Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

2023

Old Dominion University

Discipline
Keyword
Publication

Articles 1 - 30 of 38

Full-Text Articles in Social and Behavioral Sciences

The Underrepresentation Of Black Females In Cybersecurity, Makendra Latrice Crosby Dec 2023

The Underrepresentation Of Black Females In Cybersecurity, Makendra Latrice Crosby

Cybersecurity Undergraduate Research Showcase

The significance of cybersecurity methods, strategies, and programs in protecting computers and electronic devices is crucial throughout the technological infrastructure. Despite the considerable growth in the cybersecurity field and its expansive workforce, there exists a notable underrepresentation, specifically among Black/African American females. This study examines the barriers hindering the inclusion of Black women in the cybersecurity workforce such as socioeconomic factors, limited educational access, biases, and workplace culture. The urgency of addressing these challenges calls for solutions such as education programs, mentorship initiatives, creating inclusive workplace environments, and promoting advocacy and increased awareness within the cybersecurity field. Additionally, this paper …


The Analysis And Impact Of Artificial Intelligence On Job Loss, Ava Baratz Dec 2023

The Analysis And Impact Of Artificial Intelligence On Job Loss, Ava Baratz

Cybersecurity Undergraduate Research Showcase

This paper illustrates the analysis and impact of Artificial Intelligence (AI) on job loss across various industries. This paper will discuss an overview of AI technology, a brief history of AI in industry, the positive impacts of AI, the negative impacts of AI on employment, AI considerations that contribute to job loss, the future outlook of AI, and employment loss mitigation strategies Various professional source articles and reputable blog posts will be used to finalize research on this topic.


Lip(S) Service: A Socioethical Overview Of Social Media Platforms’ Censorship Policies Regarding Consensual Sexual Content, Sage Futrell Dec 2023

Lip(S) Service: A Socioethical Overview Of Social Media Platforms’ Censorship Policies Regarding Consensual Sexual Content, Sage Futrell

Cybersecurity Undergraduate Research Showcase

The regulation of sexual exploitation on social media is a pressing issue that has been addressed by government legislation. However, laws such as FOSTA-SESTA has inadvertently restricted consensual expressions of sexuality as well. In four social media case studies, this paper investigates the ways in which marginalized groups have been impacted by changing censorship guidelines on social media, and how content moderation methods can be inclusive of these groups. I emphasize the qualitative perspectives of sex workers and queer creators in these case studies, in addition to my own experiences as a content moderation and social media management intern for …


Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins Nov 2023

Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins

Cybersecurity Undergraduate Research Showcase

This paper will present the capabilities and security concerns of public AI, also called generative AI, and look at the societal and sociological effects of implementing regulations of this technology.


Extracting Information From Twitter Screenshots, Tarannum Zaki, Michael L. Nelson, Michele C. Weigle Apr 2023

Extracting Information From Twitter Screenshots, Tarannum Zaki, Michael L. Nelson, Michele C. Weigle

Modeling, Simulation and Visualization Student Capstone Conference

Screenshots are prevalent on social media as a common approach for information sharing. Users rarely verify before sharing screenshots whether they are fake or real. Information sharing through fake screenshots can be highly responsible for misinformation and disinformation spread on social media. There are services of the live web and web archives that could be used to validate the content of a screenshot. We are going to develop a tool that would automatically provide a probability whether a screenshot is fake by using the services of the live web and web archives.


Hampton Roads' Building Resilient Communities Flood Game, Gul Ayaz, Katherine Smith, Rafael Diaz, Joshua G. Behr Apr 2023

Hampton Roads' Building Resilient Communities Flood Game, Gul Ayaz, Katherine Smith, Rafael Diaz, Joshua G. Behr

Modeling, Simulation and Visualization Student Capstone Conference

As rising sea levels and subsequent recurrent flooding disproportionately affects coastal areas, it is crucial to develop a heightened awareness of the impacts of natural disasters on communities and the environments they live in. The Hampton Roads’ Building Resilient Communities (BRC) Flood Game is a simulation role-playing game designed to allow players to increase their understanding of the impact of various community response interventions to sea level rise and recurrent flooding. Players will examine and assess the tradeoffs of resiliency investments, the impact policies may have on the population, and the amount of time return on investment takes. The BRC …


The Legacy Of Colonization And Civil Societies In South Africa, Erika Frydenlund, Melissa Miller-Felton, Bolu Ayankojo Apr 2023

The Legacy Of Colonization And Civil Societies In South Africa, Erika Frydenlund, Melissa Miller-Felton, Bolu Ayankojo

Modeling, Simulation and Visualization Student Capstone Conference

This research analyzes the unique ways that civil societies operate in Sub-Saharan Africa in the context of post-apartheid Cape Town, South Africa. Decades after the demise of apartheid, remnants of inequality remain without the promise of actionable change. We used a computational modeling approach to understand the dynamics of migrants in the receiving community as derived from qualitative interviews conducted with 24 stakeholders in Cape Town, South Africa between 2020 and 2021. Our findings show that the presence of NGOs can promote access to resources and reduce xenophobia if they can have the right influence on government policies.


