Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Business

Removing Prejudice From Online Job Applications, Ilene Rothman Dec 2018

Removing Prejudice From Online Job Applications, Ilene Rothman

Business/Business Administration

Currently, there are no laws limiting an employer from viewing a candidate’s social media presence. The United States Equal Opportunity Employment Commission prohibits discrimination based on race, color, sex, religion, national origin, age, disability, political affiliation, sexual orientation, and genetic information. If a candidate is active on professional social media websites such as the largest online professional network, LinkedIn, some of this information can easily be gathered by an employer. To stop discrimination in the hiring process, recommendations for a blind hiring process will be provided. This process will ensure that a candidate is initially judged solely based on the …


Alzheimer’S: The Right To Nothing?, Heather Marie Forster May 2018

Alzheimer’S: The Right To Nothing?, Heather Marie Forster

Business/Business Administration

The purpose of this thesis is to shine light on the inequalities in the types of options Alzheimer’s patients are afforded and the different decisions they can or cannot make in comparison to other terminal patients. The main argument of this thesis is to include Alzheimer’s patients in current Right-to-Die laws by allowing them to consent to this choice of action before they are diagnosed, or in the early stages while they still have the competence to do so. Another aspect of this thesis is to increase the general public’s knowledge about Alzheimer’s and other dementias in order to generate …


The Implementation Of A Cybersecurity Testbed For Education And Research, Elisabeth Dubois May 2018

The Implementation Of A Cybersecurity Testbed For Education And Research, Elisabeth Dubois

Business/Business Administration

The Cyber Innovation Lab brings with it the understanding and collection of the threats, vulnerabilities, and risks that one’s IT resources present. Due to the increasing complexity and degree of cyber threats, innovation regarding current attack vectors and defense mechanisms are needed. The lack of realistic threat landscapes and the need for accurate security analysis and defense strategies prompted the implementation of a cyber physical system for defensive research. The project depicts the processes to establish the testbed, the methodology used in classifying the architecture, threat and attack analysis, as well as preliminary results. The paper presents the testbed architecture …