Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Year
- Publication
-
- Maurice Dawson (6)
- Jan Kallberg (2)
- Journal of Cybersecurity Education, Research and Practice (2)
- Walden Dissertations and Doctoral Studies (2)
- Capstones (1)
-
- Doctor of Business Administration Dissertations (1)
- Electronic Theses and Dissertations (1)
- Electronic Theses, Projects, and Dissertations (1)
- Information Technology & Decision Sciences Faculty Publications (1)
- Mountain Plains Journal of Business and Technology (1)
- School of Business Faculty Research (1)
- The Journal of the Michigan Dental Association (1)
- Undergraduate Honors Capstone Projects (1)
- Publication Type
Articles 1 - 21 of 21
Full-Text Articles in Entire DC Network
A Review Of Hybrid Cyber Threats Modelling And Detection Using Artificial Intelligence In Iiot, Yifan Liu, Shancang Li, Xinheng Wang, Li Xu
A Review Of Hybrid Cyber Threats Modelling And Detection Using Artificial Intelligence In Iiot, Yifan Liu, Shancang Li, Xinheng Wang, Li Xu
Information Technology & Decision Sciences Faculty Publications
The Industrial Internet of Things (IIoT) has brought numerous benefits, such as improved efficiency, smart analytics, and increased automation. However, it also exposes connected devices, users, applications, and data generated to cyber security threats that need to be addressed. This work investigates hybrid cyber threats (HCTs), which are now working on an entirely new level with the increasingly adopted IIoT. This work focuses on emerging methods to model, detect, and defend against hybrid cyber attacks using machine learning (ML) techniques. Specifically, a novel ML-based HCT modelling and analysis framework was proposed, in which regularisation and Random Forest …
Application Of Big Data Technology, Text Classification, And Azure Machine Learning For Financial Risk Management Using Data Science Methodology, Oluwaseyi A. Ijogun
Application Of Big Data Technology, Text Classification, And Azure Machine Learning For Financial Risk Management Using Data Science Methodology, Oluwaseyi A. Ijogun
Electronic Theses and Dissertations
Data science plays a crucial role in enabling organizations to optimize data-driven opportunities within financial risk management. It involves identifying, assessing, and mitigating risks, ultimately safeguarding investments, reducing uncertainty, ensuring regulatory compliance, enhancing decision-making, and fostering long-term sustainability. This thesis explores three facets of Data Science projects: enhancing customer understanding, fraud prevention, and predictive analysis, with the goal of improving existing tools and enabling more informed decision-making. The first project examined leveraged big data technologies, such as Hadoop and Spark, to enhance financial risk management by accurately predicting loan defaulters and their repayment likelihood. In the second project, we investigated …
J Mich Dent Assoc July 2022
The Journal of the Michigan Dental Association
Monthly, The Journal of the Michigan Dental Association brings news, information, and feature articles to our state's oral health community and the MDA's 6,200+ members. No publication reaches more Michigan dentists! In this July 2022 issue, the reader will find the following original content:
- A cover feature on negotiating reimbursement rates with PPO contracts.
- A cover feature on guarding against employee embezzlement.
- A 10-Minute EBD on rampant caries management and prevention with ADHD patients taking stimulant medications.
- A Back Page look at the 2022 MDA award winners.
- News you need: an Editorial, guidance on dental practice cybersecurity, and regular department …
Reshaping Organizational Processes And Workflows Through Integration Of Blockchain Technology, Elijah E. Maggini
Reshaping Organizational Processes And Workflows Through Integration Of Blockchain Technology, Elijah E. Maggini
Electronic Theses, Projects, and Dissertations
Cybercrime is becoming increasingly sophisticated and devastating as time carries on while many processes and workflows that exist within organizations are stagnant. This project analyzed Blockchain Technology as a use-case for building upon simple processes and workflows that are often overlooked within organizations for the purpose of hardening security and strengthening non-repudiation. This project examined three main questions relating to; how Blockchain can enhance traditional cyber security practices, how Blockchain can be introduced to organizations as a ground-breaking and worthwhile solution to countering cyber-attacks, and the benefits and risks of implementing Blockchain within an organization. An investigation of traditional cyber …
Ransomware - A Strategic Threat To Organizations, James Frost, Alan R. Hamlin
Ransomware - A Strategic Threat To Organizations, James Frost, Alan R. Hamlin
Mountain Plains Journal of Business and Technology
Ransomware is a strategic threat to government, business, and academic organizations. It has both short term and long term consequences, requiring strategic planning to create defenses, assess options, and create policies.
