College Student Home Computer Security Adoption, 2013 Central Washington University
College Student Home Computer Security Adoption, Chet L. Claar, Robert C. Shields, David Rawlinson, Robert Lupton
All Faculty Scholarship for the College of the Sciences
The home Internet user faces a hostile environment abundant in potential attacks on their computers. These attacks have been increasing at an alarming rate and cause damage to individuals and organizations regularly, and have the potential to cripple the critical infrastructures of entire countries. Recent research has determined that some individuals are not utilizing additional software protections available to mitigate these potential security risks. This paper seeks to clarify the reasons by proposing a conceptual framework that utilizes the Health Belief Model as a possible way to explain why some people do not perceive a threat sufficient to prompt the …
Tr-2013004: Transformations Of Matrix Structures Work Again, 2013 City University of New York (CUNY)
Tr-2013004: Transformations Of Matrix Structures Work Again, Victor Y. Pan
Computer Science Technical Reports
No abstract provided.
Tr-2013003: Polynomial Evaluation And Interpolation: Fast And Stable Approximate Solution, 2013 City University of New York (CUNY)
Tr-2013003: Polynomial Evaluation And Interpolation: Fast And Stable Approximate Solution, Victor Y. Pan
Computer Science Technical Reports
No abstract provided.
Tr-2013001: Randomized Augmentation And Additive Preprocessing, 2013 City University of New York (CUNY)
Tr-2013001: Randomized Augmentation And Additive Preprocessing, Victor Y. Pan, Guoliang Qian, Ai-Long Zheng
Computer Science Technical Reports
No abstract provided.
Tr-2013009: Algebraic Algorithms, 2013 City University of New York (CUNY)
Tr-2013009: Algebraic Algorithms, Ioannis Z. Emiris, Victor Y. Pan, Elias P. Tsigaridas
Computer Science Technical Reports
No abstract provided.
Tr-2013008: Information Transmission In Communication Games Signaling With An Audience, 2013 City University of New York (CUNY)
Tr-2013008: Information Transmission In Communication Games Signaling With An Audience, Farishta Satari
Computer Science Technical Reports
No abstract provided.
Tr-2013013: New Structured Matrix Methods For Real And Complex Polynomial Root-Finding, 2013 City University of New York (CUNY)
Tr-2013013: New Structured Matrix Methods For Real And Complex Polynomial Root-Finding, Victor Y. Pan, Ai-Long Zheng
Computer Science Technical Reports
No abstract provided.
Tr-2013014: New Structured Matrix Methods For Real And Complex Polynomial Root-Finding, 2013 City University of New York (CUNY)
Tr-2013014: New Structured Matrix Methods For Real And Complex Polynomial Root-Finding, Victor Y. Pan, Ai-Long Zheng
Computer Science Technical Reports
No abstract provided.
Tr-2013016: Supporting Genp With Random Multipliers, 2013 City University of New York (CUNY)
Tr-2013016: Supporting Genp With Random Multipliers, Victor Y. Pan, Guoliang Qian, Xiaodong Yan
Computer Science Technical Reports
No abstract provided.
Fair Cost Sharing Auction Mechanisms In Last Mile Ridesharing, 2013 Singapore Management University
Fair Cost Sharing Auction Mechanisms In Last Mile Ridesharing, Duc Thien Nguyen
Dissertations and Theses Collection (Open Access)
With rapid growth of transportation demands in urban cities, one major challenge is to provide efficient and effective door-to-door service to passengers using the public transportation system. This is commonly known as the Last Mile problem. In this thesis, we consider a dynamic and demand responsive mechanism for Ridesharing on a non-dedicated commercial fleet (such as taxis). This problem is addressed as two sub-problems, the first of which is a special type of vehicle routing problems (VRP). The second sub-problem, which is more challenging, is to allocate the cost (i.e. total fare) fairly among passengers. We propose auction mechanisms where …
Conversion Of Domain Type Enforcement Language To The Java Security Manager, 2013 Michigan Technological University
Conversion Of Domain Type Enforcement Language To The Java Security Manager, James Walker
Dissertations, Master's Theses and Master's Reports - Open
With today's prevalence of Internet-connected systems storing sensitive data and the omnipresent threat of technically skilled malicious users, computer security remains a critically important field. Because of today's multitude of vulnerable systems and security threats, it is vital that computer science students be taught techniques for programming secure systems, especially since many of them will work on systems with sensitive data after graduation. Teaching computer science students proper design, implementation, and maintenance of secure systems is a challenging task that calls for the use of novel pedagogical tools. This report describes the implementation of a compiler that converts mandatory access …
An Experience-Driven Pedagogy For The Instruction Of Software Testing In Computer Science, 2013 Michigan Technological University
An Experience-Driven Pedagogy For The Instruction Of Software Testing In Computer Science, Christopher Duane Brown
Dissertations, Master's Theses and Master's Reports - Open
In the realm of computer programming, the experience of writing a program is used to reinforce concepts and evaluate ability. This research uses three case studies to evaluate the introduction of testing through Kolb's Experiential Learning Model (ELM). We then analyze the impact of those testing experiences to determine methods for improving future courses.
