This paper presents a prime aspect of Augmented and Virtual Reality development in the field of healthcare. We explored several recent works and articles and a comparison between generic application development and immersive technology-based application is included. The paper talks about more practical approaches that can be taken to enhance the effectiveness of the application.
The resources (infrastructure) to complete this study are provided by the University of Cincinnati’s Center for Simulation and Virtual Environment Research (UCSIM). And several experiments and projects in the field of health care are used as a reference to make conclusions.
Intelligent Application if defined technically is a strategy that uses hyper-personalized mobile app experiences and services and knowledge-extraction processes to increases the user experience (Jessica Ekholm, 2017). In simple words, the applications that not only know how to support or enable key decisions but also continually learn from the user interactions to become even more relevant and valuable to those users, are known as Intelligent apps. Such applications are smart enough to differentiate between relevant and irrelevant information with the help of AI algorithms. Moreover, these apps have the capability to ease the complex task into the as simple task as a single touch.
This talk was the third panelist in the Data Empowering Social Justice Session for the 4th Annual UC Data Day Conference hosted by UC Libraries.
Christopher J. Sullivan, School of Criminal Justice, University of Cincinnati
Talk Title: Working with Agency Data to Better Understand Racial Disparities: The Case of Disproportionate Minority Contact with the Juvenile Justice System
This presentation is based on a recently-concluded study that sought to better understand patterns of disproportionate minority contact (DMC) in Ohio’s juvenile justice system. The project required extensive assessment and integration of record data that varied in their structures, availability of key fields, and operational definitions, which were collected or extracted from dozens of local juvenile court and police agencies across the state. Currently lead federally-funded research studies on juvenile risk and needs assessment and important reforms in Ohio’s juvenile justice systems.
In this paper, I study how general technology users perceive the dark web. In this study,
I conducted research on what these users know about dark web technologies, activities,
content, and how their perceptions changed after a first-hand experience on dark web
marketplaces and sites. I aimed to tackle myths and misconceptions that users had about the
dark web and present new data in order to educate and bring awareness to the dark web to
those who may never have the opportunity or reason to come upon this information on their
own. It is my hope that the findings of this paper and the experiences of the participants will
foster the spread of knowledge and awareness to both the threats and benefits that the dark
web contributes to society.
In this paper, I study how medical records are being used by cyber-criminal for financial gain and patient manipulation. I studied what kind of criminal organizations may be involved in these operations and confirmed incidents from the black market. I conducted a literature review which generated several sources from online databases. I determined five major criminal factions that are most likely to use compromised medical records, determined possible motivations and looked at several cases of medical records being sold on the black market. The healthcare industry’s digitization efforts have left it tremendously ill-equip to combat emerging threats. It is evident that the healthcare industry must take extreme measures in order to counteract the evolving threat landscape. It is my hope that the findings of paper will being to shed light on these issues and help healthcare professionals understand what kind of threats the industry is facing.
This research explores race related issues within Sherman Alexie's novel The Absolutely True Diary of a Part-Time Indian to generalize how race and racism is portrayed between different races within America, in this case Native Americans and white Americans. From there, the research presents the need to present these racial aspects through high school classroom instructions in order to raise awareness of race in secondary education. This research was presented at University of Cincinnati's 2018 Scholarly Showcase and was awarded in Top 25 poster presentation at the showcase.
In the field of information technology, virtual reality and simulation learning have become huge trends, not only in gaming and entertainment, but also in academic fields such as medicine. In the past, medical training has always been costly in providing tools and resources for entry-level medical students to acquire proper training. Medical training conducted in a virtual environment has not only yielded higher success rates, but has also reduced resource costs overall. However, with no standardized guidelines for conducting certain training regimens and learning skills, there are still studies that show some medical training programs do not produce the best results. This research focuses on analyzing the usage of virtual reality in current medical training programs to design a medical, virtual reality, training program. This program will revolve around entry-level medical students who will be attending the University of Cincinnati’s College of Medicine. This research proposal will not only examine previous research on the utilization of virtual reality in various types of medical training, but also discuss the potential benefits of developing this training program at UC.
Currently, there are many threats to small businesses, from simple employee mishandling of sensitive data to hackers attempting to breach systems for consumer data. In this paper, I attempt to review what threats businesses are currently facing, current challenges to implementing a security program, and possible ways to implement a security solution.
Keywords: Information Security, Cyber Security, Least Privilege, Risk Mitigation, Small Business, Trojan, Phishing, Malware, Ransomware, Skimmers, Security Program
Submitted to the Faculty of the Computer Science Technology Program and the Faculty of the Information Engineering Technology Program in Partial Fulfillment of the Requirements for the Degree of Bachelor Science in Computer Science Technology and Information Engineering Technology.