Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Physical Sciences and Mathematics

Extended Functionalities For Automating Comic Book Pull Files, Jackson Cunningham Dec 2020

Extended Functionalities For Automating Comic Book Pull Files, Jackson Cunningham

Theses/Capstones/Creative Projects

This Honors Thesis project involves programming additional features for a Java application developed as a team for the UNO Computer Science Capstone Project. The purpose of this Capstone project was to develop an updated Pull File system for Dragon’s Lair Comics & Games, which has been running an outdated system in need of improvement. The pull file is an organizational system used by customers to reserve new issues of specific on-going comic book series as they are released. The comic book store can use a pull file system to maintain records of customers, store inventory, and order requests, gaining important …


Politeness In Security Directives: Insights In Browser Compliance For The Human Element, Deanna House, Gabe Giordano Dec 2020

Politeness In Security Directives: Insights In Browser Compliance For The Human Element, Deanna House, Gabe Giordano

Information Systems and Quantitative Analysis Faculty Publications

The technical protection provided by information security technology is necessary as a frontline defense against threats. However, the human element adds great risk to systems and cannot be ignored. This research explores the human elements related to security communications and intention to comply with security directives. Security communications are more-commonly being sent using richer computer-based channels. While the goal of security communications is the gain compliance, there is still much to learn related to what influences a user to comply. This research explores the effects that (im)politeness has on intention to comply with security directives. The research utilized an experiment …


A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jason A. Mouloud Oct 2020

A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jason A. Mouloud

Computer Science Faculty Publications

The privacy of users and information are becoming increasingly important with the growth and pervasive use of mobile devices such as wearables, mobile phones, drones, and Internet of Things (IoT) devices. Today many of these mobile devices are equipped with cameras which enable users to take pictures and record videos anytime they need to do so. In many such cases, bystanders’ privacy is not a concern, and as a result, audio and video of bystanders are often captured without their consent. We present results from a user study in which 21 participants were asked to use a wearable system called …


Cyber Supply Chain Risk Management: Toward An Understanding Of The Antecedents To Demand For Assurance, Clark Hampton, Steve G. Sutton, Vicky Arnold, Deepak Khazanchi Oct 2020

Cyber Supply Chain Risk Management: Toward An Understanding Of The Antecedents To Demand For Assurance, Clark Hampton, Steve G. Sutton, Vicky Arnold, Deepak Khazanchi

Information Systems and Quantitative Analysis Faculty Publications

Recognizing the need for effective cyber risk management processes across the supply chain, the AICPA issued a new SOC in March 2020 for assuring cyber supply chain risk management (C-SCRM) processes. This study examines supply chain relationship factors and cyber risk issues to better understand the demand for C-SCRM assurance. Resource-Advantage Theory of Competition provides the conceptual foundation for assessing the dual drivers of relationship building and cyber risk management on demand for assurance. We use a field survey to collect data from 205 professionals enabling evaluation of the complex relationships in the theoretical model. Results support all hypotheses, provide …


Effect Of Implementing Subgoals In Code.Org's Intro To Programming Unit In Computer Science Principles, Lauren E. Margulieux, Briana Baker Morrison, Baker Franke, Hari Ramilison Oct 2020

Effect Of Implementing Subgoals In Code.Org's Intro To Programming Unit In Computer Science Principles, Lauren E. Margulieux, Briana Baker Morrison, Baker Franke, Hari Ramilison

Computer Science Faculty Publications

The subgoal learning framework has improved performance for novice programmers in higher education, but it has only started to be applied and studied in K-12 (primary/secondary). Programming education in K-12 is growing, and many international initiatives are attempting to increase participation, including curricular initiatives like Computer Science Principles and non-profit organizations like Code.org. Given that subgoal learning is designed to help students with no prior knowledge, we designed and implemented subgoals in the introduction to programming unit in Code.org's Computer Science Principles course. The redesigned unit includes subgoal-oriented instruction and subgoal-themed pre-written comments that students could add to their programming …


Prototypical Career Paths In Urban, Suburban, And Rural Locations In The United States, Tenace Kwaku Setor, Damien Joseph Jun 2020

Prototypical Career Paths In Urban, Suburban, And Rural Locations In The United States, Tenace Kwaku Setor, Damien Joseph

