{"response":{"docs":[{"system_create_dtsi":"2023-09-14T14:58:20Z","system_modified_dtsi":"2023-09-14T15:02:16Z","has_model_ssim":["StudentWork"],"id":"4f16c4647","accessControl_ssim":["e98b64da-fa5e-4d0c-965a-39edb9b95eb3"],"hasRelatedMediaFragment_ssim":["vx021g73k"],"hasRelatedImage_ssim":["vx021g73k"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Project DNA"],"date_uploaded_dtsi":"2023-09-14T14:58:20Z","date_modified_dtsi":"2023-09-14T14:58:20Z","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Henderson, Bander"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["CECH Library"],"creator_tesim":["Patel, Kathan","Wagner, Erich","Miozzi, Jamie","Burnett, Alexander","Hupp, Hannah"],"description_tesim":["Covid-19 has contributed to the rising number and worsened effects of dementia. The most\r\nsignificant explanation for this trend is the need for social isolation from loved ones. The\r\ncurrent generation of medication management software has the capability to connect\r\ndementia patients with their caregivers or loved ones during these challenging times. These\r\napplications are useful, but Project DNA wants to take medication management to the next\r\nlevel. This team has created an application that allows this to be done. By interweaving the task\r\nof taking daily medication with a social experience, Project DNA aims to decrease feelings of\r\nsocial isolation in dementia patients who typically receive in-home care."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2022-04"],"thumbnail_path_ss":"/downloads/vx021g73k?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["vx021g73k"],"member_of_collections_ssim":["2022 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["xw42n9511"],"file_set_ids_ssim":["vx021g73k"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"PROJECT DNA","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["xw42n9511"],"nesting_collection__parent_ids_ssim":["xw42n9511"],"nesting_collection__pathnames_ssim":["xw42n9511/4f16c4647"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1777026472912879616,"timestamp":"2023-09-14T15:15:06.791Z","score":0.00049999997},{"system_create_dtsi":"2023-09-14T14:56:06Z","system_modified_dtsi":"2023-09-14T14:59:43Z","has_model_ssim":["StudentWork"],"id":"cz30pv20q","accessControl_ssim":["469083ab-122b-4a82-99b9-b5bc7a215018"],"hasRelatedMediaFragment_ssim":["9880vs53s"],"hasRelatedImage_ssim":["9880vs53s"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Suite ‘n Secure"],"date_uploaded_dtsi":"2023-09-14T14:56:06Z","date_modified_dtsi":"2023-09-14T14:56:06Z","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Michael, Rebekah"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["CECH Library"],"creator_tesim":["Asensio, Manuel","Pope II, John","Ventrola, Luke","Bakshi, Akash","Belcher, Joseph"],"description_tesim":["Cyber-attacks are on the rise, becoming more prevalent in every sector of industry, many users feeling unarmed and under-educated in the fight against these threats. With this problem in mind, Suite ‘n Secure aims to provide a platform to raise awareness and educate those who are often left out of the conversation of global cyber threats, the everyday user. We want to provide a ground-up, easy to understand, lesson plan on what potential cyber threats the average user will encounter in their time on the internet, at work, and with their family."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2022-04"],"thumbnail_path_ss":"/downloads/9880vs53s?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["9880vs53s"],"member_of_collections_ssim":["2022 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["xw42n9511"],"file_set_ids_ssim":["9880vs53s"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"SUITE N SECURE","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["xw42n9511"],"nesting_collection__parent_ids_ssim":["xw42n9511"],"nesting_collection__pathnames_ssim":["xw42n9511/cz30pv20q"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1777026122414817280,"timestamp":"2023-09-14T15:09:32.530Z","score":0.00049999997},{"system_create_dtsi":"2023-09-14T14:54:02Z","system_modified_dtsi":"2023-09-14T14:56:39Z","has_model_ssim":["StudentWork"],"id":"6w924d53d","accessControl_ssim":["f0aa56a2-ce1e-4da3-b251-f54a1732aa47"],"hasRelatedMediaFragment_ssim":["4f16c463z"],"hasRelatedImage_ssim":["4f16c463z"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["GateKeeper"],"date_uploaded_dtsi":"2023-09-14T14:54:01Z","date_modified_dtsi":"2023-09-14T14:54:01Z","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Hopperton, Taylor"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["CECH