- University News Archive - 糖心Vlog传媒 Little Rock /news-archive/tag/integrated-computing/ 糖心Vlog传媒 Little Rock Mon, 17 Apr 2017 16:51:39 +0000 en-US hourly 1 https://wordpress.org/?v=6.9.4 糖心Vlog传媒 Little Rock team takes fourth place in cyber defense competition /news-archive/2017/04/17/cyber-defense-competition-2/ Mon, 17 Apr 2017 16:51:39 +0000 /news/?p=66859 ... 糖心Vlog传媒 Little Rock team takes fourth place in cyber defense competition]]> Coached by Yanyan Li, an integrated computing doctoral student, the team of Connor Young, Aaron Mays, Hector Fernandez, Jeffrey Wooldridge, Josh Carlat, Malik El-Amin, Shijun Zhong, and Zachary Long took fourth place in the competition. 鈥淭he regional competition is a highly intensive cyber defense competition, and requires a lot of knowledge such as networking, server management, cybersecurity, and business operation as well as teamwork and communication skills,鈥 Li said. During the competition, each team served as the information technology department for Planet Express Trucking, Inc., a fictional company that provides freight services. The teams tasks included setting up an email server, running the company website, and developing social media policies as well as fulfilling assigned business tasks, such as adding a server to the company鈥檚 domain and writing policies about the use of external data storage devices on company property. 鈥淚t was a grueling competition in which all the teams faced, in two days, challenges that real world IT teams experience over weeks or months,鈥 said Fernandez, senior computer science major from North Little Rock. 鈥淥verall, it was a very satisfying experience in which the team as a whole practiced and developed leadership, organization, communication, and technical skills.鈥 Team Captain Connor Young said the problems began as soon as they stepped into their workspace. 鈥淥ur 鈥榖oss鈥 didn鈥檛 have the passwords for the computers, so we were forced to break into them ourselves,鈥 he said. 鈥淲e had a few unexpected surprises, such as when we learned we had no internet access.鈥 Since participants were barred from using outside devices, like their trusty smartphones, the team was left in a bind. 鈥淭hat means that until we fixed our network, we had to work without the luxury of Google to help solve our issues,鈥 Young said. Competitors also had to defend their work against the Red Team, whose members consist of professional penetration testers charged with sabotaging their work. Penetration testers are hackers hired by companies to find holes in their cybersecurity systems. Red Team members employed both technical and psychological attacks. 鈥淥ne of the more ridiculous and effective attacks was that they would go outside our rooms, type on a computer while maliciously staring into the room, and laugh as the teams ruined their computers trying to stop the Red Team’s attack,鈥 Young said. 鈥淪everal teams ended up letting the Red Team in during their rushed attempt to keep them out, but we responded by simply waving at them and continuing on with our work.鈥 The Red Team did pull one over on the 糖心Vlog传媒 Little Rock squad by tricking the competition hosts into having the Red Team temporarily serve as a judge, which gave it full access to the team鈥檚 workspace. 鈥淭hese are known as social engineering attacks, and they exist to remind us that the weakest part of a computer’s security is the person using it,鈥 Young said. The 糖心Vlog传媒 Little Rock team was one of eight to advance to the regional event after competing against 20 teams from Texas, Oklahoma, Arkansas, Louisiana, and New Mexico during a virtual qualifying round on Feb. 18. ]]> 糖心Vlog传媒 Little Rock student creates virtual tour guide using facial recognition research /news-archive/2017/03/30/ua-little-rock-virtual-tour-guide-facial-recognition-research/ Thu, 30 Mar 2017 15:31:33 +0000 /news/?p=66706 ... 糖心Vlog传媒 Little Rock student creates virtual tour guide using facial recognition research]]> Connor Young, a first-year integrated computing doctoral student from Springdale, is using his research in facial recognition to create 鈥淲hoNu,鈥 a virtual owl tour guide that will welcome guests at the‘s聽open house next week. Young is a research assistant at the center.