5 research outputs found

    A Study of the Impact of Information Blackouts on the Bullwhip Effect of a Supply Chain Using Discrete-Event Simulations

    Get PDF
    This study adds to the supply chain management literature by introducing and investigating information blackouts, sudden and short-duration failure of the information flow. This study aims to contribute to the literature in following ways: first, to define information blackouts in a supply chain. Second, to investigate the response of supply chains to information blackouts using discrete-event simulation. Prior research has focused more on analyzing systemic disruptions to supply chains from well-known sources. We expect the results of this study to be useful to supply chain managers in disaster prone areas

    CASE STUDY: LESSONS LEARNED WHILE LAYING THE FOUNDATION FOR A HIGH SCHOOL COMPUTER SCIENCE CURRICULUM

    Get PDF
    Parents, business leaders, and politicians agree that computer science (CS) education is a critical and necessary component of U.S. high school curriculum. Today however, key indicators, such as course offerings and participation in CS-related advanced placement exams, point to a significant lack of K-12 CS curriculum. Statesboro High School in Bulloch County, Georgia does not currently offer any formal CS-related course, making it a prime example of this gap. Faculty from both the high school and Georgia Southern University’s Department of Information Technology decided to work together to 1) demonstrate the need for a CS curriculum, 2) demonstrate the desire for CS-related courses, and 3) begin laying the foundation for a structured CS program conforming to Georgia state policy and guidelines

    User Experiments of a Social, Faceted Multimedia Classification System

    Get PDF
    Internet document sharing systems such as Flickr store billions of user-contributed images. Many collections on the Web contain large numbers of multimedia objects such as images. While such systems are designed to encourage user contributions and sharing, they are not well-organized collections on any given subject and are not easy to browse for specific subject matters. We have built a system that systematically organizes a large multimedia collection into an evolving faceted classification. This paper discusses the evaluation of such a system through a number of usage studies in a university setting

    Role-Play as a Teaching Methodology for General-Education Cyber Security

    No full text
    Undergraduates of all majors take our introductory class in cyber security. In order to appeal to their digital native learning style, we are experimenting with how we teach foundational level cyber security. We are using a role-play, scenario-based style that uses collaboration between team members. We also anticipate that this teaching method will keep more tech-savvy students engaged without being too digitally intensive for students from less technical majors

    Cyber Security and Being Cyber-Aware

    No full text
    “There are people who are making a living by collecting your personal information and selling it,” said Dr. Elizabeth Rasnick, assistant professor of information technology at Georgia Southern University. In this episode, Dr. Rasnick discusses cyber security and being cyber-aware. She provides tips and tools on how to better secure your cyber footprint and discusses why continued diligence is needed when thinking about an online presence.https://digitalcommons.georgiasouthern.edu/who-cares-podcast-cbss/1004/thumbnail.jp
    corecore