Current Search: Information technology (x)
View All Items
Pages
- Title
- Information Technology Induced Attentional Switching Effects on Inhibitory Control.
- Creator
- Christopher, Deven M., Rosselli, Monica, Florida Atlantic University, Charles E. Schmidt College of Science, Department of Psychology
- Abstract/Description
-
Deciding what information we attend to has implications on our ability to remain valuable and productive in our respective academic and economic domains. This study investigated if attentional switching due to information technology interruptions would deplete resources in a unique way and impair performance on a response inhibition task. Three groups were compared on the Simon task after participants either did or did not receive interruptions during a self-regulation task. Unexpectedly, a...
Show moreDeciding what information we attend to has implications on our ability to remain valuable and productive in our respective academic and economic domains. This study investigated if attentional switching due to information technology interruptions would deplete resources in a unique way and impair performance on a response inhibition task. Three groups were compared on the Simon task after participants either did or did not receive interruptions during a self-regulation task. Unexpectedly, a larger Simon effect was found for participants who did not receive interruptions. These results conform to previous evidence showing sustained directed attention may result in depletion and effect subsequent inhibitory control. Although not supporting predictions, these results may provide a basis for further research, particularly because younger generations are developing in a more connected world than preceding generations. By understanding these differences, younger generations may better adapt to technological advances and leverage them to their advantage.
Show less - Date Issued
- 2018
- PURL
- http://purl.flvc.org/fau/fd/FA00013117
- Subject Headings
- Attention, Interruptions, Information technology, Inhibition
- Format
- Document (PDF)
- Title
- Antecedents of IT-Business Strategic Alignment and the Moderating Roles of Goal Commitment and Environmental Uncertainty.
- Creator
- Yayla, Ali Alper, Hu, Qing, Florida Atlantic University
- Abstract/Description
-
Aligning information technology (lT) strategy with business strategy has been one of the top concerns of practitioners and scholars. Despite the documented positive effects of strategic alignment on organizational success, only few organizations consider themselves in alignment. Although numerous studies exist about IT-business alignment, the empirical studies based on strong theories have been rare in the alignment literature. This dissertation attempts to fulfill this gap by proposing and...
Show moreAligning information technology (lT) strategy with business strategy has been one of the top concerns of practitioners and scholars. Despite the documented positive effects of strategic alignment on organizational success, only few organizations consider themselves in alignment. Although numerous studies exist about IT-business alignment, the empirical studies based on strong theories have been rare in the alignment literature. This dissertation attempts to fulfill this gap by proposing and empirically validating a comprehensive strategic alignment model. Drawing on prior literature, we identified five antecedents of alignment; centralization, formalization , shared domain knowledge, successful IT history and relationship management. We further hypothesized that the effects of these antecedents are mediated by the drivers of alignment, which are conceptualized as the level of connection of lT and business planning and the level of communication between IT and business managers. Furthermore, the proposed research model investigated the moderating effects of goal commitment of business executives to achieving and sustaining strategic alignment and environmental uncertainty. The results showed that both drivers had significant effects on alignment, and the effect of connection is about twice that of communications. Our findings also support for the effects of all antecedents except centralization. Finally, we found partial support for the effects of moderating variables. Overall, the main contribution of this dissertation is the development and empirical validation of a comprehensive strategic alignment model with considerations for antecedents and potential moderating effects, thus extending the alignment literature by differentiating the effects of dimensions of environmental uncertainty as well as introducing the goal commitment and IT unit structure constructs, and providing prescriptive insight for managing IT-business strategic alignment.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/fau/fd/FA00000617
- Subject Headings
- Information Technology--Management, Strategic Planning, Management Information Systems
- Format
- Document (PDF)
- Title
- The impact of national culture and other national-level indicators on information technology (IT) diffusion.
- Creator
- Bagchi, Kallol Kumar., Florida Atlantic University, Cerveny, Robert
- Abstract/Description
-
The contribution of this research is in positing that national level indicators matter in IT adoption and diffusion and providing empirical support for this theory. National level indicators are scantily represented in IT adoption or diffusion theory. Empirical results on this are almost absent in literature. Diffusion theory models of Rogers (1985) and Kwon and Zmud (1987) do not address national level attributes. National level indicators like culture, economy, institutional factors,...
