Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 39

Full-Text Articles in Business

Cpn-Dam Business Meeting, Amanda Harlan Nov 2016

Cpn-Dam Business Meeting, Amanda Harlan

Central Plains Network for Digital Asset Management

CPN-DAM Business Meeting

Wednesday, November 16, 2016

3:55pm - 4:55pm CST

Agenda

3:55-4:05pm Introduction

4:05-4:10pm Announce Executive Committee members for 2017-2018

4:10-4:25pm Reports from the Planning and Design Committees

4:25-4:40pm Report from Ad Hoc Executive Committee

  • Summary of what was accomplished in 2016

  • Action Items for 2017

    • Become a nonprofit corporation

    • Finalize membership and fees

    • Set up standing committees

    • 2017 conference and proceedings

    • Contacting vendor/sponsors/organizations for possible sponsorship

4:40-4:45pm Announcement on whether the CPN-DAM bylaws were approved or not approved

4:45-4:50pm Comments from audience

4:50-4:55pm Closing statements


Developing An Outreach Plan For Unt Scholarly Works, Pamela Andrews, Daniel Alemneh Nov 2016

Developing An Outreach Plan For Unt Scholarly Works, Pamela Andrews, Daniel Alemneh

Central Plains Network for Digital Asset Management

The University of North Texas Scholarly Works collections functions as our institution’s open access repository. This summer, we conducted a preliminary analysis of the collection’s holdings to assess our progress in archiving UNT faculty research in support of our Open Access and Long-term Digital Stewardship policy as passed in 2012. As we do not subscribe to any current research information systems (CRIS), this analysis took the form of a census using current faculty senate data to understand who is and is not contributing to the repository. After looking at our contribution population, we also examined what resource types are contributed …


Beyond Electric Dreams: Instituting A Dam Program Where It Is Needed But Maybe Not Wanted, Gregory Johnson Nov 2016

Beyond Electric Dreams: Instituting A Dam Program Where It Is Needed But Maybe Not Wanted, Gregory Johnson

Central Plains Network for Digital Asset Management

Digital content is created every second of everyday and can be found everywhere. And the need to preserve this content, as well as the have it available to your students, patrons, or faculty and staff is at a premium while budgets for DAM dwindle. And while the need and want for DAM is often there, the drive and funds to make it a reality sometimes is not.

This presentation will cover one such DAM implementation project at a Fortune 500 company, beginning with the vetting and purchasing of a DAM system through implementation and show how the lessons from its …


Mommma: Master Objects Migration And Metadata Mapping Activity, Daniel W. Noonan, Darnelle O. Melvin Nov 2016

Mommma: Master Objects Migration And Metadata Mapping Activity, Daniel W. Noonan, Darnelle O. Melvin

Central Plains Network for Digital Asset Management

So you’ve got nearly 2 million digital files from 8 collecting units with minimum, scattered or unknown metadata—how do you prepare to migrate those objects into a digital preservation repository that acts as a “light archive” providing access to your digital collections? This presentation will delve into data wrangling efforts, the creation of workflows, and the challenges encountered while preparing digital resources for migration from a limited access FTP server into a preservation environment created in FEDORA, layered with Hydra heads for access and other functional requirements. We will discuss project planning, the de-duplication efforts, development of a collection assessment …


Quick-Start Guide To Digital Preservation For Audio, Sandy Rodriguez Nov 2016

Quick-Start Guide To Digital Preservation For Audio, Sandy Rodriguez

Central Plains Network for Digital Asset Management

This presentation focuses on practical strategies and use of open-source tools in order to establish “good enough” preservation management practices for digital audio files. Using her experience at the Marr Sound Archives, University of Missouri—Kansas City, the presenter will discuss assessing current practices, identifying gaps, prioritizing, making recommendations, and selecting and implementing a suite of open-source tools to improve the preservation process. Tools demonstrated in the presentation are AVPreserve’s BWF MetaEdit, MDQC, and Fixity.


