Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, Monterey Bay (177)
- Walden University (48)
- Singapore Management University (38)
- Kennesaw State University (30)
- Selected Works (28)
-
- Santa Clara University (27)
- Clark University (17)
- World Maritime University (11)
- Old Dominion University (8)
- University of New Mexico (5)
- Embry-Riddle Aeronautical University (4)
- University of Nebraska - Lincoln (4)
- University of Tennessee, Knoxville (4)
- University of Texas Rio Grande Valley (4)
- Butler University (3)
- City University of New York (CUNY) (3)
- GALILEO, University System of Georgia (3)
- Portland State University (3)
- Southern Methodist University (3)
- University of New Hampshire (3)
- University of San Diego (3)
- University of South Florida (3)
- West Virginia University (3)
- Western Kentucky University (3)
- Western University (3)
- Air Force Institute of Technology (2)
- Brigham Young University (2)
- Bryant University (2)
- Dakota State University (2)
- Florida International University (2)
- Keyword
-
- Agriculture (165)
- California Ranchos (161)
- Early California maps (161)
- Historical resources (161)
- Monterey County surveys (161)
-
- Natural resources (161)
- Santa Clara University (Calif.) (24)
- Student newspapers and periodicals (24)
- Sustainability (15)
- Monterey County (13)
- Management (9)
- Groundwater (7)
- Leadership (7)
- MPA (6)
- MSPC (6)
- San Luis Obispo County (6)
- California (5)
- Cryptocurrency (5)
- Entrepreneurship (5)
- Environment (5)
- MSIT (5)
- Social media (5)
- Surface water (5)
- Water resources (5)
- Artificial intelligence (4)
- Blockchain (4)
- Business (4)
- CSR (4)
- Climate (4)
- Cybersecurity (4)
- Publication
-
- Township and Range Surveys - BLM (162)
- Walden Dissertations and Doctoral Studies (48)
- Research Collection School Of Computing and Information Systems (28)
- The Santa Clara (24)
- KSU Proceedings on Cybersecurity Education, Research and Practice (18)
-
- School of Professional Studies (17)
- World Maritime University Dissertations (11)
- Miscellaneous Monterey and San Luis Obispo County Documents and Reports (10)
- Journal of Cybersecurity Education, Research and Practice (9)
- TOKO OBAT VITALITAS BALI (6)
- Branch Mathematics and Statistics Faculty and Staff Publications (4)
- Information Systems Faculty Publications and Presentations (4)
- Theses and Dissertations (4)
- alamiobatkankerpayudara obatkanker (4)
- sarana idr (4)
- Butler Journal of Undergraduate Research (3)
- Dr. David M Cook (3)
- Electronic Theses and Dissertations (3)
- Electronic Thesis and Dissertation Repository (3)
- Faculty & Staff Scholarship (3)
- Honors Theses (3)
- International Journal of Nuclear Security (3)
- MITB Thought Leadership Series (3)
- SMU Data Science Review (3)
- Santa Clara Magazine (3)
- All Graduate Theses, Dissertations, and Other Capstone Projects (2)
- All Works (2)
- Apotik Cytotec (2)
- Computer Science and Information Technology Grants Collections (2)
- Dissertations (2)
- Publication Type
- File Type
Articles 31 - 60 of 513
Full-Text Articles in Physical Sciences and Mathematics
Cost Benefit Analysis Of Led Vs Florescent Lighting, Kurtis Clark, Phillip Humphrey
Cost Benefit Analysis Of Led Vs Florescent Lighting, Kurtis Clark, Phillip Humphrey
Student Research
Over the last few years, the state of Oklahoma has been looking at ways to reduce expenses to address concerns about a budget deficit. There have been efforts made to reduce expenses due to the use of energy. It has been said, when the lights are on, work is getting done. Running lights is therefore the cost of doing business. Our research examines the question, “is there a way to provide better lighting while operating at a lower cost.” This research examines the current lighting at Southwestern State University, primarily fluorescent lighting (FL), and a cost benefit analysis of switching …
Enhancing The Design Of A Cybersecurity Risk Management Solution For Communities Of Trust, James E. Fulford Jr.
Enhancing The Design Of A Cybersecurity Risk Management Solution For Communities Of Trust, James E. Fulford Jr.
