The Threat Matrix: a Qualitative Study of an Instructional Design Process Robert Oren Kelly Iowa State University

Total Page:16

File Type:pdf, Size:1020Kb

The Threat Matrix: a Qualitative Study of an Instructional Design Process Robert Oren Kelly Iowa State University Iowa State University Capstones, Theses and Retrospective Theses and Dissertations Dissertations 1994 The threat matrix: a qualitative study of an instructional design process Robert Oren Kelly Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/rtd Part of the Curriculum and Instruction Commons, and the Library and Information Science Commons Recommended Citation Kelly, Robert Oren, "The threat matrix: a qualitative study of an instructional design process " (1994). Retrospective Theses and Dissertations. 10616. https://lib.dr.iastate.edu/rtd/10616 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Retrospective Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. U-M-I MICROFILMED 1994 INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand comer and continuing from left to right in equal sections with small overlaps. Each original is also photographed in one exposure and is included in reduced form at the back of the book. Photographs included in the original manuscript have been reproduced xerographically in this copy. Higher quality 6" x 9" black and white photographic prints are available for any photographs or illustrations appearing in this copy for an additional charge. Contact UMI directly to order. University Microfilms International A Bell & Howell Information Company 300 North 2eeb Road. Ann Arbor. Ml 48106-1346 USA 313/761-4700 800/521-0600 Order Number 9424280 The threat matrix; A qualitative study of an instructional design process Kelly, Robert Oren, Ph.D. Iowa State University, 1994 Copyright ©1994 by Kelly, Robert Oren. All rights reserved. 300 N. Zeeb Rd. Ann Arbor, MI 48106 The threat matrix; A qualitative study of an instructional design process by Robert Oren Kelly A Dissertation Submitted to the Graduate Faculty in Partial Fulfillment of the Requirements for the Degree of DOCTOR OF PHILOSOPHY Department: Curriculum and Instruction Major: Education (Curriculum and Instructional Technology) Approved: Signature was redacted for privacy. In Charge of Major Work Signature was redacted for privacy. For the Department and Education Major Signature was redacted for privacy. For the Graduate College Iowa State University Ames, Iowa 1994 Copyright © Robert Oren Kelly, 1994. All Rights Reserved. ii DEDICATION This dissertation is dedicated to my son, Ryan Robert Kelly. Ryan, as you recall this experience, may it remind you of the importance of choosing a goal, working towards it, and at last achieving it. iii TABLE OP CONTENTS CHAPTER 1: INTRODUCTION TO THE STUDY 1 Ch^ganization of the Dissertation 1 Introduction 2 Bad{ground 3 Hie Uninvited Birthday Guest 6 The Hireat Matrix 11 Statement of the Problem 13 Research Questions 13 Significance of the Study 14 Summary 14 CHAPTER 2; FOUNDATIONS FOR THE STUDY 15 Constructivism 15 Cognitive Theoiy 20 Schema 23 Advance Oiganizers 30 Mnemonics 35 Hypertext/Hypermedia 41 Summaiy 43 CHAPTER 3: METHODOLOGY FOR THE STUDY 45 Introduction 45 Statement of the Problem 48 Research Questions 49 Significance of the Study 49 Research Methodology Used 49 Research Strategies 50 Single Case Study Method 50 iv Qualitative Methods 51 Triangulation 53 Participant Observation 56 Summary of Research Strategies Used 56 Implementation of the Research Strategies 