239 research outputs found
Recommended from our members
Cybersecurity of Online Proctoring Systems
The online proctored examinations are adopted exceedingly in all forms of academic education and professional training. AI with Machine Learning technology take the leading role in supporting authentication, authorization, and operational control of proctored online examination. The paper discusses how administrative, physical, and technical controls can help mitigate related cybersecurity vulnerabilities of online proctoring systems (OPS). The paper considers two classes of OPS: fully automated AI-enabled systems and hybrid systems (automated AI-enabled with an expert live proctor in control). Based on the review of 20 online proctoring systems, the paper discusses methods and techniques of multi-factor authentication and authorizations, including the use of challenge-response, biometrics (face and voice recognition), and blockchain technology. The discussion of operational controls includes the use of lockdown browsers, webcam detection of behavioral signs of fraud, endpoint security, VPN and VM, screen-sharing and keyboard listening programs, technical controls to mitigate the absence of spatial (physical area) controls, compliance with regulations (GDPR), etc. Other topics discussed include confidentiality of the exam content, logging of control data, video and sound recording for auditing, limitations of endpoint-based security protection and detection techniques of behavior-based cheating and the effect of new intrusive technology on students’ privacy. In conclusion, the paper lists advanced features of online proctoring systems
Significant Placebo Results in Difference-in-Differences Analysis: The Case of the ACA’s Parental Mandate
This is a post-peer-review, pre-copyedit version of an article published in Eastern Economic Journal. The definitive publisher-authenticated version is available online at: DOI:10.1057/eej.2015.49The Affordable Care Act (ACA) lets young adults stay on their parents’ insurance. Several papers use age–time difference-in-differences strategies to argue this causes health insurance and labor effects. I show that difference-in-differences over “placebo” dates also produces statistically significant “effects” before ACA implementation, even with conservative adjustments. This suggests the effects attributed to the ACA could instead reflect dynamics in the age-structure of the health insurance and labor markets. Reducing the age bandwidth yields more reliable estimates of the increases in parental and overall insurance coverage. The key problem in this literature is therefore potentially overstating the ACA’s “effects” in other dimensions
Subtraction games with FES sets of size 3
This paper extends the work done by Angela Siegel on subtraction games in
which the subtraction set is N \ X for some finite set X. Siegel proves that
for any finite set X, the G-sequence is ultimately arithmetic periodic, and
that if |X| = 1 or 2, then it is purely arithmetic periodic. This note proves
that if |X| = 3 then the G-sequence is purely arithmetic periodic. It is known
that for |X| \geq 4 the sequence is not always purely arithmetic periodic.Comment: 7 pages, including 2 pages of dat
The Impact of Women’s Health Clinic Closures On Preventive Care
We examine the impact of women’s health clinic closures on women’s preventive care use in Texas and Wisconsin using a unique policy context, data on clinic street addresses, and confidential respondent ZIP codes from the Behavioral Risk Factor Surveillance System. From a within-ZIP-code analysis, we conclude that an increase of 100 miles to the nearest clinic results in a decrease in the annual utilization rate of a clinical breast exam by 11 percent, a mammogram by 18 percent, and a Pap test by 14 percent. These estimates are generally larger for women of lower educational attainment. (JEL H75, I18, J13
The Impact of Women’s Health Clinic Closures on Fertility
In recent years, the government of Texas has enacted multiple restrictions and funding limitations on women’s health organizations affiliated with the provision of abortion services. These policies have caused numerous clinic closures throughout the state, drastically reducing access to reproductive health care. We study the impact of these clinic closures on fertility rates by combining quarterly snapshots of health center addresses from a network of women’s health centers with restricted geotagged data of all Texas birth certificates for 2008–2013. We calculate the driving distance to the nearest clinic for each ZIP-code and quarter, and find that an increase of 100 miles to the nearest clinic results in a 1.2 percent increase in the fertility rate. This increase is driven by a 2.4 percent increase in the fertility rate for unmarried women, while there is no statistically significant change for married women
Teaching Information Assurance Online
Cyber security threats, systems vulnerabilities, privacy concerns, and other security developments are progressing and proliferating rapidly.  This article describes experience accumulated in teaching an online Information Assurance course at a 4-year college for graduate and undergraduate students. The course content is based on the security curriculum structured by ten security domains of knowledge, as defined by the (ISC)² for professional certification programs CISSP of (ISC)². Only eight out of ten domains are included in the 10-week IA-Study course. The courses uses several basic e-learning activities - online studies supported with Via Voice-narrated slides presentation, video presentation, online reference book and supplemental readings; collaborative and individual coursework supported by Online WorkBook (WB) in Google Docs, assessment quizzes administered online via Blackboard/WebCT, and team/class discussions and networking supported with a dedicated Google Blog.  WB facilitates collaborative students’ work using Wiki technology; it provides both work instructions and the place to submit the students work. Using a log in the Google Docs, the instructor can see individual contributions of team members to a collaborative project. In addition, each team is required to submit members’ peer evaluations.  WikiDigest project – a value-added work-in-progress - opens opportunities for the instructor and the students to work together on collecting Tips and Recommendations for an Information Security Awareness knowledge base that can be used on campus by students and faculty.  In conclusion, the article reviews students’ perceptions of online learning such as acceptance of online learning in general, time needed and actually spent to study the course, and effectiveness of team collaboration
Effect of Carbon-Doping in Bulk Superconducting MgB2 Samples
Bulk superconducting samples of MgB2 were prepared by solid state reaction of
stoichiometric quantities of Mg turnings and B in a sealed Ta cylinder at 890 C
for 2 hours. The as-synthesized MgB2 samples had a Tc of 39 K, as defined as
the onset of diamagnetism. The crystal symmetry was found to be hexagonal with
lattice parameters, a=3.0856 A, and c=3.5199 A, similar to the literature
values. To study the effect of carbon doping in MgB2, various C-containing
samples of x varying from 0 to 1.00 in MgB2-xCx were prepared. Magnetic
characterizations indicate that the Tc onset is same for pure and C-doped
samples for x = 0.05, and 0.10. However, the shielding signal decreased
monotonically with C content, apparently due to the presence of carbon on the
grain boundaries that isolates grains and prevents flow of supercurrents on the
perimeter.Comment: 10 pages, 3 figure
Cyber Security Awareness Among College Students
This study reports the early results of a study aimed to investigate student awareness and attitudes toward cyber security and the resulting risks in the most advanced technology environment: the Silicon Valley in California, USA. The composition of students in Silicon Valley is very ethnically diverse. The objective was to see how much the students in such a tech-savvy environment are aware of cyber-attacks and how they protect themselves against them. The early statistical analysis suggested that college students, despite their belief that they are observed when using the Internet and that their data is not secure even on university systems, are not very aware of how to protect their data. Also, it appears that educational institutions do not have an active approach to improve awareness among college students to increase their knowledge on these issues and how to protect themselves from potential cyber-attacks, such as identity theft or ransomware
Recommended from our members
The Need for International AI Activities Monitoring
This paper focuses primarily on the need to monitor the risks arising from the dual-use of Artificial Intelligence (AI). Dual-use AI technology capability makes it applicable for defense systems and consequently may pose significant security risks, both intentional and unintentional, with the national and international scope of effects. While domestic use of AI remains the prerogative of individual countries, the unregulated and nonmonitored use of AI with international implications presents a specific concern. An international organization tasked with monitoring potential threats of AI activities could help defuse AI-associated risks and promote global cooperation in developing and deploying AI technology. The paper reviews factors involved in the international monitoring of AI activities, strategies of dual-use technologies regulation, challenges, and potential solutions
- …