Skip to Main Content

Basic Search

Skip to Search Results
 
 
 

Left Column

Filters

Right Column

Search Results

Search Results

(Total results 13)

Mini-Tools

 
 

Search Report

  • 1. Alqallaf, Maha Software Defined Secure Ad Hoc Wireless Networks

    Doctor of Philosophy (PhD), Wright State University, 2016, Computer Science and Engineering PhD

    Software defined networking (SDN), a new networking paradigm that separates the network data plane from the control plane, has been considered as a flexible, layered, modular, and efficient approach to managing and controlling networks ranging from wired, infrastructure-based wireless (e.g., cellular wireless networks, WiFi, wireless mesh net- works), to infrastructure-less wireless networks (e.g. mobile ad-hoc networks, vehicular ad-hoc networks) as well as to offering new types of services and to evolving the Internet architecture. Most work has focused on the SDN application in traditional and wired and/or infrastructure based networks. Wireless networks have become increasingly more heterogeneous. Secure and collab- orative operation of mobile wireless ad-hoc networks poses significant challenges due to the decentralized nature of mobile ad hoc wireless networks, mobility of nodes, and re- source constraints. Recent developments in software defined networking shed new light on how to control and manage an ad hoc wireless network. Given the wide deployment and availability of heterogeneous wireless technologies, the control and management of ad hoc wireless networks with the new software defined networking paradigm is offered more flexibility and opportunities to deal with trust and security issues and to enable new features and services. This dissertation focuses on the SDN MANET architecture design issues for provid- ing secure collaborative operation. Specifically, (I) We have proposed four design options for software defined secure collaborative ad hoc wireless network architecture. The de- sign options are organized into (a) centralized SDN controller architecture with controller replication and (b) distributed SDN controller architecture. While these proposed architec- ture options exhibit different characteristics, many common challenges are shared amongst these options. Challenges include fault-tolerance, scalability, efficiency, and security. The unstr (open full item for complete abstract)

    Committee: Bin Wang Ph.D. (Advisor); Yong Pei Ph.D. (Committee Member); Krishnaprasad Thirunarayan Ph.D. (Committee Member); Zhiqiang Wu Ph.D. (Committee Member) Subjects: Computer Engineering; Computer Science
  • 2. Westermann, David Mom, Dad, Let's Be (Facebook) Friends: Exploring Parent/Child Facebook Interaction from a Communication Privacy Management Perspective

    MA, Kent State University, 2011, College of Communication and Information / School of Communication Studies

    As the use of Facebook continues to grow, individuals aged 35 and older represent the fastest growing demographic. Parents and children now have the opportunity to connect with each other through the website. However, research investigating parent/child Facebook interaction remains scarce. This thesis utilizes Communication Privacy Management (CPM) theory to better understand young adults' decisions regarding parental Facebook friend requests. In addition, the relational characteristics of parental trust and relational quality are examined in relation to young adults' decisions. Results indicate young adults generally accept friend requests from their parents while making few, if any, changes to their privacy management practices. Parental trust and relational quality are related to young adults' decisions when faced with a mother's friend request, but not those received from a father. Explanations for the differences in results by parent are elucidated. This study adds to a growing body of research demonstrating that individuals use Facebook to connect with a multitude of face-to-face social ties and addresses implications for this phenomenon.

    Committee: Jeffrey Child Ph.D. (Advisor); Mei-Chen Lin Ph.D. (Committee Member); Jung Hyun Kim Ph.D. (Committee Member) Subjects: Communication; Families and Family Life; Mass Media
  • 3. Rapp, Claire An Analysis of the Social and Technological Factors Influencing Team Performance in Wildland Fire Incident Management Teams

    Doctor of Philosophy, The Ohio State University, 2022, Environment and Natural Resources