Promoting Skills In Children And Teens With Autism Spectrum Disorder Through Play And Steam, Meaghan Mcleod Mozingo, Krzysztof J. Rechowicz Apr 2023

Promoting Skills In Children And Teens With Autism Spectrum Disorder Through Play And Steam, Meaghan Mcleod Mozingo, Krzysztof J. Rechowicz

Modeling, Simulation and Visualization Student Capstone Conference

Individuals with autism spectrum disorder (ASD) have a low employment rate. This is caused by a lack of support from employment resources and the negative stigma associated with common characteristics associated with ASD. With limited career-building activities and events, it is difficult for individuals with ASD to identify their skills, strengths, and career opportunities. Parental support is crucial when seeking employment opportunities for their children. Through the use of play, children with ASD engaged and explored their skills with science, technology, engineering, arts, and math-centered activities. This paper highlights the events and shows the proposed redesign for an additional workshop.


Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis Apr 2023

Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis

Modeling, Simulation and Visualization Student Capstone Conference

Maritime autonomy, specifically the use of autonomous and semi-autonomous maritime vessels, is a key enabling technology supporting a set of diverse and critical research areas, including coastal and environmental resilience, assessment of waterway health, ecosystem/asset monitoring and maritime port security. Critical to the safe, efficient and reliable operation of an autonomous maritime vessel is its ability to perceive on-the-fly the external environment through onboard sensors. In this paper, buoy detection for LiDAR images is explored by using several tools and techniques: machine learning methods, Unity Game Engine (herein referred to as Unity) simulation, and traditional image processing. The Unity Game …


Assessing Frustration Towards Venezuelan Migrants In Columbia: Path Analysis On Newspaper Coded Data, Brian Llinás, Guljannat Huseynli, Erika Frydenlund, Katherine Palacia, Jose Padilla Apr 2023

Assessing Frustration Towards Venezuelan Migrants In Columbia: Path Analysis On Newspaper Coded Data, Brian Llinás, Guljannat Huseynli, Erika Frydenlund, Katherine Palacia, Jose Padilla

Modeling, Simulation and Visualization Student Capstone Conference

This study analyzes the impact of Venezuelan migrants on local frustration levels in Colombia. The study found a relationship between the influx of Venezuelan migrants and the level of frustration among locals towards migrants, infrastructure, government, and geopolitics. Additionally, we identified that frustration types have an impact on other frustrations. The study used articles from a national newspaper in Colombia from 2015 to 2020. News articles were coded during a previous study qualitatively and categorized into frustration types. The code frequencies were then used as variables in this study. We used path modeling to statistically study the relationship between dependent …


Behind Derogatory Migrants' Terms For Venezuelan Migrants: Xenophobia And Sexism Identification With Twitter Data And Nlp, Joseph Martínez, Melissa Miller-Felton, Jose Padilla, Erika Frydenlund Apr 2023

Behind Derogatory Migrants' Terms For Venezuelan Migrants: Xenophobia And Sexism Identification With Twitter Data And Nlp, Joseph Martínez, Melissa Miller-Felton, Jose Padilla, Erika Frydenlund

Modeling, Simulation and Visualization Student Capstone Conference

The sudden arrival of many migrants can present new challenges for host communities and create negative attitudes that reflect that tension. In the case of Colombia, with the influx of over 2.5 million Venezuelan migrants, such tensions arose. Our research objective is to investigate how those sentiments arise in social media. We focused on monitoring derogatory terms for Venezuelans, specifically veneco and veneca. Using a dataset of 5.7 million tweets from Colombian users between 2015 and 2021, we determined the proportion of tweets containing those terms. We observed a high prevalence of xenophobic and defamatory language correlated with the …


A Comparison Of Nonverbal And Paraverbal Behaviors In Simulated And Virtual Patient Encounters, Sarah Powers, Mark W. Scerbo, Matthew Pacailler, Macy Kisiel, Baillie Hirst, Ginger S. Watson, Lauren Hamel, Fred Kron Apr 2023

