Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Machine learning (3)
- Social media (3)
- Transportation (3)
- Bibliometric analysis (2)
- Command and control systems (2)
-
- Data (2)
- GIS (2)
- Information retrieval (2)
- Knowledge management (2)
- Models (2)
- Privacy (2)
- Social influence (2)
- Symposia (2)
- Web archiving (2)
- 3D face analysis (1)
- AI ethics (1)
- Accurate core point location (1)
- Affective computing (1)
- Agent-based model (1)
- Agent-based modeling (ABM) (1)
- Algorithm (1)
- Analysis (1)
- And control information exchange Data Model (JC3IEDM) (1)
- And experimentation (MATREX) (1)
- Animal studies (1)
- Archives (1)
- Archives & records (1)
- Army personnel (1)
- Artificial satellites (1)
- Assistive systems (1)
- Publication Year
- Publication
-
- Computational Modeling & Simulation Engineering Faculty Publications (13)
- Modeling, Simulation and Visualization Student Capstone Conference (6)
- Computer Science Theses & Dissertations (5)
- Cybersecurity Undergraduate Research Showcase (5)
- VMASC Publications (5)
-
- Computational Modeling & Simulation Engineering Theses & Dissertations (4)
- Electrical & Computer Engineering Theses & Dissertations (3)
- Electrical & Computer Engineering Faculty Publications (2)
- Engineering Management & Systems Engineering Faculty Publications (2)
- Engineering Technology Faculty Publications (2)
- Psychology Theses & Dissertations (2)
- The Journal of Sociotechnical Critique (2)
- Civil & Environmental Engineering Faculty Publications (1)
- Civil & Environmental Engineering Theses & Dissertations (1)
- Computer Ethics - Philosophical Enquiry (CEPE) Proceedings (1)
- Computer Science Faculty Publications (1)
- Computer Science Presentations (1)
- Distance Learning Faculty & Staff Books (1)
- Engineering Management & Systems Engineering Projects for D. Eng. Degree (1)
- Engineering Management & Systems Engineering Theses & Dissertations (1)
- English Theses & Dissertations (1)
- January 23, 2015: Storm Surge Modeling Tools for Planning and Response (1)
- OUR Journal: ODU Undergraduate Research Journal (1)
- Virginia Journal of Science (1)
- Publication Type
Articles 1 - 30 of 63
Full-Text Articles in Social and Behavioral Sciences
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
Cybersecurity Undergraduate Research Showcase
The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …
Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins
Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins
Cybersecurity Undergraduate Research Showcase
This paper will present the capabilities and security concerns of public AI, also called generative AI, and look at the societal and sociological effects of implementing regulations of this technology.
Assessing The Prevalence And Archival Rate Of Uris To Git Hosting Platforms In Scholarly Publications, Emily Escamilla
Assessing The Prevalence And Archival Rate Of Uris To Git Hosting Platforms In Scholarly Publications, Emily Escamilla
Computer Science Theses & Dissertations
The definition of scholarly content has expanded to include the data and source code that contribute to a publication. While major archiving efforts to preserve conventional scholarly content, typically in PDFs (e.g., LOCKSS, CLOCKSS, Portico), are underway, no analogous effort has yet emerged to preserve the data and code referenced in those PDFs, particularly the scholarly code hosted online on Git Hosting Platforms (GHPs). Similarly, Software Heritage is working to archive public source code, but there is value in archiving the surrounding ephemera that provide important context to the code while maintaining their original URIs. In current implementations, source code …
Hampton Roads' Building Resilient Communities Flood Game, Gul Ayaz, Katherine Smith, Rafael Diaz, Joshua G. Behr
Hampton Roads' Building Resilient Communities Flood Game, Gul Ayaz, Katherine Smith, Rafael Diaz, Joshua G. Behr
Modeling, Simulation and Visualization Student Capstone Conference
