Category Archives: Summary_1

References

References

Hong, H., Kubik, J., & Solomon, A. (2000). Security Analysts’ Career Concerns and Herding of Earnings Forecasts. The RAND Journal of Economics, 31(1), 121-144. Retrieved from http://www.jstor.org/stable/2601032

Martin, S. B. (1998). Information Technology, Employment, and the Information Sector: Trends in Information Employment 1970-1995. Journal Of The American Society For Information Science, 49(12), 1053-1069

Roan, A. a., & Whitehouse, G. (2007). Women, information technology and ‘waves of optimism’: Australian evidence on ‘mixed-skill’ jobs. New Technology, Work & Employment, 22(1), 21-33

Kvochko, E. (2016, January 04). Why There Are Still Few Women Leaders in Tech. Retrieved October 11, 2017, from https://www.forbes.com/sites/elenakvochko/2016/01/04/women-executives-in-tech/#5e92b76055e7

Bibliography

  1. United States. Congress. Senate. Committee on the Judiciary. (2011). Cybercrime updating the Computer Fraud and Abuse Act to protect cyber space and combat emerging threats: Hearing before the Committee on the Judiciary, United States Senate, One Hundred Twelfth Congress, first session, September 7, 2011. (United States. Congress. Senate. S. hrg. ; 112-126. Y). Washington: U.S. G.P.O.
  2. Schirick, E. A. (2012, March-April). Computer network security–evolving risks. Camping Magazine, 85(2), 16+. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA283705723&asid=b563bc7277c447d84029609454b2e55e
  3. United States. Congress. Senate. Committee on Homeland Security Governmental Affairs author. (2017). DHS Stop Asset and Vehicle Excess Act : Report of the Committee on Homeland Security and Governmental Affairs, United States Senate, to accompany H.R. 366 to amend the Homeland Security Act of 2002 to direct the Under Secretary for Management of the Department of Homeland Security to make certain improvements in managing the Department’s vehicle fleet, and for other purposes. (United States. Congress. Senate. Report; 115-32. Y).
  4. Grimes, R. A. (2015, November 9). 10 reasons why phishing attacks are nastier than ever. InfoWorld.com. Retrieved from                                                                          http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA4 1596729&asid=3f53530e427f3b03d56c02fb7d591326
  5. Leithauser, T. (2017, June 12). DHS eyes undoing decision to treat elections as ‘critical infrastructure’. Cybersecurity Policy Report. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA498337750&asid=cdf1f82af1264f1f62411a87147d15b0

Meiting

Sacolick, I. (2017, August 18). What is devops? Transforming software       development. InfoWorld.com. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA500993199&asid=a7bd855a4bda45911ca735608c93e9b1

Asay, M. (2017, June 16). Apple’s Core ML: The pros and cons. InfoWorld.com. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA495682813&asid=d979fbb4c974cde9f23829347d8d6631

Naylor, I. (2017, June 7). The 7 best wireframing and prototyping tools for app makers. InfoWorld.com. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA494688352&asid=cc957f43a22b30df2b50ec35590bdb82

Technical help wanted. (2017, July 31). Long Island Business News. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA499836004&asid=b59f496a9970577c40f3a71a1e6def8a

Asay, M. (2017, July 21). JavaScript for squares: The incredible rise of TypeScript. InfoWorld.com. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA498959475&asid=77f6a1000c22d1c101d7c8802254ec26

5 articles – Jason Zeng

1 – Maney, Kevin. “How Facebook’s AI Bots Learned Their Own Language and How to Lie; Bots that can negotiate your next deal on a hotel room might also know how to lie to you.” Newsweek, 18 Aug. 2017. General OneFile, go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&id=GALE%7CA500328738&it=r&asid=69aa88fb35fe12dab5bd14c91182634a. Accessed 7 Sept. 2017.

2 – One Small Step for AI, One Giant Step for Robotics.” Electronics For You, 16 Aug. 2017. General OneFile, go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&id=GALE%7CA500734726&it=r&asid=9aec3ed457ff35726551a15feb1f530c. Accessed 7 Sept. 2017.

3 – “Which Giant Tech Company Is Winning the Race to Be Skynet?” Vulture, 3 Aug. 2017. General OneFile, go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&id=GALE%7CA501526595&it=r&asid=bcff0424d96851f393550d38fac4f28d. Accessed 7 Sept. 2017.