The first testing experience that students encounter are unit test reports in their early courses. This course demonstrates that automating and improving feedback can provide more ELM iterations. The JUnit Generation (JUG) tool also provided a positive experience for the instructor by reducing the overall workload. …
Automating Vendor Fraud Detection In Enterprise Systems, 2013 Griffith University, Australia
Automating Vendor Fraud Detection In Enterprise Systems, Kishore Singh, Peter Best, Joseph Mula
Journal of Digital Forensics, Security and Law
Fraud is a multi-billion dollar industry that continues to grow annually. Many organizations are poorly prepared to prevent and detect fraud. Fraud detection strategies are intended to quickly and efficiently identify fraudulent activities that circumvent preventative measures. In this paper, we adopt a DesignScience methodological framework to develop a model for detection of vendor fraud based on analysis of patterns or signatures identified in enterprise system audit trails. The concept is demonstrated by developing prototype software. Verification of the prototype is achieved by performing a series of experiments. Validation is achieved by independent reviews from auditing practitioners. Key findings of …
Technology Corner Visualising Forensic Data: Evidence (Part 1), 2013 State University of New York
Technology Corner Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle
Journal of Digital Forensics, Security and Law
Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example: network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an …
A Simple Experiment With Microsoft Office 2010 And Windows 7 Utilizing Digital Forensic Methodology, 2013 California State Polytechnic University
A Simple Experiment With Microsoft Office 2010 And Windows 7 Utilizing Digital Forensic Methodology, Gregory H. Carlton
Journal of Digital Forensics, Security and Law
Digital forensic examiners are tasked with retrieving data from digital storage devices, and frequently these examiners are expected to explain the circumstances that led to the data being in its current state. Through written reports or verbal, expert testimony delivered in court, digital forensic examiners are expected to describe whether data have been altered, and if so, then to what extent have data been altered. Addressing these expectations results from opinions digital forensic examiners reach concerning their understanding of electronic storage and retrieval methods. The credibility of these opinions evolves from the scientific basis from which they are drawn using …
Information Security Challenge Of Qr Codes, 2013 Murdoch University, Australia
Information Security Challenge Of Qr Codes, Nik Thompson, Kevin Lee
Journal of Digital Forensics, Security and Law
The discipline of information security must adapt to new technologies and methods of interaction with those technologies. New technologies present both challenges and opportunities for the security professional, especially for areas such as digital forensics. Challenges can be in the form of new devices such as smartphones or new methods of sharing information, such as social networks. One such rapidly emerging interaction technology is the use of Quick Response (QR) codes. These offer a physical mechanism for quick access to Web sites for advertising and social interaction. This paper argues that the common implementation of QR codes potentially presents security …
Book Review: Placing The Suspect Behind The Keyboard: Using Digital Forensics And Investigative Techniques To Identify Cybercrime Suspects, 2013 Internet Crime against Children Task Force
Book Review: Placing The Suspect Behind The Keyboard: Using Digital Forensics And Investigative Techniques To Identify Cybercrime Suspects, Thomas Nash
Journal of Digital Forensics, Security and Law
In this must read for any aspiring novice cybercrime investigator as well as the seasoned professional computer guru alike, Brett Shaver takes the reader into the ever changing and dynamic world of Cybercrime investigation. Shaver, an experienced criminal investigator, lays out the details and intricacies of a computer related crime investigation in a clear and concise manner in his new easy to read publication, Placing the Suspect behind the Keyboard. Using Digital Forensics and Investigative techniques to Identify Cybercrime Suspects. Shaver takes the reader from start to finish through each step of the investigative process in well organized …
Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2), 2013 State University of New York
Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2), Damian Schofield, Ken Fowle
Journal of Digital Forensics, Security and Law
Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example, network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an …
Risk Management Of Email And Internet Use In The Workplace, 2013 University of Colorado, Denver
Risk Management Of Email And Internet Use In The Workplace, John Ruhnka, Windham E. Loopesko
Journal of Digital Forensics, Security and Law
The article surveys the changing risk environment for corporations from their employees’ electronic communications. It identifies the types of liabilities that corporations can incur from such employee communications. It discusses the objectives of corporate internet use policies and the types of provisions such policies should contain. It suggests an alternative risk-based approach to corporate acceptable use policies instead of a traditional “laundry list” of internet use prohibitions.
How Often Is Employee Anger An Insider Risk Ii? Detecting And Measuring Negative Sentiment Versus Insider Risk In Digital Communications–Comparison Between Human Raters And Psycholinguistic Software, 2013 Engineering Cost Group, NASA Marshall Space Flight Center
How Often Is Employee Anger An Insider Risk Ii? Detecting And Measuring Negative Sentiment Versus Insider Risk In Digital Communications–Comparison Between Human Raters And Psycholinguistic Software, Eric Shaw, Maria Payri, Michael Cohn, Ilene R. Shaw
Journal of Digital Forensics, Security and Law
This research uses two recently introduced observer rating scales, (Shaw et al., 2013) for the identification and measurement of negative sentiment (the Scale for Negativity in Text or SNIT) and insider risk (Scale of Indicators of Risk in Digital Communication or SIRDC) in communications to test the performance of psycholinguistic software designed to detect indicators of these risk factors. The psycholinguistic software program, WarmTouch (WT), previously used for investigations, appeared to be an effective means for locating communications scored High or Medium in negative sentiment by the SNIT or High in insider risk by the SIRDC within a randomly selected …