inequality exists within the harness racing market that is not apparent to domain experts.


Engineering Innovative Mobile Data Services: Developing A Model For Value Network Analysis And Design, Mutaz M. Al-Debei, Enas M. Al-Lozi, Guy Fitzgerald Apr 2013

Engineering Innovative Mobile Data Services: Developing A Model For Value Network Analysis And Design, Mutaz M. Al-Debei, Enas M. Al-Lozi, Guy Fitzgerald

Dr. Mutaz M. Al-Debei

Purpose – This study aims to analytically develop a reference model for engineering (i.e. analysis, design, development, evaluation, delivery, maintenance, modification, and management) powerful value networks capable of creating innovative mobile data services. Design/methodology/approach – The paradigm followed is that of Design-Science Research (DSR) which incorporates two main iterative processes: build and evaluate. For building the model (i.e. the design science artifact in this research), we followed three iterations: (1) Literature Review Analysis; (2) Semi-Structured Interviews analyzed through content analysis; and (3) examination of real-life case studies. But for evaluating the model, we utilized the NTT DoCoMo’s i-mode case. Findings …


The Influence Of Social Networking Technology In An Engineering Organization, Derrick Marcus Tepaske Apr 2013

The Influence Of Social Networking Technology In An Engineering Organization, Derrick Marcus Tepaske

Engineering Management & Systems Engineering Projects for D. Eng. Degree

Computer facilitated Social Networking (SN) is becoming more prevalent in our society, both in our personal and professional lives. As its use grows, there is a desire to determine how it will impact an organization. If it can positively impact an organization then it is an initiative that could be embraced and leveraged for any number of business related activities from marketing to engineering. This project develops and implements a social networking treatment for an engineering organization in order to determine how it impacts the responsiveness and performance of the organization. The treatment includes an online tool, a training package, …


To Internet Or Not To Internet: Ethics Opinions On Internet Usage, Sharon Bradley Mar 2013

To Internet Or Not To Internet: Ethics Opinions On Internet Usage, Sharon Bradley

Continuing Legal Education Presentations

Considers the ethical implications of using email to communicate with clients, using cloud storage for legal files, and tracking people related to a case via the Internet . Highlights recent state bar ethics committee decisions.


Finding A Virtual Trail: Investigative Research On The Web, Suzanne R. Graham Mar 2013

Finding A Virtual Trail: Investigative Research On The Web, Suzanne R. Graham

Continuing Legal Education Presentations

Provides tips and resources for finding information about people and businesses on the Internet. Focuses on finding vital data, asset information, and criminal history.


Rolling In The Deep, Dark Web: Advanced Internet Searching, Anne Burnett Mar 2013

Rolling In The Deep, Dark Web: Advanced Internet Searching, Anne Burnett

Continuing Legal Education Presentations

Shares effective search strategies to improve search engine results and discusses efforts to capture and index more of the deep web for retrieval.


A Value-Based Approach For Explaining The Adoption Intention Of Mobile Data Services, Mutaz M. Al-Debei Mar 2013

A Value-Based Approach For Explaining The Adoption Intention Of Mobile Data Services, Mutaz M. Al-Debei

Dr. Mutaz M. Al-Debei

This study aims at explaining the factors affecting the adoption intention of mobile data services from the perspective of consumers as users. In this study we focus on the value users can potentially gain from using these services. We hypothesize that if we can examine users' utilitarian, hedonic, uniqueness, epistemic and economic value, then we can explain and predict their intention to use mobile data services. Our results show that utilitarian value is according to previous studies an important adoption factor. Additionally, economic value is also important and significant. Nevertheless, it seems that in our context, hedonic, uniqueness, and epistemic …


Cfp: Handbook Of Research On Technological Applications And Innovation For Economic Development, Deogratias Harorimana Mr Mar 2013

Cfp: Handbook Of Research On Technological Applications And Innovation For Economic Development, Deogratias Harorimana Mr

Dr Deogratias Harorimana

The innovation in the 21st century goes significantly beyond the high-tech picture driven by small or large industry clusters in a specific region-typically Silicon Valley and M4Corridor. The future of innovation will lie within knowledge management and seamless technological applications. These will be supported by planned funding strategies, possibly with clients as drivers of the innovation. This view seems to be supported by the UK government “Technology and Innovation Futures” (2011); the USA government (2011), study into which leading scholars concede that the future innovation and technological applications for economic growth will include products and processes, improvements in areas such …