Show moreThe contribution of this research is in positing that national level indicators matter in IT adoption and diffusion and providing empirical support for this theory. National level indicators are scantily represented in IT adoption or diffusion theory. Empirical results on this are almost absent in literature. Diffusion theory models of Rogers (1985) and Kwon and Zmud (1987) do not address national level attributes. National level indicators like culture, economy, institutional factors, physical distance from the innovating nation, IT infrastructure etc., could all be relevant to IT diffusion. Three types of major models (models based on adoption and growth rate factors and diffusion rate) are introduced and the effects of national indicators are examined. First, a general model is developed showing the relationship of various national factors with IT adoption and growth rate. The adoption and growth rates of nine IT products/paradigms are examined in context of the model posited. The hypotheses tested include: (1) IT adoption and growth rate is related to national value systems based on Inglehart's and Hofstede's dimensions, even after controlling for major economic and other indicators; (2) IT adoption and growth rate is related to economic as well as institutional and other national level factors; (3) The factors of adoption and growth rate of IT products/phenomena are different for different products/paradigms. Next, non-linear (temporal as well as space-time) diffusion models are used for modeling the diffusion process. For this purpose, mathematical models are developed and assessed. These models provide additional contributions in the area of diffusion model development. Time-series data on various countries are researched and gathered for this purpose. Preliminary empirical results show support for the hypothesis that national level indicators do exert influence on growth and diffusion of various IT products and paradigms.
Show less - Date Issued
- 2001
- PURL
- http://purl.flvc.org/fcla/dt/11966
- Subject Headings
- Information technology, Diffusion of innovations, Culture diffusion
- Format
- Document (PDF)
- Title
- RSSI-BASED PASSIVE LOCALIZATION IN COMPLEX OUTDOOR ENVIRONMENTS USING WI-FI PROBE REQUESTS.
- Creator
- Bao, Fanchen, Hallstrom, Jason O., Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Capturing pedestrian mobility patterns with high fidelity provides a foundation for data-driven decision-making in support of city planning, emergency response, and more. Due to scalability requirements and the sensitive nature of studying pedestrian movements in public spaces, the methods involved must be passive, low-cost, and privacy-centric. Pedestrian localization based on Received Signal Strength Indicator (RSSI) measurements from Wi-Fi probe requests is a promising approach. Probe...
Show moreCapturing pedestrian mobility patterns with high fidelity provides a foundation for data-driven decision-making in support of city planning, emergency response, and more. Due to scalability requirements and the sensitive nature of studying pedestrian movements in public spaces, the methods involved must be passive, low-cost, and privacy-centric. Pedestrian localization based on Received Signal Strength Indicator (RSSI) measurements from Wi-Fi probe requests is a promising approach. Probe requests are spontaneously emitted by Wi-Fi-enabled devices, are readily captured by of-the-shelf components, and offer the potential for anonymous RSSI measurement. Given the ubiquity of Wi-Fi-enabled devices carried by pedestrians (e.g., smartphones), RSSI-based passive localization in outdoor environments holds promise for mobility monitoring at scale. To this end, we developed the Mobility Intelligence System (MobIntel), comprising inexpensive sensor hardware to collect RSSI data, a cloud backend for data collection and storage, and web-based visualization tools. The system is deployed along Clematis Street in the heart of downtown West Palm Beach, FL, and over the past three years, over 50 sensors have been installed. Our research first confirms that RSSI-based passive localization is feasible in a controlled outdoor environment (i.e., no obstructions and little signal interference), achieving ≤ 4 m localization error in more than 90% of the cases. When significant time-varying signal fluctuations are introduced as a result of long-term deployment, performance can be maintained with an overhaul of the problem formulation and an updated localization model. However, when the outdoor environment is fully uncontrolled (e.g., along Clematis Street), the performance decreases to ≤ 4 m error in fewer than 70% of the cases. However, the drop in performance may be addressed through improved sensor maintenance, additional data collection, and appropriate domain knowledge.
Show less - Date Issued
- 2023
- PURL
- http://purl.flvc.org/fau/fd/FA00014299
- Subject Headings
- Pedestrian traffic flow, Information technology, Computer Science
- Format
- Document (PDF)
- Title
- Maturity of IT risk management practices and reporting structure: an it manager perspective.
