Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
Articles 1 - 4 of 4
Full-Text Articles in Physical Sciences and Mathematics
Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly
Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly
HON499 projects
The aim of this paper is to offer an introduction to the exploding field of cybersecurity by asking what are the most important concepts or topics that a new member of the field of cybersecurity should know. This paper explores this question from three perspectives: from the realm of business and how the cyber world is intertwined with modern commerce, including common weaknesses and recommendations, from the academic arena examining how cybersecurity is taught and how it should be taught in a classroom or laboratory environment, and lastly, from the author’s personal experience with the cyber world. Included information includes …
Using Blockchain Technology To Facilitate Anti-Money Laundering Efforts, Dominick J. Battistini
Using Blockchain Technology To Facilitate Anti-Money Laundering Efforts, Dominick J. Battistini
Economic Crime Forensics Capstones
Money laundering can be defined as any act or attempted act to conceal or disguise the identity of illegally obtained proceeds so that they appear to have originated from legitimate sources (Money Laundering, 2016). It is difficult to determine the magnitude of money laundering because these illicit financial flows remain hidden (Schott, 2006). A report issued by the United Nations Office on Drugs and Crime (UNODC) quoted that the total of all criminal proceeds amounted to $2.1 trillion in 2009. The study also shows that “Less than 1 percent of global illicit financial flows are currently seized and frozen” (Pietschmann …
Analyzing Proactive Fraud Detection Software Tools And The Push For Quicker Solutions, Kerri Aiken
Analyzing Proactive Fraud Detection Software Tools And The Push For Quicker Solutions, Kerri Aiken
Economic Crime Forensics Capstones
This paper focuses on proactive fraud detection software tools and how these tools can help detect and prevent possible fraudulent schemes. In addition to relying on routine audits, companies are designing proactive methods that involve the inclusion of software tools to detect and deter instances of fraud and abuse. This paper discusses examples of companies using ACL and SAS software programs and how the software tools have positively changed their auditing systems.
Novelis Inc., an aluminum and recycling company, implemented ACL into their internal audit software system. Competitive Health Analytics (Division of Humana) implemented SAS in order to improve their …
Building And Safety Department Android Mobile Application, Nary Simms
Building And Safety Department Android Mobile Application, Nary Simms
Mathematics and Computer Science Capstones
Research has found that Americans spend 4.5 hours watching television, 1.5 hours listening to the radio, about half an hour reading print and spend a whooping five plus hours per day in digital media (online, mobile, other). Out of these five hours, two hours and twenty minutes are spent on a mobile device (phone or tablet), which is a massive increase of about 575 percent from the twenty-four minutes that was reported in 2010. Flurry, an analytic app company, released data about their tracking of more than 300,000 apps in 2013, and they found the average time spent per day …