Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Entire DC Network

Optimizing Cybersecurity Budgets With Attacksimulation, Alexander Master, George Hamilton, J. Eric Dietz Nov 2022

Optimizing Cybersecurity Budgets With Attacksimulation, Alexander Master, George Hamilton, J. Eric Dietz

Faculty Publications

Modern organizations need effective ways to assess cybersecurity risk. Successful cyber attacks can result in data breaches, which may inflict significant loss of money, time, and public trust. Small businesses and non-profit organizations have limited resources to invest in cybersecurity controls and often do not have the in-house expertise to assess their risk. Cyber threat actors also vary in sophistication, motivation, and effectiveness. This paper builds on the previous work of Lerums et al., who presented an AnyLogic model for simulating aspects of a cyber attack and the efficacy of controls in a generic enterprise network. This paper argues that …


Applicability Of Blockchain Technology To The Normal Accounting Cycle, Williams Kwasi Peprah Ph.D., Reynaldo P. Abas Jr., Akwasi Ampofo Aug 2022

Applicability Of Blockchain Technology To The Normal Accounting Cycle, Williams Kwasi Peprah Ph.D., Reynaldo P. Abas Jr., Akwasi Ampofo

Faculty Publications

Blockchain technology is a distributed, unchangeable ledger that makes recording transactions and managing assets in a business network much easier and now a type of accounting software concerned with the transfer of asset ownership and the maintenance of an accurate financial ledger. Despite the numerous benefits of blockchain technology, there is no study on the applicability of blockchain technology to the normal accounting cycle in emerging economies in Africa. Thus, this paper provides general insights on how blockchain technology may be used in the normal accounting cycle in West Africa. The study adopted a qualitative research method and content analysis …


Shifting Satellite Control Paradigms: Operational Cybersecurity In The Age Of Megaconstellations, Carl A. Poole [*], Robert A. Bettinger, Mark Reith Oct 2021

Shifting Satellite Control Paradigms: Operational Cybersecurity In The Age Of Megaconstellations, Carl A. Poole [*], Robert A. Bettinger, Mark Reith

Faculty Publications

The introduction of automated satellite control systems into a space-mission environment historically dominated by human-in-the-loop operations will require a more focused understanding of cybersecurity measures to ensure space system safety and security. On the ground-segment side of satellite control, the debut of privately owned communication antennas for rent and a move to cloud-based operations or mission centers will bring new requirements for cyber protection for both Department of Defense and commercial satellite operations alike. It is no longer a matter of whether automation will be introduced to satellite operations, but how quickly satellite operators can adapt to the onset of …


Research In Defense Logistics: Where Are We And Where Are We Going?, George A. Zsidisin, Amanda Bresler, Benjamin T. Hazen, Keith F. Schneider, Taylor H. Wilkerson Jan 2020

Research In Defense Logistics: Where Are We And Where Are We Going?, George A. Zsidisin, Amanda Bresler, Benjamin T. Hazen, Keith F. Schneider, Taylor H. Wilkerson

Faculty Publications

The purpose of this paper is to provide insight on high-interest areas of research in defense-related logistics and supply chain management and opportunities for advancing theory and practice in this domain.


Developmental Test And Requirements Best Practices Of Successful Information Systems Efforts Using Agile Methods, Jeremy D. Kramer, Torrey J. Wagner Jan 2019

Developmental Test And Requirements Best Practices Of Successful Information Systems Efforts Using Agile Methods, Jeremy D. Kramer, Torrey J. Wagner

Faculty Publications

This article provides insights into the current state of developmental testing (DT) and requirements management in Department of Defense information systems employing Agile development. The authors describe the study methodology and provide an overview of Agile development and testing. Insights are described for requirements, detailed planning, test execution, and reporting. This work articulates best practices related to DT and requirements management strategies for programs employing modernized Software Development Life Cycle practices.


