Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Bitcoin (2)
- Security (2)
- Access Policy (1)
- Application development (1)
- Artificial intelligence (1)
-
- Blockchain (1)
- Botnet (1)
- Currency (1)
- Cyber breaches (1)
- Cybersecurity (1)
- Data mining (1)
- Deep belief network (1)
- Deep learning (1)
- Fraud (1)
- Group policy (1)
- IDPS (1)
- Machine learning (1)
- Mobile Devices (1)
- Mobile development (1)
- NP (1)
- Personal calendar (1)
- Security fraud (1)
- Social engineering (1)
- Software tracking (1)
Articles 1 - 9 of 9
Full-Text Articles in Physical Sciences and Mathematics
Developing Issue Of Money Laundering Though Online Casinos, Matthew Thom
Developing Issue Of Money Laundering Though Online Casinos, Matthew Thom
Economic Crime Forensics Capstones
This capstone examines the developing issue of money laundering through online gambling sites which are extensions of casinos located within the United States. The online gambling scene is rapidly growing; and these venue will soon become targets for money laundering by criminals, human traffickers, and even terrorists. "Internet gambling and online capabilities have become a haven for money laundering activities...internet gambling operations are vulnerable to be used, not only for money laundering, but also criminal activities ranging from terrorist financing to tax evasion” (Fbi Confirms Online Gambling Opens Door To Fraud, Money Laundering; Age Verification Software Ineffective. (2009, Dec 04) …
Privileged Access Management, Anea Cobia
Privileged Access Management, Anea Cobia
Economic Crime Forensics Capstones
Security breaches are becoming a common occurrence in society today. When breaches occur, people are often left wondering how they will be affected and what steps can be taken to protect them. The passing of stricter standards and regulations has not slowed would be hackers from crafting ways to breach networks. While there are many ways that a breach can occur, the focus of this paper will be to look at the usage of credentials and privileged accounts. Specifically, the idea of privilege access management and methods for protecting credentials will be examined.
Development Of A Personal Logbook Android Application, John Byrnes
Development Of A Personal Logbook Android Application, John Byrnes
Economic Crime Forensics Capstones
Development of a mobile app to keep up with animal information.
The Benefits Of Artificial Intelligence In Cybersecurity, Ricardo Calderon
The Benefits Of Artificial Intelligence In Cybersecurity, Ricardo Calderon
Economic Crime Forensics Capstones
Cyberthreats have increased extensively during the last decade. Cybercriminals have become more sophisticated. Current security controls are not enough to defend networks from the number of highly skilled cybercriminals. Cybercriminals have learned how to evade the most sophisticated tools, such as Intrusion Detection and Prevention Systems (IDPS), and botnets are almost invisible to current tools. Fortunately, the application of Artificial Intelligence (AI) may increase the detection rate of IDPS systems, and Machine Learning (ML) techniques are able to mine data to detect botnets’ sources. However, the implementation of AI may bring other risks, and cybersecurity experts need to find a …
Accepting Blockchain Tech To Increase Bitcoin Acceptance, Oscar Nawrot
Accepting Blockchain Tech To Increase Bitcoin Acceptance, Oscar Nawrot
Economic Crime Forensics Capstones
Cryptocurrencies, with Bitcoin leading the charge, are the beginning of something new because this ideology is attempting to change the way people store and use money - led by an influx of technological innovation and success. If executed accordingly, blockchain has the chance to completely change our world for the better. With Bitcoin being driven by advanced blockchain technology, this digital currency has the ability to decentralize one of the most important aspects of life - money. This in turn would allow for people to take direct control of their money without the need for being completely dependent on bank …
Social Engineering In Call Centers And Ways To Reduce It, Maureen York
Social Engineering In Call Centers And Ways To Reduce It, Maureen York
Economic Crime Forensics Capstones
Social engineering is the use of trickery, deception, persuasion, emotional manipulation, impersonation, and abuse of trust to gain information or access through the use of a human interface (Thompson, 2006). Social engineering relies on the human behavior in order to gain information or access. The technique of social engineering can be performed in numerous ways and has been proven to be an effective way for perpetrators to obtain valuable information.
This capstone project, I will focus on social engineering of call centers and the steps organizations can take to reduce it. For most organizations, the call centers or customer support …
Using Blockchain Technology To Facilitate Anti-Money Laundering Efforts, Dominick J. Battistini
Using Blockchain Technology To Facilitate Anti-Money Laundering Efforts, Dominick J. Battistini
Economic Crime Forensics Capstones
Money laundering can be defined as any act or attempted act to conceal or disguise the identity of illegally obtained proceeds so that they appear to have originated from legitimate sources (Money Laundering, 2016). It is difficult to determine the magnitude of money laundering because these illicit financial flows remain hidden (Schott, 2006). A report issued by the United Nations Office on Drugs and Crime (UNODC) quoted that the total of all criminal proceeds amounted to $2.1 trillion in 2009. The study also shows that “Less than 1 percent of global illicit financial flows are currently seized and frozen” (Pietschmann …
Analyzing Proactive Fraud Detection Software Tools And The Push For Quicker Solutions, Kerri Aiken
Analyzing Proactive Fraud Detection Software Tools And The Push For Quicker Solutions, Kerri Aiken
Economic Crime Forensics Capstones
This paper focuses on proactive fraud detection software tools and how these tools can help detect and prevent possible fraudulent schemes. In addition to relying on routine audits, companies are designing proactive methods that involve the inclusion of software tools to detect and deter instances of fraud and abuse. This paper discusses examples of companies using ACL and SAS software programs and how the software tools have positively changed their auditing systems.
Novelis Inc., an aluminum and recycling company, implemented ACL into their internal audit software system. Competitive Health Analytics (Division of Humana) implemented SAS in order to improve their …
Mobile Device Use: Increasing Privacy And Security Awareness For Nurse Practitioners, Lauren Storbrauck
Mobile Device Use: Increasing Privacy And Security Awareness For Nurse Practitioners, Lauren Storbrauck
Economic Crime Forensics Capstones
Nurse practitioners are increasingly using mobile devices to access electronic medical records, as the use of the devices increases so does the risk of a potential breach. This is a direct result of technological advances such as larger storage capacities, faster computing speeds, and better portability/connectivity (Torrieri, 2011). These devices include: mobile phones, tablets, and laptops. The use of these devices has greatly facilitated the work of Nurse Practitioners, by allowing them to have instant access to patient records, health history and recommended treatment plans (Ventola, 2014). However, seventy-three percent of all mobile users stated that they are not always …