Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Kennesaw State University (24)
- Old Dominion University (10)
- Singapore Management University (4)
- Bowling Green State University (1)
- Chapman University (1)
-
- City University of New York (CUNY) (1)
- Edith Cowan University (1)
- James Madison University (1)
- University of Arkansas, Fayetteville (1)
- University of Central Florida (1)
- University of Nevada, Las Vegas (1)
- University of New Hampshire (1)
- University of New Mexico (1)
- University of Southern Maine (1)
- University of the Philippines Los Baños (1)
- West Virginia University (1)
- Western University (1)
- Keyword
-
- Cybersecurity (8)
- Artificial intelligence (5)
- Social engineering (3)
- Sustainability (3)
- Blockchain (2)
-
- Editorial (2)
- Estimation (2)
- Information security (2)
- Internet (2)
- Judgment error in cybersecurity (2)
- Mentoring (2)
- Phishing email mitigation (2)
- Technology (2)
- AI monitoring (1)
- Academic institutions (1)
- Active Learning (1)
- Adaptation models (1)
- Advertising (1)
- Advising (1)
- Affective computing (1)
- Agile software development (1)
- Agile software effort estimation (1)
- Analytical hierarchy process (1)
- Anzac (1)
- Attributes (1)
- Audio (1)
- Automation (1)
- Bitcoin (1)
- Blockchain Adoption (1)
- Bug fix (1)
- Publication
-
- Journal of Cybersecurity Education, Research and Practice (14)
- KSU Proceedings on Cybersecurity Education, Research and Practice (8)
- Information Technology & Decision Sciences Faculty Publications (6)
- Research Collection School Of Computing and Information Systems (3)
- African Conference on Information Systems and Technology (1)
-
- Computer Science Faculty Publications (1)
- Economics Faculty Articles and Research (1)
- Electrical & Computer Engineering Faculty Publications (1)
- Environment (1)
- Graduate Theses, Dissertations, and Problem Reports (1)
- Honors Projects (1)
- Honors Theses and Capstones (1)
- Human-Machine Communication (1)
- James Madison Undergraduate Research Journal (JMURJ) (1)
- Journal of Economics, Management and Agricultural Development (1)
- KSU Distinguished Course Repository (1)
- Perspectives@SMU (1)
- Research outputs 2014 to 2021 (1)
- STEMPS Faculty Publications (1)
- Student Theses and Dissertations (1)
- TFSC Publications and Presentations (1)
- Teacher Education, Educational Leadership & Policy ETDs (1)
- Thinking Matters Symposium (1)
- Undergraduate Student Research Internships Conference (1)
- VMASC Publications (1)
- Publication Type
- File Type
Articles 1 - 30 of 52
Full-Text Articles in Physical Sciences and Mathematics
Preferences Of Coffee Farmers For Attributes Of Selected Coffee Technologies In The Philippines, Jayson S. Cabral, Dia Noelle F. Velasco, Mar B. Cruz, Nohreen Ethel P. Manipol, Hannah D. Miranda-Quibot
Preferences Of Coffee Farmers For Attributes Of Selected Coffee Technologies In The Philippines, Jayson S. Cabral, Dia Noelle F. Velasco, Mar B. Cruz, Nohreen Ethel P. Manipol, Hannah D. Miranda-Quibot
Journal of Economics, Management and Agricultural Development
This paper looked into the preferences of 151 coffee farmers for the attributes of selected coffee technologies. The study was done to help guide technology developers in crafting post harvest processing facilities for coffee which their target market will need which can lead to a higher probability of commercialization of new coffee technologies. The study examined the preferences for attributes for coffee dryers, moisture meters, coffee depulpers, and coffee sorters using the Analytic Hierarchy Process (AHP) framework. The results revealed that the quality of the final product is the top priority for coffee farmers when choosing a coffee dryer. Non-destructiveness …
Science, Technology, Engineering, And Mathematics (Stem) Project-Based Learning (Pbl) Education: A New Mexico Case Study For Equity And Inclusion, Kimberly A. Scheerer
Science, Technology, Engineering, And Mathematics (Stem) Project-Based Learning (Pbl) Education: A New Mexico Case Study For Equity And Inclusion, Kimberly A. Scheerer
Teacher Education, Educational Leadership & Policy ETDs
This research addresses how student participation in Science, Technology, Engineering, and Mathematics (STEM) project-based learning (PBL) education activities encourages underrepresented minority student achievement in STEM career field trajectories. Seven New Mexico high school counselors and 12 STEM organization personnel were interviewed during this study. Their responses represent the nuanced professional voices where New Mexico public education intersects with STEM student interest and cultural influence.