59 CHAPTER 4: RESULTS OF THE STUDY 69 Introduction 69 Triangulation Process 69 Introduction 69 The SWOS Team and ISU Experts 70 The Triangulation Data 72 #1. Hypermedia 73 #2. Use of Video Disc 76 #3. Individualized Instruction 79 #4. Computer Platform 82 #5. Authoring Software 85 #6. Program Shell 87 #7. Metaphor 90 #8. Use of Quizzes 94 #9. Index of Lessons 97 #10. Cognitive Map 99 #11. Motivating and Informative 102 #12. Active Learner Involvement 105 #13. Advance Organizers 108 #14. Mnemonics 112 #15. Logical Flow of Lesson 114 #16. Screen Design 116 #17. Use of Color 120 #18. Text Readability 126 #19. Hypertext 130 #20. Navigation Aides 133 V #21. Button Placement 138 #22. Pop-up Information Boxes 141 #23. Use of Line Drawings 143 #24. Objectives of the Lesson 145 #25. Instructional Manuals 147 Summary of Triangulation Data 152 Course Evaluation and Prototype Assessment Data 158 Introduction 158 The Course Evaluation and Prototype Assessment Data 159 Summary of Course Evaluation and Prototype Assessment Data 159 Attitude Assessment Data 160 Introduction 160 The Attitude Assessment Data 161 Summary of Attitude Assessment Data and Their Mean Scores 161 Summary of Open-ended Question on Attitude Assessment Survey 163 Personal Literviews Data 164 Introduction 164 The Personal Interviews Data 165 Summary of Personal Interviews Data 166 Chronological Log Data 171 Introduction 171 The Chronological Log Data 172 Summary of Chronological Log Data 172 Participant Observer Field Notes Data 174 Introduction 174 The Participant Observer Field Notes Data 174 Summary of Participant Observer Field Notes Data 175 Choice of Computer Platform and Authoring Software 175 vi Decisions Related to Working with Classified Data 177 Collaborative Process of Working with the Client 178 Results of the Study: Chapter Summaiy 179 CHAPTER 5; SUMMARY OF THE STUDY, RECOMMENDATIONS, AND CONCLUSION 181 ïhe Problem 181 The Research Questions 181 Data Collection 183 Triangulation Data 183 Course Evaluation and Prototype Assessment Data 184 Attitude Assessment Data 185 Personal Interviews Data 185 Chronological Log Data 186 Participant Observer Field Notes Data 186 Findings 186 Recommendations for Further Research 192 Conclusions 193 REFERENCES 196 ACKNOWLEDGMENTS 209 APPENDKA: THE BLIND MEN AND THE ELEPHANT 212 APPENDIX B: THE THREAT MATRIX: A COMPUTER-BASED LESSON COMPUTER SCREEN QUIZZES 214 APPENDDC C: THE THREAT MATRIX : A COMPUTERS ASED LESSON TITLE SCREEN AND LESSON CONTENTS 217 vii APPENDIX D: THE THREAT MATRIX: A COMPUTER-BASED LESSON SHIP STUDY PAGE AND VIDEO IMAGE 219 APPENDIX E: THE THREAT MATRIX: A COMPUTER-BASED LESSON WEAPONS SYSTEM STUDY PAGE AND MISSILE LAUNCH 221 APPENDIX F: THE THREAT MATRIX: A COMPUTER-BASED LESSON SENSORS STUDY PAGE AND LONG SEARCH RADAR 223 APPENDIX G: THE THREAT MATRIX: A COMPUTER-BASED LESSON INDEX PAGE 225 APPENDDCH: THE THREAT MATRIX: A COMPUTER-BASED LESSON SAMPLE PAGES FROM USERS' MANUAL AND TECHNICAL REFERENCE MANUAL 227 APPENDIX I : COURSE EVALUATION AND PROTOTYPE ASSESSMENT DATA WRITTEN COMMENTS 239 APPENDIX J : COVER LETTER SENT TO PARTICIPANTS FOR ATTITUDE ASSESSMENT 242 APPENDIX K: THE ATTITUDE ASSESSMENT INSTRUMENT 245 APPENDIX L: RESPONSES TO OPEN-ENDED QUESTION ON ATTITUDE ASSESSMENT 247 APPENDK M: PERSONAL INTERVIEWS DATA, SUBJECTS 1-5 252 APPENDIX N: CHRONOLOGICAL LOG DATA 278 APPENDIX 0: PARTICIPANT OBSERVER FIELD NOTES DATA 283 APPENDIX P: PRESS RELEASES AND PUBLICATIONS 291 viii LIST OF TABLES Table 1; Chronology of Identification of Important