Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Cybersecurity (2)
- Cyberterrorism (2)
- Al Qaeda (1)
- Anonymity (1)
- Bryant-Smith Aggression Scale (1)
-
- Computer hacking (1)
- Cyber-resources (1)
- Cyber-technologies (1)
- Cyberbullying (1)
- Cybercrime (1)
- Cybercriminology (1)
- Deindividuation (1)
- Evaluation (1)
- Flaming (1)
- IJCIC (1)
- ISIS (1)
- Juvenile (1)
- Legitimate aggression (1)
- Multiple correspondence analysis (1)
- Propaganda (1)
- Self-control (1)
- Social bonding (1)
- Social networking sites (1)
- Threatening online (1)
- Welcoming remarks (1)
- Publication
- Publication Type
Articles 1 - 17 of 17
Full-Text Articles in Physical Sciences and Mathematics
Welcoming Remarks From The Ijcic Honorary Editor, Peter Grabosky
Welcoming Remarks From The Ijcic Honorary Editor, Peter Grabosky
International Journal of Cybersecurity Intelligence & Cybercrime
No abstract provided.
Juvenile Hackers: An Empirical Test Of Self-Control Theory And Social Bonding Theory, Sinchul Back, Sadhika Soor, Jennifer Laprade
Juvenile Hackers: An Empirical Test Of Self-Control Theory And Social Bonding Theory, Sinchul Back, Sadhika Soor, Jennifer Laprade
International Journal of Cybersecurity Intelligence & Cybercrime
In accordance with a similar growth in information technology, computer hacking has become a pervasive issue as a form of crime worldwide in recent years. Self-control theory and social bonding theory have frequently been employed to explain various types of crimes, but rarely to explore computer hacking. Drawing from Gottfredson and Hirschi’s (1990) self-control theory and Hirschi’s (1969) social bonding theory, the purpose of this study is to empirically examine the suitability of these two theories in explaining juvenile computer hacking offenses. The self-report survey data utilized for the present study was derived from middle school and high school students …
The Present And Future Of Cybercrime, Cyberterrorism, And Cybersecurity, Kyung-Shick Choi, Claire Seungeun Lee
The Present And Future Of Cybercrime, Cyberterrorism, And Cybersecurity, Kyung-Shick Choi, Claire Seungeun Lee
International Journal of Cybersecurity Intelligence & Cybercrime
Cybercriminology combines knowledge from criminology, psychology, sociology, computer science, and cybersecurity to provide an in-depth understanding of cybercrime. Cybercrime and cybersecurity are interconnected across many places, platforms, and actors. Cybercrime issues are continuously and expeditiously changing and developing, especially with the advent of new technologies. The International Journal of Cybersecurity Intelligence and Cybercrime (IJCIC) aims to contribute to the growing field of cybercriminology and cybersecurity. The IJCIC is eager to work with scholars, policy analysts, practitioners, and others to enhance theory, methods, and practice within cybercrime and cybersecurity at the regional, national, and international levels.