For students, STEM PBL can foster deep integration across educational disciplines and enhance STEM career trajectory interest and readiness. STEM education converged with PBL methodologies has the ability to leverage community support while broadening student networks. …
Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss
Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss
KSU Proceedings on Cybersecurity Education, Research and Practice
Water quality refers to measurable water characteristics, including chemical, biological, physical, and radiological characteristics usually relative to human needs. Dumping waste and untreated sewage is the reason for water pollution and several diseases to the living hood. The quality of water can also have a significant impact on animals and plant ecosystems. Therefore, keeping track of water quality is a substantial national interest. Much research has been done for measuring water quality using sensors to prevent water pollution. In summary, those systems are built based on online and reagent-free water monitoring SCADA systems in wired networks. However, centralized servers, transmission …
Cybercrime In The Developing World, David A. Ghelerter, John E. Wilson, Noah L. Welch, John-David Rusk
Cybercrime In The Developing World, David A. Ghelerter, John E. Wilson, Noah L. Welch, John-David Rusk
KSU Proceedings on Cybersecurity Education, Research and Practice
This paper attempts to discover the reasons behind the increase in cybercrime in developing nations over the past two decades. It discusses many examples and cases of projects to increase internet access in developing countries and how they enabled cybercrime. This paper examines how nations where many cybercrimes occurred, did not have the necessary resources or neglected to react appropriately. The other primary focus is how cybercrimes are not viewed the same as other crimes in many of these countries and how this perception allows cybercriminals to do as they please with no stigma from their neighbors. It concludes that …
Microtransactions And Gambling In The Video Game Industry, Christopher L. Antepenko, Samuel R. Rickey, Angel L. Hibbets, John-David Rusk
Microtransactions And Gambling In The Video Game Industry, Christopher L. Antepenko, Samuel R. Rickey, Angel L. Hibbets, John-David Rusk
KSU Proceedings on Cybersecurity Education, Research and Practice
The beginning of the 21st century has had a drastic effect on the video game industry. The advent of almost universal Internet access, the release of inexpensive broadband-enabled consoles, and the availability of mobile gaming have led to game developers and publishers heavily relying on premium in-game currencies, exclusive paid items, and loot boxes to subsidize or even replace profits from traditional video game business models. By 2020, in-game purchases made up a market of $92.6B worldwide and, in the US, experienced growth of over 30%.[1] In this highly lucrative market, the legal and ethical landscape is constantly bubbling with …
Social Media Platforms And Responsibility For Disinformation, Matt T. Figlia, Brandon M. Henschen, Joseph T. Sims, John-David Rusk
Social Media Platforms And Responsibility For Disinformation, Matt T. Figlia, Brandon M. Henschen, Joseph T. Sims, John-David Rusk
KSU Proceedings on Cybersecurity Education, Research and Practice
Researchers are paying closer attention to the rise of disinformation on social media platforms and what responsibility, if any, the companies that control these platforms have for false information being spread on their websites. In this paper, we highlight the recent growth in concern regarding online disinformation, discuss other works regarding the use of social media as a tool for spreading disinformation, and discuss how coordinated disinformation campaigns on social media platforms are used to spread propaganda and lies about current political events. We also evaluate the reactions of social media platforms in combatting disinformation and the difficulty in policing …
Towards Assessing Organizational Cybersecurity Risks Via Remote Workers’ Cyberslacking And Their Computer Security Posture, Ariel Luna, Yair Levy, Gregory Simco, Wei Li
