Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Science and Technology Studies

Nonprofits Should Adopt A User-Centric Change Model To Scale Corporate Environmental Action Faster, Doug Miller Mar 2024

Nonprofits Should Adopt A User-Centric Change Model To Scale Corporate Environmental Action Faster, Doug Miller

Journal of Nonprofit Innovation

Pollution levels and ecosystem degradation continue to worsen, suggesting the insufficiency of current approaches to reverse these problematic trends. For environmental nonprofits, the current theory of change revolves around developing techno-economic analysis about environmental problems and available solutions, building public awareness around this analysis, and motivating decision makers to set goals. Given present environmental realities and the limited success of their current theory of change, environmental nonprofits should transform how they execute their work, what they produce, and how they coordinate with each other. Instead, nonprofits should begin putting the user—business decision makers as well as policymakers—front and center as …


Exploring Differences Of Age And Gender On Perceived Experience Of Active Participation Cybersecurity Learning, James Lakko Dec 2021

Exploring Differences Of Age And Gender On Perceived Experience Of Active Participation Cybersecurity Learning, James Lakko

Undergraduate Honors Theses

Many organizations including the United States government have identified a shortage of cybersecurity professionals in the workforce. This thesis explores the effectiveness of escape room/simulation based learning in an active participation and immersive education to motivate pursuing cybersecurity. A survey was administered to the participants of the 2021 BYU Cybersecurity Camp regarding their experience in the Interactive Cybersecurity Experience (ICE). The ICE is a simulator/escape room that challenges participants to complete a Star Trek themed mission by overcoming cybersecurity obstacles. The three demographics that were surveyed included a camp for educators, a camp for boys, and a camp for girls. …


Automated Cyber Ranges: Design Features, Architectures, Scenarios And Impacts, Dezhang Wen Mar 2021

Automated Cyber Ranges: Design Features, Architectures, Scenarios And Impacts, Dezhang Wen

Undergraduate Honors Theses

As cybersecurity becomes increasingly important in the digital world, the need for a virtual environment where security professionals can safely practice defending against real-life attacks is gradually rising. This thesis explores, participates in, and expands upon the design and implementation of such an environment, also known as a “cyber range”. We build a model where real-life attacks and defense can be successfully simulated, as well as further improving the process through automation. Ultimately, it proposes and experiments with the idea of an automated cyber range in order to enhance both the efficiency and effectiveness of a security testbed.


Isolation Of Temporary Storage In High Performance Computing Via Linux Namespacing, Steven Tanner Satchwell Jun 2018

Isolation Of Temporary Storage In High Performance Computing Via Linux Namespacing, Steven Tanner Satchwell

Theses and Dissertations

Per job isolation of temporary file storage in High Performance Computing (HPC) environments provide benefits in security, efficiency, and administration. HPC system administrators can use the mount_isolation Slurm task plugin to improve security by isolating temporary files where no isolation previously existed. The mount_isolation plugin also increases efficiency by removing obsolete temporary files immediately after each job terminates. This frees valuable disk space in the HPC environment to be used by other jobs. These two improvements reduce the amount of work system administrators must expend to ensure temporary files are removed in a timely manner.Previous temporary file removal solutions were …


A Framework For The Performance Analysis And Tuning Of Virtual Private Networks, Fridrich Shane Perez Jun 2018

A Framework For The Performance Analysis And Tuning Of Virtual Private Networks, Fridrich Shane Perez

Theses and Dissertations

With the rising trend of personal devices like laptops and smartphones being used in businesses and significant enterprises, the concern for preserving security arises. In addition to preserving security measures in outside devices, the network speed and performance capable by these devices need to be balanced with the security aspect to avoid slowing down virtual private network (VPN) activity. Performance tests have been done in the past to evaluate available software, hardware, and network security protocol options that will best benefit an entity according to its specific needs. With a variety of comparable frameworks available currently, it is a matter …


Parent Reciprocal Teaching: Comparing Parent And Peer Reciprocal Teaching In High School Physics Instruction, Jonathan Jacob Welling Jun 2018

Parent Reciprocal Teaching: Comparing Parent And Peer Reciprocal Teaching In High School Physics Instruction, Jonathan Jacob Welling

