Current Search: internet (x)
Pages
-
-
Title
-
THE OFFLINE IMPACT OF CYBERBULLYING.
-
Creator
-
Ortiz, Kathleen, Donley, Amy, University of Central Florida
-
Abstract / Description
-
Over the recent years, we have seen an immense increase in technology. Though the Internet can be convenient to students, it can also bear negative repercussions. Cyberbullying has impacted millions of people across the nation hindering them in many ways. The Bullying occurs through different outlets, from websites, emails to text messages. Victims cannot truly escape the matter because it follows them wherever they may go. The intent of this thesis was to see who the victims of cyberbullying...
Show moreOver the recent years, we have seen an immense increase in technology. Though the Internet can be convenient to students, it can also bear negative repercussions. Cyberbullying has impacted millions of people across the nation hindering them in many ways. The Bullying occurs through different outlets, from websites, emails to text messages. Victims cannot truly escape the matter because it follows them wherever they may go. The intent of this thesis was to see who the victims of cyberbullying are, what the aftermath effect is, and whether they notify an adult about their situation. Using data from the School Crime Supplement based on the National Crime Victimization Survey, the findings suggest that females are victims of cyber bullying more frequently than males and that adults are not commonly notified when victimization occurs. Furthermore, the repercussions of victimization include fear of harm or attack, as well as skipping classes to avoid the problem. By exploring cyberbullying and its effect, through time studies such as this one will raise awareness in society and contribute towards the solution of cyberbullying.
Show less
-
Date Issued
-
2013
-
Identifier
-
CFH0004398, ucf:44978
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFH0004398
-
-
Title
-
QUARTER LIFE CRISIS OR HOW TO GET OVER COLLEGE AND BECOME A FUNCTIONING MEMBER OF SOCIETY.
-
Creator
-
Anderson Jr., Patrick, Rushin, Pat, University of Central Florida
-
Abstract / Description
-
As a writer, I feel like dealing with conflict in real life is the best way to deal with conflict in my fiction. Quarter-Life Crisis or How to Get Over College and Become a Functioning Member of Society, while a fictional novel, is very much about many of the conflicts I've experienced over the past few years. Sean Easton is a twenty-five year old college graduate living in Miami, trying to balance out his life in a world that doesn't make as much sense to him as it did when he first...
Show moreAs a writer, I feel like dealing with conflict in real life is the best way to deal with conflict in my fiction. Quarter-Life Crisis or How to Get Over College and Become a Functioning Member of Society, while a fictional novel, is very much about many of the conflicts I've experienced over the past few years. Sean Easton is a twenty-five year old college graduate living in Miami, trying to balance out his life in a world that doesn't make as much sense to him as it did when he first graduated college, happy and looking forward to the future. Suffering through the aftermath of a major breakup as well as the death of his best friend, Sean is in the midst of a year-long alcohol binge when we are introduced to him, a period of time characterized by sporadic bouts of self-loathing interlaced with sardonic internal dialogue directed towards the world at large. Sean's story eventually intersects with the second protagonist in Quarter Life Crisis, Lauren Ellis. Lauren is a twenty-four year old college dropout turned pharmacy technician. When we are introduced to her, Lauren's life is characterized by her child-Justin-and her husband Rick. Rick's a mechanic, and he, Lauren, and their son are all living a comfortably mundane life until the day Lauren comes home to find Rick having sex with eighteen year old Natalie, Justin's babysitter. From there, Lauren's entire life is thrown into disarray, forcing her to confront desires and dreams she had previously filed away in the mental category of "lost." Together, Sean and Lauren represent a large portion of our society, a generation of individuals entering their mid- and late-twenties in the new millennium. Many of them have been told to dream big and aim high throughout their entire lives, that the next four years will be the best of their lives. And then the next four years. A few of us fulfill these dreams. Most don't, and in a time when acquiring a college degree has become more an expectation than an accomplishment, Sean Easton and Lauren Ellis are two of many that are defined by their uncertainty as to where their place in society is. Quarter Life Crisis follows their journey from complete uncertainty to little less uncertain, bringing their lifelong dreams into direct conflict with what they are actually capable of achieving. Though the circumstances of Sean and Lauren's shifts in character are both distinct, their mentality and outlook on love and life are similar. In the end, they both find a balance that gives them hope for happiness which, they both realize, is the most they can really get in the long run. The underlying theme of Quarter Life Crisis or How to Get Over College and Become a Functioning Member of Society is that college has become a fixture in American upbringing. The novel isn't saying this is a good or bad thing, just that it is something that hangs over everybody in the current generation's heads growing up, whether they attend college or not. The novel is an attempt to examine how people function in the new millennium after reaching the point in their life when college is no longer a factor, when they are thrown into the real world and told to fend for themselves. It's the story of how two people end up doing exactly that, and the hellish process they go through to get to that point.