Semantics-Based Automated Quality Assessment Of Depression Treatment Web Documents, Yanjun Zhang Feb 2013

Semantics-Based Automated Quality Assessment Of Depression Treatment Web Documents, Yanjun Zhang

Electronic Thesis and Dissertation Repository

The past decade has witnessed a dramatic expansion in the amount of publicly available health care information on the Web. The health care information on the web, however, is of extremely variable quality. The evaluation of content quality is a big challenge because non-automated methods for information content rating can be easily overwhelmed by the huge data volume. This study proposes an automated approach for assessing the quality of web health care information through comparing the text content with evidence-based health care recommendations. This method relies on semantic analysis and text classification to identify the presentation of evidence-based recommendations in …


Greek Patent Protection System And The Impacts Of Information Technology Industry, Emmanouil Alexander Zografakis Ez Feb 2013

Greek Patent Protection System And The Impacts Of Information Technology Industry, Emmanouil Alexander Zografakis Ez

Emmanouil Alexander Zografakis EZ

Our era can be characterized as the era of knowledge proliferation and bountifulness. That has marked our era as the era following the pace of the Information Society Development. Information Society has also brought about a remarkable IT development pace over countries. Thereby, it is greatly important all that raw knowledge to become mind figments, ideas and even inventions and innovations. It is also essential to highlight that such a beneficial process will ensure the continuity of the IT development. The only way to achieve that goal is to find a way to secure all that aforementioned knowledge which is …


The Effective Use Of Research Tools And Resources, Nader Ale Ebrahim Jan 2013

The Effective Use Of Research Tools And Resources, Nader Ale Ebrahim

Nader Ale Ebrahim

This presentation is prepared to help scholars who seek to reduce the search time by extending the knowledge of researchers to more effectively use the “Research Tools" that are available through the Net.


System-Generated Digital Forensic Evidence In Graphic Design Applications, Enos Mabuto, Hein Venter Jan 2013

System-Generated Digital Forensic Evidence In Graphic Design Applications, Enos Mabuto, Hein Venter

Journal of Digital Forensics, Security and Law

Graphic design applications are often used for the editing and design of digital art. The same applications can be used for creating counterfeit documents such as identity documents (IDs), driver’s licences, passports, etc. However, the use of any graphic design application leaves behind traces of digital information that can be used during a digital forensic investigation. Current digital forensic tools examine a system to find digital evidence, but they do not examine a system specifically for the creating of counterfeit documents created through the use of graphic design applications. The paper in hand reviews the system-generated digital forensic evidence gathered …


Book Review: Iphone And Ios Forensic: Investigation, Analysis And Mobile Security For Apple Iphone, Ipad And Ios Devices, Simson Garfinkel Jan 2013

Book Review: Iphone And Ios Forensic: Investigation, Analysis And Mobile Security For Apple Iphone, Ipad And Ios Devices, Simson Garfinkel

Journal of Digital Forensics, Security and Law

In April 2011 news outlets around the world revealed shocking news about Apple’s iPhone: for reasons that were not apparently clear, every iPhone contained a small SQLite database that logged where and when the user had been whenever the phone was turned on, and those records went back for pretty much as long as the user had owned their phone. Apple eventually declared that the data cache was the result of a bug and issued a software update to prune the database (it had previously grown without limit). Privacy activists rejoiced that their beloved iPhones were once again trustworthy. But …


Geospatial Virtual Heritage: A Gesture-Based 3d Gis To Engage The Public With Ancient Maya Archaeology, Heather Richards-Rissetto, Jim Robertsson, Jennifer Von Schwerin, Giorgio Agugario, Fabio Remondino, Gabrio Girardi Jan 2013

Geospatial Virtual Heritage: A Gesture-Based 3d Gis To Engage The Public With Ancient Maya Archaeology, Heather Richards-Rissetto, Jim Robertsson, Jennifer Von Schwerin, Giorgio Agugario, Fabio Remondino, Gabrio Girardi

