Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Clark University (12)
- Nova Southeastern University (8)
- Walden University (8)
- Old Dominion University (4)
- City University of New York (CUNY) (3)
-
- Purdue University (3)
- Eastern Michigan University (2)
- Singapore Management University (2)
- Union College (2)
- University at Albany, State University of New York (2)
- University of South Florida (2)
- University of Wisconsin Milwaukee (2)
- Valparaiso University (2)
- Western University (2)
- Bard College (1)
- Boise State University (1)
- California Polytechnic State University, San Luis Obispo (1)
- Claremont Colleges (1)
- La Salle University (1)
- Louisiana Tech University (1)
- Michigan Technological University (1)
- Minnesota State University, Mankato (1)
- Seton Hall University (1)
- The University of Maine (1)
- University of Nebraska at Omaha (1)
- University of Nevada, Las Vegas (1)
- Washington University in St. Louis (1)
- Wayne State University (1)
- World Maritime University (1)
- Keyword
-
- Information technology (6)
- MPA (6)
- Computer science (5)
- MSIT (5)
- Security (4)
-
- Applied sciences (3)
- Computer engineering (2)
- Data mining (2)
- Database (2)
- Education (2)
- Framework (2)
- Information retrieval (2)
- Information science (2)
- Information systems (2)
- Machine learning (2)
- Psychology (2)
- Structural equation modeling (2)
- Accessibility (1)
- Adjustment problems (1)
- Adoption (1)
- Adoption dynamics (1)
- Africa (1)
- Agent (1)
- Agent-based models (1)
- Algorithms (1)
- American with Disabilities Act (ADA) (1)
- Andrija Puharich (1)
- Anomalous behaviour (1)
- Anxiety (1)
- Appraisal (1)
- Publication
-
- School of Professional Studies (11)
- CCE Theses and Dissertations (8)
- Walden Dissertations and Doctoral Studies (8)
- Computer Science Theses & Dissertations (3)
- Theses and Dissertations (3)
-
- Dissertations, Theses, and Capstone Projects (2)
- Electronic Thesis and Dissertation Repository (2)
- Honors Theses (2)
- Information Technology Master Theses (2)
- Legacy Theses & Dissertations (2009 - 2024) (2)
- Master's Theses and Doctoral Dissertations (2)
- Open Access Theses (2)
- USF Tampa Graduate Theses and Dissertations (2)
- All Graduate Theses, Dissertations, and Other Capstone Projects (1)
- Boise State University Theses and Dissertations (1)
- Dissertations and Theses Collection (1)
- Dissertations and Theses Collection (Open Access) (1)
- Dissertations, Master's Theses and Master's Reports (1)
- Doctoral Dissertations (1)
- Economic Crime Forensics Capstones (1)
- Electronic Theses and Dissertations (1)
- International Development, Community and Environment (IDCE) (1)
- Liberal Arts and Engineering Studies (1)
- Maritime Safety & Environment Management Dissertations (Dalian) (1)
- McKelvey School of Engineering Theses & Dissertations (1)
- Open Access Dissertations (1)
- Pomona Senior Theses (1)
- Psychology Theses & Dissertations (1)
- Senior Projects Spring 2016 (1)
- Seton Hall University Dissertations and Theses (ETDs) (1)
Articles 1 - 30 of 69
Full-Text Articles in Social and Behavioral Sciences
Rationality, Parapsychology, And Artificial Intelligence In Military And Intelligence Research By The United States Government In The Cold War, Guy M. Lomeo
Theses and Dissertations
A study analyzing the roles of rationality, parapsychology, and artificial intelligence in military and intelligence research by the United States Government in the Cold War. An examination of the methodology behind the decisions to pursue research in two fields that were initially considered irrational.
Computational Environment For Modeling And Analysing Network Traffic Behaviour Using The Divide And Recombine Framework, Ashrith Barthur
Computational Environment For Modeling And Analysing Network Traffic Behaviour Using The Divide And Recombine Framework, Ashrith Barthur
Open Access Dissertations
There are two essential goals of this research. The first goal is to design and construct a computational environment that is used for studying large and complex datasets in the cybersecurity domain. The second goal is to analyse the Spamhaus blacklist query dataset which includes uncovering the properties of blacklisted hosts and understanding the nature of blacklisted hosts over time.
