Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Physical Sciences and Mathematics
Economic Entanglement: The Quantum Race Between The United States And China, Isabella Willhite
Economic Entanglement: The Quantum Race Between The United States And China, Isabella Willhite
Regis University Student Publications (comprehensive collection)
The United States and China are both currently home to the strongest economies and militaries in the world. Despite their interdependence, trade wars have escalated between the two countries in the past few years. While past trade wars have been focused on purely economic protectionism or ideological stances, the trade wars of today signify a shift towards protecting critical emerging technologies. The important emerging technology of today is quantum computing, which will forever change the way that computers encrypt, process, and decode information. The United States and China are on the eve of the “quantum race,” in which they will …
The Future Of Artificial Intelligence In The Healthcare Industry, Erika Bonnist
The Future Of Artificial Intelligence In The Healthcare Industry, Erika Bonnist
Honors Theses
Technology has played an immense role in the evolution of healthcare delivery for the United States and on an international scale. Today, perhaps no innovation offers more potential than artificial intelligence. Utilizing machine intelligence as opposed to human intelligence for the purposes of planning, offering solutions, and providing insights, AI has the ability to alter traditional dynamics between doctors, patients, and administrators; this reality is now producing both elation at artificial intelligence's medical promise and uncertainty regarding its capacity in current systems. Nevertheless, current trends reveal that interest in AI among healthcare stakeholders is continuously increasing, and with the current …
A Comprehensive Cybersecurity Policy For The United States Government According To Cyberattacks And Exploits In The 21st Century, Diana Hallisey
A Comprehensive Cybersecurity Policy For The United States Government According To Cyberattacks And Exploits In The 21st Century, Diana Hallisey
Honors Program Contracts
Adversaries launch cyberattacks or cyber-exploits with contrasting intentions and desired outcomes. A cyberattack is a malicious attempt by a state, third party, or individual to disrupt a computer’s network; whereas, a cyber-exploit is an action that uncovers and steals “confidential” information from a computer’s data. 1 Within this research paper, the main adversary of such cyberattacks and/or exploits will be the nation-state. The victims of these cyberattacks will range from multinational corporations, such as Sony, to nuclear programs in Iran. This essay will focus on four motivations behind such cyberattacks: (1) private sector hacking (the theft of intellectual property) (2) …