Towards Assessing Organizational Cybersecurity Risks Via Remote Workers’ Cyberslacking And Their Computer Security Posture, Ariel Luna, Yair Levy, Gregory Simco, Wei Li
KSU Proceedings on Cybersecurity Education, Research and Practice
Cyberslacking is conducted by employees who are using their companies’ equipment and network for personal purposes instead of performing their work duties during work hours. Cyberslacking has a significant adverse effect on overall employee productivity, however, recently, due to COVID19 pandemic move to remote working also pose a cybersecurity risk to organizations networks and infrastructure. In this work-in-progress research study, we are developing, validating, and will empirically test taxonomy to assess an organization’s remote workers’ risk level of cybersecurity threats. This study includes a three-phased developmental approach in developing the Remote Worker Cyberslacking Security Risk Taxonomy. With feedback from cybersecurity …
Nids In Airgapped Lans--Does It Matter?, Winston Messer
Nids In Airgapped Lans--Does It Matter?, Winston Messer
KSU Proceedings on Cybersecurity Education, Research and Practice
This paper presents an assessment of the methods and benefits of adding network intrusion detection systems (NIDS) to certain high-security airgapped isolated local area networks. The proposed network architecture was empirically tested via a series of simulated network attacks on a virtualized network. The results show an improvement of double the chances of an analyst receiving a specific, appropriately-severe alert when NIDS is implemented alongside host-based measures when compared to host-based measures alone. Further, the inclusion of NIDS increased the likelihood of the analyst receiving a high-severity alert in response to the simulated attack attempt by four times when compared …
What You See Is Not What You Know: Deepfake Image Manipulation, Cathryn Allen, Bryson Payne, Tamirat Abegaz, Chuck Robertson
What You See Is Not What You Know: Deepfake Image Manipulation, Cathryn Allen, Bryson Payne, Tamirat Abegaz, Chuck Robertson
KSU Proceedings on Cybersecurity Education, Research and Practice
Research indicates that deceitful videos tend to spread rapidly online and influence people’s opinions and ideas. Because of this, video misinformation via deepfake video manipulation poses a significant online threat. This study aims to discover what factors can influence viewers’ capability of distinguishing deepfake videos from genuine video footage. This work focuses on exploring deepfake videos’ potential use for deception and misinformation by exploring people’s ability to determine whether videos are deepfakes in a survey consisting of deepfake videos and original unedited videos. The participants viewed a set of four videos and were asked to judge whether the videos shown …
Editors' Preface, Michael E. Whitman, Herbert J. Mattord, Hossain Shahriar
Editors' Preface, Michael E. Whitman, Herbert J. Mattord, Hossain Shahriar
KSU Proceedings on Cybersecurity Education, Research and Practice
Since 2004, Kennesaw State University, Georgia, has hosted an academic conference. Over the years, the event has brought together hundreds of faculty and students from throughout the U.S., sharing research into pedagogical efforts and instructional innovations. Initially, the conference was named the Information Security Curriculum Development conference and served as KSU’s contribution to engage our colleagues in growing security education from its infancy. It was paired with KSU’s inaugural security education journal, the Information Security Education Journal. In 2016, the event was rebranded as the Conference on Cybersecurity Education, Research, and Practice to reflect both an expansion of topics suitable …
Principles Of Information Security, Alison Hedrick
Principles Of Information Security, Alison Hedrick
KSU Distinguished Course Repository
An introduction to the various technical and administrative aspects of Information Security and Assurance. This course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features.
