Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Social and Behavioral Sciences

2021

Institution
Keyword
Publication

Articles 1 - 15 of 15

Full-Text Articles in Computer Engineering

Addressing Security And Privacy Issues By Analyzing Vulnerabilities In Iot Applications, Francsico Javier Candelario Burgoa Dec 2021

Addressing Security And Privacy Issues By Analyzing Vulnerabilities In Iot Applications, Francsico Javier Candelario Burgoa

Open Access Theses & Dissertations

The Internet of Things (IoT) environment has been expanding rapidly for the past few years into several areas of our lives, from factories, to stores and even into our own homes. All these new devices in our homes make our day-to-day lives easier and more comfortable with less effort on our part, converting our simple houses into smart homes. This increase in inter-connectivity brings multiple benefits including the improvement in energy efficiency in our homes, however it also brings with it some potential dangers since more points of connection mean more potential vulnerabilities in our grid. These vulnerabilities bring security …


A Youthful Metaverse: Towards Designing Safe, Equitable, And Emotionally Fulfilling Social Virtual Reality Spaces For Younger Users, Divine Maloney Dec 2021

A Youthful Metaverse: Towards Designing Safe, Equitable, And Emotionally Fulfilling Social Virtual Reality Spaces For Younger Users, Divine Maloney

All Dissertations

Social virtual reality (VR) represents the modern rendition of the metaverse, this dissertation aims to fill the research gaps while highlighting trends of youth in VR. The scientific contributions of this research include 1) expanding the current HCI understanding of the social dynamics and the interactions of teens in emerging novel online digital spaces; 2) bridging two research areas that have not been widely studied in HCI, social VR and young users in social VR; and 3) generating design implications to inform the design of future social VR platforms to better support and protect teens’ online social experiences, results which …


Towards Characterizing Adversarial Opportunity And Behavior In Critical Infrastructure Network, Md Sharif Ullah Dec 2021

Towards Characterizing Adversarial Opportunity And Behavior In Critical Infrastructure Network, Md Sharif Ullah

Electrical & Computer Engineering Theses & Dissertations

The growth of information and communication technology is constantly revolutionizing various domains, e.g., energy utility systems, healthcare, the internet of things, etc. This inception of widespread cyber technology enables reliability and first operability of the system, yet simultaneously imposed a risk of significant impact due to disruption of safe and secure operation. The attack surface is expanding, creating a cyber exposure gap which indicates a higher threat landscape and increased risk of compromise. Motivated by this increased threat exposure, this dissertation investigates the attack surface as a static and dynamic indicator of adversary propagation, seeking an efficient modeling paradigm to …


Data-Driven Operational And Safety Analysis Of Emerging Shared Electric Scooter Systems, Qingyu Ma Dec 2021

Data-Driven Operational And Safety Analysis Of Emerging Shared Electric Scooter Systems, Qingyu Ma

Computational Modeling & Simulation Engineering Theses & Dissertations

The rapid rise of shared electric scooter (E-Scooter) systems offers many urban areas a new micro-mobility solution. The portable and flexible characteristics have made E-Scooters a competitive mode for short-distance trips. Compared to other modes such as bikes, E-Scooters allow riders to freely ride on different facilities such as streets, sidewalks, and bike lanes. However, sharing lanes with vehicles and other users tends to cause safety issues for riding E-Scooters. Conventional methods are often not applicable for analyzing such safety issues because well-archived historical crash records are not commonly available for emerging E-Scooters.

Perceiving the growth of such a micro-mobility …


Subnational Map Of Poverty Generated From Remote-Sensing Data In Africa: Using Machine Learning Models And Advanced Regression Methods For Poverty Estimation, Lionel N. Hanke Sep 2021

Subnational Map Of Poverty Generated From Remote-Sensing Data In Africa: Using Machine Learning Models And Advanced Regression Methods For Poverty Estimation, Lionel N. Hanke

Master's Theses

According to the 2020 poverty estimates from the World Bank, it is estimated that 9.1% - 9.4% of the global population lived on less than $1.90 per day. It is estimated that the Covid-19 pandemic further aggravated the issue by pushing more than 1% of the global population below the international poverty line of $1.90 per day (WorldBank, 2020). To provide help and formulate effective measures, poverty needs to be located as exact as possible. For this purpose, it was investigated whether regression methods with aggregated remote-sensing data could be used to estimate poverty in Africa. Therefore, five distinct regression …


Promoting Diversity In Academic Research Communities Through Multivariate Expert Recommendation, Omar Salman Jul 2021

Promoting Diversity In Academic Research Communities Through Multivariate Expert Recommendation, Omar Salman

Graduate Theses and Dissertations

Expert recommendation is the process of identifying individuals who have the appropriate knowledge and skills to achieve a specific task. It has been widely used in the educational environment mainly in the hiring process, paper-reviewer assignment, and assembling conference program committees. In this research, we highlight the problem of diversity and fair representation of underrepresented groups in expertise recommendation, factors that current expertise recommendation systems rarely consider. We introduce a novel way to model experts in academia by considering demographic attributes in addition to skills. We use the h-index score to quantify skills for a researcher and we identify five …


Data-Driven Studies On Social Networks: Privacy And Simulation, Yasanka Sameera Horawalavithana Jun 2021

Data-Driven Studies On Social Networks: Privacy And Simulation, Yasanka Sameera Horawalavithana

USF Tampa Graduate Theses and Dissertations

Social media datasets are fundamental to understanding a variety of phenomena, such as epidemics, adoption of behavior, crowd management, and political uprisings. At the same time, many such datasets capturing computer-mediated social interactions are recorded nowadays by individual researchers or by organizations. However, while the need for real social graphs and the supply of such datasets are well established, the flow of data from data owners to researchers is significantly hampered by privacy risks: even when humans’ identities are removed, or data is anonymized to some extent, studies have proven repeatedly that re-identifying anonymized user identities (i.e., de-anonymization) is doable …


