Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (7)
- University of New Haven (7)
- University of Nebraska - Lincoln (4)
- Singapore Management University (3)
- University of Kentucky (3)
-
- University of Pennsylvania Carey Law School (3)
- Embry-Riddle Aeronautical University (2)
- University of Denver (2)
- University of Massachusetts Amherst (2)
- Andrews University (1)
- California Polytechnic State University, San Luis Obispo (1)
- City University of New York (CUNY) (1)
- Johnson & Wales University (1)
- Nova Southeastern University (1)
- Old Dominion University (1)
- Purdue University (1)
- Southern Methodist University (1)
- Southwestern Oklahoma State University (1)
- University of Connecticut (1)
- University of Texas at El Paso (1)
- Utah State University (1)
- Virginia Commonwealth University (1)
- WellBeing International (1)
- Keyword
-
- Security (4)
- Cybersecurity (3)
- Forensics (3)
- Applications (2)
- Cryptocurrency (2)
-
- Digital forensics (2)
- IoT (2)
- Learning (2)
- Machine learning (2)
- Policy (2)
- 3D (1)
- 3D Publishing (1)
- 3D printing (1)
- 4onse (1)
- AMOS (1)
- ARIMA (1)
- Academic libraries (1)
- Accessibility (1)
- Accessing secured wireless networks (1)
- Administrative law (1)
- Adult education (1)
- Agent-based model (1)
- Ai (1)
- Android (1)
- Animal consciousness (1)
- Animal suffering (1)
- Archaeological practice (1)
- Artifacts (1)
- Artificial Intelligence (AI) (1)
- Artificial intelligence (1)
- Publication
-
- Electrical & Computer Engineering and Computer Science Faculty Publications (7)
- Journal of International Technology and Information Management (7)
- All Faculty Scholarship (3)
- Department of Anthropology: Faculty Publications (2)
- Electrical and Computer Engineering: Graduate Student Scholarship (2)
-
- Free and Open Source Software for Geospatial (FOSS4G) Conference Proceedings (2)
- Research Collection School Of Computing and Information Systems (2)
- Adventist Human-Subject Researchers Association (1)
- All Graduate Plan B and other Reports, Spring 1920 to Spring 2023 (1)
- Animal Sentience (1)
- Annual ADFSL Conference on Digital Forensics, Security and Law (1)
- CCE Theses and Dissertations (1)
- Copyright, Fair Use, Scholarly Communication, etc. (1)
- Dissertations and Theses Collection (Open Access) (1)
- Electrical and Computer Engineering Faculty Publications (1)
- Epidemiology and Environmental Health Faculty Publications (1)
- Faculty Articles & Research (1)
- Honors Scholar Theses (1)
- Information Science Faculty Publications (1)
- Journal of Digital Forensics, Security and Law (1)
- Journal of Human Performance in Extreme Environments (1)
- Library Philosophy and Practice (e-journal) (1)
- Library Staff Publications (1)
- Master's Theses (1)
- Open Access Theses & Dissertations (1)
- Publications and Research (1)
- SMU Data Science Review (1)
- Theses and Dissertations (1)
- VMASC Publications (1)
- Publication Type
Articles 31 - 47 of 47
Full-Text Articles in Computer Engineering
Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick
Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick
All Faculty Scholarship
Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.
This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews and analysis of …
An Overview Of The Usage Of Default Passwords, Brandon Knierem, Xiaolu Zhang, Philip Levine, Frank Breitinger, Ibrahim Baggili
An Overview Of The Usage Of Default Passwords, Brandon Knierem, Xiaolu Zhang, Philip Levine, Frank Breitinger, Ibrahim Baggili
Electrical & Computer Engineering and Computer Science Faculty Publications
The recent Mirai botnet attack demonstrated the danger of using default passwords and showed it is still a major problem. In this study we investigated several common applications and their password policies. Specifically, we analyzed if these applications: (1) have default passwords or (2) allow the user to set a weak password (i.e., they do not properly enforce a password policy). Our study shows that default passwords are still a significant problem: 61% of applications inspected initially used a default or blank password. When changing the password, 58% allowed a blank password, 35% allowed a weak password of 1 character.