Show less
-
Date Issued
-
2011
-
Identifier
-
CFE0003985, ucf:48671
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0003985
-
-
Title
-
SEARCH AND DELIVERY TECHNIQUES IN PEER-TO-PEER NETWORKS.
-
Creator
-
Do, Tai, Hua, Kien, University of Central Florida
-
Abstract / Description
-
The presence of millions of interconnected personal computing devices has given rise to a new class of decentralized networking applications, which are loosely labeled as peer-to-peer (P2P) applications. These P2P applications leverage resources such as processing cycles, storage, content, and network bandwidth available to the user devices, which are also known as peers. A number of current systems - SETI@home, Napster, BitTorrent, and Pastry - are examples of these emerging P2P systems. To...
Show moreThe presence of millions of interconnected personal computing devices has given rise to a new class of decentralized networking applications, which are loosely labeled as peer-to-peer (P2P) applications. These P2P applications leverage resources such as processing cycles, storage, content, and network bandwidth available to the user devices, which are also known as peers. A number of current systems - SETI@home, Napster, BitTorrent, and Pastry - are examples of these emerging P2P systems. To fully realize the potential of the peer-to-peer technology, there is a need to define and provide a set of core competencies, serving as the basic services upon which various peer-to-peer applications can be built on. Among these core competencies, this dissertation focuses on two fundamental services, which are search and delivery. In the first part of the dissertation, delivery techniques to support video-on-demand services in wireline and wireless P2P networks are investigated. Video services are considered due to two reasons. First, video services are the pivotal basis for many other multimedia applications. Second, it is challenging to provide on-demand video services due to asynchronous playback progresses at peers. The proposed techniques enable efficient video sharing between peers with asynchronous playback progresses, and maximize peer bandwidth utilization. In the second part of the dissertation, the problem of supporting continuous moving range queries in wireless mobile peer-to-peer networks is studied. Continuous moving range queries have a number of applications when a moving object wants to monitor its surrounding environment for a period of time. When a fixed network infrastructure is not available, wireless mobile peer-to-peer networks become a viable option to support the continuous query system. The proposed distributed solution ensures the accuracy of the query results under realistic assumptions, and incurs much less overhead than alternative solutions.
Show less
-
Date Issued
-
2009
-
Identifier
-
CFE0002753, ucf:48111
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002753
-
-
Title
-
PRINCIPALS' PERCEPTIONS OF CYBERBULLYING POLICIES IN SELECTED FLORIDA MIDDLE SCHOOLS.
-
Creator
-
Gardner, Margaret, Taylor, Rose, University of Central Florida
-
Abstract / Description
-
This study investigated the issue of student cyberbullying in FloridaÃÂÃÂÃÂÃÂ's public middle schools. First, a content analysis of six Florida school district anti-bullying policies was conducted to determine the alignment between the state model policy and district policies. Next, 68 middle school principals from the same six Florida school districts completed the Cyberbullying Policies and...
Show moreThis study investigated the issue of student cyberbullying in FloridaÃÂÃÂÃÂÃÂ's public middle schools. First, a content analysis of six Florida school district anti-bullying policies was conducted to determine the alignment between the state model policy and district policies. Next, 68 middle school principals from the same six Florida school districts completed the Cyberbullying Policies and Response Principal Survey online. Survey respondents were either members or non-members of the state mentoring team against bullying and harassment. Findings showed that all six school districts' anti-bullying policies were comprehensive in addressing the definitions of bullying behaviors, to include cyberbullying, as well as for reporting and responding to bullying incidents. However, it was found that improvements could be made concerning periodic review and updating of bullying policies as well as addressing issues of inclusiveness. Additionally, it was found that the middle school principals were generally aware of the seriousness of cyberbullying regardless of their membership status on the state mentoring team against bullying and harassment. They enforced both technology and bullying policies to prevent and respond to student cyberbullying. This was done either by their own initiative or as directed by the school districts. It was also discovered that principals were sensitive to the fact that students at their schools had been cybervictims, cyberbullies, or both. Moreover, principals believed that a majority of those activities occurred off-campus. It remains, though, uncertain as to what factors influence whether or not a school has a campus specific cyberbullying policy. However, principals conveyed an understanding that education about and enforcement of cyberbullying policies was imperative. Hence, more research is needed to determine how educators can continue to confront this type of adolescent aggression both on and off-campus.
