Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Physical Sciences and Mathematics

A University-Based Forensics Training Center As A Regional Outreach, Education, And Research Activity, Rayford B. Vaughn, David A. Dampier Oct 2019

A University-Based Forensics Training Center As A Regional Outreach, Education, And Research Activity, Rayford B. Vaughn, David A. Dampier

David Dampier

This paper describes a university-based Forensics Training Center (FTC) established by a Department of Justice grant for the purpose of improving the ability of state and local law enforcement in the Southeastern part of the United States to address the rising incidence of computer based crime. The FTC effort is described along with supporting evidence of its need. The program is not only a service activity, but also contributes to the Mississippi State University (MSU) security program pedagogy, and research effort.


Data, Analytics And Community-Based Organizations: Transforming Data To Decisions For Community Development, Michael P. Johnson Jr. Dec 2014

Data, Analytics And Community-Based Organizations: Transforming Data To Decisions For Community Development, Michael P. Johnson Jr.

Michael P. Johnson

The past ten years have seen a revolution in two disciplines related to operations and strategy design. “Big Data” has transformed the theory and practice of producing and selling goods and services through methods associated with computer science and information technology. “Analytics” has popularized primarily quantitative models and methods by which organizations and systems can measure multiple aspects of performance. As these fields rely on information technology to collect, store, process and share data, we refer to the collection of knowledge and applications associated with Big Data and analytics as “data analytics and information technology.” The impacts of data analytics …


A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade Jun 2014

A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade

Sherri Shade

Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine …


Using Information Technology Strategically In Home Care, Jerry A. Benson, Jeffrey E. Michelman, Doreen Radjenovic Jan 2012

Using Information Technology Strategically In Home Care, Jerry A. Benson, Jeffrey E. Michelman, Doreen Radjenovic

Jeffrey E Michelman

As home healthcare agencies examine new and innovative ways to deliver quality care more efficiently, the historical role of information technology as a way to automate clerical tasks will be significantly broadened to facilitate the true value of technology to home care providers. More importantly, a reduction in time spent on paperwork will allow agency caregivers to spend more time with clients. This article looks beyond the boundaries of desktop computing and examines the costs and benefits of network computing to develop strategic advantages for home healthcare agencies.


Understanding The Need And Importance Of The Cloud Computing Environment Within The National Institute Of Food And Agriculture, An Agency Of The United States Department Of Agriculture, Festus Onyegbula, Maurice Dawson, Jeffrey Stevens Dec 2010

Understanding The Need And Importance Of The Cloud Computing Environment Within The National Institute Of Food And Agriculture, An Agency Of The United States Department Of Agriculture, Festus Onyegbula, Maurice Dawson, Jeffrey Stevens

Maurice Dawson

Aligning information systems to corporate goals has emerged as a leading concern over the last couple of decades. It is essential that we understand the need for cloud computing and how this technology can be implemented. Through this literature review we review theories of cloud computing and further elaborate on the theoretical framework for the implementation of cloud computing technology across organizations. We also detail cloud computing implementations across various governmental organizations and also across the industry. This review is expected to provide the current study with a more practical perspective on the issues and complexities of using cloud computing …


From Dataveillance To Überveillance (Uberveillance) And The Realpolitik Of The Transparent Society, K. Michael, M. G. Michael Oct 2007

From Dataveillance To Überveillance (Uberveillance) And The Realpolitik Of The Transparent Society, K. Michael, M. G. Michael

Professor Katina Michael

The 2007 Workshop on the Social Implications of National Security: from Dataveillance to Überveillance and the Realpolitik of the Transparent Society was organised by the Research Network for a Secure Australia (RNSA) funded by the Australian Research Council. The Workshop will become a biennial event bringing together both researchers and practitioners in the fields relating to the national research priority entitled Safeguarding Australia. In 2007, the workshop was held on the 29th October, at the Function Centre at the University of Wollongong between 8.30 am and 5.00 pm.

The Workshop was organised by RNSA members from the IP Location-Based Services …


From Dataveillance To Überveillance (Uberveillance) And The Realpolitik Of The Transparent Society, K. Michael, M. G. Michael Oct 2007

From Dataveillance To Überveillance (Uberveillance) And The Realpolitik Of The Transparent Society, K. Michael, M. G. Michael

M. G. Michael

The 2007 Workshop on the Social Implications of National Security: from Dataveillance to Überveillance and the Realpolitik of the Transparent Society was organised by the Research Network for a Secure Australia (RNSA) funded by the Australian Research Council. The Workshop will become a biennial event bringing together both researchers and practitioners in the fields relating to the national research priority entitled Safeguarding Australia. In 2007, the workshop was held on the 29th October, at the Function Centre at the University of Wollongong between 8.30 am and 5.00 pm.

The Workshop was organised by RNSA members from the IP Location-Based Services …


Computer Skills, Gender, And Technostress In Higher Education, Sonya Shepherd Dec 2005

Computer Skills, Gender, And Technostress In Higher Education, Sonya Shepherd

Sonya S. Gaither

The creation of computer software and hardware, telecommunications, databases, and the Internet has affected society as a whole, and particularly higher education by giving people new productivity options and changing the way they work (Hulbert, 1998). In the so-called “information age” the increasing use of technology has become the driving force in the way people work, learn, and play (Drake, 2000). As this force evolves, the people using technology change also (Nelson, 1990). Adapting to technology is not simple. Some people tend to embrace change while others resist change (Wolski & Jackson, 1999). Before making a decision on whether to …