Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- MPA (15)
- Cybersecurity (5)
- MSIT (4)
- Artificial intelligence (3)
- COVID-19 (3)
-
- Data breach (3)
- MSPC (3)
- Social media (3)
- Trauma (3)
- Editorial (2)
- Pandemic (2)
- "Redmen" (1)
- AI (1)
- AI assistant (1)
- Access control (1)
- Accessible technology (1)
- Administrative law (1)
- And remote monitoring (1)
- Behavioral sciences (1)
- Best practices (1)
- Black men (1)
- Blockchains (1)
- Board of Education (1)
- Breach management (1)
- Burnout (1)
- CVS (1)
- Care organization (1)
- Case study (1)
- Chatbot (1)
- Civil liberties (1)
- Publication
-
- School of Professional Studies (22)
- Journal of Cybersecurity Education, Research and Practice (8)
- KSU Proceedings on Cybersecurity Education, Research and Practice (5)
- Research Collection School Of Computing and Information Systems (3)
- All Faculty Scholarship (1)
-
- CCE Theses and Dissertations (1)
- Electronic Theses, Projects, and Dissertations (1)
- Engineering Management & Systems Engineering Theses & Dissertations (1)
- Graduate Theses and Dissertations (1)
- James Madison Undergraduate Research Journal (JMURJ) (1)
- Journal of International Technology and Information Management (1)
- Publication Type
Articles 1 - 30 of 45
Full-Text Articles in Information Security
Narrowing The Wealth And Income Gap In Poland, China, And The United States, Cyndy Carboo, Zhiling Song, Jiawei Feng, Xudong Zhu
Narrowing The Wealth And Income Gap In Poland, China, And The United States, Cyndy Carboo, Zhiling Song, Jiawei Feng, Xudong Zhu
School of Professional Studies
With the widespread of globalization, the wealth gap continues to widen globally. Due to the enormous differences in national conditions and political systems of various countries, this article selects China, the United States, and Poland as the research objects, and uses a specific time unit as the benchmark, and mainly focuses on the four directions of medical care, education, job opportunities, and pensions. A reader could understand the correlation between the wealth gap and multiple factors deeply in this article. This article analyzes the impact of income disparity on these three countries and proposes solutions to help narrow the gap …
The Impact Of Special Interest Groups On The Federal Dietary Guidelines: Consequences For American Health, Dory Mcmillan
The Impact Of Special Interest Groups On The Federal Dietary Guidelines: Consequences For American Health, Dory Mcmillan
School of Professional Studies
This research paper explores the impact of relationships between lobbyists and both the USDA and HSS, and the impact these relationships have on the Dietary Guidelines for Americans that the agencies work together to create. The paper focuses specifically on the information the guidelines present in regard to red meat consumption, and the impacts this may have on American health, and healthcare costs associated. It was hypothesized that a relationship would be found between special interest groups and the U.S. Department of Health and Human Services and/or the U.S. Department of Agriculture. Research found there was a relationship between special …
Healthy Food Portal Business Plan And Its Function Model, Alena Raupova
Healthy Food Portal Business Plan And Its Function Model, Alena Raupova
School of Professional Studies
Business planning is a tool of paramount importance in the process of company management, on the efficiency of which the future functioning of the enterprise depends. Formation of a business plan enables the team to productively and competently use existing funds and resources in their work and apply planning as a very effective management mechanism (Hamm, 2016).