The purpose of the study is to answer three questions: What is the strategic risk of cyberattack to organizations? What are the current attitudes and practices of executives who are vulnerable to such threats? What are specific options that organizations should consider to prevent and deal with possible incidents in the future? The article is thus comprised of the following components: A) a history of the development and complexity …
Strategies Administrators Use To Mitigate Cloud Computing Data Threats And Breaches, Wanda Cotton
Strategies Administrators Use To Mitigate Cloud Computing Data Threats And Breaches, Wanda Cotton
Walden Dissertations and Doctoral Studies
Cloud computing has changed the information technology (IT) infrastructure of U. S. organizations, generating new threats and breaches in data security. Organization leaders estimated the costs from data breaches at approximately $8.5 billion annually, so reducing data breaches can potentially save organizations billions annually. Grounded in the integrated enterprise risk management framework, the purpose of this qualitative multiple case study was to explore strategies 4 IT administrators in central North Carolina use to mitigate data security threats and breaches. Data collection included archival documents (e.g., data security plans and organization newsletters), journal notes, and semistructured face-to-face interviews. Using thematic analysis …
Refining Technology Threat Avoidance Theory, D. Carpenter, Diana K. Young, P. Barrett, A. J. Mcleod
Refining Technology Threat Avoidance Theory, D. Carpenter, Diana K. Young, P. Barrett, A. J. Mcleod
School of Business Faculty Research
Understanding individual threat avoidance motivation and behavior is a critical component in designing effective cyber security solutions for both users and organizations. Technology threat avoidance theory (TTAT) asserts that individuals’ perceptions regarding their susceptibility to and the resulting severity of technology threats influence their awareness of the threats, which, in turn, influences their motivation and behavior to avoid them. While TTAT provides cogently and logically explains individuals’ technology threat motivations and behaviors, empirical tests have produced equivocal results particularly in terms of the influence of susceptibility and severity on threat perceptions. Due to these inconsistencies in the threat calculus involving …
Personal Privacy And Data Security In The Age Of The Internet, Alexandra Langone
Personal Privacy And Data Security In The Age Of The Internet, Alexandra Langone
Capstones
This project highlights the vulnerability of personal privacy in the age of the internet and the lack of control consumers have over their own data online. As sharing sensitive personal information with entities like social networks and major corporations becomes more and more commonplace for ordinary people, consumers are slowly waking up to the fact that they are often inadvertently giving up control over their personal information. The articles in this portfolio tackle different aspects of the dangers of online privacy, touching on the lack of regulation in the U.S. to protect consumers from companies that do not do enough …
Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis
Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis
Journal of Cybersecurity Education, Research and Practice
In this paper, we describe the need for and development of an introductory cyber security course. The course was designed for non-technical majors with the goal of increasing cyber security hygiene for an important segment of the population—college undergraduates. While the need for degree programs that focus on educating and training individuals for occupations in the ever-growing cyber security field is critically important, the need for improved cyber security hygiene from the average everyday person is of equal importance. This paper discusses the approach used, curriculum developed, results from two runs of the course, and frames the overall structure of …
Cyber-Security Policy Decisions In Small Businesses, Joanna Patterson
Cyber-Security Policy Decisions In Small Businesses, Joanna Patterson
Walden Dissertations and Doctoral Studies
Cyber-attacks against small businesses are on the rise yet small business owners often lack effective strategies to avoid these attacks. The purpose of this qualitative multiple case study was to explore the strategies small business owners use to make cyber-security decisions. Bertalanffy's general systems theory provided the conceptual framework for this study. A purposive sample of 10 small business owners participated in the interview process and shared their decision-making methodologies and influencers. The small business owners were vetted to ensure their strategies were effective through a series of qualification questions. The intent of the research question and corresponding interview questions …
Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia
Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia
Journal of Cybersecurity Education, Research and Practice
The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …
Management And Organizational Influences On The Compliance Behavior Of Employees To Reduce Non-Malicious It Misuse Intention, Randy G. Colvin
Management And Organizational Influences On The Compliance Behavior Of Employees To Reduce Non-Malicious It Misuse Intention, Randy G. Colvin
Doctor of Business Administration Dissertations
The widespread use of information technology and information systems (IT) throughout corporations, too often includes employees who choose not to follow the stated policies and procedures in performing their job tasks. In many cases, this encompasses employees who mean no harm, but choose not to comply with IT policies and procedures. The present study frames such compliance behavior as non-malicious IT misuse. Non-malicious IT misuse by an employee occurs when the employee improvises, takes short cuts, or works around IT procedures and guidelines in order to perform their assigned tasks. As expressed, they do not intend to cause internal control …
The Opm Data Breach: Lessons Learned, Michael Wheat
The Opm Data Breach: Lessons Learned, Michael Wheat
Undergraduate Honors Capstone Projects
In 2015 the federal government announced the largest data breach in United States government history. The Office of Personnel Management (OPM) was hacked, and the personal information of more than 25 million American people was lost to foreign attackers. This incident has spawned concern and outrage about the security of government data in the emerging digital age.