As rising sea levels and subsequent recurrent flooding disproportionately affects coastal areas, it is crucial to develop a heightened awareness of the impacts of natural disasters on communities and the environments they live in. The Hampton Roads’ Building Resilient Communities (BRC) Flood Game is a simulation role-playing game designed to allow players to increase their understanding of the impact of various community response interventions to sea level rise and recurrent flooding. Players will examine and assess the tradeoffs of resiliency investments, the impact policies may have on the population, and the amount of time return on investment takes. The BRC …
Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis
Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis
Modeling, Simulation and Visualization Student Capstone Conference
Maritime autonomy, specifically the use of autonomous and semi-autonomous maritime vessels, is a key enabling technology supporting a set of diverse and critical research areas, including coastal and environmental resilience, assessment of waterway health, ecosystem/asset monitoring and maritime port security. Critical to the safe, efficient and reliable operation of an autonomous maritime vessel is its ability to perceive on-the-fly the external environment through onboard sensors. In this paper, buoy detection for LiDAR images is explored by using several tools and techniques: machine learning methods, Unity Game Engine (herein referred to as Unity) simulation, and traditional image processing. The Unity Game …
Assessing Frustration Towards Venezuelan Migrants In Columbia: Path Analysis On Newspaper Coded Data, Brian Llinás, Guljannat Huseynli, Erika Frydenlund, Katherine Palacia, Jose Padilla
Assessing Frustration Towards Venezuelan Migrants In Columbia: Path Analysis On Newspaper Coded Data, Brian Llinás, Guljannat Huseynli, Erika Frydenlund, Katherine Palacia, Jose Padilla
Modeling, Simulation and Visualization Student Capstone Conference
This study analyzes the impact of Venezuelan migrants on local frustration levels in Colombia. The study found a relationship between the influx of Venezuelan migrants and the level of frustration among locals towards migrants, infrastructure, government, and geopolitics. Additionally, we identified that frustration types have an impact on other frustrations. The study used articles from a national newspaper in Colombia from 2015 to 2020. News articles were coded during a previous study qualitatively and categorized into frustration types. The code frequencies were then used as variables in this study. We used path modeling to statistically study the relationship between dependent …
Behind Derogatory Migrants' Terms For Venezuelan Migrants: Xenophobia And Sexism Identification With Twitter Data And Nlp, Joseph Martínez, Melissa Miller-Felton, Jose Padilla, Erika Frydenlund
Behind Derogatory Migrants' Terms For Venezuelan Migrants: Xenophobia And Sexism Identification With Twitter Data And Nlp, Joseph Martínez, Melissa Miller-Felton, Jose Padilla, Erika Frydenlund
Modeling, Simulation and Visualization Student Capstone Conference
The sudden arrival of many migrants can present new challenges for host communities and create negative attitudes that reflect that tension. In the case of Colombia, with the influx of over 2.5 million Venezuelan migrants, such tensions arose. Our research objective is to investigate how those sentiments arise in social media. We focused on monitoring derogatory terms for Venezuelans, specifically veneco and veneca. Using a dataset of 5.7 million tweets from Colombian users between 2015 and 2021, we determined the proportion of tweets containing those terms. We observed a high prevalence of xenophobic and defamatory language correlated with the …
U-Net Based Multiclass Semantic Segmentation For Natural Disaster Based Satellite Imagery, Nishat Ara Nipa
U-Net Based Multiclass Semantic Segmentation For Natural Disaster Based Satellite Imagery, Nishat Ara Nipa
Modeling, Simulation and Visualization Student Capstone Conference
Satellite image analysis of natural disasters is critical for effective emergency response, relief planning, and disaster prevention. Semantic segmentation is believed to be on of the best techniques to capture pixelwise information in computer vision. In this work we will be using a U-Net architecture to do a three class semantic segmentation for the Xview2 dataset to capture the level of damage caused by different natural disaster which is beyond the visual scope of human eyes.