The Effects Of Artificial Intelligence On Competitive Sports, Qiyu Pu Jun 2021

The Effects Of Artificial Intelligence On Competitive Sports, Qiyu Pu

School of Professional Studies

This Research thesis is to explore the application and impact of artificial intelligence in the field of competitive sports, discover the risks and problems in it, and discuss solutions. Nowadays, artificial intelligence has been applied to all walks of life, and the field of competitive sports is no exception, such as VR video technology, artificial intelligence for competition and player data analysis, artificial intelligence equipment to help players train, artificial intelligence to develop tactics, etc. But artificial intelligence has also brought about problems such as disrupting game viewing, making intellectual competitive sports meaningless, and threatening the status of industry practitioners. …


Human Fatigue Predictions In Complex Aviation Crew Operational Impact Conditions, Suresh Rangan May 2021

Human Fatigue Predictions In Complex Aviation Crew Operational Impact Conditions, Suresh Rangan

Doctoral Dissertations

In this last decade, several regulatory frameworks across the world in all modes of transportation had brought fatigue and its risk management in operations to the forefront. Of all transportation modes air travel has been the safest means of transportation. Still as part of continuous improvement efforts, regulators are insisting the operators to adopt strong fatigue science and its foundational principles to reinforce safety risk assessment and management. Fatigue risk management is a data driven system that finds a realistic balance between safety and productivity in an organization. This work discusses the effects of mathematical modeling of fatigue and its …


Malicious Hardware & Its Effects On Industry, Gustavo Perez May 2021

Malicious Hardware & Its Effects On Industry, Gustavo Perez

Computer Science and Computer Engineering Undergraduate Honors Theses

In recent years advancements have been made in computer hardware security to circumnavigate the threat of malicious hardware. Threats come in several forms during the development and overall life cycle of computer hardware and I aim to highlight those key points. I will illustrate the various ways in which attackers exploit flaws in a chip design, or how malicious parties take advantage of the many steps required to design and fabricate hardware. Due to these exploits, the industry and consumers have suffered damages in the form of financial loss, physical harm, breaches of personal data, and a multitude of other …


Authentication Schemes' Impact On Working Memory, Janine D. Mator Apr 2021

Authentication Schemes' Impact On Working Memory, Janine D. Mator

Psychology Theses & Dissertations

Authentication is the process by which a computing system validates a user’s identity. Although this process is necessary for system security, users view authentication as a frequent disruption to their primary tasks. During this disruption, primary task information must be actively maintained in working memory. As a result, primary task information stored in working memory is at risk of being lost or corrupted while users authenticate. For over two decades, researchers have focused on developing more memorable passwords by replacing alphanumeric text with visual graphics (Biddle et al., 2012). However, very little attention has been given to the impact authentication …


Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King Jan 2021

Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King

CCE Theses and Dissertations

It is estimated that over half of all information systems security breaches are due directly or indirectly to the poor security practices of an organization’s employees. Previous research has shown neutralization techniques as having influence on the intent to violate information security policy. In this study, we proposed an expansion of the neutralization model by including the effects of business and ethical orientation of individuals on their tendencies to neutralize and compromise with information security policy. Additionally, constructs from social influences and pressures have been integrated into this model to measure the impact on the intent to violate information security …


Improving Employees’ Compliance With Password Policies, Enas Albataineh Jan 2021

Improving Employees’ Compliance With Password Policies, Enas Albataineh

CCE Theses and Dissertations

Employees’ lack of compliance with password policies increases password susceptibility, which leads to financial damages to the organizations as a result of information disclosure, fraud, and unauthorized transactions. However, few studies have examined what motivates employees to comply with password policies.

The purpose of this quantitative cross-sectional study was to examine what factors influence employees’ compliance with password policies. A theoretical model was developed based on Protection Motivation Theory (PMT), General Deterrence Theory (GDT), Theory of Reasoned Action (TRA), and Psychological Ownership Theory to explain employees’ compliance with password policies.

A non-probability convenience sample was employed. The sample consisted of …


Effect Of Digital Advertising On Website Traffic At A Kentucky Comprehensive Regional University, Brandon Lee Moore Jan 2021

Effect Of Digital Advertising On Website Traffic At A Kentucky Comprehensive Regional University, Brandon Lee Moore

Online Theses and Dissertations

The purpose of this research is to quantify differences in key performance indicators between paid and organic (not paid) website traffic over a one year period of time at a regional comprehensive university in Kentucky, which is located in the southeastern United States. Two distinct sources of website traffic can be measured: paid traffic and organic traffic. Using data from website traffic analytics, this study employed multiple linear regression analysis and time series methods to understand the similarities and differences between key performance indicators of paid traffic and organic traffic as they relate to key performance indicators. Data from Google …


Evaluating Social Media As A Medium Of Private Communication Through Steganographic Images, Kendall Weldon Coles Jan 2021

Evaluating Social Media As A Medium Of Private Communication Through Steganographic Images, Kendall Weldon Coles

Graduate Theses, Dissertations, and Problem Reports

Social media is a vastly used communication tool with billions of users worldwide. These social networks provide users the ability to share their ideas and thoughts through the messages, videos, and images that they post. The images that are shared can possibly be embedded with private messages through the use of a steganographic tool. The messages are embedded in a fashion that doesn’t change the visual appearance of an image. This allows for these types of images to hide in plain sight, which creates the possibility of someone communicating privately in a public social media setting. This project proved how …