Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Kennesaw State University (9)
- Butler University (3)
- Embry-Riddle Aeronautical University (3)
- Southern Methodist University (3)
- University of Tennessee, Knoxville (3)
-
- Brigham Young University (2)
- Claremont Colleges (1)
- Cleveland State University (1)
- Fort Hays State University (1)
- Illinois Wesleyan University (1)
- Sacred Heart University (1)
- Stephen F. Austin State University (1)
- The University of Maine (1)
- University of Arkansas, Fayetteville (1)
- University of Georgia School of Law (1)
- University of South Florida (1)
- University of the Philippines Los Baños (1)
- Vocational Training Council (1)
- William & Mary Law School (1)
- Keyword
-
- Cybersecurity (4)
- Cryptocurrency (3)
- Blockchain (2)
- Editorial (2)
- Accessibility (1)
-
- Adversarial thinking (1)
- Air Traffic Control (1)
- Algorithm (1)
- Anocracy (1)
- Artificial intelligence (1)
- Asian Options (1)
- Autocracy (1)
- Average Run Length (1)
- Bag of Words (1)
- Big Data (1)
- Big forensic data (1)
- Bitcoin (1)
- Book Review; International Aviation (1)
- Brutalization. (1)
- Budget (1)
- Capital punishment (1)
- Case Study (1)
- Climate Change (1)
- Coal Combustion Residuals (1)
- Coal ash (1)
- Coercive diplomacy (1)
- Collaboration (1)
- Community (1)
- Compliance (1)
- Constitutionality (1)
- Publication
-
- Journal of Cybersecurity Education, Research and Practice (9)
- Butler Journal of Undergraduate Research (3)
- International Journal of Nuclear Security (3)
- SMU Data Science Review (3)
- Marriott Student Review (2)
-
- CODEE Journal (1)
- Georgia Journal of International & Comparative Law (1)
- International Journal of Aviation, Aeronautics, and Aerospace (1)
- Journal of Aviation/Aerospace Education & Research (1)
- Journal of Digital Forensics, Security and Law (1)
- Journal of Economics, Management and Agricultural Development (1)
- Journal of International & Interdisciplinary Business Research (1)
- Journal of Multicultural Affairs (1)
- Journal of the Arkansas Academy of Science (1)
- Minerva (1)
- Numeracy (1)
- SIGNED: The Magazine of The Hong Kong Design Institute (1)
- School of Computer Science & Engineering Faculty Publications (1)
- The Downtown Review (1)
- Undergraduate Economic Review (1)
- William & Mary Environmental Law and Policy Review (1)
Articles 1 - 30 of 36
Full-Text Articles in Physical Sciences and Mathematics
From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord
From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord
Journal of Cybersecurity Education, Research and Practice
Welcome to the Fall 2018 issue of the Journal of Cybersecurity Education, Research, and Practice (JCERP). On behalf of the editorial team, we thank you for taking the time to read this issue and strongly encourage you to submit an article for consideration in an upcoming edition.
