Open Access. Powered by Scholars. Published by Universities.®
Science and Technology Studies Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Automotive manufacturing (2)
- Cyber security (2)
- ACM (1)
- Aluminum (1)
- Aural-2 (1)
-
- Austin Michael Strong (1)
- BFSW (1)
- Bandwidth (1)
- Behavioral science (1)
- Bind mounts (1)
- Bubble flow (1)
- Cast aluminum (1)
- Climate (1)
- Corporations (1)
- Cyber kill chain (1)
- Cyber range (1)
- Cybersecurity (1)
- Education (1)
- Encryption (1)
- Escape room (1)
- Ethics (1)
- FBJ (1)
- FIPS (1)
- Fluorescence (1)
- Framework (1)
- HPC (1)
- IEEE (1)
- Impact (1)
- In situ photography (1)
- Innovation (1)
- Publication
- Publication Type
Articles 1 - 11 of 11
Full-Text Articles in Science and Technology Studies
Nonprofits Should Adopt A User-Centric Change Model To Scale Corporate Environmental Action Faster, Doug Miller
Nonprofits Should Adopt A User-Centric Change Model To Scale Corporate Environmental Action Faster, Doug Miller
Journal of Nonprofit Innovation
Pollution levels and ecosystem degradation continue to worsen, suggesting the insufficiency of current approaches to reverse these problematic trends. For environmental nonprofits, the current theory of change revolves around developing techno-economic analysis about environmental problems and available solutions, building public awareness around this analysis, and motivating decision makers to set goals. Given present environmental realities and the limited success of their current theory of change, environmental nonprofits should transform how they execute their work, what they produce, and how they coordinate with each other. Instead, nonprofits should begin putting the user—business decision makers as well as policymakers—front and center as …
Exploring Differences Of Age And Gender On Perceived Experience Of Active Participation Cybersecurity Learning, James Lakko
Exploring Differences Of Age And Gender On Perceived Experience Of Active Participation Cybersecurity Learning, James Lakko
Undergraduate Honors Theses
Many organizations including the United States government have identified a shortage of cybersecurity professionals in the workforce. This thesis explores the effectiveness of escape room/simulation based learning in an active participation and immersive education to motivate pursuing cybersecurity. A survey was administered to the participants of the 2021 BYU Cybersecurity Camp regarding their experience in the Interactive Cybersecurity Experience (ICE). The ICE is a simulator/escape room that challenges participants to complete a Star Trek themed mission by overcoming cybersecurity obstacles. The three demographics that were surveyed included a camp for educators, a camp for boys, and a camp for girls. …
Automated Cyber Ranges: Design Features, Architectures, Scenarios And Impacts, Dezhang Wen
Automated Cyber Ranges: Design Features, Architectures, Scenarios And Impacts, Dezhang Wen
Undergraduate Honors Theses
As cybersecurity becomes increasingly important in the digital world, the need for a virtual environment where security professionals can safely practice defending against real-life attacks is gradually rising. This thesis explores, participates in, and expands upon the design and implementation of such an environment, also known as a “cyber range”. We build a model where real-life attacks and defense can be successfully simulated, as well as further improving the process through automation. Ultimately, it proposes and experiments with the idea of an automated cyber range in order to enhance both the efficiency and effectiveness of a security testbed.