The analytical environment enables deep analysis of very large and complex datasets by exploiting the divide and recombine framework. The capability to analyse data in depth enables one to go beyond just summary statistics in research. This deep analysis is …
Towards Multipurpose Readability Assessment, Ion Madrazo
Towards Multipurpose Readability Assessment, Ion Madrazo
Boise State University Theses and Dissertations
Readability refers to the ease with which a reader can understand a text. Automatic readability assessment has been widely studied over the past 50 years. However, most of the studies focus on the development of tools that apply either to a single language, domain, or document type. This supposes duplicate efforts for both developers, who need to integrate multiple tools in their systems, and final users, who have to deal with incompatibilities among the readability scales of different tools. In this manuscript, we present MultiRead, a multipurpose readability assessment tool capable of predicting the reading difficulty of texts of varied …
Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi
Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi
UNLV Theses, Dissertations, Professional Papers, and Capstones
Securing IoT (Internet of Things) systems in general, regardless of the communication technology used, has been the concern of many researchers and private companies. As for ZigBee security concerns, much research and many experiments have been conducted to better predict the nature of potential security threats. In this research we are addressing several ZigBee vulnerabilities by performing first hand experiments and attack simulations on ZigBee protocol. This will allow us to better understand the security issues surveyed and find ways to mitigate them. Based on the attack simulations performed and the survey conducted, we have developed a ZigBee IoT framework …
Indoor Scene Localization To Fight Sex Trafficking In Hotels, Abigail Stylianou
Indoor Scene Localization To Fight Sex Trafficking In Hotels, Abigail Stylianou
McKelvey School of Engineering Theses & Dissertations
Images are key to fighting sex trafficking. They are: (a) used to advertise for sex services,(b) shared among criminal networks, and (c) connect a person in an image to the place where the image was taken. This work explores the ability to link images to indoor places in order to support the investigation and prosecution of sex trafficking. We propose and develop a framework that includes a database of open-source information available on the Internet, a crowd-sourcing approach to gathering additional images, and explore a variety of matching approaches based both on hand-tuned features such as SIFT and learned features …
The Transition Experiences Of International Graduate Students In Clark University School Of Professional Studies, Xuesong Huang, Mingyang Lian, Dang Trung, Jay Sheth, Yuwei Yang, Irina Klimenko
The Transition Experiences Of International Graduate Students In Clark University School Of Professional Studies, Xuesong Huang, Mingyang Lian, Dang Trung, Jay Sheth, Yuwei Yang, Irina Klimenko
School of Professional Studies
In the last decade, the School of Professional Studies at Clark University has witnessed a sharp increase in international students. More and more international students in the millennial generation have entered the School of Professional Studies pursuing one of the two-year graduate programs: Master of Science in Professional Studies, Master of Science in Public Administration, and Master of Science in Information Technology. In the past, working adult student dominant the program. These students already had a career outside the classrooms before them came to study. The millennial international students have generated new adjustment problems. Some of the transition issues of …
Aiddata Gis International Fellowship: Ghana West-Africa, Jason N. Ready
Aiddata Gis International Fellowship: Ghana West-Africa, Jason N. Ready
International Development, Community and Environment (IDCE)
My internship, or fellowship as it was commonly referred to, was funded by a non-profit organization out of Williamsburg Virginia called AidData. This fellowship took place in in the country of Ghana, West-Africa beginning in May of 2016 and continued for 14 weeks with 40 hours each week. The objective of this internship was to provide in-depth training on the use of geographic Information Systems to Private and Public sectors within the country to allow for increased efficiency, and transparency through data visualization. In accordance with the requirement of Clark Universities GISDE master’s program this paper will delve into the …
Cultural Diversity In Artificial Societies: Case Studies Of The Maya Peoples, Roberto Ulloa
Cultural Diversity In Artificial Societies: Case Studies Of The Maya Peoples, Roberto Ulloa
Electronic Thesis and Dissertation Repository
The existence of cultural diversity in a connected world is paradoxical given that all individuals constantly interact and share information, and that individuals are all part of one giant network of connections. In the long term, it seems logical to assume that everybody should hold the same cultural information and, therefore, the same culture. Yet cultural diversity is still manifest around the globe. Cultural diversity as a phenomenon becomes even more puzzling when we take into account how it survives catastrophic events which regularly befall societies, such as invasions, natural disasters, and civil wars. In this thesis, agent-based computer simulations …
Personal Privacy: A Study To Determine Views On Privacy As It Relates To Technology Acceptance, Keith A. Wuotinen
Personal Privacy: A Study To Determine Views On Privacy As It Relates To Technology Acceptance, Keith A. Wuotinen
Master's Theses and Doctoral Dissertations
This descriptive correlation study sought to learn the relationships, if any, between a person’s concern for privacy and their acceptance of technology, in conjunction with the control factors of the Big Five personality factors. The study employed a modified Concern for Information Privacy (CFIP) scale and a modified Technology Acceptance Model (TAM) approach in conjunction with the Big Five personality factors using a 51-question survey.
