Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Old Dominion University

Conference

Articles 1 - 15 of 15

Full-Text Articles in Business

The Ethical And Legal Implications Of Iot Data In Business Organizations, Kennedy Bellamy Apr 2024

The Ethical And Legal Implications Of Iot Data In Business Organizations, Kennedy Bellamy

Cybersecurity Undergraduate Research Showcase

The Internet of Things (IoT) has transformed how our day to day lives by implementing and evolving technology that allows data to be exchanged between interconnected devices without the need for human involvement. This paper investigates the implications of IoT expansion and development in corporate organizations, focusing on both the opportunities and challenges it brings. IoT encompasses a wide range of data kinds, from sensor readings to user interactions, across industries such as manufacturing, healthcare, and retail. However, greater connection raises ethical and legal challenges, especially over data privacy, ownership, and control. Potential breaches of privacy and illegal data access …


Removing The “I” Factor: Examining The Barriers To Career Progression For Black Women, Anthony Sites, Jay O’Toole Mar 2024

Removing The “I” Factor: Examining The Barriers To Career Progression For Black Women, Anthony Sites, Jay O’Toole

Undergraduate Research Symposium

This research aims to advance theory concerning career progression barriers for Black women. It introduces and advances critical race theory and theories of identity blindness and consciousness as important mechanisms that impact the Black women’s career trajectories. Identity blindness is a tendency to overlook or ignore an individual’s unique racial and gender identity in professional settings can create systemic barriers for professional advancement. Conversely, identity consciousness purposely acknowledges and embraces racial and gender identities and can create more inclusive workplaces that support diverse individuals. This study will use secondary data from the US Census Public Use File (PUF). The dataset …


How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim Dec 2023

How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim

Cybersecurity Undergraduate Research Showcase

The powers of OpenAI's groundbreaking AI language model, ChatGPT, startled millions of users when it was released in November. But for many, the tool's ability to further accomplish the goals of evil actors swiftly replaced their initial excitement with significant concerns. ChatGPT gives malicious actors additional ways to possibly compromise sophisticated cybersecurity software. Leaders in a sector that is currently suffering from a 38% global spike in data breaches in 2022 must acknowledge the rising influence of AI and take appropriate action. Cybercriminals are writing more complex and focused business email compromise (BEC) and other phishing emails with the assistance …


Mask-On Breathing Awareness Trainer (Mobat), Robert Larson, Yuzhong Shen Apr 2023

Mask-On Breathing Awareness Trainer (Mobat), Robert Larson, Yuzhong Shen

Modeling, Simulation and Visualization Student Capstone Conference

Currently there is no low-cost solution to teach large quantities of Naval Aviators on how to correctly breath on an oxygen mask. This report will discuss the design and implementation of a mask-on breathing apparatus for use with United States Naval Aircrew for initial and annual familiarization. With the current uptick in physiological episodes within the naval aviation enterprise, there has been a need to find solutions to this problem. Currently when a naval aircrew is trained in aviation physiological threats, they do so with normobaric hypoxia tools in the form of the 9A19 Normobaric Hypoxia Trainer for aircrew who …


Applicable Mitigation Strategies And Technology Propositions: Preventing Scamming In Marginalized Populations, Grace Nicole Sandhofer-Adams Apr 2023

Applicable Mitigation Strategies And Technology Propositions: Preventing Scamming In Marginalized Populations, Grace Nicole Sandhofer-Adams

Cybersecurity Undergraduate Research Showcase

This essay serves as a proposal for new technology and mitigation against the scamming of marginalized individuals (i.e., those over the age of 65). Research supports this outline, giving background to the types of scams, and prevention strategies currently seen in the cybersecurity landscape. It is evident that the methods we currently use to combat scamming attacks are not effective, therefore, I propose a new solution. This proposed telecommunications strategy is necessary to prevent scamming of all internet users, no matter the device. This telecommunication strategy would use artificial intelligence and machine learning to constantly improve its detection over time, …


