Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Business
Removing Prejudice From Online Job Applications, Ilene Rothman
Removing Prejudice From Online Job Applications, Ilene Rothman
Business/Business Administration
Currently, there are no laws limiting an employer from viewing a candidate’s social media presence. The United States Equal Opportunity Employment Commission prohibits discrimination based on race, color, sex, religion, national origin, age, disability, political affiliation, sexual orientation, and genetic information. If a candidate is active on professional social media websites such as the largest online professional network, LinkedIn, some of this information can easily be gathered by an employer. To stop discrimination in the hiring process, recommendations for a blind hiring process will be provided. This process will ensure that a candidate is initially judged solely based on the …
Alzheimer’S: The Right To Nothing?, Heather Marie Forster
Alzheimer’S: The Right To Nothing?, Heather Marie Forster
Business/Business Administration
The purpose of this thesis is to shine light on the inequalities in the types of options Alzheimer’s patients are afforded and the different decisions they can or cannot make in comparison to other terminal patients. The main argument of this thesis is to include Alzheimer’s patients in current Right-to-Die laws by allowing them to consent to this choice of action before they are diagnosed, or in the early stages while they still have the competence to do so. Another aspect of this thesis is to increase the general public’s knowledge about Alzheimer’s and other dementias in order to generate …
The Implementation Of A Cybersecurity Testbed For Education And Research, Elisabeth Dubois
The Implementation Of A Cybersecurity Testbed For Education And Research, Elisabeth Dubois
Business/Business Administration
The Cyber Innovation Lab brings with it the understanding and collection of the threats, vulnerabilities, and risks that one’s IT resources present. Due to the increasing complexity and degree of cyber threats, innovation regarding current attack vectors and defense mechanisms are needed. The lack of realistic threat landscapes and the need for accurate security analysis and defense strategies prompted the implementation of a cyber physical system for defensive research. The project depicts the processes to establish the testbed, the methodology used in classifying the architecture, threat and attack analysis, as well as preliminary results. The paper presents the testbed architecture …