Library"],"creator_tesim":["Lyons, Thomas","Roberts, Brent","Coffland, Hunter","Depue, Isaac","Klaus, Aaron"],"description_tesim":["Everyday all around the world physical access control mechanisms are used to control who can go where and when. These systems often utilize a badge system that is flawed and vulnerable to abuse, or they incorporate biometric hardware that costs companies' tens of thousands of dollars. With GateKeeper we can lock down physical access points and require the user to authenticate using various methods with their local mobile device. Rather than having unfettered access to buildings, a smooth and fast authentication middleman can be added in to improve security, without greatly reducing costs."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2022-04"],"thumbnail_path_ss":"/downloads/4f16c463z?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["4f16c463z"],"member_of_collections_ssim":["2022 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["xw42n9511"],"file_set_ids_ssim":["4f16c463z"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"GATEKEEPER","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["xw42n9511"],"nesting_collection__parent_ids_ssim":["xw42n9511"],"nesting_collection__pathnames_ssim":["xw42n9511/6w924d53d"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1777025926804013056,"timestamp":"2023-09-14T15:06:25.981Z","score":0.00049999997},{"system_create_dtsi":"2023-09-14T14:51:19Z","system_modified_dtsi":"2023-09-14T14:53:57Z","has_model_ssim":["StudentWork"],"id":"4x51hk69p","accessControl_ssim":["96aca36c-c28b-40ca-85c8-a52f000e2977"],"hasRelatedMediaFragment_ssim":["k643b260d"],"hasRelatedImage_ssim":["k643b260d"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Culture Shock"],"date_uploaded_dtsi":"2023-09-14T14:51:18Z","date_modified_dtsi":"2023-09-14T14:51:19Z","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Kunapareddi, Vineela"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["CECH Library"],"creator_tesim":["Tran, Jimmy","Singh, Harmanjot","Herier, David"],"description_tesim":["There are studies that show a loss of cultural information for immigrants over time, as well as a disconnect between generations of immigrants. Because each generation of immigrant further dissociates from their cultural roots, the information is lost. The purpose of Culture Shock is to allow users to preserve and share cultural information through a web application, as well as form a community around their heritage. The project is a web application built using ASP.NET Core with components such as JavaScript, HTML, and Bootstrap. Data is stored using a SQL database and is retrieved and inserted with Dapper ORM. It contains a wiki component as well as a social media component. The result is a web application that allows users to upload their knowledge to be preserved, as well as interact with other users to further enrich their knowledge. This means that important cultural information will be preserved and shared."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2022-04"],"thumbnail_path_ss":"/downloads/k643b260d?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["k643b260d"],"member_of_collections_ssim":["2022 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["xw42n9511"],"file_set_ids_ssim":["k643b260d"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"CULTURE SHOCK","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["xw42n9511"],"nesting_collection__parent_ids_ssim":["xw42n9511"],"nesting_collection__pathnames_ssim":["xw42n9511/4x51hk69p"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1777025361902567424,"timestamp":"2023-09-14T14:57:27.249Z","score":0.00049999997},{"system_create_dtsi":"2023-09-14T14:47:27Z","system_modified_dtsi":"2023-09-14T14:49:16Z","has_model_ssim":["StudentWork"],"id":"5m60qt47h","accessControl_ssim":["86841d3a-cc05-43f7-bf3f-02a5115d99f3"],"hasRelatedMediaFragment_ssim":["db78td54v"],"hasRelatedImage_ssim":["db78td54v"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["QRU"],"date_uploaded_dtsi":"2023-09-14T14:47:26Z","date_modified_dtsi":"2023-09-14T14:47:26Z","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Michael, Rebekah"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["CECH