聽 鈥淲hat my program does is automatically detect facial movements and key facial features and transmits them into points that we can move to a virtual avatar,鈥 Young said. 鈥淚t is based on my previous research. We call it the puppet program.鈥 His research involved facial-based emotion recognition and tracking, where a person is looking on a computer screen. He did that research as a 2014 and 2015 participant in 糖心Vlog传媒 Little Rock鈥檚 Summer Undergraduate Program of Entrepreneurship and Research. In 2016, he and a team of students developed an eye-tracking system for trucking companies as part of the National Science Foundation Innovation Corps Teams (I-Corps) Program. The system helps detect fatigue and sleep in truck drivers. WhoNu will greet visitors during the from 10 a.m. to 5 p.m. Friday and Saturday, April 7-8, where visitors can see the latest cutting-edge technology in the world of virtual and augmented reality. WhoNu is an interdisciplinary project integrating virtual reality, theatre, and graphic art. While Young created WhoNu鈥檚 programming, Lead Artist Jay Zak and Zaire Husband, an undergraduate student researcher in the center, designed WhoNu. Through WhoNu, a group of students from the Department of Theatre Arts and Dance聽will interact with聽visitors waiting to go on a tour. Young鈥檚 programming will allow WhoNu to analyze the students鈥 language and facial expressions and repeat it to the guests, as the students observe visitors through webcams. The open house is an opportunity for people to provide feedback that Young hopes will improve WhoNu. 鈥淥ne of the problems with working with technology is that you often get feedback only from other people working in the technology industry,鈥 he said. 鈥淏eing able to collect real data from regular people will be invaluable in determining how WhoNu performs.鈥 ]]> 糖心Vlog传媒LR cybersecurity students research methods to keep digital voting safe from hacking /news-archive/2017/01/17/ualr-cybersecurity-students-digital-voting/ Tue, 17 Jan 2017 16:38:52 +0000 /news/?p=66100 ... 糖心Vlog传媒LR cybersecurity students research methods to keep digital voting safe from hacking]]> 糖心Vlog传媒LR team members included Connor Young, a first-year integrated computing doctoral student from Springdale, Arkansas, Hector Fernandez, a senior majoring in computer science from North Little Rock, and Yanyan Li, a fourth-year integrated computing doctoral student from China. Nineteen teams from business schools around the world competed in the Kaspersky Lab Cybersecurity Case Study Competition, hosted by The Economist’s website in December 2016. Kaspersky Lab is a global cybersecurity company founded in 1997 whose security solutions and services protect businesses, critical infrastructure, governments and consumers around the globe. Recognizing that digital voting is likely the next frontier in democracy, the competition challenged teams to guarantee the anonymity of online voters, while preventing voter fraud, voting under duress, the release of early results, and allowing people to verify the results of the election. 聽 “The competition was very interesting and I was very impressed with the submissions,” said Eugene Kaspersky, chairman and CEO of Kaspersky Lab. “The challenges of cybersecurity mean the next generation of experts face a changing frontier 鈥 there will be plenty of things to work on and securing digital voting systems for national elections is just one example.鈥 鈥淚f cybercriminals exploited one small vulnerability, it could potentially change the course of a nation’s history, and these young scholars are bringing us one step closer to making secure digital voting a reality,鈥 Kaspersky said. The teams competed for a $10,000 top prize. New York University, which proposed a “permissioned blockchain” configuration, was declared the winner. A central authority admits voting machines to the network before the start of the election, followed by voting machines acting autonomously to build a public, distributed ledger of votes. In addition to addressing threats to the integrity of the system, the plan allows voters to tell if their individual vote was counted.