4 – “Cue bits; Quantum computers.” The Economist, 11 Mar. 2017, p. 10(US). General OneFile, go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&id=GALE%7CA485543885&it=r&asid=d715a0f27fa98a76e703b1893c0d3779. Accessed 7 Sept. 2017.

5 – Bauer, Meredith Rutland. “Quantum Computing Is Going Commercial With the Potential to Disrupt Everything; Problems that would take longer than a human’s life span on a classic computer will be completed in hours or days with quantum computing.” Newsweek, 21 Apr. 2017. General OneFile, go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&id=GALE%7CA489545172&it=r&asid=3d695aaf54176a58393bf1bb19bf87d1. Accessed 7 Sept. 2017.

 

Part One – Five Articles

  1. Technology turns cell phones into cash registers. (2015, June 29). Long Island Business News. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA420295204&asid=5d5406e01c2e3520da15b026cd3e51d5
  2. Naff, C. F. (2017, July-August). The future of sex: how technology, morality, and politics are reshaping human sexuality. The Humanist, 77(4), 12+. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA499719552&asid=8ec4aa00915d5a6416e5945ea7f339b9
  3. Hill, T. (2017, February). Hook, line, and sinker: media disruptors that will influence the industry in 2017. Editor & Publisher, 150(2), 34+. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA488193223&asid=7406b43c08870f91cae389ff922018f3
  4. Weiss-Meyer, A. (2017, May). Apps for refugees: How technology helps in a humanitarian crisis. The Atlantic, 319(4), 24+. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA493990649&asid=43305f3a71efe1527052a8707c7d8ee7
  5. Rajecki, R. (2017, January 9). Software designed to simplify HVACR service: service management software smooths workflow, enhances professionalism. Air Conditioning, Heating & Refrigeration News, 260(2), 9+. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA478640398&asid=d3e6d823e3626fa39bde383430cf36b2

Part 1 – Five Articles

  1. Soryal, J., Liu, X. & Saadawi, T. (2013). DoS detection in IEEE 802.11 with the presence of hidden nodes.

               Journal of Advanced Research, 5(4), 415-422.

               doi:10.1016/j.jare.2013.11.001

 2. Lixia Xie, Xiao Zhang and Jiyong Zhang

Journal of computers. 8.9 (Sept. 2013): p2339

DOI: http//dx.doi.org/10.4304/jcp.8.9.2339-2347

3.  Malecki, F. (2011). A deeper, broader look at network security.

Network Security, 2011(12), 18-19.

4.  Network Security Tutorial

Tutorials Point – https://www.tutorialspoint.com/network_security/index.htm

5.  Network Security. (2012). Communications Today,Communications Today, April 21, 2012.

Summary – 1

Naik,P.G Kamath, R.S. Patil, M.B , Jun 2017 Client Virtualization using VMware for Manageable Learning Envirnoment at CSIBER, International Journal of Advanced Research in Computer Science Vol. 8 Issue 5, p 890-895, http://web.b.ebscohost.com/ehost/detail/detail?vid=7&sid=4bbbb818-bfaa-4abe-88ab-70ea38c16798%40sessionmgr120&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=124636467&db=aci

 

Abdelazia, Ahmed, 2016 Survey on Network Virtualization Using OpenFlow: Taxonomy, Opportunities, and Open Issues. Vol. 10 Issue 10, p4902-4932 http://web.b.ebscohost.com/ehost/detail/detail?vid=12&sid=4bbbb818-bfaa-4abe-88ab-70ea38c16798%40sessionmgr120&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=aci&AN=119398804

 

You Lu, Bao-Chuan Fu,2017 The Closer the Better: A Filtering Model for Malicious Traffic in SDN Network Domain.Journal of Residuals Science & Tehnology Vol 14 Issue 3 p471-481 http://web.b.ebscohost.com/ehost/detail/detail?vid=14&sid=4bbbb818-bfaa-4abe-88ab-70ea38c16798%40sessionmgr120&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=122877590&db=aci

 

Chen, Qingxia 2017, An Integrated Framework for Software Defined Networking, Caching, and Computing, IEEE Network, Vol 31 p46-55 http://web.b.ebscohost.com/ehost/detail/detail?vid=16&sid=4bbbb818-bfaa-4abe-88ab-70ea38c16798%40sessionmgr120&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=123392069&db=aci