A Call For Research: Ethical Dilemmas Of Autonomous Vehicle Manufacturers, Remy Harwood Dec 2022

A Call For Research: Ethical Dilemmas Of Autonomous Vehicle Manufacturers, Remy Harwood

Cybersecurity Undergraduate Research Showcase

While autonomous vehicles accounted for about 31.4 million vehicles on the road in 2019 (Placek). They have continued to flood the market and have a projected growth to 58 million in just 8 years from now (Placek) As well as a market cap in the billions of dollars. Even the comparatively new AV company Tesla has over 3 times the market cap value of the leading non AV brand Toyota (Market Cap) who are also working toward AVs as well, like their level 2 teammate driver assistance. Following Moore’s Law, as technology continues to improve, their social impact and ethical …


The Impact Of Ethical Hacking Within Small Businesses, Nygia Tribbey Oct 2022

The Impact Of Ethical Hacking Within Small Businesses, Nygia Tribbey

Cybersecurity Undergraduate Research Showcase

The Internet has brought about a new way for businesses to reach their customers. With the help of social media, websites, and email marketing, small businesses have gained a lot of new customers. However, these new online customers have also opened up their businesses to a whole new world of cyber crime. Cyber crime is the illegal use of computers and networks to cause damage or steal information. This type of crime affects small businesses as well as large corporations. Small businesses often find themselves at a disadvantage because they don't have the resources to hire an ethical hacker or …


A Discussion On Supplier Selection Modeling Approaches, Sheida Etemadidavan, Andrew J. Collins Apr 2022

A Discussion On Supplier Selection Modeling Approaches, Sheida Etemadidavan, Andrew J. Collins

Modeling, Simulation and Visualization Student Capstone Conference

Supplier selection is a subfield of supply chain management that involves multiple steps in order for decision-makers to find suitable suppliers. Supplier selection is important as it could influence the whole company positively or negatively. It has, recently, become a topic of interest because of the recent pandemic and its effect on the global supply chain, which causes supply shortages. As such, the focus of this paper is on characteristics of decision-making modeling approaches, specifically agent-based modeling and multi-agent systems, in supplier selection, as its modeling has always been a challenge for companies due to its complex nature.


Risk-And-Resiliency-Intelligent Supply Chain (Rrisc), Ahmad A. Abdelnabi, Ahmed M. Abdelmagid, Ghaith Rabadi, Andres Sousa-Poza, C. Ariel Pinto Apr 2022

Risk-And-Resiliency-Intelligent Supply Chain (Rrisc), Ahmad A. Abdelnabi, Ahmed M. Abdelmagid, Ghaith Rabadi, Andres Sousa-Poza, C. Ariel Pinto

Modeling, Simulation and Visualization Student Capstone Conference

This work proposes a risk-and-resiliency-intelligent supply chain (RRiSC) tool which is an SC risk management framework that leverages cutting-edge technologies in Artificial Intelligence (AI), Big Data Analytics (BDA), and Digital Twins (DT) to develop specific capabilities for SC risk management. RRiSC is a convergence of mature tools and techniques embedded in three modules: Modeling, Simulation, and Visualization – all together integrate the optimization, simulation, and data analytics to test the performance of the whole supply network under different scenarios through measuring the vital KPIs, identifying the vulnerabilities, and setting proactive plans to diminish risks consequences.