Department of Anthropology: Faculty Publications

This paper presents our research to develop a gesture-based 3D GIS system to engage the public in cultural heritage. It compares two types of interaction—device-based vs. natural interaction— and summarizes the beta-testing results of a 3D GIS tool for archaeology, called QueryArch3D, in which participants used device-based interaction (i.e. mouse and keyboard). It follows with a description of the gesture-based system—that we developed in response to these beta-tests. The system uses QueryArch3D and Microsoft’s Kinect to enable people use body movements (in lieu of keyboard or mouse) to navigate a virtual reality landscape, query 3D objects, and call up photos, …


Applying Mobile Application Development To Help Dementia And Alzheimer Patients, Jean F. Coppola Phd, Marc A. Kowtko, Christina Yamagata, Shannon Joyce Jan 2013

Applying Mobile Application Development To Help Dementia And Alzheimer Patients, Jean F. Coppola Phd, Marc A. Kowtko, Christina Yamagata, Shannon Joyce

Wilson Center for Social Entrepreneurship

Caregiver anecdotes attest that music and photographs play an important role for family members diagnosed with Alzheimer’s disease (AD), even those with severe AD. Tablets and iPads, which are prevalent, can be utilized with dementia patients in portraying favorite music and family photographs via apps developed in close partnership with geriatric facilities. This study addresses cognitive functioning and quality of life for people diagnosed with dementia via technology. Research has shown that technology instruments such as iPods, help stimulate those with dementia. This study focuses on innovative devices such as iPads and tablets, which are mainstream and easy to use, …


Maximizing Resource Utilization In Video Streaming Systems, Mohammad A. Alsmirat Jan 2013

Maximizing Resource Utilization In Video Streaming Systems, Mohammad A. Alsmirat

Wayne State University Dissertations

Video streaming has recently grown dramatically in popularity over the Internet, Cable TV, and wire-less networks. Because of the resource demanding nature of video streaming applications, maximizing resource utilization in any video streaming system is a key factor to increase the scalability and decrease the cost of the system. Resources to utilize include server bandwidth, network bandwidth, battery life in battery operated devices, and processing time in limited processing power devices. In this work, we propose new techniques to maximize the utilization of video-on-demand (VOD) server resources. In addition to that, we propose new framework to maximize the utilization of …


The Quality And Acceptance Of Websites: An Empirical Investigation In The Context Of Higher Education, Mutaz M. Al-Debei Jan 2013

The Quality And Acceptance Of Websites: An Empirical Investigation In The Context Of Higher Education, Mutaz M. Al-Debei

Dr. Mutaz M. Al-Debei

The aim of this study is to explain the main factors affecting behavioural intentions of students to regularly use university websites in the future. Universities are investing millions of dollars in developing high quality websites as they believe that this course of action can provide them with significant strategic benefits. Notwithstanding, little is known about what attracts students to regularly use university websites and our understanding in this context is by no means complete. Aiming to advance our knowledge in this domain, this study utilises a novel model that is developed on the basis of three well-established theories in the …


Developing And Implementing A Web Portal Success Model, Dima Jalal, Mutaz M. Al-Debei Jan 2013

Developing And Implementing A Web Portal Success Model, Dima Jalal, Mutaz M. Al-Debei

Dr. Mutaz M. Al-Debei

The emergence and subsequent spreading of new technologies, such as Web portals, has changed the way people handle information, communicate, share knowledge, and perform tasks. The use of different information technologies and systems offers the potential for substantially improving performance not only at the organizational level but also at the individual level. However, performance gains are often obstructed by users' unwillingness to accept and use available systems and technologies. This paper aims at examining the role of Web portals in improving the overall performance at the individual level in terms of task productivity and innovation, customer satisfaction, and management control. …


Measuring Web Portals Success: A Respecification And Validation Of The Delone And Mclean Information Systems Success Model, Mutaz M. Al-Debei, Dima Jalal, Enas Al-Lozi Jan 2013

Measuring Web Portals Success: A Respecification And Validation Of The Delone And Mclean Information Systems Success Model, Mutaz M. Al-Debei, Dima Jalal, Enas Al-Lozi