Show less
-
Date Issued
-
2010
-
Identifier
-
CFE0003174, ucf:48598
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0003174
-
-
Title
-
Problematic Internet Use in Residence Halls.
-
Creator
-
Quirk, Graham, Cintron Delgado, Rosa, Cox, Dr. Thomas, Owens, J. Thomas, Welch, Kerry, University of Central Florida
-
Abstract / Description
-
College students are at higher risk to develop problematic internet use (PIU) than the average person and that risk may negatively impact their college success. Since students with PIU are not violating policies, they are not being identified as having a problem through the student conduct process like other students with problems such as alcohol abuse. While research on PIU is still in its infancy, the research that has been conducted indicates that PIU is a growing problem with no agreed...
Show moreCollege students are at higher risk to develop problematic internet use (PIU) than the average person and that risk may negatively impact their college success. Since students with PIU are not violating policies, they are not being identified as having a problem through the student conduct process like other students with problems such as alcohol abuse. While research on PIU is still in its infancy, the research that has been conducted indicates that PIU is a growing problem with no agreed upon definition, diagnosis or treatment. The main purpose of this study was to determine the extent that PIU and PVP exists in residence halls on college campuses. The theoretical framework was the addiction syndrome theory (AST) and is the only current model that can be used to explain all addictions, including behavioral addictions which is the category of addiction the PIU falls under. The main measurement tool was the Young internet addiction test (IAT) which measures levels of online activity.The results of this study were inconclusive. There was a low correlation between online activity and academic performance as measured by academic probation. The weak relationship indicates that PIU may be an issue for college students and therefore may need to be considered when administrators are making policies. Whether the AST proves to be a valid conceptual framework for studying PIU and other addictions remains to be seen. The results here were inconclusive and therefore further research involving AST is needed before drawing any real conclusions.
Show less
-
Date Issued
-
2015
-
Identifier
-
CFE0005867, ucf:50887
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0005867
-
-
Title
-
Internet of Things Business Modeling and Analysis using Agent-Based Simulation.
-
Creator
-
Basingab, Mohammed, Rabelo, Luis, Elshennawy, Ahmad, Lee, Gene, Rahal, Ahmad, University of Central Florida
-
Abstract / Description
-
Internet of Things (IoT) is a new vision of an integrated network covering physical objects that are able to collect and exchange data. It enables previously unconnected devices and objects to become connected using equipping devices with communication technology such as sensors and radio frequency identification tags (RFID). As technology progresses towards new paradigm such as IoT, there is a need for an approach to identify the significance of these projects. Conventional simulation...
Show moreInternet of Things (IoT) is a new vision of an integrated network covering physical objects that are able to collect and exchange data. It enables previously unconnected devices and objects to become connected using equipping devices with communication technology such as sensors and radio frequency identification tags (RFID). As technology progresses towards new paradigm such as IoT, there is a need for an approach to identify the significance of these projects. Conventional simulation modeling and data analysis approaches are not able to capture the system complexity or suffer from a lack of data needed that can help to build a prediction. Agent-based Simulation (ABM) proposes an efficient simulation scheme to capture the structure of this dimension and offer a potential solution.Two case studies were proposed in this research. The first one introduces a conceptual case study addressing the use of agent-based simulations to verify the effectiveness of the business model of IoT. The objective of the study is to assess the feasibility of such application, of the market in the city of Orlando (Florida, United States). The second case study seeks to use ABM to simulate the operational behavior of refrigeration units (7,420) in one of largest retail organizations in Saudi Arabia and assess the economic feasibility of IoT implementation by estimating the return on investment (ROI).
Show less
-
Date Issued
-
2017
-
Identifier
-
CFE0006855, ucf:51756
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0006855
-
-
Title
-
BELIEFS OF GRADUATE STUDENTS ABOUT UNSTRUCTURED COMPUTER USE IN FACE-TO-FACE CLASSES WITH INTERNET ACCESS AND ITS INFLUENCE ON STUDENT RECALL.