Library"],"creator_tesim":["Ramirez, Franco","Smith, Andre","Triplett, Nicolaus","Feliciano, Chance"],"description_tesim":["The medical field is becoming increasingly dependent on the sharing of patient information. Current systems are not easily compatible, resulting in delayed transfer between physician offices, hospitals, and treatment facilities. QRU aims to use innovative technology to simplify the process of gathering and inputting patient data across different platforms. Current required paperwork for patients seeking treatment is redundant for each visit at a new or different medical facility or office. QRU is an app that doctors and patients would use exclusively, and it would hold their patient’s information and any medical information that may be critical in an emergency. The Microsoft PowerApps platform was selected to build the application because it is accessible to new programmers. Our team has 4 Cybersecurity majors, and we chose to use PowerApps because it was a website that gave you a template to create an app. We then used Microsoft Azure and Microsoft SQL Server Management Studio to add a database that holds all our data. The QRU application enables you to login or register as a patient or a doctor and access your patient profile. In this profile it has basic profile information such as name, age, insurance information. As a doctor you have access to the patient search feature which brings up a specific patient in our database and displays their information. This means that doctors have a quick and easy way to access any patient in their system and view their medical information to help assist in any treatment. This means that doctors will have access to all patient data with the scan of a QR code and be able to add updates and new documents to a patient’s profile which will be a comprehensive profile for a patient when complete."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2022-04"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["db78td54v"],"member_of_collections_ssim":["2022 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["xw42n9511"],"file_set_ids_ssim":["db78td54v"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"QRU","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["xw42n9511"],"nesting_collection__parent_ids_ssim":["xw42n9511"],"nesting_collection__pathnames_ssim":["xw42n9511/5m60qt47h"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1777024848988471296,"timestamp":"2023-09-14T14:49:18.096Z","score":0.00049999997},{"system_create_dtsi":"2023-09-14T14:44:09Z","system_modified_dtsi":"2023-09-14T14:45:56Z","has_model_ssim":["StudentWork"],"id":"n009w405k","accessControl_ssim":["9f4ac620-97ee-4938-9352-fc99bb0edbb0"],"hasRelatedMediaFragment_ssim":["rb68xd63k"],"hasRelatedImage_ssim":["rb68xd63k"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["SpoofSpotter"],"date_uploaded_dtsi":"2023-09-14T14:44:09Z","date_modified_dtsi":"2023-09-14T14:44:09Z","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Moore, Ryan"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["CECH Library"],"creator_tesim":["Benton, Jeff","Farrell, Ned","Davidson, Bradley","Muse, Noah"],"description_tesim":["The spread and unintentional consumption of misinformation has increased drastically in the past decade. The cause of this is not well known. According to a 2019 poll, 67% of Americans believe fake news causes a great deal of confusion, while only 26% percent of Americans feel “very confident” in their ability to recognize fake news. (Watson 2019) To combat this issue, we created SpoofSpotter. SpoofSpotter is a multi-platform application that is taking a proactive approach to combatting the unintentional spread and consumption of misinformation. Users are provided with a wide variety of curated news headlines, in which they will use their skills to determine which of these are not real. Failure to determine the fake news will direct users to a training module that will 1.) Teach them what they got wrong 2.) Teach them how to prevent this from happening in the future. 3.) provide other skills and information regarding dangers surrounding the spread and consumption of illegitimate information. We have successfully developed the core features for our app, allowing users to proactively learn how to spot fake information."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["April 2022"],"thumbnail_path_ss":"/downloads/rb68xd63k?