Dr. Mutaz M. Al-Debei

The main aim of this research is to investigate the role of web portals in improving job performance at the individual level from the perspective of employees as users. This is deemed significant as yet little research has assessed the success of web portals in delivering benefits at the individual level in terms of improved performance in developing countries. The DeLone and McLean IS success model was used as a foundational theory and then was refined to match the context of the current research. In fact, the functions and features of portals were identified, clustered and then linked to portals’ …


Approaches That Will Yield Greater Success When Implementing Self-Administered Electronic Data Capture Ict Systems In The Developing World With An Illiterate Or Semi-Literate Population, Stanley J. Mierzwa, Samir Souidi, Irene Friedland, Sarah A. Littlefield, Lauren L. Katzen, Craig Savel, Deborah Boccio, Saumya Ramarao Jan 2013

Approaches That Will Yield Greater Success When Implementing Self-Administered Electronic Data Capture Ict Systems In The Developing World With An Illiterate Or Semi-Literate Population, Stanley J. Mierzwa, Samir Souidi, Irene Friedland, Sarah A. Littlefield, Lauren L. Katzen, Craig Savel, Deborah Boccio, Saumya Ramarao

Reproductive Health

The Information Technology (IT) Group at the Population Council responded to a need for a technology solution that would help researchers obtain more accurate responses to survey questions that concerned subject matter of a sensitive nature. The IT Group had three goals: (1) to enhance research by obtaining the best data possible, (2) to operate successfully in the local environment and be welcomed by the local populations, and (3) to increase the efficiency and cost-effectiveness of the survey process. This paper outlines approaches to consider when designing and implementing self-administered information and communications technology (ICT) questionnaires in developing countries, and …


Book Review: Professional Penetration Testing: Creating And Learning In A Hacking Lab 2e, Joshua Bartolomie Jan 2013

Book Review: Professional Penetration Testing: Creating And Learning In A Hacking Lab 2e, Joshua Bartolomie

Journal of Digital Forensics, Security and Law

Organizations often strive for proactive information security programs in an effort to limit occurrence and impact of security breaches. However, traditional security programs run the risk of being unable to provide adequate insight and proactive awareness into real attack vectors that may exist within their organizations. With attack methods and efforts becoming increasingly aggressive, and effective, organizations must take equally assertive measures to protect their critical information and assets. Penetration testing is one of those tools that is often misunderstood, overlooked, and undervalued. A true adversary would not hesitate to exploit every potential to gain entry or cause a disruption …


Using Power-Law Properties Of Social Groups For Cloud Defense And Community Detection, Justin L. Rice Jan 2013

Using Power-Law Properties Of Social Groups For Cloud Defense And Community Detection, Justin L. Rice

Doctoral Dissertations

The power-law distribution can be used to describe various aspects of social group behavior. For mussels, sociobiological research has shown that the Lévy walk best describes their self-organizing movement strategy. A mussel's step length is drawn from a power-law distribution, and its direction is drawn from a uniform distribution. In the area of social networks, theories such as preferential attachment seek to explain why the degree distribution tends to be scale-free. The aim of this dissertation is to glean insight from these works to help solve problems in two domains: cloud computing systems and community detection.

Privacy and security are …


Measuring Inconsistency Methods For Evidentiary Value, Fred Cohen Jan 2013

Measuring Inconsistency Methods For Evidentiary Value, Fred Cohen

Journal of Digital Forensics, Security and Law

Many inconsistency analysis methods may be used to detect altered records or statements. But for admission as evidence, the reliability of the method has to be determined and measured. For example, in China, for evidence to be admitted, it has to have 95% certainty of being correct,1 and that certainty must be shown to the court, while in the US, evidence is admitted if it is more probative than prejudicial (a >50% standard).2 In either case, it is necessary to provide a measurement of some sort in order to pass muster under challenges from the other side. And in most …


A Simple Experiment With Microsoft Office 2010 And Windows 7 Utilizing Digital Forensic Methodology, Gregory H. Carlton Jan 2013

A Simple Experiment With Microsoft Office 2010 And Windows 7 Utilizing Digital Forensic Methodology, Gregory H. Carlton