- Creator
- Vincent, Surani, Higgs, Julia, Florida Atlantic University, College of Business, School of Accounting
- Abstract/Description
-
In December 2009, the Securities Exchange Commission (SEC) approved enhanced proxy disclosure rules requiring companies to disclose the board’s leadership structure and the board’s role in risk oversight. Apart from general business risks, boards are increasingly interested in Information Technology (IT) risks as it affects all aspects of the organization (PricewaterhouseCoopers [PwC], 2013). Since the effectiveness of IT risk management depends on senior managers’ actions, this dissertation...
Show moreIn December 2009, the Securities Exchange Commission (SEC) approved enhanced proxy disclosure rules requiring companies to disclose the board’s leadership structure and the board’s role in risk oversight. Apart from general business risks, boards are increasingly interested in Information Technology (IT) risks as it affects all aspects of the organization (PricewaterhouseCoopers [PwC], 2013). Since the effectiveness of IT risk management depends on senior managers’ actions, this dissertation attempts to answer the question of whether the maturity of IT risk management practices (the extent to which management performs particular activities to identify, assess, monitor and respond to IT-related risks) in organizations depends on the Chief Information Office (CIO) reporting structure and the board’s leadership structure.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004336, http://purl.flvc.org/fau/fd/FA00004336
- Subject Headings
- Corporate governance, Decision making, Information technology -- Management, Information technology -- Social aspects, Management information systems, Risk management, Strategic planning
- Format
- Document (PDF)
- Title
- Will we learn to manage the new electronic technologies before they overwhelm us - Charleston Library Acquisitions Conference.
- Creator
- Kachmar, Diane
- Date Issued
- 1994-01
- PURL
- http://purl.flvc.org/fcla/dt/11526
- Subject Headings
- Library science--Information technology, Collection management (Libraries), Acquisitions (Libraries)
- Format
- Document (PDF)
- Title
- SPATIAL NETWORK BIG DATA APPROACHES TO EMERGENCY MANAGEMENT INFORMATION SYSTEMS.
- Creator
- Herschelman, Roxana M., Yang, KwangSoo, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Emergency Management Information Systems (EMIS) are defined as a set of tools that aid decision-makers in risk assessment and response for significant multi-hazard threats and disasters. Over the past three decades, EMIS have grown in importance as a major component for understanding, managing, and governing transportation-related systems. To increase resilience against potential threats, the main goal of EMIS is to timely utilize spatial and network datasets about (1) locations of hazard...
Show moreEmergency Management Information Systems (EMIS) are defined as a set of tools that aid decision-makers in risk assessment and response for significant multi-hazard threats and disasters. Over the past three decades, EMIS have grown in importance as a major component for understanding, managing, and governing transportation-related systems. To increase resilience against potential threats, the main goal of EMIS is to timely utilize spatial and network datasets about (1) locations of hazard areas (2) shelters and resources, (3) and how to respond to emergencies. The main concern about these datasets has always been the very large size, variety, and update rate required to ensure the timely delivery of useful emergency information and response for disastrous events. Another key issue is that the information should be concise and easy to understand, but at the same time very descriptive and useful in the case of emergency or disaster. Advancement in EMIS is urgently needed to develop fundamental data processing components for advanced spatial network queries that clearly and succinctly deliver critical information in emergencies. To address these challenges, we investigate Spatial Network Database Systems and study three challenging Transportation Resilience problems: producing large scale evacuation plans, identifying major traffic patterns during emergency evacuations, and identifying the highest areas in need of resources.
Show less - Date Issued
- 2020
- PURL
- http://purl.flvc.org/fau/fd/FA00013576
- Subject Headings
- Emergency management, Big data, Emergency management--Information technology
- Format
- Document (PDF)
- Title
- Emerging technology and policy trends.
- Creator
- Kachmar, Diane
- Date Issued
- 2001-03
- PURL
- http://purl.flvc.org/fcla/dt/11512
- Subject Headings
- Library science--Technological Innovations, Information technology, Association of College and Research Libraries
- Format
- Document (PDF)
- Title
- Remote monitoring and controlling of RF communication for a mobile device.