A Comparison Of Nonverbal And Paraverbal Behaviors In Simulated And Virtual Patient Encounters, Sarah Powers, Mark W. Scerbo, Matthew Pacailler, Macy Kisiel, Baillie Hirst, Ginger S. Watson, Lauren Hamel, Fred Kron

Modeling, Simulation and Visualization Student Capstone Conference

The present study assessed whether trainees display similar nonverbal and paraverbal behaviors when interacting with a simulated (SP) and virtual patient (VP). Sixty second slices of time following four interactions were rated for the presence and frequency of three nonverbal and paraverbal behaviors. Results revealed that students exhibited fewer behaviors in the VP interaction, possibly due to differences social inhibition or fidelity between the two formats.


U-Net Based Multiclass Semantic Segmentation For Natural Disaster Based Satellite Imagery, Nishat Ara Nipa Apr 2023

U-Net Based Multiclass Semantic Segmentation For Natural Disaster Based Satellite Imagery, Nishat Ara Nipa

Modeling, Simulation and Visualization Student Capstone Conference

Satellite image analysis of natural disasters is critical for effective emergency response, relief planning, and disaster prevention. Semantic segmentation is believed to be on of the best techniques to capture pixelwise information in computer vision. In this work we will be using a U-Net architecture to do a three class semantic segmentation for the Xview2 dataset to capture the level of damage caused by different natural disaster which is beyond the visual scope of human eyes.


Lack Of Black Female Diversity Within The Cybersecurity Workforce, Eric Preston Apr 2023

Lack Of Black Female Diversity Within The Cybersecurity Workforce, Eric Preston

Cybersecurity Undergraduate Research Showcase

Cybersecurity methods, strategies, and programs for protecting computers and electronic devices have become critically important in all aspects of the technological infrastructure. However, while this is a vastly growing field that has a large workforce, it suffers from a lack of representation, specifically for Black/African American females. This study examines the barriers that prevent Black women from having representation within the cybersecurity workforce and solutions that address them. Some barriers noted include a lack of role models and resources, historical discrimination and systemic barriers, and cultural norms. Additionally, implications created by these barriers include less diversity, a lack of career …


Applicable Mitigation Strategies And Technology Propositions: Preventing Scamming In Marginalized Populations, Grace Nicole Sandhofer-Adams Apr 2023

Applicable Mitigation Strategies And Technology Propositions: Preventing Scamming In Marginalized Populations, Grace Nicole Sandhofer-Adams

Cybersecurity Undergraduate Research Showcase

This essay serves as a proposal for new technology and mitigation against the scamming of marginalized individuals (i.e., those over the age of 65). Research supports this outline, giving background to the types of scams, and prevention strategies currently seen in the cybersecurity landscape. It is evident that the methods we currently use to combat scamming attacks are not effective, therefore, I propose a new solution. This proposed telecommunications strategy is necessary to prevent scamming of all internet users, no matter the device. This telecommunication strategy would use artificial intelligence and machine learning to constantly improve its detection over time, …


A Qualitative Analysis Of The Relationship Between Cyberthreats And Democratic Backsliding, Amy I. Browning Apr 2023

A Qualitative Analysis Of The Relationship Between Cyberthreats And Democratic Backsliding, Amy I. Browning

Cybersecurity Undergraduate Research Showcase

Interstate conflict has developed beyond conventional tactics to include the cyber realm, making cybersecurity a key component of international relations and an integral part of state defense plans. Research in international security has included the analyses of the relative success or failures of particular cyberattacks. However, the instigators behind these attacks receive comparatively little attention, leaving a gap in knowledge for when, why, and where cyberthreats are likely to emerge. Recent analysis has found that democratic institutions are likely to hinder state-sponsored cyberattack initiation. A consideration that the latest wave of global democratic backsliding could be fueling cyberthreats must be …


Cybersecurity Workforce Development In Nigeria: Transforming The Cybercrime Gangs Into Cybersecurity Specialists, Olohi Favor Anteyi Apr 2023

Cybersecurity Workforce Development In Nigeria: Transforming The Cybercrime Gangs Into Cybersecurity Specialists, Olohi Favor Anteyi

Cybersecurity Undergraduate Research Showcase

This paper addresses the issue of cybercrime in Nigeria and the possibility of creating a cybersecurity workforce development program for cyber criminals to develop their skills for the cybersecurity profession, which may facilitate Nigeria’s economic development.


Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr Apr 2023

Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr

Cybersecurity Undergraduate Research Showcase

According to the Internet Crime Complaint Center (IC3), in 2021, the United States lost around $6.9 billion to cybercrime. In 2022, that number grew to over $10.2 billion (IC3, 2022). In one of many efforts to combat cybercrimes, at least 40 states “introduced or considered more than 250 bills or resolutions that deal significantly with cybersecurity” with 24 states officially enacting a total of 41 bills (National Conference on State Legislatures, 2022).

The world of cybercrime evolves each day. Nevertheless, challenges arise when we investigate and prosecute cybercrime, which will be examined in the following collection of essays that highlight …


The Association Between Vigorous Physical Activity And Alcohol Use, Christina James, Emily Junkin, Cathy Lau-Barraco Mar 2023

The Association Between Vigorous Physical Activity And Alcohol Use, Christina James, Emily Junkin, Cathy Lau-Barraco

Undergraduate Research Symposium

Evidence supports a positive association between excessive exercise and alcohol use among young adults. Past research has looked at the effects of medium-intensity physical activity regarding alcohol use prevention among college students, suggesting a positive linear association between these two variables. However, prior research has primarily focused on men. Thus, questions regarding health-compromising behaviors, such as excessive drinking and exercise among women, remain to be investigated. Further, questions have been raised concerning the pattern of association between vigorous physical activity and alcohol use among men versus women. The present study aims to replicate prior research by evaluating (1) the association …


How Does Suspension Affect Black People's Freedom?, Alexa Boggan Mar 2023

How Does Suspension Affect Black People's Freedom?, Alexa Boggan

Undergraduate Research Symposium

Education is a key to a successful future, and all students no matter their racial background or income level should have the same opportunities. Questioning the disparity in the quality of education in America leaves policy makers with the task of making local, state or national policies that will improve educational quality and accessibility--putting an end to the inequality many students are facing.


The Philippines And The World: Which Country Do Filipinos Trust More And Why, Mark Gabriel Wagan Aguilar Feb 2023

The Philippines And The World: Which Country Do Filipinos Trust More And Why, Mark Gabriel Wagan Aguilar

Graduate Research Conference (GSIS)

Agreements between and among countries have been going on for centuries for the purpose of trade, security, employment, and peace among others, however, changes on these agreements do happen, for instance, when a new President gets elected and see a different direction for his/her country. When President Rodrigo Duterte became President of the Philippines in 2016, he have made it clear that he doesn't trust the United States of America, while expressing preference in working with China, in fact, in his 6 year term, he has never step foot on the country for an official visit, however, a new perspective …


International Intrigue In The American Colonies, Arianna Vicinanza Feb 2023

International Intrigue In The American Colonies, Arianna Vicinanza

Graduate Research Conference (GSIS)

Spies have always been a subject of intrigue, nowadays we are surrounded by films, tv series, and books based on undercover business. Usually espionage is associated with WW2 or the Cold War, two periods of times in which espionage and secret agencies were essential in order to gather critical information about the enemy. Despite common belief that secret services developed one century ago, espionage and Spy Rings are as old as time. Espionage is the oldest profession in the world, kings used spies to monitor the enemy or to discover plots going around the royal court. In the American Revolution, …


Public Diplomacy And Foreign Policy Analysis In The 21st Century: Navigating Uncertainty Through Digital Power And Influence, Amber Brittain-Hale Feb 2023

Public Diplomacy And Foreign Policy Analysis In The 21st Century: Navigating Uncertainty Through Digital Power And Influence, Amber Brittain-Hale

Graduate Research Conference (GSIS)

In an era defined by digital networks and geopolitical risk, public diplomacy is gaining traction for global leaders to address uncertainty. This paper investigates the use of decentralized politics in public discourse and its implications for leadership. Individual global actors have increased public diplomatic efforts as a focus due to political uncertainty, particularly since 2016. The case of Ukraine and its President Ukraine's President Volodymyr Zelenskyy's use of digital and public diplomacy in the conflict with Russia emphasizes the importance of looking at individual actor impacts in international relations rather than just states. The study should concentrate on how digital …


Choices For U.S. Contributions To Nato: Stability Policing In The Age Of Multi-Domain Operations, Nathan M. Colvin Feb 2023

Choices For U.S. Contributions To Nato: Stability Policing In The Age Of Multi-Domain Operations, Nathan M. Colvin

Graduate Research Conference (GSIS)

