Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Social and Behavioral Sciences

Data To Decisions For Cyberspace Operations, Steve Stone Dec 2015

Data To Decisions For Cyberspace Operations, Steve Stone

Military Cyber Affairs

In 2011, the United States (U.S.) Department of Defense (DOD) named cyberspace a new operational domain. The U.S. Cyber Command and the Military Services are working to make the cyberspace environment a suitable place for achieving national objectives and enabling military command and control (C2). To effectively conduct cyberspace operations, DOD requires data and analysis of the Mission, Network, and Adversary. However, the DOD’s current data processing and analysis capabilities do not meet mission needs within critical operational timelines. This paper presents a summary of the data processing and analytics necessary to effectively conduct cyberspace operations.


Keynote: Justifying Uberveillance- The Internet Of Things And The Flawed Sustainability Premise, Katina Michael Oct 2015

Keynote: Justifying Uberveillance- The Internet Of Things And The Flawed Sustainability Premise, Katina Michael

Professor Katina Michael

Imagine a world where everything was numbered. Not just homes with street addresses, or cars with number plates, or smart phones with telephone numbers, or email addresses with passwords, but absolutely everything you could see and touch and even that which you could not. Well, that world is here, right now. This vast expanse we call “Earth” is currently being quantified and photographed, inch by inch, by satellites, street cameras, drones and high altitude balloons. Longitude and latitude coordinates provide us with the precise degrees, minutes and seconds of the physical space, and unique time stamps tell us where a …


Big Data: Challenges And Opportunities For Digital Libraries, Richard Hacken Jul 2015

Big Data: Challenges And Opportunities For Digital Libraries, Richard Hacken

Faculty Publications

Presented as a Keynote Address to the International Conference on Computing in Engineering and the Sciences in Istanbul, Turkey, on July 30, 2015.

This is an abstract of the speech:

Thanks to technological progress, thanks to the copious Internet, thanks to geometrically burgeoning social media and to quickly proliferating sensors, the flood of data available to us is surging larger and larger, faster and faster. Paradigms for management and analysis are at the core of data-driven businesses and institutions, fueling the velocity of scientific research and development. The phrase “Big Data” was itself coined by scientists as they manipulated exploding …


A Systematic Method To Create Search Strategies For Emerging Technologies Based On The Web Of Science: Illustrated For ‘Big Data’, Ying Huang, Jannik Schuehle, Jan Youtie, Alan L. Porter Jul 2015

A Systematic Method To Create Search Strategies For Emerging Technologies Based On The Web Of Science: Illustrated For ‘Big Data’, Ying Huang, Jannik Schuehle, Jan Youtie, Alan L. Porter

Jan Youtie

Abstract Bibliometric and ‘‘tech mining’’ studies depend on a crucial foundation—the search strategy used to retrieve relevant research publication records. Database searches for emerging technologies can be problematic in many respects, for example the rapid evolution of terminology, the use of common phraseology, or the extent of ‘‘legacy technology’’ terminology. Searching on such legacy terms may or may not pick up R&D pertaining to the emerging technology of interest. A challenge is to assess the relevance of legacy terminology in building an effective search model. Common-usage phraseology additionally confounds certain domains in which broader managerial, public interest, or other considerations …


Behavior-Based Anomaly Detection On Big Data, Hyunjoo Kim, Jonghyun Kim, Ikkyun Kim, Tai-Myung Chung Jan 2015

Behavior-Based Anomaly Detection On Big Data, Hyunjoo Kim, Jonghyun Kim, Ikkyun Kim, Tai-Myung Chung

Australian Information Security Management Conference

Recently, cyber-targeted attacks such as APT (Advanced Persistent Threat) are rapidly growing as a social and national threat. It is an intelligent cyber-attack that infiltrates the target organization and enterprise clandestinely using various methods and causes considerable damage by making a final attack after long-term and through preparations. These attacks are threatening cyber worlds such as Internet by infecting and attacking the devices on this environment with the malicious code, and by destroying them or gaining their authorities. Detecting these attacks requires collecting and analysing data from various sources (network, host, security equipment, and devices) over the long haul. Therefore, …


Value Oriented Big Data Processing With Applications, Krishnaprasad Thirunarayan Jan 2015

Value Oriented Big Data Processing With Applications, Krishnaprasad Thirunarayan

Kno.e.sis Publications

We discuss the nature of Big Data and address the role of semantics in analyzing and processing Big Data that arises in the context of Physical-Cyber-Social Systems. To handle Volume, we advocate semantic perception that can convert low-level observational data to higher-level abstractions more suitable for decision- making. To handle Variety, we resort to semantic models and annotations of data so that intelligent processing can be done independent of heterogeneity of data formats and media. To handle Velocity, we seek to use continuous semantics capability to dynamically create event or situation specific models and recognize relevant new concepts, entities and …


Networks Of Digital Humanities Scholars: The Informational And Social Uses And Gratifications Of Twitter, Anabel Quan-Haase, Lori Mckay-Peet, Kim Martin Jan 2015

Networks Of Digital Humanities Scholars: The Informational And Social Uses And Gratifications Of Twitter, Anabel Quan-Haase, Lori Mckay-Peet, Kim Martin

FIMS Publications

Big Data research is currently split on whether and to what extent Twitter can be characterized as an informational or social network. We contribute to this line of inquiry through an investigation of digital humanities (DH) scholars’ uses and gratifications of Twitter. We conducted a thematic analysis of 25 semi-structured interview transcripts to learn about these scholars’ professional use of Twitter. Our findings show that Twitter is considered a critical tool for informal communication within DH invisible colleges, functioning at varying levels as both an information network (learning to ‘Twitter’ and maintaining awareness) and a social network (imagining audiences and …


Data, Analytics And Community-Based Organizations: Transforming Data To Decisions For Community Development, Michael P. Johnson Jr. Dec 2014

Data, Analytics And Community-Based Organizations: Transforming Data To Decisions For Community Development, Michael P. Johnson Jr.

Michael P. Johnson

The past ten years have seen a revolution in two disciplines related to operations and strategy design. “Big Data” has transformed the theory and practice of producing and selling goods and services through methods associated with computer science and information technology. “Analytics” has popularized primarily quantitative models and methods by which organizations and systems can measure multiple aspects of performance. As these fields rely on information technology to collect, store, process and share data, we refer to the collection of knowledge and applications associated with Big Data and analytics as “data analytics and information technology.” The impacts of data analytics …