- Creator
- Gadipudi, Raviteja, Agarwal, Ankur, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In recent years there has been dramatic growth in mobile devices and technologies. According to reports from comScore [1], 47% users in the United States (aged more than 13) are using a smartphones as their primary phone. Smartphone offers more advanced computing ability and connectivity than contemporary phones. In today’s world, a user wants to keep their smartphones private, because of the personal information present in it. Among these users, some of them are minors. This thesis addresses...
Show moreIn recent years there has been dramatic growth in mobile devices and technologies. According to reports from comScore [1], 47% users in the United States (aged more than 13) are using a smartphones as their primary phone. Smartphone offers more advanced computing ability and connectivity than contemporary phones. In today’s world, a user wants to keep their smartphones private, because of the personal information present in it. Among these users, some of them are minors. This thesis addresses the functionality to track/control the mobile activities of minors by their parents using mobile phones. As a parent they want to know, whom his/her child is talking to and for what they are accessing browser for. Cellular network companies are providing number blocking services from the carrier side, but those are monthly paid services. In this thesis, we propose application architecture for remotely control the child phone and grant access to selected numbers for call and text. We use the emerging Android mobile platform and Google nexus phones to implement and test the application. This architecture will help developers to make more innovative applications in future which helps parent to access child phone information. We performed a study and reported the result using the proposal.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fau/fd/FA0004018
- Subject Headings
- Information technology -- Social aspects, Mobile communication devices -- Security measures, Technological innovations -- Social aspects
- Format
- Document (PDF)
- Title
- Development of a predictive model for faculty integration of technology in higher education.
- Creator
- Hargrove, Debra L., Florida Atlantic University, Guglielmino, Lucy M.
- Abstract/Description
-
The purpose of this research project was to develop a predictive model for faculty integration of technology in higher education, specifically among faculty who are members of the Commission of Professors of Adult Education. The variables included both those that the educational institution could affect, such as technical support, release time, tenure and promotion opportunities, and personal variables of faculty, such as computer self-efficacy, attitudes towards computers and perceived...
Show moreThe purpose of this research project was to develop a predictive model for faculty integration of technology in higher education, specifically among faculty who are members of the Commission of Professors of Adult Education. The variables included both those that the educational institution could affect, such as technical support, release time, tenure and promotion opportunities, and personal variables of faculty, such as computer self-efficacy, attitudes towards computers and perceived institutional support. Three hundred and eighty-nine (389) surveys were mailed to the sample participants. One hundred and twenty-four (124) were returned completed, thirty-six were returned undeliverable and seven were deemed unusable, for a return rate of 33.14%. The survey used in this study, the "Instructional Technology Integration Assessment" was adapted from the Computer Self Efficacy Scale (CSE), developed by Murphey and others (1988) and the Middle Tennessee State University Survey developed by Lea, Brace and Roberts (1998). Multiple regression was performed, using the Statistical Package for the Social Sciences (SPSS) to determine which of the variables showed a stronger influence on the dependent variable. Integration of technology significantly correlated with five of the variables: Job Satisfaction (.403, p < .001); Quality of My Instruction (.422, p < .001); Tenure and Promotion Opportunities (.240, p < .05); and the Impact of Technology on the Depth and Breadth of Content and Student Participation (.347, p < .001). Years Teaching in Higher Education was negatively correlated with Integration (-.185, p < .05). With a multiple regression correlation coefficient (R) of .550, the squared multiple correlation coefficient (R2) resulted in .303. Thirty percent (30%) of the variance in integration could be accounted for by the predictor variables. Analysis of responses to open-ended questions revealed three main themes in regards to barriers and incentives for technology integration: psycho/social barriers, student readiness barriers and institutional barriers. Suggestions for future research included adding variables such as learning style, teaching style and fear of change to the overall survey.
Show less - Date Issued
- 2000
- PURL
- http://purl.flvc.org/fcla/dt/12633
- Subject Headings
- Educational technology, Adult education teachers, Information technology, Education, Higher--Data processing
- Format
- Document (PDF)
- Title
- Credibility and the Internet: can credibility levels indicate news medium choice?.