Lack Of Black Female Diversity Within The Cybersecurity Workforce, Eric Preston
Lack Of Black Female Diversity Within The Cybersecurity Workforce, Eric Preston
Cybersecurity Undergraduate Research Showcase
Cybersecurity methods, strategies, and programs for protecting computers and electronic devices have become critically important in all aspects of the technological infrastructure. However, while this is a vastly growing field that has a large workforce, it suffers from a lack of representation, specifically for Black/African American females. This study examines the barriers that prevent Black women from having representation within the cybersecurity workforce and solutions that address them. Some barriers noted include a lack of role models and resources, historical discrimination and systemic barriers, and cultural norms. Additionally, implications created by these barriers include less diversity, a lack of career …
Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle
Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle
Computer Science Faculty Publications
Web archives, such as the Internet Archive, preserve the web and allow access to prior states of web pages. We implicitly trust their versions of archived pages, but as their role moves from preserving curios of the past to facilitating present day adjudication, we are concerned with verifying the fixity of archived web pages, or mementos, to ensure they have always remained unaltered. A widely used technique in digital preservation to verify the fixity of an archived resource is to periodically compute a cryptographic hash value on a resource and then compare it with a previous hash value. If the …
Are Ride-Hailing Services Safer Than Taxis? A Multivariate Spatial Approach With Accomodation Of Exposure Uncertainty, Guocong Zhai, Kun Xie, Hong Yang, Di Yang
Are Ride-Hailing Services Safer Than Taxis? A Multivariate Spatial Approach With Accomodation Of Exposure Uncertainty, Guocong Zhai, Kun Xie, Hong Yang, Di Yang
Civil & Environmental Engineering Faculty Publications
Despite many research efforts on ride-hailing services and taxis, limited studies have compared the safety performance of the two modes. A major challenge is the need for reliable mode-specific exposure data to model their safety outcomes. Moreover, crash frequencies of the two modes by injury severities tend to be spatially and inherently correlated. To fully address these issues, this study proposes a novel multivariate conditional autoregressive model considering measurement errors in mode-specific exposures (MVCARME). More specially, a classical measurement error structure is used to accommodate the uncertainty of mode-specific exposures estimated, and a multivariate spatial specification is adopted to capture …
Technology Adoption Of Computer-Aided Instruction In Healthcare: A Structured Review, Queenie Kate Cabanilla, Frevy Teofilo-Orencia, Rentor Cafino, Armando T. Isla Jr., Jehan Grace Maglaya, Xavier-Lewis Palmer, Lucas Potter, Dave E. Marcial, Lemuel Clark Velasco
Technology Adoption Of Computer-Aided Instruction In Healthcare: A Structured Review, Queenie Kate Cabanilla, Frevy Teofilo-Orencia, Rentor Cafino, Armando T. Isla Jr., Jehan Grace Maglaya, Xavier-Lewis Palmer, Lucas Potter, Dave E. Marcial, Lemuel Clark Velasco
Electrical & Computer Engineering Faculty Publications
Computer-Aided Instruction (CAI) is one of the interactive teaching methods that electronically presents instructional resources and enhances learner performance. In health settings, using CAI is one of the important ways to improve learners' knowledge and usefulness in their healthcare specialization yet there is still a lack of research that offers a comprehensive synthesis of investigating into the adoption of CAI in healthcare. This research aims to provide a comprehensive review of related literatures on the enablers and barriers for technology adoption of CAI in healthcare. 31 journals were analyzed and revealed that several studies were utilizing the Unified Theory of …
Past Challenges And The Future Of Discrete Event Simulation, Andrew J. Collins, Farinaz Sabz Ali Pour, Craig A. Jordan
Past Challenges And The Future Of Discrete Event Simulation, Andrew J. Collins, Farinaz Sabz Ali Pour, Craig A. Jordan
Engineering Management & Systems Engineering Faculty Publications
The American scientist Carl Sagan once said: “You have to know the past to understand the present.” We argue that having a meaningful dialogue on the future of simulation requires a baseline understanding of previous discussions on its future. For this paper, we conduct a review of the discrete event simulation (DES) literature that focuses on its future to understand better the path that DES has been following, both in terms of who is using simulation and what directions they think DES should take. Our review involves a qualitative literature review of DES and a quantitative bibliometric analysis of the …
