Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Business

Journal

2018

Institution
Keyword
Publication

Articles 1 - 30 of 36

Full-Text Articles in Physical Sciences and Mathematics

From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord Dec 2018

From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Welcome to the Fall 2018 issue of the Journal of Cybersecurity Education, Research, and Practice (JCERP). On behalf of the editorial team, we thank you for taking the time to read this issue and strongly encourage you to submit an article for consideration in an upcoming edition.


Using A Game To Improve Phishing Awareness, Patrickson Weanquoi, Jaris Johnson, Jinghua Zhang Dec 2018

Using A Game To Improve Phishing Awareness, Patrickson Weanquoi, Jaris Johnson, Jinghua Zhang

Journal of Cybersecurity Education, Research and Practice

Cybersecurity education has become increasingly critical as we spend more of our everyday lives online. Research shows that college students are mostly unaware of the many online dangers. To teach students about cybersecurity using their preferred medium, gaming, we developed an educational 2D game called “Bird’s Life” that aims to teach college students, as well as general interest individuals, about phishing. Players will come to understand phishing attacks and how to avoid them in real-world scenarios through a fun gaming context. The game can be deployed to multiple platforms such as PC, web, and mobile devices. To measure the effect …


An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf Dec 2018

An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf

Journal of Cybersecurity Education, Research and Practice

This work seeks to answer the question: Does faculty cybersecurity knowledge gained from teaching and research transfer to other IT units in the university? Specifically, do colleges and universities that excel in cybersecurity teaching and research have more secure websites? This work explores a unique setting where the knowledge of the source and recipient are both directly related and observable without outside intervention. Our study employed data from 591 U.S. colleges and universities, the National Centers of Academic Excellence (CAE) program, accepted paper data from the ACM Conference on Computer and Communications Security (CCS) and the IEEE Symposium on Security …


Find, Process, And Share: An Optimal Control In The Vidale-Wolfe Marketing Model, Michael C. Barg Dec 2018

Find, Process, And Share: An Optimal Control In The Vidale-Wolfe Marketing Model, Michael C. Barg

CODEE Journal

The Vidale-Wolfe marketing model is a first-order, linear, non-homogeneous ordinary differential equation (ODE) where the forcing term is proportional to advertising expenditure. With an initial response in sales as the initial condition, the solution of the initial value problem is straightforward for a first undergraduate ODE course. The model serves as an excellent example of many relevant topics for those students whose interests lie in economics, finance, or marketing. Its inclusion in the curriculum is particularly rewarding at an institution without a physics program. The model is not new, but it was novel to us when a group of students …


Facilitating Pre-Service Teachers To Engage Emergent Bilinguals In Productive Struggle, Benjamin T. Dickey, Jim Ewing, Melissa Caruso, Emily D. Fulmer Dec 2018

Facilitating Pre-Service Teachers To Engage Emergent Bilinguals In Productive Struggle, Benjamin T. Dickey, Jim Ewing, Melissa Caruso, Emily D. Fulmer

Journal of Multicultural Affairs

This study utilized a multiple case study with qualitative research to examine how Pre-service teachers (PSTs) might engage Emergent Bilinguals (EBs) in productive struggle—grappling to solve problems (Warshauer, 2015). The researchers created a rubric based on Warshauer’s (2015) case study to record the types of questions PSTs asked as they tutored fourth grade EBs. Warshauer (2015) claimed PSTs should allow students more wait time and ask questions. She referred to such questions as affordance and probing guidance, which facilitates productive struggle. In order to discover more about the PSTs’ thinking, the researchers interviewed the PSTs before and after their first, …


An Examination Of The Death Penalty, Alexandra N. Kremer Dec 2018

An Examination Of The Death Penalty, Alexandra N. Kremer

The Downtown Review

The death penalty, or capital punishment, is the use of execution through hanging, beheading, drowning, gas chambers, lethal injection, and electrocution among others in response to a crime. This has spurred much debate on whether it should be used for reasons such as ethics, revenge, economics, effectiveness as a deterrent, and constitutionality. Capital punishment has roots that date back to the 18th century B.C., but, as of 2016, has been abolished in law or practice by more than two thirds of the world’s countries and several states within the United States. Here, the arguments for and against the death …


Minerva 2018, The Honors College Dec 2018

Minerva 2018, The Honors College

Minerva

This issue of Minerva includes an article on the Honors Endeavor by recently retired faculty member, David Gross; an adaptation of Isaac Record's 2018 Distinguished Honors Graduate lecture; an article on 2018 Honors Read Just Mercy; and a wonderful farewell to beloved Honors College Administrative Specialist, Deb Small. Other highlights include a reflection by CLAS-Honors preceptor of philosophy, Hao Hong; and a look into 2018-2019 student thesis research.