Cyber War And Deterrence: Applying A General Theoretical Framework, Isaac Nacita [*], Mark Reith Jul 2018

Cyber War And Deterrence: Applying A General Theoretical Framework, Isaac Nacita [*], Mark Reith

Faculty Publications

There is a saying that politicians and generals are always fighting the last war, which is emphasized when the weapons and characteristics of warfare are changing rapidly. However, if this is true, it is often not due to an inability to learn lessons from previous conflicts, but to “overlearn” or overcompensate for the failures and experiences of the past. In reality, this is not a learning problem but one of forming poor implications from historical events, which leads to poor applications of doctrine the next time around. The DOD now acknowledges that warfare has extended into cyberspace, and it is …


Big Data And The Perceived Expectations Gap In Digital Authentication Processes, Thomas Calderon, Colin Onita Jan 2017

Big Data And The Perceived Expectations Gap In Digital Authentication Processes, Thomas Calderon, Colin Onita

Faculty Publications

Perceptions of the security and efficacy of technological innovations significantly affect behavioral intentions and the eventual diffusion of such innovations in organizations and the broader society. This paper uses Twitter as a data source and a big data analysis tool to investigate the public’s perceptions of current authentication methods in financial institutions. This data source has not been used previously in the literature to examine perceptions of authentication methods. We focus on the financial sector because of its high vulnerability, the extensive use of information technology in both products and value chain (i.e., its high business information intensity), and the …


Global Command And Control For The Future Operating Concept: Implications For Structural Design And Information, Ian M. Slazinik, Benjamin T. Hazen Jan 2017

Global Command And Control For The Future Operating Concept: Implications For Structural Design And Information, Ian M. Slazinik, Benjamin T. Hazen

Faculty Publications

Due to increasing demands on air mobility aircraft, US Transportation Command(USTRANSCOM) has more recently advocated retaining operational control (OPCON)of aircraft it might have transferred to a requesting combatant command in the past. This recent approach mirrors that of similar-type civilian logistics operations that are centrally managed to maximize efficiencies by flowing resources to the point of need without having to navigate through time-consuming sourcing processes. Furthermore, the acceleration of information availability has condensed decision timelines and changed how similar civilian organizations organize and perform, allowing them to react seemingly on a dime to changing market conditions anywhere.4While retaining OPCON might …


Forging Tomorrow's Air, Space, And Cyber War Fighters: Recommendations For Integration And Development, Mark Reith Jan 2016

Forging Tomorrow's Air, Space, And Cyber War Fighters: Recommendations For Integration And Development, Mark Reith

Faculty Publications

Today’s Airmen operate in contested environments, and years of technical-data spillage, coupled with policies emphasizing commercial-off-the-shelf acquisition, ensure that the immediate future will remain contested as our adversaries seek to exploit level playing fields. Long gone are the days of Operation Desert Storm and Enduring Freedom when air superiority dominated and the supporting elements of space, communications, and computers were largely out of reach for many nation-states. Since then, technology has become ubiquitously intertwined in weapon systems and today largely turns the gears of warfare, allowing a range of actors to erode national instruments of power.


Action Research: Fly In The Cloud Then Share The View, M. Gail Weatherly, Susan Evans Jennings Jan 2013

Action Research: Fly In The Cloud Then Share The View, M. Gail Weatherly, Susan Evans Jennings

Faculty Publications

There is a growing bifurcation of society into those who are Informed (techno-savvy) versus the increasing number of people who are Uninformed (non-techno-savvy) when it comes to utilization of cloud-based Web 2.0 applications. The authors propose wide-spread participation in a cloud-based application. This action research is designed to gather input about one cloud-based technology that has the potential to move users from Uninformed to Informed by the nature of efficient work flow, collaboration, and shared resources (Charles & Dickens, 2012; Fisher, 2011).


