Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Business

Security Issues With Software In Maritime Industry: Focus On Artificial Intelligence, Alexis Nixon Oct 2022

Security Issues With Software In Maritime Industry: Focus On Artificial Intelligence, Alexis Nixon

Graduate Scholarly Works

Abstract

Maritime industry is the use of waterways to conduct business, move people and goods across water and shipping goods overseas. This area of business is last to update their cyber security and technical policies leading to many issues discussed below. Some of proposed solutions include updated software, patches, autonomous ships and updating the legality issues around technical updates in Maritime industry. Overall, the goal of the paper is to help the reader become informed about the shortcomings in maritime software, understand the vulnerabilities in the software they use, propose solutions to the vulnerabilities and discuss a popular new option …


Privacy Rights Pertaining To The Developing Cyber World We Live In, Alexis Nixon Jul 2022

Privacy Rights Pertaining To The Developing Cyber World We Live In, Alexis Nixon

Graduate Scholarly Works

A large concern expressed by the general public is the right to privacy when dealing with the cyber/online sector. One major factor that influences the privacy rights of people in the cyber realm is our fourth amendment in the United States. In this paper, the focus will be on the fourth amendment, privacy rights and how these pertain to the cyber world of individuals, companies and countries. Some of the points covered in the sections below include: an explanation of the fourth amendment, influential court case pertaining to the fourth amendment, companies right to privacy/ keeping their customers data private, …


Online Fraud By Way Of Phishing Emails, Alexis Nixon Feb 2022

Online Fraud By Way Of Phishing Emails, Alexis Nixon

Graduate Scholarly Works

With the rise of people using the Internet more since Covid-19 started, there has been an increase in fraud cases that occur on the internet as well. Some of these frauds occur by way of romance scams, inauthentic products or even investment fraud. The single type of fraud that was researched and discussed below is the use of phishing emails to commit fraud. Here the perpetrator sends out the same email in a mass quantity, with hopes of getting as many people to fall victim to as possible. The email usually looks like it is legitimate and coming from your …


How Social Media And Internet Links To Hate Speech, Cyber Bullying, And Defiance/Cybercrime In Youth, Alexis Nixon Jan 2022

How Social Media And Internet Links To Hate Speech, Cyber Bullying, And Defiance/Cybercrime In Youth, Alexis Nixon

Graduate Scholarly Works

Over the past 20 years or so there has been an increase in technological advancements and more people gaining access to the internet. While these advancements have been helpful in the everyday functions of life, they also bring with them some negative effects (Brady et al., 2015). One of the most vulnerable groups to fall victim to the negative effects of technology and social media are the youth but more specifically the teenagers in middle and high school. In the following essay, there has been research done to explain the societal impacts of cybercrime/deviance on teens, online hate speech and …


Using Multiple Data Sources For Customer Satisfaction Analyzing: A Sentimental Approach, Jhanvi Vyas May 2020

Using Multiple Data Sources For Customer Satisfaction Analyzing: A Sentimental Approach, Jhanvi Vyas

Master of Science in Information Technology Theses

The effectiveness of data and data providers in marketing has created a hype in the marketing world. Businesses often face a divided approach because of the increasing volume of data collected through a variety of data channels. This results in marketers often facing problems in acquiring precise market data for analysis. The correct techniques and knowledge required to integrate all the available sources for acquiring proper analytical results are yet to be specifically known. There is no universally accepted technological methodology when it comes to integrating data sources for market analysis, but there are a few business concepts that can …


Is Success Model For Evaluating Cloud Computing For Small Business Benefit: A Quantitative Study, Charles Kenneth Flack Jul 2016

Is Success Model For Evaluating Cloud Computing For Small Business Benefit: A Quantitative Study, Charles Kenneth Flack

Doctor of Business Administration Dissertations

Information system (IS) success has been extensively researched to frame key attributes of an information system or technology to understand its benefit to business. One definition of IS success is the adoption and extensive use of an information system (Robey & Zeller, 1978). In the present era of cloud computing, as in former IS eras, successful implementation is critical for achieving business success in all enterprise types. IS success is also described as a lagging multifaceted measure of technology effectiveness for a business. Early adopters of a new technology are a rich resource to determine benefits for later adopters, and …


An Examination Of Fit And The Use Of Mobile Devices For Performing Tasks, Carole L. Hollingsworth Apr 2015

An Examination Of Fit And The Use Of Mobile Devices For Performing Tasks, Carole L. Hollingsworth

Doctor of Business Administration Dissertations

This research seeks to better understand an individual’s use of mobile devices and the matching fit between type of mobile device and activity. As mobile devices swiftly progress and alter individuals’ ways of interacting with technology, a more comprehensive understanding of how tasks are impacted may help ensure appropriate device selection. The ability for more targeted device selection may increase use and help mobile device users and designers avoid the pitfalls of pre-existing, traditional technology.

Building on identified antecedents of success from the DeLone & McLean Information Systems Success Model and focusing on the measurement of hedonic and utilitarian tasks …