USF Tampa Graduate Theses and Dissertations
Research into cybersecurity risks and various methods of evaluating those threats has become an increasingly important area of academic and practitioner investigations. Of particular interest in this field is enhancing the designs and informing capabilities of cybersecurity risk management solutions for users who desire to understand how organizations are impacted when such risks are exploited. Many of the cybersecurity risk management solutions are extremely technical and require their users to have a commensurate level of technical acumen. In the situation evaluated during this research project, the founders of the company being researched had created a highly technical risk management solution …
The Santa Clara, 2018-11-08, Santa Clara University
The Santa Clara, 2018-11-08, Santa Clara University
The Santa Clara
No abstract provided.
The Santa Clara, 2018-11-01, Santa Clara University
The Santa Clara, 2018-11-01, Santa Clara University
The Santa Clara
No abstract provided.
Cross-Border Interbank Payments And Settlements: Emerging Opportunities For Digital Transformation, Yi Meng Lau, Et Al
Cross-Border Interbank Payments And Settlements: Emerging Opportunities For Digital Transformation, Yi Meng Lau, Et Al
Research Collection School Of Computing and Information Systems
The report “Cross-Border Interbank Payments and Settlements” is a cross-jurisdictional industry collaboration between Canada, Singapore and the United Kingdom to examine the existing challenges and frictions that arise when undertaking crossborder payments. This report explores proposals for new and more efficient models for processing cross-border transactions.
Double Learning Or Double Blinding: An Investigation Of Vendor Private Information Acquisition And Consumer Learning Via Online Reviews, Nan Hu, Kevin E. Dow, Alain Yee Loong Chong, Ling Liu
Double Learning Or Double Blinding: An Investigation Of Vendor Private Information Acquisition And Consumer Learning Via Online Reviews, Nan Hu, Kevin E. Dow, Alain Yee Loong Chong, Ling Liu
Research Collection School Of Computing and Information Systems
In this paper, building upon information acquisition theory and using portfolio methods and system equations, we made an empirical investigation into how online vendors and consumers are learning from each other, and how online reviews, prices, and sales interact among each other. First, this study shows that vendors acquire information from both private and public channels to learn the quality of their products to make price adjustment. Second, for the more popular products and newly released products, vendors are more motivated to acquire private information that is more precise than the average precision to adjust their price. Third, we document …
Heterogeneous Embedding Propagation For Large-Scale E-Commerce User Alignment, Vincent W. Zheng, Mo Sha, Yuchen Li, Hongxia Yang, Yuan Fang, Zhenjie Zhang, Kian-Lee Tan, Kevin Chen-Chuan Chang
Heterogeneous Embedding Propagation For Large-Scale E-Commerce User Alignment, Vincent W. Zheng, Mo Sha, Yuchen Li, Hongxia Yang, Yuan Fang, Zhenjie Zhang, Kian-Lee Tan, Kevin Chen-Chuan Chang
Research Collection School Of Computing and Information Systems
We study the important problem of user alignment in e-commerce: to predict whether two online user identities that access an e-commerce site from different devices belong to one real-world person. As input, we have a set of user activity logs from Taobao and some labeled user identity linkages. User activity logs can be modeled using a heterogeneous interaction graph (HIG), and subsequently the user alignment task can be formulated as a semi-supervised HIG embedding problem. HIG embedding is challenging for two reasons: its heterogeneous nature and the presence of edge features. To address the challenges, we propose a novel Heterogeneous …
Jobsense: A Data-Driven Career Knowledge Exploration Framework And System, Xavier Jayaraj Siddarth Ashok, Ee-Peng Lim, Philips Kokoh Prasetyo
Jobsense: A Data-Driven Career Knowledge Exploration Framework And System, Xavier Jayaraj Siddarth Ashok, Ee-Peng Lim, Philips Kokoh Prasetyo
Research Collection School Of Computing and Information Systems
Today’s job market sees rapid changes due to technology and business model disruptions. To fully tap on one’s potential in career development, one has to acquire job and skill knowledge through working on different jobs. Another approach is to seek consultation with career coaches who are trained to offer career advice in various industry sectors. The above two approaches, nevertheless, suffer from several shortcomings. The on-the-job career development approach is highly inefficient for today’s fast changing job market. The latter career coach assisted approach could help to speed up knowledge acquisition but it relies on expertise of career coaches but …
How Sending E-Mails Compares With Carbon Emission Of Car Use, Thomas Menkhoff
How Sending E-Mails Compares With Carbon Emission Of Car Use, Thomas Menkhoff
Research Collection Lee Kong Chian School Of Business
Digitalnatives can reduce their carbon footprint by being conscious about Internetusage. Everwondered how your e-mails may contribute to your personal carbon footprint? Accordingto estimates published in Phys.org, sending a short e-mail adds about 4g of CO2equivalent (gCO2e) to the atmosphere (an e-mail with a long attachment has atenfold carbon footprint, that is 50 gCO2e.