- Creator
- Herring, Katrina., Dorothy F. Schmidt College of Arts and Letters, Department of Political Science
- Abstract/Description
-
The Internet has revolutionized the way in which people are entertained, communicate and collect information. As people increase their ability to connect with the outside world from inside their homes, they hold the power to become their own gatekeepers filtering information as they see fit. Many question whether this will weaken the power of the traditional media sources that are often seen as elitist and potentially biased. This researcher hypothesized that people who cite high credibility...
Show moreThe Internet has revolutionized the way in which people are entertained, communicate and collect information. As people increase their ability to connect with the outside world from inside their homes, they hold the power to become their own gatekeepers filtering information as they see fit. Many question whether this will weaken the power of the traditional media sources that are often seen as elitist and potentially biased. This researcher hypothesized that people who cite high credibility ratings of news media channels are more likely to use traditional media channels such as television and newspapers and people who cite low credibility ratings of news media channels are more likely to use alternate media channels such as the Internet. While the researcher was unable to reject the null hypothesis, a pattern of general mistrust of traditional news media was revealed when nearly three-fourths of respondents gave traditional media channels a "not-credible" rating.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/1927304
- Subject Headings
- Electronic information resources, Evaluation, Information behavior, Mass media, Social aspects, Mass media and technology
- Format
- Document (PDF)
- Title
- Does leadership matter? The effects of information technology expertise on the market value and performance of a firm.
- Creator
- Khallaf, Ashraf A., Florida Atlantic University, Skantz, Terrance R.
- Abstract/Description
-
This dissertation examines the stock market reaction to 474 announcements of hiring chief information officers (CIOs) in the 1987--2002 period, and firm performance for periods up to two years following the CIO appointment. The study reports that the announcements are associated with significantly positive abnormal returns (0.48 percent). The returns are more pronounced when the new CIO is hired from an IT leader firm (1.94 percent). Abnormal returns are significantly positive related with...
Show moreThis dissertation examines the stock market reaction to 474 announcements of hiring chief information officers (CIOs) in the 1987--2002 period, and firm performance for periods up to two years following the CIO appointment. The study reports that the announcements are associated with significantly positive abnormal returns (0.48 percent). The returns are more pronounced when the new CIO is hired from an IT leader firm (1.94 percent). Abnormal returns are significantly positive related with the CIO's level of education and high-technology firms, and negatively related with firm size. In addition, there is no significant difference in market reaction between the announcements that publicize the creation of a new position and those that imply the filling of an existing position with new hires. Further, the study finds an association between the appointment of the new CIO and subsequent improvement in the accounting measures of profitability. Findings reveal that CIO firms outperform their matched firms and their industry counterparts for the two years following the announcements relative to the year prior to the CIO appointment.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fau/fd/FADT12095
- Subject Headings
- Technological innovations--Economic aspects, Performance standards--United States, Organizational effectiveness, Information resources management, Information technology--Management, Corporations--Valuation, Strategic planning
- Format
- Document (PDF)
- Title
- iVEST A: Interactive Data Visualization and Analysis for Drive Test Data Evaluation.
- Creator
- Lee, Yongsuk, Zhu, Xingquan, Pandya, Abhijit S., Hsu, Sam, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this thesis, a practical solution for drive test data evaluation and a real application are studied. We propose a system framework to project high dimensional Drive Test Data (DTD) to well-organized web pages, such that users can visually review phone performance with respect to different factors. The proposed application, iVESTA (interactive Visualization and Evaluation System for driven Test dAta), employs a web-based architecture which enables users to upload DTD and immediately...
Show moreIn this thesis, a practical solution for drive test data evaluation and a real application are studied. We propose a system framework to project high dimensional Drive Test Data (DTD) to well-organized web pages, such that users can visually review phone performance with respect to different factors. The proposed application, iVESTA (interactive Visualization and Evaluation System for driven Test dAta), employs a web-based architecture which enables users to upload DTD and immediately visualize the test results and observe phone and network performances with respect to different factors such as dropped call rate, signal quality, vehicle speed, handover and network delays. iVESTA provides practical solutions for mobile phone manufacturers and network service providers to perform comprehensive study on their products from the real-world DTD.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012532
- Subject Headings
- Information visualization--Data processing, Object-oriented programming (Computer science), Information technology--Management, Application software--Development
- Format
- Document (PDF)
- Title
- Latin American Grid summit [LA Grid].