Using A Game To Improve Phishing Awareness, Patrickson Weanquoi, Jaris Johnson, Jinghua Zhang
Using A Game To Improve Phishing Awareness, Patrickson Weanquoi, Jaris Johnson, Jinghua Zhang
Journal of Cybersecurity Education, Research and Practice
Cybersecurity education has become increasingly critical as we spend more of our everyday lives online. Research shows that college students are mostly unaware of the many online dangers. To teach students about cybersecurity using their preferred medium, gaming, we developed an educational 2D game called “Bird’s Life” that aims to teach college students, as well as general interest individuals, about phishing. Players will come to understand phishing attacks and how to avoid them in real-world scenarios through a fun gaming context. The game can be deployed to multiple platforms such as PC, web, and mobile devices. To measure the effect …
An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf
An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf
Journal of Cybersecurity Education, Research and Practice
This work seeks to answer the question: Does faculty cybersecurity knowledge gained from teaching and research transfer to other IT units in the university? Specifically, do colleges and universities that excel in cybersecurity teaching and research have more secure websites? This work explores a unique setting where the knowledge of the source and recipient are both directly related and observable without outside intervention. Our study employed data from 591 U.S. colleges and universities, the National Centers of Academic Excellence (CAE) program, accepted paper data from the ACM Conference on Computer and Communications Security (CCS) and the IEEE Symposium on Security …
Find, Process, And Share: An Optimal Control In The Vidale-Wolfe Marketing Model, Michael C. Barg
Find, Process, And Share: An Optimal Control In The Vidale-Wolfe Marketing Model, Michael C. Barg
CODEE Journal
The Vidale-Wolfe marketing model is a first-order, linear, non-homogeneous ordinary differential equation (ODE) where the forcing term is proportional to advertising expenditure. With an initial response in sales as the initial condition, the solution of the initial value problem is straightforward for a first undergraduate ODE course. The model serves as an excellent example of many relevant topics for those students whose interests lie in economics, finance, or marketing. Its inclusion in the curriculum is particularly rewarding at an institution without a physics program. The model is not new, but it was novel to us when a group of students …
Facilitating Pre-Service Teachers To Engage Emergent Bilinguals In Productive Struggle, Benjamin T. Dickey, Jim Ewing, Melissa Caruso, Emily D. Fulmer
Facilitating Pre-Service Teachers To Engage Emergent Bilinguals In Productive Struggle, Benjamin T. Dickey, Jim Ewing, Melissa Caruso, Emily D. Fulmer
Journal of Multicultural Affairs
This study utilized a multiple case study with qualitative research to examine how Pre-service teachers (PSTs) might engage Emergent Bilinguals (EBs) in productive struggle—grappling to solve problems (Warshauer, 2015). The researchers created a rubric based on Warshauer’s (2015) case study to record the types of questions PSTs asked as they tutored fourth grade EBs. Warshauer (2015) claimed PSTs should allow students more wait time and ask questions. She referred to such questions as affordance and probing guidance, which facilitates productive struggle. In order to discover more about the PSTs’ thinking, the researchers interviewed the PSTs before and after their first, …
An Examination Of The Death Penalty, Alexandra N. Kremer
An Examination Of The Death Penalty, Alexandra N. Kremer
The Downtown Review
The death penalty, or capital punishment, is the use of execution through hanging, beheading, drowning, gas chambers, lethal injection, and electrocution among others in response to a crime. This has spurred much debate on whether it should be used for reasons such as ethics, revenge, economics, effectiveness as a deterrent, and constitutionality. Capital punishment has roots that date back to the 18th century B.C., but, as of 2016, has been abolished in law or practice by more than two thirds of the world’s countries and several states within the United States. Here, the arguments for and against the death …
Minerva 2018, The Honors College
Minerva 2018, The Honors College
Minerva
This issue of Minerva includes an article on the Honors Endeavor by recently retired faculty member, David Gross; an adaptation of Isaac Record's 2018 Distinguished Honors Graduate lecture; an article on 2018 Honors Read Just Mercy; and a wonderful farewell to beloved Honors College Administrative Specialist, Deb Small. Other highlights include a reflection by CLAS-Honors preceptor of philosophy, Hao Hong; and a look into 2018-2019 student thesis research.