Isolation Of Temporary Storage In High Performance Computing Via Linux Namespacing, Steven Tanner Satchwell
Isolation Of Temporary Storage In High Performance Computing Via Linux Namespacing, Steven Tanner Satchwell
Theses and Dissertations
Per job isolation of temporary file storage in High Performance Computing (HPC) environments provide benefits in security, efficiency, and administration. HPC system administrators can use the mount_isolation Slurm task plugin to improve security by isolating temporary files where no isolation previously existed. The mount_isolation plugin also increases efficiency by removing obsolete temporary files immediately after each job terminates. This frees valuable disk space in the HPC environment to be used by other jobs. These two improvements reduce the amount of work system administrators must expend to ensure temporary files are removed in a timely manner.Previous temporary file removal solutions were …
A Framework For The Performance Analysis And Tuning Of Virtual Private Networks, Fridrich Shane Perez
A Framework For The Performance Analysis And Tuning Of Virtual Private Networks, Fridrich Shane Perez
Theses and Dissertations
With the rising trend of personal devices like laptops and smartphones being used in businesses and significant enterprises, the concern for preserving security arises. In addition to preserving security measures in outside devices, the network speed and performance capable by these devices need to be balanced with the security aspect to avoid slowing down virtual private network (VPN) activity. Performance tests have been done in the past to evaluate available software, hardware, and network security protocol options that will best benefit an entity according to its specific needs. With a variety of comparable frameworks available currently, it is a matter …
Parent Reciprocal Teaching: Comparing Parent And Peer Reciprocal Teaching In High School Physics Instruction, Jonathan Jacob Welling
Parent Reciprocal Teaching: Comparing Parent And Peer Reciprocal Teaching In High School Physics Instruction, Jonathan Jacob Welling
Theses and Dissertations
Effective strategies are needed to help parents become more involved in the education of their teenage children. Parent Reciprocal Teaching (PRT) is proposed as an effective strategy to increase parent involvement and help students increase academic performance. 120 students in a 10th-grade high school physics course participated in either the PRT homework assignments or traditional reciprocal teaching (TRT) assignments. The PRT homework assignments required students to teach their parents/guardians at home, while the TRT assignments required students to teach a peer during class time. Data was collected though test scores and surveys sent home to parents and students. Findings indicate …
In Situ Analysis Of Void Formation At The Flow Front In Rtm, Perry August Burton
In Situ Analysis Of Void Formation At The Flow Front In Rtm, Perry August Burton
Theses and Dissertations
The purpose of this research is to empirically investigate flow front void formation rates and post-formation bubble mobility behavior for composites produced via resin transfer molding (RTM).For this study, in situ observation of bubble formation and migration was accomplished by photographing resin flow progression during infusion tests of carbon reinforcements. An analysis strategy for use in batch processing sequential image sets is presented. The use of MATLAB to process and analyze binary images of infusions for void content has garnered satisfactory results and has shown that analysis of progressive image sequences can greatly enrich the volume of in situ measurements …
The Feasibility Of Augmenting A Fixed-Gap Bobbin Friction Stir Welding Tool With Cutters To Join Enclosed Castings, Adam Baxter Christensen
The Feasibility Of Augmenting A Fixed-Gap Bobbin Friction Stir Welding Tool With Cutters To Join Enclosed Castings, Adam Baxter Christensen
Theses and Dissertations
Bobbin Friction Stir Welding (BFSW) is a new application of Friction Stir Welding (FSW) that can be used to join materials together with little to no axial forces. This eliminates the need of a backplate or anvil needed to apply counter pressure against the tool. The applications of BFSW are growing every day. This new technology is helping the automotive industry and many other industries join materials more effectively and efficiently. This technology can be used to join materials with high strength to weight ratios to make cars lighter to increase fuel efficiency. This will also greatly reduce the cost …
Training Security Professionals In Social Engineering With Osint And Sieve, Jared James Meyers
Training Security Professionals In Social Engineering With Osint And Sieve, Jared James Meyers
Theses and Dissertations
This research attempts to create a novel process, Social Engineering Vulnerability Evaluation, SiEVE, to use open source data and open source intelligence (OSINT) to perform efficient and effectiveness spear phishing attacks. It is designed for use by "œred teams" and students learning to conduct a penetration test of an organization, using the vector of their workforce. The SiEVE process includes the stages of identifying targets, profiling the targets, and creating spear phishing attacks for the targets. The contributions of this research include the following: (1) The SiEVE process itself was developed using an iterative process to identify and fix initial …
Friction Bit Joining Of Similar Alloy Sheets Of High-Strength Aluminum Alloy 7085, Matthew R. Okazaki
Friction Bit Joining Of Similar Alloy Sheets Of High-Strength Aluminum Alloy 7085, Matthew R. Okazaki
Theses and Dissertations
Friction Bit Joining (FBJ) is a new technology used primarily in joining dissimilar metals. Its primary use has been focused in the automotive industry to provide an alternative joining process to welding. As automotive manufacturing has continually pushed toward using dissimilar materials, new joining processes have been needed to replace traditional welding practices that do not perform well when materials are not weld compatible. FBJ meets these needs perfectly as it provides strength as well as the ability to join materials of almost any kind.The purpose of this research was to explore different applications of the FBJ process. Traditionally FBJ …
Lean Six Sigma's Impact On Firm Innovation Performance, Austin Michael Strong
Lean Six Sigma's Impact On Firm Innovation Performance, Austin Michael Strong
Theses and Dissertations
Following Toyota's dramatic rise to prominence within the automotive industry in the late 1980's, firms around the globe have widely sought to adopt Lean Six Sigma (LSS) as a means of reducing costs, improving quality, and gaining an overall competitive advantage. While the operational benefits of LSS are largely undisputed, there are criticisms of the movement with regards to its effect on firm innovation capability. Prior academic studies investigating the relationship between LSS and innovation are largely conceptual in nature, rely heavily on qualitative data, and display a high degree of variability in results. The objective of this work was …