Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

Developing Issue Of Money Laundering Though Online Casinos, Matthew Thom Sep 2019

Developing Issue Of Money Laundering Though Online Casinos, Matthew Thom

Economic Crime Forensics Capstones

This capstone examines the developing issue of money laundering through online gambling sites which are extensions of casinos located within the United States. The online gambling scene is rapidly growing; and these venue will soon become targets for money laundering by criminals, human traffickers, and even terrorists. "Internet gambling and online capabilities have become a haven for money laundering activities...internet gambling operations are vulnerable to be used, not only for money laundering, but also criminal activities ranging from terrorist financing to tax evasion” (Fbi Confirms Online Gambling Opens Door To Fraud, Money Laundering; Age Verification Software Ineffective. (2009, Dec 04) …


Privileged Access Management, Anea Cobia Feb 2019

Privileged Access Management, Anea Cobia

Economic Crime Forensics Capstones

Security breaches are becoming a common occurrence in society today. When breaches occur, people are often left wondering how they will be affected and what steps can be taken to protect them. The passing of stricter standards and regulations has not slowed would be hackers from crafting ways to breach networks. While there are many ways that a breach can occur, the focus of this paper will be to look at the usage of credentials and privileged accounts. Specifically, the idea of privilege access management and methods for protecting credentials will be examined.


Development Of A Personal Logbook Android Application, John Byrnes Jan 2019

Development Of A Personal Logbook Android Application, John Byrnes

Economic Crime Forensics Capstones

Development of a mobile app to keep up with animal information.


The Benefits Of Artificial Intelligence In Cybersecurity, Ricardo Calderon Jan 2019

The Benefits Of Artificial Intelligence In Cybersecurity, Ricardo Calderon

Economic Crime Forensics Capstones

Cyberthreats have increased extensively during the last decade. Cybercriminals have become more sophisticated. Current security controls are not enough to defend networks from the number of highly skilled cybercriminals. Cybercriminals have learned how to evade the most sophisticated tools, such as Intrusion Detection and Prevention Systems (IDPS), and botnets are almost invisible to current tools. Fortunately, the application of Artificial Intelligence (AI) may increase the detection rate of IDPS systems, and Machine Learning (ML) techniques are able to mine data to detect botnets’ sources. However, the implementation of AI may bring other risks, and cybersecurity experts need to find a …


Accepting Blockchain Tech To Increase Bitcoin Acceptance, Oscar Nawrot Jan 2019

Accepting Blockchain Tech To Increase Bitcoin Acceptance, Oscar Nawrot

Economic Crime Forensics Capstones

Cryptocurrencies, with Bitcoin leading the charge, are the beginning of something new because this ideology is attempting to change the way people store and use money - led by an influx of technological innovation and success. If executed accordingly, blockchain has the chance to completely change our world for the better. With Bitcoin being driven by advanced blockchain technology, this digital currency has the ability to decentralize one of the most important aspects of life - money. This in turn would allow for people to take direct control of their money without the need for being completely dependent on bank …


Social Engineering In Call Centers And Ways To Reduce It, Maureen York Jan 2019

Social Engineering In Call Centers And Ways To Reduce It, Maureen York

Economic Crime Forensics Capstones

Social engineering is the use of trickery, deception, persuasion, emotional manipulation, impersonation, and abuse of trust to gain information or access through the use of a human interface (Thompson, 2006). Social engineering relies on the human behavior in order to gain information or access. The technique of social engineering can be performed in numerous ways and has been proven to be an effective way for perpetrators to obtain valuable information.

This capstone project, I will focus on social engineering of call centers and the steps organizations can take to reduce it. For most organizations, the call centers or customer support …


Using Blockchain Technology To Facilitate Anti-Money Laundering Efforts, Dominick J. Battistini Aug 2016

Using Blockchain Technology To Facilitate Anti-Money Laundering Efforts, Dominick J. Battistini

Economic Crime Forensics Capstones

Money laundering can be defined as any act or attempted act to conceal or disguise the identity of illegally obtained proceeds so that they appear to have originated from legitimate sources (Money Laundering, 2016). It is difficult to determine the magnitude of money laundering because these illicit financial flows remain hidden (Schott, 2006). A report issued by the United Nations Office on Drugs and Crime (UNODC) quoted that the total of all criminal proceeds amounted to $2.1 trillion in 2009. The study also shows that “Less than 1 percent of global illicit financial flows are currently seized and frozen” (Pietschmann …


Analyzing Proactive Fraud Detection Software Tools And The Push For Quicker Solutions, Kerri Aiken May 2016

Analyzing Proactive Fraud Detection Software Tools And The Push For Quicker Solutions, Kerri Aiken

Economic Crime Forensics Capstones

This paper focuses on proactive fraud detection software tools and how these tools can help detect and prevent possible fraudulent schemes. In addition to relying on routine audits, companies are designing proactive methods that involve the inclusion of software tools to detect and deter instances of fraud and abuse. This paper discusses examples of companies using ACL and SAS software programs and how the software tools have positively changed their auditing systems.

Novelis Inc., an aluminum and recycling company, implemented ACL into their internal audit software system. Competitive Health Analytics (Division of Humana) implemented SAS in order to improve their …


Mobile Device Use: Increasing Privacy And Security Awareness For Nurse Practitioners, Lauren Storbrauck May 2015

Mobile Device Use: Increasing Privacy And Security Awareness For Nurse Practitioners, Lauren Storbrauck

Economic Crime Forensics Capstones

Nurse practitioners are increasingly using mobile devices to access electronic medical records, as the use of the devices increases so does the risk of a potential breach. This is a direct result of technological advances such as larger storage capacities, faster computing speeds, and better portability/connectivity (Torrieri, 2011). These devices include: mobile phones, tablets, and laptops. The use of these devices has greatly facilitated the work of Nurse Practitioners, by allowing them to have instant access to patient records, health history and recommended treatment plans (Ventola, 2014). However, seventy-three percent of all mobile users stated that they are not always …