 

Yang, Hwan-Seok 2015, A study on attack information collection using virtualization technology, Multimedia Tools & Applications, Vol 74 p8791-8799 http://web.b.ebscohost.com/ehost/detail/detail?vid=18&sid=4bbbb818-bfaa-4abe-88ab-70ea38c16798%40sessionmgr120&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=109466507&db=aci

Part one five articles

  1.   Field, A. (1996, June 15). Precision marketing. Inc., 18(9), 54+. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA18397675&asid=f53c57e0c9234a1e75327174f4b5c171
  2.   Wheaton, J. (1998, May). Data detectives. Catalog Age, 15(6), 94+. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA20898772&asid=d877648e77b75b2b66a8a3537a1edf50
  3. Hochhauser, R. (1992, September). The power of integrated database marketing. Direct Marketing, 55(5), 32+. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA13617741&asid=5f756850427d83a06adaf57c648be111
  4. Hansotia, B. (1996, November). Achieving world-class database marketing with customer-focused strategies. Direct Marketing, 59(7), 58+. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA19184835&asid=6b7e6e0fc62a06ce4fd344bc611ac3e9
  5. Gessaroli, J. (1995, May). Data mining: a powerful technology for database marketing. Telemarketing, 13(11), 64+. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA17085514&asid=e142e6cdde2058ea4e539b7c7463880b

 

 

Bibliographic

1/ Gupta  Natasha , Irwin Julia D.(  Feb2016). In-class distractions: The role of Facebook and             the primary learning task. Computers in Human Behavior. Vol. 55, p1165-1178.

 

 

2/Lai, Chun, Li, Xiaoshi, Wang, Qiu (Aug2017). Students’ perceptions of teacher impact on their self-directed language learning with technology beyond the classroom: cases of Hong Kong and U.S.  Educational Technology Research & Development , Vol. 65 Issue 4, p1105-1133.
3/Nel, Liezel(Sep2017) Students as collaborators in creating meaningful learning experiences in technology-enhanced classrooms: An engaged scholarship approach. British Journal of Educational Technology. Vol. 48 Issue 5, p1131-1142.

 

4/ Chen, Huei-Yen Winnie, Donmez, Birsen (Jun2016)What drives technology-based distractions? A structural equation model on social-psychological factors of technology-based driver distraction engagement. Accident Analysis & Prevention. Vol. 91, p166-174.

 

5/ SPARKS, SARAH D. (6/3/2015) “Technology, Distraction, and Student Performance”. Education Week. , Vol. 34 Issue 32, p4-4.

APA citations

Petrus, Rafal 2017, Molecular routes to group IV magnesium and calcium nanocrystalline ceramics, Inorganic chemistry, http://pubs.acs.org/action/showCitFormats?href=http%3A%2F%2Fpubs.acs.org%2Fdoi%2Ffull%2F10.1021%2Facs.inorgchem.7b01772&doi=10.1021%2Facs.inorgchem.7b01772

 

Trost, B. M., & Ehmke, V. (2014, May 2). An Approach for Rapid Increase in Molecular Complexity: Atom Economic Routes to Fused Polycyclic Ring Systems. Retrieved September 7, 2017, from http://pubs.acs.org/doi/full/10.1021/ol5009872

 

Arellano, D. L. (2017, January 12). Room-Temperature Routes Toward the Creation of Zinc Oxide Films from Molecular Precursors. Retrieved September 7, 2017, from http://pubs.acs.org/doi/full/10.1021/acsomega.6b00324

 

Castañeda-Arriaga, R., & Galano, A. (2017, May 5). Exploring Chemical Routes Relevant to the Toxicity of Paracetamol and Its meta-Analogue at a Molecular Level. Retrieved September 7, 2017, from http://pubs.acs.org/doi/full/10.1021/acs.chemrestox.7b00024

 

Deshlahra, P., & Iglesia, E. (2014, November 5). Methanol Oxidative Dehydrogenation on Oxide Catalysts: Molecular and Dissociative Routes and Hydrogen Addition Energies as Descriptors of Reactivity. Retrieved September 7, 2017, from http://pubs.acs.org/doi/abs/10.1021/jp507922u