Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Computer Engineering

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel Feb 2022

Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel

Publications and Research

According to research at the Me2B Alliance, people feel they have a relationship with technology. It’s emotional. It’s embodied. And it’s very personal. We are studying digital relationships to answer questions like “Do people have a relationship with technology?” “What does that relationship feel like?” And “Do people understand the commitments that they are making when they explore, enter into and dissolve these relationships?” There are parallels between messy human relationships and the kinds of relationships that people develop with technology. As with human relationships, we move through states of discovery, commitment and breakup with digital applications as well. Technology …


Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis Jan 2022

Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis

Dickinson Law Review (2017-Present)

For nearly as long as there have been photographs and videos, people have been editing and manipulating them to make them appear to be something they are not. Usually edited or manipulated photographs are relatively easy to detect, but those days are numbered. Technology has no morality; as it advances, so do the ways it can be misused. The lack of morality is no clearer than with deepfake technology.

People create deepfakes by inputting data sets, most often pictures or videos into a computer. A series of neural networks attempt to mimic the original data set until they are nearly …


The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy Dec 2021

The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy

Articles

This article reviews and analyses factors impacting the evolution of the internet, the web, and social media channels, charting historic trends and highlight recent technological developments. The review comprised a deep search using electronic journal databases. Articles were chosen according to specific criteria with a group of 34 papers and books selected for complete reading and deep analysis. The 34 elements were analysed and processed using NVIVO 12 Pro, enabling the creation of dimensions and categories, codes and nodes, identifying the most frequent words, cluster analysis of the terms, and creating a word cloud based on each word's frequency. The …


Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry Jan 2021

Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry

Journal of International Technology and Information Management

The now taken-for-granted introduction of internet usage into the workplace changed the dynamics of work, productivity, and management, and this is now further complicated by the ubiquitous availability of personal cell phones, going beyond company supplied and (partially) controlled computers with internet connections. This paper studies the connection between internet and cell phone usage by employees and firm productivity. Using primary data collected via a self-reported survey, we conduct an empirical analysis utilizing information based on firm and industry characteristics. Results indicate that the level of non-work-related internet and cell phone usage is significantly associated with firm productivity. Some of …


The Influence Of Information Technology Governance Audit Using Cobit 5 For The Development Public Library : (Case Study : Public Library In East Java ), Ilham M, Anis Eliyana, Indrianawati Usman Oct 2020

The Influence Of Information Technology Governance Audit Using Cobit 5 For The Development Public Library : (Case Study : Public Library In East Java ), Ilham M, Anis Eliyana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study current technological developments have entered almost into the lines of people's lives. Currently, many public library have grown even bigger. And this development does not escape the good management of information technology governance. To maximize management to a better level, public library need information technology governance audits. The information technology audit used in this study uses the COBIT 5 framework which focuses on the APO04 and DSS01 domains. This study aims to improve the quality of services owned and to increase its competitiveness. The results of this study refer to the vision and mission of the public library …


Born-Digital Preservation: The Art Of Archiving Photos With Script And Batch Processing, Rachel S. Evans, Leslie Grove, Sharon Bradley Jul 2020

Born-Digital Preservation: The Art Of Archiving Photos With Script And Batch Processing, Rachel S. Evans, Leslie Grove, Sharon Bradley

Articles, Chapters and Online Publications

With our IT department preparing to upgrade the University of Georgia’s Alexander Campbell King Law Library (UGA Law Library) website from Drupal 7 to 8 this fall, a web developer, an archivist, and a librarian teamed up a year ago to make plans for preserving thousands of born-digital images. We wanted to harvest photographs housed only in web-based photo galleries on the law school website and import them into our repository’s collection. The problem? There were five types of online photo galleries, and our current repository did not include appropriate categories for all of the photographs. The solution? Expand our …


The Pedagogy Of Design And Technology At Xavier University Of Louisiana, New Orleans, Shayna Tova Blum Apr 2019

The Pedagogy Of Design And Technology At Xavier University Of Louisiana, New Orleans, Shayna Tova Blum

Faculty and Staff Publications

Abstract. Xavier University of Louisiana (XULA) is a Science, Technology, Engineering, and Mathematics (STEM) university located in New Orleans, Louisiana. As a Historically Black University (HBCU), the university serves a diverse community of students in which many are first-generation, college graduates. Students enrolled in Design courses at XULA are studying in Bachelor of Science and Bachelor of Art programs and majoring in subjects such as Computer Science, Physics, Mass Communication, Art, Business, and Science. The interdisciplinary student environment offers a unique opportunity for collaboration and peer learning, whereby students are able to share diverse perspectives on a topic by relating …


Recipe For Disaster, Zac Travis Mar 2019

Recipe For Disaster, Zac Travis

MFA Thesis Exhibit Catalogs

Today’s rapid advances in algorithmic processes are creating and generating predictions through common applications, including speech recognition, natural language (text) generation, search engine prediction, social media personalization, and product recommendations. These algorithmic processes rapidly sort through streams of computational calculations and personal digital footprints to predict, make decisions, translate, and attempt to mimic human cognitive function as closely as possible. This is known as machine learning.