Essays In Financial Economics: Announcement Effects In Fixed Income Markets, James J. Forest
Essays In Financial Economics: Announcement Effects In Fixed Income Markets, James J. Forest
Doctoral Dissertations
ABSTRACT ESSAYS IN FINANCIAL ECONOMICS: ANNOUNCEMENT EFFECTS IN FIXED INCOME MARKETS PHD IN FINANCE MAY 2018 JAMES J FOREST B.A., FRAMINGHAM STATE UNIVERSITY M.S., NORTHEASTERN UNIVERSITY Ph.D., UNIVERSITY OF MASSACHUSETTS – AMHERST Directed by: Professor Hossein B. Kazemi This dissertation demonstrates the use of empirical techniques for dealing with modeling issues that arise when analyzing announcement effects in fixed income markets. It describes empirical challenges in achieving unbiased and efficient parameter estimates and shows the importance of modelling a wide range of macroeconomic announcement effects to avoid omitted variable bias. Employing techniques common in Macroeconomics, financial market researchers are better …
The Santa Clara, 2018-10-25, Santa Clara University
The Santa Clara, 2018-10-25, Santa Clara University
The Santa Clara
No abstract provided.
2018 Celebration Of Scholarship, Creativity And Engagement, Eastern Illinois University
2018 Celebration Of Scholarship, Creativity And Engagement, Eastern Illinois University
Programs
Scholarship, creativity, innovation, and the many forms of collaborative engagement that shape faculty life and student learning are central to the mission of Eastern Illinois University. For that reason, our faculty, department chairs, college deans, the provost, and the entire campus community celebrate the achievements and outstanding contributions of our colleagues and students to their disciplines and professions every year.
And, as the following pages illustrate, faculty engaged in continuing scholarly and creative activities provide outstanding mentoring experiences for our undergraduate and graduate students.
In addition to recognizing faculty performances, shows, publications, grants and other professional efforts, the University will …
Quantitative Appraisal Of Non-Irrigated Cropland In South Dakota, Shelby Riggs
Quantitative Appraisal Of Non-Irrigated Cropland In South Dakota, Shelby Riggs
Honors Theses
This appraisal attempts to remove subjectivity from the appraisal process and replace it with quantitative analysis of known data to generate a fair market value of the subject property. Two methods of appraisal were used, the income approach and the comparable sales approach. For the income approach, I used the average cash rent for the region, the current property taxes for the subject property, and a capitalization rate based on Stokes' (2018) capitalization rate formula to arrive at my income-based valuation. For the comparable sales approach, I utilized Stokes' (2018) research in optimization modeling to estimate a market value for …
Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley
Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley
KSU Proceedings on Cybersecurity Education, Research and Practice
ABSTRACT
The purpose of this paper is to examine the outcomes of using a Learning Management System (LMS) course as a framework for mapping the Centers of Academic Excellence in Cyber Defense (CAE-CD) 2019 Knowledge Units (KU) to college courses. The experience shared herein will be useful to faculty who are interested in performing the mapping and applying for CAE-CDE designation.
