Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Kennesaw State University

Conference

2019

Discipline
Keyword
Publication

Articles 1 - 30 of 53

Full-Text Articles in Entire DC Network

Differential Analysis Of Individual Centruroides Vittatus Venom Dec 2019

Differential Analysis Of Individual Centruroides Vittatus Venom

Symposium of Student Scholars

Scorpions are well known, venomous arthropods (Class: Arachnida, Order: Scorpiones). Their venom is composed of neurotoxins, proteases and cytotoxic peptides which plays a major role in toxic components such as inflammatory, antimicrobial and hemolytic activity. Venom is key for the survival of scorpions as it is involved in defense against prey and in feeding on predators. Centruroides vittatus (bark scorpion) is commonly found in North America, with habitat ranges from Nebraska to southern Texas. For this study, scorpions were harvested from Laredo, Texas (27˚57’ N, 99˚43’ W), held in captivity for 4 months and fed a consistent diet of Acheta …


Gender Differences Are Disappearing: Attitudes On Sex Trafficking Tactics And Rape Victimization Nov 2019

Gender Differences Are Disappearing: Attitudes On Sex Trafficking Tactics And Rape Victimization

Symposium of Student Scholars

Commercial sexual exploitation by force, fraud, and coercion are tactics used by sex traffickers. Although sex trafficking is an ongoing, pervasive problem, there is no known research on gender differences regarding knowledge and attitudes about sex trafficking tactics and the perception of these women and girls as victims of rape. Thus, the purpose of this study was to compare male and female college students' knowledge and attitudes regarding sex trafficking tactics and their beliefs about whether these individuals are rape victims. Consistent with rape myth acceptance research on gender (Russell & Hand, 2017), we hypothesized that there may be gender …


A Study On Social Media's Influence Upon The Evolution Of Slang Nov 2019

A Study On Social Media's Influence Upon The Evolution Of Slang

Symposium of Student Scholars

As social media platforms become increasingly prevalent in our society, they have begun to heavily influence the ways in which we communicate with each other. Particularly fascinating is the effect of social media sites and texting upon slang, which has evolved significantly over the past few decades. Therefore, I am researching why slang is so prevalent in our society, as well as how and why it has changed as a result of social media. My project also explores the phenomena of how online platforms have influenced the connotations of certain words so that they later become slang terms. Because both …


Sociolinguistic Analysis Of Asian American English Nov 2019

Sociolinguistic Analysis Of Asian American English

Symposium of Student Scholars

According to the United Stated Census Bureau, the population of Asians in the United States has increased from 12 million in 2005 to 17 million in 2016. As populations of minority races in the U.S. grow, so does the representation of them in popular culture and mass media. From ABC’s TV show Fresh Off the Boat to the rising generation of Asian American Youtubers, a wave of Asian American linguistic and languaging presence in today’s entertainment is higher than ever before. In my presentation, I will discuss a close analysis of sociolinguistics connected to these representations spoken by contemporary Asian …


Hematogenous Osteomyelitis In Juveniles: An Examination Of Pathophysiology And Variation In Occurrence In The Archaeological Record And Contemporarily Nov 2019

Hematogenous Osteomyelitis In Juveniles: An Examination Of Pathophysiology And Variation In Occurrence In The Archaeological Record And Contemporarily

Symposium of Student Scholars

Osteomyelitis is a general term for a group of diseases that cause inflammation of the bone. In most cases, the cause is infectious agents entering the bloodstream from other infected areas, especially traumatic or surgical wounds (hematogenous osteomyelitis). The main causative agents are Staphylococcus aureus (staph) and Streptococcus (strep). Other causes of osteomyelitis include indirect infection from soft tissue infections or sepsis (Ortner 2003, 181). Although osteomyelitis can occur at any age, hematogenous osteomyelitis is especially prevalent among juveniles. The location of occurrence is related to the timing of development of the growth plates, as well as the vascular supply …


Evaluating Volatile Organic Compounds For Contact-Independent Antagonism Of Pseudogymnoascus Destructans Nov 2019

Evaluating Volatile Organic Compounds For Contact-Independent Antagonism Of Pseudogymnoascus Destructans

Symposium of Student Scholars

White-nose syndrome (WNS), a disease caused by the fungus Pseudogymnoascus destructans, is responsible for the extensive mortality of bats in the United States. In an effort to develop tools to reduce bat mortality attributed to WNS, an in vitro experiment was conducted to quantify the inhibitory effects of select volatile organic compounds (VOCs) as well as explore potential synergistic activities. The experiment involved exposing mycelial plugs of P. destructans to various concentrations of B23 as well as B23 and decanal together at equimolar ratios. Measurements of the plugs were taken over the course of the 13 day experiment allowing …


Silently Struggling In A New World: Exploring English Language Learners With Language Disabilities Nov 2019