Environmental Governance And The Global South, Jeffrey J. Minneti
Environmental Governance And The Global South, Jeffrey J. Minneti
William & Mary Environmental Law and Policy Review
Over the last several decades, efforts to regulate the environment through traditional public law at national and international levels have stalled. In contrast, private environmental governance has flourished as nongovernmental entities have engaged in standard setting and assessment practices traditionally left to public government. This Article observes that while private governance of producers’ environmental product claims has grown tremendously in recent years, the vast majority of the governance originates in the global North and thrusts the global North’s economic and environmental agenda into the global South. In light of recent empirical studies of the effectiveness of such governance, the Article …
A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman
A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman
Journal of Digital Forensics, Security and Law
Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are …
Yelp’S Review Filtering Algorithm, Yao Yao, Ivelin Angelov, Jack Rasmus-Vorrath, Mooyoung Lee, Daniel W. Engels
Yelp’S Review Filtering Algorithm, Yao Yao, Ivelin Angelov, Jack Rasmus-Vorrath, Mooyoung Lee, Daniel W. Engels
SMU Data Science Review
In this paper, we present an analysis of features influencing Yelp's proprietary review filtering algorithm. Classifying or misclassifying reviews as recommended or non-recommended affects average ratings, consumer decisions, and ultimately, business revenue. Our analysis involves systematically sampling and scraping Yelp restaurant reviews. Features are extracted from review metadata and engineered from metrics and scores generated using text classifiers and sentiment analysis. The coefficients of a multivariate logistic regression model were interpreted as quantifications of the relative importance of features in classifying reviews as recommended or non-recommended. The model classified review recommendations with an accuracy of 78%. We found that reviews …
Cryptovisor: A Cryptocurrency Advisor Tool, Matthew Baldree, Paul Widhalm, Brandon Hill, Matteo Ortisi
Cryptovisor: A Cryptocurrency Advisor Tool, Matthew Baldree, Paul Widhalm, Brandon Hill, Matteo Ortisi
SMU Data Science Review
In this paper, we present a tool that provides trading recommendations for cryptocurrency using a stochastic gradient boost classifier trained from a model labeled by technical indicators. The cryptocurrency market is volatile due to its infancy and limited size making it difficult for investors to know when to enter, exit, or stay in the market. Therefore, a tool is needed to provide investment recommendations for investors. We developed such a tool to support one cryptocurrency, Bitcoin, based on its historical price and volume data to recommend a trading decision for today or past days. This tool is 95.50% accurate with …
From The Editors, Michael E. Whitman, Herbert J. Mattord, Carole L. Hollingsworth
From The Editors, Michael E. Whitman, Herbert J. Mattord, Carole L. Hollingsworth
Journal of Cybersecurity Education, Research and Practice
Welcome to the Spring 2018 issue of the Journal of Cybersecurity Education, Research, and Practice (JCERP). On behalf of the editorial team, we thank you for taking the time to read this issue and strongly encourage you to submit an article for consideration in an upcoming edition.
Voice Hacking: Using Smartphones To Spread Ransomware To Traditional Pcs, Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz
Voice Hacking: Using Smartphones To Spread Ransomware To Traditional Pcs, Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz
Journal of Cybersecurity Education, Research and Practice
This paper presents a voice hacking proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue exploit, …
"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Security Awareness Campaign, Rachael L. Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky J. Jenkins
"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Security Awareness Campaign, Rachael L. Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky J. Jenkins
Journal of Cybersecurity Education, Research and Practice
This article discusses the lessons learned after implementing a successful university-wide cyber security campaign. The Cyber Security Awareness Committee (CyberSAC), a group comprised of diverse units across campus, collaborated together on resources, talent, people, equipment, technology, and assessment practices to meet strategic goals for cyber safety and education. The project involves assessing student learning and behavior changes after participating in a Cyber Security Password Awareness event that was run as a year-long campaign targeting undergraduate students. The results have implications for planning and implementing university-wide initiatives in the field of cyber security, and more broadly, higher education at large.
A Case Study In The Implementation Of A Human-Centric Higher Education Cybersecurity Program, John W. Coffey, Melanie Haveard, Geissler Golding
A Case Study In The Implementation Of A Human-Centric Higher Education Cybersecurity Program, John W. Coffey, Melanie Haveard, Geissler Golding
Journal of Cybersecurity Education, Research and Practice
This article contains a description of the implementation of a comprehensive cyber security program at a regional comprehensive university. The program was designed to create an effective cyber security management infrastructure and to train end users and other categories of security management personnel in data protection and cyber security. This work addresses the impetus for the program, the rather extensive planning and development that went into the program, its implementation, and insights gleaned from the experience. The paper concludes with a summary of the strengths and weaknesses of the initiative.
Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos
Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos
Journal of Cybersecurity Education, Research and Practice
We conducted an observational study to document student misconceptions about cybersecurity using thematic analysis of 25 think-aloud interviews. By understanding patterns in student misconceptions, we provide a basis for developing rigorous evidence-based recommendations for improving teaching and assessment methods in cybersecurity and inform future research. This study is the first to explore student cognition and reasoning about cybersecurity. We interviewed students from three diverse institutions. During these interviews, students grappled with security scenarios designed to probe their understanding of cybersecurity, especially adversarial thinking. We analyzed student statements using a structured qualitative method, novice-led paired thematic analysis, to document patterns in …
Experiential Learning Builds Cybersecurity Self-Efficacy In K-12 Students, Abdullah Konak
Experiential Learning Builds Cybersecurity Self-Efficacy In K-12 Students, Abdullah Konak
Journal of Cybersecurity Education, Research and Practice
In recent years, there have been increased efforts to recruit talented K-12 students into cybersecurity fields. These efforts led to many K-12 extracurricular programs organized by higher education institutions. In this paper, we first introduce a weeklong K-12 program focusing on critical thinking, problem-solving, and igniting interest in information security through hands-on activities performed in a state-of-the-art virtual computer laboratory. Then, we present an inquiry-based approach to design hands-on activities to achieve these goals. We claim that hands-on activities designed based on this inquiry-based framework improve K-12 students’ self-efficacy in cybersecurity as well as their problem-solving skills. The evaluation of …
Feeling Ai
SIGNED: The Magazine of The Hong Kong Design Institute
We all develop emotional connections to the devices we use; the smartphone that is a constant companion or the office printer that is a constant source of frustration. Soon, these machines might be able to respond in kind
Forewarned Is Forearmed: Review Of Curbing Catastrophe: Natural Hazards And Risk Reduction In The Modern World By Timothy H. Dixon (2017), Jason Makansi
Numeracy
Timothy H. Dixon. 2017. Curbing Catastrophe: Natural Hazards and Risk Reduction in the Modern World. (New York, NY: Cambridge University Press) 300 pp. ISBN 978-1108113663.
Curbing Catastrophe for the most part lives up to what is claimed in the foreword: “…a compelling account of recent and historical disasters, both natural and human-caused, drawing on common themes and providing a holistic understanding of hazards, disasters, and mitigation for anyone interested in this important and topical subject.” This is a pretty thorough treatment of an extraordinarily complex subject, and the gaps identified in this review should be considered explications more than …
Recommended Corrective Security Measures To Address The Weaknesses Identified Within The Shapash Nuclear Research Institute, Khadija Moussaid, Oum Keltoum Hakam
Recommended Corrective Security Measures To Address The Weaknesses Identified Within The Shapash Nuclear Research Institute, Khadija Moussaid, Oum Keltoum Hakam
International Journal of Nuclear Security
The Shapash Nuclear Research Institute (SNRI) data book was issued by the International Atomic Energy Agency (IAEA) in 2013. The hypothetical facility data book describes the hypothetical site, which is divided into two areas: the low-security area, known as the administrative area, and the very high-security area, known as the protected area. The book contains detailed descriptions of each area’s safety and security measures, along with figures of multiple buildings in both areas, and also includes information about the site’s computer networks.
This paper aims to identify security weaknesses related to the institute’s location, the Administrative Area (AA), the Protected …
Book Review: Fundamentals Of International Aviation, Alan Bender
Book Review: Fundamentals Of International Aviation, Alan Bender
International Journal of Aviation, Aeronautics, and Aerospace
Not applicable.