- Creator
- Furht, Borko
- Date Issued
- 2009-10-22
- PURL
- http://purl.flvc.org/fcla/dt/332876
- Subject Headings
- Computer science --Research., Information Technology --Latin America., Computer industry --Latin America.
- Format
- Document (PDF)
- Title
- Framework for requirements-driven system design automation.
- Creator
- Fonoage, Mihai., Charles E. Schmidt College of Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this thesis, a framework for improving model-driven system design productivity with Requirements-Driven Design Automation (RDDA) is presented. The key to the proposed approach is to close the semantic gap between requirements, components and architecture by using compatible semantic models for describing product requirements and component capabilities, including constraints. An ontology-based representation language is designed that spans requirements for the application domain, the...
Show moreIn this thesis, a framework for improving model-driven system design productivity with Requirements-Driven Design Automation (RDDA) is presented. The key to the proposed approach is to close the semantic gap between requirements, components and architecture by using compatible semantic models for describing product requirements and component capabilities, including constraints. An ontology-based representation language is designed that spans requirements for the application domain, the software design domain and the component domain. Design automation is supported for architecture development by machine-based mapping of desired product/subsystem features and capabilities to library components and by synthesis and maintenance of Systems Modeling Language (SysML) design structure diagrams. The RDDA framework uses standards-based semantic web technologies and can be integrated with exiting modeling tools. Requirements specification is a major component of the system development cycle. Mistakes and omissions in requirements documents lead to ambiguous or wrong interpretation by engineers, causing errors that trickle down in design and implementation with consequences on the overall development cost. We describe a methodology for requirements specification that aims to alleviate the above issues and that produces models for functional requirements that can be automatically validated for completeness and consistency. The RDDA framework uses an ontology-based language for semantic description of functional product requirements, SysML structure diagrams, component constraints, and Quality of Service. The front-end method for requirements specification is the SysML editor in Rhapsody. A requirements model in Web Ontology Language (OWL) is converted from SysML to Extensible Markup Language Metadata Interchange (XMI) representation., The specification is validated for completeness and consistency with a ruled-based system implemented in Prolog. With our methodology, omission s and several types of consistency errors present in the requirements specification are detected early on, before the design stage. Component selection and design automation have the potential to play a major role in reducing the system development time and cost caused by the rapid change in technology advances and the large solution search space. In our work, we start from a structured representation of requirements and components using SysML, and based on specific set of rules written in Prolog, we partially automate the process of architecture design.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/2975246
- Subject Headings
- Computer architecture, Computer software, Development, User-centered system design, Information technology, Management, Semantic Web
- Format
- Document (PDF)
- Title
- Signature schemes in single and multi-user settings.
- Creator
- Villanyi, Viktoria., Charles E. Schmidt College of Science, Department of Mathematical Sciences
- Abstract/Description
-
In the first chapters we will give a short introduction to signature schemes in single and multi-user settings. We give the definition of a signature scheme and explain a group of possible attacks on them. In Chapter 6 we give a construction which derives a subliminal-free RSA public key. In the construction we use a computationally binding and unconditionally hiding commitment scheme. To establish a subliminal-free RSA modulus n, we have to construct the secret primes p and q. To prove p and...
Show moreIn the first chapters we will give a short introduction to signature schemes in single and multi-user settings. We give the definition of a signature scheme and explain a group of possible attacks on them. In Chapter 6 we give a construction which derives a subliminal-free RSA public key. In the construction we use a computationally binding and unconditionally hiding commitment scheme. To establish a subliminal-free RSA modulus n, we have to construct the secret primes p and q. To prove p and q are primes we use Lehmann's primality test on the commitments. The chapter is based on the paper, "RSA signature schemes with subliminal-free public key" (Tatra Mountains Mathematical Publications 41 (2008)). In chapter 7 a one-time signature scheme using run-length encoding is presented, which in the random oracle model offers security against chosen-message attacks. For parameters of interest, the proposed scheme enables about 33% faster verification with a comparable signature size than a construction of Merkle and Winternitz. The public key size remains unchanged (1 hash value). The main cost for the faster verification is an increase in the time required for signing messages and for key generation. The chapter is based on the paper "A one-time signature using run-length encoding" (Information Processing Letters Vol. 108, Issue 4, (2008)).