Instructional Design Elements 60 Table 2; Identified Design Elements Considered but Not Included 66 Table 3: Triangulated Key Decisions 153 Table 4: Items in Attitude Assessment and Their Mean Scores 162 Table 5: Summarized Content of Personal Interviews 167 Table 6: Instructional Design Decisions Verified by Triangulation 182 Table 7: Key Decisions of SWOS Personnel and the ISU Experts 189 ix LIST OF FIGURES Figure 1: Identified Key Decisions Organized into Clustered Groupings 64 1 CHAPTER 1: INTRODUCTION TO THE STUDY Organization of the Dissertation This dissertation has five chapters. The computer-based lesson developed for this study was created for the Surface Warfare Officers School (SWOS) of the United States Navy. A substantial orientation to SWOS and its mission is included. The first chapter orients the reader to the subject of the study and then to the study itself as it identifies research questions and the significance of the study. The second chapter describes the foundations of the study. Chapter 3 describes the methodology and Chapter 4 explains the study's findings. Chapter 5 is a summary of the study. Chapter 1 begins with a general introduction to the Threat Matrix, which is the content focus of the computer-based lesson designed for this study. The Combat Information Center, which is the control center for all the strategic activities of the ship, is described. Background discussion about SWOS is provided to orient the reader to its purpose, schools of study, and training sequence. To place the content of the computer-based lesson in perspective, a scenario entitled "The Uninvited Birthday Guest" is presented. The scenario gives the reader
Recommended publications
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • Archons (Commanders) [NOTICE: They Are NOT Anlien Parasites], and Then, in a Mirror Image of the Great Emanations of the Pleroma, Hundreds of Lesser Angels
    A R C H O N S HIDDEN RULERS THROUGH THE AGES A R C H O N S HIDDEN RULERS THROUGH THE AGES WATCH THIS IMPORTANT VIDEO UFOs, Aliens, and the Question of Contact MUST-SEE THE OCCULT REASON FOR PSYCHOPATHY Organic Portals: Aliens and Psychopaths KNOWLEDGE THROUGH GNOSIS Boris Mouravieff - GNOSIS IN THE BEGINNING ...1 The Gnostic core belief was a strong dualism: that the world of matter was deadening and inferior to a remote nonphysical home, to which an interior divine spark in most humans aspired to return after death. This led them to an absorption with the Jewish creation myths in Genesis, which they obsessively reinterpreted to formulate allegorical explanations of how humans ended up trapped in the world of matter. The basic Gnostic story, which varied in details from teacher to teacher, was this: In the beginning there was an unknowable, immaterial, and invisible God, sometimes called the Father of All and sometimes by other names. “He” was neither male nor female, and was composed of an implicitly finite amount of a living nonphysical substance. Surrounding this God was a great empty region called the Pleroma (the fullness). Beyond the Pleroma lay empty space. The God acted to fill the Pleroma through a series of emanations, a squeezing off of small portions of his/its nonphysical energetic divine material. In most accounts there are thirty emanations in fifteen complementary pairs, each getting slightly less of the divine material and therefore being slightly weaker. The emanations are called Aeons (eternities) and are mostly named personifications in Greek of abstract ideas.