Environmental Governance And The Global South, Jeffrey J. Minneti Oct 2018

Environmental Governance And The Global South, Jeffrey J. Minneti

William & Mary Environmental Law and Policy Review

Over the last several decades, efforts to regulate the environment through traditional public law at national and international levels have stalled. In contrast, private environmental governance has flourished as nongovernmental entities have engaged in standard setting and assessment practices traditionally left to public government. This Article observes that while private governance of producers’ environmental product claims has grown tremendously in recent years, the vast majority of the governance originates in the global North and thrusts the global North’s economic and environmental agenda into the global South. In light of recent empirical studies of the effectiveness of such governance, the Article …


A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman Oct 2018

A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman

Journal of Digital Forensics, Security and Law

Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are …


Yelp’S Review Filtering Algorithm, Yao Yao, Ivelin Angelov, Jack Rasmus-Vorrath, Mooyoung Lee, Daniel W. Engels Aug 2018

Yelp’S Review Filtering Algorithm, Yao Yao, Ivelin Angelov, Jack Rasmus-Vorrath, Mooyoung Lee, Daniel W. Engels

SMU Data Science Review

In this paper, we present an analysis of features influencing Yelp's proprietary review filtering algorithm. Classifying or misclassifying reviews as recommended or non-recommended affects average ratings, consumer decisions, and ultimately, business revenue. Our analysis involves systematically sampling and scraping Yelp restaurant reviews. Features are extracted from review metadata and engineered from metrics and scores generated using text classifiers and sentiment analysis. The coefficients of a multivariate logistic regression model were interpreted as quantifications of the relative importance of features in classifying reviews as recommended or non-recommended. The model classified review recommendations with an accuracy of 78%. We found that reviews …


Cryptovisor: A Cryptocurrency Advisor Tool, Matthew Baldree, Paul Widhalm, Brandon Hill, Matteo Ortisi Jul 2018

Cryptovisor: A Cryptocurrency Advisor Tool, Matthew Baldree, Paul Widhalm, Brandon Hill, Matteo Ortisi

SMU Data Science Review

In this paper, we present a tool that provides trading recommendations for cryptocurrency using a stochastic gradient boost classifier trained from a model labeled by technical indicators. The cryptocurrency market is volatile due to its infancy and limited size making it difficult for investors to know when to enter, exit, or stay in the market. Therefore, a tool is needed to provide investment recommendations for investors. We developed such a tool to support one cryptocurrency, Bitcoin, based on its historical price and volume data to recommend a trading decision for today or past days. This tool is 95.50% accurate with …


From The Editors, Michael E. Whitman, Herbert J. Mattord, Carole L. Hollingsworth Jul 2018

From The Editors, Michael E. Whitman, Herbert J. Mattord, Carole L. Hollingsworth

Journal of Cybersecurity Education, Research and Practice

Welcome to the Spring 2018 issue of the Journal of Cybersecurity Education, Research, and Practice (JCERP). On behalf of the editorial team, we thank you for taking the time to read this issue and strongly encourage you to submit an article for consideration in an upcoming edition.


Voice Hacking: Using Smartphones To Spread Ransomware To Traditional Pcs, Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz Jul 2018

Voice Hacking: Using Smartphones To Spread Ransomware To Traditional Pcs, Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz

Journal of Cybersecurity Education, Research and Practice

This paper presents a voice hacking proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue exploit, …


"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Security Awareness Campaign, Rachael L. Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky J. Jenkins Jul 2018

"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Security Awareness Campaign, Rachael L. Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky J. Jenkins

Journal of Cybersecurity Education, Research and Practice

This article discusses the lessons learned after implementing a successful university-wide cyber security campaign. The Cyber Security Awareness Committee (CyberSAC), a group comprised of diverse units across campus, collaborated together on resources, talent, people, equipment, technology, and assessment practices to meet strategic goals for cyber safety and education. The project involves assessing student learning and behavior changes after participating in a Cyber Security Password Awareness event that was run as a year-long campaign targeting undergraduate students. The results have implications for planning and implementing university-wide initiatives in the field of cyber security, and more broadly, higher education at large.


