Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

PDF

Institution
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 132

Full-Text Articles in Other Computer Engineering

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie May 2024

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu May 2024

Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu

Military Cyber Affairs

Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …


Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora May 2024

Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora

Military Cyber Affairs

In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.


Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization Apr 2024

Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization

Human-Machine Communication

This is the complete volume of HMC Volume 7. Special Issue on Mediatization


First-Year Engineering Students And Genai: Experience, Attitudes, Trust, And Ethics., Elisabeth Thomas, Cenetria Crockett, Campbell Rightmyer Bego Apr 2024

First-Year Engineering Students And Genai: Experience, Attitudes, Trust, And Ethics., Elisabeth Thomas, Cenetria Crockett, Campbell Rightmyer Bego

Undergraduate Research Events

Generative AI (GenAI) has the potential to benefit student learning by offering personalized feedback, idea generation, research, and analysis support, writing aid, and administrative support (Chan and Hu, 2023; Zhang, 2023). However, if used inappropriately, the same tools can lead to false/biased content creation and reduced ethical awareness leading to possible academic dishonesty and privacy issues (Schwartz, 2016; Wu, 2023). At this early stage, ethical standards and professorial guidance are unavailable, so it is important to understand what students are thinking about the recent technologies (Shen et al., 2013). Spring 2023 survey results revealed that some students used ChatGPT, a …


Enhancing Information Architecture With Machine Learning For Digital Media Platforms, Taylor N. Mietzner Apr 2024

Enhancing Information Architecture With Machine Learning For Digital Media Platforms, Taylor N. Mietzner

Honors College Theses

Modern advancements in machine learning are transforming the technological landscape, including information architecture within user experience design. With the unparalleled amount of user data generated on online media platforms and applications, an adjustment in the design process to incorporate machine learning for categorizing the influx of semantic data while maintaining a user-centric structure is essential. Machine learning tools, such as the classification and recommendation system, need to be incorporated into the design for user experience and marketing success. There is a current gap between incorporating the backend modeling algorithms and the frontend information architecture system design together. The aim of …


Intellectual Property Rights And Copyright Laws In The Regime Of Artificial Intelligence (Ai) In India, Hemavathy C Feb 2024

Intellectual Property Rights And Copyright Laws In The Regime Of Artificial Intelligence (Ai) In India, Hemavathy C

Library Philosophy and Practice (e-journal)

Artificial Intelligence (AI) has been developing for two decades. The application of AI is budding quickly in business dealings, corporate communication and legal services. AI and Law Forms are increasingly important in the legal arena as they play a significant role in the economy and society. Scientists and policymakers together are facing some of the hardest problems with the advancement of machine learning, cryptology and data protection. This paper is very helpful for policymakers, economists, lawyers and technocrats in the aspect of the ethical use of AI in data protection, privacy, security and social corners turns into very relevant issues …


Life During Wartime: Proactive Cybersecurity Is A Humanitarian Imperative, Stanley Mierzwa, Diane Rubino Feb 2024

Life During Wartime: Proactive Cybersecurity Is A Humanitarian Imperative, Stanley Mierzwa, Diane Rubino

Center for Cybersecurity

In brief:

  • Humanitarian agencies responding to conflict face massive challenges in distributing aid. Cyberattacks add to that burden.
  • This short overview, tailored for non-technical leaders, demystifies the process and equips clouds security experts to proactively champion cloud security at non-profits, and non-governmental organizations.

Proactive Cybersecurity is a Humanitarian Imperative | CSA (cloudsecurityalliance.org)


An Investigation Of Match For Lossless Video Compression, Brittany Sullivan-Reicks Dec 2023

An Investigation Of Match For Lossless Video Compression, Brittany Sullivan-Reicks

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

A new lossless video compression technique, Match, is investigated. Match uses the similarity between the frames of a video or the slices of medical images to find a prediction for the current pixel. A portion of the previous frame is searched to find a matching context, which is the pixels surrounding the current pixel, within some distance centered on the current location. The best distance to use for each dataset is found experimentally. The matching context refers to the neighborhood of w, nw, n, and ne, where the pixel in the previous frame with the closest matching context becomes the …


Classification Of Large Scale Fish Dataset By Deep Neural Networks, Priyanka Adapa Dec 2023

Classification Of Large Scale Fish Dataset By Deep Neural Networks, Priyanka Adapa