Journal of Digital Forensics, Security and Law

Digital forensic examiners are tasked with retrieving data from digital storage devices, and frequently these examiners are expected to explain the circumstances that led to the data being in its current state. Through written reports or verbal, expert testimony delivered in court, digital forensic examiners are expected to describe whether data have been altered, and if so, then to what extent have data been altered. Addressing these expectations results from opinions digital forensic examiners reach concerning their understanding of electronic storage and retrieval methods. The credibility of these opinions evolves from the scientific basis from which they are drawn using …


How Often Is Employee Anger An Insider Risk I? Detecting And Measuring Negative Sentiment Versus Insider Risk In Digital Communications, Eric Shaw, Maria Payri, Michael Cohn, Ilene R. Shaw Jan 2013

How Often Is Employee Anger An Insider Risk I? Detecting And Measuring Negative Sentiment Versus Insider Risk In Digital Communications, Eric Shaw, Maria Payri, Michael Cohn, Ilene R. Shaw

Journal of Digital Forensics, Security and Law

This research introduced two new scales for the identification and measurement of negative sentiment and insider risk in communications in order to examine the unexplored relationship between these two constructs. The inter-rater reliability and criterion validity of the Scale of Negativity in Texts (SNIT) and the Scale of Insider Risk in Digital Communications (SIRDC) were established with a random sample of email from the Enron archive and criterion measures from established insiders, disgruntled employees, suicidal, depressed, angry, anxious, and other sampled groups. In addition, the sensitivity of the scales to changes over time as the risk of digital attack increased …


Technology Corner Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle Jan 2013

Technology Corner Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle

Journal of Digital Forensics, Security and Law

Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example: network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an …


Table Of Contents Jan 2013

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Automating Vendor Fraud Detection In Enterprise Systems, Kishore Singh, Peter Best, Joseph Mula Jan 2013

Automating Vendor Fraud Detection In Enterprise Systems, Kishore Singh, Peter Best, Joseph Mula

Journal of Digital Forensics, Security and Law

Fraud is a multi-billion dollar industry that continues to grow annually. Many organizations are poorly prepared to prevent and detect fraud. Fraud detection strategies are intended to quickly and efficiently identify fraudulent activities that circumvent preventative measures. In this paper, we adopt a DesignScience methodological framework to develop a model for detection of vendor fraud based on analysis of patterns or signatures identified in enterprise system audit trails. The concept is demonstrated by developing prototype software. Verification of the prototype is achieved by performing a series of experiments. Validation is achieved by independent reviews from auditing practitioners. Key findings of …


Information Security Challenge Of Qr Codes, Nik Thompson, Kevin Lee Jan 2013

Information Security Challenge Of Qr Codes, Nik Thompson, Kevin Lee

Journal of Digital Forensics, Security and Law

The discipline of information security must adapt to new technologies and methods of interaction with those technologies. New technologies present both challenges and opportunities for the security professional, especially for areas such as digital forensics. Challenges can be in the form of new devices such as smartphones or new methods of sharing information, such as social networks. One such rapidly emerging interaction technology is the use of Quick Response (QR) codes. These offer a physical mechanism for quick access to Web sites for advertising and social interaction. This paper argues that the common implementation of QR codes potentially presents security …


How Often Is Employee Anger An Insider Risk Ii? Detecting And Measuring Negative Sentiment Versus Insider Risk In Digital Communications–Comparison Between Human Raters And Psycholinguistic Software, Eric Shaw, Maria Payri, Michael Cohn, Ilene R. Shaw Jan 2013

How Often Is Employee Anger An Insider Risk Ii? Detecting And Measuring Negative Sentiment Versus Insider Risk In Digital Communications–Comparison Between Human Raters And Psycholinguistic Software, Eric Shaw, Maria Payri, Michael Cohn, Ilene R. Shaw

Journal of Digital Forensics, Security and Law

This research uses two recently introduced observer rating scales, (Shaw et al., 2013) for the identification and measurement of negative sentiment (the Scale for Negativity in Text or SNIT) and insider risk (Scale of Indicators of Risk in Digital Communication or SIRDC) in communications to test the performance of psycholinguistic software designed to detect indicators of these risk factors. The psycholinguistic software program, WarmTouch (WT), previously used for investigations, appeared to be an effective means for locating communications scored High or Medium in negative sentiment by the SNIT or High in insider risk by the SIRDC within a randomly selected …