Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

Internet

Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 140

Full-Text Articles in Physical Sciences and Mathematics

The Metaverse, Religious Practice And Wellbeing: A Narrative Review, Justin Thomas, Mohammad Amin Kuhail, Fahad Albeyahi Jan 2024

The Metaverse, Religious Practice And Wellbeing: A Narrative Review, Justin Thomas, Mohammad Amin Kuhail, Fahad Albeyahi

All Works

The metaverse is touted as the next phase in the evolution of the Internet. This emerging digital ecosystem is widely conceptualized as a persistent matrix of interconnected multiuser, massively scaled online environments optimally experienced through immersive digital technologies such as virtual reality (VR). Much of the prognostication about the social implications of the metaverse center on secular activities. For example, retail, entertainment (gaming/concerts), and social networking. Little attention has been given to how the metaverse might impact religion. This narrative review explores contemporary research into online religious practice and the use of immersive digital technologies for religious purposes. This focus …


Broadband Equity, Access, And Deployment In Nevada, Brad Wimmer Oct 2023

Broadband Equity, Access, And Deployment In Nevada, Brad Wimmer

Policy Briefs and Reports

The $45.45 billion Broadband, Equity, Access, and Deployment (BEAD) program’s primary objective is to extend broadband service to all unserved and underserved locations in the U.S. and its territories. Several industry studies predict that the BEAD program can meet its goal of providing universal access to broadband service if eligible entities execute their grant programs well. My review of the BEAD program indicates that policy makers can enhance the likelihood of program success by designing competitive grant programs that give applicants the incentive to undercut the subsidies proposed by their rivals and provide applicants the flexibility to design networks that …


Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle Jan 2023

Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle

Computer Science Faculty Publications

Web archives, such as the Internet Archive, preserve the web and allow access to prior states of web pages. We implicitly trust their versions of archived pages, but as their role moves from preserving curios of the past to facilitating present day adjudication, we are concerned with verifying the fixity of archived web pages, or mementos, to ensure they have always remained unaltered. A widely used technique in digital preservation to verify the fixity of an archived resource is to periodically compute a cryptographic hash value on a resource and then compare it with a previous hash value. If the …


Assessing Spurious Correlations In Big Search Data, Jesse T. Richman, Ryan J. Roberts Jan 2023

Assessing Spurious Correlations In Big Search Data, Jesse T. Richman, Ryan J. Roberts

Political Science & Geography Faculty Publications

Big search data offers the opportunity to identify new and potentially real-time measures and predictors of important political, geographic, social, cultural, economic, and epidemiological phenomena, measures that might serve an important role as leading indicators in forecasts and nowcasts. However, it also presents vast new risks that scientists or the public will identify meaningless and totally spurious ‘relationships’ between variables. This study is the first to quantify that risk in the context of search data. We find that spurious correlations arise at exceptionally high frequencies among probability distributions examined for random variables based upon gamma (1, 1) and Gaussian random …


Rural America Is Still Technologically Behind: Why It Matters Now More Than Ever, Paul Force-Emery Mackie Nov 2022

Rural America Is Still Technologically Behind: Why It Matters Now More Than Ever, Paul Force-Emery Mackie

Social Work Department Publications

No abstract provided.


Digital Intimacy In Real Time: Live Streaming Gender And Sexuality, Bo Ruberg, Johanna Brewer Jul 2022

Digital Intimacy In Real Time: Live Streaming Gender And Sexuality, Bo Ruberg, Johanna Brewer

Computer Science: Faculty Publications

This article serves as the guest editors’ introduction to the Television and New Media special issue dedicated to gender and sexuality in live streaming. Live streaming is a key part of the contemporary digital media landscape; it sits at the center of wide-reaching shifts in how culture, entertainment, and labor are expressed and experienced online today. Gender and sexuality are crucial elements of live streaming. Across live streaming’s many forms, these elements manifest in myriad ways: from gendered performances to gender-based harassment, from LGBTQ community building to real-time sex work. This special issue models an interdisciplinary approach to studying gender …


Challenges For Inclusion In Software Engineering: The Case Of The Emerging Papua New Guinean Society, Raula Kula, Christoph Treude, Hideaki Hata, Sebastian Baltes, Igor Steinmacher, Marco Gerosa, Winifred Kula Amini Jun 2022