Theses and Dissertations

Effective strategies are needed to help parents become more involved in the education of their teenage children. Parent Reciprocal Teaching (PRT) is proposed as an effective strategy to increase parent involvement and help students increase academic performance. 120 students in a 10th-grade high school physics course participated in either the PRT homework assignments or traditional reciprocal teaching (TRT) assignments. The PRT homework assignments required students to teach their parents/guardians at home, while the TRT assignments required students to teach a peer during class time. Data was collected though test scores and surveys sent home to parents and students. Findings indicate …


In Situ Analysis Of Void Formation At The Flow Front In Rtm, Perry August Burton Jun 2018

In Situ Analysis Of Void Formation At The Flow Front In Rtm, Perry August Burton

Theses and Dissertations

The purpose of this research is to empirically investigate flow front void formation rates and post-formation bubble mobility behavior for composites produced via resin transfer molding (RTM).For this study, in situ observation of bubble formation and migration was accomplished by photographing resin flow progression during infusion tests of carbon reinforcements. An analysis strategy for use in batch processing sequential image sets is presented. The use of MATLAB to process and analyze binary images of infusions for void content has garnered satisfactory results and has shown that analysis of progressive image sequences can greatly enrich the volume of in situ measurements …


The Feasibility Of Augmenting A Fixed-Gap Bobbin Friction Stir Welding Tool With Cutters To Join Enclosed Castings, Adam Baxter Christensen Jun 2018

The Feasibility Of Augmenting A Fixed-Gap Bobbin Friction Stir Welding Tool With Cutters To Join Enclosed Castings, Adam Baxter Christensen

Theses and Dissertations

Bobbin Friction Stir Welding (BFSW) is a new application of Friction Stir Welding (FSW) that can be used to join materials together with little to no axial forces. This eliminates the need of a backplate or anvil needed to apply counter pressure against the tool. The applications of BFSW are growing every day. This new technology is helping the automotive industry and many other industries join materials more effectively and efficiently. This technology can be used to join materials with high strength to weight ratios to make cars lighter to increase fuel efficiency. This will also greatly reduce the cost …


Training Security Professionals In Social Engineering With Osint And Sieve, Jared James Meyers Jun 2018

Training Security Professionals In Social Engineering With Osint And Sieve, Jared James Meyers

Theses and Dissertations

This research attempts to create a novel process, Social Engineering Vulnerability Evaluation, SiEVE, to use open source data and open source intelligence (OSINT) to perform efficient and effectiveness spear phishing attacks. It is designed for use by "œred teams" and students learning to conduct a penetration test of an organization, using the vector of their workforce. The SiEVE process includes the stages of identifying targets, profiling the targets, and creating spear phishing attacks for the targets. The contributions of this research include the following: (1) The SiEVE process itself was developed using an iterative process to identify and fix initial …


Friction Bit Joining Of Similar Alloy Sheets Of High-Strength Aluminum Alloy 7085, Matthew R. Okazaki Jun 2018

Friction Bit Joining Of Similar Alloy Sheets Of High-Strength Aluminum Alloy 7085, Matthew R. Okazaki

Theses and Dissertations

Friction Bit Joining (FBJ) is a new technology used primarily in joining dissimilar metals. Its primary use has been focused in the automotive industry to provide an alternative joining process to welding. As automotive manufacturing has continually pushed toward using dissimilar materials, new joining processes have been needed to replace traditional welding practices that do not perform well when materials are not weld compatible. FBJ meets these needs perfectly as it provides strength as well as the ability to join materials of almost any kind.The purpose of this research was to explore different applications of the FBJ process. Traditionally FBJ …


Lean Six Sigma's Impact On Firm Innovation Performance, Austin Michael Strong Jun 2018

Lean Six Sigma's Impact On Firm Innovation Performance, Austin Michael Strong

Theses and Dissertations

Following Toyota's dramatic rise to prominence within the automotive industry in the late 1980's, firms around the globe have widely sought to adopt Lean Six Sigma (LSS) as a means of reducing costs, improving quality, and gaining an overall competitive advantage. While the operational benefits of LSS are largely undisputed, there are criticisms of the movement with regards to its effect on firm innovation capability. Prior academic studies investigating the relationship between LSS and innovation are largely conceptual in nature, rely heavily on qualitative data, and display a high degree of variability in results. The objective of this work was …