Modeling Wealth Distribution In A Society, Dylan Berns, Peihsien Sun, Adrian V. Gheorghe
Modeling Wealth Distribution In A Society, Dylan Berns, Peihsien Sun, Adrian V. Gheorghe
Engineering Management & Systems Engineering Faculty Publications
The interconnectedness of social mood, changing dynamics, income inequality, and wealth distribution underscores the complexity of understanding and addressing these issues. This complexity inspires researchers to develop models and conduct further research to gain insights into the mechanisms driving income inequality and wealth distribution. By studying these phenomena more comprehensively, one can aim to develop strategies and policies that promote a more equitable distribution of wealth and opportunities, thereby fostering social stability and economic prosperity. In the present paper, there was build a model on wealth distribution and income inequality to help people understand the complexities of wealth inequality and …
The Message Design Of Raiders Of The Lost Ark On The Atari 2600 & A Fan’S Map, Quick Start, And Strategy Guide, Miguel Ramlatchan, William I. Ramlatchan
The Message Design Of Raiders Of The Lost Ark On The Atari 2600 & A Fan’S Map, Quick Start, And Strategy Guide, Miguel Ramlatchan, William I. Ramlatchan
Distance Learning Faculty & Staff Books
The message design and human performance technology in video games, especially early video games have always been fascinating to me. From an instructional design perspective, the capabilities of the technology of the classic game consoles required a careful balance of achievable objectives, cognitive task analysis, guided problem solving, and message design. Raiders on the Atari is an excellent example of this balance. It is an epic adventure game, spanning 13+ distinct areas, with an inventory of items, where those hard to find items had to be used by the player to solve problems during their quest (and who would have …
Data-Driven Framework For Understanding & Modeling Ride-Sourcing Transportation Systems, Bishoy Kelleny
Data-Driven Framework For Understanding & Modeling Ride-Sourcing Transportation Systems, Bishoy Kelleny
Civil & Environmental Engineering Theses & Dissertations
Ride-sourcing transportation services offered by transportation network companies (TNCs) like Uber and Lyft are disrupting the transportation landscape. The growing demand on these services, along with their potential short and long-term impacts on the environment, society, and infrastructure emphasize the need to further understand the ride-sourcing system. There were no sufficient data to fully understand the system and integrate it within regional multimodal transportation frameworks. This can be attributed to commercial and competition reasons, given the technology-enabled and innovative nature of the system. Recently, in 2019, the City of Chicago the released an extensive and complete ride-sourcing trip-level data for …
Putin And Putnam: Interpreting Russian Military Activity Through A Three Player, Two-Level Game, Nathan M. Colvin
Putin And Putnam: Interpreting Russian Military Activity Through A Three Player, Two-Level Game, Nathan M. Colvin
Modeling, Simulation and Visualization Student Capstone Conference
Is Vladimir Putin a bad strategist, perhaps irrational? Previous military activity by Russia, such as the annexation of Crimea of 2014, yielded limited international gains, at a significant economic and reputational cost. Yet as the 2022 invasion of Ukraine shows, Putin is willing to commit military power, despite the cost of sanctions and other possible retaliation. This three-player simultaneous game, originally created in June, 2021, demonstrates how domestic and international considerations of President Vladimir Putin might lead to otherwise unpredictable Russian military behavior. In this extended version of Robert Putnam’s “two-level game,” President Putin rationally uses the international venue as …
Deepfakes: Ai Technology Of The Future, Hosanna Root
Deepfakes: Ai Technology Of The Future, Hosanna Root
Cybersecurity Undergraduate Research Showcase
Deepfakes technology’s danger stems from its ability to create realistic but fake synthesized media that people often identify as something that is real. With this powerful technology in the wrong hands, deepfakes can cause devastating havoc through information warfare, election campaign disruptions, and more, creating distrust in society. Disinformation is already rampant today, even without wide deployments of deepfakes, which is concerning given the fact that deepfakes’ nefarious full potentials are yet to be reached.