-
Creator
-
Johnson, Gregory, Gunter, Glenda, University of Central Florida
-
Abstract / Description
-
The use of computers equipped with Internet access by students during face-to-face (F2F) class sessions is perceived as academically beneficial by a growing number of students and faculty members in universities across the United States. Nevertheless, some researchers suggest unstructured computer use detached from the immediate class content may negatively influence student participation, increase distraction levels, minimize recall of recently presented information, and decrease student...
Show moreThe use of computers equipped with Internet access by students during face-to-face (F2F) class sessions is perceived as academically beneficial by a growing number of students and faculty members in universities across the United States. Nevertheless, some researchers suggest unstructured computer use detached from the immediate class content may negatively influence student participation, increase distraction levels, minimize recall of recently presented information, and decrease student engagement. This study investigates graduate students' beliefs about computer use with Internet access during graduate face-to-face lecture classes in which computer use is neither mandated nor integrated in the class and the effect of such use on student recall. Methods include a 44-item questionnaire to investigate graduate students' beliefs about computers and two experiments to investigate the influence of computer use during a lecture on students' memory recall. One experimental group (open laptop) used computers during a lecture while the other (closed laptop) did not. Both groups were given the same memory recall test after the lectures, and the resulting scores were analyzed. Two weeks later, a second phase of the experiment was implemented in which laptop groups were reversed. Results from the first experiment indicated no statistically significant difference in recall scores between the open laptop group (M = 54.90, SD = 19.65) and the closed laptop group (M = 42.86, SD = 16.68); t (29) = -1.82, p = .08 (two tailed). Conversely, the second experiment revealed statistically significant differences in scores between the open laptop (M = 39.67, SD = 15.97) and the closed laptop group (M = 59.29, SD = 26.88); t (20.89) = 2.37, p = .03 (two tailed). The magnitude of the difference in mean scores (mean difference = 19.62, 95% CI: 2.39 to 36.85) was large (eta squared = 0.17). Multiple regression analysis suggests two factors accounted for 10% of the variance in recall scores: (1) students' beliefs about distractions from computer use, and (2) beliefs about the influence of computer use on memory recall. Based on survey findings, participants (N=116) viewed computers and Internet access in graduate classes as helpful academic tools, but distractions from computer use were major sources of concern for students who used computers in graduate classes and those who did not. Additionally, participants believed academic productivity would increase if instructors integrated computer use appropriately in the curricula. Results of the survey and experiments suggest unstructured computer use with Internet access in the graduate classroom is strongly correlated with increased student distractions and decreased memory recall. Thus, restricting unstructured computer use is likely to increase existing memory recall levels, and increasing unstructured computer use is likely to reduce memory recall. Recommendations include changes in the way students use computers, pedagogical shifts, computer integration strategies, modified seating arrangements, increased accountability, and improved interaction between instructors and students.
Show less
-
Date Issued
-
2009
-
Identifier
-
CFE0002950, ucf:47966
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002950
-
-
Title
-
MYSPACE OR OURSPACE: A MEDIA SYSTEM DEPENDENCY VIEW OF MYSPACE.
-
Creator
-
Schrock, Andrew, Brown, Timothy, University of Central Florida
-
Abstract / Description
-
MySpace is a type of "social networking" website where people meet, socialize, and create friendships. The way MySpace members, particularly younger individuals, interact online underscores the changing nature of mass media. Media system dependency states that individuals become reliant on media in their daily life because of fundamental human goals. This reliance, termed a dependency, leads to repeated use. Media system dependency was applied in the current study to explain how and why...