Silently Struggling In A New World: Exploring English Language Learners With Language Disabilities

Symposium of Student Scholars

With the awareness that Spanish speaking households compose a significant number of students in English language learning (ELL) programs, this researcher will be illuminating areas of academic ambiguity where language learning overshadows learning disabilities in the United States— a country with no official language. This phenomenon will be thoroughly examined using textual methodologies such as secondary analysis, theoretical study, and an extended literature review to describe how these correlations negatively impact students with English as a secondary way of expression. By emphasizing this gap within academia, it is the hope of the author that additional teacher-created resources will be readily …


Diversity In Video Games: The Personal Experience Of Gamers Nov 2019

Diversity In Video Games: The Personal Experience Of Gamers

Symposium of Student Scholars

Diversity in video games has often been ignored or caricaturized such as in Final Fantasy VII, where the main character, Barret Wallace, is portrayed as African American. Video games are now big business, impacting almost every facet of American society and earning more than $91.5 billion dollars annually. This research explores how triple A games portray character identities and why these portrayals may be changing? Data will come from five semi-structured interviews with gamers about their experiences and perceptions about how diversity in video games affects their views about and enjoyment of the games they play. Do diverse characters enhance …


Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan Vansickle, Tamirat Abegaz, Bryson Payne Oct 2019

Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan Vansickle, Tamirat Abegaz, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

Wireless access points have greatly improved users' ability to connect to the Internet. However, they often lack the security mechanisms needed to protect users. Malicious actors could create a rogue access point (RAP), using a device such as the WiFi Pineapple Nano, that could trick users into connecting to an illegitimate access point (AP). To make them look legitimate, adversaries tend to setup RAPs to include a captive portal. This is very effective, since most public networks use captive portals as a means to provide genuine access. The objective of this study is to examine the effectiveness of RAP identification …


Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li Oct 2019

Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li

KSU Proceedings on Cybersecurity Education, Research and Practice

The security threats to mobile application are growing explosively. Mobile app flaws and security defects could open doors for hackers to easily attack mobile apps. Secure software development must be addressed earlier in the development lifecycle rather than fixing the security holes after attacking. Early eliminating against possible security vulnerability will help us increase the security of software and mitigate the consequence of damages of data loss caused by potential malicious attacking. In this paper, we present a static security analysis approach with open source FindSecurityBugs plugin for Android StThe security threats to mobile application are growing explosively. Mobile app …


Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne Oct 2019

Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

This research provides a means of automating the process to reverse engineer an automobile’s CAN Bus to quickly recover CAN IDs and message values to control the various systems in a modern automobile. This approach involved the development of a Python script that uses several open-source tools to interact with the CAN Bus, and it takes advantage of several vulnerabilities associated with the CAN protocol. These vulnerabilities allow the script to conduct replay attacks against the CAN Bus and affect various systems in an automobile without the operator’s knowledge or interaction.

These replay attacks can be accomplished by capturing recorded …


A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar Oct 2019

A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar

KSU Proceedings on Cybersecurity Education, Research and Practice

The massive global network that connects billions of humans and millions of devices and allow them to communicate with each other is known as the internet. Over the last couple of decades, the internet has grown expeditiously and became easier to use and became a great educational tool. Now it can used as a weapon that can steal someone’s identity, expose someone’s financial information, or can destroy your networking devices. Even in the last decade, there have been more cyber attacks and threats destroying major companies by breaching the databases that have millions of personal information that can be sold …


An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam Oct 2019

An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam

KSU Proceedings on Cybersecurity Education, Research and Practice

The growing market of the mobile application is overtaking the web application. Mobile application development environment is open source, which attracts new inexperienced developers to gain hands on experience with applicationn development. However, the security of data and vulnerable coding practice is an issue. Among all mobile Operating systems such as, iOS (by Apple), Android (by Google) and Blackberry (RIM), Android dominates the market. The majority of malicious mobile attacks take advantage of vulnerabilities in mobile applications, such as sensitive data leakage via the inadvertent or side channel, unsecured sensitive data storage, data transition and many others. Most of these …


Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward Oct 2019

Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward

KSU Proceedings on Cybersecurity Education, Research and Practice

Both consumers and businesses are rapidly adopting IoT premised on convenience and control. Industry and academic literature talk about billions of embedded IoT devices being implemented with use-cases ranging from smart speakers in the home, to autonomous trucks, and trains operating in remote industrial sites. Historically information systems supporting these disparate use-cases have been categorised as Information Technology (IT) or Operational Technology (OT), but IoT represents a fusion between these traditionally distinct information security models.

