46 results on '"Wimmer, Hayden"'
Search Results
2. Hour of Code: A Study of Gender Differences in Computing
- Author
-
Du, Jie and Wimmer, Hayden
- Abstract
Computer programmers in the U.S. labor force are facing a shortage. Focusing on recruiting females has the potential to address this shortage. Computing is a male dominated field which provides an opportunity to recruit the other 50% of the population, females, to fill the open positions. This work studies gender differences in computer programming based on an Hour of Code tutorial. Following a pre- and post-test design, this work demonstrates that males have significantly more previous exposure to computer programming and are significantly more interested in pursuing computer programming. Results also indicate that females do equally as well or better in programming comprehension. In one comprehension question following the tutorial, women significantly outperformed men demonstrating that women may have a higher aptitude for computer programming; however, they are underrepresented in the job market. Based on our results, we suggest that more should be done in early formative years to attract females into computer programming to aid in filling the gap of the projected employment market.
- Published
- 2019
3. 'Hour of Code': A Case Study
- Author
-
Du, Jie, Wimmer, Hayden, and Rada, Roy
- Abstract
This study investigates the delivery of the "Hour of Code" tutorials to college students. The college students who participated in this study were surveyed about their opinion of the Hour of Code. First, the students' comments were discussed. Next, a content analysis of the offered tutorials highlights their reliance on visual programming in stylized languages with continual feedback in gaming contexts. Difficulties in delivery stem in part from the poor organization of tutorials from Code.org which makes it difficult to locate suitable tutorials. Based on the analysis of the students' comments and the content analysis of the "Hour of Code" tutorials, the authors suggest that a deeper alignment of marketing, teaching organizations, and content providers would help sustain the type of initiative exemplified by the Hour of Code.
- Published
- 2018
4. Parental Perceptions and Recommendations of Computing Majors: A Technology Acceptance Model Approach
- Author
-
Powell, Loreen and Wimmer, Hayden
- Abstract
Currently, there are more technology related jobs then there are graduates in supply. The need to understand user acceptance of computing degrees is the first step in increasing enrollment in computing fields. Additionally, valid measurement scales for predicting user acceptance of Information Technology degree programs are required. The majority of existing research regarding methods for increasing enrollment focus on subjective measures that are often invalid or invalidated. This research study adapts a well-known, validated and established user acceptance of information technology model (TAM) developed by Davis in 1989. The TAM model was adapted to understand factors for the acceptance of information technology and was based on the long standing Theory of Reasoned Action from behavioral psychology. This work adapts TAM to explore factors that influence parents' decision to recommend Information Technology as a Major to their children. Since parents have a high degree of influence over the major selection of their children, determining factors for recommending IT as a major can assist IT programs in improved marketing to increase enrollment. In this work, we hypothesize that perceived usefulness (PU) and perceived ease of use (PEoU) will impact a parent's likelihood of recommending IT as a major to their children. Results revealed parent's perception of the perceived usefulness of IT (PU) affected their willingness to recommend IT as a major to their children; conversely, parents were not concerned with the ease of use of IT (PEoU). Implications include improved marketing of IT programs to parents by focusing on the usefulness of IT as a discipline.
- Published
- 2017
5. Network Intrusion Detection System with Machine Learning as a Service.
- Author
-
Kangethe, Loma, Wimmer, Hayden, and Rebman Jr., Carl M.
- Subjects
MACHINE learning ,INTRUSION detection systems (Computer security) ,CLOUD computing ,BIG data ,DECISION trees - Abstract
Cloud Computing and Big Data continue to be disruptive forces in computing and has introduced new threats and vulnerabilities to our networks. The paper seeks to demonstrate how an end-to-end network intrusion detection system can be built, trained, and deployed using Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP). We determined the performance of these tools by building a network intrusion detection system (NIDS) and evaluating the performance of each based on precision, accuracy, F1 Score, recall, user experience, cost and computation time for training and predicting the model. Overall, all three platforms performed greater than 90% accuracy with Google Vertex AI having the highest accuracy using the decision tree and Microsoft Azure performing the best based on accuracy, precision, and computation time. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Evaluating Students' Perception of Group Work for Mobile Application Development Learning, Productivity, Enjoyment and Confidence in Quality
- Author
-
Powell, Loreen M. and Wimmer, Hayden
- Abstract
Teaching programming and mobile application development concepts can be challenging for instructors; however, teaching an interdisciplinary class with varied skill levels amplifies this challenge. To encompass a broad range of students, many instructors have sought to improve their lessons and methods by experimenting with group/team programming. However, these studies focused on the instructor's usage of the method and not the students' perceptions of the method. This study was conducted to understand students' perceptions regarding the effectiveness of the student's group/team experience and learning outcomes when developing a mobile application. Results were favorable towards using group work for mobile application development learning, productivity, enjoyment and confidence of quality.
- Published
- 2016
7. A Technical Infrastructure to Integrate Dynamics AX ERP and CRM into University Curriculum
- Author
-
Wimmer, Hayden and Hall, Kenneth
- Abstract
Enterprise Resource Planning and Customer Relationship Management are becoming important topics at the university level, and are increasingly receiving course-level attention in the curriculum. In fact, the Information Systems Body of Knowledge specifically identifies Enterprise Architecture as an Information Systems-specific knowledge area. The revised Information Systems Curriculum Guide from 2010, sponsored by the Association of Information Systems and the Association of Computing Machinery, suggest Enterprise Architecture as a required course with Enterprise Systems and Business Process Management as suggested electives. Implementing the aforementioned courses into the curriculum poses challenges such as providing necessary resources, overcoming institutional constraints, and the lack of hardware architecture for advanced systems such as Microsoft Dynamics AX. This work addresses three critical issues. First, we provide a suggested technical architecture built upon the Windows Server family and Dynamics AX which may be used to implement ERP and CRM, based on Dynamics AX, into the classroom. Second, we demonstrate connectivity between an installation of Dynamics AX 2012 R3 and CRM 2011 in the cloud using the Microsoft Connector for Dynamics. Finally, we suggest a sample scenario and case for implementing ERP and CRM concepts into the university curriculum.