    Wildfire is a difficult environmental hazard to manage. While uncontrolled wildfires can pose considerable risk, overly-aggressive suppression degrades fire-adapted ecosystems and increases the risk of catastrophic wildfires in the long run. The fire managers and incident management teams (IMTs) who manage fires must make decisions in rapidly evolving situations characterized by high risk. Many factors inform these decisions, and fire managers must choose how they will seek out and attend to information. Information may come from technological sources such as decision support tools, or social sources such as trustworthy supervisors and subordinates. IMT members have a suite of decision support tools available that provide information on a variety of attributes, such as values at risk, forecasted weather, and projected fire behavior. However, it is not clear how IMT members use things like weather information to inform their tactical decisions. In Chapter 1, we review the psychological dynamics of fire manager decision making and the social dynamics of wildland fire management teams that influence what information fire managers use, and how they use it. In Chapter 2, we use a choice experiment to evaluate how IMT members use forecasted precipitation, humidity, and wind when making tactical decisions. Results show IMT members actively use weather information and generally prefer to directly attack fires exhibiting moderate fire behavior and indirectly attack fires exhibiting extreme fire behavior. However, how much importance fire managers assign to weather information depends on the previous tactics being used up until that point. Based on these results, we recommend future efforts to improve reliability and confidence should target precipitation and wind models. We also recommend decision support tools, including weather forecast tools, be designed with the probable decision strategies of the end users in mind. We also evaluate how trust dynamics between team member (open full item for complete abstract)

    Committee: Robyn Wilson (Advisor); Matthew Hamilton (Committee Member); Eric Toman (Committee Member) Subjects: Behavioral Sciences; Environmental Management; Natural Resource Management; Psychology
  • 4. Allouzi, Maha IoMT AUTHENTICATION AND AUTHORIZATION ACCESS CONTROL BASED ON MULTIPARTY TRUST NEGOTIATION

    PHD, Kent State University, 2022, College of Arts and Sciences / Department of Computer Science

    Lately, medical data and services interchanges throughout the Internet of Medical Things (IoMT) have become not only possible but essential. Nowadays, interactions involving doctor's tablets, patients' insulin pumps, Heart monitors, etc., are becoming everyday occurrences. In such a scenario, traditional assumptions for establishing and enforcing access control regulations no longer hold. The entities need to authenticate and trust each other to exchange sensitive medical information. Interactions are further complicated because the interacting entities usually belong to different security domains or don't have preexistent relationships. To address such issues; Trust Management can be used. Trust management is essentially the study of access control policies, digital credentials, and building trust relationships for a widely distributed environment where authorization cannot be based on identity authentication. The term trust management was first coined by Blaze, Feigenbaum, and Laze (M. Blaze, 1996) IoMT deals with a patient-data-rich segment, making security and privacy a severe concern to patients. Therefore, access control is a significant issue to ensure trust in the IoMT. However, deploying existing authentication and authorization solutions to the IoMT is not straightforward because of highly dynamic and possibly unprotected environments and resource limitations. This dissertation proposes Soter, a negotiation-based access control system for constrained devices in the IoMT environment. This dissertation aims to provide new approaches to automatic, secure, and efficient trust establishment among multiple parties in a constrained environment of the IoMT. The implementation of an access control system can be divided into three design layers: • Access Control Policy language, • Access Control Model, and • Access Control Mechanisms. So, in this dissertation, we used these abstraction layers, and we designed Soter, a HIPPA-based access control system for the (open full item for complete abstract)

    Committee: Javed Khan (Advisor); Javed Khan (Committee Chair); Hassan Peyravi (Committee Member); Pratim Datta (Committee Member); Kambiz Ghazinour (Committee Member); Elena Novak (Committee Member); Jong-Hoon Kim (Committee Member) Subjects: Computer Science
  • 5. Heaton, Tyler Cloud Based IP Data Management Theory and Implementation for a Secure and Trusted Design Space

    Master of Science, The Ohio State University, 2019, Electrical and Computer Engineering