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["rb68xd63k"],"member_of_collections_ssim":["2022 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["xw42n9511"],"file_set_ids_ssim":["rb68xd63k"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"SPOOFSPOTTER","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["xw42n9511"],"nesting_collection__parent_ids_ssim":["xw42n9511"],"nesting_collection__pathnames_ssim":["xw42n9511/n009w405k"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1777024712733360128,"timestamp":"2023-09-14T14:47:08.153Z","score":0.00049999997},{"system_create_dtsi":"2023-09-14T14:40:56Z","system_modified_dtsi":"2023-09-14T14:41:12Z","has_model_ssim":["StudentWork"],"id":"4b29b766j","accessControl_ssim":["ad5ba2c3-bde7-4bd3-8f98-b47de87d7c68"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["InfoTeach"],"date_uploaded_dtsi":"2023-09-14T14:40:52Z","date_modified_dtsi":"2023-09-14T14:40:52Z","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Dekok, Dyllon"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["CECH Library"],"creator_tesim":["Willison, Patrick","Lewis, Jack","Matalka, brandon","Burstion, Jason","Snyder, Edward"],"description_tesim":["In a constantly expanding, technology-centered world, it is more important than ever for companies to have a secure hosting option for their websites. In addition, it is necessary for every company to have competent security that includes penetration testing and plans on what to do in the event of a disaster. InfoTeach aims to make life easier for companies looking to get their website up. We will do all the work to configure the servers, get the website running, and support the website after our job is done. That way companies can enter themselves into the digital world without all the weight on their shoulders. InfoTeach looks to make a positive impact on companies who are looking to set up their website but do not have the technical knowledge to do so."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2022-04"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_of_collections_ssim":["2022 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["xw42n9511"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"INFOTEACH","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["xw42n9511"],"nesting_collection__parent_ids_ssim":["xw42n9511"],"nesting_collection__pathnames_ssim":["xw42n9511/4b29b766j"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1777024341658042368,"timestamp":"2023-09-14T14:41:14.268Z","score":0.00049999997},{"system_create_dtsi":"2023-09-14T14:39:10Z","system_modified_dtsi":"2023-09-14T14:41:27Z","has_model_ssim":["StudentWork"],"id":"79407z742","accessControl_ssim":["cf14c487-3076-4c3b-b869-3811f072659a"],"hasRelatedMediaFragment_ssim":["dn39x3023"],"hasRelatedImage_ssim":["dn39x3023"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["I Wanna Vote"],"date_uploaded_dtsi":"2023-09-14T14:39:10Z","date_modified_dtsi":"2023-09-14T14:39:10Z","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Hopperton, Taylor"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["CECH Library"],"creator_tesim":["Cromwell, Trevor","Klopfsteim, Elijah","Imesicke, Bradley"],"description_tesim":["Using online voting tools in America is a very controversial and hot topic and has been\r\nfor about the past 20 years. In our project we tackle this issue by looking into the\r\nviability of using online tools to conduct voting in secure and accessible ways. Over the\r\ncourse of the class, we show who would need to use this system, what help they might\r\nneed to use it, and how it can be conducted as secure or more secure than current\r\nvoting systems – both public and private. Through work and research, we proved that an\r\nonline voting system can have the security of modern voting systems with high\r\naccessibility while costing a fraction of the current system. This means that with an\r\nupgrade of current voting systems the state can both save money and increase\r\naccessibility all in one move."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2022-04"],"thumbnail_path_ss":"/downloads/dn39x3023?