- Published
- 2016
8. Evaluating the Effectiveness of Self-Created Student Screencasts as a Tool to Increase Student Learning Outcomes in a Hands-On Computer Programming Course
- Author
-
Powell, Loreen M. and Wimmer, Hayden
- Abstract
Computer programming is challenging to teach and difficult for students to learn. Instructors have searched for ways to improve student learning in programming courses. In an attempt to foster hands-on learning and to increase student learning outcomes in a programming course, the authors conducted an exploratory study to examine student created screencasts and their impact on students' performance regarding specific learning outcomes in a hands-on programming course. This study was conducted over four semesters when an instructor taught two sections of the course per semester; one section generated self created student screencasts in-class and the other section did not. The subjects were undergraduate business students enrolled in an upper level applications/programming course at a university in Pennsylvania State System of Higher Education system. The experimental method was used to compare the differences in graded classroom activities, theory assessments, lab assessments, and final exam scores between the classes. Results showed that students who created screencasts while following along with the instructors step by step programming instructions as well as created screencast while independently working significantly (p<0.05) performed more successful on theory assessments, lab assessments, and the final exam scores verses those students that did not.
- Published
- 2015
9. An improved transformer‐based model for detecting phishing, spam and ham emails: A large language model approach.
- Author
-
Jamal, Suhaima, Wimmer, Hayden, and Sarker, Iqbal H.
- Subjects
- *
SOCIAL engineering (Fraud) , *LANGUAGE models , *ARTIFICIAL intelligence , *CYBER intelligence (Computer security) , *PHISHING , *SPAM email - Abstract
Phishing and spam have been a cybersecurity threat with the majority of breaches resulting from these types of social engineering attacks. Therefore, detection has been a long‐standing challenge for both academic and industry researcher. New and innovative approaches are required to keep up with the growing sophistication of threat actors. One such illumination which has vast potential are large language models (LLM). LLM emerged and already demonstrated their potential to transform society and provide new and innovative approaches to solve well‐established challenges. Phishing and spam have caused financial hardships and lost time and resources to email users all over the world and frequently serve as an entry point for ransomware threat actors. While detection approaches exist, especially heuristic‐based approaches, LLMs offer the potential to venture into a new unexplored area for understanding and solving this challenge. LLMs have rapidly altered the landscape from business, consumers, and throughout academia and demonstrate transformational potential to profoundly impact the society. Based on this, applying these new and innovative approaches to email detection is a rational next step in academic research. In this work, we present IPSDM, an improved phishing spam detection model based on fine‐tuning the BERT family of models to specifically detect phishing and spam emails. We demonstrate our fine‐tuned version, IPSDM, is able to better classify emails in both unbalanced and balanced datasets. Moreover, IPSDM consistently outperforms the baseline models in terms of classification accuracy, precision, recall, and F1‐score, while concurrently mitigating overfitting concerns. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Data Analytics Position Description Analysis: Skills Review and Implications for Data Analytics Curricula.
- Author
-
Booker, Queen E., Rebman Jr., Carl M., Wimmer, Hayden, Levkoff, Steve, Powell, Loreen, and Breese, Jennifer
- Subjects
JOB descriptions ,DATA scrubbing ,JOB postings ,SOFT skills ,SOCIAL skills - Abstract
The focus of this study was to assess the skill requirements for data analytics positions and to understand data analysis employment expectations for new graduates. Furthermore, this work seeks to highlight issues relevant to curriculum management in university degree programs. 786 job postings were analyzed for domain-related, soft skills, as well as degree requirements. Soft skills, often referred to as people skills, comprised the largest part of the results (11 of the top 21 skills). Results revealed the most frequent soft skills were related to communication and teams or teamwork. The most frequent domain skills were related to visualization, data cleaning, data extraction and programming. Implications for curriculum based on results are discussed, and suggestions for future research are provided. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Counterfeit product detection: Bridging the gap between design science and behavioral science in information systems research
- Author
-
Wimmer, Hayden and Yoon, Victoria Y.
- Published
- 2017
- Full Text
- View/download PDF
12. Linked data scientometrics in semantic e-Science
- Author
-
Narock, Tom and Wimmer, Hayden
- Published
- 2017
- Full Text
- View/download PDF
13. Impact of Online Discussions on Web Based Assessments
- Author
-
Powell, Loreen M., Wimmer, Hayden, Kilgus, Lawrence, and Force, Christina
- Abstract
The practice of including online discussion posts to traditional courses is increasing. Online discussions allow for active learning to occur as students express their ideas and respond to others. The time and thought provided by online discussion posts allows students to utilize higher level cognitive skills. Web-based assessments are another technology tool that instructors are including in their courses. This study examined the impact of online discussion posts on achievement of web-based assessments for an upper level undergraduate business and technology writing intensive course. Using a treatment group and a control group, student achievement scores for the online assessments were measured. Results indicate that assessed grades of the treatment groups were higher than the control group, however statistical significance was mixed among the web assessments. The results further illustrate the need for additional research into online discussions applied to web-based assessments.
- Published
- 2017
- Full Text
- View/download PDF
14. Perception and evaluation of text-to-image generative AI models: a comparative study of DALL-E, Google Imagen, GROK, and Stable Diffusion.
- Author
-
Jamal, Suhaima, Wimmer, Hayden, and Rebman Jr., Carl M.
