Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Information retrieval (2)
- Artificial satellites (1)
- Atari (1)
- Broadband communication systems (1)
- Cell phone systems (1)
-
- Cognitive radio networks (1)
- Computer networks (1)
- Computer programs (1)
- Consent (1)
- Contextual integrity (1)
- Data (1)
- Data transmission (1)
- Digital libraries (1)
- Embargo periods (1)
- Encryption (1)
- Engineering organizations (1)
- English as a second language (1)
- Frequency spectra (1)
- Heterogeneous computing (1)
- Identity (1)
- Indiana Jones (1)
- Infrastructure projects (1)
- Instructional design (1)
- Internet of Things; LPWAN (1)
- Knowledge management (1)
- LoRa (1)
- Machine learning (1)
- Message design (1)
- Mobile communication systems (1)
- Modeling (1)
- Publication Year
- Publication
- Publication Type
Articles 1 - 15 of 15
Full-Text Articles in Social and Behavioral Sciences
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
Cybersecurity Undergraduate Research Showcase
The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …
The Message Design Of Raiders Of The Lost Ark On The Atari 2600 & A Fan’S Map, Quick Start, And Strategy Guide, Miguel Ramlatchan, William I. Ramlatchan
The Message Design Of Raiders Of The Lost Ark On The Atari 2600 & A Fan’S Map, Quick Start, And Strategy Guide, Miguel Ramlatchan, William I. Ramlatchan
Distance Learning Faculty & Staff Books
The message design and human performance technology in video games, especially early video games have always been fascinating to me. From an instructional design perspective, the capabilities of the technology of the classic game consoles required a careful balance of achievable objectives, cognitive task analysis, guided problem solving, and message design. Raiders on the Atari is an excellent example of this balance. It is an epic adventure game, spanning 13+ distinct areas, with an inventory of items, where those hard to find items had to be used by the player to solve problems during their quest (and who would have …
Deepfakes: Ai Technology Of The Future, Hosanna Root
Deepfakes: Ai Technology Of The Future, Hosanna Root
Cybersecurity Undergraduate Research Showcase
Deepfakes technology’s danger stems from its ability to create realistic but fake synthesized media that people often identify as something that is real. With this powerful technology in the wrong hands, deepfakes can cause devastating havoc through information warfare, election campaign disruptions, and more, creating distrust in society. Disinformation is already rampant today, even without wide deployments of deepfakes, which is concerning given the fact that deepfakes’ nefarious full potentials are yet to be reached.
Supporting Transportation System Management And Operations Using Internet Of Things Technology, Hong Yang, Yuzhong Shen, Mecit Cetin, Zhenyu Wang
Supporting Transportation System Management And Operations Using Internet Of Things Technology, Hong Yang, Yuzhong Shen, Mecit Cetin, Zhenyu Wang
Computational Modeling & Simulation Engineering Faculty Publications
Low power wide-area network (LPWAN) technology aims to provide long range and low power wireless communication. It can serve as an alternative technology for data transmissions in many application scenarios (e.g., parking monitoring and remote flood sensing). In order to explore its feasibility in transportation systems, this project conducted a review of relevant literature to understand the current status of LPWAN applications. An online survey that targeted professionals concerned with transportation was also developed to elicit input about their experiences in using LPWAN technology for their projects. The literature review and survey results showed that LPWAN’s application in the U.S. …
Human Behavior Is A Significant Flaw In Maintaining Cyber Security, Elizabeth Jackson
Human Behavior Is A Significant Flaw In Maintaining Cyber Security, Elizabeth Jackson
Cybersecurity Undergraduate Research Showcase
Human behavior and data security utilization must be intertwined; in order to mitigate the negative effects of cyber attacks. No consumer wants their data hacked, breached, stolen, shared or wiped out. It is imperative to survey the type of education is needed to keep users safe and interested in securing their data. This can be done by simply seeking out the consumer's view of data security. The information obtained would allow the cybersecurity community to offer a simple way for consumers to protect their mobile data. There is a constant interaction between human behavior and the need for increased data …
From Protecting To Performing Privacy, Garfield Benjamin
From Protecting To Performing Privacy, Garfield Benjamin
The Journal of Sociotechnical Critique
Privacy is increasingly important in an age of facial recognition technologies, mass data collection, and algorithmic decision-making. Yet it persists as a contested term, a behavioural paradox, and often fails users in practice. This article critiques current methods of thinking privacy in protectionist terms, building on Deleuze's conception of the society of control, through its problematic relation to freedom, property and power. Instead, a new mode of understanding privacy in terms of performativity is provided, drawing on Butler and Sedgwick as well as Cohen and Nissenbaum. This new form of privacy is based on identity, consent and collective action, a …
Evaluating Stakeholder Bias In Stakeholder Analysis In Social Media, Ahmad A. Bajarwan
Evaluating Stakeholder Bias In Stakeholder Analysis In Social Media, Ahmad A. Bajarwan
Engineering Management & Systems Engineering Theses & Dissertations
Stakeholder analysis is the first step in the planning of most infrastructure projects. Selecting and then applying the best method for a project’s stakeholder analysis is extremely important for correctly assessing stakeholder opinions. Social media platforms allow stakeholders to participate directly in analysis. However, as with most other analysis methods, social media introduces inherent biases.