The project Recipe for Disaster was developed by exploring automation in technology, specifically through the use of machine learning and recurrent neural networks. These algorithmic models feed on large amounts of data as a …


News - Screven-Jenkins Regional Library, Sharon Blank Jan 2019

News - Screven-Jenkins Regional Library, Sharon Blank

Georgia Library Quarterly

No abstract provided.


Answering Food Insecurity: Serving The Community With Food And Knowledge Using Technology, Courtney Simpson Oct 2017

Answering Food Insecurity: Serving The Community With Food And Knowledge Using Technology, Courtney Simpson

Purdue Journal of Service-Learning and International Engagement

The courses of Tech120, CGT110, and ENGT 180/181 and Red Gold at Purdue collaborated to design a robot that would plant and water a garden for a local community charter school. The students centered the project on the users’ needs for fresh food, nutrition education, and early exposure to STEM for children. The school, Anderson Preparatory Academy (APA), is comprised of many children who come from low-income families and are in the free or reduced lunch program. Inspired from “Farm Bot,” a similar system that allows for almost hands-free gardening, the “Boiler Bot” is designed to be scalable so children …


Table Of Contents Jan 2016

Table Of Contents

Journal of International Technology and Information Management

Table of Contents for Volume 25 Number 4


How Can We Build A Moral Robot?, Kristen E. Clark Dec 2015

How Can We Build A Moral Robot?, Kristen E. Clark

Capstones

Artificial intelligence is already starting to drive our cars and make choices that affect the world economy. One day soon, we’ll have robots that can take care of our sick and elderly, and even rescue us in rescue us in emergencies. But as robots start to make decisions that matter—it’s raising questions that go far beyond engineering. We’re stating to think about ethics.

Bertram Malle and Matthias Scheutz are part of a team funded by the department of defense. It's their job to answer a question that seems straight out of a sci-fi novel: How can we build a moral …


Fundamentals Of Library Instruction, Darren Sweeper Jun 2015

Fundamentals Of Library Instruction, Darren Sweeper

Sprague Library Scholarship and Creative Works

No abstract provided.


The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea Jan 2015

The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea

Journal of Digital Forensics, Security and Law

In recent years, with the expansion of technology and the desire to downsize costs within the corporate culture, the technology trend has steered towards the integration of personally owned mobile devices (i.e. smartphones) within the corporate and enterprise environment. The movement, known as “Bring Your Own Device” (hereinafter referred to as “BYOD”), seeks to minimize or eliminate the need for two separate and distinct mobile devices for one employee. While taken at face value this trend seems favorable, the corporate policy and legal implications of the implementation of BYOD are further complicated by significant investigatory issues that far outweigh the …


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


Interpreting, Stephanie Jo Kent Aug 2014

Interpreting, Stephanie Jo Kent

Doctoral Dissertations

What do community interpreting for the Deaf in western societies, conference interpreting for the European Parliament, and language brokering in international management have in common? Academic research and professional training have historically emphasized the linguistic and cognitive challenges of interpreting, neglecting or ignoring the social aspects that structure communication. All forms of interpreting are inherently social; they involve relationships among at least three people and two languages. The contexts explored here, American Sign Language/English interpreting and spoken language interpreting within the European Parliament, show that simultaneous interpreting involves attitudes, norms and values about intercultural communication that overemphasize information and discount …


Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo Jan 2014

Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo

All Faculty Scholarship

Legal issues increasingly arise in increasingly complex technological contexts. Prominent recent examples include the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA), network neutrality, the increasing availability of location information, and the NSA’s surveillance program. Other emerging issues include data privacy, online video distribution, patent policy, and spectrum policy. In short, the rapid rate of technological change has increasingly shown that law and engineering can no longer remain compartmentalized into separate spheres. The logical response would be to embed the interaction between law and policy deeper into the fabric of both fields. An essential step would …


Business Model Requirements And Challenges In The Mobile Telecommunication Sector, Mutaz M. Al-Debei, David Avison Jan 2011

Business Model Requirements And Challenges In The Mobile Telecommunication Sector, Mutaz M. Al-Debei, David Avison

Dr. Mutaz M. Al-Debei

The telecommunications business is undergoing a critical revolution, driven by innovative technologies, globalization and deregulation. Cellular networks and telecommunications bring radical changes to the way telecom businesses are conducted. Globalization, on the other hand, is tearing down legacy barriers and forcing monopolistic national carriers to compete internationally. Moreover, the noticeable progress of many countries towards deregulation coupled with liberalization is significantly increasing telecom market power and allowing severe competition. The implications of this transition have changed the business rules of the telecom industry. In addition, entrants into the cellular industry have had severe difficulties due to inexistent or weak business …