What Machines Can't Do (Yet) In Real Work Settings, Thomas H. Davenport, Steven M. Miller
What Machines Can't Do (Yet) In Real Work Settings, Thomas H. Davenport, Steven M. Miller
Research Collection School Of Computing and Information Systems
AI systems may perform well in the research lab or under highly controlled application settings, but they still needed human help in the types of real world work settings we researched for a new book, Working With AI: Real Stories of Human-Machine Collaboration. Human workers were very much in evidence across our 30 case studies. In this article, we use those examples to illustrate our list of AI-enabled activities that still require human assistance. These are activities where organizations need to continue to invest in human capital, and where practitioners can expect job continuity for the immediate future
Dynamic Return Relationships In The Market For Cryptocurrency: A Var Approach, Julian Gouffray
Dynamic Return Relationships In The Market For Cryptocurrency: A Var Approach, Julian Gouffray
James Madison Undergraduate Research Journal (JMURJ)
This paper examines how the Bitcoin-altcoin return relationship has evolved in periods between 2015 and 2020. To understand this relation, we observe data on the cryptocurrency Bitcoin and prominent altcoins Ethereum, Litecoin, Ripple, Stellar, and Monero, which collectively represent over 90% of the market throughout the observed period. We employ a vector autoregressive model (VAR) to produce forecast error variance decompositions, orthogonal impulse response functions, and Granger-causality tests. We find evidence that Bitcoin return variation has increasingly explained altcoin returns and that market inefficiency increased between 2017 and 2020, as shown by increased Granger causality between Bitcoin and altcoins. These …
Artificial Intelligence And Human Employment, Singapore Management University
Artificial Intelligence And Human Employment, Singapore Management University
Perspectives@SMU
AI will replace humans in repetitive tasks. Greater value can be created when it augments and complements the jobs people do
Singapore Public Sector Ai Applications Emphasizing Public Engagement: Six Examples, Steven M. Miller
Singapore Public Sector Ai Applications Emphasizing Public Engagement: Six Examples, Steven M. Miller
Research Collection School Of Computing and Information Systems
This article provides an overview of six examples of public sector AI applications in Singapore that illustrate different ways of enhancing engagement with the public. These applications demonstrate ways of enhancing engagement with the public by providing greater accessibility to government services (access anywhere, anytime) and speedier responses to public processes and feedback. Some applications make it substantially easier for members of the public to do things or make choices, while others reduce waiting time, either across an entire public infrastructure, or for an individual transaction. Some provide highly individualized coaching to guide a person through the process of doing …
Factors That Influence The Implementation Of Information And Communication Technology Inclusive Design Practices In Organisations, Faizel Ebrahim, Salah Kabanda, Guidance Mthwazi
Factors That Influence The Implementation Of Information And Communication Technology Inclusive Design Practices In Organisations, Faizel Ebrahim, Salah Kabanda, Guidance Mthwazi
African Conference on Information Systems and Technology
Inclusive design in information and communication technology (ICT) is the development of information and communication technology artifacts that are accessible and easy to use for as many people as possible. Human diversities must be considered when producing these inclusive design artifacts. It is not only important for abled people but also extends to people with disabilities, the elderly and anybody challenged with using these artifacts. Yet, few designers and developers adopt inclusive design methodologies in their practice. This study seeks to identify and understand the factors that influence the implementation of inclusive design practices in organisations. The methodology was based …
A Qualitative Look Into Repair Practices, Jumana Labib
A Qualitative Look Into Repair Practices, Jumana Labib
Undergraduate Student Research Internships Conference
This research poster is based on a working research paper which moves beyond the traditional scope of repair and examines the Right to Repair movement from a smaller, more personal lens by detailing the 6 categorical impediments as dubbed by Dr. Alissa Centivany (design, law, economic/business strategy, material asymmetry, informational asymmetry, and social impediments) have continuously inhibited repair and affected repair practices, which has consequently had larger implications (environmental, economic, social, etc.) on ourselves, our objects, and our world. The poster builds upon my research from last year (see "The Right to Repair: (Re)building a better future"), this time pulling …
Renewable Energy Legislation In Nevada: 2017 - 2021, Peter Grema, Zachary Walusek, Caitlin J. Saladino, William E. Brown Jr.
Renewable Energy Legislation In Nevada: 2017 - 2021, Peter Grema, Zachary Walusek, Caitlin J. Saladino, William E. Brown Jr.
Environment
The purpose of this fact sheet is to summarize legislative actions from the biennial 79th, 80th, and 81st Nevada Legislative Sessions (2017, 2019, and 2021) regarding solar energy production and state efforts to reach 50 percent energy production from renewable sources by 2030. By 2050, Nevada has a statutorily mandated obligation to be a net-zero carbon producer in fulfilling energy production needs from large scale utility services.