    IP Data management in cloud computing presents a challenge with scalability and integration. With extended IP lifecycles and considerably large design files, IP provenance has become a priority to drive the need of a cloud design environment - research has gone into selecting a data management tool which promotes IP reuse and third party integration. This thesis presents work on the optimization of IP (intellectual property) data management in an analog design environment. A myriad of IP data management platforms were researched, vetted, and implemented in cloud infrastruc- tures. The features of the tools were compared and analyzed for performance in a cloud setting. Moreover, the server client architecture for these IP data management tools has been defined to enable the success of analog and digital design in a cloud computing atmosphere. In order to promote IP provenance and tracking, data must exist in a trusted design space which monitors user and data traffic, captures changes made to IP, and allocates permissions across design environments.

    Committee: Waleed Khalil (Advisor); Steve Bibyk (Committee Member); Shane Smith (Advisor) Subjects: Electrical Engineering; Engineering
  • 6. Freeman-Hildreth, Yolonda THE PATIENT PERSPECTIVE: EXPLORING THE INFLUENCE OF SOCIAL INTERACTIONS ON CHRONIC DISEASE OUTCOMES

    Doctor of Philosophy, Case Western Reserve University, 2019, Management

    Healthcare systems worldwide are challenged with caring for patients with chronic conditions. As of 2014, at least 60% of Americans have at least one chronic condition, with diabetes being among the top five chronic conditions. Although medical management is utilized for glucose control, the majority of diabetes management involves self-care, imposing physical and psychological demands. As a result, there is an underappreciation of the patients' actual workload and burden by providers. Although patients emphasize the importance of interpersonal relationships as a critical component of quality care, there is often incongruence between the goals of providers and the patients. This study aims to identify factors related to interpersonal interactions that influence behavioral change and chronic disease outcomes by exploring the dynamics of the patient-provider relationship. This is a three-part exploratory mixed methods study. In Study 1, thirty Type 2 Diabetic (T2DM) participants were interviewed to explore the social interactions that facilitate behavioral change. Findings showed that positive interpersonal interactions, social relationships, and the ability to cope during disease setbacks or situational events influenced sustained behavioral change. These findings informed measures for Study 2. In Study 2, a quantitative study surveying 423 T2DM participants examined the attributes that influence chronic disease outcomes. Findings revealed coping ability to positively fully mediate the effect of compassion on self-management and treatment satisfaction. Further, coping ability fully mediated the effect of optimism on self-management and treatment satisfaction. Providers enhanced self-management adherence and treatment satisfaction by helping their patients cope with the burdens of diabetes by communicating with compassion and optimism. In Study 3, 422 T2DM participants were surveyed to explore how the patients' perceptions of relationship quality influence c (open full item for complete abstract)

    Committee: Yunmei Wang Ph.D. (Committee Chair); David Aron M.D. (Committee Member); Richard Boland Ph.D (Committee Member); Philip Cola Ph.D (Committee Member) Subjects: Health Care; Health Care Management
  • 7. Bryson, Dean A Unified, Multifidelity Quasi-Newton Optimization Method with Application to Aero-Structural Design