Spreading Propaganda In Cyberspace: Comparing Cyber-Resource Usage Of Al Qaeda And Isis, Kyung-Shick Choi, Claire Seungeun Lee, Robert Cadigan
Spreading Propaganda In Cyberspace: Comparing Cyber-Resource Usage Of Al Qaeda And Isis, Kyung-Shick Choi, Claire Seungeun Lee, Robert Cadigan
International Journal of Cybersecurity Intelligence & Cybercrime
Terrorists in cyberspace are increasingly utilizing social media to promote their ideologies, recruit new members, and justify terrorist attacks and actions. This study explores the ways in which types of social media, message contents, and motives for spreading propaganda take shape in cyberspace. In order to empirically test these relations, we created a dataset with annual terrorism reports from 2011 to 2016. In our global cyberterrorism dataset, we used and connected cyber-resources (Facebook, online forum, Twitter mentions, websites, and YouTube videos) and legal documents of individual cases that were mentioned in the reports. The results show that YouTube videos were …
Architecture Of Aggression In Cyberspace. Testing Cyber Aggression In Young Adults In Hungary, Katalin Parti, Tibor Kiss, Gergely Koplányi
Architecture Of Aggression In Cyberspace. Testing Cyber Aggression In Young Adults In Hungary, Katalin Parti, Tibor Kiss, Gergely Koplányi
International Journal of Cybersecurity Intelligence & Cybercrime
In order to test whether and how violence is exacerbated in online social networking sites, we utilized the BryantSmith Aggression Scale (Bryant & Smith, 2001), and included examples in the questionnaire offering solutions for 7 different hypothetical cases occurring online (Kiss, 2017). The questionnaire was sent to social work and law school students in Hungary. Prevalence and levels of aggression and its manifestation as violence online proved to be not more severe than in offline social relations. Law students were more aware than students of social work that online hostile acts are discrediting. Students of social work were significantly more …
An Argument For Interdisciplinary Programs In Cybersecurity, Dennis Giever
An Argument For Interdisciplinary Programs In Cybersecurity, Dennis Giever
International Journal of Cybersecurity Intelligence & Cybercrime
In this commentary Dr. Giever presents a compelling argument for interdisciplinary programs in cybersecurity at the university level. He argues that we no longer have the luxury of allowing barriers to exist between those tasked with IT security and those who provide physical security. He recommends that any security program take an “all possible paths” or “balanced approach” to the protection of assets within an organization. Students in computer science, criminal justice, business, human resources, and others should work collaboratively within education programs learning these necessary skills. A team effort is needed to accomplish the myriad of tasks necessary to …
On The Toughness Of Some Johnson Solids, Sean Koval
On The Toughness Of Some Johnson Solids, Sean Koval
Honors Program Theses and Projects
The Johnson solids are the 92 three-dimensional, convex solids (other than the Platonic and Archimedean solids) that can be formed with regular polygons. The purpose of this honor’s thesis work is to determine the toughness of some of the Johnson Solids and similar graphs. The Johnson solids can be broken up into classes of solids with certain characteristics. While there are only 92 Johnson solids in three dimensions, we can generate infinite classes of graphs in two dimensions with similar characteristics. We have identified some of these classes, studied the toughness of individual graphs and begun to analyze a few …
Exploring The Proportion Of Prime Numbers In Quadratic Extensions Of The Integers, Jamie Nelson
Exploring The Proportion Of Prime Numbers In Quadratic Extensions Of The Integers, Jamie Nelson
Honors Program Theses and Projects
No abstract provided.
The Restoration Of Unix: Emulating Unix Version 1.0 On A 16-Bit Dec Pdp 11/20, John J. Gilmore Jr.
The Restoration Of Unix: Emulating Unix Version 1.0 On A 16-Bit Dec Pdp 11/20, John J. Gilmore Jr.
Honors Program Theses and Projects
Next year, the one of the world’s first Operating Systems (OS) UNIX will celebrate its 50th birthday. This relic of the past is objectively one of the most important creations that has ever influenced the field of Computer Science. However, mysteries of this artifact were discovered in 1995. Two engineers, Paul Vixie and Keith Bostic, dug deep enough to find several DEC tapes “under the floor of the computer room [at Bell Labs]” (UNIX Past) which held several original binary files for UNIX. With much help from several individuals, these two engineers were able to reverse engineer the binary tapes …
Development Of A High-Throughput Screening Assay For Potential Inhibitors Against Dna Polymerase Eta, Keri Bryson
Development Of A High-Throughput Screening Assay For Potential Inhibitors Against Dna Polymerase Eta, Keri Bryson
Honors Program Theses and Projects
All living cells perform DNA replication through a group of enzymes called DNA polymerases. Unfortunately, DNA is constantly exposed to external and internal agents capable of causing damage. DNA damage causes blocks to replication that can be overcome through a special class of DNA polymerases, called the Y-family polymerases; which are able to traverse DNA lesions. Cisplatin is a common chemotherapeutic agent that damages DNA and has been used to treat cancer. However, many patients become resistant to cisplatin. The chemoresistance to cisplatin treatment is due in part to damage bypass performed by the specific Y-family polymerase, polymerase eta. The …