- Subjects
GENERATIVE artificial intelligence ,STABLE Diffusion ,COMPUTER vision ,ARTIFICIAL intelligence ,MATHEMATICAL formulas - Abstract
Generative Artificial Intelligence (AI) model is a revolutionary type of AI capable of producing high quality images based on textual inputs. These models utilize natural language processing (NLP) techniques and computer vision to understand and interpret the textual descriptions and then generate images that align with the given descriptions. This study evaluates four prominent text-to-image generative models- DALL-E, Google Imagen, Stable Diffusion, and GROK AI emphasizing on the text-to-image diffusion models. Using a comprehensive evaluation approach, we employ three mathematical formulas the Fréchet Inception Distance (FID), Structural Similarity Index (SSIM), and Peak Signal-to-Noise Ratio (PSNR) to assess image quality and realism across datasets collected from these AI platforms. Additionally, human evaluations are conducted to compare the perceptual impact of AI-generated images with mathematical metrics. Our findings highlight the varying degrees of perceived realism among different image generative With AI models, DALL-E and Imagen generally being perceived as more realistic than Stable Diffusion and GROK. As examined, human evaluation is the current gold standard in text-to-image evaluation; however, mathematical based metrics also have promise and value. Our findings contribute to the advancement of text-to-image synthesis and our results provide support for FID as the gold standard evaluation method as it most closely represented human evaluation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Using Textual Analytics to Process Information Overload of Cyber Security Subreddits.
- Author
-
Omakwu, Stephanie, Wimmer, Hayden, and Rebman Jr., Carl M.
- Subjects
INFORMATION overload ,INTERNET security ,DIGITAL technology ,INFORMATION processing ,COMPUTER hacking - Abstract
Increases in digitalization have made it possible to track and measure every click, every payment, every message, and almost everyone's daily thoughts. Companies are extremely interested in the robustness of this data, specifically regarding understanding the sentiment of consumers. Yet the amount of information being produced and processed is quite staggering causing information overload. As such, companies tend to fall into analysis paralysis which can result in missing important insights that could help their business. The goal of this study is to analyze and categorize the top posts on multiple hacking subreddits to determine the most discussed topics and to examine the sentiment of these posts expressed by the users. We began by scraping data, specifically the title, ID, score, comments, and URL for each top post from multiple hacking subreddit communities. We then used the Natural Language Toolkit (NLTK) to perform the data preprocessing techniques for an effective analytic process and bias-free results. The results of the testing allowed us to filter through the posts and determine whether sentiment was positive, negative, or neutral. In the case of the hacking subreddits, many of the posts were of a neutral opinion. This study aims to provide a contribution by utilizing Natural Language Processing methods Topic Modeling such as Term Frequency Inverse Document Frequency, Latent Semantic Analysis (LSA) algorithm, and Sentiment Analysis to gather and synthesize cybersecurity data. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. A multi-agent system to support evidence based medicine and clinical decision making via data sharing and data privacy
- Author
-
Wimmer, Hayden, Yoon, Victoria Y., and Sugumaran, Vijayan
- Published
- 2016
- Full Text
- View/download PDF
17. 'Hour of Code': Can It Change Students' Attitudes toward Programming?
- Author
-
Du, Jie, Wimmer, Hayden, and Rada, Roy
- Abstract
The Hour of Code is a one-hour introduction to computer science organized by Code.org, a non-profit dedicated to expanding participation in computer science. This study investigated the impact of the Hour of Code on students' attitudes towards computer programming and their knowledge of programming. A sample of undergraduate students from two universities was selected to participate. Participants completed an Hour of Code tutorial as part of an undergraduate course. An electronic questionnaire was implemented in a pre-survey and post-survey format to gauge the change in student attitudes toward programming and their programming ability. The findings indicated the positive impact of the Hour of Code tutorial on students' attitude toward programming. However, the students' programming skills did not significantly change. The authors suggest that a deeper alignment of marketing, teaching, and content would help sustain the type of initiative exemplified by the Hour of Code.
- Published
- 2016
18. Facial expressions analysis for deep fake and genuine video recognition.
- Author
-
Onisha, Tasnim Akter, Wimmer, Hayden, and Rebman Jr., Carl M.
- Subjects
EMOTION recognition ,DEEPFAKES ,EMOTIONS ,FACIAL expression ,TRUST - Abstract
Facial Expression analysis (FEA) is a process that involves recognition and understanding of human emotions based on facial cues. While FEA has potential applications in various field, this can also be misused, leading to the spread of misinformation through deepfake technology. This research aims to evaluate the effectiveness of facial expressions in distinguishing between deepfake and genuine videos, addressing the gap in how well FEA can identify manipulated contents. To address this issue, a research experiment was conducted to gain an insight into how people react towards deepfake and authentic contents. Respondents were shown videos and an analysis was conducted on participant's facial expressions as well as assessing their knowledge of deepfake detection. A survey was designed to test their confidence with the level of deepfake and authentic video identification, trust, security, and attitude towards them. Facial expressions were analyzed using Noldus FaceReader 7 to detect and classify 7 facial expressions (such as happy, sad, neutral, angry, surprised, disgusted, and other). The study findings indicate that FaceReader analysis discerns a statistically significant difference in emotional responses between real and deepfake videos, while participants reported a higher percentage of neutrality (70% vs. 62.5%) in real videos compared to deepfakes. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. A Comparative Analysis of Digital Marketing Online Synchronous Course Delivery With and Without Virtual Reality Software.