This paper presents a review of IEEE and Elsevier peer reviewed papers that identifies the direction in IoT education and training around information security. It …


Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez Oct 2019

Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez

KSU Proceedings on Cybersecurity Education, Research and Practice

Cybersecurity and Information Technology Management programs have many similarities and many similar knowledge, skills, and abilities are taught across both programs. The skill mappings for the NICE Framework and the knowledge units required to become a National Security Agency and Department of Homeland Security Center of Academic Excellence in Cyber Defense Education contain many information technology management functions. This paper explores one university’s perception on how a joint Cybersecurity and Information Technology Management program could be developed to upskill students to be work force ready.


Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz Oct 2019

Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz

KSU Proceedings on Cybersecurity Education, Research and Practice

Today’s college and university cybersecurity programs often contain multiple laboratory activities on various different hardware and software-based cybersecurity tools. These include preventive tools such as firewalls, virtual private networks, and intrusion detection systems. Some of these are tools used in attacking a network, such as packet sniffers and learning how to craft cross-site scripting attacks or man-in-the-middle attacks. All of these are important in learning cybersecurity. However, there is another important component of cybersecurity education – teaching students how to protect a system or network from attackers by learning their motivations, and how they think, developing the students’ “abilities to …


Internet Core Functions: Security Today And Future State, Jeffrey Jones Oct 2019

Internet Core Functions: Security Today And Future State, Jeffrey Jones

KSU Proceedings on Cybersecurity Education, Research and Practice

Never in the history of the world has so much trust been given to something that so few understand. Jeff reviews three core functions of the Internet along with recent and upcoming changes that will impact security and the world.


Preparing For Tomorrow By Looking At Yesterday, Peter Dooley Oct 2019

Preparing For Tomorrow By Looking At Yesterday, Peter Dooley

KSU Proceedings on Cybersecurity Education, Research and Practice

Why do we learn? Why do we study history? Why do we research the work of others? The answer is that there is value today in what was already learned and experienced, successes and failures. Mr. Dooley, a 25-year security professional and 20-year hospitality executive, will share his experiences and how our history in security will help us in thinking about our future.


Designing Cloud Computing Architecture For Bank Industry The Case Of Dashen Bank, Melaku Yenew Aug 2019

Designing Cloud Computing Architecture For Bank Industry The Case Of Dashen Bank, Melaku Yenew

African Conference on Information Systems and Technology

Technology makes life easy. People contact banks in their day to day life activity. And also the banks are committed to serve their customers with the help of currently advanced technology. The aim of a bank is to give consistent and satisfactory banking services for the customers. The use of advanced technology in banking requires sophisticated knowledge of the technology and expertise and a large number of employees are required for implementation and management of that system.

Cloud computing makes easy the management of IT infrastructure and the bank sector systems. Cloud service providers provide three basic types of services: …


Social Inclusion In The Digital Era: Rethinking Debates And Narratives In The World Bank Report., Calisto Kondowe, Wallace Chigona Aug 2019

Social Inclusion In The Digital Era: Rethinking Debates And Narratives In The World Bank Report., Calisto Kondowe, Wallace Chigona

African Conference on Information Systems and Technology

The 2019 (5th) proceedings of ACIST focuses on how African societies are leveraging and can leverage the smart capabilities in digital technologies to address organizational and societal challenges. Technology-enabled solutions offer solutions to many of these challenges. Digital technologies are increasingly becoming integral to and interdependent with the African society.


Assessment Of The Public Value Of Open Data In Ghana, Hubeidatu Nuhu, Jean-Paul Van Belle Aug 2019

Assessment Of The Public Value Of Open Data In Ghana, Hubeidatu Nuhu, Jean-Paul Van Belle

African Conference on Information Systems and Technology

With rising enthusiasm for Open Data (OD) globally, there has been an expanding requirement for research on the impact this movement has created. Ghana is consid-ered as one of the early Open Data adopters in Africa. The case of Ghana presents an interesting and a unique area of concentration due to the country’s long stand in de-mocracy. The practice of democracy, accountability and transparency has been the core of government development in Ghana since independence in 1957. The research pur-pose is to understand and examine the impact of Open Data from the context of Gha-na from the perspective of created …


An Electronic Framework To Shepherd The Pastoral Livestock (Resolve Conflicts In Pastoral Communities), Frezewd Lemma, Anteneh Alemu, Desta Zerihun, Endale Aregu Aug 2019

An Electronic Framework To Shepherd The Pastoral Livestock (Resolve Conflicts In Pastoral Communities), Frezewd Lemma, Anteneh Alemu, Desta Zerihun, Endale Aregu

African Conference on Information Systems and Technology

This paper proposes a tracking framework based on GPS enabled location sensors, the GSM/WCDMA wireless network, and algorithms running in an edge clouds to resolve deadly conflicts that arise in the Africans pastorals community. The paper also proposes an automatic digital identification mechanism that helps resolve conflicts during animals mixup. This algorithmic based solution would totally relief the community from using the traditional identification mechanisms such as hot branding which are known to be cruel to animals. To communicate with the pastorals, the framework takes into consideration the low level literacy of the community as well as their use of …


The African Digital Citizen’S Awareness Of Online Information Privacy, Sam Takavarasha Jr, Liezel Cilliers, Willie Chinyamurindi Aug 2019

The African Digital Citizen’S Awareness Of Online Information Privacy, Sam Takavarasha Jr, Liezel Cilliers, Willie Chinyamurindi

African Conference on Information Systems and Technology

Internet access continues to increase among the youth in developing countries, like South Africa, due to the exponential growth of mobile penetration and the higher education system’s reliance on Information and Communication Technologies. Higher education graduates are expected to be digital citizens in the workplace, which is characterised by socio-economic inclusion and academic capability. However, this increased exposure to the Internet does present information privacy challenges. This paper investigates young adults’ perceptions and concomitant behaviours to protect their information privacy when using Internet sites. The paper further aims to unpack young adults’ understanding of the potential problems and their preparedness …


Technology Media, Service Innovation And The Shaping Of Executive Cognition, Gamel O. Wiredu, Kofi A. Boateng, John K. Effah Aug 2019

Technology Media, Service Innovation And The Shaping Of Executive Cognition, Gamel O. Wiredu, Kofi A. Boateng, John K. Effah

African Conference on Information Systems and Technology

The upsurge of information and communication technology innovations around the world has induced the establishment of many technology enterprises, mostly small-medium, that focus on service innovation. Due to the materiality of technology to this enterprise genre, its executive is significantly shaped by technology media, but explanations of technological shaping are low. This paper seeks to address this gap through a study informed by critical realism and media ecology. It argues that executive cognition is shaped because ICT media and service innovation imperatives combine to generate executive internalizations; and it is shaped by service innovation driven internalizations of technology media functions. …


A Pedagogical Smart Learning Environment In South African Tertiary Institutions, Tope Samuel Adeyelure, Billy Mathias Kalema Aug 2019

A Pedagogical Smart Learning Environment In South African Tertiary Institutions, Tope Samuel Adeyelure, Billy Mathias Kalema

African Conference on Information Systems and Technology

With the rapid growth rate of technology innovation different sectors tends to keep up with the developing trends by implementing the latest technology with the aim of achieving their goals. Educational institutions deploy information systems in their teaching and learning environment to enhance performance. However, educational institutions usually struggle with smooth implementation of IT leading to its failure. Adopting various scientific methods such as content analysis, Principal Component Analysis and so on, contextual factors were identified for effective deployment of smart learning environments based on extensive review of exploratory research, analyzing data and study outcomes of ICT deployment educational institutes …


Factors Influencing Customers’ Attitude For Using M-Birr Adoption In Ethiopia, Gebremedhin Gebreyohans, Abdurehman Ali Aug 2019

Factors Influencing Customers’ Attitude For Using M-Birr Adoption In Ethiopia, Gebremedhin Gebreyohans, Abdurehman Ali

African Conference on Information Systems and Technology

Diffusion of Innovations (DOI) is a theory to explain how and over time new philosophies and then technology diffuse into different contexts. This research tested the attributes of DOI and other variables empirically,usingM-Birr system as the goal of the innovation. The research was conducted among customers of M-Birr service in Addis Ababa, Ethiopia. The data collection instrument was a closed-ended questionnaire administered to 360 respondents of which 211 were returned giving 58.6% return rate. The demographic make-up of the respondents showed that most of them were between the age of 30 to 50 and degree holders. From the factor analysis …


Beauty As Art: Somaesthetic Consumption As Alternative To Docility, Talia Welsh Feb 2019

Beauty As Art: Somaesthetic Consumption As Alternative To Docility, Talia Welsh

Atlantic Marketing Association Proceedings

No abstract provided.


A Royal Revolution: An Analysis Of The Influence Of Prince On Music Marketing, Deirdre T. Guion Peoples Feb 2019

A Royal Revolution: An Analysis Of The Influence Of Prince On Music Marketing, Deirdre T. Guion Peoples

Atlantic Marketing Association Proceedings

No abstract provided.


The Moderating Effect Of Attitude Toward Violence In A Video Game Setting: Initial Explorations., Stef Nicovich, Pamila Dembla Feb 2019

The Moderating Effect Of Attitude Toward Violence In A Video Game Setting: Initial Explorations., Stef Nicovich, Pamila Dembla

Atlantic Marketing Association Proceedings

No abstract provided.


The Souvenir: What Is Purchased And Is The Purchaser A Collector Of Art?, Timothy J. Schibik, Aaron J. Schibik Feb 2019

The Souvenir: What Is Purchased And Is The Purchaser A Collector Of Art?, Timothy J. Schibik, Aaron J. Schibik

Atlantic Marketing Association Proceedings

No abstract provided.