Exploring The Use Of Predictive Analytics In Banking And Finance Decision-Making, Melanie Tummino
Exploring The Use Of Predictive Analytics In Banking And Finance Decision-Making, Melanie Tummino
Honors Program Theses and Projects
Predictive analytics is a branch of advanced analytics that is composed of various statistical techniques where each contributes in making predictions about future scenarios and outcomes. Some of these techniques include machine learning, artificial intelligence, data mining, predictive modeling, logistic regression, etc., and the patterns found in the results can be used to identify risks and opportunity. Predictive analytics is often associated with meteorology and weather forecasting due to the fact there are many attributes to contribute to a response, but generally, it has many applications in existing growing or established businesses, especially when it comes to decision-making about revenue, …
Kinetic Studies On The Aqueous Chemistry Of The Glutathione-Methyleneoxindole Conjugate To Model Its Inhibition Of Glyoxalase I, Ariane Borges
Kinetic Studies On The Aqueous Chemistry Of The Glutathione-Methyleneoxindole Conjugate To Model Its Inhibition Of Glyoxalase I, Ariane Borges
Honors Program Theses and Projects
Glyoxalase I (GxI) is an enzyme that is part of the Glyoxalase system which is responsible for the conversion of methylglyoxal (MG), a byproduct of glycolysis, to lactic acid using glutathione (GSH) as a co-substrate. Methylglyoxal and GSH come together to form the hemithioacetal substrate, which is then transformed into (S)-D-lactoylglutathione. Since MG is a highly reactive compound known to induce cell apoptosis, increasing MG levels in cells by inhibiting GxI should increase cell death. Research into the design, synthesis and testing of different inhibitors of GxI support this hypothesis. We have designed and synthesized a potential inhibitor of GxI, …
Exploring Dynamical Systems: Number Of Cycle And Cycle Lengths, Christine Marcotte
Exploring Dynamical Systems: Number Of Cycle And Cycle Lengths, Christine Marcotte
Honors Program Theses and Projects
No abstract provided.
Rubik’S Cube: The Invisible Solve, Allen Charest
Rubik’S Cube: The Invisible Solve, Allen Charest
Honors Program Theses and Projects
The Rubik’s Cube is one of the most popular and recognizable puzzles ever made. In this research, we use group theory to identify and analyze the different solutions for the Rubik’s Cube and its variations. Since they cannot be seen on a standard Rubik’s Cube, these different solutions are called invisible solves. But by putting specialized labels on each of the center pieces of a Rubik’s Cube, we are able to track each of the invisible solves and see how they are different from one another. Dependent on the size of the Rubik’s Cube, the number of distinct invisible solves …
Finding Alien Worlds: Studying Exoplanets From Bridgewater State University, Maria Patrone
Finding Alien Worlds: Studying Exoplanets From Bridgewater State University, Maria Patrone
Honors Program Theses and Projects
The search for exoplanets, or planets orbiting other stars in our galaxy, has only been a field of study since the early 1990's and is currently a popular area of research among astrophysicists. With the launch of the Kepler Space telescope in 2009, there are over three thousand confirmed exoplanets, and over four thousand Kepler Objects of Interest (KOI's), which are possible exoplanet candidates. With so much data obtained from Kepler, NASA relies on ground based observatories to follow up and confirm KOI's as exoplanets or false positives. For the last three years I have been studying exoplanets at Bridgewater …
The Key To Cryptography: The Rsa Algorithm, Clifton Paul Robinson
The Key To Cryptography: The Rsa Algorithm, Clifton Paul Robinson
Honors Program Theses and Projects
Cryptography is the study of codes, as well as the art of writing and solving them. It has been a growing area of study for the past 40 years. Now that most information is sent and received through the internet, people need ways to protect what they send. Some of the most commonly used cryptosystems today include a public key. Some public keys are based around using two large, random prime numbers combined together to help encrypt messages.
The purpose of this project was to test the strength of the RSA cryptosystem public key. This public key is created by …
Web Development With Node.Js, Seikyung Jung
Web Development With Node.Js, Seikyung Jung
Computer Science Faculty Publications
This tutorial demonstrates how to teach a Web development course by building web applications with Node.js and Express then deploying to Heroku, a cloud hosting service. This tutorial assumes some familiarity with HTML and JavaScript, but no prior experience with Node.js is necessary. The tutorial covers all necessary setup and step-by-step instructions to build a sample web application with these technologies. The tutorial concludes by describing how to incorporate Node.js, PostgreSQL, Git and Heroku in a web development course, and my experiences with using it for the past two years.