Common Carriage’S Domain, Christopher S. Yoo
Common Carriage’S Domain, Christopher S. Yoo
All Faculty Scholarship
The judicial decision invalidating the Federal Communications Commission's first Open Internet Order has led advocates to embrace common carriage as the legal basis for network neutrality. In so doing, network neutrality proponents have overlooked the academic literature on common carriage as well as lessons from its implementation history. This Essay distills these learnings into five factors that play a key role in promoting common carriage's success: (1) commodity products, (2) simple interfaces, (3) stability and uniformity in the transmission technology, (4) full deployment of the transmission network, and (5) stable demand and market shares. Applying this framework to the Internet …
Forecasting Changes In Religiosity And Existential Security With An Agent-Based Model, Ross J. Gore, Carlos Lemos, F. Leron Shults, Wesley J. Wildman
Forecasting Changes In Religiosity And Existential Security With An Agent-Based Model, Ross J. Gore, Carlos Lemos, F. Leron Shults, Wesley J. Wildman
VMASC Publications
We employ existing data sets and agent-based modeling to forecast changes in religiosity and existential security among a collective of individuals over time. Existential security reflects the extent of economic, socioeconomic and human development provided by society. Our model includes agents in social networks interacting with one another based on the education level of the agents, the religious practices of the agents, and each agent's existential security within their natural and social environments. The data used to inform the values and relationships among these variables is based on rigorous statistical analysis of the International Social Survey Programme Religion Module (ISSP) …
A Pilot Study On Facial Expression Recognition Ability Of Autistic Children Using Ryan, A Rear-Projected Humanoid Robot, Farzaneh Askari, Huanghao Feng, Timothy D. Sweeny, Mohammad H. Mahoor
A Pilot Study On Facial Expression Recognition Ability Of Autistic Children Using Ryan, A Rear-Projected Humanoid Robot, Farzaneh Askari, Huanghao Feng, Timothy D. Sweeny, Mohammad H. Mahoor
Electrical and Computer Engineering: Graduate Student Scholarship
Rear-projected robots use computer graphics technology to create facial animations and project them on a mask to show the robot’s facial cues and expressions. These types of robots are becoming commercially available, though more research is required to understand how they can be effectively used as a socially assistive robotic agent. This paper presents the results of a pilot study on comparing the facial expression recognition abilities of children with Autism Spectrum Disorder (ASD) with typically developing (TD) children using a rear-projected humanoid robot called Ryan. Six children with ASD and six TD children participated in this research, where Ryan …
How Children With Autism Spectrum Disorder Recognize Facial Expressions Displayed By A Rear-Projection Humanoid Robot, Farzaneh Askari, Huanghao Feng, Anibal Gutierrez, Timothy Sweeny, Mohammad H. Mahoor
How Children With Autism Spectrum Disorder Recognize Facial Expressions Displayed By A Rear-Projection Humanoid Robot, Farzaneh Askari, Huanghao Feng, Anibal Gutierrez, Timothy Sweeny, Mohammad H. Mahoor
Electrical and Computer Engineering: Graduate Student Scholarship
Background: Children with Autism Spectrum Disorder (ASD) experience reduced ability to perceive crucial nonverbal communication cues such as eye gaze, gestures, and facial expressions. Recent studies suggest that social robots can be used as effective tools to improve communication and social skills in children with ASD. One explanation has been put forward by several studies that children with ASD feel more contented and motivated in systemized and predictable environment, like interacting with robots.
Objectives: There have been few research studies evaluating how children with ASD perceive facial expression in humanoid robots but no research evaluating facial expression perception …
Using Virtual Reality And Photogrammetry To Enrich 3d Object Identity, Cole Juckette, Heather Richards-Rissetto, Hector Eluid Guerra Aldana, Norman Martinez
Using Virtual Reality And Photogrammetry To Enrich 3d Object Identity, Cole Juckette, Heather Richards-Rissetto, Hector Eluid Guerra Aldana, Norman Martinez
Department of Anthropology: Faculty Publications
The creation of digital 3D models for cultural heritage is commonplace. With the advent of efficient and cost effective technologies archaeologists are making a plethora of digital assets. This paper evaluates the identity of 3D digital assets and explores how to enhance or expand that identity by integrating photogrammetric models into VR. We propose that when a digital object acquires spatial context from its virtual surroundings, it gains an identity in relation to that virtual space, the same way that embedding the object with metadata gives it a specific identity through its relationship to other information. We explore this concept …
Exploring Generational Differences In Text Messaging Usage And Habits, Daniel Wayne Long
Exploring Generational Differences In Text Messaging Usage And Habits, Daniel Wayne Long
CCE Theses and Dissertations
Members of society today embrace multiple communication media for various purposes and intents. Text messaging has been identified as the medium of choice for continual relationship maintenance and text messaging from mobile devices overshadows all other media forms for the support of social connections. Text messaging is changing everything from how operators market their plans to how advertisers and service providers reach consumers. But just as technology usage of social media and internet access are different across generational boundaries, text messaging usage and habits may also be different for various generational groups. The majority of peer-reviewed research regarding text messaging …
The Impact Of Personal Privacy On The Acceptance Of Mobile Phone Technology: A Case Of Tanzanian Smes, Renatus Michael Mushi
The Impact Of Personal Privacy On The Acceptance Of Mobile Phone Technology: A Case Of Tanzanian Smes, Renatus Michael Mushi
Journal of International Technology and Information Management
The adoption of mobile technology has gained a serious attention in organizations and individuals. SMEs in the developing countries have hugely been relying on mobile phone technology in performing their activities. The main reasons for the popularity of mobile phones include their perceived low cost, less learning curve, mobility and its compatibility with the usage at the SMEs level as compared to the desktop computers. Despite existence on studies on adoption of mobile technology in different contexts, few of them have explicitly explored the way personal privacy can affect its acceptance to be used at the workplaces.
