Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

2018

Institution
Keyword
Publication
Publication Type

Articles 31 - 47 of 47

Full-Text Articles in Computer Engineering

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick Jan 2018

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick

All Faculty Scholarship

Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.

This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews and analysis of …


An Overview Of The Usage Of Default Passwords, Brandon Knierem, Xiaolu Zhang, Philip Levine, Frank Breitinger, Ibrahim Baggili Jan 2018

An Overview Of The Usage Of Default Passwords, Brandon Knierem, Xiaolu Zhang, Philip Levine, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

The recent Mirai botnet attack demonstrated the danger of using default passwords and showed it is still a major problem. In this study we investigated several common applications and their password policies. Specifically, we analyzed if these applications: (1) have default passwords or (2) allow the user to set a weak password (i.e., they do not properly enforce a password policy). Our study shows that default passwords are still a significant problem: 61% of applications inspected initially used a default or blank password. When changing the password, 58% allowed a blank password, 35% allowed a weak password of 1 character.


Common Carriage’S Domain, Christopher S. Yoo Jan 2018

Common Carriage’S Domain, Christopher S. Yoo

All Faculty Scholarship

The judicial decision invalidating the Federal Communications Commission's first Open Internet Order has led advocates to embrace common carriage as the legal basis for network neutrality. In so doing, network neutrality proponents have overlooked the academic literature on common carriage as well as lessons from its implementation history. This Essay distills these learnings into five factors that play a key role in promoting common carriage's success: (1) commodity products, (2) simple interfaces, (3) stability and uniformity in the transmission technology, (4) full deployment of the transmission network, and (5) stable demand and market shares. Applying this framework to the Internet …


Forecasting Changes In Religiosity And Existential Security With An Agent-Based Model, Ross J. Gore, Carlos Lemos, F. Leron Shults, Wesley J. Wildman Jan 2018

Forecasting Changes In Religiosity And Existential Security With An Agent-Based Model, Ross J. Gore, Carlos Lemos, F. Leron Shults, Wesley J. Wildman

VMASC Publications

We employ existing data sets and agent-based modeling to forecast changes in religiosity and existential security among a collective of individuals over time. Existential security reflects the extent of economic, socioeconomic and human development provided by society. Our model includes agents in social networks interacting with one another based on the education level of the agents, the religious practices of the agents, and each agent's existential security within their natural and social environments. The data used to inform the values and relationships among these variables is based on rigorous statistical analysis of the International Social Survey Programme Religion Module (ISSP) …


A Pilot Study On Facial Expression Recognition Ability Of Autistic Children Using Ryan, A Rear-Projected Humanoid Robot, Farzaneh Askari, Huanghao Feng, Timothy D. Sweeny, Mohammad H. Mahoor Jan 2018

A Pilot Study On Facial Expression Recognition Ability Of Autistic Children Using Ryan, A Rear-Projected Humanoid Robot, Farzaneh Askari, Huanghao Feng, Timothy D. Sweeny, Mohammad H. Mahoor

Electrical and Computer Engineering: Graduate Student Scholarship

Rear-projected robots use computer graphics technology to create facial animations and project them on a mask to show the robot’s facial cues and expressions. These types of robots are becoming commercially available, though more research is required to understand how they can be effectively used as a socially assistive robotic agent. This paper presents the results of a pilot study on comparing the facial expression recognition abilities of children with Autism Spectrum Disorder (ASD) with typically developing (TD) children using a rear-projected humanoid robot called Ryan. Six children with ASD and six TD children participated in this research, where Ryan …


How Children With Autism Spectrum Disorder Recognize Facial Expressions Displayed By A Rear-Projection Humanoid Robot, Farzaneh Askari, Huanghao Feng, Anibal Gutierrez, Timothy Sweeny, Mohammad H. Mahoor Jan 2018

How Children With Autism Spectrum Disorder Recognize Facial Expressions Displayed By A Rear-Projection Humanoid Robot, Farzaneh Askari, Huanghao Feng, Anibal Gutierrez, Timothy Sweeny, Mohammad H. Mahoor

Electrical and Computer Engineering: Graduate Student Scholarship

Background: Children with Autism Spectrum Disorder (ASD) experience reduced ability to perceive crucial nonverbal communication cues such as eye gaze, gestures, and facial expressions. Recent studies suggest that social robots can be used as effective tools to improve communication and social skills in children with ASD. One explanation has been put forward by several studies that children with ASD feel more contented and motivated in systemized and predictable environment, like interacting with robots.