Digital Preservation Efforts At Usm, Elizabeth La Beaud Nov 2016

Digital Preservation Efforts At Usm, Elizabeth La Beaud

Central Plains Network for Digital Asset Management

The University of Southern Mississippi (USM) has steadily been working to improve its digital preservation infrastructure over the past four years. In 2013, with funding from a NEH Preservation Assistance Grant, consultants Tom Clareson and Liz Bishoff conducted a digital preservation readiness assessment and jump started USM’s education on the topic. Since then, USM has added geographically distributed backups, manual fixity checks, manual metadata logs, and manual file format migrations to its arsenal with varying degrees of success. The influx in needed manpower and technical infrastructure precipitated a financial commitment from the university and the purchase of a robust digital …


3d Model Creation And Management In An Academic Digital Repository, Marcia Mcintosh Nov 2016

3d Model Creation And Management In An Academic Digital Repository, Marcia Mcintosh

Central Plains Network for Digital Asset Management

3D printing and scanning is new digital horizon for digital asset managers. Many fields have a history of utilizing 3D scanning and printing such as medicine, dentistry, art, entertainment, architecture, and archaeology. Now, many cultural heritage institution are also beginning to explore the unique benefits 3D models and prints can provide to constituents interested in their collections. The University of North Texas Digital Libraries embarked on a case study to gain a better understanding of 3D scanning and to determine its capacity to host and provide access to 3D models. This presentation will explore the workflows, metadata, and preservation of …


Common Management Gaps In The Life Cycle Of Digitized Objects, Jocelyn Wehr Nov 2016

Common Management Gaps In The Life Cycle Of Digitized Objects, Jocelyn Wehr

Central Plains Network for Digital Asset Management

Presented from the perspective of someone responsible for creating the digital objects that will eventually be included in a digital preservation program, this poster session will identify common issues that make the management and preservation of digital objects more challenging. Digital preservation needs to be talked about within the digitization workflow, because it takes a lot of work to produce the best digital objects possible. We are often focused on the immediate use of the digital objects and less focused on their long-term use. Even with best practices in mind, there is often an immediate need (patron orders, for example) …


Numbers, Numbers, Numbers—Is It Working?! Meaningful Measurement Of Digital Collections, Allison Ringness Nov 2016

Numbers, Numbers, Numbers—Is It Working?! Meaningful Measurement Of Digital Collections, Allison Ringness

Central Plains Network for Digital Asset Management

After a digital project is completed and made available online, the work is not over: digital projects managers must quantify the value of these digital collections. There are a plethora of tools to measure usage, but inferring value from usage requires careful interpretation of the data. After interpretation, the results must be communicated effectively to administrators. This poster will identify sources of digital collection use data, identify pitfalls in these sources, explore ways to derive meaning from use data, and suggest strategies for communicating value measurements to library administrators.

This poster presentation is the first 15 minutes of video with …


Eyes On The Prize: Delivering Archival Content With Synchronized Transcripts In Hydra, Irene Taylor, Shannon Davis Nov 2016

Eyes On The Prize: Delivering Archival Content With Synchronized Transcripts In Hydra, Irene Taylor, Shannon Davis

Central Plains Network for Digital Asset Management

Regarded as the definitive work on the Civil Rights Movement, the documentary series, Eyes on the Prize, has been seen by millions since its PBS debut in 1987. However, what remains unseen is the nearly 85 hours of interview outtakes that provide further insight into the series’ original stories of struggle, resistance, and perseverance. Through the Eyes on the Prize Digitization and Reassembly project, funded by the National Historical Publications and Records Commission, Washington University Libraries has made the complete, never-before-seen interviews and TEI XML encoded, synchronized transcripts freely accessible through its newly developed Hydra digital repository.

This session …


The Yellow Brick Road To Digitization: Two Small Kansas Colleges And Their Journey, Gloria Creed-Dikeogu, Danielle Dion Nov 2016

The Yellow Brick Road To Digitization: Two Small Kansas Colleges And Their Journey, Gloria Creed-Dikeogu, Danielle Dion

Central Plains Network for Digital Asset Management

In 2015, The Council of Independent Colleges (CIC) offered small private academic member colleges an opportunity to compete by writing collection proposals, for a three year grant digitizing teaching and research collections, funded by the Andrew C. Mellon Foundation. Forty-two CIC member teams were selected to participate in the Consortium on Digital Resources for Teaching and Research. Teams consisted of a librarian, and a faculty member, who worked with CIC and Artstor staff, using Artstor Shared Shelf to digitize proposed collections. Teams made digital collections accessible and usable in the classroom, wrote yearly project reports for CIC and attended yearly …


The James Merrill Digital Archive: Channeling The Collaborative Spirit(S), Shannon Davis, Joel Minor Nov 2016

The James Merrill Digital Archive: Channeling The Collaborative Spirit(S), Shannon Davis, Joel Minor