Improving Shewhart Control Chart Performance In The Presence Of Measurement Error Using Multiple Measurements And Two-Stage Sampling, Kenneth W. Linna
Improving Shewhart Control Chart Performance In The Presence Of Measurement Error Using Multiple Measurements And Two-Stage Sampling, Kenneth W. Linna
Journal of International & Interdisciplinary Business Research
The usual Shewhart control chart efficiently detects large shifts in the mean of a quality characteristic and has been extensively studied in the literature. Most proposed alternatives to the Shewhart chart aim to improve either the signal performance for smaller mean shifts or reduce the sampling effort required to detect a larger shift. Measurement error has been shown in the literature to result in reduced power to detect process shifts. The combination of multiple measurements and two-stage sampling is considered here as a strategy for both regaining power lost due to measurement error and specifically tuning the charts for shifts …
No One Likes An Ash Hole: Advocating For A Management Scheme That Prioritizes Beneficial Utilization Of Coal Ash In The United States And Georgia Through Domestic And International Comparisons, Ethan Keith Norris
Georgia Journal of International & Comparative Law
No abstract provided.
Comparative Study: Reducing Cost To Manage Accessibility With Existing Data, Claire Chu, Bill Kerneckel, Eric C. Larson, Nathan Mowat, Christopher Woodard
Comparative Study: Reducing Cost To Manage Accessibility With Existing Data, Claire Chu, Bill Kerneckel, Eric C. Larson, Nathan Mowat, Christopher Woodard
SMU Data Science Review
“Project Sidewalk” is an existing research effort that focuses on mapping accessibility issues for handicapped persons to efficiently plan wheelchair and mobile scooter friendly routes around Washington D.C. As supporters of this project, we utilized the data “Project Sidewalk” collected and used it to confirm predictions about where problem sidewalks exist based on real estate and crime data. We present a study that identifies correlations found between accessibility data and crime and housing statistics in the Washington D.C. metropolitan area. We identify the key reasons for increased accessibility and the issues with the current infrastructure management system. After a thorough …
Developing Kenya’S Educational Capacity In Nuclear Security Through Nuclear Forensics Research, Hudson Kalambuka Angeyo
Developing Kenya’S Educational Capacity In Nuclear Security Through Nuclear Forensics Research, Hudson Kalambuka Angeyo
International Journal of Nuclear Security
Nuclear energy’s distinctive characteristics give rise to special educational requirements. These requirements are necessary to not only address the danger of nuclear proliferation, but also to build capacity for a secure nuclear fuel circle. In this paper, I assess the status of educational capacity in nuclear security both in response to, and in support of, Kenya’s nuclear power program. I highlight the nuclear security educational infrastructure’s key features in the context of nuclear power, noting the low capacity at Kenyan universities. I identify the steps required to ensure that the country’s dynamic nuclear regulatory infrastructural framework is used effectively to …
Blockchain: Technical Review, Evan D. Poff
Blockchain: Technical Review, Evan D. Poff
Marriott Student Review
This review of blockchain technology accompanies the article "Strategic Implications of Blockchain."
Buzzwords, Evan D. Poff
Buzzwords, Evan D. Poff
Marriott Student Review
This feature will explain the following buzzwords:
- Blockchain
- Cryptocurrency
- Work-Life Integration
- Passive Equities
- Risk-Adjusted Returns
Volume 4, Full Contents
Butler Journal of Undergraduate Research
No abstract provided.
A Community's Collective Courage: A Local Food Cooperative's Impact On Food Insecurity, Community And Economic Development, And Local Food Systems, Tabitha C. Barbour
A Community's Collective Courage: A Local Food Cooperative's Impact On Food Insecurity, Community And Economic Development, And Local Food Systems, Tabitha C. Barbour
Butler Journal of Undergraduate Research
According to the USDA’s “Food Security Status of U.S. Households” in 2014, 48.1 million people live in food insecure households. In Indiana, more than 1 million people suffer from food insecurity with rates as high as 19.2% of Marion County’s population according to the Map the Meal Gap 2014 report. The Community Controlled Food Initiative (CCFI) is a local food cooperative operated by the Kheprw Institute and neighborhood residents in the Mid-North Indianapolis Community. The cooperative formed to address food insecurity in August 2015 in response to the closing on the local Double 8 Foods grocery stores. CCFI hosts a …
Volume 4 Table Of Contents
Butler Journal of Undergraduate Research
No abstract provided.