Electronic Theses, Projects, and Dissertations

The development of robust and efficient fish classification systems has become essential to preventing the rapid depletion of aquatic resources and building conservation strategies. A deep learning approach is proposed here for the automated classification of fish species from underwater images. The proposed methodology leverages state-of-the-art deep neural networks by applying the compact convolutional transformer (CCT) architecture, which is famous for faster training and lower computational cost. In CCT, data augmentation techniques are employed to enhance the variability of the training data, reducing overfitting and improving generalization. The preliminary outcomes of our proposed method demonstrate a promising accuracy level of …


Columnas: The Honors Program Newsletter At Bentley University, Hailey Jennato, Samson Shen, Clara Williams Oct 2023

Columnas: The Honors Program Newsletter At Bentley University, Hailey Jennato, Samson Shen, Clara Williams

Honors Program

Page 1: HOW AI IS IMPACTING THE BENTLEY CLASSROOM AND EDUCATION OVERALL ~ by Nayeli Franco ’24

Page 2: A BEAUTY OF DIVERSITY ~ by Yun Song ’26

Page 3: RESURRECTING THE DEAD THROUGH COMPUTER TECHNOLOGY: HONORING THEIR MEMORY OR EXPLOITING THEIR LEGACY? ~ by Hailey Jennato ’24

Page 4: THE IMPORTANCE OF DEVELOPING EMOTIONAL INTELLIGENCE ~ by Isa Ramirez Perdomo ’26

Page 5: FROM STRUGGLE TO STRENGTH: THRIVING AS AN INTERNATIONAL STUDENT ~ by Ledion Hoti ’25

Page 6: CHASING BUTTERFLIES ~ by Alyssa Galin ’27


Experiences Of African Women In Stem Careers: A Systematic Literature Review., Kaluwa Siwale, Gwamaka Mwalemba, Ulrike Rivett Sep 2023

Experiences Of African Women In Stem Careers: A Systematic Literature Review., Kaluwa Siwale, Gwamaka Mwalemba, Ulrike Rivett

African Conference on Information Systems and Technology

The discourse on women's underrepresentation in science, technology, engineering, and mathematics (STEM) mainly centres on the global north, leaving a gap in understanding the perspectives of African women in STEM. To address this, a systematic literature review was conducted to explore African women's experiences in STEM careers and education. After applying inclusion and criteria, 18 published articles were analysed. 8 key issues emerge: work environment, education system, work-life balance, gender-based stereotypes, racial bias, sexual harassment, inadequate support/mentorship, and self-imposed limits. These themes intertwine, with some aspects influencing others. Grasping the complexities and interactions of these factors provides insights into challenges …


Human-Machine Communication: Complete Volume. Volume 6 Jul 2023

Human-Machine Communication: Complete Volume. Volume 6

Human-Machine Communication

This is the complete volume of HMC Volume 6.


Chatgpt, Lamda, And The Hype Around Communicative Ai: The Automation Of Communication As A Field Of Research In Media And Communication Studies, Andreas Hepp, Wiebke Loosen, Stephan Dreyer, Juliane Jarke, Sigrid Kannengießer, Christian Katzenbach, Rainer Malaka, Michaela Pfadenhauer, Cornelius Puschmann, Wolfgang Schulz Jul 2023

Chatgpt, Lamda, And The Hype Around Communicative Ai: The Automation Of Communication As A Field Of Research In Media And Communication Studies, Andreas Hepp, Wiebke Loosen, Stephan Dreyer, Juliane Jarke, Sigrid Kannengießer, Christian Katzenbach, Rainer Malaka, Michaela Pfadenhauer, Cornelius Puschmann, Wolfgang Schulz

Human-Machine Communication

The aim of this article is to more precisely define the field of research on the automation of communication, which is still only vaguely discernible. The central thesis argues that to be able to fully grasp the transformation of the media environment associated with the automation of communication, our view must be broadened from a preoccupation with direct interactions between humans and machines to societal communication. This more widely targeted question asks how the dynamics of societal communication change when communicative artificial intelligence—in short: communicative AI—is integrated into aspects of societal communication. To this end, we recommend an approach that …


Disentangling Two Fundamental Paradigms In Human-Machine Communication Research: Media Equation And Media Evocation, Margot J. Van Der Goot, Katrin Etzrodt Jul 2023

Disentangling Two Fundamental Paradigms In Human-Machine Communication Research: Media Equation And Media Evocation, Margot J. Van Der Goot, Katrin Etzrodt

Human-Machine Communication

In this theoretical paper, we delineate two fundamental paradigms in how scholars conceptualize the nature of machines in human-machine communication (HMC). In addition to the well-known Media Equation paradigm, we distinguish the Media Evocation paradigm. The Media Equation paradigm entails that people respond to machines as if they are humans, whereas the Media Evocation paradigm conceptualizes machines as objects that can evoke reflections about ontological categories. For each paradigm, we present the main propositions, research methodologies, and current challenges. We conclude with theoretical implications on how to integrate the two paradigms, and with a call for mixed-method research that includes …


Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum May 2023

Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum

Military Cyber Affairs

Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …


Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman May 2023

Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman

Military Cyber Affairs

No abstract provided.


Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane May 2023

Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane

Military Cyber Affairs

No abstract provided.


What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer May 2023

What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer

Military Cyber Affairs

On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.


Culture In Computing: The Importance Of Developing Gender-Inclusive Software, Creighton France May 2023

Culture In Computing: The Importance Of Developing Gender-Inclusive Software, Creighton France

Computer Science and Computer Engineering Undergraduate Honors Theses

The field of computing as we know it today exists because of the contributions of numerous female mathematicians, computer scientists, and programmers. While working with hardware was viewed as “a man’s job” during the mid-20th century, computing and programming was viewed as a noble and high-paying field for women to occupy. However, as time has progressed, the U.S. has seen a decrease in the number of women pursuing computer science. The idea that computing is a masculine discipline is common in the U.S. today for reasons such as male-centered marketing of electronics and gadgets, an inaccurate representation of what it …


Analyzing The Impact Of Automation On Employment In Different Us Regions: A Data-Driven Approach, Thejaas Balasubramanian May 2023

Analyzing The Impact Of Automation On Employment In Different Us Regions: A Data-Driven Approach, Thejaas Balasubramanian

Electronic Theses, Projects, and Dissertations

Automation is transforming the US workforce with the increasing prevalence of technologies like robotics, artificial intelligence, and machine learning. As a result, it is essential to understand how this shift will impact the labor market and prepare for its effects. This culminating experience project aimed to examine the influence of computerization on jobs in the United States and answer the following research questions: Q1. What factors affect how likely different jobs will be automated? Q2. What are the possible effects of automation on the US workforce across states and industries? Q3. What are the meaningful predictors of the likelihood of …


The Effects Of Social Media On Mental Health And Career Planning, Spencer A. Rowan May 2023

The Effects Of Social Media On Mental Health And Career Planning, Spencer A. Rowan

Honors Theses

Social media use is prevalent and necessary in society—nearly anything can be accomplished with a mobile device or smartphone. Among the US population, two thirds of American adults admit to using social media (Perrin, 2015) and in 2022, Georgiev (2023) found Americans spent an average of two and a half hours daily on social media. Furthermore, social media use is tied to mental well-being, work confidence levels, and feelings of being an imposter (Johnson et al., 2020; Uram & Skalski, 2022; Hernandez & Chalk, 2021; Myers, 2021; Ramm, 2019).

This project examined the role of social media use among college …


The Fashion Visual Search Using Deep Learning Approach, Smita V. Bhoir, Sunita R. Patil Apr 2023

The Fashion Visual Search Using Deep Learning Approach, Smita V. Bhoir, Sunita R. Patil

Library Philosophy and Practice (e-journal)

In recent years, the World Wide Web (WWW) has established itself as a popular source of information. Using an effective approach to investigate the vast amount of information available on the internet is essential if we are to make the most of the resources available. Visual data cannot be indexed using text-based indexing algorithms because it is significantly larger and more complex than text. Content-Based Image Retrieval, as a result, has gained widespread attention among the scientific community (CBIR). Input into a CBIR system that is dependent on visible features of the user's input image at a low level is …


Para Cima Y Pa’ Abajo: Building Bridges Between Hci Research In Latin America And In The Global North, Pedro Reynolds-Cuéllar, Marisol Wong-Villacres, Karla A. Badillo-Urquiola, Mayra Donaji Barrera-Machuca, Franceli L. Cibrian, Marianela Ciolfi Felice, Carolina Fuentes, Laura Sanely Gaytán-Lugo, Vivian Genaro Motti, Monica Perusquía-Hernández, Oscar A. Lemus Apr 2023

Para Cima Y Pa’ Abajo: Building Bridges Between Hci Research In Latin America And In The Global North, Pedro Reynolds-Cuéllar, Marisol Wong-Villacres, Karla A. Badillo-Urquiola, Mayra Donaji Barrera-Machuca, Franceli L. Cibrian, Marianela Ciolfi Felice, Carolina Fuentes, Laura Sanely Gaytán-Lugo, Vivian Genaro Motti, Monica Perusquía-Hernández, Oscar A. Lemus