Central Plains Network for Digital Asset Management

The James Merrill Papers, housed in Washington University Libraries Special Collections, contains manuscripts, drafts, and other materials from the renowned poet. In 2013, work began to digitize and deliver a selection of the Merrill Papers towards his epic poem, The Book of Ephraim. Because the Libraries’ already used Omeka digital exhibit software for a number of projects, the materials were delivered in an Omeka exhibit, The James Merrill Digital Archive. The process of transforming an archival collection into a digital exhibit required the expertise and input of many collaborators including library staff in Special Collections and Scholarly Publishing, and students …


Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord Oct 2016

Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord

KSU Proceedings on Cybersecurity Education, Research and Practice

Threats to information assets have always been a concern to those responsible for making information useful and defending its value. The concepts of threat, threat agent, threat events and threat sources have evolved in recent years have very precise definitions. The article includes a summary of threat classification models used in academic research is provided along with a summary of recent industry threat assessment reports. Finally, the article shares results from a recent study, 2015 SEC/CISE Threats to Information Protection Report Including a Current Snapshot of the State of the Industry, are given.


Integrate Text Mining Into Computer And Information Security Education, Hongmei Chi, Ezhil Kalaimannan, Dominique Hubbard Oct 2016

Integrate Text Mining Into Computer And Information Security Education, Hongmei Chi, Ezhil Kalaimannan, Dominique Hubbard

KSU Proceedings on Cybersecurity Education, Research and Practice

Insider threats has become a significant challenge to organization, due to the employees varying levels of access to the internal network. This will intern bypass the external security measures that have been put in place to protect the organization’s resources. Computer-mediated communication (CMC) is a form of communication over virtual spaces where users cannot see each other. CMC includes email and communication over social networks, amongst others. This paper focuses on the design and implementation of exercise modules, which can be integrated into cybersecurity courses. The main objectives of the paper include how to teach and integrate the CMC learning …


Cover Text Steganography: N-Gram And Entropy-Based Approach, Sara M. Rico-Larmer Oct 2016

Cover Text Steganography: N-Gram And Entropy-Based Approach, Sara M. Rico-Larmer

KSU Proceedings on Cybersecurity Education, Research and Practice

Steganography is an ancient technique for hiding a secret message within ordinary looking messages or objects (e.g., images), also known as cover messages. Among various techniques, hiding text data in plain text file is a challenging task due to lack of redundant information. This paper proposes two new approaches to embed a secret message in a cover text document. The two approaches are n-gram and entropy metric-based generation of stego text. We provide examples of encoding secret messages in a cover text document followed by an initial evaluation of how well stego texts look close to the plain …


Hands-On Labs Demonstrating Html5 Security Concerns, Mounika Vanamala Oct 2016

Hands-On Labs Demonstrating Html5 Security Concerns, Mounika Vanamala

KSU Proceedings on Cybersecurity Education, Research and Practice

The research is focused on the new features added in HTML5 standard that have strong implications towards the overall information security of a system that uses this implementation.A Hands-on Lab is developed to demonstrate how Web Storage and the Geo-location API of HTML5 can affect the privacy of the user.


Smart City Security, Shawn Ralko, Sathish Kumar Oct 2016

Smart City Security, Shawn Ralko, Sathish Kumar

KSU Proceedings on Cybersecurity Education, Research and Practice

With rapid growth of technology involved and the implementation of the smart city concept, it is becoming vital to identify and implement security controls for their secure operation. Smart city security is essential for a city to incorporate the technologies into smart city cyber infrastructure and to improve the conditions of life for its citizens. In this paper, we have discussed the growth of smart city concept, their security issues. We also discuss the security solutions that needs to be implemented to keep the smart city cyber infrastructure secure. We have also pointed out the recommendations on the open issues …


The Role Of State Privacy Regulations In Mitigating Internet Users’ Privacy Concerns: A Multilevel Perspective, Tawfiq Alashoor Oct 2016

The Role Of State Privacy Regulations In Mitigating Internet Users’ Privacy Concerns: A Multilevel Perspective, Tawfiq Alashoor

KSU Proceedings on Cybersecurity Education, Research and Practice

In the U.S., there is no comprehensive national law regulating the collection and use of personal information. As a response to the high level of privacy concerns among U.S. citizens and the currently limited regulations, states have enacted their own privacy laws over and above the principles of Fair Information Practices (FIP). In this exploratory study, we draw upon the privacy literature and the Restricted Access/Limited Control (RALC) theory of privacy to study the privacy concerns phenomenon with a multilevel theoretical lens. We introduce and test three novel propositions pertaining to the impact of state level privacy regulations on privacy …