    [Show full text]
  • MUSIC 351: Psychedelic Rock of the 1960S Spring 2015, T 7:00–9:40 P.M., ENS-280
    MUSIC 351: Psychedelic Rock of the 1960s Spring 2015, T 7:00–9:40 p.m., ENS-280 Instructor: Eric Smigel ([email protected]) M-235, office hours: Mondays & Tuesdays, 3:00–4:00 p.m. This is a lecture class that surveys psychedelic rock music and culture of the 1960s. Psychedelic music played an important role in the development of rock music as a predominant art form during one of the most formative decades in American history. Emerging along with the powerful counterculture of hippies in the mid-1960s, psychedelic rock reflects key elements of the “Love Generation,” including the peace movement, the sexual revolution, the pervasive use of recreational drugs (especially marijuana and LSD), and the growing awareness of Eastern philosophy. The main centers of countercultural activity—the Haight-Ashbury district of San Francisco and the London Underground—drew a high volume of media exposure, resulting in the famous “Summer of Love” and culminating in popular music festivals in Monterey, Woodstock, and Altamont. Students in this course will examine the music and lyrics of a selection of representative songs by The Grateful Dead, The Jefferson Airplane, Big Brother and the Holding Company, The Beatles, Pink Floyd, The Jimi Hendrix Experience, and other bands closely associated with the burgeoning psychedelic scene. Students will also consult primary source material—including interviews with several of the musicians, influential literature of the period, and essays by key figures of the movement—in order to gain insight into the social, political,
    [Show full text]
  • Integrated Helicopter Survivability
    Cranfield University Nicholas G. Law Integrated Helicopter Survivability Aeromechanical Systems Group Cranfield Defence and Security PhD DSTL/PUB36228 Cranfield University Cranfield Defence and Security Aeromechanical Systems Group PhD 2011 Nicholas G. Law Integrated Helicopter Survivability Supervisor: Prof. Kevin Knowles May 2011 © Crown copyright 2011. Published with the permission of the Defence Science and Technology Laboratory on behalf of the Controller of HMSO. DISCLAIMER Any views expressed are those of the author and do not necessarily represent those of Dstl, MOD or any other UK government department. ABSTRACT A high level of survivability is important to protect military personnel and equipment and is central to UK defence policy. Integrated Survivability is the systems engineering methodology to achieve optimum survivability at an affordable cost, enabling a mission to be completed successfully in the face of a hostile environment. “Integrated Helicopter Survivability” is an emerging discipline that is applying this systems engineering approach within the helicopter domain. Philosophically the overall survivability objective is ‘zero attrition’, even though this is unobtainable in practice. The research question was: “How can helicopter survivability be assessed in an integrated way so that the best possible level of survivability can be achieved within the constraints and how will the associated methods support the acquisition process?” The research found that principles from safety management could be applied to the survivability problem, in particular reducing survivability risk to as low as reasonably practicable (ALARP). A survivability assessment process was developed to support this approach and was linked into the military helicopter life cycle. This process positioned the survivability assessment methods and associated input data derivation activities.
    [Show full text]
  • National Drug Threat Assessment 2004: Threat Matrix
    National Drug Threat Assessment 2004: Threat Matrix Seized Primary Markets Wholesale Retail Source Transit Entry Points Key Illicit Drug en route/within and Principal Price Range Price Range Retailers Projections Locations Countries into U.S. Developments U.S. in 2002 Suppliers in the U.S. in the U.S. Foreign: Colombia, 101,877.8 kg Mexico, Central SWB states (Texas, Atlanta: Mexican, Dominican $10,000-$38,000 per kg $20-$200 per gram African American and DEA Cocaine Signature Potential worldwide cocaine Peru, Bolivia (352,000 kg reportedly American countries, California, Arizona, Chicago: Mexican, Colombian, (powder) (powder) Hispanic criminal groups Program data indicate production will likely decrease Domestic: None available to U.S. markets) Caribbean island nations New Mexico), Dominican $5-$100 per rock (crack) and street gangs; that average wholesale slightly due to increases in Miami/S Florida, Houston: Mexican, Colombian Caucasian local cocaine purity may be eradication and coca spray New York Los Angeles: Mexican, independent dealers; increasing after previous operations as well as a Cocaine Colombian Dominican, Haitian, decreases each year resumption of the Airbridge Miami: Colombian Jamaican, Mexican, between 1999 and 2002. Denial Program. This may New York: Colombian, Mexican, Native American, and result in a decrease in Dominican (also Jamaican, Puerto Rican criminal cocaine availability in the Puerto Rican, and Traditional groups United States. Organized Crime groups) Foreign: Mexico and, 2,512.6 kg Mexican: Direct from
    [Show full text]
  • Report of the Working Group on Marine Mammal Ecology (WGMME)
    ICES WGMME REPORT 2015 ICES ADVISORY COMMITTEE ICES CM 2015/ACOM:25 Report of the Working Group on Marine Mammal Ecology (WGMME) 9–12 February 2015 London, UK International Council for the Exploration of the Sea Conseil International pour l’Exploration de la Mer H. C. Andersens Boulevard 44–46 DK-1553 Copenhagen V Denmark Telephone (+45) 33 38 67 00 Telefax (+45) 33 93 42 15 www.ices.dk [email protected] Recommended format for purposes of citation: ICES. 2015. Report of the Working Group on Marine Mammal Ecology (WGMME), 9– 12 February 2015, London, UK. ICES CM 2015/ACOM:25. 114 pp. For permission to reproduce material from this publication, please apply to the Gen- eral Secretary. The document is a report of an Expert Group under the auspices of the International Council for the Exploration of the Sea and does not necessarily represent the views of the Council. © 2015 International Council for the Exploration of the Sea ICES WGMME REPORT 2015 | i Contents Executive summary ................................................................................................................ 1 1 Introduction .................................................................................................................... 3 2 Terms of Reference 2015 ............................................................................................... 4 3 ToR a: Review and report on any new information on population abundance, population/stock structure and management frameworks for marine mammals ....................................................................................................
