Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Physical Sciences and Mathematics

An Approach To Information Security For Smes Based On The Resource-Based View Theory, Blerton Abazi Oct 2017

An Approach To Information Security For Smes Based On The Resource-Based View Theory, Blerton Abazi

UBT International Conference

The main focus of this proposal is to analyze implementation challenges, benefits and requirements in implementation of Information Systems and managing information security in small and medium size companies in Western Balkans countries. In relation to the study, the proposal will focus in the following questions to investigate: What are the benefits that companies mostly find after the implementation of Information Systems has been implemented, efficiency, how to they manage security of the information’s, competitive advantage, return of investments etc. The study should give a clear approach to Information Systems implementation, information security, maintenance, measurable benefits, challenges companies have gone …


Computer Science: Application Of Technology/Iot In Hydropower Dams, Orjola Jaupi Oct 2017

Computer Science: Application Of Technology/Iot In Hydropower Dams, Orjola Jaupi

UBT International Conference

As time passes by, we barely see how much time it costs people to stay at work, fixing problems that happen every day. As people we should do more about humanity and technology is the door that opens opportunities for us to do this. Technology today is transforming every human daily life routine and it’s only the beginning of what technology can bring. By 2020 we know that technology will connect the unconnected by introducing the real idea of Internet of Things. Every little, tiny thing all over the world will be connected, but also big and important projects like …


Public Security & Digital Forensics In The United States: The Continued Need For Expanded Digital Systems For Security, Deborah G. Keeling, Michael Losavio Sep 2017

Public Security & Digital Forensics In The United States: The Continued Need For Expanded Digital Systems For Security, Deborah G. Keeling, Michael Losavio

Journal of Digital Forensics, Security and Law

Digital Forensics is one of the latest challenges for the use of forensics in the investigative process in the United States. Some of the challenges are created by conditions and circumstances present for law enforcement around the world. However, many are unique to the United States and created by the standards of evidence within our courts, nature of our law enforcement organizations, and structure of our judicial and prosecutorial systems. It is essential for the preservation of public security and individual safety that competent systems of digital forensics are developed for law enforcement at all levels. The failure to do …


Computer Vision Based Route Mapping, Ryan S. Kehlenbeck, Zachary Cody Jun 2017

Computer Vision Based Route Mapping, Ryan S. Kehlenbeck, Zachary Cody

Computer Science and Software Engineering

The problem our project solves is the integration of edge detection techniques with mapping libraries to display routes based on images. To do this, we used the OpenCV library within an Android application. This application lets a user import an image from their device, and uses edge detection to pull out a path from the image. The application can find the user's location and uses it alongside the path data from the image to create a route using the physical roads near the location. The shape of the route matches the edges from the given image and the user can …


Investigating Trust And Trust Recovery In Human-Robot Interactions, Abigail L. Thomson May 2017

Investigating Trust And Trust Recovery In Human-Robot Interactions, Abigail L. Thomson

Celebration of Learning

As artificial intelligence and robotics continue to advance and be used in increasingly different functions and situations, it is important to look at how these new technologies will be used. An important factor in how a new resource will be used is how much it is trusted. This experiment was conducted to examine people’s trust in a robotic assistant when completing a task, how mistakes affect this trust, and if the levels of trust exhibited with a robot assistant were significantly different than if the assistant were human. The task was to watch a computer simulation of the three-cup monte …


Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews May 2017

Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews

All Faculty Scholarship

What type of information is collected, who is viewing it, and what law librarians can do to protect their patrons and institutions.


Glhf: A Brief Overview Of Gaming Cafes, John Sun May 2017

Glhf: A Brief Overview Of Gaming Cafes, John Sun

ART 108: Introduction to Games Studies

My paper is on the history of internet and gaming cafes, focusing on how they are seen today, the problems they face and some potential solutions. Although my focus is on gaming cafes in America, because they are so popular overseas in Asian countries (such as South Korea, China, and Japan), they inevitably come up more often in my paper and presentation.


Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews Apr 2017

Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews

Lori B. Andrews

What type of information is collected, who is viewing it, and what law librarians can do to protect their patrons and institutions.


Hiding In Plain Sight: Identifying Computational Thinking In The Ontario Elementary School Curriculum, Eden J.V. Hennessey, Julie Mueller, Danielle Beckett, Peter A. Fisher Apr 2017

Hiding In Plain Sight: Identifying Computational Thinking In The Ontario Elementary School Curriculum, Eden J.V. Hennessey, Julie Mueller, Danielle Beckett, Peter A. Fisher

Education Faculty Publications

Given a growing digital economy with complex problems, demands are being made for education to address computational thinking (CT) – an approach to problem solving that draws on the tenets of computer science. We conducted a comprehensive content analysis of the Ontario elementary school curriculum documents for 44 CT-related terms to examine the extent to which CT may already be considered within the curriculum. The quantitative analysis strategy provided frequencies of terms, and a qualitative analysis provided information about how and where terms were being used. As predicted, results showed that while CT terms appeared mostly in Mathematics, and concepts …