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["dn39x3023"],"member_of_collections_ssim":["2022 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["xw42n9511"],"file_set_ids_ssim":["dn39x3023"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"I WANNA VOTE","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["xw42n9511"],"nesting_collection__parent_ids_ssim":["xw42n9511"],"nesting_collection__pathnames_ssim":["xw42n9511/79407z742"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1777024401545363456,"timestamp":"2023-09-14T14:42:11.381Z","score":0.00049999997},{"system_create_dtsi":"2023-09-14T14:37:03Z","system_modified_dtsi":"2023-09-14T14:39:25Z","has_model_ssim":["StudentWork"],"id":"n009w4049","accessControl_ssim":["c7d0c132-5612-4b91-bf9f-ba4ec07054ad"],"hasRelatedMediaFragment_ssim":["xk81jm90q"],"hasRelatedImage_ssim":["xk81jm90q"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["iSeeU"],"date_uploaded_dtsi":"2023-09-14T14:37:02Z","date_modified_dtsi":"2023-09-14T14:37:02Z","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Moore, Ryan"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["CECH Library"],"creator_tesim":["Furterer, Mary Kris","Muhammad, Umer","Rock, Bishop","Paul, Dawson"],"description_tesim":["The current consumer privacy framework in U.S. law is outdated, allowing corporations to invade a user’s privacy using technology without consequence. In 2013 \u0026 2020, the U.S. Government Accountability Office reported this issue to Congress, yet nothing has changed (Cackley 2020). iSeeU plans to change this by demonstrating to the public how powerful technology already is in invading user privacy, specifically facial recognition technology.\r\nThe choice to focus on facial recognition technology is an intentional one by the authors, as rather than conquer the impossible task of addressing every single technology that can invade a person’s privacy, focusing on facial recognition makes more sense as it is the most unavoidable in the authors’ opinion since it does not require a person to have or use anything.\r\niSeeU uses facial recognition technology to target the user with advertisements based on demographic information determined from the user’s image. iSeeU then explains how no legal controls on this technology prevent it from being abused (Cackley 2020). iSeeU finishes by asking the user to take two specific actions. The first is to bring awareness to the issue by sharing iSeeU with their social networks. The second is to ask the user to contact their congressional representatives to ask for legal controls on this technology, hopefully leading to a much-needed update to the consumer privacy framework in U.S. law."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2022-04"],"thumbnail_path_ss":"/downloads/xk81jm90q?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["xk81jm90q"],"member_of_collections_ssim":["2022 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["xw42n9511"],"file_set_ids_ssim":["xk81jm90q"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"ISEEU","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["xw42n9511"],"nesting_collection__parent_ids_ssim":["xw42n9511"],"nesting_collection__pathnames_ssim":["xw42n9511/n009w4049"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1777024285560274944,"timestamp":"2023-09-14T14:40:20.769Z","score":0.00049999997},{"system_create_dtsi":"2023-09-14T14:31:30Z","system_modified_dtsi":"2023-09-14T14:33:32Z","has_model_ssim":["StudentWork"],"id":"4f16c462p","accessControl_ssim":["9b8defa7-91a9-4450-9eb1-6d6aa144b758"],"hasRelatedMediaFragment_ssim":["g158bj99v"],"hasRelatedImage_ssim":["g158bj99v"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["HitchHike"],"date_uploaded_dtsi":"2023-09-14T14:31:30Z","date_modified_dtsi":"2023-09-14T14:31:30Z","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Gilany, Yahya"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["CECH Library"],"creator_tesim":["Hussain, Muhammad Moiz","Kurta, Robert","Pramanik, Anubhav","Kunkel, Adam"],"description_tesim":["A network of riders and drivers willing to carpool over long distances and share travel costs does\r\nnot exist. The development of HitchHike started because of this unmet need in the current app\r\nmarket for a rideshare solution that is reliable, affordable, easy to use, and available to everyone.