Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

Using Nyc Open Data To Improve Accessibility For People With Mobility Impairments In New York City., Said Naqwe May 2023

Using Nyc Open Data To Improve Accessibility For People With Mobility Impairments In New York City., Said Naqwe

Publications and Research

Approximately one-fifth to one-quarter of American families have a family member with a mobility impairment, which poses challenges for many local communities, particularly in New York City Boroughs. To address this issue, Doorfront.org aims to make sidewalks and facilities, such as residential buildings and restaurants, more accessible to disabled residents of New York City. As a research assistant for Doorfront.org, I used NYC Open Data to accumulate data on inaccessible facilities, such as the NYC sidewalk polygons, building footprints, city hydrants, bus shelters, parking meters, street trees, pedestrian ramps, litter baskets, city benches, and newsstands.
I downloaded a non-geospatial CSV …


Types Of Cyber Attacks And Incident Responses, Kaung Myat Thu May 2023

Types Of Cyber Attacks And Incident Responses, Kaung Myat Thu

Publications and Research

Cyber-attacks are increasingly prevalent in today's digital age, and their impact can be severe for individuals, organizations, and governments. To effectively protect against these threats, it is essential to understand the different types of attacks and have an incident response plan in place to minimize damage and restore normal operations quickly.

This research aims to contribute to the field by addressing the following questions: What are the main types of cyber-attacks, and how can organizations effectively respond to these incidents? How can the incident response process be improved through post-incident activities?

The study examines various cyber-attack types, including malware, phishing, …