The United States Army claims they are a “force out of position” and must transform for large-scale combat operations (LSCO). The current narrative toward LSCO warfighting comes at the expense of lessons hard-won over decades of small wars and stability operations. The focus on LSCO is an oversimplification of the complexity and ambiguity of the future operating environment. The Army is trading clarity of narrative at the expense of a force balanced for both LSCO and non-LSCO operations. LSCO perspective assumes a worst-case scenario of war over more likely scenarios of continuous disruptions across a spectrum of conflict, which may …


Ddr, Cassandra Jagroop Feb 2023

Ddr, Cassandra Jagroop

Graduate Research Conference (GSIS)

Disarmament, Demobilisation and Reintegration (DDR) has been a facet of post-conflict resolution since the 1980s. DDR seeks to address a wide range of issues varying from security to human rights, law, elections, and governance. One of the major issues arising from a conflict region are armed groups involved in the fighting and how to handle them. These armed groups represent the deep insecurity and lack of faith the population has in the state mechanism (Rondeau 2011, 654), thus in order to move ahead in the post-conflict situation the issue of armed groups needs to be tackled. The evolution of warfare …


On Whose Grounds? The Legality And Morality Of Humanitarian Intervention, Paul Pepi Feb 2023

On Whose Grounds? The Legality And Morality Of Humanitarian Intervention, Paul Pepi

Graduate Research Conference (GSIS)

This article will be broken into four separate parts. The first section will be whether or not there were legitimate legal grounds for the humanitarian intervention broadly. The second section will explore the moral justifications of humanitarian intervention and attempt to distinguish between cases that had a legitimate moral justification for the decision to militarily invade. That being said, there are no certain immoral thresholds for a crisis to reach that immediately prompts humanitarian intervention. The crimes against humanity in Bosnia and Herzegovina paled in comparison to that of the Rwandan genocide; however, humanitarian intervention was practiced far quicker and …


Russia-Ukrainian War 2022: Battle Of Hostomel, Arthur Borsuk Feb 2023

Russia-Ukrainian War 2022: Battle Of Hostomel, Arthur Borsuk

Graduate Research Conference (GSIS)

On February 24, 2022, the Russian Federation began the active phase of a full-scale invasion of the territory of sovereign Ukraine. This invasion was preceded by the recognition of the independence of the quasi-republics in the occupied territories of the Donetsk and Luhansk regions (located in the east of Ukraine) and the introduction of a large group of troops into their territory. The invasion began with a massive missile and air strike against critical infrastructure, military units, civilian facilities and air defense positions. At the same time, the ground troops of the Russian Federation crossed the border in all border …


Reputation: An Analysis Of How Reputation Influenced United States Presidents In Foreign Policy, Casey Reca Feb 2023

Reputation: An Analysis Of How Reputation Influenced United States Presidents In Foreign Policy, Casey Reca

Graduate Research Conference (GSIS)

How did the United States president's perception of the US's reputation influence that administration's foreign policy? Using empirical evidence to demonstrate how the president's perception of the country's reputation influences that leader's foreign policy, this paper will examine the presidencies of President Jimmy Carter, President Ronald Reagan, President George W. Bush, and President Barack Obama. This paper will also investigate how these presidents attempted to build upon the American reputation. The research suggests that the perception of the US's reputation has influenced these presidents to become more insistent in their attempts to out-maneuver their predecessors. Presidents have done so through …


The Colonial Origins Of Institutions In Mauritanina, Mahfoudha Sidelemine Feb 2023

The Colonial Origins Of Institutions In Mauritanina, Mahfoudha Sidelemine

Graduate Research Conference (GSIS)

This paper examines and evaluates the state of development in Mauritania, a former French colony in West Africa. The drivers of (under)development that the paper focuses on are institutions. By focusing on institutions as the main factors that determine the development process of the country, I also focus on the colonial origins of institutions. Hence, in this paper, I draw on Acemoglu and colleagues’ argument on the origin of colonial origins of institutions as they identify two types of colonial institutions—Inclusive and Exclusive (Acemoglu et.al.2001). However, in this research, I argue that there is a third type of institution the …


The History Of Cold War Economic Polices: How The Panda Outlived The Bear, Daniel R. White Feb 2023

The History Of Cold War Economic Polices: How The Panda Outlived The Bear, Daniel R. White

Graduate Research Conference (GSIS)

The Cold War is often regarded as a political and economic struggle between capitalism and communism. Recent post-Cold War scholars have uncovered that the nations allied to either side were not as united as the conventional understanding of the subject has previously been thought. Using recent publications, this paper reports on the how the diverging interests between the Soviet Union and People’s Republic of China drove a wedge in the communist world. This led China to slowly embrace economic reforms and ties with the United States while the Soviet Union entered into a period of stagnation which ultimately led to …