Challenges For Inclusion In Software Engineering: The Case Of The Emerging Papua New Guinean Society, Raula Kula, Christoph Treude, Hideaki Hata, Sebastian Baltes, Igor Steinmacher, Marco Gerosa, Winifred Kula Amini

Research Collection School Of Computing and Information Systems

Software plays a central role in modern societies, with its high economic value and potential for advancing societal change. In this paper, we characterise challenges and opportunities for a country progressing towards entering the global software industry, focusing on Papua New Guinea (PNG). By hosting a Software Engineering workshop, we conducted a qualitative study by recording talks (n=3), employing a questionnaire (n=52), and administering an in-depth focus group session with local actors (n=5). Based on a thematic analysis, we identified challenges as barriers and opportunities for the PNG software engineering community. We also discuss the state of practices and how …


Twitter's Role In An Increasingly Polarized Political Climate; A Look Into The 2020 Us Elections, Leanne Kendall Apr 2022

Twitter's Role In An Increasingly Polarized Political Climate; A Look Into The 2020 Us Elections, Leanne Kendall

Honors Projects in Data Science

Amidst politically strained times, one might wonder what has cause such an exaggerated gap between the views of democrats and republicans. For years, research has suggested the US’s voting population is becoming increasingly politically polarized, with one of the causes being social media. This study's purpose is to understand more about the role that social media plays in the polarization of parties in the US. The study is comprised of the analysis of over 3,000,000 tweets from 9/22/2020 through 11/10/2020 that mention or are written by senate and presidential candidates. Natural language processing, network graphing, and sentiment analyses were utilized …


Social Construction Of Internet Fraud As Innovation Among Youths In Nigeria, Austin Ayodele Mr., Jonathan Kehinde Oyedeji, Huthman Olamide Badmos Mar 2022

Social Construction Of Internet Fraud As Innovation Among Youths In Nigeria, Austin Ayodele Mr., Jonathan Kehinde Oyedeji, Huthman Olamide Badmos

International Journal of Cybersecurity Intelligence & Cybercrime

The proliferation of internet technologies has shaped interactions in contemporary society. Despite the pivotal importance of the internet to the global economy, it has several negative consequences such as internet fraud. This study examined the perception that young adults in Nigeria hold about internet fraud as an innovative means to economic survival rather than as a criminal enterprise. Robert Merton’s Anomie/Strain Theory (AST) was adopted as the theoretical thrust of the study. Adopting a qualitative data collection method, 15 participants were selected using the non-probabilistic purposive and snowballing techniques while opinions were sampled through in-depth interviews in different locations within …


Current Trends In Blockchain Implementations On The Paradigm Of Public Key Infrastructure: A Survey, Daniel Maldonado-Ruiz, Jenny Torres, Nour El Madhoun, Mohamad Badra Jan 2022

Current Trends In Blockchain Implementations On The Paradigm Of Public Key Infrastructure: A Survey, Daniel Maldonado-Ruiz, Jenny Torres, Nour El Madhoun, Mohamad Badra

All Works

Since the emergence of the Bitcoin cryptocurrency, the blockchain technology has become the new Internet tool with which researchers claim to be able to solve any existing online problem. From immutable log ledger applications to authorisation systems applications, the current technological consensus implies that most of Internet problems could be effectively solved by deploying some form of blockchain environment. Regardless this ‘consensus’, there are decentralised Internet-based applications on which blockchain technology can actually solve several problems and improve the functionality of these applications. The development of these new blockchain-based solutions is grouped into a new paradigm called Blockchain 3.0 and …


On The Horizon: Nanosatellite Constellations Will Revolutionize The Internet Of Things (Iot), Diane Janosek Jan 2022

On The Horizon: Nanosatellite Constellations Will Revolutionize The Internet Of Things (Iot), Diane Janosek

Seattle Journal of Technology, Environmental & Innovation Law

The Internet of Things has experienced exponential growth and use across the globe with 25.1 billion devices currently in use. Until recently, the functionality of the IoT was dependent on secure data flow between internet terrestrial stations and the IoT devices. Now, a new alternative path of data flow is on the horizon.

