Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Technology and Innovation

An Exploration Of Synergy Evaluation Application Model To Support Implementation On Merger And Acquisition, Jieping Mei May 2024

An Exploration Of Synergy Evaluation Application Model To Support Implementation On Merger And Acquisition, Jieping Mei

Electronic Theses, Projects, and Dissertations

ABSTRACT

The project focuses on a comprehensive system’s analysis and design of the front-end of the Synergy Evaluation Application Model (SEAM) system for mergers and acquisitions (M&As). The research questions asked are: Q1. How did the SEAM system incorporate the system requirements and design that incorporated the strategic goals and priorities of both the acquirer and the acquiree? Q2. What data sources will the SEAM system rely on, and how does it overcome data integration, automation, visualization challenges? Q3. How will the model identify build in potential synergies, both quantitative and qualitative? The research questions were analyzed through the SEAM …


Education As A Solution To Combat Rising Cybercrime Rates Against Children And Teenagers, Christian Javier Solis-Diaz Dec 2023

Education As A Solution To Combat Rising Cybercrime Rates Against Children And Teenagers, Christian Javier Solis-Diaz

Electronic Theses, Projects, and Dissertations

Ninety seven percent (97%) of people between the ages of 3 and 18 are found to be users of technology and internet services daily. This number also correlates with rising cyber crime rates against people in this age bracket. It is found that people between 3 and 18 years old are found to be technologically savvy but often lack the knowledge of how to protect themselves in online environments. Researchers have suggested that cybersecurity awareness training is an effective method at combating common forms of cyberattack such as social engineering. Social engineering attacks are found to make up 98% of …


A Systematic Literature Review Of Ransomware Attacks In Healthcare, Jasler Klien Adlaon May 2023

A Systematic Literature Review Of Ransomware Attacks In Healthcare, Jasler Klien Adlaon

Electronic Theses, Projects, and Dissertations

This culminating experience project conducted a Systematic Literature Review of ransomware in the healthcare industry. Due to COVID-19, there has been an increase in ransomware attacks that took healthcare by surprise. Although ransomware is a common attack, the current healthcare infrastructure and security mechanisms could not suppress these attacks. This project identifies peer-viewed literature to answer these research questions: “What current ransomware attacks are used in healthcare systems? “What ransomware attacks are likely to appear in the future?” and “What solutions or methods have been used to prepare, prevent, and recover from these attacks?” The purpose of this research is …


A Comparative Analysis Of Devices Via The Bluetooth Protocol In A Time Series Analysis, Joseph Vazquez May 2022

A Comparative Analysis Of Devices Via The Bluetooth Protocol In A Time Series Analysis, Joseph Vazquez

Electronic Theses, Projects, and Dissertations

The utilization of the Bluetooth protocol has provided many with the seamless transmission of data to multiple devices. Given its versatility and being an efficient process of connectivity, it has become one of the preferred methods of wireless connections. Despite this, an aspect of the Bluetooth function is still vulnerable to being exploited by having the data transmission stolen. This project answered the following questions: “How does one reduce the vulnerability by comparing normal and abnormal Bluetooth data?”, “How does one identify outlying variables within the data?” and “How can we improve the Bluetooth function?”. This project relied on previous …


A Study Of Social Engineering Concepts Within A Deceptive Defense, Jacob Glenn Oedekerk May 2022

A Study Of Social Engineering Concepts Within A Deceptive Defense, Jacob Glenn Oedekerk

Electronic Theses, Projects, and Dissertations

Organizations fall victim to costly attacks every year. This has created a need for more successful layers of defense. To aid in this need for additional defense, this study researches a way to bolster an underused defense style called deceptive defense. Researchers agree that deceptive defense could be the future of cybersecurity, and they call for more research in the deceptive category. The unresolved question from these researchers is what attack style could be used with a deception-based defense against an attacker. From this unresolved question, it was also determined that social engineering should be used in this culminating experience …


Cyber Security Vulnerability Assessment In Learning Management Systems, Mohammad Rabie Dec 2021

Cyber Security Vulnerability Assessment In Learning Management Systems, Mohammad Rabie

Electronic Theses, Projects, and Dissertations

With online learning becoming in high demand to deliver training and education during the COVID-19 pandemic, cybercriminals have more opportunities to take advantage of vulnerable Learning Management Systems to steal information like training materials, and students' private information, or they try to make easy money by deploying ransomware. Regardless of the cybercriminal motivation, the compromised system has consequences on the organization that affects it financially, legally, and reputationally. This requires the organization to invest in choosing the most secure LMS and apply the required security controls to avoid such consequences that may cost them much more than expected.

