Category Archives: Summary_1



Hong, H., Kubik, J., & Solomon, A. (2000). Security Analysts’ Career Concerns and Herding of Earnings Forecasts. The RAND Journal of Economics, 31(1), 121-144. Retrieved from

Martin, S. B. (1998). Information Technology, Employment, and the Information Sector: Trends in Information Employment 1970-1995. Journal Of The American Society For Information Science, 49(12), 1053-1069

Roan, A. a., & Whitehouse, G. (2007). Women, information technology and ‚Äėwaves of optimism‚Äô: Australian evidence on ‚Äėmixed-skill‚Äô jobs. New Technology, Work & Employment, 22(1), 21-33

Kvochko, E. (2016, January 04). Why There Are Still Few Women Leaders in Tech. Retrieved October 11, 2017, from


  1. United States. Congress. Senate. Committee on the Judiciary. (2011). Cybercrime updating the Computer Fraud and Abuse Act to protect cyber space and combat emerging threats: Hearing before the Committee on the Judiciary, United States Senate, One Hundred Twelfth Congress, first session, September 7, 2011. (United States. Congress. Senate. S. hrg. ; 112-126. Y). Washington: U.S. G.P.O.
  2. Schirick, E. A. (2012, March-April). Computer network security–evolving risks. Camping Magazine, 85(2), 16+. Retrieved from
  3. United States. Congress. Senate. Committee on Homeland Security Governmental Affairs author. (2017). DHS Stop Asset and Vehicle Excess Act : Report of the Committee on Homeland Security and Governmental Affairs, United States Senate, to accompany H.R. 366 to amend the Homeland Security Act of 2002 to direct the Under Secretary for Management of the Department of Homeland Security to make certain improvements in managing the Department’s vehicle fleet, and for other purposes. (United States. Congress. Senate. Report; 115-32. Y).
  4. Grimes, R. A. (2015, November 9). 10 reasons why phishing attacks are nastier than ever. Retrieved from                                                                 1596729&asid=3f53530e427f3b03d56c02fb7d591326
  5. Leithauser, T. (2017, June 12). DHS eyes undoing decision to treat elections as ‘critical infrastructure’. Cybersecurity Policy Report. Retrieved from


Sacolick, I. (2017, August 18). What is devops? Transforming software       development. Retrieved from

Asay, M. (2017, June 16). Apple’s Core ML: The pros and cons. Retrieved from

Naylor, I. (2017, June 7). The 7 best wireframing and prototyping tools for app makers. Retrieved from

Technical help wanted. (2017, July 31). Long Island Business News. Retrieved from

Asay, M. (2017, July 21). JavaScript for squares: The incredible rise of TypeScript. Retrieved from

5 articles – Jason Zeng

1 – Maney, Kevin. “How Facebook’s AI Bots Learned Their Own Language and How to Lie; Bots that can negotiate your next deal on a hotel room might also know how to lie to you.” Newsweek, 18 Aug. 2017. General OneFile, Accessed 7 Sept. 2017.

2 – One Small Step for AI, One Giant Step for Robotics.” Electronics For You, 16 Aug. 2017. General OneFile, Accessed 7 Sept. 2017.

3 – “Which Giant Tech Company Is Winning the Race to Be Skynet?” Vulture, 3 Aug. 2017. General OneFile, Accessed 7 Sept. 2017.

4 – “Cue bits; Quantum computers.” The Economist, 11 Mar. 2017, p. 10(US). General OneFile, Accessed 7 Sept. 2017.

5 – Bauer, Meredith Rutland. “Quantum Computing Is Going Commercial With the Potential to Disrupt Everything; Problems that would take longer than a human’s life span on a classic computer will be completed in hours or days with quantum computing.” Newsweek, 21 Apr. 2017. General OneFile, Accessed 7 Sept. 2017.


Part One – Five Articles

  1. Technology turns cell phones into cash registers. (2015, June 29). Long Island Business News. Retrieved from
  2. Naff, C. F. (2017, July-August). The future of sex: how technology, morality, and politics are reshaping human sexuality. The Humanist, 77(4), 12+. Retrieved from
  3. Hill, T. (2017, February). Hook, line, and sinker: media disruptors that will influence the industry in 2017. Editor & Publisher, 150(2), 34+. Retrieved from
  4. Weiss-Meyer, A. (2017, May). Apps for refugees: How technology helps in a humanitarian crisis. The Atlantic, 319(4), 24+. Retrieved from
  5. Rajecki, R. (2017, January 9). Software designed to simplify HVACR service: service management software smooths workflow, enhances professionalism. Air Conditioning, Heating & Refrigeration News, 260(2), 9+. Retrieved from

Part 1 – Five Articles

  1. Soryal, J., Liu, X. & Saadawi, T. (2013). DoS detection in IEEE 802.11 with the presence of hidden nodes.

               Journal of Advanced Research, 5(4), 415-422.


