Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

55,315 Full-Text Articles 72,189 Authors 23,183,657 Downloads 376 Institutions

All Articles in Computer Sciences

Faceted Search

55,315 full-text articles. Page 1673 of 2014.

College Student Home Computer Security Adoption, Chet L. Claar, Robert C. Shields, David Rawlinson, Robert Lupton 2013 Central Washington University

College Student Home Computer Security Adoption, Chet L. Claar, Robert C. Shields, David Rawlinson, Robert Lupton

All Faculty Scholarship for the College of the Sciences

The home Internet user faces a hostile environment abundant in potential attacks on their computers. These attacks have been increasing at an alarming rate and cause damage to individuals and organizations regularly, and have the potential to cripple the critical infrastructures of entire countries. Recent research has determined that some individuals are not utilizing additional software protections available to mitigate these potential security risks. This paper seeks to clarify the reasons by proposing a conceptual framework that utilizes the Health Belief Model as a possible way to explain why some people do not perceive a threat sufficient to prompt the …


Tr-2013004: Transformations Of Matrix Structures Work Again, Victor Y. Pan 2013 City University of New York (CUNY)

Tr-2013004: Transformations Of Matrix Structures Work Again, Victor Y. Pan

Computer Science Technical Reports

No abstract provided.


Tr-2013003: Polynomial Evaluation And Interpolation: Fast And Stable Approximate Solution, Victor Y. Pan 2013 City University of New York (CUNY)

Tr-2013003: Polynomial Evaluation And Interpolation: Fast And Stable Approximate Solution, Victor Y. Pan

Computer Science Technical Reports

No abstract provided.


Tr-2013001: Randomized Augmentation And Additive Preprocessing, Victor Y. Pan, Guoliang Qian, Ai-Long Zheng 2013 City University of New York (CUNY)

Tr-2013001: Randomized Augmentation And Additive Preprocessing, Victor Y. Pan, Guoliang Qian, Ai-Long Zheng

Computer Science Technical Reports

No abstract provided.


Tr-2013009: Algebraic Algorithms, Ioannis Z. Emiris, Victor Y. Pan, Elias P. Tsigaridas 2013 City University of New York (CUNY)

Tr-2013009: Algebraic Algorithms, Ioannis Z. Emiris, Victor Y. Pan, Elias P. Tsigaridas

Computer Science Technical Reports

No abstract provided.


Tr-2013008: Information Transmission In Communication Games Signaling With An Audience, Farishta Satari 2013 City University of New York (CUNY)

Tr-2013008: Information Transmission In Communication Games Signaling With An Audience, Farishta Satari

Computer Science Technical Reports

No abstract provided.


Tr-2013013: New Structured Matrix Methods For Real And Complex Polynomial Root-Finding, Victor Y. Pan, Ai-Long Zheng 2013 City University of New York (CUNY)

Tr-2013013: New Structured Matrix Methods For Real And Complex Polynomial Root-Finding, Victor Y. Pan, Ai-Long Zheng

Computer Science Technical Reports

No abstract provided.


Tr-2013014: New Structured Matrix Methods For Real And Complex Polynomial Root-Finding, Victor Y. Pan, Ai-Long Zheng 2013 City University of New York (CUNY)

Tr-2013014: New Structured Matrix Methods For Real And Complex Polynomial Root-Finding, Victor Y. Pan, Ai-Long Zheng

Computer Science Technical Reports

No abstract provided.


Tr-2013016: Supporting Genp With Random Multipliers, Victor Y. Pan, Guoliang Qian, Xiaodong Yan 2013 City University of New York (CUNY)

Tr-2013016: Supporting Genp With Random Multipliers, Victor Y. Pan, Guoliang Qian, Xiaodong Yan

Computer Science Technical Reports

No abstract provided.