IoT device manufacturers are now looking to outer space nanosatellite constellations to connect to a different type of internet. This new internet is no longer terrestrial with fiber cables six feet underground but now looking up, literally, 200 to 300 miles above the earth, to communicate, connect …


Law Library Blog (January 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law Jan 2022

Law Library Blog (January 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Exploring Cyberterrorism, Topic Models And Social Networks Of Jihadists Dark Web Forums: A Computational Social Science Approach, Vivian Fiona Guetler Jan 2022

Exploring Cyberterrorism, Topic Models And Social Networks Of Jihadists Dark Web Forums: A Computational Social Science Approach, Vivian Fiona Guetler

Graduate Theses, Dissertations, and Problem Reports

This three-article dissertation focuses on cyber-related topics on terrorist groups, specifically Jihadists’ use of technology, the application of natural language processing, and social networks in analyzing text data derived from terrorists' Dark Web forums. The first article explores cybercrime and cyberterrorism. As technology progresses, it facilitates new forms of behavior, including tech-related crimes known as cybercrime and cyberterrorism. In this article, I provide an analysis of the problems of cybercrime and cyberterrorism within the field of criminology by reviewing existing literature focusing on (a) the issues in defining terrorism, cybercrime, and cyberterrorism, (b) ways that cybercriminals commit a crime in …


Seedemu: The Seed Internet Emulator, Honghao Zeng Dec 2021

Seedemu: The Seed Internet Emulator, Honghao Zeng

Theses - ALL

I studied and experimented with the idea of building an emulator for the Internet. While there are various already available options for such a task, none of them takes the emulation of the entire Internet as an important feature in mind. Those emulators and simulators can handle small-scale networks pretty well, but lacks the ability to handle large-size networks, mainly due to:

- Not being able to run many nodes, or requires very powerful hardware to do so,- Lacks convenient ways to build a large emulation, and - Lacks reusability: once something is built, it is very hard to re-use …


The Dangers Of Doxing And Swatting: Why Texas Should Criminalize These Malicious Forms Of Cyberharassment, Hannah Mery Oct 2021

The Dangers Of Doxing And Swatting: Why Texas Should Criminalize These Malicious Forms Of Cyberharassment, Hannah Mery

St. Mary's Law Journal

Abstract forthcoming.


Analiza Dhe Konfigurimi I Rrjeteve Virtuale Private, Xhemile Rexhepi Jun 2021

Analiza Dhe Konfigurimi I Rrjeteve Virtuale Private, Xhemile Rexhepi

Theses and Dissertations

Në këtë punim diplome është paraqitur analiza e Rrjeteve Virtuale Private si dhe është përshkruar konfigurimi i tyre. Në fillim shpjegohen konceptet kryesore të rrjeteve komunikuese, të cilat mundësojnë transmetimin e të dhënave në mes të pajisjeve. Paraqitet nevoja dhe rëndësia e përdorimit të komutimit me qark dhe atij me kanale, duke vazhduar me llojet dhe rolin e shtresave të modelit OSI. Dhe si pikë kryesore arrijmë te rrjetet VPN, duke pasuar me analizën krahasuese në mes të llojeve të ndryshme të tyre si dhe përparësite dhe mangësitë e tyre. Shtjellohet edhe siguria e tyre si sfidë kryesore e rrjeteve …


The Challenges Of Identifying Dangers Online And Predictors Of Victimization, Catherine D. Marcum Apr 2021

The Challenges Of Identifying Dangers Online And Predictors Of Victimization, Catherine D. Marcum

International Journal of Cybersecurity Intelligence & Cybercrime

This short paper will provide an overview of the impressive pieces included in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime. This issue includes articles on the following pertinent topic, utilizing a range of approaches and methodologies: 1) online credibility; 2) cyberbullying; and 3) unauthorized access of information. An emphasis on the importance of policy development and better protection of potential victims is a common thread throughout the issue.


Pollen: A Secure, Decentralized Wireless Communication Platform, Max Perrello Jan 2021

Pollen: A Secure, Decentralized Wireless Communication Platform, Max Perrello

Honors Theses

In this article, we detail an encrypted, internet-independent messaging platform, of which we built a prototype. This thesis also describes the challenges faced in the process, as well as potential future enhancements.


Cyber Security’S Influence On Modern Society, Nicholas Vallarelli May 2020

Cyber Security’S Influence On Modern Society, Nicholas Vallarelli

Honors College Theses

The world of cyber security is evolving every day, and cyber-criminals are trying to take advantage of it to gain as much money and power as possible. As the Internet continues to grow, more people around the world join the Internet. The purpose of this is to see how much of an importance cyber security has and how cyber-criminals are able to utilize the cyberworld for their own personal gain. Research has been done on how the cyberworld got where it is today. Additionally, individual research has been done in an effort to learn how to hack. A hack lab …


Security In 5g-Enabled Internet Of Things Communication: Issues: Challenges, And Future Research Roadmap, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Prosanta Gope, Joel J.P.C. Rodrigues Jan 2020

Security In 5g-Enabled Internet Of Things Communication: Issues: Challenges, And Future Research Roadmap, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Prosanta Gope, Joel J.P.C. Rodrigues

VMASC Publications

5G mobile communication systems promote the mobile network to not only interconnect people, but also interconnect and control the machine and other devices. 5G-enabled Internet of Things (IoT) communication environment supports a wide-variety of applications, such as remote surgery, self-driving car, virtual reality, flying IoT drones, security and surveillance and many more. These applications help and assist the routine works of the community. In such communication environment, all the devices and users communicate through the Internet. Therefore, this communication agonizes from different types of security and privacy issues. It is also vulnerable to different types of possible attacks (for example, …


Automatically Categorizing Software Technologies, Mathieu Nassif, Christoph Treude, Martin P. Robillard Jan 2020

Automatically Categorizing Software Technologies, Mathieu Nassif, Christoph Treude, Martin P. Robillard

Research Collection School Of Computing and Information Systems

Informal language and the absence of a standard taxonomy for software technologies make it difficult to reliably analyze technology trends on discussion forums and other on-line venues. We propose an automated approach called Witt for the categorization of software technologies (an expanded version of the hypernym discovery problem). Witt takes as input a phrase describing a software technology or concept and returns a general category that describes it (e.g., integrated development environment), along with attributes that further qualify it (commercial, php, etc.). By extension, the approach enables the dynamic creation of lists of all technologies of a given type (e.g., …


The Internet Of Bodies, Andrea M. Matwyshyn Oct 2019

The Internet Of Bodies, Andrea M. Matwyshyn

William & Mary Law Review

This Article introduces the ongoing progression of the Internet of Things (IoT) into the Internet of Bodies (IoB)—a network of human bodies whose integrity and functionality rely at least in part on the Internet and related technologies, such as artificial intelligence. IoB devices will evidence the same categories of legacy security flaws that have plagued IoT devices. However, unlike most IoT, IoB technologies will directly, physically harm human bodies—a set of harms courts, legislators, and regulators will deem worthy of legal redress. As such, IoB will herald the arrival of (some forms of) corporate software liability and a new legal …


Cloud Computing Architecture For Elearning Systems In Secondary Schools In Tanzania, Kennedy F. Mwakisole, Mussa M. Kissaka Dr, Joel S. Mtebe Phd Oct 2019

Cloud Computing Architecture For Elearning Systems In Secondary Schools In Tanzania, Kennedy F. Mwakisole, Mussa M. Kissaka Dr, Joel S. Mtebe Phd

The African Journal of Information Systems

In recent years, schools have been investing heavily on information and communications technology (ICT) infrastructure to implement eLearning systems to enhance the quality of education in secondary schools in Tanzania. The majority of these systems are implemented using a traditional web-based eLearning approach on school premises which is costly and limits usage due to lack of scalability and flexibility. Consequently, many schools have started adopting cloud computing as a solution. However, this adaption depends on well-defined cloud eLearning architecture. This study proposed cloud architecture for implementing an eLearning system in secondary schools in Tanzania by adopting various layers proposed in …


Spatio-Temporal Analysis And Prediction Of Cellular Traffic In Metropolis, Xu Wang, Zimu Zhou, Fu Xiao, Kai Xing, Zheng Yang, Yunhao Liu, Chunyi Peng Sep 2019

Spatio-Temporal Analysis And Prediction Of Cellular Traffic In Metropolis, Xu Wang, Zimu Zhou, Fu Xiao, Kai Xing, Zheng Yang, Yunhao Liu, Chunyi Peng