    [Show full text]
  • STRATEGIC MANAGEMENT Edited by Dr
    /DCOM506 Edited by: Dr. Anand Thakur STRATEGIC MANAGEMENT Edited By Dr. Anand Thakur Printed by EXCEL BOOKS PRIVATE LIMITED A-45, Naraina, Phase-I, New Delhi-110028 for Lovely Professional University Phagwara SYLLABUS Objectives: Development and reinforcement of a general management point of view-the capacity to view the firm from an overall perspective, in the context of its environment. Development of an understanding of fundamental concepts in strategic management: the role of the general manager, the levels and components of strategy, competitive analysis, and organizational evolution. Development of those skills and knowledge peculiar to general management and the general manager's job that have not been covered in previous functional courses. Synthesis of the knowledge gained in previous courses and understand- ing what part of that knowledge is useful to general managers. DCOM506 Strategic Management Sr. No. Description 1. Nature of Strategic Management, Dimensions, benefits and risks. The strategic management process. 2. Strategy formulation. Business vision and mission, Importance, Characteristics and components. Evaluating mission statements. 3. The External Assessment, Porters five force analysis. Industry and competitive analysis. The Global Environment, competitive strategies for firms in global markets. 4. The Internal Assessment: SWOT Analysis, strategy and culture. Value Chain Analysis. Resource based view of the firm. Benchmarking. 5. Strategies in Action: The balanced scorecard, types of strategies, Integrative, Intensive, Diversification strategies, defensive strategies, Porters Generic Strategies. 6. Strategy analysis and choice: Business level strategies. Cost leadership, Differentiation, Speed and market focus. Multi business strategy: BCG matrix, GE Nine Cell matrix. Limitations of portfolio approaches. The Parenting framework. 7. Strategy Implementation: Short term objectives, functional tactics.