Fair Cost Sharing Auction Mechanisms In Last Mile Ridesharing, Duc Thien NGUYEN 2013 Singapore Management University

Fair Cost Sharing Auction Mechanisms In Last Mile Ridesharing, Duc Thien Nguyen

Dissertations and Theses Collection (Open Access)

With rapid growth of transportation demands in urban cities, one major challenge is to provide efficient and effective door-to-door service to passengers using the public transportation system. This is commonly known as the Last Mile problem. In this thesis, we consider a dynamic and demand responsive mechanism for Ridesharing on a non-dedicated commercial fleet (such as taxis). This problem is addressed as two sub-problems, the first of which is a special type of vehicle routing problems (VRP). The second sub-problem, which is more challenging, is to allocate the cost (i.e. total fare) fairly among passengers. We propose auction mechanisms where …


Conversion Of Domain Type Enforcement Language To The Java Security Manager, JAMES WALKER 2013 Michigan Technological University

Conversion Of Domain Type Enforcement Language To The Java Security Manager, James Walker

Dissertations, Master's Theses and Master's Reports - Open

With today's prevalence of Internet-connected systems storing sensitive data and the omnipresent threat of technically skilled malicious users, computer security remains a critically important field. Because of today's multitude of vulnerable systems and security threats, it is vital that computer science students be taught techniques for programming secure systems, especially since many of them will work on systems with sensitive data after graduation. Teaching computer science students proper design, implementation, and maintenance of secure systems is a challenging task that calls for the use of novel pedagogical tools. This report describes the implementation of a compiler that converts mandatory access …


An Experience-Driven Pedagogy For The Instruction Of Software Testing In Computer Science, Christopher Duane Brown 2013 Michigan Technological University

An Experience-Driven Pedagogy For The Instruction Of Software Testing In Computer Science, Christopher Duane Brown

Dissertations, Master's Theses and Master's Reports - Open

In the realm of computer programming, the experience of writing a program is used to reinforce concepts and evaluate ability. This research uses three case studies to evaluate the introduction of testing through Kolb's Experiential Learning Model (ELM). We then analyze the impact of those testing experiences to determine methods for improving future courses.

The first testing experience that students encounter are unit test reports in their early courses. This course demonstrates that automating and improving feedback can provide more ELM iterations. The JUnit Generation (JUG) tool also provided a positive experience for the instructor by reducing the overall workload. …


Automating Vendor Fraud Detection In Enterprise Systems, Kishore Singh, Peter Best, Joseph Mula 2013 Griffith University, Australia

Automating Vendor Fraud Detection In Enterprise Systems, Kishore Singh, Peter Best, Joseph Mula

Journal of Digital Forensics, Security and Law

Fraud is a multi-billion dollar industry that continues to grow annually. Many organizations are poorly prepared to prevent and detect fraud. Fraud detection strategies are intended to quickly and efficiently identify fraudulent activities that circumvent preventative measures. In this paper, we adopt a DesignScience methodological framework to develop a model for detection of vendor fraud based on analysis of patterns or signatures identified in enterprise system audit trails. The concept is demonstrated by developing prototype software. Verification of the prototype is achieved by performing a series of experiments. Validation is achieved by independent reviews from auditing practitioners. Key findings of …


Technology Corner Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle 2013 State University of New York

Technology Corner Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle

Journal of Digital Forensics, Security and Law

Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example: network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an …


A Simple Experiment With Microsoft Office 2010 And Windows 7 Utilizing Digital Forensic Methodology, Gregory H. Carlton 2013 California State Polytechnic University

A Simple Experiment With Microsoft Office 2010 And Windows 7 Utilizing Digital Forensic Methodology, Gregory H. Carlton

Journal of Digital Forensics, Security and Law

Digital forensic examiners are tasked with retrieving data from digital storage devices, and frequently these examiners are expected to explain the circumstances that led to the data being in its current state. Through written reports or verbal, expert testimony delivered in court, digital forensic examiners are expected to describe whether data have been altered, and if so, then to what extent have data been altered. Addressing these expectations results from opinions digital forensic examiners reach concerning their understanding of electronic storage and retrieval methods. The credibility of these opinions evolves from the scientific basis from which they are drawn using …