Objectives: There have been few research studies evaluating how children with ASD perceive facial expression in humanoid robots but no research evaluating facial expression perception …


Using Virtual Reality And Photogrammetry To Enrich 3d Object Identity, Cole Juckette, Heather Richards-Rissetto, Hector Eluid Guerra Aldana, Norman Martinez Jan 2018

Using Virtual Reality And Photogrammetry To Enrich 3d Object Identity, Cole Juckette, Heather Richards-Rissetto, Hector Eluid Guerra Aldana, Norman Martinez

Department of Anthropology: Faculty Publications

The creation of digital 3D models for cultural heritage is commonplace. With the advent of efficient and cost effective technologies archaeologists are making a plethora of digital assets. This paper evaluates the identity of 3D digital assets and explores how to enhance or expand that identity by integrating photogrammetric models into VR. We propose that when a digital object acquires spatial context from its virtual surroundings, it gains an identity in relation to that virtual space, the same way that embedding the object with metadata gives it a specific identity through its relationship to other information. We explore this concept …


Exploring Generational Differences In Text Messaging Usage And Habits, Daniel Wayne Long Jan 2018

Exploring Generational Differences In Text Messaging Usage And Habits, Daniel Wayne Long

CCE Theses and Dissertations

Members of society today embrace multiple communication media for various purposes and intents. Text messaging has been identified as the medium of choice for continual relationship maintenance and text messaging from mobile devices overshadows all other media forms for the support of social connections. Text messaging is changing everything from how operators market their plans to how advertisers and service providers reach consumers. But just as technology usage of social media and internet access are different across generational boundaries, text messaging usage and habits may also be different for various generational groups. The majority of peer-reviewed research regarding text messaging …


The Impact Of Personal Privacy On The Acceptance Of Mobile Phone Technology: A Case Of Tanzanian Smes, Renatus Michael Mushi Jan 2018

The Impact Of Personal Privacy On The Acceptance Of Mobile Phone Technology: A Case Of Tanzanian Smes, Renatus Michael Mushi

Journal of International Technology and Information Management

The adoption of mobile technology has gained a serious attention in organizations and individuals. SMEs in the developing countries have hugely been relying on mobile phone technology in performing their activities. The main reasons for the popularity of mobile phones include their perceived low cost, less learning curve, mobility and its compatibility with the usage at the SMEs level as compared to the desktop computers. Despite existence on studies on adoption of mobile technology in different contexts, few of them have explicitly explored the way personal privacy can affect its acceptance to be used at the workplaces.

This study covers …


Insulting Words: "They Are Animals!", Carolyn A. Ristau Jan 2018

Insulting Words: "They Are Animals!", Carolyn A. Ristau

Animal Sentience

As Chapman & Huffman state, creating divisive human categories has rationalized atrocities committed against the “other.” Labeling neighboring warring villagers as “animals” is considered a despicable insult. Yet contemporary scientific views of many animals grant them thinking and conscious faculties, and the capacity for impressive achievements, many unattainable by humans. Robots, too, can accomplish many similar feats. But the essential reason we must protect animals is not because of their admirable abilities, but their capacity for consciousness, for suffering. Robots are not conscious. Participants in the human-animal debate should not complain about changing criteria for determining human uniqueness. New and …