Show moreMySpace is a type of "social networking" website where people meet, socialize, and create friendships. The way MySpace members, particularly younger individuals, interact online underscores the changing nature of mass media. Media system dependency states that individuals become reliant on media in their daily life because of fundamental human goals. This reliance, termed a dependency, leads to repeated use. Media system dependency was applied in the current study to explain how and why individuals became habitual MySpace users. To attain results a survey was administered to a convenience sampling of 401 adult undergraduates at the University of Central Florida. Members reported MySpace dependency had a moderate correlation to MySpace use, and they actively used the website an average of 1.3 hours of use per day. Results indicated members use MySpace to primarily satisfy play and interaction orientation dependencies. MySpace use was found to have a correlation with number of MySpace friends. "Number of friends created" in turn had a correlation with MySpace dependency, as people returned to interact with their friends. Individual factors were also found to be a source of influence in MySpace dependency. These individual factors were demographics, psychological factors related to use of the Internet, and psychological factors related to use of MySpace. Factors related to MySpace, extroversion and self-disclosure, were positively correlated with intensity of dependency. The influence of factors related to the Internet was partly supported; computer self-efficacy was not significantly related to MySpace dependency, while computer anxiety was significantly related to MySpace dependency. Speed of connection to the Internet and available time to use the Internet were not related to MySpace dependency. Additionally, significant differences were found between genders in overall dependency, extroversion, self-disclosure, computer anxiety, and computer self-efficacy. These findings provide evidence that MySpace members were little, if at all, constrained by factors related to use of the Internet, but were attracted to the websites for similar reasons as real-life relationships. Finally, MySpace is just one of the large number of online resources that are predominantly social, such as email, message boards, and online chat. This study found that through a "technology cluster" MySpace members use these other social innovations more frequently than non-members. However, members also used significantly more non-social innovations, which may indicate that MySpace members are part of a larger technology cluster than anticipated or perhaps are in the same category of innovation adopter.
Show less
-
Date Issued
-
2006
-
Identifier
-
CFE0001451, ucf:47057
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0001451
-
-
Title
-
IRANIAN FEMINISM: A COMPARATIVE EVALUATION OF ITS IMPACT AND FUTURE.
-
Creator
-
Eskamani, Anna, Sadri, Houman, University of Central Florida
-
Abstract / Description
-
For the casual observer, the term "Iranian feminist" is often considered to be an oxymoron. However, what seems to be an ironic juxtaposition actually holds a great length of truth: for over a century now, Iranian women have been marching, screaming, and fighting for equal gender rights - all the while embracing feminist ideals. In fact, "feminity" is a political symbol that has been influencing Iranian politics for over 150 years. From the very beginning of modern Iranian history, women have...
Show moreFor the casual observer, the term "Iranian feminist" is often considered to be an oxymoron. However, what seems to be an ironic juxtaposition actually holds a great length of truth: for over a century now, Iranian women have been marching, screaming, and fighting for equal gender rights - all the while embracing feminist ideals. In fact, "feminity" is a political symbol that has been influencing Iranian politics for over 150 years. From the very beginning of modern Iranian history, women have always played a pivotal role within Iranian history, constantly connecting the personal to the political. This research aims to explore this phenomenon as an independent movement and as one comparable to American feminism. Three main topics are explored: theocratic restrictions, culture, and globalization. There are three methods of research that I have utilized as resources for this study: previous studies, statistical data, and interviews. The purpose of this study is to understand why and how feminism is increasing within the anti-feminist regime of the IRI. This study holds both theoretical and political significance and is designed to predict the future status of Iranian feminism through examining the conditions of the past and present.
Show less
-
Date Issued
-
2011
-
Identifier
-
CFH0003701, ucf:44737
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFH0003701
-
-
Title
-
WEB-BASED TIDAL TOOLBOX OF ASTRONOMIC TIDAL DATA FOR THE ATLANTIC INTRACOASTAL WATERWAY, ESTURARIES AND CONTINENTAL SHELF OF THE SOUTH ATLANTIC BIGHT.
-
Creator
-
Ruiz, Alfredo, Hagen, Scott, University of Central Florida
-
Abstract / Description
-
A high-resolution astronomic tidal model has been developed that includes detailed inshore regions of the Atlantic Intracoastal Waterway and associated estuaries along the South Atlantic Bight. The unique nature of the model's development ensures that the tidal hydrodynamic interaction between the shelf and estuaries is fully described. Harmonic analysis of the model output results in a database of tidal information that extends from a semi-circular arc (radius ~750 km) enclosing the South...
Show moreA high-resolution astronomic tidal model has been developed that includes detailed inshore regions of the Atlantic Intracoastal Waterway and associated estuaries along the South Atlantic Bight. The unique nature of the model's development ensures that the tidal hydrodynamic interaction between the shelf and estuaries is fully described. Harmonic analysis of the model output results in a database of tidal information that extends from a semi-circular arc (radius ~750 km) enclosing the South Atlantic Bight from the North Carolina coast to the Florida Keys, onto the continental shelf and into the full estuarine system. The need for tidal boundary conditions (elevation and velocity) for driving inland waterway models has motivated the development of a software application to extract results from the tidal database which is the basis of this thesis. In this tidal toolbox, the astronomic tidal constituents can be resynthesized for any open water point in the domain over any interval of time in the past, present, or future. The application extracts model results interpolated to a user's exact geographical points of interest, desired time interval, and tidal constituents. Comparison plots of the model results versus historical data are published on the website at 89 tidal gauging stations. All of the aforementioned features work within a zoom-able geospatial interface for enhanced user interaction. In order to make tidal elevation and velocity data available, a web service serves the data to users over the internet. The tidal database of 497,847 nodes and 927,165 elements has been preprocessed and indexed to enable timely access from a typical modern web server. The preprocessing and web services required are detailed in this thesis, as well as the reproducibility of the Tidal Toolbox for new domains.
Show less
-
Date Issued
-
2011
-
Identifier
-
CFE0003579, ucf:48910
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0003579
-
-
Title
-
IMPROVED INTERNET SECURITY PROTOCOLS USING CRYPTOGRAPHIC ONE-WAY HASH CHAINS.
-
Creator
-
Alabrah, Amerah, Bassiouni, Mostafa, Zou, Changchun, Lang, Sheau-Dong, Bai, Yuanli, University of Central Florida
-
Abstract / Description
-
In this dissertation, new approaches that utilize the one-way cryptographic hash functions in designing improved network security protocols are investigated. The proposed approaches are designed to be scalable and easy to implement in modern technology.The first contribution explores session cookies with emphasis on the threat of session hijacking attacks resulting from session cookie theft or sniffing. In the proposed scheme, these cookies are replaced by easily computed authentication...
Show moreIn this dissertation, new approaches that utilize the one-way cryptographic hash functions in designing improved network security protocols are investigated. The proposed approaches are designed to be scalable and easy to implement in modern technology.The first contribution explores session cookies with emphasis on the threat of session hijacking attacks resulting from session cookie theft or sniffing. In the proposed scheme, these cookies are replaced by easily computed authentication credentials using Lamport's well-known one-time passwords. The basic idea in this scheme revolves around utilizing sparse caching units, where authentication credentials pertaining to cookies are stored and fetched once needed, thereby, mitigating computational overhead generally associated with one-way hash constructions.The second and third proposed schemes rely on dividing the one-way hash construction into a hierarchical two-tier construction. Each tier component is responsible for some aspect of authentication generated by using two different hash functions. By utilizing different cryptographic hash functions arranged in two tiers, the hierarchical two-tier protocol (our second contribution) gives significant performance improvement over previously proposed solutions for securing Internet cookies. Through indexing authentication credentials by their position within the hash chain in a multi-dimensional chain, the third contribution achieves improved performance.In the fourth proposed scheme, an attempt is made to apply the one-way hash construction to achieve user and broadcast authentication in wireless sensor networks. Due to known energy and memory constraints, the one-way hash scheme is modified to mitigate computational overhead so it can be easily applied in this particular setting.The fifth scheme tries to reap the benefits of the sparse cache-supported scheme and the hierarchical scheme. The resulting hybrid approach achieves efficient performance at the lowest cost of caching possible.In the sixth proposal, an authentication scheme tailored for the multi-server single sign-on (SSO) environment is presented. The scheme utilizes the one-way hash construction in a Merkle Hash Tree and a hash calendar to avoid impersonation and session hijacking attacks. The scheme also explores the optimal configuration of the one-way hash chain in this particular environment.All the proposed protocols are validated by extensive experimental analyses. These analyses are obtained by running simulations depicting the many scenarios envisioned. Additionally, these simulations are supported by relevant analytical models derived by mathematical formulas taking into consideration the environment under investigation.
Show less
-
Date Issued
-
2014
-
Identifier
-
CFE0005453, ucf:50392
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0005453
-
-
Title
-
A SOCIAL COGNITIVE APPROACH TOWARDS UNDERSTANDING THE EFFECTS OF POPULAR POKER TELEVISION SHOWS ON COLLEGE STUDENTS.
-
Creator
-
Londo, Marc, Shaver, Dan, University of Central Florida
-
Abstract / Description
-
Tournament poker shows have become a leading ratings draw on American television. Since ESPN and the Travel Channel began airing their innovative poker shows in 2003, the game has reached a new following, particularly among college students. There are unique and psychologically significant factors that characterize the college population that make students particularly receptive to popular characterizations in media. This study investigates the potential exacerbating effect that these widely...
Show moreTournament poker shows have become a leading ratings draw on American television. Since ESPN and the Travel Channel began airing their innovative poker shows in 2003, the game has reached a new following, particularly among college students. There are unique and psychologically significant factors that characterize the college population that make students particularly receptive to popular characterizations in media. This study investigates the potential exacerbating effect that these widely popular poker television shows have on the gambling behavior of college students. 444 college students completed a survey designed to assess gratifications sought through media along with measures of attitudes, gambling behavior, and social systems. Using Social Cognitive Theory as a framework of influence, exposure to these shows ranging from the individual student to the overall college environment was assessed and evaluated. Results indicated that student gambling is strongly correlated to viewership of poker shows, particularly among younger students. This was especially seen among students who utilized the online gambling option. Gambling behavior of peers wasn't shown to be a strong influence for student gambling. However, excitement was shown to be a strong variable that should be looked at closer.
Show less
-
Date Issued
-
2006
-
Identifier
-
CFE0001087, ucf:46781
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0001087
-
-
Title
-
YOU'VE GOT MAIL: THE STUDY OF THE ATTORNEY-CLIENT PRIVILEGE AND THE USE OF ELECTRONIC MAIL.
-
Creator
-
McConnell, Justin, Cook, Kathy, University of Central Florida
-
Abstract / Description
-
The prolific use of the internet and electronic mail within the legal profession presents novel challenges to the application of the attorney-client privilege; especially, in regards to protecting intended confidential communications relayed through e-mail. This thesis addresses the question of whether an attorney in Florida, through electronic mail use, can waive his client's right to the protections of the attorney-client privilege. After a review of current case law, law review articles,...
Show moreThe prolific use of the internet and electronic mail within the legal profession presents novel challenges to the application of the attorney-client privilege; especially, in regards to protecting intended confidential communications relayed through e-mail. This thesis addresses the question of whether an attorney in Florida, through electronic mail use, can waive his client's right to the protections of the attorney-client privilege. After a review of current case law, law review articles, statutes, and texts, this thesis concluded that an attorney's communication through e-mail warrants a reasonable expectation of privacy, permitting the attorney to speak in reasonable confidence to clients through the web. However, attorneys, ethically, should consider the strong repercussions for using such a potentially transparent medium for communication. By examining the relationship between current law, the application of the attorney-client privilege, and a reasonable expectation of privacy, this study provides a comprehensive analysis for attorneys concerned with electronic mail usage. Lastly, this thesis provides attorneys with best practices for their electronic mail communications.
Show less
-
Date Issued
-
2011
-
Identifier
-
CFH0003832, ucf:44756
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFH0003832
-
-
Title
-
Fanfiction Reviews and Academic Literacy: Potential Impacts and Implications.
-
Creator
-
Weiler, Regina, Katt, James, Musambira, George, Butler, John, University of Central Florida
-
Abstract / Description
-
This study is meant to elucidate how fanfiction-related activities can incorporate many types of critical review, to call attention to what has been overlooked as significant forms of learning, and to understand and take advantage of the opportunities fanfiction's unconventional writing affords in lieu of more deliberate learning environments. This thesis was undertaken due to the significant gap in work done by aca-fan (-) a portmanteau of academic and fan(-) scholars who have strong links...
Show moreThis study is meant to elucidate how fanfiction-related activities can incorporate many types of critical review, to call attention to what has been overlooked as significant forms of learning, and to understand and take advantage of the opportunities fanfiction's unconventional writing affords in lieu of more deliberate learning environments. This thesis was undertaken due to the significant gap in work done by aca-fan (-) a portmanteau of academic and fan(-) scholars who have strong links to the fanfiction community and culture. The aspects explored are the technical writing skills and techniques demonstrated in fanfiction reviews, the influence of the nontraditional online learning environment, the rhetorical strategies that reviewers use to give feedback, the significant categories of things that reviewers comment on, and the value of skills taught peer-to-peer in this manner. The results of my research suggest that peer review in a relaxed, non-academic context leads to improved confidence and skill among a wide demographic range. This thesis proposes that fanfiction writing, reading, and reviewing supports learning. The evidence suggests that it be incorporated where applicable in formal classroom learning to supplement traditional understandings of grammar, syntax, tone, and the use of universal tropes.
Show less
-
Date Issued
-
2019
-
Identifier
-
CFE0007553, ucf:52603
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0007553
Pages