This project …


Phishing For All Ages, Rachana Vann Dec 2021

Phishing For All Ages, Rachana Vann

Electronic Theses, Projects, and Dissertations

Since the start of the pandemic in 2020 and the increase in teleworking, we have witnessed a subsequent increase in cyber-attacks. This project focused on the tools and techniques a teleworker should use to stay safe from online predators. An online predator or hacker is defined as someone who uses the internet to get access to proprietary information or seek a ransom. This project sought to introduce tools and techniques that would help people of all ages to stay safe online. The questions asked were: What techniques do online predators use to lure their unsuspecting victims? On the American Generation …


Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim Dec 2021

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim

Electronic Theses, Projects, and Dissertations

Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …


Managing And Securing Endpoints: A Solution For A Telework Environment, David Adame Aug 2021

Managing And Securing Endpoints: A Solution For A Telework Environment, David Adame

Electronic Theses, Projects, and Dissertations

This project introduces a business problem in which a water utility company – known as H2O District – was forced to discover and implement a solution that would enable the IT Department to effectively manage and secure their endpoints in a telework environment. Typically, an endpoint is defined as any device that is physically connected to a network. For the purposes of this project, the endpoints that the IT Department was concerned with consisted of Windows 10 PC’s, Laptops, and Apple iOS devices that employees use to access company resources while working outside of the corporate network. To properly manage …


Analysis Of Immigration Trends In The U.S. To Discover Patterns And Make Better Policy Decisions, Amita Tandon May 2021

Analysis Of Immigration Trends In The U.S. To Discover Patterns And Make Better Policy Decisions, Amita Tandon

Electronic Theses, Projects, and Dissertations

Immigration is one of the most hotly debated topics in the US. Merely taking a look at the types of immigrant and non-immigrant visas issued by the US government, one can realize the complexity of the law governing the numerous intricacies involved with the issue of immigration (Golash-Boza, 2009). With the ever-increasing population of immigrants in the US, a good understanding of immigration’s impact on the US society is more important than ever before. The objective of this project was to increase our understanding of immigration’s impact on the US society by investigating the general trends in Visa Applications, employers, …


Creating Accountability And Increasing Efficiency By Implementing An It Service Management Solution, Priscilla Leon Jun 2020

Creating Accountability And Increasing Efficiency By Implementing An It Service Management Solution, Priscilla Leon

Electronic Theses, Projects, and Dissertations

Creating a culture that values accountability and efficiency is a difficult task for any organization. Without metrics or systems in place to help with these problems, the task becomes nearly impossible. The focus shifts from accountability to covering your tracks and decreased efficiency are usually blamed on external factors. In higher education, the problem is far more severe. Management leadership and staff are accountable to the stakeholders of higher education, such as the students, community, and faculty. A lack of accountability and a decrease in efficiency, in the Education Department, have led to a need for a technological solution that …


Implementing The Malcolm Baldrige Process For A Financial Institution: An Insiders Perspective, Scott Murray Mar 2020

Implementing The Malcolm Baldrige Process For A Financial Institution: An Insiders Perspective, Scott Murray

Electronic Theses, Projects, and Dissertations

The Malcolm Baldrige Framework for Performance Excellence outlines best practices for strategic and operational processes. Enterprises that achieve the award do so not for the award itself – but for the transformation that takes place along the way. Although the fifty-page summaries of Malcolm Baldrige award winning organizations are posted on the National Institute of Science and Technology (NIST) (https://www.nist.gov/baldrige/award-recipients), the process and effort used to create such applications has not been documented. This project documents and provides an internal perspective and lessons learned from the early stages of the Malcolm Baldrige journey for a medium size financial institution. The …