Moving forward from the breach questions remain about how this event happened. It's clear that there were weaknesses that were taken advantage of by malicious threats abroad, and investigations into the attack have yielded surprising results. Not only was the security in place …
A Right To Cybercounter Strikes: The Risks Of Legalizing Hack Backs, Jan Kallberg
A Right To Cybercounter Strikes: The Risks Of Legalizing Hack Backs, Jan Kallberg
Jan Kallberg
The idea to legalize hacking back has gained traction the last years and received several influential corporate and political proponents in the United States and Europe. The growing frustration with repeated cyberattacks and lack of credible law enforcement pushes for alternative ways to prevent future cyberattacks. As of today, counter cyberattacks are illegal in a majority of the nations because it constitutes another cybercrime independent from the initial attack. If cyber counter attacks were legalized it raises a set of questions. The first line of questions are linked to the underlying assumptions that the proposal to legalize counter cyberattacks are …
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Maurice Dawson
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …
A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson
A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson
Maurice Dawson
Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including utilities, regulators, energy markets, government entities, and even those that wish to exploit the cyber infrastructure. Cyber warfare is quickly becoming the method of warfare and the tool of military strategists. Additionally, it is has become a tool for governments to aid or exploit for their own personal benefits. For cyber terrorists there has been an overwhelmingly abundance of new tools and technologies available that have allowed criminal acts to occur virtually anywhere in the …
Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson
Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson
Maurice Dawson
Cyber security has become a matter of national, international, economic, and societal importance that affects multiple nations (Walker, 2012). Since the 1990s users have exploited vulnerabilities to gain access to networks for malicious purposes. In recent years the number of attacks on U.S. networks has continued to grow at an exponential rate. This includes malicious embedded code, exploitation of backdoors, and more. These attacks can be initiated from anywhere in the world from behind a computer with a masked Internet Protocol (IP) address. This type of warfare, cyber warfare, changes the landscape of war itself (Beidleman, 2009). This type of …
The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette
The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette
Maurice Dawson
Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, …
Research In Progress-Defending Android Smartphones From Malware Attacks, Marwan Omar, Maurice E. Dawson Jr.
Research In Progress-Defending Android Smartphones From Malware Attacks, Marwan Omar, Maurice E. Dawson Jr.
Maurice Dawson
Smart phones are becoming enriched with confidential information due to their powerful computational capabilities and attractive communications features. The Android smart phone is one of the most widely used platforms by businesses and users alike. This is partially because Android smart phones use the free, open-source Linux as the underlying operating system, which allows development of applications by any software developer. This research study aims to explore security risks associated with the use of Android smart phones and the sensitive information they contain, the researcher devised a survey questionnaire to investigate and further understand security threats targeting Android smart phones. …
Dod Cyber Technology Policies To Secure Automated Information Systems, Maurice E. Dawson Jr., Miguel Crespo, Stephen Brewster
Dod Cyber Technology Policies To Secure Automated Information Systems, Maurice E. Dawson Jr., Miguel Crespo, Stephen Brewster
Maurice Dawson
Availability, integrity, and confidentiality (AIC) is a key theme everywhere as cyber security has become more than an emerging topic. The Department of Defense (DoD) has implemented multiple processes such as the Department of Defense information assurance certification and accreditation process (DIACAP), common criteria (CC), and created proven baselines to include information assurance (IA) controls to protect information system (IS) resources. The aim of this research study shall provide insight to the applicable processes, IA controls, and standards to include providing a method for selecting necessary government models and for system development.
Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg
Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg
Jan Kallberg
Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …