477 research outputs found

    Exploring the Role of Email, Blackboard, and Facebook in Student-Instructor Interactions Outside of Class: A Mixed Methods Study

    Get PDF
    This dissertation was a mixed methods triangulation design combining quantitative and qualitative components. The purpose of this study was twofold. First, it examined the association between the frequency and quality of students’ online interactions with instructors and the quality of student-instructor relationship. Second, this study explored the meanings of student-instructor interactions mediated by online tools. Quantitative data were collected via an online survey from 320 undergraduate students enrolled at a public research university. Qualitative data sources were in-depth interviews with six undergraduate students and six professors, observations of student-instructor interactions on Facebook, and artifacts of student-instructor interaction via email. Hierarchical regression analysis showed that approximately one third of the variance in student-instructor connectedness was explained by the frequency of and satisfaction with face-to-face, email, Blackboard, and Facebook; the grade obtained in the class; and demographic variables. Significant predictors of connectedness were grade, frequency of face-to-face student interest-driven communication, satisfaction with the face-to-face interactions, and satisfaction with the email communication. The qualitative findings revealed that instructors held expectations of formal communication for email interactions, while students had expectations for response from instructors within one-two business days. The email practices identified for instructors included responding to student email within two days; compensating for limited face-to-face time; engaging students in communication about the class content; and dealing with student disengagement. Students adopted two main practices related to email: avoiding “emergency” emails to contact instructors, and using email to avoid face-to-face contact in some situations. For Facebook interactions, instructors expected that students initiate connections, while students expected that instructors signal their availability for connection with students. Instructors’ Facebook practices pointed out different approaches for accepting student friend requests; and performing interactions. Students’ practices on Facebook highlighted two patterns: initiating connections with instructors during the semester versus at the beginning of the semester. In addition, preserving connections beyond the boundaries of a class was a practice common to students and instructors

    Secure Certificate Management and Device Enrollment at IoT Scale.

    Get PDF
    The Internet of Things (IoT) is expected to comprise of over 20 billion devices connected to the Internet by the year 2020, and support mission critical applications such as health care, road safety and emergency services to name a few. This massive scale of IoT device deployment, heterogeneity of devices and applications, and the autonomous nature of the decision making process introduces new security requirements and challenges. The devices must be securely bootstrapped in to the network to provide secure inter--device communication and also, the applications must be able to authenticate and authorize these devices to provide the relevant services. In today's Internet, Public Key Infrastructure (PKI) is widely used to provide authenticity, encryption and data integrity during network communication through the use of digital certificates. This thesis investigates the key aspects for deploying a PKI security solution in an IoT ecosystem, ranging from deploying certificates on new devices (bootstrapping) to complete life cycle management of these certificates. We believe that the current PKI can be, with suitable enhancements, used to provide the efficiency, scalability and flexibility needed for IoT security. This thesis provides a survey of key aspects for deploying PKI security solution in IoT ecosystem. We investigate different certificate management protocols and motivate the applicability of enhanced security over transport (EST) protocol for IoT PKI solution. In addition, we propose a PKI deployment model and the bootstrap mechanism to bring up an IoT device and provision it with a digital certificate. Furthermore, we provide a prototype implementation to demonstrate certificate enrollment procedure with an EST server

    Rollins College Catalog 2018

    Get PDF

    Implementating a Transitional Care Program to Reduce Hospital Readmissions in Medicare Recipients: A Research Translation Pilot Project

    Get PDF
    Patients discharged from hospital to home, especially the chronically ill and older adults, are too frequently readmitted within 30 days. The Centers for Medicare and Medicaid Services (n.d.; 2017) along with other interdisciplinary researchers have proposed, studied, and implemented strategies to decrease this excessive and expensive phenomenon. After the implementation of the Hospital Readmission Reduction Program in 2009, preventable readmissions have decreased but remain at unacceptable levels. Care transitions from hospital to home have been implicated as perilous and fraught with communication breakdown and lack of patient support and follow up. Strategies aimed at both the hospitalization phase and the 30-day transitional phase when the patient returns home have been developed and implemented. This research translation project implemented a program of transitional care management in a community clinic in Las Vegas, Nevada in accordance of the guidelines of the transitional care model (TCM). Five patients were referred to the clinic by two home health agencies. The project coordinator provided transitional care for these patients for the duration of their home health certification. All of the patients were high risk for rehospitalization according to evidence-based screening tools. At the end of 30 days, none of the five patients had been rehospitalized. Additionally, two patients were referred from another medical practice and the project coordinator evaluated them through chart review and saw them once. The sample size and non-randomized sampling method precluded generalization of the findings. However, the project revealed important qualitative data relative to risks and interventions impacting rehospitalization risk as well as issues, barriers, and facilitators related to the practice of transitional care in the community setting. Several of these findings were not specifically identified within the TCM. Themes were derived from findings and a causal network was developed. Patients received excellent and effective transitional care and the project added to the body of knowledge of transitional care implementation

    Exploring a resource allocation security protocol for secure service migration in commercial cloud environments

    Get PDF
    Recently, there has been a significant increase in the popularity of cloud computing systems that offer Cloud services such as Networks, Servers, Storage, Applications, and other available on-demand re-sources or pay-as-you-go systems with different speeds and Qualities of Service. These cloud computing environments share resources by providing virtualization techniques that enable a single user to ac-cess various Cloud Services Thus, cloud users have access to an infi-nite computing resource, allowing them to increase or decrease their resource consumption capacity as needed. However, an increasing number of Commercial Cloud Services are available in the market-place from a wide range of Cloud Service Providers (CSPs). As a result, most CSPs must deal with dynamic resource allocation, in which mobile services migrate from one cloud environment to another to provide heterogeneous resources based on user requirements. A new service framework has been proposed by Sardis about how ser-vices can be migrated in Cloud Infrastructure. However, it does not address security and privacy issues in the migration process. Fur-thermore, there is still a lack of heuristic algorithms that can check requested and available resources to allocate and deallocate before the secure migration begins. The advent of Virtual machine technol-ogy, for example, VMware, and container technology, such as Docker, LXD, and Unikernels has made the migration of services possible. As Cloud services, such as Vehicular Cloud, are now being increasingly offered in highly mobile environments, Y-Comm, a new framework for building future mobile systems, has developed proactive handover to support the mobile user. Though there are many mechanisms in place to provide support for mobile services, one way of addressing the challenges arising because of this emerging application is to move the computing resources closer to the end-users and find how much computing resources should be allocated to meet the performance re-quirements/demands. This work addresses the above challenges by proposing the development of resource allocation security protocols for secure service migration that allow the safe transfer of servers and monitoring of the capacity of requested resources to different Cloud environments. In this thesis, we propose a Resource Allocation Secu-rity Protocol for secure service migration that allows resources to be allocated efficiently is analyzed. In our research, we use two differ-ent formal modelling and verification techniques to verify an abstract protocol and validate the security properties such as secrecy, authen-tication, and key exchange for secure service migration. The new protocol has been verified in AVISPA and ProVerif formal verifier and is being implemented in a new Service Management Framework Prototype to securely manage and allocate resources in Commercial Cloud Environments. And then, a Capability-Based Secure Service Protocol (SSP) was developed to ensure that capability-based service protocol proves secrecy, authentication, and authorization, and that it can be applied to any service. A basic prototype was then devel-oped to test these ideas using a block storage system known as the Network Memory Service. This service was used as the backend of a FUSE filesystem. The results show that this approach can be safely implemented and should perform well in real environments

    Optimizing secure communication standards for disadvantaged networks

    Get PDF
    Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2009.Cataloged from PDF version of thesis.Includes bibliographical references (p. 137-140).We present methods for optimizing standardized cryptographic message protocols for use on disadvantaged network links. We first provide an assessment of current secure communication message packing standards and their relevance to disadvantaged networks. Then we offer methods to reduce message overhead in packing Cryptographic Message Syntax (CMS) structures by using ZLIB compression and using a Lite version of CMS. Finally, we offer a few extensions to the Extensible Messaging and Presence Protocol (XMPP) to wrap secure group messages for chat on disadvantaged networks and to reduce XMPP message overhead in secure group transmissions. We present the design and implementation of these optimizations and the results that these optimizations have on message overhead, extensibility, and usability of both CMS and XMPP. We have developed these methods to extend CMS and XMPP with the ultimate goal of establishing standards for securing communications in disadvantaged networks.by Stephen Hiroshi Okano.M.Eng

    Maryland Department of Health Master Agreement Annual Report of Activities and Accomplishments: FY 2017

    Get PDF
    This report describes the services The Hilltop Institute provided to the Maryland Department of Health (MDH) under the Master Agreement between Hilltop and MDH. The report covers fiscal year (FY) 2017 (July 1, 2016, through June 30, 2017). Hilltop's interdisciplinary staff provided a wide range of services, including: Medicaid program development and policy analysis; HealthChoice program support, evaluation, and financial analysis; long-term services and supports program development, policy analysis, and financial analytics; and data management and web-accessible database development

    Adviser\u27s Guide to Health Care, Volume 1: An Era of Reform—The Four Pillars

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/2720/thumbnail.jp
    • …
    corecore