Добірка наукової літератури з теми "089999 Information and Computing Sciences not elsewhere classified"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Зміст
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "089999 Information and Computing Sciences not elsewhere classified".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Дисертації з теми "089999 Information and Computing Sciences not elsewhere classified"
Das, Gupta Jishu. "Performance issues for VOIP in Access Networks." Thesis, University of Southern Queensland, 2005. https://eprints.qut.edu.au/12724/1/Das_Gupta_MComputing_Dissertation.pdf.
Повний текст джерелаKraal, Ben J. "Considering design for automatic speech recognition in use." Thesis, University of Canberra, 2006. https://eprints.qut.edu.au/16990/1/c16990.pdf.
Повний текст джерелаBlakey, Jeremy Peter. "Database training for novice end users : a design research approach : a thesis presented in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Information Systems at Massey University, Albany, New Zealand." Massey University, 2008. http://hdl.handle.net/10179/880.
Повний текст джерелаJiang, Feng. "Capturing event metadata in the sky : a Java-based application for receiving astronomical internet feeds : a thesis presented in partial fulfilment of the requirements for the degree of Master of Computer Science in Computer Science at Massey University, Auckland, New Zealand." Massey University, 2008. http://hdl.handle.net/10179/897.
Повний текст джерела(10994988), Minglu Li. "ENVIRONMENTAL FACTORS AFFECT SOCIAL ENGINEERING ATTACKS." Thesis, 2021.
Знайти повний текст джерелаSocial engineering attacks can have serious consequences when it comes to information security. A social engineering attack aims at sensitive personal information by using personality weaknesses and using manipulation techniques. Because the user is often seen as the weakest link, techniques like phishing, baiting, and vishing, and deception are used to glean important personal information successfully. This article will analyze the relationship between the environment and social engineering attacks. This data consists of 516 people taking a survey. When it comes to discovering the relationship, there are two parts of the analysis. One is a high-dimensional analysis using multiple algorithms to find a connection between the environment and people’s behavior. The other uses a text analysis algorithm to study the pattern of survey questions, which can help discover why certain people have the same tendency in the same scenario. After combining these two, we might show how people have different reactions when dealing with social engineering attacks due to environmental factors.
(11218029), Herschel R. Bowling. "A Forensic Analysis of Microsoft Teams." Thesis, 2021.
Знайти повний текст джерела(5930528), Joseph W. Balazs. "A Forensic Examination of Database Slack." Thesis, 2021.
Знайти повний текст джерелаDatabase forensics is an underexplored subfield of Digital Forensics, and the lack of research is
becoming more important with every breach and theft of data. A small amount of research exists
in the literature regarding database slack. This exploratory work examined what partial records of
forensic significance can be found in database slack. A series of experiments performed update
and delete transactions upon data in a PostgreSQL database, which created database slack.
Patterns of hexadecimal indicators for database slack in the file system were found and analyzed.
Despite limitations in the experiments, the results indicated that partial records of forensic
significance are found in database slack. Significantly, partial records found in database slack
may aid a forensic investigation of a database breach. The details of the hexadecimal patterns of
the database slack fill in gaps in the literature, the impact of log findings on an investigation was
shown, and complexity aspects back up existing parts of database forensics research. This
research helped to lessen the dearth of work in the area of database forensics as well as database slack.
(9175607), Subia Ansari. "FROM THE SCAMMER PERSPECTIVE: PREDISPOSITIONS TOWARDS ONLINE FRAUD MOTIVATION AND RATIONALIZATION." Thesis, 2020.
Знайти повний текст джерелаCybercrime and online scams are rampant in today’s tech-savvy world. In the past, scammers relied heavily on emails to contact potential victims but today, the presence and widespread usage of social networking platforms and e-commerce businesses has increased the availability of potential victims and made them easily accessible. It could be assumed that since unsuspecting users seek various products or services online - rentals, booking trips, seeking jobs, dating, it makes them easy targets for scammers yet, it is not just individual users who suffer from fraud, but organizations and institutions as well. A study at the Bank of America Merrill Lynch Global Research found that cybercrime costs the global economy up to approximately 540 billion euros annually. There is plenty of research on the technical measures that individuals and organizations may take to prevent themselves from falling prey to fraudsters, however, research trends in the recent past have shifted towards analyzing the human element present in the scenarios. Researchers have argued that identifying the underlying psychological and sociological factors used by fraudsters could help tackle the very root cause of such fraudulent attacks. While there exists some research focusing on the experiences and psychology of victims of these attacks as well as the countermeasures that can be taken to protect them from such attacks, there is little research on the psychology and motivation of those who commit online fraud. This study aims to identify the psychological factors that affect the predilection of scammers to commit online fraud.
Beckett, Jason. "Forensic computing : a deterministic model for validation and verification through an ontological examination of forensic functions and processes." 2010. http://arrow.unisa.edu.au:8081/1959.8/93190.
Повний текст джерелаThesis (PhD)--University of South Australia, 2010
(10867428), Jisoo Hwang. "Emotions on Learning with Technology." Thesis, 2021.
Знайти повний текст джерелаPrevious work has identified the many difficulties that students experience in learning abstract concepts in STEM. Past studies have also identified the critical role that emotions play on students' motivation to learn. As new learning technologies are developed, they enable visualizing complex scientific concepts which can be non-visible thus assisting students' understanding of abstract ideas as well as improving their motivation as they learn. This study investigated two learning technologies and compared them to examine 1) their effectiveness on learning concepts of electricity in physics and 2) the interplay between learning with technology and emotions. Participants were randomly assigned to either Inquiry-Based Learning (IBL) with a computer simulation or Game-Based Learning (GBL) with a computer game which addressed concepts of electricity in physics. During the experiment, students in the IBL condition explored materials by using the computer simulation and posed hypotheses and questions on their own with a guiding worksheet for IBL. Students in the GBL condition played an educational computer game following the guiding worksheet while they were meeting challenges created by the game with a guiding worksheet for GBL. Students' learning gains were assessed by comparing their pretest and posttest scores. Emotions were self-reported after the posttest by responding to a survey that measured 6 emotional scales that students may perceive during the experiment. The study found that both IBL and GBL enhanced students' understanding of given concepts. However, there was no statistically significant difference between the two conditions in terms of learning gains. Students in the IBL achieved higher mean learning gains, whereas students in the GBL showed that they were more engaged. At the same time, students in the GBL perceived more confusion and frustration compared to students in the IBL.