Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Physical Sciences and Mathematics

Comparing Security Self-Efficacy Amongst College Freshmen And Senior, Female And Male Cybersecurity Students, Lane H. Melton Aug 2019

Comparing Security Self-Efficacy Amongst College Freshmen And Senior, Female And Male Cybersecurity Students, Lane H. Melton

Doctoral Dissertations and Projects

This study sought to determine if there was a difference in the self-efficacy of freshman and senior, female and male Cybersecurity students relating to threats associated with various information systems. The design for this quantitative study was non-experimental, causal-comparative and known as group comparison used to determine if there was a causal relationship between variables. The method used to make that determination utilized a self-efficacy survey developed by Phelps (2005), to identify the independent variables specific level of self-efficacy. Research was conducted at a small, southern university with total of 33 participants. Each student was enrolled in the Computer Science …


Social Engineering: How U.S. Businesses Strengthen The Weakest Link Against Cybersecurity Threats, Lily J. Pharris Aug 2019

Social Engineering: How U.S. Businesses Strengthen The Weakest Link Against Cybersecurity Threats, Lily J. Pharris

Doctoral Dissertations and Projects

The purpose of this transcendental phenomenological qualitative study was to investigate how IS professionals working in U.S. businesses make sense of their lives and experiences as they address and prevent vulnerabilities to social engineering attacks. This larger problem was explored through an in-depth study of social engineering and its effect on IS professionals working in U.S. businesses operating within healthcare, financial services, and educational industries across the central and northwest regions of Louisiana. Through its use of a phenomenological research design, the study bridged a gap in the social engineering literature, which was primarily comprised of studies that utilized a …


The Impact Of Leadership Style On The Adoption Of Agile Software Development: A Correlational Study, Mike Kipreos Aug 2019

The Impact Of Leadership Style On The Adoption Of Agile Software Development: A Correlational Study, Mike Kipreos

Doctoral Dissertations and Projects

Public and private organizations continue to rely prohibitively on classic software development methodologies such as the waterfall. Private industry more so than the public sector has shown evidence for a higher rate of success when using agile software development methods. Consequently, the purpose of this quantitative correlation study was to examine variables that best predict the adoption of agile methodologies in software development. The study made use of the UTAUT and MLQ–5X surveys. The primary variable under study was leadership style. Secondary variables included: performance expectancy, effort expectancy, social influence, and facilitating factors. A pilot study (N = 30) was …


Securing Our Future Homes: Smart Home Security Issues And Solutions, Nicholas Romano Apr 2019

Securing Our Future Homes: Smart Home Security Issues And Solutions, Nicholas Romano

Senior Honors Theses

The Internet of Things, commonly known as IoT, is a new technology transforming businesses, individuals’ daily lives and the operation of entire countries. With more and more devices becoming equipped with IoT technology, smart homes are becoming increasingly popular. The components that make up a smart home are at risk for different types of attacks; therefore, security engineers are developing solutions to current problems and are predicting future types of attacks. This paper will analyze IoT smart home components, explain current security risks, and suggest possible solutions. According to “What is a Smart Home” (n.d.), a smart home is a …


Computational Contributions To The Automation Of Agriculture, Micah Nagel Apr 2019

Computational Contributions To The Automation Of Agriculture, Micah Nagel

Senior Honors Theses

The purpose of this paper is to explore ways that computational advancements have enabled the complete automation of agriculture from start to finish. With a major need for agricultural advancements because of food and water shortages, some farmers have begun creating their own solutions to these problems. Primarily explored in this paper, however, are current research topics in the automation of agriculture. Digital agriculture is surveyed, focusing on ways that data collection can be beneficial. Additionally, self-driving technology is explored with emphasis on farming applications. Machine vision technology is also detailed, with specific application to weed management and harvesting of …


Trends In Women’S Participation In Computer Industry Subfields, Tristyn Maalouf Feb 2019

Trends In Women’S Participation In Computer Industry Subfields, Tristyn Maalouf

The Kabod

The participation of women in specific subfields of computer science (CS) and information technology (IT) will be investigated to determine the existence of any trends that may exist indicating special interest amongst women. Specifically, the subfield of database administration will be considered to determine if women tend to enter this subfield more frequently than other subfields. Research will also acknowledge statistics regarding male participation in database administration and other relevant subfields to determine if any trends in women’s participation are unique to women or if they exist across the board. Conclusions will be drawn based on the data and any …


Optimaztion Of Fantasy Basketball Lineups Via Machine Learning, James Earl Jan 2019

Optimaztion Of Fantasy Basketball Lineups Via Machine Learning, James Earl

Senior Honors Theses

Machine learning is providing a way to glean never before known insights from the data that gets recorded every day. This paper examines the application of machine learning to the novel field of Daily Fantasy Basketball. The particularities of the fantasy basketball ruleset and playstyle are discussed, and then the results of a data science case study are reviewed. The data set consists of player performance statistics as well as Fantasy Points, implied team total, DvP, and player status. The end goal is to evaluate how accurately the computer can predict a player’s fantasy performance based off a chosen feature …