    [Show full text]
  • Terrorism in Afghanistan: a Joint Threat Assessment
    Terrorism in Afghanistan: A Joint Threat Assessment Terrorism in Afghanistan: A Joint Threat Assessment Introduction 7 Chapter I: Afghanistan’s Security Situation and Peace Process: Comparing U.S. and Russian Perspectives (Barnett R. Rubin) 9 Chapter II: Militant Terrorist Groups in, and Connected to, Afghanistan (Ekaterina Stepanova and Javid Ahmad) 24 Chapter III: Afghanistan in the Regional Security Interplay Context (Andrey Kazantsev and Thomas F. Lynch III) 41 Major Findings and Conclusions 67 Appendix A: Protecting Afghanistan’s Borders: U.S. and Russia to Lead in a Regional Counterterrorism Effort (George Gavrilis) 72 Appendix B: Arms Supplies for Afghan Militants and Terrorists (Vadim Kozyulin) 75 Appendix C: Terrorism Financing: Understanding Afghanistan’s Specifics (Konstantin Sorokin and Vladimir Ivanov) 79 Acronyms 83 Terrorism in Afghanistan Joint U.S.-Russia Working Group on Counterterrorism in Afghanistan Working Group Experts: Javid Ahmad1 Senior Fellow, Atlantic Council Sher Jan Ahmadzai Director, Center for Afghanistan Studies, University of Nebraska at Omaha Robert Finn Former Ambassador of the United States to Afghanistan George Gavrilis Fellow, Center for Democracy, Toleration, and Religion, University of California, Berkeley Andrey Kazantsev Director, Center for Central Asian and Afghan Studies, Moscow State Institute of International Relations (MGIMO University) Kirill Koktysh Associate Professor, Moscow State Institute of International Relations (MGIMO University) Member, Expert Council, State Duma Committee of Nationalities Mikhail Konarovsky Former Ambassador of the Russian Federation to Afghanistan Col. (Ret.) Oleg V. Kulakov* Professor of Area Studies, Military University, Ministry of Defence of the Russian Federation Vadim Kozyulin Member, PIR Center Executive Board Researcher, Diplomatic Academy, Ministry of Foreign Affairs of the Russian Federation Thomas F.
    [Show full text]
  • Maritime Security in the Middle East and North Africa: a Strategic Assessment
    MARITIME SECURITY IN THE MIDDLE EAST AND NORTH AFRICA: A STRATEGIC ASSESSMENT By Robert M. Shelala II Research Analyst, Burke Chair in Strategy Anthony H. Cordesman Arleigh A. Burke Chair in Strategy [email protected] Table of Contents Executive Summary ........................................................................................................................ 3 Chapter I – A Brief Introduction to Maritime Security .................................................................. 4 Chapter II – The Suez Canal and the Growing Threat of Egyptian Terrorism ............................... 6 Background on the Canal ............................................................................................................ 6 The Threat of Terrorism .............................................................................................................. 8 Egyptian Maritime Security Capabilities .................................................................................. 13 Recommendations for Securing the Suez Canal ....................................................................... 17 Chapter III – The Gulf and Threats From Iran ............................................................................. 20 A Brief Introduction to the Gulf ................................................................................................ 20 Regional Tensions and Iranian Threats to Gulf Security .......................................................... 22 Escalation Drivers in Iranian Strategic Calculus......................................................................
    [Show full text]
  • An Audio Fingerprinting System for Live Version Identification Using Image Processing Techniques
    AN AUDIO FINGERPRINTING SYSTEM FOR LIVE VERSION IDENTIFICATION USING IMAGE PROCESSING TECHNIQUES Zafar Rafii Bob Coover, Jinyu Han Northwestern University Gracenote, Inc. Evanston, IL, USA Emeryville, CA, USA zafarrafi[email protected] fbcoover,[email protected] ABSTRACT the same rendition of a song, and will consider cover versions (e.g., a live performance) to be different songs. For a review Suppose that you are at a music festival checking on an artist, on audio fingerprinting, the reader is referred to [1]. and you would like to quickly know about the song that is be- ing played (e.g., title, lyrics, album, etc.). If you have a smart- Cover identification systems precisely aim at identifying phone, you could record a sample of the live performance and a song given an alternate rendition of it (e.g., live, remas- compare it against a database of existing recordings from the ter, remix, etc.). A cover version essentially retains the same artist. Services such as Shazam or SoundHound will not work melody, but differs from the original song in other musical here, as this is not the typical framework for audio fingerprint- aspects (e.g., instrumentation, key, tempo, etc.) [9]. ing or query-by-humming systems, as a live performance is In [10], beat tracking and chroma features are used to neither identical to its studio version (e.g., variations in in- deal with variations in tempo and instrumentation, and cross- strumentation, key, tempo, etc.) nor it is a hummed or sung correlation is used between all key transpositions. In [11], melody. We propose an audio fingerprinting system that can chord sequences are extracted using chroma vectors, and a deal with live version identification by using image process- sequence alignment algorithm based on Dynamic Program- ing techniques.