Combining The Extended Risk Analysis Model And The Attack Response Model To Introduce Risk Analysis, Randall Reid Oct 2016

Combining The Extended Risk Analysis Model And The Attack Response Model To Introduce Risk Analysis, Randall Reid

KSU Proceedings on Cybersecurity Education, Research and Practice

This paper uses the Extended Risk Analysis Model to introduce risk analysis in a classroom setting. The four responses to an attack, avoidance, transference, mitigation, and acceptance are overlaid on the Extended Risk Analysis Model to aid in the visualization of their relationship. It then expands and updates the cyber insurance portion of the Extended Risk Analysis Model.


Health It Security: An Examination Of Modern Challenges In Maintaining Hipaa And Hitech Compliance, Andrew S. Miller, Bryson R. Payne Oct 2016

Health It Security: An Examination Of Modern Challenges In Maintaining Hipaa And Hitech Compliance, Andrew S. Miller, Bryson R. Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

This work describes an undergraduate honors research project into some of the challenges modern healthcare providers face in maintaining compliance with the Health Insurance Portability and Accountability Act (HIPAA) and HITECH (Health Information Technology for Economic and Clinical Health) Act. An overview of the pertinent sections of both the HIPAA and HITECH Acts regarding health information security is provided, along with a discussion of traditionally weak points in information security, including: people susceptible to social engineering, software that is not or cannot be regularly updated, and targeted attacks (including advanced persistent threats, or APTs). Further, the paper examines potential violations …


Investigating Information Security Policy Characteristics: Do Quality, Enforcement And Compliance Reduce Organizational Fraud?, Dennis T. Brown Oct 2016

Investigating Information Security Policy Characteristics: Do Quality, Enforcement And Compliance Reduce Organizational Fraud?, Dennis T. Brown

KSU Proceedings on Cybersecurity Education, Research and Practice

Occupational fraud, the use of one’s occupation for personal enrichment through the deliberate misuse or misapplication of the organization’s resources or assets, is a growing concern for all organizations. While the typical organization loses at least 5% of annual revenues to fraud, current methods of detection and prevention are not fully adequate to reduce increasing occurrences. Although information systems are making life easier, they are increasingly being used to perpetrate fraudulent activities, and internal employee security threat is responsible for more information compromise than external threats.

The purpose of this research is to examine how information security policy quality and …


Individuals' Concern About Information Privacy In Ar Mobile Games, Dapeng Liu Oct 2016

Individuals' Concern About Information Privacy In Ar Mobile Games, Dapeng Liu

KSU Proceedings on Cybersecurity Education, Research and Practice

Augmented Reality (AR) proves to be an attractive technology in mobile games. While AR techniques energize mobile games, the privacy issue is raised to be discussed. Employing social media analytics (SMA) techniques, this research makes efforts to examines Twitter postings of “PokemonGo” case and explores individuals’ attitudes toward privacy in AR games. In this research, we examine what are the privacy concerns of individuals in AR games and what are the individuals’ sentiments toward privacy. In the interesting case of PokemonGo, this paper suggests that individuals’ concerns about privacy are emphasized on six dimensions - collection, improper access, unauthorized secondary …


Semi-Supervised Deep Neural Network For Network Intrusion Detection, Mutahir Nadeem, Ochaun Marshall, Sarbjit Singh, Xing Fang, Xiaohong Yuan Oct 2016

Semi-Supervised Deep Neural Network For Network Intrusion Detection, Mutahir Nadeem, Ochaun Marshall, Sarbjit Singh, Xing Fang, Xiaohong Yuan

KSU Proceedings on Cybersecurity Education, Research and Practice

Network security is of vital importance for corporations and institutions. In order to protect valuable computer systems, network data needs to be analyzed so that possible network intrusions can be detected. Supervised machine learning methods achieve high accuracy at classifying network data as normal or malicious, but they require the availability of fully labeled data. The recently developed ladder network, which combines neural networks with unsupervised learning, shows promise in achieving a high accuracy while only requiring a small number of labeled examples. We applied the ladder network to classifying network data using the Third International Knowledge Discovery and Data …


Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia Oct 2016

Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia

KSU Proceedings on Cybersecurity Education, Research and Practice

The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …


User Privacy Suffers At The Hands Of Access Controls, Chad N. Hoye Oct 2016

User Privacy Suffers At The Hands Of Access Controls, Chad N. Hoye

KSU Proceedings on Cybersecurity Education, Research and Practice

With advancements in personal hand held devices, smaller more mobile computers, tablets, and the world’s population connected with social media the threat to the user’s privacy has been diminished. I will look at how access control policies have opened the proverbial door to user’s privacy being attacked and threatened. You will see examples of how users have to divulge personal information to get better service and even be monitored while at work to prevent intrusions in to the company.