Research Collection School Of Computing and Information Systems

Understanding and predicting cellular traffic at large-scale and fine-granularity is beneficial and valuable to mobile users, wireless carriers and city authorities. Predicting cellular traffic in modern metropolis is particularly challenging because of the tremendous temporal and spatial dynamics introduced by diverse user Internet behaviours and frequent user mobility citywide. In this paper, we characterize and investigate the root causes of such dynamics in cellular traffic through a big cellular usage dataset covering 1.5 million users and 5,929 cell towers in a major city of China. We reveal intensive spatiotemporal dependency even among distant cell towers, which is largely overlooked in …


Review Of Web Technology: Theory And Practice, By Akshi Kumar., Michael Knee Mar 2019

Review Of Web Technology: Theory And Practice, By Akshi Kumar., Michael Knee

University Libraries Faculty Scholarship

This is a review of the book Web Technology: Theory and Practice, by Akshi Kumar


Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj Feb 2019

Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj

International Journal of Business and Technology

With the rapid increase demand for data usage, Internet has become complex and harder to analyze. Characterizing the Internet traffic might reveal information that are important for Network Operators to formulate policy decisions, develop techniques to detect network anomalies, help better provision network resources (capacity, buffers) and use workload characteristics for simulations (typical packet sizes, flow durations, common protocols).

In this paper, using passive monitoring and measurements, we show collected data traffic at Internet backbone routers. First, we reveal main observations on patterns and characteristics of this dataset including packet sizes, traffic volume for inter and intra domain and protocol …


Web-Based Medical Data Visualization And Information Sharing Towards Application In Distributed Diagnosis, Qi Zhang Jan 2019

Web-Based Medical Data Visualization And Information Sharing Towards Application In Distributed Diagnosis, Qi Zhang

Faculty Publications - Information Technology

Network based medical data computing and collaborative visualization have been commonly used in remote medicine and distributed diagnosis, where visualizing 3D medical data on web browsers and sharing medical information on internet are critically important. However, due to the lack of efficient algorithms and compatible graphics hardware support, there are still some major technical challenges in web based medical data visualization and information exploration on internet. To address these practical issues, we created a new network based medical data rendering and information sharing system, where an Apache HTTP Server was applied to handle data information, and MySQL and PHP were …


A Legal Perspective On The Trials And Tribulations Of Ai: How Artificial Intelligence, The Internet Of Things, Smart Contracts, And Other Technologies Will Affect The Law, Iria Giuffrida, Fredric Lederer, Nicolas Vermeys Apr 2018

A Legal Perspective On The Trials And Tribulations Of Ai: How Artificial Intelligence, The Internet Of Things, Smart Contracts, And Other Technologies Will Affect The Law, Iria Giuffrida, Fredric Lederer, Nicolas Vermeys

Faculty Publications

No abstract provided.


Internet Enabled Remote Driving Of A Combat Hybrid Electric Power System For Duty Cycle Measurement, Jarrett Goodell, Marc Compere, Wilford Smith, Mark Brudnak, Mike Pozolo, Et Al. Feb 2018

Internet Enabled Remote Driving Of A Combat Hybrid Electric Power System For Duty Cycle Measurement, Jarrett Goodell, Marc Compere, Wilford Smith, Mark Brudnak, Mike Pozolo, Et Al.

Marc Compere

This paper describes a human-in-the-loop motion-based simulator interfaced to hybrid-electric power system hardware, both of which were used to measure the duty cycle of a combat vehicle in a virtual simulation environment. The project discussed is a greatly expanded follow-on to the experiment published in [1,7]. This paper is written in the context of [1,7] and therefore highlights the enhancements. The most prominent of these enhancements is the integration (in real-time) of the Power & Energy System Integration Lab (P&E SIL) with a motion base simulator by means of a “long haul” connection over the Internet (a geographical distance of …


Measuring Decentralization Of Chinese Censorship In Three Industry Segments, Jeffrey Knockel Jan 2018

Measuring Decentralization Of Chinese Censorship In Three Industry Segments, Jeffrey Knockel

Computer Science ETDs

What is forbidden to talk about using Chinese apps? Companies operating in China face a complex array of regulations and are liable for content voiced using their platforms. Previous work studying Chinese censorship uses (1) sample testing or (2) measures content deletion; however, these techniques produce an incomplete picture biased toward (1) the tested samples or (2) whichever topics were trending.

In this dissertation, I use reverse engineering to study the code that applications use to determine whether to censor content. In doing so, I can provide a more complete and unbiased view of Chinese Internet censorship. I reverse engineer …