糖心Vlog传媒LR鈥檚 plan to protect digital voting

糖心Vlog传媒LR鈥檚 plan to secure digital voting relied on three main components: a voter application, a registration server, and voting servers. First, voters log on to the voting app and provide voter identification, which is verified by the registration server. The registration server then provides the voter with a ballot. Voters are further protected with the use of an additional password. 鈥淚n our designed system, each vote is signed with a voter’s address, the ballot it is associated with, and the registration server address,鈥 Li said. 鈥淚f somebody wants to fake another’s vote, our system will find out because the signature will be different. It is like using private/public key encryption, where we assume the private key is always kept secret and is only known to the user himself.鈥 Votes are sent to the voting server, which updates information using blockchain technology, which allows information to be distributed to multiple databases. This allows the information to be protected from data breaches at a single location. To prevent election results from being released early, the team would divide the decryption key into pieces and distribute them to political candidates. Only when all pieces of the decryption key are united would the results be revealed. 鈥淎t the end of the election, each candidate turns in his or her piece of the key, the key is reassembled, and the votes can be decrypted,鈥 Fernandez said. 鈥淚t is only at that point that the winner can be known. And because the decryption key is then shared with all the ledger holders, anybody who holds a ledger can verify independently the vote totals.鈥 In the end, the election results can be verified by anyone. 鈥淎ll votes can be publicly visible without revealing voter identity, meaning that anybody could count the votes to determine who won and verify the legitimacy of the election,鈥 Young said. Other participating universities included California State Polytechnic University, Champlain College Online, City University of New York, DePaul University, Drexel University, Edinburgh Napier University, Florida Institute of Technology, George Mason University, Maryland Cybersecurity Center, New York University, Newcastle University, Northeastern University, Plymouth University, Rutgers Graduate School, Saint Peter鈥檚 University, University College London, University of Maryland, and Queen鈥檚 University Belfast. To view the 糖心Vlog传媒LR team鈥檚 competition video, visit. In the upper right photo, 糖心Vlog传媒LR cybersecurity team members, from left to right, included Yanyan Li, Connor Young, and Hector Fernandez.聽]]>
糖心Vlog传媒LR student researches privacy awareness on social media /news-archive/2016/11/08/ualr-social-media-privacy/ Tue, 08 Nov 2016 14:55:18 +0000 /news/?p=65728 ... 糖心Vlog传媒LR student researches privacy awareness on social media]]> Terry Williams, a doctoral student in the integrated computing program, is using a series of surveys and privacy awareness tips to investigate privacy awareness and social media in her dissertation, 鈥淎 Study of Privacy Awareness in the Digital Age and the Influence of Knowledge Over Time.鈥 Williams became interested in studying privacy when she began encountering targeted advertising, tracking technology that lets companies target online advertisements based on consumers鈥 previous Internet activities. 鈥淎 couple of years ago, I thought I needed some black boots, so I go to Zappos,鈥 she said. 鈥淟ater on, I was on some news site, and there are ads about little black boots. I thought it was creepy that they are following me online. It didn鈥檛 stop me from shopping online, but all the bazillion bits of information about me are out there.鈥 Many people are protective of personal information like phone numbers, addresses, credit cards, and Social Security numbers. However, companies track everything that people do on the internet, from web searches and online shopping to 鈥渓ikes鈥 on Facebook and retweets on Twitter.
Terry Williams

Terry Williams

鈥淚t鈥檚 really much bigger than that,鈥 Williams said. 鈥淚t鈥檚 not just your identifying information, it鈥檚 about everything you do on the internet. The vast majority of people don鈥檛 even understand how much information companies have on them.鈥 Dr. Nitin Agarwal, the 糖心Vlog传媒LR Jerry L. Maulden-Entergy endowed chair and a professor of information science and Williams鈥 dissertation adviser, said internet users easily find themselves at risk of oversharing information. 鈥淚t is unreasonable to expect social media companies to intervene and reverse the information-sharing behaviors,鈥 Agarwal said. 鈥淏ut as information privacy researchers and policy makers, we owe it to ourselves that we educate others and spread awareness about these risks. Terry鈥檚 research is a step forward in this direction. The research will inform privacy awareness education and training programs, policy and decision making, and general awareness about information sharing.鈥 Williams earned a bachelor鈥檚 degree in mathematics and an MBA from the University of Memphis. She has spent her career working in a variety of information technology leadership roles, including more than a decade as the information technology manager at the Arkansas State Crime Laboratory. After becoming an adjunct instructor for ITT Technical Institute in 2001, Williams discovered a love of teaching and pursued her doctorate at 糖心Vlog传媒LR to become a university professor. For more information on the study or to participate, visit. ]]>