- Author
-
Mariani, Ronda, Wimmer, Hayden, Powell, Loreen, and Tanner, Thomas
- Subjects
VIRTUAL reality software ,COMMUNICATIVE competence ,INTERNET marketing ,ONLINE education ,MARKETING research ,SOFTWARE frameworks - Abstract
Virtual reality (VR) in education has gained momentum in recent years, presenting both promises and challenges. This technology can be found in many areas of learning, but its use is deficient in marketing education. VR technology has improved to offer many choices and is within reach regarding cost and implementation. This study presents and reviews several VR technology software choices and a framework for implementation within digital marketing course instruction. It also investigates the impact of VR on marketing student abilities and perceptions within synchronized online digital marketing courses, focusing on problem-solving, communication skills, course materials rating, and overall course rating. The research aligns with previous findings that suggest VR positively influences problem-solving and communication skills. Student ratings and comments indicated positive student sentiment. The findings underscore the positive impact of VR on student sentiment, satisfaction, and course quality. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. Good versus bad knowledge: Ontology guided evolutionary algorithms
- Author
-
Wimmer, Hayden and Rada, Roy
- Published
- 2015
- Full Text
- View/download PDF
21. An Industry Survey of Analytics Spreadsheet Tools Adoption: Microsoft Excel vs Google Sheets.
- Author
-
Rebman Jr., Carl M., Booker, Queen E., Wimmer, Hayden, Levkoff, Steve, McMurtrey, Mark, and Powell, Loreen Marie
- Subjects
DATA analytics ,BUSINESS development ,CURRICULUM - Abstract
Spreadsheets have long played a key role in business decisions and operations. The use and adoption of data analytics has substantially increased over the last few years and amplified this role. Spreadsheets are often a first tool for data analytics as such applications provide ease of calculation with basic statistics and chart development. For much of the last two decades universities have provided training in Microsoft Excel because that was what companies used and demanded. Since mid-2020, there has been an increase in use of Google Sheets causing some faculty to believe that MS Excel should be replaced. Faculty should always be aware of current and future employer demands and ensure programs meet the expectations of both employers and recent graduates. This study reviews business job postings seeking employees with two or fewer years of work experience between 2019 and 2021 and examines demand for spreadsheet application experience. Results overwhelmingly indicate that Microsoft Excel still is the most required spreadsheet application by employers. Faculty should pause before changing MS Excel training or removing certifications. [ABSTRACT FROM AUTHOR]
- Published
- 2023
22. Higher education enrollment crisis: the importance of examining student's choice of modality.
- Author
-
Powell, Loreen, Wimmer, Hayden, Rebman Jr., Carl M., Hendon, Michalina, and Mariani, Ronda
- Subjects
HIGHER education ,SCHOOL enrollment ,STUDENT registration ,ONLINE education ,CRISES - Abstract
As a result of the health pandemic, the United States (U.S.) has experienced a labor shortage and a decrease in higher education retention and enrollment which has many educational institutions in a crisis mode as they rapidly search for guaranteed sustainable long-term student enrollment. Numerous research studies have explored students' viewpoints through surveys or focus groups to investigate their preferences regarding online or in-person courses. However, there has not been a research study that has examined the post pandemic registration process of student enrollment data over a traditional scheduling period to determine their unbiased preference in modality offerings. More specifically, when students are given a choice to enroll in an online or face-to-face course, which modality do they independently choose? Student enrollment data collected from a publicly accessible website starting from the first day for priority students and continuing throughout the entire registration period for business and technology courses. Results revealed a significant difference between student enrollment for online versus face-to-face courses. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
23. Text Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems.
- Author
-
Wimmer, Hayden, Jie Du, and Hui, Peter
- Subjects
ARTIFICIAL intelligence ,NATURAL language processing ,COMPUTER systems ,COMPUTER input-output equipment ,HUMAN beings - Abstract
Natural language Processing is a discipline under artificial intelligence that involves interaction between human language and computer systems. It involves analyzing and representation of natural language, the ability to comprehend both text and spoken words. Natural language processing has evolved to the extent of having the ability to give useful responses to human beings. Large language models have been making landmark advances with new more efficient algorithms and improved hardware and processing power. Models like Google's BERT power predictive text in search predictions. Recently, companies have been training models on billions of parameters, a task that was not feasible just a few short years ago. OpenAI is the market leader in this technology; however, competitors have emerged. This research project aims to investigate perceptions of OpenAI versus an emerging competitor, AI21 on the ability to answer questions and predict text. We developed two web applications that allowed users to key in any questions or text in the textbox, the web application will then answer the user query as a response. The web applications were embedded with Jurassic-1 language model API and the GPT-3 language model APIs. Subjects asked the AI systems questions and rated their perceptions of the results. Furthermore, we investigate perceived privacy of AI systems via a post survey. [ABSTRACT FROM AUTHOR]
- Published
- 2023
24. Node.js or PhP? Determining the better website server backend scripting language.
- Author
-
Odeniran, Qozeem, Wimmer, Hayden, and Rebman Jr., Carl M.
- Subjects
WEB-based user interfaces ,TIME complexity ,SCALABILITY ,SCRIPTS ,SOFTWARE engineers - Abstract
Most people interact with websites expecting them to perform quick results and provide quick responses to their requests and many do not realize the performance is due to server side or backend programming. There are several types of backend web framework/scripting technologies. Programmers and developers often debate over which is the technologies is the better solution. Most debates are based on various dimensions such as performance, scalability, and architecture. The most common factor for settling the debate or choosing the most appropriate frameworks tends to be the performance dimension. This study assesses the performance of both Node.js and PHP by implementing well-known algorithms of binary, bubble, and quick sort along with Heap’s algorithm for permutations. These algorithms were selected for their increasing time complexities which allows us to observe the performance differences between the backend framework/scripting. By comparing the performance of these two backend scripting technologies, one can gain a better understanding of the circumstances when migrating from PHP to Node.js would be beneficial. Our results showed that a significant difference occurs in the performance of PHP and Node.js and specifically, Node.js outperformed PHP in terms of latency and other performance metrics. This study provides valuable information for software engineers, developers, and managers who are seeking the best framework for their web applications. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
25. Botnet intrusion detection: A modern architecture to defend a virtual private cloud.
- Author
-
Brison, Robert, Wimmer, Hayden, and Rebman Jr., Carl M.