The goal of this final project is to develop a business plan for a healthy nutrition portal for Bellyful LLC. Bellyful is based in Boston, USA, and the portal will be its first product. Our client is interested in researching the prospects of …
Worst Time Being Poor? The Hunger Problem In U.S. During Covid-19 Pandemic, Yuanhang Hu
Worst Time Being Poor? The Hunger Problem In U.S. During Covid-19 Pandemic, Yuanhang Hu
School of Professional Studies
Food insecurity is deeply rooted in American society during and before the COVID-19 pandemic. Food Insecurity usually associates with economic indicators, such as unemployment rate, income level, etc. Currently, there are two main tools to fight the war of hunger. The first one is the government food assistance programs. And the second one is food pantries from the private sectors of the community. Both tools are facing numerous challenges due to COVID-19. The purpose of this article is to provide rational reasons to persuade the government to enhance the benefits of the Supplemental Nutrition Assistance Program (SNAP) and use administrative …
Rcap Solutions Breach Management - Case Study, Eugene Adu-Gyamfi, Gio Al Muarrawi, Kwame Ofori
Rcap Solutions Breach Management - Case Study, Eugene Adu-Gyamfi, Gio Al Muarrawi, Kwame Ofori
School of Professional Studies
Companies get hacked every day, and our in-scope company for this case study, RCAP Solution, was not an exception. Security incidents have increased both in volume and range in recent years, and cyber-attacks have become more sophisticated than ever before. There are so many reasons that drive this fact; one is that our infrastructure was not protected efficiently, but also attackers have become more knowledgeable in initiating advanced attacks at a scale. Additionally, the entrance of emerging technologies such as blockchain, machine learning, and the internet of things, added additional complexity to the already complex scene. Cybercriminals are using various …
A Web-Based Ai Assistant Application Using Python And Javascript, Viet Le, Tej Bahadur, Jainee Shah, Roushan Ara
A Web-Based Ai Assistant Application Using Python And Javascript, Viet Le, Tej Bahadur, Jainee Shah, Roushan Ara
School of Professional Studies
Our research is mainly based on a chatbot which is powered by Artificial Intelligence. Nowadays, Artificial Intelligence assistants such as Apple’s Siri, Google’s Now and Amazon’s Alexa are currently fast-growing and widely integrated with many smart devices. These assistants are built with the primary purpose of being personal assistants for every individual user in certain contexts. In this research, we would highlight the development process of the chatbots, features, problems, case studies and limitations.
This research delivers the information, helps developers to build answer bots and integrate chatbots with business accounts. The aim is to assist users and allow transactions …
The Killingly Mascot Case Study, Jordan Lumpkins
The Killingly Mascot Case Study, Jordan Lumpkins
School of Professional Studies
In the summer of 2019, in Killingly, Connecticut the local Board of Education voted to retire the "Redmen" mascot name it had used for nearly a century. This legislation was widely opposed and received extensive media coverage. Within a few months, the town experienced a massive political referendum where several local Board of Education members and Councilmen were replaced by single issue politicians promising to reinstate the "Redmen" name. Now holding a majority on the Board of Education, these Board members made Killingly the first school in U.S. history to reinstate a mascot after being deemed "derogatory."
It is the …
How Museum Utilize Social Media On Communication, Jiake Han
How Museum Utilize Social Media On Communication, Jiake Han
School of Professional Studies
With the development of Internet, social media became more and more popular among people. Many industries realize the importance of social media in business. Traditionally, museum concentrates more on personal visual experience, which is hard to be replaced by online media. However, museums now also put more concentrate on social media platform because it expands the way of engagement. Especially, for Coronavirus, many organizations including museums have to close. Therefore, museums have to depend more on social media platforms to communicate with audiences. This research aims at finding how different kind of social media help museum communicate and engage with …
Cvs Covid-19 Screening Website: Test Automation, Savya Rawat
Cvs Covid-19 Screening Website: Test Automation, Savya Rawat
School of Professional Studies
CVS Pharmacy is an American retail corporation, also known as, and originally named, the Consumer Value Store owned by CVS Health, it is headquartered in Woonsocket, Rhode Island. CVS Pharmacy is currently the largest pharmacy chain in the United States by number of locations over 9,600 and total prescription revenue. CVS sells prescription drugs and a wide assortment of general merchandise, including over-the-counter drugs.