An Importance-Performance Analysis Of Local And Destination Visitors To Monocacy National Battlefield, Mckenzie Mosher, Colin Mccormack, Caleb Scruggs, Chris Zajchowski, Jessica Fefer Mar 2022

An Importance-Performance Analysis Of Local And Destination Visitors To Monocacy National Battlefield, Mckenzie Mosher, Colin Mccormack, Caleb Scruggs, Chris Zajchowski, Jessica Fefer

Undergraduate Research Symposium

The purpose of this study was to understand the evolving visitor experience at Monocacy National Battlefield (MONO) in Fredrick, Maryland and, specifically, the way this National Park Service site serves both its’ destination and local visitors. Using an Importance-Performance Analysis, segmented by visitors’ county of residence, we demonstrate key differences in the visitor experience across visitor type. Following survey design with MONO managers and approval from the U.S. Office of Management and Budget, onsite sampling occurred over 21 visitor contact days, stratified by day of the week and time of day, in summer and fall of 2021. 469 visitors were …


Cyber Threat On The High Seas. A Growing Threat To Infrastructure, James Cummins Jan 2022

Cyber Threat On The High Seas. A Growing Threat To Infrastructure, James Cummins

Cybersecurity Undergraduate Research Showcase

In a growing digital and cloud-connected world, all aspects of our lives are becoming interconnected. All these interconnections breed a possibility for ever-increasing cybersecurity threats. The oceans are not impervious to these attacks. In this research paper, we address the following questions.

What threats do commercial ships face today?

What actions are necessary to mitigate these threats?


Cybersecurity In Fintech Companies, Efstratios Zouros Jan 2022

Cybersecurity In Fintech Companies, Efstratios Zouros

Cybersecurity Undergraduate Research Showcase

Have you recently accessed your bank account online? Have you accessed any financial instrument through your computer or your mobile device? If you are reading this, chances are you have. Every time you utilize those services, you ultimately put your trust in the financial institutions that offer them. You trust that they can securely keep your private information, while also keeping your savings safe. Ultimately, there is a certain dependability and trust in financial institutions that have been present on earth before most of us.


Understanding The Effectivity And Increased Reliance Of Credit Risk Machine Learning Models In Banking, Grishma Baruah Jan 2022

Understanding The Effectivity And Increased Reliance Of Credit Risk Machine Learning Models In Banking, Grishma Baruah

Cybersecurity Undergraduate Research Showcase

Credit risk analysis and making accurate investment and lending decisions has been a challenge for the financial industry for many years, as can be seen with the 2008 financial crisis. However, with the rise of machine learning models and predictive analytics, there has been a shift to increased reliance on technology for determining credit risk. This transition to machine learning comes with both advantages, such as potentially eliminating human error and assumptions from lending decisions, and disadvantages, such as time constraints, data usage inabilities, and lack of understanding nuances in machine learning models. In this paper, I look at four …


Cybersecurity Maturity Model Certification (Cmmc) Compliance For Dod Contractors, Sierra Burnett Nov 2021

Cybersecurity Maturity Model Certification (Cmmc) Compliance For Dod Contractors, Sierra Burnett

Cybersecurity Undergraduate Research Showcase

The DoD is currently taking a supply-chain risk management strategy to foster cybersecurity. This unique strategy is often referred to as CMMC which stands for “Cybersecurity Maturity Model Certification”. The approach requires that all the 300,000 DoD contractors acquire third-party authentication that may attain the requirements for the CMMC maturity level suitable to the work they desire to do for the DoD. CMMC typically examines the organization's capability to safeguard Federal Contract Information as well as CUI. It integrates various cybersecurity standards already in place and plots the best practices alongside processes to five maturity levels that range from the …


Leverage Psychological Factors Associated With Lapses In Cybersecurity In Organizational Management, Chad Holm Jan 2021

Leverage Psychological Factors Associated With Lapses In Cybersecurity In Organizational Management, Chad Holm

Cybersecurity Undergraduate Research Showcase

With computers being a standard part of life now with the evolution of the internet, many aspects of our lives have changed, and new ways of thinking must come. One of the biggest challenges in most cyber security problems is not related to the software or the hardware; it is the people that are using the computers to access the data and communicate with others, where the hackers could simply find a weak entry point that naturally exists and a weak link caused by human hands. The human factor as an “insider threat” will affect unauthorized access, credentials stealing, and …