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/215289
- Subject Headings
- Information technology, Security measures, Cryptography, Coding theory, Data encryption (Computer science), DIgital watermarking
- Format
- Document (PDF)
- Title
- Microservices-based approach for Healthcare Cybersecurity.
- Creator
- Trivedi, Ohm H., Shankar, Ravi, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Healthcare organizations, realizing the potential of the Internet of Things (IoT) technology, are rapidly adopting the technology to bring signi cant improvements in the quality and e ectiveness of the service. However, these smart and interconnected devices can act as a potential \back door" into a hospital's IT network, giving attack- ers access to sensitive information. As a result, cyber-attacks on medical IoT devices have been increasing since the last few years. It is a growing concern...
Show moreHealthcare organizations, realizing the potential of the Internet of Things (IoT) technology, are rapidly adopting the technology to bring signi cant improvements in the quality and e ectiveness of the service. However, these smart and interconnected devices can act as a potential \back door" into a hospital's IT network, giving attack- ers access to sensitive information. As a result, cyber-attacks on medical IoT devices have been increasing since the last few years. It is a growing concern for all the stakeholders involved, as the impact of such attacks is not just monetary or privacy loss, but the lives of many patients are also at risk. Considering the various kinds of IoT devices one may nd connected to a hospital's network, traditional host-centric security solutions (e.g. antivirus, software patches) are at odds with realistic IoT infrastructure (e.g. constrained hardware, lack of proper built-in security measures). There is a need for security solutions which consider the challenges of IoT devices like heterogeneity of technology and protocols used, limited resources in terms of battery and computation power, etc. Accordingly, the goals of this thesis have been: (1) to provide an in-depth understanding of vulnerabilities of medical IoT devices; (2) to in- troduce a novel approach which uses a microservices-based framework as an adaptive and agile security solution to address the issue. The thesis focuses on OS Fingerprint- ing attacks because of its signi cance for attackers to understand a target's network. In this thesis, we developed three microservices, each one designed to serve a speci c functionality. Each of these microservices has a small footprint with RAM usage of approximately 50 MB. We also suggest how microservices can be used in a real-life scenario as a software-based security solution to secure a hospital's network consisting of di erent IoT devices.
Show less - Date Issued
- 2018
- PURL
- http://purl.flvc.org/fau/fd/FA00013140
- Subject Headings
- Cybersecurity, Healthcare, Internet of things--Security measures, Medical care--Information technology--Security measures
- Format
- Document (PDF)
- Title
- Commercialization of high-resolution earth observation satellite remote sensing.
- Creator
- Jarica, Cornelia Christa, Florida Atlantic University, Tata, Robert J., Charles E. Schmidt College of Science, Department of Geosciences
- Abstract/Description
-
The imminent availability of high resolution satellite imagery is causing a paradigm shift in remote sensing. Detente brought about new policy directives in the U.S. and abroad, which opened up for civilian use former Earth observation spy technology down to one meter resolution, previously considered classified and strictly used by the intelligence communities for national security. This study describes a number of new ventures in the private sector which have been formed to launch...
Show moreThe imminent availability of high resolution satellite imagery is causing a paradigm shift in remote sensing. Detente brought about new policy directives in the U.S. and abroad, which opened up for civilian use former Earth observation spy technology down to one meter resolution, previously considered classified and strictly used by the intelligence communities for national security. This study describes a number of new ventures in the private sector which have been formed to launch commercial high resolution systems. The satellites' technical capabilities are analyzed, and application development options for the new imagery are discussed in detail. This new remote sensing data source is also seen within the framework of the larger GeoTechnology Industry to which it belongs, and the author proposes appropriate business strategies for successful commercialization.
Show less - Date Issued
- 1996
- PURL
- http://purl.flvc.org/fcla/dt/15321
- Subject Headings
- Earth resources technology satellites, Remote sensing, Remote-sensing images, Geographic information systems
- Format
- Document (PDF)
- Title
- A Q methodology study: Perceptions of selected financial aid directors, financial aid recipients, and information technologists toward the use of technology in the delivery of financial aid services in higher education.