Information Security Challenge Of Qr Codes, Nik Thompson, Kevin Lee 2013 Murdoch University, Australia

Information Security Challenge Of Qr Codes, Nik Thompson, Kevin Lee

Journal of Digital Forensics, Security and Law

The discipline of information security must adapt to new technologies and methods of interaction with those technologies. New technologies present both challenges and opportunities for the security professional, especially for areas such as digital forensics. Challenges can be in the form of new devices such as smartphones or new methods of sharing information, such as social networks. One such rapidly emerging interaction technology is the use of Quick Response (QR) codes. These offer a physical mechanism for quick access to Web sites for advertising and social interaction. This paper argues that the common implementation of QR codes potentially presents security …


Book Review: Placing The Suspect Behind The Keyboard: Using Digital Forensics And Investigative Techniques To Identify Cybercrime Suspects, Thomas Nash 2013 Internet Crime against Children Task Force

Book Review: Placing The Suspect Behind The Keyboard: Using Digital Forensics And Investigative Techniques To Identify Cybercrime Suspects, Thomas Nash

Journal of Digital Forensics, Security and Law

In this must read for any aspiring novice cybercrime investigator as well as the seasoned professional computer guru alike, Brett Shaver takes the reader into the ever changing and dynamic world of Cybercrime investigation. Shaver, an experienced criminal investigator, lays out the details and intricacies of a computer related crime investigation in a clear and concise manner in his new easy to read publication, Placing the Suspect behind the Keyboard. Using Digital Forensics and Investigative techniques to Identify Cybercrime Suspects. Shaver takes the reader from start to finish through each step of the investigative process in well organized …


Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2), Damian Schofield, Ken Fowle 2013 State University of New York

Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2), Damian Schofield, Ken Fowle

Journal of Digital Forensics, Security and Law

Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example, network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an …


Risk Management Of Email And Internet Use In The Workplace, John Ruhnka, Windham E. Loopesko 2013 University of Colorado, Denver

Risk Management Of Email And Internet Use In The Workplace, John Ruhnka, Windham E. Loopesko

Journal of Digital Forensics, Security and Law

The article surveys the changing risk environment for corporations from their employees’ electronic communications. It identifies the types of liabilities that corporations can incur from such employee communications. It discusses the objectives of corporate internet use policies and the types of provisions such policies should contain. It suggests an alternative risk-based approach to corporate acceptable use policies instead of a traditional “laundry list” of internet use prohibitions.


How Often Is Employee Anger An Insider Risk Ii? Detecting And Measuring Negative Sentiment Versus Insider Risk In Digital Communications–Comparison Between Human Raters And Psycholinguistic Software, Eric Shaw, Maria Payri, Michael Cohn, Ilene R. Shaw 2013 Engineering Cost Group, NASA Marshall Space Flight Center

How Often Is Employee Anger An Insider Risk Ii? Detecting And Measuring Negative Sentiment Versus Insider Risk In Digital Communications–Comparison Between Human Raters And Psycholinguistic Software, Eric Shaw, Maria Payri, Michael Cohn, Ilene R. Shaw

Journal of Digital Forensics, Security and Law

This research uses two recently introduced observer rating scales, (Shaw et al., 2013) for the identification and measurement of negative sentiment (the Scale for Negativity in Text or SNIT) and insider risk (Scale of Indicators of Risk in Digital Communication or SIRDC) in communications to test the performance of psycholinguistic software designed to detect indicators of these risk factors. The psycholinguistic software program, WarmTouch (WT), previously used for investigations, appeared to be an effective means for locating communications scored High or Medium in negative sentiment by the SNIT or High in insider risk by the SIRDC within a randomly selected …


Digital Commons powered by bepress