The study surveyed students at Eastern Michigan University in Ypsilanti, Michigan, who were enrolled in the College of Technology. The results indicated that there was a significant positive relationship between the CFIP and the TAM. …
On The Promotion Of The Social Web Intelligence, Taraneh Khazaei
On The Promotion Of The Social Web Intelligence, Taraneh Khazaei
Electronic Thesis and Dissertation Repository
Given the ever-growing information generated through various online social outlets, analytical research on social media has intensified in the past few years from all walks of life. In particular, works on social Web intelligence foster and benefit from the wisdom of the crowds and attempt to derive actionable information from such data. In the form of collective intelligence, crowds gather together and contribute to solving problems that may be difficult or impossible to solve by individuals and single computers. In addition, the consumer insight revealed from social footprints can be leveraged to build powerful business intelligence tools, enabling efficient and …
Determining The Interruption Of Services While Performing V2i Communication Using The Spmd Prototype, Binaya Raj Joshi
Determining The Interruption Of Services While Performing V2i Communication Using The Spmd Prototype, Binaya Raj Joshi
Student Work
The use of Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I), Vehicle to Roadside Unit (V2R) and Vehicle to Other (V2X) communications are increasingly applied over existing and upcoming transportation means by the United States Department of Transportation (USDOT) and other federal agencies. From previous statistical data, these technologies would primarily avoid or mitigate vehicle crashes and would provide more safety, mobility and various other benefits on the roads (“Traffic Safety Facts 2012,” 2013; “Traffic Safety Facts 2013” 2014). During the communication processes between vehicles, infrastructures and roadside units’ various sensitive data such as positions and speed of the vehicles, …
Anxiolytic Effects Of Propranolol And Diphenoxylate On Mice And Automated Stretch-Attend Posture Analysis, Kevin Scott Holly
Anxiolytic Effects Of Propranolol And Diphenoxylate On Mice And Automated Stretch-Attend Posture Analysis, Kevin Scott Holly
Doctoral Dissertations
The prevention of social anxiety, performance anxiety, and social phobia via the combination of two generic drugs, diphenoxylate HC1 (opioid) plus atropine sulfate (anticholinergic) and propranolol HCl (beta blocker) was evaluated in mice through behavioral studies. A patent published on a September 8, 2011 by Benjamin D. Holly, US 2011/0218215 Al, prompted the research. The drug combination of diphenoxylate and atropine plus propranolol could be an immediate treatment for patients suffering from acute phobic and social anxiety disorders. Demonstrating the anxiolytic effects of the treatment on mice would validate a mouse model for neuroscientist to be used to detect the …
Multiple Imputation Of Missing Data In Structural Equation Models With Mediators And Moderators Using Gradient Boosted Machine Learning, Robert J. Milletich Ii
Multiple Imputation Of Missing Data In Structural Equation Models With Mediators And Moderators Using Gradient Boosted Machine Learning, Robert J. Milletich Ii
Psychology Theses & Dissertations