    Doctor of Philosophy (Ph.D.), University of Dayton, 2017, Engineering

    A model's level of fidelity may be defined as its accuracy in faithfully reproducing a quantity or behavior of interest of a real system. Increasing the fidelity of a model often goes hand in hand with increasing its cost in terms of time, money, or computing resources. The traditional aircraft design process relies upon low-fidelity models for expedience and resource savings. However, the reduced accuracy and reliability of low-fidelity tools often lead to the discovery of design defects or inadequacies late in the design process. These deficiencies result either in costly changes or the acceptance of a configuration that does not meet expectations. The unknown opportunity cost is the discovery of superior vehicles that leverage phenomena unknown to the designer and not illuminated by low-fidelity tools. Multifidelity methods attempt to blend the increased accuracy and reliability of high-fidelity models with the reduced cost of low-fidelity models. In building surrogate models, where mathematical expressions are used to cheaply approximate the behavior of costly data, low-fidelity models may be sampled extensively to resolve the underlying trend, while high-fidelity data are reserved to correct inaccuracies at key locations. Similarly, in design optimization a low-fidelity model may be queried many times in the search for new, better designs, with a high-fidelity model being exercised only once per iteration to evaluate the candidate design. In this dissertation, a new multifidelity, gradient-based optimization algorithm is proposed. It differs from the standard trust region approach in several ways, stemming from the new method maintaining an approximation of the inverse Hessian, that is the underlying curvature of the design problem. Whereas the typical trust region approach performs a full sub-optimization using the low-fidelity model at every iteration, the new technique finds a suitable descent direction and focuses the search along it, reducin (open full item for complete abstract)

    Committee: Markus Rumpfkeil Ph.D. (Committee Chair); Jose Camberos Ph.D., P.E. (Committee Member); Raymond Kolonay Ph.D. (Committee Member); Joaquim Martins Ph.D. (Committee Member) Subjects: Aerospace Engineering
  • 8. Fallon, Corey The Effects of a Trust Violation in a Team Decision-making Task: Exploring the Affective Component of Trust

    PhD, University of Cincinnati, 2016, Arts and Sciences: Psychology

    Trust is an attitude that influences the intention `to be vulnerable to another party when that party cannot be controlled or monitored' (Mayer, Davis & Schoorman, 1995, p.712) and is important for work teams. Like all attitudes, the affective component of trust consists of an immediate evaluation and a response that is more deliberate and effortful. Capturing both aspects of the affective component may allow researchers to gain a more complete understanding of how trust develops. Implicit attitudes are an automatic affective response and may reflect the immediate evaluation component of trust. Explicit attitudes may reflect the more effortful and deliberate affective process that contributes to trust. In this study, 108 participants worked with two virtual teammates in two sessions. In session one, participants worked with a “fair” teammate and an “unfair” teammate on a financial decision-making task. The fair teammate shared the team earnings evenly with the participant, whereas the unfair teammate exploited the participant by taking most of the team earnings. In session two teammate behavior changed; either the fair teammate in the first session became unfair or the unfair teammate became fair. Participants completed measures of Emotion Management Ability, Fluid Intelligence, personality and Implicit and Explicit Affective Attitude Change. Participants also recorded the Economic Offer they would entrust to each teammate, Self-Report Trust and a perceived trustworthiness measure. The researcher explored whether teammate generosity affected trust and implicit attitude toward the teammates and whether change in trust in the unfair teammate would be associated with affective attitude change. Analyses revealed Explicit Affective Attitude Change significantly predicted both Self-Report Trust and Economic Offer, after controlling for cognitive predictors of trust. Implicit attitude predicted only Self-Report Trust and this prediction was moderated by Emotion (open full item for complete abstract)

    Committee: Chung-Yiu Chiu Ph.D. (Committee Chair); Adelheid Kloos Ph.D. (Committee Member); Michael Richardson Ph.D. (Committee Member) Subjects: Psychology
  • 9. Ahrens, Fred Knowledge Exchange Behavior in Supply Channel Relationships: A Social Exchange and Game-theoretic Approach