Hijacking Wireless Communications Using Wifi Pineapple Nano As A Rogue Access Point, Shawn J. Witemyre, Tamirat T. Abegaz, Bryson R. Payne, Ash Mady
Hijacking Wireless Communications Using Wifi Pineapple Nano As A Rogue Access Point, Shawn J. Witemyre, Tamirat T. Abegaz, Bryson R. Payne, Ash Mady
KSU Proceedings on Cybersecurity Education, Research and Practice
Wireless access points are an effective solution for building scalable, flexible, mobile networks. The problem with these access points is often the lack of security. Users regularly connect to wireless access points without thinking about whether they are genuine or malicious. Moreover, users are not aware of the types of attacks that can come from “rogue” access points set up by attackers and what information can be captured by them. Attackers use this advantage to gain access to users’ confidential information. The objective of this study is to examine the effectiveness of the WiFi Pineapple NANO used as a rogue …
Towards A Development Of Predictive Models For Healthcare Hipaa Security Rule Violation Fines, Jim Furstenberg, Yair Levy
Towards A Development Of Predictive Models For Healthcare Hipaa Security Rule Violation Fines, Jim Furstenberg, Yair Levy
KSU Proceedings on Cybersecurity Education, Research and Practice
The Health Insurance Portability and Accountability Act’s (HIPAA) Security Rule (SR) mandate provides a national standard for the protection of electronic protected health information (ePHI). The SR’s standards provide healthcare covered entities (CEs’) flexibility in how to meet the standards because the SR regulators realized that all health care organizations are not the same. However, the SR requires CEs’ to implement reasonable and appropriate safeguards, as well as security controls that protect the confidentiality, integrity, and availability (CIA) of their ePHI data. However, compliance with the HIPAA SR mandates are confusing, complicated, and can be costly to CEs’. Flexibility in …
Using Project Management Knowledge And Practice To Address Digital Forensic Investigation Challenges, Steven S. Presley, Jeffrey P. Landry, Michael Black
Using Project Management Knowledge And Practice To Address Digital Forensic Investigation Challenges, Steven S. Presley, Jeffrey P. Landry, Michael Black
KSU Proceedings on Cybersecurity Education, Research and Practice
The management of digital forensics investigations represents a unique challenge. The field is relatively new, and combines the technical challenges of Information Systems with the legal challenges of forensics investigations. The challenges for the Digital Forensics Investigators and the organizations they support are many. This research effort examines the characteristics and challenges of Digital Forensics Investigations and compares them with the features and knowledge areas of project management. The goal was to determine if project management knowledge, as defined in a common body of knowledge, would be helpful in addressing digital forensics investigation challenges identified in the literature. The results …
Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley
Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley
KSU Proceedings on Cybersecurity Education, Research and Practice
ABSTRACT
The purpose of this paper is to discuss a curriculum design that employs Kolb’s Experiential Learning Theory stages and Kolb’s Learning Styles in four consecutive class sessions. The challenge each class is to present students with perplexing and often frustrating network problems that someday might be encountered on the job. By using Kolb’s theory, students address those problems from the perspective of each learning style, while passing through each phase of the learning cycle. As a result, students gain stronger cognitive thinking skills and hands-on troubleshooting skills in preparation for work as network administrators or cybersecurity analysts.
Capturing The Existential Cyber Security Threats From The Sub-Saharan Africa Zone Through Literature Database, Samuel B. Olatunbosun, Nathanial J. Edwards, Cytyra D. Martineau
Capturing The Existential Cyber Security Threats From The Sub-Saharan Africa Zone Through Literature Database, Samuel B. Olatunbosun, Nathanial J. Edwards, Cytyra D. Martineau
KSU Proceedings on Cybersecurity Education, Research and Practice
Abstract - The Internet brought about the phenomenon known as Cyber-space which is boundless in nature. It is one of the fastest-growing areas of technical infrastructure development over the past decade. Its growth has afforded everyone the opportunity to carry out one or more transactions for personal benefits. The African continent; often branded as ‘backward’ by the Western press has been able to make substantial inroads into the works of Information and Computer Technology (ICT). This rapid transition by Africans into ICT power has thus opened up the opportunities for Cybercriminal perpetrators to seek and target victims worldwide including America …
Laboratory Exercises To Accompany Industrial Control And Embedded Systems Security Curriculum Modules, Gretchen Richards
Laboratory Exercises To Accompany Industrial Control And Embedded Systems Security Curriculum Modules, Gretchen Richards
KSU Proceedings on Cybersecurity Education, Research and Practice
The daily intrusion attempts and attacks on industrial control systems (ICS) and embedded systems (ES) underscore the criticality of the protection of our Critical Infrastructures (CIs). As recent as mid-July 2018, numerous reports on the infiltration of US utility control rooms by Russian hackers have been published. These successful infiltration and possible manipulation of the utility companies could easily translate to a devastating attack on our nation’s power grid and, consequently, our economy and well-being. Indeed, the need to secure the control and embedded systems which operate our CIs has never been so pronounced. In our attempt to address this …
A Blockchain-Based Security-Oriented Framework For Cloud Federation, Ramandeep Kaur Sandhu, Kweku Muata A. Osei-Bryson