A Case Study In The Implementation Of A Human-Centric Higher Education Cybersecurity Program, John W. Coffey, Melanie Haveard, Geissler Golding Jul 2018

A Case Study In The Implementation Of A Human-Centric Higher Education Cybersecurity Program, John W. Coffey, Melanie Haveard, Geissler Golding

Journal of Cybersecurity Education, Research and Practice

This article contains a description of the implementation of a comprehensive cyber security program at a regional comprehensive university. The program was designed to create an effective cyber security management infrastructure and to train end users and other categories of security management personnel in data protection and cyber security. This work addresses the impetus for the program, the rather extensive planning and development that went into the program, its implementation, and insights gleaned from the experience. The paper concludes with a summary of the strengths and weaknesses of the initiative.


Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos Jul 2018

Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos

Journal of Cybersecurity Education, Research and Practice

We conducted an observational study to document student misconceptions about cybersecurity using thematic analysis of 25 think-aloud interviews. By understanding patterns in student misconceptions, we provide a basis for developing rigorous evidence-based recommendations for improving teaching and assessment methods in cybersecurity and inform future research. This study is the first to explore student cognition and reasoning about cybersecurity. We interviewed students from three diverse institutions. During these interviews, students grappled with security scenarios designed to probe their understanding of cybersecurity, especially adversarial thinking. We analyzed student statements using a structured qualitative method, novice-led paired thematic analysis, to document patterns in …


Experiential Learning Builds Cybersecurity Self-Efficacy In K-12 Students, Abdullah Konak Jul 2018

Experiential Learning Builds Cybersecurity Self-Efficacy In K-12 Students, Abdullah Konak

Journal of Cybersecurity Education, Research and Practice

In recent years, there have been increased efforts to recruit talented K-12 students into cybersecurity fields. These efforts led to many K-12 extracurricular programs organized by higher education institutions. In this paper, we first introduce a weeklong K-12 program focusing on critical thinking, problem-solving, and igniting interest in information security through hands-on activities performed in a state-of-the-art virtual computer laboratory. Then, we present an inquiry-based approach to design hands-on activities to achieve these goals. We claim that hands-on activities designed based on this inquiry-based framework improve K-12 students’ self-efficacy in cybersecurity as well as their problem-solving skills. The evaluation of …


Feeling Ai Jul 2018

Feeling Ai

SIGNED: The Magazine of The Hong Kong Design Institute

We all develop emotional connections to the devices we use; the smartphone that is a constant companion or the office printer that is a constant source of frustration. Soon, these machines might be able to respond in kind


Forewarned Is Forearmed: Review Of Curbing Catastrophe: Natural Hazards And Risk Reduction In The Modern World By Timothy H. Dixon (2017), Jason Makansi Jul 2018

Forewarned Is Forearmed: Review Of Curbing Catastrophe: Natural Hazards And Risk Reduction In The Modern World By Timothy H. Dixon (2017), Jason Makansi

Numeracy

Timothy H. Dixon. 2017. Curbing Catastrophe: Natural Hazards and Risk Reduction in the Modern World. (New York, NY: Cambridge University Press) 300 pp. ISBN 978-1108113663.

Curbing Catastrophe for the most part lives up to what is claimed in the foreword: “…a compelling account of recent and historical disasters, both natural and human-caused, drawing on common themes and providing a holistic understanding of hazards, disasters, and mitigation for anyone interested in this important and topical subject.” This is a pretty thorough treatment of an extraordinarily complex subject, and the gaps identified in this review should be considered explications more than …


Recommended Corrective Security Measures To Address The Weaknesses Identified Within The Shapash Nuclear Research Institute, Khadija Moussaid, Oum Keltoum Hakam Jun 2018

Recommended Corrective Security Measures To Address The Weaknesses Identified Within The Shapash Nuclear Research Institute, Khadija Moussaid, Oum Keltoum Hakam

International Journal of Nuclear Security

The Shapash Nuclear Research Institute (SNRI) data book was issued by the International Atomic Energy Agency (IAEA) in 2013. The hypothetical facility data book describes the hypothetical site, which is divided into two areas: the low-security area, known as the administrative area, and the very high-security area, known as the protected area. The book contains detailed descriptions of each area’s safety and security measures, along with figures of multiple buildings in both areas, and also includes information about the site’s computer networks.

This paper aims to identify security weaknesses related to the institute’s location, the Administrative Area (AA), the Protected …


Book Review: Fundamentals Of International Aviation, Alan Bender Jun 2018

Book Review: Fundamentals Of International Aviation, Alan Bender

International Journal of Aviation, Aeronautics, and Aerospace

Not applicable.


