Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Physical Sciences and Mathematics

Welcoming Remarks From The Ijcic Honorary Editor, Peter Grabosky Aug 2018

Welcoming Remarks From The Ijcic Honorary Editor, Peter Grabosky

International Journal of Cybersecurity Intelligence & Cybercrime

No abstract provided.


Juvenile Hackers: An Empirical Test Of Self-Control Theory And Social Bonding Theory, Sinchul Back, Sadhika Soor, Jennifer Laprade Aug 2018

Juvenile Hackers: An Empirical Test Of Self-Control Theory And Social Bonding Theory, Sinchul Back, Sadhika Soor, Jennifer Laprade

International Journal of Cybersecurity Intelligence & Cybercrime

In accordance with a similar growth in information technology, computer hacking has become a pervasive issue as a form of crime worldwide in recent years. Self-control theory and social bonding theory have frequently been employed to explain various types of crimes, but rarely to explore computer hacking. Drawing from Gottfredson and Hirschi’s (1990) self-control theory and Hirschi’s (1969) social bonding theory, the purpose of this study is to empirically examine the suitability of these two theories in explaining juvenile computer hacking offenses. The self-report survey data utilized for the present study was derived from middle school and high school students …


The Present And Future Of Cybercrime, Cyberterrorism, And Cybersecurity, Kyung-Shick Choi, Claire Seungeun Lee Aug 2018

The Present And Future Of Cybercrime, Cyberterrorism, And Cybersecurity, Kyung-Shick Choi, Claire Seungeun Lee

International Journal of Cybersecurity Intelligence & Cybercrime

Cybercriminology combines knowledge from criminology, psychology, sociology, computer science, and cybersecurity to provide an in-depth understanding of cybercrime. Cybercrime and cybersecurity are interconnected across many places, platforms, and actors. Cybercrime issues are continuously and expeditiously changing and developing, especially with the advent of new technologies. The International Journal of Cybersecurity Intelligence and Cybercrime (IJCIC) aims to contribute to the growing field of cybercriminology and cybersecurity. The IJCIC is eager to work with scholars, policy analysts, practitioners, and others to enhance theory, methods, and practice within cybercrime and cybersecurity at the regional, national, and international levels.


Spreading Propaganda In Cyberspace: Comparing Cyber-Resource Usage Of Al Qaeda And Isis, Kyung-Shick Choi, Claire Seungeun Lee, Robert Cadigan Aug 2018

Spreading Propaganda In Cyberspace: Comparing Cyber-Resource Usage Of Al Qaeda And Isis, Kyung-Shick Choi, Claire Seungeun Lee, Robert Cadigan

International Journal of Cybersecurity Intelligence & Cybercrime

Terrorists in cyberspace are increasingly utilizing social media to promote their ideologies, recruit new members, and justify terrorist attacks and actions. This study explores the ways in which types of social media, message contents, and motives for spreading propaganda take shape in cyberspace. In order to empirically test these relations, we created a dataset with annual terrorism reports from 2011 to 2016. In our global cyberterrorism dataset, we used and connected cyber-resources (Facebook, online forum, Twitter mentions, websites, and YouTube videos) and legal documents of individual cases that were mentioned in the reports. The results show that YouTube videos were …


Architecture Of Aggression In Cyberspace. Testing Cyber Aggression In Young Adults In Hungary, Katalin Parti, Tibor Kiss, Gergely Koplányi Aug 2018

Architecture Of Aggression In Cyberspace. Testing Cyber Aggression In Young Adults In Hungary, Katalin Parti, Tibor Kiss, Gergely Koplányi

International Journal of Cybersecurity Intelligence & Cybercrime

In order to test whether and how violence is exacerbated in online social networking sites, we utilized the BryantSmith Aggression Scale (Bryant & Smith, 2001), and included examples in the questionnaire offering solutions for 7 different hypothetical cases occurring online (Kiss, 2017). The questionnaire was sent to social work and law school students in Hungary. Prevalence and levels of aggression and its manifestation as violence online proved to be not more severe than in offline social relations. Law students were more aware than students of social work that online hostile acts are discrediting. Students of social work were significantly more …