Smart Manufacturing—Theories, Methods, And Applications, Zhuming Bi, Lida Xu, Puren Ouyang
Smart Manufacturing—Theories, Methods, And Applications, Zhuming Bi, Lida Xu, Puren Ouyang
Information Technology & Decision Sciences Faculty Publications
(First paragraph) Smart manufacturing (SM) distinguishes itself from other system paradigms by introducing ‘smartness’ as a measure to a manufacturing system; however, researchers in different domains have different expectations of system smartness from their own perspectives. In this Special Issue (SI), SM refers to a system paradigm where digital technologies are deployed to enhance system smartness by (1) empowering physical resources in production, (2) utilizing virtual and dynamic assets over the internet to expand system capabilities, (3) supporting data-driven decision making at all domains and levels of businesses, or (4) reconfiguring systems to adapt changes and uncertainties in dynamic environments. …
Cybersecurity Educational Resources For K-12, Debra Bowen, James Jaurez, Nancy Jones, William Reid, Christopher Simpson
Cybersecurity Educational Resources For K-12, Debra Bowen, James Jaurez, Nancy Jones, William Reid, Christopher Simpson
Journal of Cybersecurity Education, Research and Practice
There are many resources to guide successful K-12 cybersecurity education. The objective of these resources is to prepare skilled and ethical cybersecurity students at the earliest level to meet the demands of higher-level programs. The goal of this article is to provide, as a starting point, a list of as many currently popular K-12 educational resources as possible. The resources provided are broken into five categories: 1) Career Information, 2) Curriculum, 3) Competitions, 4) CyberCamps, and 5) Labs and Gaming. Each resource listed has a link, the K-12 levels that are supported, whether the resource is free or has a …
Digital Contact Tracing And Privacy, Mahdi Nasereddin, Edward J. Glantz, Galen A. Grimes, Joanne Peca, Michelle Gordon, Mike Bartolacci
Digital Contact Tracing And Privacy, Mahdi Nasereddin, Edward J. Glantz, Galen A. Grimes, Joanne Peca, Michelle Gordon, Mike Bartolacci
Journal of Cybersecurity Education, Research and Practice
Digital contact tracing tools were developed to decrease the spread of COVID-19 by supplementing traditional manual methods. Although these tools have great potential, they were developed rather quickly resulting in tools with varying levels of success. The main issues with these tools are over privacy and who might have access to the information gathered. In general, their effectiveness varied globally, where users expressed privacy concerns associated with sharing identity, illness, and location information. This paper reviews these issues in deployments across Asia, Europe, and the United States. The goal is to begin a discussion that improves the design and development …
Security Simulations In Undergraduate Education: A Review, Joseph Simpson, Aaron Brantly
Security Simulations In Undergraduate Education: A Review, Joseph Simpson, Aaron Brantly
Journal of Cybersecurity Education, Research and Practice
Several decades of research in simulation and gamification in higher education shows that simulations are highly effective in improving a range of outcomes for students including declarative knowledge and interest in the topic being taught. While there appears to be a broad array of options to provide education in an undergraduate setting related to security, no previous reviews have explored computer-based simulations covering all facets of security. Given the increasing importance and adoption of interdisciplinary educational programs, it is important to take stock of simulations as a tool to broaden the range of problems, perspectives, and solutions presented to students. …
Assessing The Practical Cybersecurity Skills Gained Through Criminal Justice Academic Programs To Benefit Security Operations Centers (Socs), Lucy Tsado, Jung Seob "Scott" Kim
Assessing The Practical Cybersecurity Skills Gained Through Criminal Justice Academic Programs To Benefit Security Operations Centers (Socs), Lucy Tsado, Jung Seob "Scott" Kim
Journal of Cybersecurity Education, Research and Practice
Private-sector and public-sector organizations have increasingly built specific business units for securing company assets, reputation, and lives, known as security operations centers (SOCs). Depending on the organization, these centers may also be referred to as global security operations centers, cybersecurity operations centers, fusion centers, and corporate command centers, among many other names. The concept of centralized function within an organization to improve an organization’s security posture has attracted both the government and the private sectors to either build their own SOCs or hire third-party SOC companies.