Core Point Pixel-Level Localization By Fingerprint Features In Spatial Domain, Xueyi Ye, Yuzhong Shen, Maosheng Zeng, Yirui Liu, Huahua Chen, Zhijing Zhao
Core Point Pixel-Level Localization By Fingerprint Features In Spatial Domain, Xueyi Ye, Yuzhong Shen, Maosheng Zeng, Yirui Liu, Huahua Chen, Zhijing Zhao
Computational Modeling & Simulation Engineering Faculty Publications
Singular point detection is a primary step in fingerprint recognition, especially for fingerprint alignment and classification. But in present there are still some problems and challenges such as more false-positive singular points or inaccurate reference point localization. This paper proposes an accurate core point localization method based on spatial domain features of fingerprint images from a completely different viewpoint to improve the fingerprint core point displacement problem of singular point detection. The method first defines new fingerprint features, called furcation and confluence, to represent specific ridge/valley distribution in a core point area, and uses them to extract the innermost Curve …
Towards Characterizing Adversarial Opportunity And Behavior In Critical Infrastructure Network, Md Sharif Ullah
Towards Characterizing Adversarial Opportunity And Behavior In Critical Infrastructure Network, Md Sharif Ullah
Electrical & Computer Engineering Theses & Dissertations
The growth of information and communication technology is constantly revolutionizing various domains, e.g., energy utility systems, healthcare, the internet of things, etc. This inception of widespread cyber technology enables reliability and first operability of the system, yet simultaneously imposed a risk of significant impact due to disruption of safe and secure operation. The attack surface is expanding, creating a cyber exposure gap which indicates a higher threat landscape and increased risk of compromise. Motivated by this increased threat exposure, this dissertation investigates the attack surface as a static and dynamic indicator of adversary propagation, seeking an efficient modeling paradigm to …
Data-Driven Operational And Safety Analysis Of Emerging Shared Electric Scooter Systems, Qingyu Ma
Data-Driven Operational And Safety Analysis Of Emerging Shared Electric Scooter Systems, Qingyu Ma
Computational Modeling & Simulation Engineering Theses & Dissertations
The rapid rise of shared electric scooter (E-Scooter) systems offers many urban areas a new micro-mobility solution. The portable and flexible characteristics have made E-Scooters a competitive mode for short-distance trips. Compared to other modes such as bikes, E-Scooters allow riders to freely ride on different facilities such as streets, sidewalks, and bike lanes. However, sharing lanes with vehicles and other users tends to cause safety issues for riding E-Scooters. Conventional methods are often not applicable for analyzing such safety issues because well-archived historical crash records are not commonly available for emerging E-Scooters.
Perceiving the growth of such a micro-mobility …
Supporting Transportation System Management And Operations Using Internet Of Things Technology, Hong Yang, Yuzhong Shen, Mecit Cetin, Zhenyu Wang
Supporting Transportation System Management And Operations Using Internet Of Things Technology, Hong Yang, Yuzhong Shen, Mecit Cetin, Zhenyu Wang
Computational Modeling & Simulation Engineering Faculty Publications
Low power wide-area network (LPWAN) technology aims to provide long range and low power wireless communication. It can serve as an alternative technology for data transmissions in many application scenarios (e.g., parking monitoring and remote flood sensing). In order to explore its feasibility in transportation systems, this project conducted a review of relevant literature to understand the current status of LPWAN applications. An online survey that targeted professionals concerned with transportation was also developed to elicit input about their experiences in using LPWAN technology for their projects. The literature review and survey results showed that LPWAN’s application in the U.S. …
Authentication Schemes' Impact On Working Memory, Janine D. Mator
Authentication Schemes' Impact On Working Memory, Janine D. Mator
Psychology Theses & Dissertations
Authentication is the process by which a computing system validates a user’s identity. Although this process is necessary for system security, users view authentication as a frequent disruption to their primary tasks. During this disruption, primary task information must be actively maintained in working memory. As a result, primary task information stored in working memory is at risk of being lost or corrupted while users authenticate. For over two decades, researchers have focused on developing more memorable passwords by replacing alphanumeric text with visual graphics (Biddle et al., 2012). However, very little attention has been given to the impact authentication …
Human Factors, Ergonomics And Industry 4.0 In The Oil & Gas Industry: A Bibliometric Analysis, Francesco Longo, Antonio Padovano, Lucia Gazzaneo, Jessica Frangella, Rafael Diaz
Human Factors, Ergonomics And Industry 4.0 In The Oil & Gas Industry: A Bibliometric Analysis, Francesco Longo, Antonio Padovano, Lucia Gazzaneo, Jessica Frangella, Rafael Diaz
VMASC Publications