Work Integrated Learning In Stem In Australian Universities: Final Report: Submitted To The Office Of The Chief Scientist, Daniel Edwards, Kate Perkins, Jacob Pearce, Jennifer Hong Feb 2017

Work Integrated Learning In Stem In Australian Universities: Final Report: Submitted To The Office Of The Chief Scientist, Daniel Edwards, Kate Perkins, Jacob Pearce, Jennifer Hong

Kate Perkins

The Australian Council for Educational Research (ACER) undertook this study for the Office of the Chief Scientist (OCS). It explores the practice and application of Work Integrated Learning (WIL) in STEM, with a particular focus on natural and physical sciences, information technology, and agriculture departments in Australian universities. The project involved a detailed ‘stocktake’ of WIL in practice in these disciplines, with collection of information by interview, survey instruments, consultation with stakeholders and literature reviews. Every university in Australia was visited as part of this project, with interviews and consultation sessions gathering insight from more than 120 academics and support …


Robot Lives Matter?, Christopher Boolukos (Class Of 2017) Jan 2017

Robot Lives Matter?, Christopher Boolukos (Class Of 2017)

Writing Across the Curriculum

It’s 2016 and slavery is still a brutal reality around the world and a crime against humanity. The human race has never been shy when it comes to enslaving fellow human beings, so with progress in robotics and AI, we will soon be able to enslave robots to do our bidding. This poses a serious moral dilemma as to what rights such entities would possess and what responsibility we have, if any, on how we use them in society. Should it make any difference whether an entity is made of silicon or carbon, or whether its brain uses semi-conductors or …


Nursing Approaches For Use And Sustainability Of Barcode Medication Administration Technology, Jackson Ngigi Njeru Jan 2017

Nursing Approaches For Use And Sustainability Of Barcode Medication Administration Technology, Jackson Ngigi Njeru

Walden Dissertations and Doctoral Studies

Approximately 43.4% of medication errors occur at the time of administration despite the use of bar code medication administration (BCMA) System. This trend has prompted a national effort to mitigate this problem in the United States. Implementing BCMA in health care settings is one of those efforts. Studies focusing on the approaches employed by nurses when using this system are scant. The purpose of this qualitative case study was to investigate strategies nurses and their leaders use to ensure BCMA is implemented, maximized, and sustained. The technology acceptance model was used to guide the study. The 2 research questions addressed …


Information Communication Technology Management As A Gdp Growth Contributor Within Arab League Nations, Jamal Alexander Thompson Jan 2017

Information Communication Technology Management As A Gdp Growth Contributor Within Arab League Nations, Jamal Alexander Thompson

Walden Dissertations and Doctoral Studies

The general problem addressed in this study was Arab League nations' over-reliance on fossil fuels as a gross domestic product (GDP) growth driver. Arab League nations that depend primarily on fossil fuel production lack alternative resources for growth in times of fossil fuel usage or price decline. Overdependence on fossil fuels has led to minimal development in other economic sectors, primarily in skilled domestic labor, and to a high dependency on foreign skilled labor for skilled domestic jobs. The purpose of this study was to examine to what extent information communication technology (ICT) management can be a viable GDP growth …


Strategic Cyber-Risk Implications Of Cloud Technology Adoption In The U.S. Financial Services Sector, Olatunji Mujib Arowolo Jan 2017

Strategic Cyber-Risk Implications Of Cloud Technology Adoption In The U.S. Financial Services Sector, Olatunji Mujib Arowolo

Walden Dissertations and Doctoral Studies

According to research, the risks of adopting new technology and the technological and organizational factors that influence adopting it are not clear. Thus, many financial institutions have hesitated to adopt cloud-computing. The purpose of this quantitative, cross-sectional study was to evaluate the cyber-risk implications of cloud-computing adoption in the U.S. financial services sector. The study examined 6 technological and organizational factors: organization size, relative advantage, compliance, security, compatibility, and complexity within the context of cyber-risk. Using a combination of diffusion of innovation theory and technology-organization-environment framework as the foundation, a predictive cybersecurity model was developed to determine the factors that …


Cybersecurity Stovepiping, David Thaw Jan 2017

Cybersecurity Stovepiping, David Thaw

Articles

Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.

This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …


Irresistible Bargains: Navigating The Surveillance Society, Robert M. Pallitto Dec 2016

Irresistible Bargains: Navigating The Surveillance Society, Robert M. Pallitto

Robert M Pallitto

Agents in contemporary societies are faced continually with choices regarding engagement with technological artifacts. They can choose to engage or decline engagement after considering the costs and benefits in each case. However, certain aspects of the surveillance society may be irresistible in a number of ways, so that refusal to engage with them is not a realistic option. The proliferation of the Internet of Things (IoT), particularly as embedded in “smart city” initiatives, helps to make surveillance technologies potentially irresistible. After laying the conceptual groundwork for discussing irresistible bargains, this essay offers a two-part normative critique, focusing on the asymmetrical …