A Blockchain-Based Security-Oriented Framework For Cloud Federation, Ramandeep Kaur Sandhu, Kweku Muata A. Osei-Bryson
KSU Proceedings on Cybersecurity Education, Research and Practice
Cloud federations have been formed to share the services, prompt and support cooperation, as well as interoperability among their already deployed cloud systems. However, the creation and management of the cloud federations lead to various security issues such as confidentially, integrity and availability of the data. Despite the access control policies in place, an attacker may compromise the communication channel processing the access requests and the decisions between the access control systems and the members(users) and vice-versa. In cloud federation, the rating of the services offered by different cloud members becomes integral to providing the users with the best quality …
Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros
Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros
KSU Proceedings on Cybersecurity Education, Research and Practice
Internet of things (IoT) offer new opportunities for advancement in many domains including healthcare, home automation, manufacturing and transportation. In recent years, the number of IoT devices have exponentially risen and this meteoric rise is poised to continue according to the industry. Advances in the IoT integrated with ambient intelligence are intended to make our lives easier. Yet for all these advancements, IoT also has a dark side. Privacy and security were already priorities when personal computers, devices and work stations were the only point of vulnerability to personal information, however, with the ubiquitous nature of smart technologies has increased …
Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne
Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne
KSU Proceedings on Cybersecurity Education, Research and Practice
In most wireless channels, the signals propagate in all directions. For the communication between Alice and Bob, an Eavesdropper can receive the signals from both Alice and Bob as far as the Eavesdropper is in the range determined by the transmitting power. Through phased array antenna with beam tracking circuits or cooperative iteration, the signals are confined near the straight line connecting the positions of Alice and Bob, so it will largely reduce the valid placement of an Eavesdropper. Sometimes, this reduction can be prohibitive for Eavesdropper to wiretap the channel since the reduced space can be readily protected. Two …
Car Hacking: Can It Be That Simple?, Bryson Payne
Car Hacking: Can It Be That Simple?, Bryson Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
The Internet of Things (IoT) has expanded the reach of technology at work, at home, and even on the road. As Internet-connected and self-driving cars become more commonplace on our highways, the cybersecurity of these “data centers on wheels” is of greater concern than ever. Highly publicized hacks against production cars, and a relatively small number of crashes involving autonomous vehicles, have brought the issue of securing smart cars to the forefront as a matter of public and individual safety. This article describes the integration of a module on car hacking into a semester-long ethical hacking cybersecurity course, including full …
Evaluating Two Hands-On Tools For Teaching Local Area Network Vulnerabilities, Ariana Brown, Jinsheng Xu, Xiaohong Yuan
Evaluating Two Hands-On Tools For Teaching Local Area Network Vulnerabilities, Ariana Brown, Jinsheng Xu, Xiaohong Yuan
KSU Proceedings on Cybersecurity Education, Research and Practice
According to the Verizon’s Data Breach Investigations Report, Local Area Network (LAN) access is the top vector for insider threats and misuses. It is critical for students to learn these vulnerabilities, understand the mechanisms of exploits, and know the countermeasures. The department of Computer Science at North Carolina A&T State University designed two different educational tools that help students learn ARP Spoofing Attacks, which is the most popular attack on LAN. The first tool, called Hacker’s Graphical User Interface (HGUI), is a visualization tool that demonstrates ARP Spoofing Attack with real time animation. The second tool is a hands-on (HandsOn) …
Towards An Empirical Assessment Of Cybersecurity Readiness And Resilience In Small Businesses, Darrell Eilts, Yair Levy
Towards An Empirical Assessment Of Cybersecurity Readiness And Resilience In Small Businesses, Darrell Eilts, Yair Levy
KSU Proceedings on Cybersecurity Education, Research and Practice
Many small businesses struggle to improve their cybersecurity posture despite the risk to their business. Small businesses lacking adequate protection from cyber threats, or a business continuity strategy to recover from disruptions, have a very high risk of loss due to a cyberattack. These cyberattacks, either deliberate or unintentional, can become costly when a small business is not prepared. This developmental research is focused on the relationship between two constructs that are associated with readiness and resilience of small businesses based on their cybersecurity planning, implementation, as well as response activities. A Cybersecurity Preparedness-Risk Taxonomy (CyPRisT) is proposed using the …
Digital Identity, Philip Andreae
Digital Identity, Philip Andreae
KSU Proceedings on Cybersecurity Education, Research and Practice
No abstract provided.
Why Managing 3rd Party Cybersecurity Risk Is A Matter Of National Security, Keith Deininger
Why Managing 3rd Party Cybersecurity Risk Is A Matter Of National Security, Keith Deininger
KSU Proceedings on Cybersecurity Education, Research and Practice
No abstract provided.
Six Things I Wish New Employees Knew, Brian Albertson
Six Things I Wish New Employees Knew, Brian Albertson
KSU Proceedings on Cybersecurity Education, Research and Practice
No abstract provided.
Why Networks Still Matter, Tim O'Neill
Why Networks Still Matter, Tim O'Neill
KSU Proceedings on Cybersecurity Education, Research and Practice
No abstract provided.