Over the last few years, the Human Factors and Ergonomics (HF/E) discipline has significantly benefited from new human-centric engineered digital solutions of the 4.0 industrial age. Technologies are creating new socio-technical interactions between human and machine that minimize the risk of design-induced human errors and have largely contributed to remarkable improvements in terms of process safety, productivity, quality, and workers’ well-being. However, despite the Oil&Gas (O&G) sector is one of the most hazardous environments where human error can have severe consequences, Industry 4.0 aspects are still scarcely integrated with HF/E. This paper calls for a holistic understanding of the changing …
Modeling And Simulation Of Cascading Failures In Transportation Systems During Hurricane Evacuations, Yuan Zhu, Kaan Ozbay, Hong Yang, Fan Zuo, Di Sha
Modeling And Simulation Of Cascading Failures In Transportation Systems During Hurricane Evacuations, Yuan Zhu, Kaan Ozbay, Hong Yang, Fan Zuo, Di Sha
Computational Modeling & Simulation Engineering Faculty Publications
Effective and timely evacuation is critical in alleviating the impact of hurricanes. As such, evacuation models are often sought to support the preparedness of evacuations. One important task in the modeling process is to evaluate exogenous factors that cause transportation system capacity loss during evacuation. Typical factors include direct damage to the roadway network due to storm surge and cascading impacts because of other facilities failures. For example, power outage can lead to signal failure and subway suspension. This paper aims to develop a macroscopic simulation-based approach to study the capacity loss of the roadway network in evacuation due to …
Human Supremacy As Posthuman Risk, Daniel Estrada
Human Supremacy As Posthuman Risk, Daniel Estrada
The Journal of Sociotechnical Critique
Human supremacy is the widely held view that human interests ought to be privileged over other interests as a matter of ethics and public policy. Posthumanism is the historical situation characterized by a critical reevaluation of anthropocentrist theory and practice. This paper draws on animal studies, critical posthumanism, and the critique of ideal theory in Charles Mills and Serene Khader to address the appeal to human supremacist rhetoric in AI ethics and policy discussions, particularly in the work of Joanna Bryson. This analysis identifies a specific risk posed by human supremacist policy in a posthuman context, namely the classification of …
Human Behavior Is A Significant Flaw In Maintaining Cyber Security, Elizabeth Jackson
Human Behavior Is A Significant Flaw In Maintaining Cyber Security, Elizabeth Jackson
Cybersecurity Undergraduate Research Showcase
Human behavior and data security utilization must be intertwined; in order to mitigate the negative effects of cyber attacks. No consumer wants their data hacked, breached, stolen, shared or wiped out. It is imperative to survey the type of education is needed to keep users safe and interested in securing their data. This can be done by simply seeking out the consumer's view of data security. The information obtained would allow the cybersecurity community to offer a simple way for consumers to protect their mobile data. There is a constant interaction between human behavior and the need for increased data …
Curriculum Development For Robotics Technology Program, Sanjeevi Chitikeshi, Shirshak K. Dhali, Betsey Odell, Vukica Jovanovic, Cheng Y. Lin
Curriculum Development For Robotics Technology Program, Sanjeevi Chitikeshi, Shirshak K. Dhali, Betsey Odell, Vukica Jovanovic, Cheng Y. Lin
Engineering Technology Faculty Publications
With a growing need for a more skilled workforce, providing industry-driven and employment centric training services is an important national priority. Over 3.4 million manufacturing jobs will need to be filled across the United Sates over the next decade. The skills gap is becoming greater based on the statistics provided by the Global Robotics Technology Market: Forecast, 2014-2020 published by Research and Markets, reporting that the worldwide robotics market is forecast to grow from the 2015 level of $26.98B to $82.78B in 2020. This 11 % compounded average growth in the next five years is unprecedented. Given the anticipated growth …
From Protecting To Performing Privacy, Garfield Benjamin
From Protecting To Performing Privacy, Garfield Benjamin
The Journal of Sociotechnical Critique
Privacy is increasingly important in an age of facial recognition technologies, mass data collection, and algorithmic decision-making. Yet it persists as a contested term, a behavioural paradox, and often fails users in practice. This article critiques current methods of thinking privacy in protectionist terms, building on Deleuze's conception of the society of control, through its problematic relation to freedom, property and power. Instead, a new mode of understanding privacy in terms of performativity is provided, drawing on Butler and Sedgwick as well as Cohen and Nissenbaum. This new form of privacy is based on identity, consent and collective action, a …
The Influence Of Blockchain Technology On Fraud And Fake Protection, Youngju Yun
The Influence Of Blockchain Technology On Fraud And Fake Protection, Youngju Yun
OUR Journal: ODU Undergraduate Research Journal
No abstract provided.