- Subjects
BOTNETS ,MODERN architecture ,CYBERTERRORISM ,ARTIFICIAL intelligence ,COMPUTER network security ,VIRTUAL reality - Abstract
Advances in artificial intelligence (AI), technology integration, and cloud computing, has resulted in an increase of cybersecurity attacks by botnets over the last few years. Attackers use botnets to overwhelm and compromise networks with a goal of disrupting services or operations, stealing credentials, gaining unauthorized access to critical systems, or to obtain information for theft or ransom. The rise in this AI technology has made the job of protecting networks more challenging for network security analysis and professionals. The migration of companies and organizations into the chaotic cloud environment has really given new power to the botnets that is visualized best by scenes in any of matrix movies. One of the best methods of protection of any network or resource is early detection, which can prevent a network from being compromised or minimizing damage to the network. Two modern tools used in network security are Intrusion Detection Systems (IDS), and Security Incident and Event Management (SEIM) systems. This study proposes and tests a modern architecture to detect Botnet traffic through the implementation of modern security devices to defend against a configured local Botnet in a virtual cloud environment. Our model was successful in detecting and preventing botnet attacks. The model also allowed for the attack data to be stored and classified for report generation. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
26. Exploring Blockchain Performance with CPUHEAVY Microbenchmark on Smart Contracts.
- Author
-
Egbedion, Beloved, Wimmer, Hayden, and Rebman, Carl M.
- Subjects
BLOCKCHAINS ,ALGORITHMS ,BITCOIN ,PERFORMANCE technology ,MACHINE performance ,BANKING industry - Abstract
Blockchain is an emerging technology that has many uses and applications among many industries such as banking, education, and tourism. It has proven over time to be more cryptographically secure than traditional databases. Many people confuse Bitcoin with Blockchain. Because of the considerable value of Bitcoins, people have the perception that blockchain technology requires large computing infrastructure and power due to CPU bottleneck challenges. This paper presents the process used in testing blockchain technology performance on a virtual machine by focusing on benchmarking workloads like CPUHeavy using Ethereum blockchain and comparing two different algorithm sorts, Quick and bubble. The results of the testing indicate that blockchain workloads can be performed on smaller machines with very little CPU bottlenecks. In addition, performance test outcomes found that the CPUHeavy and Quicksort was more superior. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
27. Security Analysis of the Amazon Echo Dot.
- Author
-
Brinson, Robert, Wimmer, Hayden, and Booker, Queen
- Subjects
AMAZON Echo ,INTERNET access ,INTERNET of things ,OPPORTUNITY costs ,PERSONALLY identifiable information - Abstract
Internet of Things (IoT) devices have the capacity to send data over Internet connections with small amounts of processing memory, limiting their ability to offer state-of-the art security functions. Because IoT devices can connect to so many different devices, the limited security makes them vulnerable to several types of attacks that could lead to access to sensitive personal data. Amazon introduced the Echo Dot in 2016 as a lower cost alternative to the popular Echo, making the Echo Dot available to many more households concomitantly increase the number of vulnerable households. Because of its potential reach, it is important to know if the Echo Dot is a secure device. In this study, we examine the vulnerability of the Echo Dot and compare our results to prior research on the Echo. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
28. Awareness of blockchain usage, structure, & generation of platform’s energy consumption: Working towards a greener blockchain.
- Author
-
Powell, Loreen M., Hendon, Michalina, Mangle, Andrew, and Wimmer, Hayden
- Subjects
ENERGY consumption ,BLOCKCHAINS ,DISRUPTIVE innovations ,AWARENESS ,INFORMATION technology - Abstract
Blockchain is a disruptive information technology innovation with energy consumption. As more organizations look to implement or embrace blockchain innovations, research must focus on making the blockchain greener. This research explores the current innovative blockchain usage, structure, generations, and energy consumption. An energy consumption comparison for consensus protocols is provided along with a list of recommendations for implementing green blockchains. This paper provides a significant impact upon previous literature and aids organizations considering implementing a green blockchain. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
29. A COMPARATIVE ANALYSIS OF BUSINESS AND NON-BUSINESS STUDENTS AWARENESS OF IOT DEVICES AND SECURITY PRACTICES: AN EXPLORATORY STUDY.
- Author
-
Booker, Queen E., Rebman, Carl M., and Wimmer, Hayden
- Subjects
BUSINESS students ,INTERNET of things ,COMPARATIVE studies ,AWARENESS ,BIOMETRIC identification ,COLLEGE students - Abstract
The Internet of Things (IoT), through its interconnected devices, are designed to make our lives easier. Many students own and consistently use smart devices that are part of the IoT family. However, this ease of use comes with security issues such as lower encryption, authentication and identity management. This study examines student awareness of IoT devices and security practices for protecting oneself when using them. The study finds that students are largely unaware of devices that are considered part of IoT or what are the security best practices. The implication from the exploratory study is that educational opportunities should be added to the curriculum to ensure students across the University are aware of both technologies as they may someday be a consumer or developer of IoT technologies. [ABSTRACT FROM AUTHOR]