Improving Shewhart Control Chart Performance In The Presence Of Measurement Error Using Multiple Measurements And Two-Stage Sampling, Kenneth W. Linna Jun 2018

Improving Shewhart Control Chart Performance In The Presence Of Measurement Error Using Multiple Measurements And Two-Stage Sampling, Kenneth W. Linna

Journal of International & Interdisciplinary Business Research

The usual Shewhart control chart efficiently detects large shifts in the mean of a quality characteristic and has been extensively studied in the literature. Most proposed alternatives to the Shewhart chart aim to improve either the signal performance for smaller mean shifts or reduce the sampling effort required to detect a larger shift. Measurement error has been shown in the literature to result in reduced power to detect process shifts. The combination of multiple measurements and two-stage sampling is considered here as a strategy for both regaining power lost due to measurement error and specifically tuning the charts for shifts …


No One Likes An Ash Hole: Advocating For A Management Scheme That Prioritizes Beneficial Utilization Of Coal Ash In The United States And Georgia Through Domestic And International Comparisons, Ethan Keith Norris May 2018

No One Likes An Ash Hole: Advocating For A Management Scheme That Prioritizes Beneficial Utilization Of Coal Ash In The United States And Georgia Through Domestic And International Comparisons, Ethan Keith Norris

Georgia Journal of International & Comparative Law

No abstract provided.


Comparative Study: Reducing Cost To Manage Accessibility With Existing Data, Claire Chu, Bill Kerneckel, Eric C. Larson, Nathan Mowat, Christopher Woodard Apr 2018

Comparative Study: Reducing Cost To Manage Accessibility With Existing Data, Claire Chu, Bill Kerneckel, Eric C. Larson, Nathan Mowat, Christopher Woodard

SMU Data Science Review

“Project Sidewalk” is an existing research effort that focuses on mapping accessibility issues for handicapped persons to efficiently plan wheelchair and mobile scooter friendly routes around Washington D.C. As supporters of this project, we utilized the data “Project Sidewalk” collected and used it to confirm predictions about where problem sidewalks exist based on real estate and crime data. We present a study that identifies correlations found between accessibility data and crime and housing statistics in the Washington D.C. metropolitan area. We identify the key reasons for increased accessibility and the issues with the current infrastructure management system. After a thorough …


Developing Kenya’S Educational Capacity In Nuclear Security Through Nuclear Forensics Research, Hudson Kalambuka Angeyo Apr 2018

Developing Kenya’S Educational Capacity In Nuclear Security Through Nuclear Forensics Research, Hudson Kalambuka Angeyo

International Journal of Nuclear Security

Nuclear energy’s distinctive characteristics give rise to special educational requirements. These requirements are necessary to not only address the danger of nuclear proliferation, but also to build capacity for a secure nuclear fuel circle. In this paper, I assess the status of educational capacity in nuclear security both in response to, and in support of, Kenya’s nuclear power program. I highlight the nuclear security educational infrastructure’s key features in the context of nuclear power, noting the low capacity at Kenyan universities. I identify the steps required to ensure that the country’s dynamic nuclear regulatory infrastructural framework is used effectively to …


Blockchain: Technical Review, Evan D. Poff Apr 2018

Blockchain: Technical Review, Evan D. Poff

Marriott Student Review

This review of blockchain technology accompanies the article "Strategic Implications of Blockchain."


Buzzwords, Evan D. Poff Apr 2018

Buzzwords, Evan D. Poff

Marriott Student Review

This feature will explain the following buzzwords:

  • Blockchain
  • Cryptocurrency
  • Work-Life Integration
  • Passive Equities
  • Risk-Adjusted Returns


Volume 4, Full Contents Apr 2018

Volume 4, Full Contents

Butler Journal of Undergraduate Research

No abstract provided.


A Community's Collective Courage: A Local Food Cooperative's Impact On Food Insecurity, Community And Economic Development, And Local Food Systems, Tabitha C. Barbour Apr 2018

A Community's Collective Courage: A Local Food Cooperative's Impact On Food Insecurity, Community And Economic Development, And Local Food Systems, Tabitha C. Barbour

Butler Journal of Undergraduate Research

According to the USDA’s “Food Security Status of U.S. Households” in 2014, 48.1 million people live in food insecure households. In Indiana, more than 1 million people suffer from food insecurity with rates as high as 19.2% of Marion County’s population according to the Map the Meal Gap 2014 report. The Community Controlled Food Initiative (CCFI) is a local food cooperative operated by the Kheprw Institute and neighborhood residents in the Mid-North Indianapolis Community. The cooperative formed to address food insecurity in August 2015 in response to the closing on the local Double 8 Foods grocery stores. CCFI hosts a …


Volume 4 Table Of Contents Apr 2018

Volume 4 Table Of Contents

Butler Journal of Undergraduate Research

No abstract provided.