Consuming Digital Debris In The Plasticene, Stephen R. Parks Jan 2018

Consuming Digital Debris In The Plasticene, Stephen R. Parks

Theses and Dissertations

Claims of customization and control by socio-technical industries are altering the role of consumer and producer. These narratives are often misleading attempts to engage consumers with new forms of technology. By addressing capitalist intent, material, and the reproduction limits of 3-D printed objects’, I observe the aspirational promise of becoming a producer of my own belongings through new networks of production. I am interested in gaining a better understanding of the data consumed that perpetuates hyper-consumptive tendencies for new technological apparatuses. My role as a designer focuses on the resolution of not only the surface of the object through 3-D …


Assessing Learning Outcomes Of A Mooc Incorporated Into An On-Campus Management Information Systems Class, Manying Qiu, Yaquan Xu Jan 2018

Assessing Learning Outcomes Of A Mooc Incorporated Into An On-Campus Management Information Systems Class, Manying Qiu, Yaquan Xu

Journal of International Technology and Information Management

Massive open source online course (MOOC) platform enables enterprises to introduce their new innovations and deliver basic knowledge to handle the new products. We incorporated an openSAP course into a management information systems (MIS) class. Students learned the latest development of SAP customer relationship management (CRM) solutions along with the SAP enterprise resource planning (ERP) business processes integration that they learned in the classroom. 46.2% of the students obtained Record of Achievement and Confirmation of Participation certificates, which is higher than the average success rate of MOOCs. More importantly, the students experienced a way of sustainable and lifelong learning.


Table Of Contents Jitim Vol 27 Issue 1, 2018 Jan 2018

Table Of Contents Jitim Vol 27 Issue 1, 2018

Journal of International Technology and Information Management

Table of Contents JITIM volume 27, issue 1 - 2018


Table Of Contents Jitim Vol 27 Issue 2, 2018 Jan 2018

Table Of Contents Jitim Vol 27 Issue 2, 2018

Journal of International Technology and Information Management

ToC JITIM vol 27 - 2, 2018


If I Had A Million Cryptos: Cryptowallet Application Analysis And A Trojan Proof-Of-Concept, Trevor Haigh, Frank Breitinger, Ibrahim Baggili Jan 2018

If I Had A Million Cryptos: Cryptowallet Application Analysis And A Trojan Proof-Of-Concept, Trevor Haigh, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Cryptocurrencies have gained wide adoption by enthusiasts and investors. In this work, we examine seven different Android cryptowallet applications for forensic artifacts, but we also assess their security against tampering and reverse engineering. Some of the biggest benefits of cryptocurrency is its security and relative anonymity. For this reason it is vital that wallet applications share the same properties. Our work, however, indicates that this is not the case. Five of the seven applications we tested do not implement basic security measures against reverse engineering. Three of the applications stored sensitive information, like wallet private keys, insecurely and one was …


The Effect Of Data Marshalling On Computation Offloading Decisions, Julio Alberto Reyes Muñoz Jan 2018

The Effect Of Data Marshalling On Computation Offloading Decisions, Julio Alberto Reyes Muñoz

Open Access Theses & Dissertations

Computation offloading consists in allowing resource constrained computers, such as smartphones and other mobile devices, to use the network for the remote execution of resource intensive computing tasks in powerful computers. However, deciding whether to offload or not is not a trivial problem, and it depends in several variables related to the environment conditions, the computing devices involved in the process, and the nature of the task to be remotely executed. Furthermore, it comprises the optimal solution to some questions, like how to partition the application and where to execute the tasks.

The computation offloading decision problem has been widely …


Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook Jan 2018

Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook

Copyright, Fair Use, Scholarly Communication, etc.

The main aim of this thesis is to call for a new analysis of cyber security which departs from the traditional security theory. I argue that the cyber domain is inherently different in nature, in that it is lacking in traditional boundaries and is reflexive in nature. Policy-makers are aware of these characteristics, and in turn this awareness changes the way that national cyber security strategy is handled and understood. These changes cannot be adequately understood through traditional understanding of security, as they often are, without missing significant details. Rather, examining these changes through the lens of Ulrich Beck’s risk …