- Published
- 2020
30. PHPBB3 BULLETIN BOARD SECURITY TESTING.
- Author
-
Patel, Nishitkumar, Wimmer, Hayden, and Powell, Loreen Marie
- Subjects
WEB-based user interfaces ,SQL - Abstract
Use of web applications and electronic bulletin board systems has become increasingly popular and plays an important role in our day to day life. Today, users want to read, post, and respond to just about everything they can on the Internet. The problem is that many web applications and bulletin board platforms contain sensitive data that hackers try to exploit and steal useful information. The applied research examines the security of the phpBB3 platform by performing five security attacks (packet sniffing, forum spamming, session hijacking, SQL injection, and XSS scripting). The results revealed successfully security breaches and vulnerabilities exists within the phpBB3 platform. Based upon these result, this research provided recommends and countermeasures to reduce the vulnerabilities and improve phpBB3 security. [ABSTRACT FROM AUTHOR]
- Published
- 2020
31. LEARNER SECURITY & PRIVACY RISKS: HOW USAGE OF ONLINE SOCIAL MEDIA OUTSIDE A LEARNING MANAGEMENT SYSTEM AFFECTS LEARNERS' DIGITAL IDENTITY.
- Author
-
Powell, Loreen M., Wimmer, Hayden, Rebman, Carl, and Abdul al, Chaza
- Subjects
LEARNING Management System ,SOCIAL media in education ,SOCIAL media ,DATA security ,PRIVACY ,LEARNING - Abstract
Millennial learners are the first group of learners to grow up using social media on a daily basis. Consequently, educators often seek to incorporate social media applications and tools in their efforts to engage the learner in the learning process. Unfortunately, one challenge is that most social applications are constantly connected to the Internet and thus are susceptible to security attacks and abuse of data. There seems to be a limited amount of research on the security and data privacy risks of using open or free social media application and tools outside of a secure learning management system (LMS). This paper examined seven common online social media applications, typically used by educators outside of a LMS, for existing data privacy security settings. Specifically this research investigated if secured and un-secured content posted appeared in a simple google search. The results revealed that content posted was easily found when the data privacy options were turned off. These results imply that a learner's digital identity may be affected for potential employers, significant others, friends, or educators when they are googling information to learn more about them. This research provides an important foundation for future research on how required usage of online social media applications outside a LMS affects the learners' digital identity. [ABSTRACT FROM AUTHOR]
- Published
- 2019
32. EXAMINING A DEEP LEARNING NETWORK SYSTEM FOR IMAGE IDENTIFICATION AND CLASSIFICATION FOR PREVENTING UNAUTHORIZED ACCESS FOR A SMART HOME SECURITY SYSTEM.
- Author
-
Egbedion, Beloved, Wimmer, Hayden, Rebman Jr., Carl M., and Powell, Loreen M.
- Subjects
HOME automation ,SYSTEM identification ,IDENTIFICATION ,SECURITY systems ,DEEP learning ,IMAGING systems ,INSTRUCTIONAL systems ,SOLAR houses - Abstract
There are many different smart home surveillance and control systems, which will need some type of visual identification and classification system. Past models of Deep Learning have had great success in visual identification and image classification particularly in the healthcare and security industries. This study reviews past architecture and applications of Deep Learning and Convolutional Neural Networks. This paper then presents the creation, process, testing, and results of a CNN model with the end objective of identifying images for determination of access rights. Evaluation outcomes show that after 50 forward and backward dataset training passes the deep learning network achieved an identification accuracy of 96.7% and a 98.0% probability of proper classification of access authorization. The results suggest that deep learning models could be successful in strengthening smart home security systems. [ABSTRACT FROM AUTHOR]
- Published
- 2019
33. CYBER-SECURITY INSTRUCTIONAL TECHNOLOGY DESIGN.
- Author
-
Carrie, Billy, Wimmer, Hayden, Powell, Loreen, and Rebman, Carl
- Subjects
EDUCATIONAL technology ,INSTRUCTIONAL systems design ,DESIGN & technology ,COMPUTER software security ,COMPUTER network security ,MULTIPLE intelligences ,UNIVERSAL design ,EMAIL security - Abstract
As the use of innovative technologies continue to grow at rapid rate, so does the need to protect these technologies from hackers performing breaches to steal user's data. To protect users, cyber-security awareness materials should be readily available to guide users understanding of the vulnerabilities existing in their technological devices; explore the plethora of tactics carried out by hackers to steal their data, and identify measures they can take to ensure their safety as they utilize their devices. The objective of this work is to develop cyber-security awareness materials in Google Classroom using instructional technology design principles to accommodate user learning styles while increasing cyber-security expertise. We create two courses, one focusing on introductory level cyber-security concepts and the other on advanced cyber-security concepts. Topics discussed in the module include threats, attacks, vulnerabilities, risk management, cryptography, software security, and computer networks. Instructional design models and principles such as Universal Design Learning (UDL), Paivio's Dual Coding, Mayer and Anderson's Contiguity Principle, and Howard Gardner's Multiple Intelligences are applied to the development of the module's content in an effort to accommodate user learning styles and technical expertise. Following the completion of the development of the two cyber-security courses in Google Classroom, we concluded that the courses are progressive steps to creating readily available cyber-security awareness materials for the general public. [ABSTRACT FROM AUTHOR]
- Published
- 2019
34. Knowledge Portals: A Review.
- Author
-
Wimmer, Hayden, Jie Du, and Rada, Roy
- Subjects
THEORY of knowledge ,ENTRYISM ,SYSTEMS development ,ENTRANCES & exits - Abstract
Knowledge portals are a method to provide integrated access to users of multiple systems through a single-entry point. A large body of literature exists on knowledge portals; however, the only published literature reviews are outdated, as they only cover material prior to the 21st century. The purpose of this article is to present review on some major papers about knowledge portals that were published from 2000-2017. The review takes a holistic perspective based on systems development life cycle to critique the literature and identifies key challenges that enlighten future directions. Trends in the first decade of the 21st century include the desire to formalize and standardize a model of knowledge portals, while major challenges for the future include the need to maintain cybersecurity across users and platforms. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
35. Using Geodesic Acceleration with LevMar to Maximize Smart Home Energy Management.
- Author
-
Booker, Queen E., Kitchens, Fred L., Wimmer, Hayden, and Rebman, Carl M.
