Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Entire DC Network

Integrating The Sap Software Into The Manufacturing Engineering Curriculum, Lin Qian Jan 2013

Integrating The Sap Software Into The Manufacturing Engineering Curriculum, Lin Qian

Open Access Theses

The concept of Enterprise Resource Planning (ERP) was developed to integrate data efficiently and eliminate redundancy within organizations. Worldwide industries rely on ERP systems to keep a competitive advantage in world market place. Besides, cross-functional knowledge is required in industry. It is critical that schools integrate ERP concepts and methods in to academic curricula for Technology and Engineering School.

This thesis examined the effectiveness of a simulation game as a method for teaching for ERP systems in Technology and Engineering. The quasi-experimental design was used in this study to determine if the SAP simulation game had an impact on students' …


Analysis Of Android Update Packages As A Method To Load Forensic Utilities And Malicious Applications To An Android Device, Mark Lohrum Jan 2013

Analysis Of Android Update Packages As A Method To Load Forensic Utilities And Malicious Applications To An Android Device, Mark Lohrum

Open Access Theses

Android devices are extremely popular and are projected to stay popular. Both forensic tools and malware exist designed specifically for Android devices. The purpose of this study is to explore a new method of loading forensic tools and malware to Android devices. This new method is the update module, which is used to install updates to the operating system. This thesis proposed and completed research to test four different custom update packages on three different Android devices. Two of the update packages contain forensic utilities and the other two contain malicious tools. An update package collecting web history using the …


The Role Of Test Administrator And Error, Michael Edward Brockly Jan 2013

The Role Of Test Administrator And Error, Michael Edward Brockly

Open Access Theses

This study created a framework to quantify and mitigate the amount of error that test administrators introduced to a biometric system during data collection. Prior research has focused only on the subject and the errors they make when interacting with biometric systems, while ignoring the test administrator. This study used a longitudinal data collection, focusing on demographics in government identification forms such as driver's licenses, fingerprint metadata such a moisture and skin temperature, and face image compliance to an ISO best practice standard. Error was quantified from the first visit and baseline test administrator error rates were measured. Additional training, …


Distributed Digital Forensics On Pre-Existing Internal Networks, Jeremiah Jens Nielsen Jan 2013

Distributed Digital Forensics On Pre-Existing Internal Networks, Jeremiah Jens Nielsen

Open Access Theses

Today's large datasets are a major hindrance on digital investigations and have led to a substantial backlog of media that must be examined. While this media sits idle, its relevant investigation must sit idle inducing investigative time lag. This study created a client/server application architecture that operated on an existing pool of internally networked Windows 7 machines. This distributed digital forensic approach helps to address scalability concerns with other approaches while also being financially feasible. Text search runtimes and match counts were evaluated using several scenarios including a 100 GB image with prefabricated data. When compared to FTK 4.1, a …


A Comparative Analysis Of Open Source Storage Area Networks With Esxi 5.1, Robert M. Trinkle Jan 2013

A Comparative Analysis Of Open Source Storage Area Networks With Esxi 5.1, Robert M. Trinkle

Open Access Theses

Storage Area Networks have increased in popularity with the advancement of virtualization technologies. SANs consist of a central repository of hard disks allowing multiple clients to access and share data over a computer network. In recent years, multiple commercial and open source SAN technologies have been introduced to the market. Unlike commercial products, the open source SAN technologies lack formal documentation and research making implementation best practices scarce. This research analyzed the performance of different SAN architectures and implementation strategies. In addition, this paper expands upon previous research by using current hardware and software technologies. The test results of prominent …


Interactive Multivariate Data Exploration For Risk-Based Decision Making, Silvia Oliveros Torres Jan 2013

Interactive Multivariate Data Exploration For Risk-Based Decision Making, Silvia Oliveros Torres

Open Access Theses

Risk-based decision making is a data-driven process used to gather data about outcomes, analyze different scenarios, and deliver informed decisions to mitigate risk.

An interactive visual analytics system can help derive insights from large amounts of data and facilitate the risk management process thereby providing a suitable solution to examine different decision factors. This work introduces two separate systems that

incorporate visual analytics techniques to help the users in the tasks of identifying patterns, finding correlations, designing mitigation strategies, and assisting in the long term planning and assessment process. The first system looks at the National Health

and Nutrition Examination …


An Analysis Of Underlying Competencies And Computer And Information Technology Learning Objectives For Business Analysis, Ryan Thomas Quigley Jan 2013

An Analysis Of Underlying Competencies And Computer And Information Technology Learning Objectives For Business Analysis, Ryan Thomas Quigley

Open Access Theses

This research examines whether the Computer and Information Technology (CIT) department at Purdue University should develop a business analyst concentration. The differences between system and business analysts, evolution of the business analyst profession, job demand and trends, and applicable model curricula were explored to support this research. Review of relevant literature regarding the topics suggested that a business analyst concentration should be developed. A gap analysis was performed to determine how well selected CIT courses address the skills and competencies required by today's business analysts. The primary finding, as a result of the analysis, was that CIT courses alone are …


Text-Based Phishing Detection Using A Simulation Model, Gilchan Park Jan 2013

Text-Based Phishing Detection Using A Simulation Model, Gilchan Park

Open Access Theses

Phishing is one of the most potentially disruptive actions that can be performed on the Internet. Intellectual property and other pertinent business information could potentially be at risk if a user falls for a phishing attack. The most common way of carrying out a phishing attack is through email. The adversary sends an email with a link to a fraudulent site to lure consumers into divulging their confidential information. While such attacks may be easily identifiable for those well-versed in technology, it may be difficult for the typical Internet user to spot a fraudulent email.

The emphasis of this research …