Brain Betrayal: A Neuropsychological Categorization Of Insider Attacks, Rachel L. Whitman Oct 2016

Brain Betrayal: A Neuropsychological Categorization Of Insider Attacks, Rachel L. Whitman

KSU Proceedings on Cybersecurity Education, Research and Practice

Thanks to an abundance of highly publicized data breaches, Information Security (InfoSec) is taking a larger place in organizational priorities. Despite the increased attention, the threat posed to employers by their own employees remains a frightening prospect studied mostly in a technical light. This paper presents a categorization of insider deviant behavior and misbehavior based off of the neuropsychological foundations of three main types of insiders posing a threat to an organization: accidental attackers; neurologically “hot” malcontents, and neurologically “cold” opportunists.


Training Decrement In Security Awareness Training, Tianjian Zhang Oct 2016

Training Decrement In Security Awareness Training, Tianjian Zhang

KSU Proceedings on Cybersecurity Education, Research and Practice

This study determines if there is a decremental effect following IT security awareness training. In most security policy compliance literature, the main focus has been on policy design. Studies that address security awareness training are seldom theory driven and even fewer are empirically based. To fill this gap, we draw from the theory of vigilance decrement as well as forgetting curves in psychology, and propose a classroom experiment showing that participants' IT security awareness decreases over a 45-day period since the training at day one. The result adds to the security policy compliance literature and suggests that some policy violations …


Investigating The Influence Of Perceived Uncertainty On Protection Motivation: An Experimental Study, Ali Vedadi Oct 2016

Investigating The Influence Of Perceived Uncertainty On Protection Motivation: An Experimental Study, Ali Vedadi

KSU Proceedings on Cybersecurity Education, Research and Practice

IS users and organizations must take necessary measures to adequately cope with security threats. Considering the importance and prevalence of these issues and challenges, IS security research has extensively investigated a variety of factors that influence IS users’ security intentions/behaviors. In this regard, protection-motivated behaviors are primarily based on individuals’ personal cognitive evaluations and vigilance. In reality, however, many users reach security hygiene decisions through various non-rational and non-protection-motivated processes. Such users may not necessarily rely on their own cognitive appraisals and information processing, but proceed to make decisions without careful cognitive assessments of security threats and coping responses. One …


Towards A Development Of A Mobile Application Security Invasiveness Index, Sam Espana Oct 2016

Towards A Development Of A Mobile Application Security Invasiveness Index, Sam Espana

KSU Proceedings on Cybersecurity Education, Research and Practice

The economic impact of Mobile IP, the standard that allows IP sessions to be maintained even when switching between different cellular towers or networks, has been staggering in terms of both scale and acceleration (Doherty, 2016). As voice communications transition to all-digital, all-IP networks such as 4G, there will be an increase in risk due to vulnerabilities, malware, and hacks that exist for PC-based systems and applications (Harwood, 2011). According to Gostev (2006), in June, 2004, a well-known Spanish virus collector known as VirusBuster, emailed the first known mobile phone virus to Kaspersky Lab, Moscow. Targeting the Symbian OS, the …


Teaching Security Of Internet Of Things In Using Raspberrypi, Oliver Nichols, Li Yang, Xiaohong Yuan Oct 2016

Teaching Security Of Internet Of Things In Using Raspberrypi, Oliver Nichols, Li Yang, Xiaohong Yuan

KSU Proceedings on Cybersecurity Education, Research and Practice

The Internet of Things (IoTs) is becoming a reality in today’s society. The IoTs can find its application in multiple domains including healthcare, critical infrastructure, transportation, and home and personal use. It is important to teach students importance and techniques that are essential in protecting IoTs. We design a series of hands-on labs in a smart home setting, which can exercise attack and protection of IoTs. Our hands-on labs use a Raspberry Pi and several diverse smart things that communicate through Z-Wave technology. Using this environment, students can operate a home automation system and learn security concepts by performing these …