Mediation and moderated mediation models are two commonly used models for indirect effects analysis. In practice, missing data is a pervasive problem in structural equation modeling with psychological data. Multiple imputation (MI) is one method used to estimate model parameters in the presence of missing data, while accounting for uncertainty due to the missing data. Unfortunately, commonly used MI methods are not equipped to handle categorical variables or nonlinear variables such as interactions. In this study, we introduce a general MI framework that uses the Bayesian bootstrap (BB) method to generate posterior inferences for indirect effects and gradient boosted machine …
Using Blockchain Technology To Facilitate Anti-Money Laundering Efforts, Dominick J. Battistini
Using Blockchain Technology To Facilitate Anti-Money Laundering Efforts, Dominick J. Battistini
Economic Crime Forensics Capstones
Money laundering can be defined as any act or attempted act to conceal or disguise the identity of illegally obtained proceeds so that they appear to have originated from legitimate sources (Money Laundering, 2016). It is difficult to determine the magnitude of money laundering because these illicit financial flows remain hidden (Schott, 2006). A report issued by the United Nations Office on Drugs and Crime (UNODC) quoted that the total of all criminal proceeds amounted to $2.1 trillion in 2009. The study also shows that “Less than 1 percent of global illicit financial flows are currently seized and frozen” (Pietschmann …
A Study Of Information Security Awareness Program Effectiveness In Predicting End-User Security Behavior, James Michael Banfield
A Study Of Information Security Awareness Program Effectiveness In Predicting End-User Security Behavior, James Michael Banfield
Master's Theses and Doctoral Dissertations
As accessibility to data increases, so does the need to increase security. For organizations of all sizes, information security (IS) has become paramount due to the increased use of the Internet. Corporate data are transmitted ubiquitously over wireless networks and have increased exponentially with cloud computing and growing end-user demand. Both technological and human strategies must be employed in the development of an information security awareness (ISA) program. By creating a positive culture that promotes desired security behavior through appropriate technology, security policies, and an understanding of human motivations, ISA programs have been the norm for organizational end-user risk mitigation …
Study On The Application Of Information Technology In Inland Maritime Supervision, Chong He
Study On The Application Of Information Technology In Inland Maritime Supervision, Chong He
Maritime Safety & Environment Management Dissertations (Dalian)
No abstract provided.
Improving The Performance Of Ice Sheet Modeling Through Embedded Simulation, Christopher G. Dufour
Improving The Performance Of Ice Sheet Modeling Through Embedded Simulation, Christopher G. Dufour
Electronic Theses and Dissertations
Understanding the impact of global climate change is a critical concern for society at large. One important piece of the climate puzzle is how large-scale ice sheets, such as those covering Greenland and Antarctica, respond to a warming climate. Given such ice sheets are under constant change, developing models that can accurately capture their dynamics represents a significant challenge to researchers. The problem, however, is properly capturing the dynamics of an ice sheet model requires a high model resolution and simulating these models is intractable even for state-of-the-art supercomputers.