In this article, the need for a multidisciplinary approach to cybersecurity education at colleges …
Editorial, Michael E. Whitman, Herbert J. Mattord, Hossain Shahriar
Editorial, Michael E. Whitman, Herbert J. Mattord, Hossain Shahriar
Journal of Cybersecurity Education, Research and Practice
Since 2016, it has been the mission of the Journal of Cybersecurity Education, Research, and Practice (JCERP) to be a premier outlet for high-quality information security and cybersecurity-related articles of interest to teaching faculty and students. This is the 12th edition of the (JCERP) and, as ever, we are seeking authors who produce high-quality research and practice-oriented articles focused on the development and delivery of information security and cybersecurity curriculum, innovation in applied scholarship, and industry best practices in information security and cybersecurity in the enterprise for double-blind review and publication. The journal invites submissions on Information Security, Cybersecurity, …
The Significance Of Sonic Branding To Strategically Stimulate Consumer Behavior: Content Analysis Of Four Interviews From Jeanna Isham’S “Sound In Marketing” Podcast, Ina Beilina
Student Theses and Dissertations
Purpose:
Sonic branding is not just about composing jingles like McDonald’s “I’m Lovin’ It.” Sonic branding is an industry that strategically designs a cohesive auditory component of a brand’s corporate identity. This paper examines the psychological impact of music and sound on consumer behavior reviewing studies from the past 40 years and investigates the significance of stimulating auditory perception by infusing sound in consumer experience in the modern 2020s.
Design/methodology/approach:
Qualitative content analysis of audio media was used to test two hypotheses. Four archival oral interview recordings from Jeanna Isham’s podcast “Sound in Marketing” featuring the sonic branding experts …
Active Learning With Cybersecurity, Carole Shook
Active Learning With Cybersecurity, Carole Shook
TFSC Publications and Presentations
A global campus grant was obtained in Spring 2020 to develop modules for Cybersecurity. This presentation encompasses the use of Cyberciege and case studies that require active learning of students.
To Adopt Blockchain Technology Or Not: Is The Decision-Making Process Immune To Covid-19?, Rebecca Jauch
To Adopt Blockchain Technology Or Not: Is The Decision-Making Process Immune To Covid-19?, Rebecca Jauch
Thinking Matters Symposium
Blockchain technology has been shown to have advantages in improving the effectiveness of supply chain management. We use the Technology-Organization-Environment (TOE) framework with Threat-Rigidity Theory (TRT) to determine the factors that lead U.S. businesses to adopt blockchain technology, the factors that act as barriers to adoption, and the disruptive effect of COVID-19 on the rate of blockchain adoption
Sustainability In Web Development Through Energy Efficiency, Hannah Bebinger
Sustainability In Web Development Through Energy Efficiency, Hannah Bebinger
Honors Projects
As global internet usage expands, websites are growing in both size and complexity. Contrary to the common belief that the internet is immaterial and “environmentally friendly”, web pages have significant negative environmental impacts (Frick, 2015). Websites contribute to global greenhouse gas (GHG) emissions and electricity consumption. Considering the current climate crisis, it is crucial that web developers be aware of the impact that their work has on the environment and actively work to improve site energy efficiency. With a lack of regulation and awareness, the environmental impact of websites has remained unchecked despite growing concerns for sustainability. Further research and …
Human-Machine Communication: Complete Volume 4
Human-Machine Communication: Complete Volume 4
Human-Machine Communication
This is the complete volume of HMC Volume 4.
How Apis Create Growth By Inverting The Firm, Seth G. Benzell, Jonathan Hersh, Marshall Van Alstyne
How Apis Create Growth By Inverting The Firm, Seth G. Benzell, Jonathan Hersh, Marshall Van Alstyne
Economics Faculty Articles and Research
Traditional asset management strategy has emphasized building barriers to entry or closely guarding unique assets to maintain a firm’s comparative advantage. A new “Inverted Firm” paradigm, however, has emerged. Under this strategy, firms share data seeking to become platforms by opening digital services to third-parties and capturing part of their external surplus. This contrasts with a “pipeline” strategy where the firm itself creates value. This paper quantitatively estimates the effect of adopting an inverted firm strategy through the lens of Application Programming Interfaces (APIs), a key enabling technology. Using both public data and that of a private API development firm, …