- Subjects
GEODESICS ,ACCELERATION (Mechanics) ,HOME energy use ,MATHEMATICAL optimization ,ENERGY conservation ,ENERGY consumption - Abstract
Home energy optimization is increasing in research interest as smart technologies in appliances and other home devices are increasing in popularity, particularly as manufacturers move to produce appliances and devices which work in conjunction with the Internet. Home energy optimization has the potential to reduce energy consumption through "smart energy management" of appliances. Information and communications technologies (ICTs) help achieve energy savings with the goal of reducing greenhouse gas emissions and attaining effective environmental protection in several contexts including electricity generation and distribution. This "smart energy management" is utilized at the residential customer level through "smart homes. " This paper compares two artificial neural networks (ANN) used to support home energy management (HEM) systems based on Bluetooth low energy, called BluHEMS. The purpose of the algorithms is to optimize energy use in a typical residential home. The first ANN uses the Levenberg-Marquardt algorithm and the second uses the Levenberg-Marquardt algorithm enhanced by a second order correction known as geodesic acceleration. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
36. BUILDING AN APPLICATION FOR CUSTOM MOBILE MEDICATION REMINDERS IN HEALTHCARE: AN EXPLORATORY STUDY.
- Author
-
Egbedion, Beloved, Wimmer, Hayden, Rebman Jr., Carl M., and Powell, Loreen M.
- Subjects
MEDICAL care ,ELECTRONIC health records ,MOBILE communication systems - Abstract
Medication adherence is an issue plaguing multiple populations such as the elderly or hard to reach populations such as those with HIV. Medication reminders are often employed to improve medication observance. Literature demonstrates that generic reminders are ineffective and often ignored. This study illustrates how to build a custom medication reminder system to determine the effect and impact of customized medication message reminders over generic reminder messages. Results show customized messages are statistically favored over generic messages. This work serves as an important step toward customized medication reminders to improve medication compliance. [ABSTRACT FROM AUTHOR]
- Published
- 2018
37. ELECTRONIC EMERGENCY MEDICAL TECHNICIAN REPORTS - TESTING A PERCEPTION OF A PROTOTYPE.
- Author
-
Cuk, Smiljana, Wimmer, Hayden, Powell, Loreen M., and Rebman Jr., Carl M.
- Subjects
EMERGENCY medical technicians ,PROTOTYPES ,MEDICAL care - Abstract
Emergency Medical Technicians (EMTs) still commonly complete a paper-based report, called a quick reference sheet (QRS) or patient care report (PCR) when they are providing services to patients in route to a medical facility. The paper-based report suffers from many challenges such as being lost during patient hand-off, difficulty writing in a moving emergency vehicle, and duplication of information entry. In order to address the aforementioned challenges, we take a first step toward developing a prototype electronic quick reference sheet. Our prototype was built using the Universal Windows Platform to ensure cross-device compatibility. Nineteen emergency medical technicians (EMT) participated in a test of the prototype. The EMT participants were asked to provide feedback on the use of paperbased versus electronic quick reference sheets. The results indicate that EMT's prefer the electronic report. Results of this study found that EMTs perceived electronic Quick Reference Sheets as a better way of collecting the information, easier to complete, and a more efficient way of delivering the information to the hospital. [ABSTRACT FROM AUTHOR]
- Published
- 2018
38. ONTOLOGIES AND THE SEMANTIC WEB FOR DIGITAL INVESTIGATION TOOL SELECTION.
- Author
-
Wimmer, Hayden, Lei Chen, and Thomas N arock
- Abstract
The nascent field of digital forensics is heavily influenced by practice. Much digital forensics research involves the use, evaluation, and categorization of the multitude of tools available to researchers and practitioners. As technology evolves at an increasingly rapid pace, the digital forensics field must constantly adapt by creating and evaluating new tools and techniques to perform forensic analysis on many disparate systems such as desktops, notebook computers, mobile devices, cloud, and personal wearable sensor devices, among many others. While researchers have attempted to use ontologies to classify the digital forensics domain on various dimensions, no ontology of digital forensic tools has been developed that defines the capabilities and relationships among the various digital forensic tools. To address this gap, this work develops an ontology using Resource Description Framework (RDF) and Ontology Web Language (OWL) which is searchable via SP ARQL ( an RDF query language) and catalogues common digital forensic tools. Following the concept of ontology design patterns, our ontology has a modular design to promote integration with existing ontologies. Furthermore, we progress to a semantic web application that employs reasoning in order to aid digital investigators with selecting an appropriate tool. This work serves as an important step towards building the knowledge of digital forensics tools. Additionally, this research sets the preliminary stage to bringing semantic web technology to the digital forensics domain as well as facilitates expanding the developed ontology to other tools and features, relationships, and forensic techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2018
39. A NEW FRAMEWORK FOR SECURING, EXTRACTING AND ANALYZING BIG FORENSIC DATA.
- Author
-
Sachdev, Hitesh, Wimmer, Hayden, Lei Chen, and Rebman, Carl
- Abstract
Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are combined in an effort to promote more effective and efficient processing of the massive Big Forensic Data. The research propositions this model postulates could lead the investigating agencies to the head of the terrorist networks. Results indicate the Big Forensic Data Framework model is capable of processing Big Forensic Data. [ABSTRACT FROM AUTHOR]
- Published
- 2018
40. EXPOSING THE TOR FAILURES ON MOBILE DEVICES USING PARABEN'S E3:DS TECHNOLOGY.
- Author
-
Don, Ton, Wimmer, Hayden, Lei Chen, and Booker, Queen E.