\r\nCurrent options, including the private market and public transportation, leave users\r\nunderwhelmed with functionality and useability. The development team has integrated an app\r\nthat is clean and intuitive. Users can post rides that can be used to connect them to various\r\ndestinations, regardless of the distance. The application's add trip feature allows users to choose\r\ntheir origin and destination, whether they are a rider or a driver. The design features lead from\r\none screen to the next without frustrating the user. Depending on users ' needs, it is easy to\r\nsearch for existing rides or create new rides. By introducing HitchHike into the market, the hope\r\nis to connect riders and drivers with common destinations for mutually beneficial travel\r\nexperiences."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2022-04"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["g158bj99v"],"member_of_collections_ssim":["2022 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["xw42n9511"],"file_set_ids_ssim":["g158bj99v"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"HITCHHIKE","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["xw42n9511"],"nesting_collection__parent_ids_ssim":["xw42n9511"],"nesting_collection__pathnames_ssim":["xw42n9511/4f16c462p"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1777023859313082368,"timestamp":"2023-09-14T14:33:34.268Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Student Work","hits":485,"label":"Student Work"},{"value":"Article","hits":40,"label":"Article"},{"value":"Document","hits":11,"label":"Document"},{"value":"Image","hits":2,"label":"Image"},{"value":"Media","hits":2,"label":"Media"},{"value":"Dataset","hits":1,"label":"Dataset"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Library Service, CECH","hits":57,"label":"Library Service, CECH"},{"value":"Green-Schwartz, Clair","hits":8,"label":"Green-Schwartz, Clair"},{"value":"Information Technology Research Symposium","hits":6,"label":"Information Technology Research Symposium"},{"value":"Turner, Grant","hits":5,"label":"Turner, Grant"},{"value":"Gonen, Bilal","hits":4,"label":"Gonen, Bilal"},{"value":"DenBleyker, Emma","hits":3,"label":"DenBleyker, Emma"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Information technology","hits":225,"label":"Information technology"},{"value":"Information Technology","hits":32,"label":"Information Technology"},{"value":"Cyber Security","hits":4,"label":"Cyber Security"},{"value":"Economics","hits":3,"label":"Economics"},{"value":"Evidence-Based IT","hits":3,"label":"Evidence-Based IT"},{"value":"Black Market","hits":2,"label":"Black Market"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Education, Criminal Justice, and Human Services","hits":541,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"Information Engineering Technology","hits":225,"label":"Information Engineering Technology"},{"value":"Information Technology","hits":171,"label":"Information Technology"},{"value":"CECH Library","hits":91,"label":"CECH Library"},{"value":"- School of Information Technology","hits":24,"label":"- School of Information Technology"},{"value":"School of Information Technology","hits":11,"label":"School of Information Technology"},{"value":"Impact Accelerator","hits":8,"label":"Impact Accelerator"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"en_US","hits":224,"label":"en_US"},{"value":"English","hits":40,"label":"English"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati","hits":469,"label":"University of Cincinnati"},{"value":"University of Cincinnnati","hits":2,"label":"University of Cincinnnati"},{"value":"Action Research","hits":1,"label":"Action Research"},{"value":"Grant W. Turner","hits":1,"label":"Grant W. Turner"},{"value":"IEEE","hits":1,"label":"IEEE"},{"value":"Le 'Wanda M. LaBoy","hits":1,"label":"Le 'Wanda M. LaBoy"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2020-04","hits":55,"label":"2020-04"},{"value":"2021-04","hits":44,"label":"2021-04"},{"value":"2019-04","hits":33,"label":"2019-04"},{"value":"2022-04","hits":30,"label":"2022-04"},{"value":"2020-04-14","hits":14,"label":"2020-04-14"},{"value":"2005-06-02","hits":13,"label":"2005-06-02"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"bc3871882","hits":225,"label":"bc3871882"},{"value":"7d278v66w","hits":52,"label":"7d278v66w"},{"value":"bc3888732","hits":42,"label":"bc3888732"},{"value":"xw42n9511","hits":41,"label":"xw42n9511"},{"value":"1r66j276h","hits":38,"label":"1r66j276h"},{"value":"vq27zp836","hits":37,"label":"vq27zp836"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":541,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":4,"next_page":5,"prev_page":3,"total_pages":55,"limit_value":10,"offset_value":30,"total_count":541,"first_page?":false,"last_page?":false}}}