Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (3)
- Computer Engineering (2)
- Computer Sciences (2)
- Digital Communications and Networking (2)
- Engineering (2)
-
- Environmental Sciences (2)
- Applied Behavior Analysis (1)
- Business (1)
- Civil Engineering (1)
- Civil and Environmental Engineering (1)
- Construction Engineering and Management (1)
- Defense and Security Studies (1)
- Earth Sciences (1)
- Electrical and Computer Engineering (1)
- Electromagnetics and Photonics (1)
- Environmental Engineering (1)
- Environmental Monitoring (1)
- Environmental Studies (1)
- Information Security (1)
- Internet Law (1)
- Law (1)
- Management Sciences and Quantitative Methods (1)
- Psychology (1)
- Public Affairs, Public Policy and Public Administration (1)
- Soil Science (1)
- Sustainability (1)
- Systems Architecture (1)
- Systems and Communications (1)
- Urban Studies and Planning (1)
- Keyword
-
- Behavioral analysis (1)
- Budgeting (1)
- Computer crime investigation (1)
- Computer simulation (1)
- Cybersecurity (1)
-
- Data breaches (1)
- Digital forensics (1)
- Energy issues (1)
- Evaluation research (1)
- Increasing global temperatures (1)
- Internet artifacts (1)
- Internet child pornography (1)
- Internet of Underground Things (1)
- IoT (1)
- Probability (1)
- Profiling (1)
- Risk management (1)
- Sustainability (1)
- Threat modeling (1)
- Underground Communications (1)
- Water and food scarcity (1)
- Wireless Underground Channel (1)
Articles 1 - 4 of 4
Full-Text Articles in Social and Behavioral Sciences
Optimizing Cybersecurity Budgets With Attacksimulation, Alexander Master, George Hamilton, J. Eric Dietz
Optimizing Cybersecurity Budgets With Attacksimulation, Alexander Master, George Hamilton, J. Eric Dietz
Faculty Publications
Modern organizations need effective ways to assess cybersecurity risk. Successful cyber attacks can result in data breaches, which may inflict significant loss of money, time, and public trust. Small businesses and non-profit organizations have limited resources to invest in cybersecurity controls and often do not have the in-house expertise to assess their risk. Cyber threat actors also vary in sophistication, motivation, and effectiveness. This paper builds on the previous work of Lerums et al., who presented an AnyLogic model for simulating aspects of a cyber attack and the efficacy of controls in a generic enterprise network. This paper argues that …
Wireless Underground Communications In Sewer And Stormwater Overflow Monitoring: Radio Waves Through Soil And Asphalt Medium, Usman Raza, Abdul Salam
Wireless Underground Communications In Sewer And Stormwater Overflow Monitoring: Radio Waves Through Soil And Asphalt Medium, Usman Raza, Abdul Salam
Faculty Publications
Storm drains and sanitary sewers are prone to backups and overflows due to extra amount wastewater entering the pipes. To prevent that, it is imperative to efficiently monitor the urban underground infrastructure. The combination of sensors system and wireless underground communication system can be used to realize urban underground IoT applications, e.g., storm water and wastewater overflow monitoring systems. The aim of this article is to establish a feasibility of the use of wireless underground communications techniques, and wave propagation through the subsurface soil and asphalt layers, in an underground pavement system for storm water and sewer overflow monitoring application. …
Internet Of Things For Sustainable Community Development: Introduction And Overview, Abdul Salam
Internet Of Things For Sustainable Community Development: Introduction And Overview, Abdul Salam
Faculty Publications
The two-third of the city-dwelling world population by 2050 poses numerous global challenges in the infrastructure and natural resource management domains (e.g., water and food scarcity, increasing global temperatures, and energy issues). The IoT with integrated sensing and communication capabilities has the strong potential for the robust, sustainable, and informed resource management in the urban and rural communities. In this chapter, the vital concepts of sustainable community development are discussed. The IoT and sustainability interactions are explained with emphasis on Sustainable Development Goals (SDGs) and communication technologies. Moreover, IoT opportunities and challenges are discussed in the context of sustainable community …
Using Internet Artifacts To Profile A Child Pornography Suspect, Kathryn C. Seigfried-Spellar, Marcus K. Rogers
Using Internet Artifacts To Profile A Child Pornography Suspect, Kathryn C. Seigfried-Spellar, Marcus K. Rogers
Faculty Publications
Digital evidence plays a crucial role in child pornography investigations. However, in the following case study, the authors argue that the behavioral analysis or “profiling” of digital evidence can also play a vital role in child pornography investigations. The following case study assessed the Internet Browsing History (Internet Explorer Bookmarks, Mozilla Bookmarks, and Mozilla History) from a suspected child pornography user’s computer. The suspect in this case claimed to be conducting an ad hoc law enforcement investigation. After the URLs were classified (Neutral; Adult Porn; Child Porn; Adult Dating sites; Pictures from Social Networking Profiles; Chat Sessions; Bestiality; Data Cleaning; …