- Subjects
PARABENS ,ONLINE information services ,INTERNET usage monitoring - Abstract
Privacy and anonymity tools on electronic devices are increasingly commonplace. These tools provide challenges for digital investigators especially when trying to track down and uncover illegal activity such as the use of the "Darknet", an illegal online service trading market which is hidden from the normal internet users and is often difficult to detect with digital forensic tools, especially if the user uses privacy and anonymity "protection" on their devices. However, digital forensic tools continue to evolve with the ability to detect internet usage, even those supposedly hidden by such privacy tools. These tools present privacy concerns to users. This work seeks to examine the extent that the Tor Browser Bundle protects a user's privacy. Using a mobile digital forensics software by Paraben, E3:DS, we extract the mobile device's data, a Samsung Galaxy Note 5 using the Android 6.0.1 operating system. While past research has claimed that using Tor protects user privacy, analysis of the data revealed we were able to extract the websites visited via Tor and extracted search terms from common shopping and social media websites. Implications from this research are three-fold: first, the study shows that E3:DS can reveal internet activity even while running applications that are supposed to provide privacy and anonymity; second, user's activities are not fully protected when using the Tor Browsing Bundle to surf the internet; and, finally, there are weaknesses in the Tor Bundle that Tor developers need to address in their software to support their privacy claims. [ABSTRACT FROM AUTHOR]
- Published
- 2018
41. PROBLEMS ASSOCIATED WITH PATIENT CARE REPORTS AND TRANSFERRING DATA BETWEEN AMBULANCE AND HOSPITALS FROM THE PERSPECTIVE OF EMERGENCY MEDICAL TECHNICIANS.
- Author
-
Cuk, Smiljana, Wimmer, Hayden, and Powell, Loreen M.
- Subjects
ELECTRONIC health records ,EMERGENCY medical services ,MEDICAL information storage & retrieval systems - Abstract
While many hospitals have converted to electronic medical records, emergency medical services continue to employ paper-based reports. Furthermore, existing research focuses on challenges of information systems from the perspective of nurses, doctors, and hospitals. Little is known about the paper-based challenges facing emergency medical technicians. This study examined emergency medical technician's paper-based reports for potential problems that may occur if the transferred reports are in an electronic format. Additionally, this study conducted interviews of six emergency medical technicians about perceived benefits from electronic transfer of patient information for transferring patients. Results were positive as the emergency medical technicians liked to see a change from paper to electronic transfer of information. Emergency medical technicians also thought it was difficult to write the report while riding in the back of an ambulance, that information is lost during patient handover, and expressed a desire to follow-up on transferred patients. [ABSTRACT FROM AUTHOR]
- Published
- 2017
42. EVALUATION OF PREDICTIVE ANALYTIC TECHNIQUES IN HEALTHCARE RESEARCH: A PRSIMA STYLE REVIEW.
- Author
-
Wimmer, Hayden, Rebman Jr., Carl M., and Booker, Queen E.
- Subjects
HOSPITAL admission & discharge ,PATIENT readmissions ,HOSPITAL costs - Abstract
Preventing hospital admissions and readmission has the potential to reduce healthcare costs nationwide. Disease and readmission prevention can be assisted by applying data science and predictive analytics to healthcare data. This paper presents a PRISMA style literature review of pneumonia readmissions based on the Medline, Healthsource Academic, and CINHAL databases. These databases were searched for articles that contained 'pneumonia' and 'readmission' in the titles. While disease and readmission predication are well represented in the literature, the application of more advanced data science techniques is under represented. Regression appeared to be the most dominant technique applied and future research studies should study more data science and predictive analytic approaches. Adopting analytical techniques can help make more robust and precise analysis and can aid in the classroom instruction of data analytics and health informatics. [ABSTRACT FROM AUTHOR]
- Published
- 2017
43. Improving Course Assessment via Web-based Homework.
- Author
-
Wimmer, Hayden, Powell, Loreen, Kilgus, Lawrence, and Force, Christina
- Published
- 2017
- Full Text
- View/download PDF
44. Decision Trees and Financial Variables.
- Author
-
Rada, Roy and Wimmer, Hayden
- Published
- 2017
- Full Text
- View/download PDF
45. Applying Semantic Web Technologies to Ontology Alignment.
- Author
-
Wimmer, Hayden, Yoon, Victoria, and Rada, Roy
- Published
- 2012
- Full Text
- View/download PDF
46. Emotional intelligence and communication levels in information technology professionals.
- Author
-
Hendon, Michalina, Powell, Loreen, and Wimmer, Hayden
- Subjects
- *
COMMUNICATIVE competence , *STATISTICAL correlation , *INTERPERSONAL relations , *SCIENTIFIC observation , *TEAMS in the workplace , *EMOTIONAL intelligence , *INFORMATION professionals - Abstract
In today's digital and technical environment, employers are looking for personnel that can contribute to the organization not only with the use of technical skills but can also express their expertise with the use of positive emotional intelligence and communication effectiveness. As research is lacking in the investigation of soft skills used by information technology professionals, the relationship between emotional intelligence and communication adaptability is the focus of this research. This quantitative non-experimental correlational analyses the emotional intelligence and communication adaptability level of 111 Information Technology professionals that work in the United States. The research found a significant positive relationship between emotional intelligence and the communication adaptability of the information technology professional. The positive outcome of this study suggests that information technology professions that have a strong relationship between emotional intelligence and communication aptitude can have positive implications for organizations for organizational teamwork/relationship building. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.