This thesis presents a revolutionary approach to accurately capture ice sheet …
Tool Comparison Of Semantic Parsers, Robert Hinh
Tool Comparison Of Semantic Parsers, Robert Hinh
Open Access Theses
Natural Language Processing (NLP) is a vital aspect for artificial intelligence systems to achieve integration into human lives, which has been a goal for researchers in this industry. While NLP focuses on an array of problems, semantic parsing will be specifically focused on throughout this paper. These parsers have been considerably targeted for improvement through the scientific community and demand for semantic parsers that achieve high accuracy has increased. There have been many approaches developed for this specific purpose and in this paper, a deep analysis was performed to compare the performance of semantic parsing systems. The implications of this …
Profiling Social Media Users With Selective Self-Disclosure Behavior, Wei Gong
Profiling Social Media Users With Selective Self-Disclosure Behavior, Wei Gong
Dissertations and Theses Collection
Social media has become a popular platform for millions of users to share activities and thoughts. Many applications are now tapping on social media to disseminate information (e.g., news), to promote products (e.g., advertisements), to manage customer relationship (e.g., customer feedback), and to source for investment (e.g., crowdfunding). Many of these applications require user profile knowledge to select the target social media users or to personalize messages to users. Social media user profiling is a task of constructing user profiles such as demographical labels, interests, and opinions, etc., using social media data. Among the social media user profiling research works, …
Magnopark, Smart Parking Detection Based On Cellphone Magnetic Sensor, Maryam Arab
Magnopark, Smart Parking Detection Based On Cellphone Magnetic Sensor, Maryam Arab
Computer Science Theses & Dissertations
We introduce a solution that uses the availability of heavy crowds and their smart devices, to gain more result as to where potential parking is possible. By leveraging the raw magnetometer, gyroscope, and accelerometer data, we are able to detect parking spots through the natural movement exerted by the walking pedestrians on the sidewalks beside the streets. Dating back as far as 2013, a very large portion of pedestrians composing the crowds on the sidewalk, possessed at least one smart device in their hand or pocket14]. It is this statistic that fuels our application, in which we depend on crowds …
Using Web Archives To Enrich The Live Web Experience Through Storytelling, Yasmin Alnoamany
Using Web Archives To Enrich The Live Web Experience Through Storytelling, Yasmin Alnoamany
Computer Science Theses & Dissertations
Much of our cultural discourse occurs primarily on the Web. Thus, Web preservation is a fundamental precondition for multiple disciplines. Archiving Web pages into themed collections is a method for ensuring these resources are available for posterity. Services such as Archive-It exists to allow institutions to develop, curate, and preserve collections of Web resources. Understanding the contents and boundaries of these archived collections is a challenge for most people, resulting in the paradox of the larger the collection, the harder it is to understand. Meanwhile, as the sheer volume of data grows on the Web, "storytelling" is becoming a popular …
Digital Integration, Jacob C. Boccio
Digital Integration, Jacob C. Boccio
USF Tampa Graduate Theses and Dissertations
Artificial intelligence is an emerging technology; something far beyond smartphones, cloud integration, or surgical microchip implantation. Utilizing the work of Ray Kurzweil, Nick Bostrom, and Steven Shaviro, this thesis investigates technology and artificial intelligence through the lens of the cinema. It does this by mapping contemporary concepts and the imagined worlds in film as an intersection of reality and fiction that examines issues of individual identity and alienation. I look at a non-linear timeline of films involving machine advancement, machine intelligence, and stages of post-human development; Elysium (2013) and Surrogates (2009) are about technology as an extension of the self, …
Data-Driven Synthesis And Evaluation Of Syntactic Facial Expressions In American Sign Language Animation, Hernisa Kacorri
Data-Driven Synthesis And Evaluation Of Syntactic Facial Expressions In American Sign Language Animation, Hernisa Kacorri
Dissertations, Theses, and Capstone Projects
Technology to automatically synthesize linguistically accurate and natural-looking animations of American Sign Language (ASL) would make it easier to add ASL content to websites and media, thereby increasing information accessibility for many people who are deaf and have low English literacy skills. State-of-art sign language animation tools focus mostly on accuracy of manual signs rather than on the facial expressions. We are investigating the synthesis of syntactic ASL facial expressions, which are grammatically required and essential to the meaning of sentences. In this thesis, we propose to: (1) explore the methodological aspects of evaluating sign language animations with facial expressions, …
Visual Code: Breaking The Binary, Jacob Johannesen, Andrew Adriance
Visual Code: Breaking The Binary, Jacob Johannesen, Andrew Adriance
Liberal Arts and Engineering Studies
This project seeks to create an accessible programming language that is more visually based. Although some solutions exist, namely MIT’s Scratch, nothing has caught up to the mobile age. This proj- ect aims to reframe creating a game or app into the context of tell- ing a story, putting character creation first. By researching sto- ry-telling and how people learn, and by applying technical and user interface design knowledge, this project intends to deliver a soft- ware solution that opens introductory coding education to more people.