Information Systems and Quantitative Analysis Faculty Publications

Career paths are formed over time from interactions between individuals, organizations, and labor markets within and across geographic locations. What are the prototypical career paths thus formed? Who are the likely incumbents of these career paths? What are the consequences of pursuing these career paths? This study combines micro-level perspectives on personal agency and macro-level institutional factors to explain how careers unfold over time and space. The juxtaposition of micro- and macro-level factors contributes to career research and practice, which have traditionally examined careers as movements across organizations and occupations over time, but almost exclusively within specific geographic locations. We …


When Agile Means Staying: A Moderated Mediated Model, Tenace Kwaku Setor May 2020

When Agile Means Staying: A Moderated Mediated Model, Tenace Kwaku Setor

Information Systems and Quantitative Analysis Faculty Publications

The design of software development methods focuses on improving task processes, including accommodating changing user requirements and accelerating product delivery. However, there is limited research on how the use of different software development methods impacts IT professionals’ perceptions of organizational mobility. Drawing on concepts from the agile development literature and job characteristics theory, we formulate a moderated mediation model explicating the mechanism and the condition under which agile development use exerts an influence on IT professionals’ intention to stay with their current employer. Specifically, we examine job satisfaction as mediating the effect of using agile development on the intention to …


Reducing Withdrawal And Failure Rates In Introductory Programming With Subgoal Labeled Worked Examples, Lauren E. Margulieux, Briana B. Morrison, Adrienne Decker May 2020

Reducing Withdrawal And Failure Rates In Introductory Programming With Subgoal Labeled Worked Examples, Lauren E. Margulieux, Briana B. Morrison, Adrienne Decker

Computer Science Faculty Publications

Background

Programming a computer is an increasingly valuable skill, but dropout and failure rates in introductory programming courses are regularly as high as 50%. Like many fields, programming requires students to learn complex problem-solving procedures from instructors who tend to have tacit knowledge about low-level procedures that they have automatized. The subgoal learning framework has been used in programming and other fields to breakdown procedural problem solving into smaller pieces that novices can grasp more easily, but it has only been used in short-term interventions. In this study, the subgoal learning framework was implemented throughout a semester-long introductory programming course …


Comparative Analysis Of Metabolic Pathways Of Bacteria Used In Fermented Food, Keanu Hoang, Kiran Bastola May 2020

Comparative Analysis Of Metabolic Pathways Of Bacteria Used In Fermented Food, Keanu Hoang, Kiran Bastola

Theses/Capstones/Creative Projects

This study presents a novel methodology for analyzing metabolic pathways. Utilizing KEGG REST API through a Biopython package and file parser, data about whether or not a bacteria has an enzyme or not was extracted. The results found that differences in metabolic pathway enrichment values follow along the lines of genera and pathway type. In particular, bacteria found in food spoilage and commercial nitrogen fixing products had high values of enrichment.


A Semi-Automated Technique For Transcribing Accurate Crowd Motions, Alexander Fuchsberger, Brian Ricks, Zhicheng Chen Apr 2020

A Semi-Automated Technique For Transcribing Accurate Crowd Motions, Alexander Fuchsberger, Brian Ricks, Zhicheng Chen

Computer Science Faculty Publications

We present a novel technique for transcribing crowds in video scenes that allows extracting the positions of moving objects in video frames. The technique can be used as a more precise alternative to image processing methods, such as background-removal or automated pedestrian detection based on feature extraction and classification. By manually projecting pedestrian actors on a two-dimensional plane and translating screen coordinates to absolute real-world positions using the cross ratio, we provide highly accurate and complete results at the cost of increased processing time. We are able to completely avoid most errors found in other automated annotation techniques, resulting from …


The 10th Annual Computer Science Workshop, Submissions, Abstract Template, Computer Science Department Apr 2020

The 10th Annual Computer Science Workshop, Submissions, Abstract Template, Computer Science Department

Computer Science Faculty Proceedings & Presentations

This is the abstract template for the 10th Annual Computer Science Graduate Research Workshop (2020). To learn more about this workshop, please visit: https://digitalcommons.unomaha.edu/csworkshop/2020/.