    [Show full text]
  • Information Security Risk Assessment
    Entry Information Security Risk Assessment Ievgeniia Kuzminykh 1,* , Bogdan Ghita 2 , Volodymyr Sokolov 3 and Taimur Bakhshi 4 1 Department of Informatics, King’s College London, London WC2R 2ND, UK 2 School of Engineering, Computing and Mathematics, University of Plymouth, Plymouth PL4 8AA, UK; [email protected] 3 Department of Information and Cyber Security, Borys Grinchenko Kyiv University, 04212 Kyiv, Ukraine; [email protected] 4 Center for Information Management and Cyber Security, Foundation for Advancement of Science & Technology, Lahore 54770, Pakistan; [email protected] * Correspondence: [email protected] Definition: Information security risk assessment is an important part of enterprises’ management practices that helps to identify, quantify, and prioritize risks against criteria for risk acceptance and objectives relevant to the organization. Risk management refers to a process that consists of identification, management, and elimination or reduction of the likelihood of events that can negatively affect the resources of the information system to reduce security risks that potentially have the ability to affect the information system, subject to an acceptable cost of protection means that contain a risk analysis, analysis of the “cost-effectiveness” parameter, and selection, construction, and testing of the security subsystem, as well as the study of all aspects of security. Keywords: information risk management; security risk assessment; risk classification; OCTAVE; CRAMM; RiskWatch; fuzzy logic Citation: Kuzminykh, I.; Ghita, B.; Sokolov, V.; Bakhshi, T. Information 1. Introduction Security Risk Assessment. Over time, the complexity of information systems is increasing, and, therefore, the Encyclopedia 2021, 1, 602–617. https:// issues of information security are becoming increasingly important for any organization.
    [Show full text]
  • The Doors Summer's Gone Copy.Indd
    Table of Contents: v Dedications xi Introduction: Carol Schofield xiii Prologue: Harvey Kubernik 1 Steven Van Zandt, 2015 2 Guy Webster Interview, 2012, Treats! magazine 6 Dr. James Cushing, 2017 7 Eddi Fiegel, 2017 8 David N. Pepperell, 2017 10 Peter Lewis, 2017 12 Ram Dass, 1999 12 Roger Steffens, 2017 17 Ray Manzarek - Harvey Kubernik Interviews: (1974-2013) in Melody Maker, Goldmine, HITS, MOJO, THC Expose, RecordCollectorNews.com and CaveHollywood.com 47 The Doors London Fog, 1967 48 Kim Fowley, 2007 50 Dave Diamond, 2009 51 Jac Holzman Interview, 2017 52 The Doors Live at the Matrix, 1967 54 Dennis Loren, 2017 56 Dr. James Cushing, 2007 57 Paul Body, 2007 58 Mark Guerrero, 2016 58 Rick Williams, 2017 59 David Dalton, 2018 60 Chris Darrow, 2016 61 John Densmore Interview, MOJO ’60s magazine, 2007 71 Jim Roup, 2018 74 Heather Harris, 2017 75 Stephen J. Kalinich, 2015 vi 76 Alex Del Zoppo, 2017 85 The Doors, Marina Muhlfriedel, April 19, 2017 87 DOORS LIVE AT THE BOWL ’68, 2012 90 Paul Kantner, 2012 90 Marty Balin, 2017, Record Collector News magazine, 2017 91 Grace Slick Interview, 2002 93 Carlos Santana Interview, Record Collector News magazine, 2017 93 JanAlan Henderson, 2015, BRIEF ENCOUNTERS WITH THE LIZARD KING 95 Bill Mumy, 2017 95 Gene Aguilera, 2017 97 Burton Cummings, 2016 102 Rob Hill, 2017 103 Rodney Bingenheimer, 2017 106 Rob Hill, 2017: WHEN MORRISON MET LENNON 107 Kim Fowley in MOJO magazine, 2009 109 John Densmore Interview in MOJO magazine, 2009 110 D.A. Pennebaker Interview, Treats! magazine, 2012 111 Doors Live in New York, 2007 114 Michael Simmons, 2006 114 Dr.
    [Show full text]