- Creator
- Brown, Stephanie Gail, Florida Atlantic University, Urich, Ted R.
- Abstract/Description
-
The purpose of this exploratory study was to characterize commonalties in perceptions among financial aid directors, financial aid recipients, and information technologists toward the use of technology in the delivery of financial aid services in higher education. A Q methodology was the investigative technique utilized. The Q sort statements developed were administered to 20 financial aid directors, 20 financial aid recipients, and 20 information technologists specializing in financial aid...
Show moreThe purpose of this exploratory study was to characterize commonalties in perceptions among financial aid directors, financial aid recipients, and information technologists toward the use of technology in the delivery of financial aid services in higher education. A Q methodology was the investigative technique utilized. The Q sort statements developed were administered to 20 financial aid directors, 20 financial aid recipients, and 20 information technologists specializing in financial aid systems located at 20 colleges and universities throughout the United States. Factor analysis of the data gathered by the Q sort instrument provided three significant factors or types of people. The perceptions of these groups toward the delivery of financial aid services in higher education were varied. Financial aid directors were identified as humantechies. The humantechies believe that people are the key to providing good service and that technology should function as a tool of support for improving services. In doing so, technology should serve financial aid administrators so that they can efficiently service students and their families. Financial aid recipients were identified as neotechies. The neotechies have grown up with technology and feel that people and computers should work in tandem in order to provide good service. The neotechies understand and accept the complementary nature of the human, technological, and regulatory aspects of financial aid. Information technologists were identified as advotechies . The advotechies take an extreme position regarding the extent and the level to which technology should be implemented in financial aid offices. The advotechies feel strongly that financial aid offices should include technology whenever and wherever possible.
Show less - Date Issued
- 2002
- PURL
- http://purl.flvc.org/fcla/dt/11990
- Subject Headings
- Student financial aid administration, Student aid--Information technology, Q technique
- Format
- Document (PDF)
- Title
- Tracing a Technological God: A Psychoanalytic Study of Google and the Global Ramifications of its Media Proliferation.
- Creator
- Fazzolari, Benton, Conrod, Frédéric, Florida Atlantic University, Dorothy F. Schmidt College of Arts and Letters, Department of Languages, Lingustics and Comparative Literature
- Abstract/Description
-
This dissertation makes the connection between the human drive, as described by psychoanalysis, to construct God and the construction of the technological entity, Google. Google constitutes the extension of the early Christian period God to the twenty-first century. From the examination of significant religious and theological texts by significant theologians (Augustine, Thomas, Luther, Calvin, etc.) that explain the nature of God, the analogous relationship of God to Google will open a...
Show moreThis dissertation makes the connection between the human drive, as described by psychoanalysis, to construct God and the construction of the technological entity, Google. Google constitutes the extension of the early Christian period God to the twenty-first century. From the examination of significant religious and theological texts by significant theologians (Augustine, Thomas, Luther, Calvin, etc.) that explain the nature of God, the analogous relationship of God to Google will open a psychoanalytic discourse that answers questions on the current state of human mediation with the world. Freud and, more significantly, Lacan’s work connects the human creation of God, ex nihilio, to Google’s godly qualities and behaviors (omniscience, omnipotence, omnipresence, and omnibenevolence). This illustrates the powerful motivation behind the creation of an all-encompassing physical / earthly entity that includes the immaterial properties of God. Essentially, Google operates as the extension or replacement of the long reigning God in Western culture. Furthermore, the advent of science and technology through rationalism (as outlined by Nietzsche) results in the death of the metaphysical God and the ascension of the technological God. Google offers an appropriate example for study. Moreover, the work of Jean Baudrillard and Marshall McLuhan will further comment on Google as the technological manifestation of God, particularly in its media formulations. Finally, this dissertation concludes with a review that highlights future research with an exploration that foresees the death of Google from the same rational method of inquiry by which the death of God occurred at the end of the nineteenth century.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00004806, http://purl.flvc.org/fau/fd/FA00004806
- Subject Headings
- Google., Google (Firm), Information technology--Psychological aspects., Information technology--Social aspects., Digital media--Social aspects., Cyberspace--Social aspects., Internet--Social aspects., Internet--Religious aspects., Web search engines.
- Format
- Document (PDF)