Social media is a powerful tool for communication and networking, and it also provides a valuable source of information for analyzing user opinions about infrastructure projects. By using data collected from Twitter, analysts can create networks to represent connections among users, quantify their similarities, and …
Detecting, Modeling, And Predicting User Temporal Intention, Hany M. Salaheldeen
Detecting, Modeling, And Predicting User Temporal Intention, Hany M. Salaheldeen
Computer Science Theses & Dissertations
The content of social media has grown exponentially in the recent years and its role has evolved from narrating life events to actually shaping them. Unfortunately, content posted and shared in social networks is vulnerable and prone to loss or change, rendering the context associated with it (a tweet, post, status, or others) meaningless. There is an inherent value in maintaining the consistency of such social records as in some cases they take over the task of being the first draft of history as collections of these social posts narrate the pulse of the street during historic events, protest, riots, …
Transparent Spectrum Co-Access In Cognitive Radio Networks, Jonathan Daniel Backens
Transparent Spectrum Co-Access In Cognitive Radio Networks, Jonathan Daniel Backens
Electrical & Computer Engineering Theses & Dissertations
The licensed wireless spectrum is currently under-utilized by as much as 85%. Cognitive radio networks have been proposed to employ dynamic spectrum access to share this under-utilized spectrum between licensed primary user transmissions and unlicensed secondary user transmissions. Current secondary user opportunistic spectrum access methods, however, remain limited in their ability to provide enough incentive to convince primary users to share the licensed spectrum, and they rely on primary user absence to guarantee secondary user performance. These challenges are addressed by developing a Dynamic Spectrum Co-Access Architecture (DSCA) that allows secondary user transmissions to co-access transparently and concurrently with primary …
The Influence Of Social Networking Technology In An Engineering Organization, Derrick Marcus Tepaske
The Influence Of Social Networking Technology In An Engineering Organization, Derrick Marcus Tepaske
Engineering Management & Systems Engineering Projects for D. Eng. Degree
Computer facilitated Social Networking (SN) is becoming more prevalent in our society, both in our personal and professional lives. As its use grows, there is a desire to determine how it will impact an organization. If it can positively impact an organization then it is an initiative that could be embraced and leveraged for any number of business related activities from marketing to engineering. This project develops and implements a social networking treatment for an engineering organization in order to determine how it impacts the responsiveness and performance of the organization. The treatment includes an online tool, a training package, …
Using Timed-Release Cryptography To Mitigate The Preservation Risk Of Embargo Periods, Rabia Haq, Michael L. Nelson
Using Timed-Release Cryptography To Mitigate The Preservation Risk Of Embargo Periods, Rabia Haq, Michael L. Nelson
Computer Science Presentations
PDF of a powerpoint presentation from the 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin, Texas, June 15-19, 2009. Also available on Slideshare.
Channel Management In Heterogeneous Cellular Networks, Mohammad Hadi Arbabi
Channel Management In Heterogeneous Cellular Networks, Mohammad Hadi Arbabi
Computer Science Theses & Dissertations
Motivated by the need to increase system capacity in the face of tight FCC regulations, modem cellular systems are under constant pressure to increase the sharing of the frequency spectrum among the users of the network.
Key to increasing system capacity is an efficient channel management strategy that provides higher capacity for the system while, at the same time, providing the users with Quality of Service guarantees. Not surprisingly, dynamic channel management has become a high profile topic in wireless communications. Consider a highly populated urban area, where mobile traffic loads are increased due to highway backups or sporting events. …
Radar - A Novel Admission Control And Handoff Management Scheme For Multimedia Leo Satellite Networks, Syed Rashidali Rizvi
Radar - A Novel Admission Control And Handoff Management Scheme For Multimedia Leo Satellite Networks, Syed Rashidali Rizvi
Computer Science Theses & Dissertations
Low Earth Orbit (LEO) satellite networks are deployed as an enhancement to terrestrial wireless networks in order to provide broadband services to users regardless of their location. In addition to global coverage, these satellite systems support communications with hand-held devices and offer low cost-per-minute access cost, making them promising platforms for Personal Communication Services (PCS). LEO satellites are expected to support multimedia traffic and to provide their users with some form of Quality of Service (QoS) guarantees. However, the limited bandwidth of the satellite channel, satellite rotation around the Earth and mobility of end-users makes QoS provisioning and mobility management …
Architectural Optimization Of Digital Libraries, Aileen O. Biser
Architectural Optimization Of Digital Libraries, Aileen O. Biser
Computer Science Theses & Dissertations
This work investigates performance and scaling issues relevant to large scale distributed digital libraries. Presently, performance and scaling studies focus on specific implementations of production or prototype digital libraries. Although useful information is gained to aid these designers and other researchers with insights to performance and scaling issues, the broader issues relevant to very large scale distributed libraries are not addressed. Specifically, no current studies look at the extreme or worst case possibilities in digital library implementations. A survey of digital library research issues is presented. Scaling and performance issues are mentioned frequently in the digital library literature but are …
Computer Networks And The Teaching Of English As A Second Language: How Networks Affect Second Language Acquisition, Kirstin J. Reed-Perez
Computer Networks And The Teaching Of English As A Second Language: How Networks Affect Second Language Acquisition, Kirstin J. Reed-Perez
English Theses & Dissertations
No abstract provided.