 2. Lixia Xie, Xiao Zhang and Jiyong Zhang

Journal of computers. 8.9 (Sept. 2013): p2339

DOI: http//

3.  Malecki, F. (2011). A deeper, broader look at network security.

Network Security, 2011(12), 18-19.

4.  Network Security Tutorial

Tutorials Point ‚Äď

5.  Network Security. (2012). Communications Today,Communications Today, April 21, 2012.

Summary – 1

Naik,P.G Kamath, R.S. Patil, M.B , Jun 2017 Client Virtualization using VMware for Manageable Learning Envirnoment at CSIBER, International Journal of Advanced Research in Computer Science Vol. 8 Issue 5, p 890-895,


Abdelazia, Ahmed, 2016 Survey on Network Virtualization Using OpenFlow: Taxonomy, Opportunities, and Open Issues. Vol. 10 Issue 10, p4902-4932


You Lu, Bao-Chuan Fu,2017 The Closer the Better: A Filtering Model for Malicious Traffic in SDN Network Domain.Journal of Residuals Science & Tehnology Vol 14 Issue 3 p471-481


Chen, Qingxia 2017, An Integrated Framework for Software Defined Networking, Caching, and Computing, IEEE Network, Vol 31 p46-55


Yang, Hwan-Seok 2015, A study on attack information collection using virtualization technology, Multimedia Tools & Applications, Vol 74 p8791-8799

Part one five articles

  1.   Field, A. (1996, June 15). Precision marketing. Inc., 18(9), 54+. Retrieved from
  2.   Wheaton, J. (1998, May). Data detectives. Catalog Age, 15(6), 94+. Retrieved from
  3. Hochhauser, R. (1992, September). The power of integrated database marketing. Direct Marketing, 55(5), 32+. Retrieved from
  4. Hansotia, B. (1996, November). Achieving world-class database marketing with customer-focused strategies. Direct Marketing, 59(7), 58+. Retrieved from
  5. Gessaroli, J. (1995, May). Data mining: a powerful technology for database marketing. Telemarketing, 13(11), 64+. Retrieved from




1/ Gupta  Natasha , Irwin Julia D.(  Feb2016). In-class distractions: The role of Facebook and             the primary learning task. Computers in Human Behavior. Vol. 55, p1165-1178.



2/Lai, Chun, Li, Xiaoshi, Wang, Qiu (Aug2017). Students’ perceptions of teacher impact on their self-directed language learning with¬†technology¬†beyond the¬†classroom: cases of Hong Kong and U.S. ¬†Educational¬†Technology¬†Research & Development , Vol. 65 Issue 4, p1105-1133.
3/Nel, Liezel(Sep2017) Students as collaborators in creating meaningful learning experiences in technology-enhanced classrooms: An engaged scholarship approach. British Journal of Educational Technology. Vol. 48 Issue 5, p1131-1142.


4/ Chen, Huei-Yen Winnie, Donmez, Birsen (Jun2016)What drives technology-based distractions? A structural equation model on social-psychological factors of technology-based driver distraction engagement. Accident Analysis & Prevention. Vol. 91, p166-174.


5/ SPARKS, SARAH D. (6/3/2015) “Technology,¬†Distraction, and Student Performance”. Education Week. , Vol. 34 Issue 32, p4-4.

APA citations

Petrus, Rafal 2017, Molecular routes to group IV magnesium and calcium nanocrystalline ceramics, Inorganic chemistry,


Trost, B. M., & Ehmke, V. (2014, May 2). An Approach for Rapid Increase in Molecular Complexity: Atom Economic Routes to Fused Polycyclic Ring Systems. Retrieved September 7, 2017, from


Arellano, D. L. (2017, January 12). Room-Temperature Routes Toward the Creation of Zinc Oxide Films from Molecular Precursors. Retrieved September 7, 2017, from


Casta√Īeda-Arriaga, R., & Galano, A. (2017, May 5). Exploring Chemical Routes Relevant to the Toxicity of Paracetamol and Its meta-Analogue at a Molecular Level. Retrieved September 7, 2017, from


Deshlahra, P., & Iglesia, E. (2014, November 5). Methanol Oxidative Dehydrogenation on Oxide Catalysts: Molecular and Dissociative Routes and Hydrogen Addition Energies as Descriptors of Reactivity. Retrieved September 7, 2017, from