Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Social and Behavioral Sciences

Medical Travel Facilitator Websites: An Exploratory Study Of Web Page Contents And Services Offered To The Prospective Medical Tourist, Dan Cormany, Seyhmus Baloglu Aug 2011

Medical Travel Facilitator Websites: An Exploratory Study Of Web Page Contents And Services Offered To The Prospective Medical Tourist, Dan Cormany, Seyhmus Baloglu

Faculty Publications

The growing trend of traveling outside of one's country for medical services, commonly known as “medical tourism” is expected to continue to grow exponentially in the next ten years (Keckley, 2008). With multiple destinations from which to select, and available information representing this type of travel being of variable reliability, many prospective medical travelers turn to the use of a “medical tourism facilitator”, who perform a variety of trip coordination responsibilities for the medical traveler. These medical tourism facilitators, themselves a new phenomenon to support travel to various global regions, may operate within the traveler's home country or the destination …


Service Learning In A Multi-Disciplinary Renewable Energy Engineering Course, Stacy Gleixner, Patricia Backer, Elena Klaw Jun 2011

Service Learning In A Multi-Disciplinary Renewable Energy Engineering Course, Stacy Gleixner, Patricia Backer, Elena Klaw

Faculty Publications

One of the most significant challenges facing this coming generation of engineers is how to fight the complex issue of climate change. One aspect of this that is playing an increasingly important role is alternative and renewable energy technologies. Emerging applications such as solar cells, wind energy conversion devices, and fuel cells involve significant contributions across a range of traditional engineering disciplines. Therefore, for companies to be successful in researching, designing, and manufacturing these products, they must operate in a truly multi-disciplinary environment. To prepare graduates to be successful in this, engineering education must provide students with multi-disciplinary learning environments. …


Finding The Key Players In Online Child Exploitation Networks, Bryce Westlake, Martin Bouchard, Richard Frank May 2011

Finding The Key Players In Online Child Exploitation Networks, Bryce Westlake, Martin Bouchard, Richard Frank

Faculty Publications

The growth of the Internet has been paralleled with a similar growth in online child exploitation. Since completely shutting down child exploitation websites is difficult (or arguably impossible), the goal must be to find the most efficient way of identifying the key targets and then to apprehend them. Traditionally, online investigations have been manual and centered on images. However, we argue that target prioritization needs to take more than just images into consideration, and that the investigating process needs to become more systematic. Drawing from a web crawler we specifically designed for extracting child exploitation website networks, this study 1) …


Strategies To Disrupt Online Child Pornography Networks, Kila Joffres, Martin Bouchard, Richard Frank, Bryce Westlake Jan 2011

Strategies To Disrupt Online Child Pornography Networks, Kila Joffres, Martin Bouchard, Richard Frank, Bryce Westlake

Faculty Publications

This paper seeks to determine which attack strategies (hub, bridge, or fragmentation) are most effective at disrupting two online child pornography networks in terms of outcome measures that include density, clustering, compactness, and average path length. For this purpose, two networks were extracted using a web-crawler that recursively follows child exploitation sites. It was found that different attack strategies were warranted depending on the outcome measure and the network structure. Overall, hub attacks were most effective at reducing network density and clustering, whereas fragmentation attacks were most effective at reducing the network's distance-based cohesion and average path length. In certain …