This study covers …
Insulting Words: "They Are Animals!", Carolyn A. Ristau
Insulting Words: "They Are Animals!", Carolyn A. Ristau
Animal Sentience
As Chapman & Huffman state, creating divisive human categories has rationalized atrocities committed against the “other.” Labeling neighboring warring villagers as “animals” is considered a despicable insult. Yet contemporary scientific views of many animals grant them thinking and conscious faculties, and the capacity for impressive achievements, many unattainable by humans. Robots, too, can accomplish many similar feats. But the essential reason we must protect animals is not because of their admirable abilities, but their capacity for consciousness, for suffering. Robots are not conscious. Participants in the human-animal debate should not complain about changing criteria for determining human uniqueness. New and …
Consuming Digital Debris In The Plasticene, Stephen R. Parks
Consuming Digital Debris In The Plasticene, Stephen R. Parks
Theses and Dissertations
Claims of customization and control by socio-technical industries are altering the role of consumer and producer. These narratives are often misleading attempts to engage consumers with new forms of technology. By addressing capitalist intent, material, and the reproduction limits of 3-D printed objects’, I observe the aspirational promise of becoming a producer of my own belongings through new networks of production. I am interested in gaining a better understanding of the data consumed that perpetuates hyper-consumptive tendencies for new technological apparatuses. My role as a designer focuses on the resolution of not only the surface of the object through 3-D …
Assessing Learning Outcomes Of A Mooc Incorporated Into An On-Campus Management Information Systems Class, Manying Qiu, Yaquan Xu
Assessing Learning Outcomes Of A Mooc Incorporated Into An On-Campus Management Information Systems Class, Manying Qiu, Yaquan Xu
Journal of International Technology and Information Management
Massive open source online course (MOOC) platform enables enterprises to introduce their new innovations and deliver basic knowledge to handle the new products. We incorporated an openSAP course into a management information systems (MIS) class. Students learned the latest development of SAP customer relationship management (CRM) solutions along with the SAP enterprise resource planning (ERP) business processes integration that they learned in the classroom. 46.2% of the students obtained Record of Achievement and Confirmation of Participation certificates, which is higher than the average success rate of MOOCs. More importantly, the students experienced a way of sustainable and lifelong learning.
Table Of Contents Jitim Vol 27 Issue 1, 2018
Table Of Contents Jitim Vol 27 Issue 1, 2018
Journal of International Technology and Information Management
Table of Contents JITIM volume 27, issue 1 - 2018
Table Of Contents Jitim Vol 27 Issue 2, 2018
Table Of Contents Jitim Vol 27 Issue 2, 2018
Journal of International Technology and Information Management
ToC JITIM vol 27 - 2, 2018
If I Had A Million Cryptos: Cryptowallet Application Analysis And A Trojan Proof-Of-Concept, Trevor Haigh, Frank Breitinger, Ibrahim Baggili
If I Had A Million Cryptos: Cryptowallet Application Analysis And A Trojan Proof-Of-Concept, Trevor Haigh, Frank Breitinger, Ibrahim Baggili
Electrical & Computer Engineering and Computer Science Faculty Publications
Cryptocurrencies have gained wide adoption by enthusiasts and investors. In this work, we examine seven different Android cryptowallet applications for forensic artifacts, but we also assess their security against tampering and reverse engineering. Some of the biggest benefits of cryptocurrency is its security and relative anonymity. For this reason it is vital that wallet applications share the same properties. Our work, however, indicates that this is not the case. Five of the seven applications we tested do not implement basic security measures against reverse engineering. Three of the applications stored sensitive information, like wallet private keys, insecurely and one was …
The Effect Of Data Marshalling On Computation Offloading Decisions, Julio Alberto Reyes Muñoz
The Effect Of Data Marshalling On Computation Offloading Decisions, Julio Alberto Reyes Muñoz
Open Access Theses & Dissertations
Computation offloading consists in allowing resource constrained computers, such as smartphones and other mobile devices, to use the network for the remote execution of resource intensive computing tasks in powerful computers. However, deciding whether to offload or not is not a trivial problem, and it depends in several variables related to the environment conditions, the computing devices involved in the process, and the nature of the task to be remotely executed. Furthermore, it comprises the optimal solution to some questions, like how to partition the application and where to execute the tasks.
The computation offloading decision problem has been widely …
Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook
Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook
Copyright, Fair Use, Scholarly Communication, etc.
The main aim of this thesis is to call for a new analysis of cyber security which departs from the traditional security theory. I argue that the cyber domain is inherently different in nature, in that it is lacking in traditional boundaries and is reflexive in nature. Policy-makers are aware of these characteristics, and in turn this awareness changes the way that national cyber security strategy is handled and understood. These changes cannot be adequately understood through traditional understanding of security, as they often are, without missing significant details. Rather, examining these changes through the lens of Ulrich Beck’s risk …