Engineering Faculty Articles and Research

The Human-computer Interaction (HCI) community has the opportunity to foster the integration of research practices across the Global South and North to begin overcoming colonial relationships. In this paper, we focus on the case of Latin America (LATAM), where initiatives to increase the representation of HCI practitioners lack a consolidated understanding of the practices they employ, the factors that influence them, and the challenges that practitioners face. To address this knowledge gap, we employ a mixed-methods approach, comprising a survey (66 respondents) and in-depth interviews (19 interviewees). Our analyses characterize a set of research perspectives on how HCI is practiced …


Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian) Mar 2023

Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)

Library Philosophy and Practice (e-journal)

Abstract

Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …


Reference Frames In Human Sensory, Motor, And Cognitive Processing, Dongcheng He Mar 2023

Reference Frames In Human Sensory, Motor, And Cognitive Processing, Dongcheng He

Electronic Theses and Dissertations

Reference-frames, or coordinate systems, are used to express properties and relationships of objects in the environment. While the use of reference-frames is well understood in physical sciences, how the brain uses reference-frames remains a fundamental question. The goal of this dissertation is to reach a better understanding of reference-frames in human perceptual, motor, and cognitive processing. In the first project, we study reference-frames in perception and develop a model to explain the transition from egocentric (based on the observer) to exocentric (based outside the observer) reference-frames to account for the perception of relative motion. In a second project, we focus …


Stand-Up Comedy Visualized, Berna Yenidogan Feb 2023

Stand-Up Comedy Visualized, Berna Yenidogan

Dissertations, Theses, and Capstone Projects

Stand-up comedy has become an increasingly popular form of comedy in the recent years and comedians reach audiences beyond the halls they are performing through streaming services, podcasts and social media. While comedic performances are typically judged by how 'funny' they are, which could be proxied by the frequency and intensity of laughs through the performance, comedians also explore untapped social issues and provoke conversation, especially in this age where interaction with artists goes beyond their act. It is easy to see commonalities in the topics addressed in comedians’ work such as relationships, race and politics.This project provides an interactive …


30 Años De Transformación Regional. Chía Y Zipaquirá, José Zacarías Mayorga Sánchez, Luz Deicy Flórez Espinal, Viviana Andrea Caballero Moreno, Luz Mireya Rincón Mora, John Jairo Zambrano Rocha, Eduard Neftali Gutiérrez, Carlos Augusto Trujillo Padilla, Carlos Germán González Pedraza, Juan Manuel Urrego Laurin, León Fabio Salcedo Ortiz, Ana Betina Morgante Combariza, Eduardo Ernesto Castro Neira Dec 2022

30 Años De Transformación Regional. Chía Y Zipaquirá, José Zacarías Mayorga Sánchez, Luz Deicy Flórez Espinal, Viviana Andrea Caballero Moreno, Luz Mireya Rincón Mora, John Jairo Zambrano Rocha, Eduard Neftali Gutiérrez, Carlos Augusto Trujillo Padilla, Carlos Germán González Pedraza, Juan Manuel Urrego Laurin, León Fabio Salcedo Ortiz, Ana Betina Morgante Combariza, Eduardo Ernesto Castro Neira

Institucional

En el trigésimo aniversario de vida universitaria de nuestro claustro académico, la Extensión Chía, recordamos con agrado el proceso desarrollado en esta corta pero muy exitosa actividad universitaria. Conocida como la ciudad de La Luna, el municipio de Chía es un importante centro empresarial e industrial del departamento de Cundinamarca, sede de varias instituciones de educación superior. Hoy es un referente de primer orden el proceso de desarrollo económico y social que ha atravesado la provincia Sabana Centro, en especial, debido a la cercanía a la capital del país. Es un centro cultural y turístico por excelencia con una rica …


The Evolution Of Gendered Software: Products, Scientific Reasoning, Criticism, And Tools, Victoria A. E. Kratel Dec 2022

The Evolution Of Gendered Software: Products, Scientific Reasoning, Criticism, And Tools, Victoria A. E. Kratel

Human-Machine Communication

Over the past 7 decades, gendered software has become globally established. In this theoretical distribution, I outline the evolution of gendered software. The journey of gendered software started with the raw idea fueled by Alan Turing’s imitation game in the 1950s. And only shortly thereafter, in the 1960s and 1970s, the first gendered software products like Joseph Weizenbaum’s ELIZA were developed. Thus, academia took its time to not only explore technological aspects, but to further investigate the matter of gender in the 1990s CASA-paradigm (Nass et al., 1994) and Media Equation (Reeves & Nass, 1996). As these theories reasoned the …