An Argument For Interdisciplinary Programs In Cybersecurity, Dennis Giever Aug 2018

An Argument For Interdisciplinary Programs In Cybersecurity, Dennis Giever

International Journal of Cybersecurity Intelligence & Cybercrime

In this commentary Dr. Giever presents a compelling argument for interdisciplinary programs in cybersecurity at the university level. He argues that we no longer have the luxury of allowing barriers to exist between those tasked with IT security and those who provide physical security. He recommends that any security program take an “all possible paths” or “balanced approach” to the protection of assets within an organization. Students in computer science, criminal justice, business, human resources, and others should work collaboratively within education programs learning these necessary skills. A team effort is needed to accomplish the myriad of tasks necessary to …


On The Toughness Of Some Johnson Solids, Sean Koval May 2018

On The Toughness Of Some Johnson Solids, Sean Koval

Honors Program Theses and Projects

The Johnson solids are the 92 three-dimensional, convex solids (other than the Platonic and Archimedean solids) that can be formed with regular polygons. The purpose of this honor’s thesis work is to determine the toughness of some of the Johnson Solids and similar graphs. The Johnson solids can be broken up into classes of solids with certain characteristics. While there are only 92 Johnson solids in three dimensions, we can generate infinite classes of graphs in two dimensions with similar characteristics. We have identified some of these classes, studied the toughness of individual graphs and begun to analyze a few …


Exploring The Proportion Of Prime Numbers In Quadratic Extensions Of The Integers, Jamie Nelson May 2018

Exploring The Proportion Of Prime Numbers In Quadratic Extensions Of The Integers, Jamie Nelson

Honors Program Theses and Projects

No abstract provided.


The Restoration Of Unix: Emulating Unix Version 1.0 On A 16-Bit Dec Pdp 11/20, John J. Gilmore Jr. May 2018

The Restoration Of Unix: Emulating Unix Version 1.0 On A 16-Bit Dec Pdp 11/20, John J. Gilmore Jr.

Honors Program Theses and Projects

Next year, the one of the world’s first Operating Systems (OS) UNIX will celebrate its 50th birthday. This relic of the past is objectively one of the most important creations that has ever influenced the field of Computer Science. However, mysteries of this artifact were discovered in 1995. Two engineers, Paul Vixie and Keith Bostic, dug deep enough to find several DEC tapes “under the floor of the computer room [at Bell Labs]” (UNIX Past) which held several original binary files for UNIX. With much help from several individuals, these two engineers were able to reverse engineer the binary tapes …


Development Of A High-Throughput Screening Assay For Potential Inhibitors Against Dna Polymerase Eta, Keri Bryson May 2018

Development Of A High-Throughput Screening Assay For Potential Inhibitors Against Dna Polymerase Eta, Keri Bryson

Honors Program Theses and Projects

All living cells perform DNA replication through a group of enzymes called DNA polymerases. Unfortunately, DNA is constantly exposed to external and internal agents capable of causing damage. DNA damage causes blocks to replication that can be overcome through a special class of DNA polymerases, called the Y-family polymerases; which are able to traverse DNA lesions. Cisplatin is a common chemotherapeutic agent that damages DNA and has been used to treat cancer. However, many patients become resistant to cisplatin. The chemoresistance to cisplatin treatment is due in part to damage bypass performed by the specific Y-family polymerase, polymerase eta. The …


Exploring The Use Of Predictive Analytics In Banking And Finance Decision-Making, Melanie Tummino May 2018

Exploring The Use Of Predictive Analytics In Banking And Finance Decision-Making, Melanie Tummino

Honors Program Theses and Projects

Predictive analytics is a branch of advanced analytics that is composed of various statistical techniques where each contributes in making predictions about future scenarios and outcomes. Some of these techniques include machine learning, artificial intelligence, data mining, predictive modeling, logistic regression, etc., and the patterns found in the results can be used to identify risks and opportunity. Predictive analytics is often associated with meteorology and weather forecasting due to the fact there are many attributes to contribute to a response, but generally, it has many applications in existing growing or established businesses, especially when it comes to decision-making about revenue, …