Enterprise Risk Management In The Oil And Gas Industry: An Analysis Of Selected Fortune 500 Oil And Gas Companies Reaction In 2009 And 2010, Violet C. Rogers, Jack R. Ethridge Jan 2013

Enterprise Risk Management In The Oil And Gas Industry: An Analysis Of Selected Fortune 500 Oil And Gas Companies Reaction In 2009 And 2010, Violet C. Rogers, Jack R. Ethridge

Faculty Publications

In 2009, four of the top ten Fortune 500 companies were classified within the oil and gas industry. Organizations of this size typically have an advanced Enterprise Risk Management system in place to mitigate risk and to achieve their corporations' objectives. The companies and the article utilize the Enterprise Risk Management Integrated Framework developed by the Committee of Sponsoring Organizations (COSO) as a guide to organize their risk management and reporting. The authors used the framework to analyze reporting years 2009 and 2010 for Fortune 500 oil and gas companies. After gathering and examining information from 2009 and 2010 annual …


The Ethics Of Technology, David J. Cherrington Jan 2010

The Ethics Of Technology, David J. Cherrington

Faculty Publications

Earlier today, I used my credit card to pay for a purchase. As I handed my card to the merchant, he asked if I had used my card to purchase gas recently. When I said yes, he warned me that I should never do it again. He explained that technology experts have developed something that fits inside the credit card reader and copies your credit card information. Another customer overhearing our conversation nodded in agreement. The merchant acknowledged that carrying cash to make gas purchases was much less convenient, but he cautioned me that I should never again use a …


Computer Application Employability Skills, S. Ann Wilson Mar 2007

Computer Application Employability Skills, S. Ann Wilson

Faculty Publications

Among the skills that employers have desired of new employees over the years, computer literacy still ranks very highly. In fact, according to the National Association of Colleges and Employers’ (NACE) 2006 Job Outlook survey, these skills include: (1) Communication skills (verbal and written); (2) Honesty/integrity; (3) Teamwork skills (works well with others); (4) Strong work ethic; (5) Analytical skills; (6) Flexibility/adaptability; (7) Interpersonal skills (relates well to others); (8) Motivation/Initiative; (9) Computer skills; and (10) Detail-oriented. No definition for computer skills was given. The Michigan State University’s Alumni Career Services lists the results of a 1995 Collegiate Employment Research …


Are We Teaching The Computer Application Skills Employers Need?, Susan Evans Jennings, S. Ann Wilson Jan 2006

Are We Teaching The Computer Application Skills Employers Need?, Susan Evans Jennings, S. Ann Wilson

Faculty Publications

Among the skills that employers have desired of new employees over the years, computer literacy still ranks near the top. As anyone who uses technology can attest, hardware and software changes are rapid and continual. The question arises as to whether the need for basic computer skills: word processing, spreadsheets, and databases have been replaced or augmented by the need for webpage design, programming, and desktop publishing skills?


Building Literacy For Knowledge Economies: Reading And Writing About Trends And Issues In Business Week, Clive Muir Jan 2003

Building Literacy For Knowledge Economies: Reading And Writing About Trends And Issues In Business Week, Clive Muir

Faculty Publications

Knowledge economies require highly skilled workers to perform complex, information-based tasks with minimum supervision. Yet, studies in Canada and the United States show that even college educated workers often lack the information literacy skills necessary to perform their jobs. In this session, we will discuss how reading and writing about business trends and issues can help to improve business students’ analytical and critical thinking abilities.


Data Mining Of Forensic Association Rules, James V. Hansen, Paul Benjamin Lowry, Rayman D. Meservy Jan 2003

Data Mining Of Forensic Association Rules, James V. Hansen, Paul Benjamin Lowry, Rayman D. Meservy

Faculty Publications

Data mining offers a potentially powerful method for analyzing the large data sets that are typically found in forensic computing (FC) investigations to discover useful and previously unknown patterns within the data. The contribution of this paper is an innovative and rigorous data mining methodology that enables effective search of large volumes of complex data to discover offender profiles. These profiles are based on association rules, which are computationally sound, flexible, easily interpreted, and provide a ready set of data for refinement via predictive models. Methodology incorporates link analysis and creation of predictive models based on association rule input.


Electronic Conferences: The Report Of An Experiment, I. Trotter Hardy Apr 1993

Electronic Conferences: The Report Of An Experiment, I. Trotter Hardy

Faculty Publications

No abstract provided.