Encryption Decrypted, Alex Ramsey Mar 2020

Encryption Decrypted, Alex Ramsey

UNO Student Research and Creative Activity Fair

Encryption is a complex and bewildering process, yet it is absolutely foundational for secure and safe activities on the internet. Encryption, in its many forms, ultimately enables identity verification, password protection, secure conversation, cryptocurrency trade, and other online activities. Despite this widespread use, encryption is not a process easily explained to the layperson due to its complexity. Thus, the object of this research is to demystify the process of encryption and provide an understanding of one of the most common forms of modern encryption - RSA Encryption. This will be accomplished through the information provided on my poster as well …


Automated Tool Support - Repairing Security Bugs In Mobile Applications, Larry Singleton Mar 2020

Automated Tool Support - Repairing Security Bugs In Mobile Applications, Larry Singleton

UNO Student Research and Creative Activity Fair

Cryptography is often a critical component in secure software systems. Cryptographic primitive misuses often cause several vulnerability issues. To secure data and communications in applications, developers often rely on cryptographic algorithms and APIs which provide confidentiality, integrity, and authentication based on solid mathematical foundations. While many advanced crypto algorithms are available to developers, the correct usage of these APIs is challenging. Turning mathematical equations in crypto algorithms into an application is a difficult task. A mistake in cryptographic implementations can subvert the security of the entire system. In this research, we present an automated approach for Finding and Repairing Bugs …


A Cost Analysis Of Internet Of Things Sensor Data Storage On Blockchain Via Smart Contracts, Yesem Kurt Peker, Xavier Rodriguez, James Ericsson, Suk Jin Lee, Alfredo J. Perez Feb 2020

A Cost Analysis Of Internet Of Things Sensor Data Storage On Blockchain Via Smart Contracts, Yesem Kurt Peker, Xavier Rodriguez, James Ericsson, Suk Jin Lee, Alfredo J. Perez

Computer Science Faculty Publications

Blockchain is a developing technology that can be utilized for secure data storage and sharing. In this work, we examine the cost of Blockchain-based data storage for constrained Internet of Things (IoT) devices. We had two phases in the study. In the first phase, we stored data retrieved from a temperature/humidity sensor connected to an Ethereum testnet blockchain using smart contracts in two different ways: first, appending the new data to the existing data, storing all sensor data; and second, overwriting the new data onto the existing data, storing only a recent portion of the data. In the second phase, …


Icedge: When Edge Computing Meets Information-Centric Networking, Spyridon Mastorakis, Abderrahmen Mtibaa, Jonathan Lee, Satyajayant Misra Jan 2020

Icedge: When Edge Computing Meets Information-Centric Networking, Spyridon Mastorakis, Abderrahmen Mtibaa, Jonathan Lee, Satyajayant Misra

Computer Science Faculty Publications

In today’s era of explosion of Internet of Things (IoT) and end-user devices and their data volume, emanating at the network’s edge, the network should be more in-tune with meeting the needs of these demanding edge computing applications. To this end, we design and prototype Information-Centric edge (ICedge), a general-purpose networking framework that streamlines service invocation and improves reuse of redundant computation at the edge. ICedge runs on top of Named-Data Networking, a realization of the Information-Centric Networking vision, and handles the “low-level” network communication on behalf of applications. ICedge features a fully distributed design that: (i) enables users to …


The Curious Case Of Loops, Briana B. Morrison, Lauren E. Margulieux, Adrienne Decker Jan 2020

The Curious Case Of Loops, Briana B. Morrison, Lauren E. Margulieux, Adrienne Decker

Computer Science Faculty Publications

Background and Context

Subgoal labeled worked examples have been extensively researched, but the research has been reported piecemeal. This paper aggregates data from three studies, including data previously unreported, to holistically examine the effect of subgoal labeled worked examples across three student populations and across different instructional designs.

Objective

By aggregating the data, we provide more statistical power for somewhat surprising yet replicable results. We discuss which results generalize across populations, focusing on a stable effect size for subgoal labels in programming instruction.

Method

We use descriptive and inferential statistics to examine the data collected from different student populations and …


Application Of The Benford’S Law To Social Bots And Information Operations Activities, Lale Madahali, Margeret Hall Jan 2020

Application Of The Benford’S Law To Social Bots And Information Operations Activities, Lale Madahali, Margeret Hall

Interdisciplinary Informatics Faculty Proceedings & Presentations

Benford's law shows the pattern of behavior in normal systems. It states that in natural systems digits' frequency have a certain pattern such that the occurrence of first digits in numbers are unevenly distributed. In systems with natural behavior, numbers begin with a “1” are more common than numbers beginning with “9”. It implies that if the distribution of first digits deviate from the expected distribution, it is indicative of fraud. It has many applications in forensic accounting, stock markets, finding abnormal data in survey data, and natural science. We investigate whether social media bots and Information Operations activities are …