Kinetic Studies On The Aqueous Chemistry Of The Glutathione-Methyleneoxindole Conjugate To Model Its Inhibition Of Glyoxalase I, Ariane Borges May 2018

Kinetic Studies On The Aqueous Chemistry Of The Glutathione-Methyleneoxindole Conjugate To Model Its Inhibition Of Glyoxalase I, Ariane Borges

Honors Program Theses and Projects

Glyoxalase I (GxI) is an enzyme that is part of the Glyoxalase system which is responsible for the conversion of methylglyoxal (MG), a byproduct of glycolysis, to lactic acid using glutathione (GSH) as a co-substrate. Methylglyoxal and GSH come together to form the hemithioacetal substrate, which is then transformed into (S)-D-lactoylglutathione. Since MG is a highly reactive compound known to induce cell apoptosis, increasing MG levels in cells by inhibiting GxI should increase cell death. Research into the design, synthesis and testing of different inhibitors of GxI support this hypothesis. We have designed and synthesized a potential inhibitor of GxI, …


Exploring Dynamical Systems: Number Of Cycle And Cycle Lengths, Christine Marcotte May 2018

Exploring Dynamical Systems: Number Of Cycle And Cycle Lengths, Christine Marcotte

Honors Program Theses and Projects

No abstract provided.


Rubik’S Cube: The Invisible Solve, Allen Charest May 2018

Rubik’S Cube: The Invisible Solve, Allen Charest

Honors Program Theses and Projects

The Rubik’s Cube is one of the most popular and recognizable puzzles ever made. In this research, we use group theory to identify and analyze the different solutions for the Rubik’s Cube and its variations. Since they cannot be seen on a standard Rubik’s Cube, these different solutions are called invisible solves. But by putting specialized labels on each of the center pieces of a Rubik’s Cube, we are able to track each of the invisible solves and see how they are different from one another. Dependent on the size of the Rubik’s Cube, the number of distinct invisible solves …


Finding Alien Worlds: Studying Exoplanets From Bridgewater State University, Maria Patrone May 2018

Finding Alien Worlds: Studying Exoplanets From Bridgewater State University, Maria Patrone

Honors Program Theses and Projects

The search for exoplanets, or planets orbiting other stars in our galaxy, has only been a field of study since the early 1990's and is currently a popular area of research among astrophysicists. With the launch of the Kepler Space telescope in 2009, there are over three thousand confirmed exoplanets, and over four thousand Kepler Objects of Interest (KOI's), which are possible exoplanet candidates. With so much data obtained from Kepler, NASA relies on ground based observatories to follow up and confirm KOI's as exoplanets or false positives. For the last three years I have been studying exoplanets at Bridgewater …


The Key To Cryptography: The Rsa Algorithm, Clifton Paul Robinson May 2018

The Key To Cryptography: The Rsa Algorithm, Clifton Paul Robinson

Honors Program Theses and Projects

Cryptography is the study of codes, as well as the art of writing and solving them. It has been a growing area of study for the past 40 years. Now that most information is sent and received through the internet, people need ways to protect what they send. Some of the most commonly used cryptosystems today include a public key. Some public keys are based around using two large, random prime numbers combined together to help encrypt messages.

The purpose of this project was to test the strength of the RSA cryptosystem public key. This public key is created by …


Web Development With Node.Js, Seikyung Jung Jan 2018

Web Development With Node.Js, Seikyung Jung

Computer Science Faculty Publications

This tutorial demonstrates how to teach a Web development course by building web applications with Node.js and Express then deploying to Heroku, a cloud hosting service. This tutorial assumes some familiarity with HTML and JavaScript, but no prior experience with Node.js is necessary. The tutorial covers all necessary setup and step-by-step instructions to build a sample web application with these technologies. The tutorial concludes by describing how to incorporate Node.js, PostgreSQL, Git and Heroku in a web development course, and my experiences with using it for the past two years.