    PhD, University of Cincinnati, 2015, Business: Business Administration

    Knowledge exchange behavior is often portrayed as a key determinant of the competitive position of a firm operating in a knowledge intensive environment. Of interest to researchers and managers alike are the conditions that promote, attenuate or even retard knowledge sharing between firms. This research employs a supply channel context to study knowledge exchange behavior (KEB). Whether knowledge exchange occurs, and if so, to what extent, may be contingent on various factors. While inter-organizational trust has widely been posited to be a key antecedent of knowledge exchange behavior, a review of the literature reveals that the evidence is conflicting. Sometimes a high level of inter-organizational trust may not be necessary for a decision to exchange valuable knowledge. Likewise, despite high inter-organizational trust KEB may not be present. A recent empirical study by Kim, Umanath, Kim, Ahrens & Kim, (2012) found that increasing levels of inter-organizational trust actually resulted in inhibition of knowledge exchange behavior in supply channel dyads even with a high level of knowledge complementarity. This specific finding has served as the springboard for this project; that is, this inquiry is focused on identifying conditions that render inter-organizational trust unimportant. In short, this research seeks to examine the contingent effect of knowledge interdependence (joint dependence + dependence asymmetry) on KEB – speculated to be a missing contingency by Kim, et al (2012).

    Committee: Amitabh Raturi Ph.D. (Committee Chair); Vivek Choudhury Ph.D. (Committee Member); Suzanne Masterson Ph.D. (Committee Member); Narayan Umanath Ph.D. (Committee Member) Subjects: Business Administration
  • 10. Khalaf, Ramez AN AGENT-BASED SIMULATION OF INVENTORY MANAGEMENT WITH NEGATIVE SHORTAGE COSTS AND UNCERTAIN QUALITY AND LEAD TIMES

    Master of Science, The Ohio State University, 2010, Industrial and Systems Engineering

    A small business retailer and wholesaler is part of a supply chain that manufacturers, ships, warehouses, and sells units for commercial and home use in Palestine. Currently, the small business out-sources part of both their supplier and warehousing related decision-making that might normally be relevant in inventory management. With respect to warehousing, what the small business might store as safety stock is currently sold to and, potentially, repurchased from another small business. Therefore, the effective shortage costs are negative. Also, currently the small business must place orders at discrete times when the supplier has a boat coming from Asia. The times when these orders can be placed are only somewhat predictable and occur only typically five times per year. We investigate the concepts associated with two different models of inventory planning to investigate three questions: (1) What (Q, R)-type policy best fits their situation (if any)? (2) how different are the true expected profits from those predicted by the expected profit model associated with the closest (Q, R)-type policy? (3) How much more money could the small business expect to make if they recruited a new, more flexible but potentially lower quality supplier? The first model that we develop is of the form used to derive (Q, R)-type policies. The second model is an agent-based simulation which includes the possibility of adaptation of policies to the observed quality level of a hypothetical new supplier.

    Committee: Allen Theodore Dr. (Advisor); Jerald Brevick Dr. (Committee Member) Subjects: Industrial Engineering
  • 11. Zhu, Jian Access Control for Cross Organizational Collaboration

    Doctor of Philosophy (Ph.D.), University of Dayton, 2012, Electrical Engineering

    Access control must provide a secure environment for collaboration among independent organizations with different policies, systems, and locations. In addition, a trust climate needs to be fostered to encourage collaborators to focus more on sharing than on self-protecting. Privacy preservation is also an indispensable part to protect personal information. The objective of this work is to address these requirements by building a comprehensive model that provides flexible and fine-grained access control across organizational boundaries. First the scope of the model is defined according to the discussion of three taxonomies: access control models, the relationships between resources and attacks, and attributes. The core model is then developed based on Attribute Based Access Control (ABAC). A few new concepts including requests, prerequisites, and obligations are introduced. A decision making procedure is designed in a way that pre-determined access control decisions can be revoked during a session, which greatly improves the flexibility of the model. Since conflicting decisions may be drawn from different policies, an analysis of possible reasons is performed. Combination principles are then designed to enable automatic merging of policies without human intervention. Another contribution here is trust based attribute management. Despite of the fact that attributes are important direct impacting factors for access control, few research efforts were made to maintain their correctness and exactness in a timely manner. To address this, a systematic definition of the lifecycle of an attribute is provided along with definitions of management subjects, objects, and operations. Trust levels of subjects are then used to determine who and when to perform these operations. The values of trust levels are determined using algorithms developed based on parameters such as collaboration level, recommendation, and reputation. The trustworthiness of attributes is also discussed. The r (open full item for complete abstract)