Effect Of Deictic Gestures On Direction-Giving In Virtual Humans, Anthony Pham
Effect Of Deictic Gestures On Direction-Giving In Virtual Humans, Anthony Pham
Honors Theses
Virtual agents are animated characters that use speech and gesture to interact with human users. They can serve as an intuitive interface for a variety of purposes. I am investigating the use of deictic gestures by a direction-giving agent. Deictic gestures are pointing gestures that humans often use in direction-giving to help clarify the route and destination. In my experiment, I developed a virtual agent to give directions to people to six different locations with the following spatial relationships to the starting point: left, right, left behind, right behind, left up, and right up. Three versions of the virtual agent …
A Graph Based Departmental Spoken Dialogue System, Julia Isaac
A Graph Based Departmental Spoken Dialogue System, Julia Isaac
Honors Theses
Spoken dialogue systems are automatic, computer based systems that are a great way for people to receive important information. In this project, I created a spoken dialogue system that people can use to learn about the Computer Science Department at Union College. The system was built by populating an open source dialogue system using a graph based dialogue manager. I improved upon a previous working dialogue system by making the conversations sound more natural, improving the flexibility of the system and making the system more robust. To help with this process a corpus was created using about 200 different dialogues …
User Behavior Mining In Microblogging, Tuan Anh Hoang
User Behavior Mining In Microblogging, Tuan Anh Hoang
Dissertations and Theses Collection (Open Access)
This dissertation addresses the modeling of factors concerning microblogging users' content and behavior. We focus on two sets of factors. The first set includes behavioral factors of users and content items driving content propagation in microblogging. The second set consists of latent topics and communities of users as the users are engaged in content generation and behavior adoptions. These two sets of factors are extremely important in many applications, e.g., network monitoring and recommender systems. In the first part of this dissertation, we identify user virality, user susceptibility, and content virality as three behavioral factors that affect users' behaviors in …
The History Of Chinese Cybersecurity: Current Effects On Chinese Society Economy, And Foreign Relations, Vaughn C. Rogers
The History Of Chinese Cybersecurity: Current Effects On Chinese Society Economy, And Foreign Relations, Vaughn C. Rogers
Seton Hall University Dissertations and Theses (ETDs)
Chinese cybersecurity has become an infamous topic in the field of cybersecurity today, causing a great deal of controversy. The controversy stems from whether or not censorship is hindering Chinese economy, society, and relationships with other countries. The White Papers (中国政府白皮书), the Constitution of the People’s Republic of China (中华人民共和国宪法), and The Internet in China (中国互联网状况) all suggest that there is a free flow of Internet both within and without China that promotes peaceful socioeconomic development which the Chinese government seeks to promote. But is China sacrificing lucrative business prospects to secure …
Backend Challenges And Issues For Electronic Government, Salim Y. Alkindi
Backend Challenges And Issues For Electronic Government, Salim Y. Alkindi
Information Technology Master Theses
The term electronic government (also called e-government, or eGov) refers to multidisciplinary projects that are complex in nature. Since the beginning of the Internet revolution many countries have adopted e-government as a step toward enhancing the delivery of public or governmental services to citizens by what are called e-services. A typical request for a service is initiated and passes through an electronic service (“e-service”) portal, or a front office. The term front office application usually system can be defined as designates software seen and used directly by an end user. This software provides the capabilities needed to collect the user …
Charlton Fire Department Resident Expectations: Survey And Analysis, Natalie Omary, Jingxin Wen, Junchen Chen, Denis Kornev
Charlton Fire Department Resident Expectations: Survey And Analysis, Natalie Omary, Jingxin Wen, Junchen Chen, Denis Kornev
School of Professional Studies
The Town of Charlton is located in the heart of the Massachusetts with a resident population of just under 14,000 people. The Charlton Fire Department serves the town for needs related to fire fighting, fire prevention, burning permits and inspection services along with emergency medical services. The Department has requested the assistance of the Clark University COPACE Capstone students in creating and conducting survey in order to get a sense of what the resident of the town know about the fire department and to better gauge their expectations about what the department can provide for them. The survey was formulated …