    Committee: John S. Loomis (Advisor) Subjects: Computer Engineering; Computer Science; Electrical Engineering
  • 12. Byard, Sally A Quantitative Analysis of the Relationships between Teacher Trust, Self-Efficacy and School Academic Performance

    Doctor of Education, University of Akron, 2011, Educational Leadership

    This study sought to determine if teachers' perceptions of trust and self-efficacy were related to school academic performance based on Ohio Achievement Assessment results for the 2009-10 school year in eight Midwestern public schools. Additionally, the study sought to determine if teacher trust and self-efficacy were related to one another. Two multiple regression analyses were conducted, and the results indicated that both trust and self-efficacy were significantly related to school academic performance. Results also showed that the trust subscales of trust in colleagues and trust in clients, and the self-efficacy subscales of instructional strategies and classroom management were significantly related to school academic performance. A canonical correlation was conducted, and the results showed a significant relationship between trust and self-efficacy. A univariate regression analysis was also used to assess if there were relationships between the subscales. Results showed that the self-efficacy subscale of student engagement was related to both trust in the principal and trust in colleagues. It also showed that the self-efficacy subscale of instructional strategies was related to trust in clients (students and parents). This study was unique because it provided results by looking at relationships between school academic performance, trust and self-efficacy using the percentage of academic indicators passed on the Ohio Achievement Tests. It was unique because it demonstrated that specific subscales contributed separately to school academic performance, and that some of these subscales were related to one another. This study provided more in depth results when looking at relationships between trust, self-efficacy and school academic performance, and at relationships between the subscales. There are implications for further research to identify the different variables and their degree of influence on each of the subscales that affects the strength of the relationsh (open full item for complete abstract)

    Committee: Sharon D. Kruse Dr. (Advisor); Susan D. Olson Dr. (Committee Member); Xin Liang Dr. (Committee Member); Renee Mudrey-Camino Dr. (Committee Member); Richard Glotzer Dr. (Committee Member) Subjects: Educational Leadership
  • 13. Polin, Beth Putting the Power Back Into Empowerment: Construct Clarification and the Incorporation of Trust

    Doctor of Philosophy, The Ohio State University, 2013, Labor and Human Resources

    Organizations that have an empowered workforce contain employees who may claim higher job satisfaction, higher organizational commitment, lower turnover intention, and better job performance, among other desirable outcomes. But to best achieve such attitudes and behaviors, it is critical that a clear conceptualization and operationalization of the empowered state and the empowerment process exist. This dissertation has two objectives. First, a clarified and more accurate definition of the empowered state is presented. Despite the ubiquitousness of empowerment, no clear conceptualization and thus operationalization exist for the construct. Keeping in mind its power roots and its multidimensional nature, the empowered state is defined as a psychological state reflecting autonomy, control, and accountability. By labeling this the empowered state instead of empowerment, the internal state of the employee can be better differentiated from the empowerment process. The second objective of this dissertation, then, is to present and verify such a model of the empowerment process, which includes actors and forces in the employee's external environment. This model identifies the factors impacting the degree to which an employee experiences an empowered state, outcomes of the empowered state, and other mediating variables. The role of trust between a manager and an employee in the empowerment process—a relationship not yet studied in an empowerment context—is also examined. To test hypotheses concerning the empowered state and the empowerment process, data was gathered from part-time/working graduate students and their managers. A total of 108 manager-employee pairs were collected. Factor analysis, regression analyses, and indirect effects models were used in the data analysis process. Results partially support the proposed clarified definition of the empowered state. The suggested antecedents of access to information and resources and core self-evaluation sho (open full item for complete abstract)

    Committee: Howard Klein (Advisor); Roy Lewicki (Committee Member); Robert Lount (Committee Member) Subjects: Management; Organizational Behavior