Now, coming to the reason why I have selected CVS pharmacy’s website cvs.com as my case study topic is because of CVS’s response to the covid-19 pandemic’s no-cost testing strategy. Whole of the world is suffering …
The Practical Applications Of Video Games Beyond Entertainment, Jack Martin
The Practical Applications Of Video Games Beyond Entertainment, Jack Martin
School of Professional Studies
Much of the attention directed toward video games is focused on their role as entertainment. However, researchers have found that video games can have other, more practical uses for society. This thesis is designed to examine three specific examples of the practical applications of video games: video games in education, video games as accessible technology, and the social uses of video games. This project is based on pre-existing research conducted by professionals studying the aforementioned subtopics. Anecdotal stories from educators, people with disabilities, and developers are also discussed. The thesis explores specific examples of video games being used practically, and …
Transparency And Yielding Of Law Officers Reform (Taylor) Act Of 2020: Proposal For Police Reform, Marwa Alnaal, Matthew L. Anderson, Hannah Brier, Mollie Campbell, Rose Wine
Transparency And Yielding Of Law Officers Reform (Taylor) Act Of 2020: Proposal For Police Reform, Marwa Alnaal, Matthew L. Anderson, Hannah Brier, Mollie Campbell, Rose Wine
School of Professional Studies
The Transparency and Yielding of Law Officers Reform Act of 2020 (TAYLOR) proposes an example bill for law enforcement reform. During the summer of 2020, the United States witnessed civilian demonstrations nationwide calling for a change to policing. Our proposal is hoping to heed that call, offering a foundation for change that police forces and localities across the United States can utilize to rebuild trust and accountability.
The goal of the TAYLOR Act is not to defund the police; but rather, TAYLOR rethinks the priorities of the police. There can be no denying that the relationship of trust and security …
Higher Education Responses To Crisis: A Case Study Of Clark University And The Pandemic Of 2020, Lisa Gillingham
Higher Education Responses To Crisis: A Case Study Of Clark University And The Pandemic Of 2020, Lisa Gillingham
School of Professional Studies
The COVID-19 pandemic has delivered an existential challenge to universities and other academic institutions at a time when they are already grappling with other weighty issues that may alter the fabric of higher education. COVID-19 has forced these institutions to consider and employ new ways of conducting its work with a sense urgency that is unprecedented in the recent history of the academy. The rate of learning around these models is rapid, and Higher Education is ripe for change.
Clark University has addressed the pandemic with a plan to protect and pivot using strategies that support the continuation of its …
An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles
An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles
James Madison Undergraduate Research Journal (JMURJ)
A smart city is an interconnection of technological components that store, process, and wirelessly transmit information to enhance the efficiency of applications and the individuals who use those applications. Over the course of the 21st century, it is expected that an overwhelming majority of the world’s population will live in urban areas and that the number of wireless devices will increase. The resulting increase in wireless data transmission means that the privacy of data will be increasingly at risk. This paper uses a holistic problem-solving approach to evaluate the security challenges posed by the technological components that make up a …
Coinwatch: A Clone-Based Approach For Detecting Vulnerabilities In Cryptocurrencies, Qingze Hum, Wei Jin Tan, Shi Ying Tey, Latasha Lenus, Ivan Homoliak, Yun Lin, Jun Sun
Coinwatch: A Clone-Based Approach For Detecting Vulnerabilities In Cryptocurrencies, Qingze Hum, Wei Jin Tan, Shi Ying Tey, Latasha Lenus, Ivan Homoliak, Yun Lin, Jun Sun
Research Collection School Of Computing and Information Systems
Cryptocurrencies have become very popular in recent years. Thousands of new cryptocurrencies have emerged, proposing new and novel techniques that improve on Bitcoin's core innovation of the blockchain data structure and consensus mechanism. However, cryptocurrencies are a major target for cyber-attacks, as they can be sold on exchanges anonymously and most cryptocurrencies have their codebases publicly available. One particular issue is the prevalence of code clones in cryptocurrencies, which may amplify security threats. If a vulnerability is found in one cryptocurrency, it might be propagated into other cloned cryptocurrencies. In this work, we propose a systematic remedy to this problem, …
Contingency Planning Amidst A Pandemic, Natalie C. Belford
Contingency Planning Amidst A Pandemic, Natalie C. Belford
KSU Proceedings on Cybersecurity Education, Research and Practice
Proper prior planning prevents pitifully poor performance: The purpose of this research is to address mitigation approaches - disaster recovery, contingency planning, and continuity planning - and their benefits as they relate to university operations during a worldwide pandemic predicated by the Novel Coronavirus (COVID-19). The most relevant approach pertaining to the University’s needs and its response to the Coronavirus pandemic will be determined and evaluated in detail.
Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, Chunsheng Xin
Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, Chunsheng Xin
KSU Proceedings on Cybersecurity Education, Research and Practice
Throughout the Internet, many chatbots have been deployed by various organizations to answer questions asked by customers. In recent years, we have been running cybersecurity summer camps for youth. Due to COVID-19, our in-person camp has been changed to virtual camps. As a result, we decided to develop a chatbot to reduce the number of emails, phone calls, as well as the human burden for answering the same or similar questions again and again based on questions we received from previous camps. This paper introduces our practical experience to implement an AI-powered chatbot for middle and high school cybersecurity camps …
A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad
A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad
KSU Proceedings on Cybersecurity Education, Research and Practice
Serious games can challenge users in competitive and entertaining ways. Educators have used serious games to increase student engagement in cybersecurity education. Serious games have been developed to teach students various cybersecurity topics such as safe online behavior, threats and attacks, malware, and more. They have been used in cybersecurity training and education at different levels. Serious games have targeted different audiences such as K-12 students, undergraduate and graduate students in academic institutions, and professionals in the cybersecurity workforce. In this paper, we provide a survey of serious games used in cybersecurity education and training. We categorize these games into …
Factors That Influence Hipaa Secure Compliance In Small And Medium-Size Health Care Facilities, Wlad Pierre-Francois, Indira Guzman
Factors That Influence Hipaa Secure Compliance In Small And Medium-Size Health Care Facilities, Wlad Pierre-Francois, Indira Guzman
KSU Proceedings on Cybersecurity Education, Research and Practice
This study extends the body of literature concerning security compliance by investigating the antecedents of HIPPA security compliance. A conceptual model, specifying a set of hypothesized relationships between management support, security awareness, security culture; security behavior, and risk of sanctions to address their effect on HIPAA security compliance is presented. This model was developed based on the review of the literature, Protection Motivation Theory, and General Deterrence Theory. Specifically, the aim of the study is to examine the mediating role of risk of sanctions on HIPAA security compliance.
Towards An Assessment Of Pause Periods On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci, Yair Levy, Martha Snyder, Laurie Dringus
Towards An Assessment Of Pause Periods On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci, Yair Levy, Martha Snyder, Laurie Dringus
KSU Proceedings on Cybersecurity Education, Research and Practice
Social engineering is the technique in which the attacker sends messages to build a relationship with the victim and convinces the victim to take some actions that lead to significant damages and losses. Industry and law enforcement reports indicate that social engineering incidents costs organizations billions of dollars. Phishing is the most pervasive social engineering attack. While email filtering and warning messages have been implemented for over three decades, organizations are constantly falling for phishing attacks. Prior research indicated that attackers use phishing emails to create an urgency and fear response in their victims causing them to use quick heuristics, …
Cyber-Assets At Risk (Car): Monetary Impact Of Personally Identifiable Information Data Breaches On Companies, Omer Ilker Poyraz
Cyber-Assets At Risk (Car): Monetary Impact Of Personally Identifiable Information Data Breaches On Companies, Omer Ilker Poyraz
Engineering Management & Systems Engineering Theses & Dissertations
Cyber-systems provide convenience, ubiquity, economic advantage, and higher efficiency to both individuals and organizations. However, vulnerabilities of the cyber domain also offer malicious actors with the opportunities to compromise the most sensitive information. Recent cybersecurity incidents show that a group of hackers can cause a massive data breach, resulting in companies losing competitive advantage, reputation, and money. Governments have since taken some actions in protecting individuals and companies from such crime by authorizing federal agencies and developing regulations. To protect the public from losing their most sensitive records, governments have also been compelling companies to follow cybersecurity regulations. If companies …
Email Data Breach Analysis And Prevention Using Hook And Eye System, Shubhankar Jayant Jathar
Email Data Breach Analysis And Prevention Using Hook And Eye System, Shubhankar Jayant Jathar
Electronic Theses, Projects, and Dissertations
Due to the recent COVID-19 outbreak, there were a lot of data leaks from the health sector. This project is about the increase in data breach incidents that are taking place. In this project, There is an analysis of different types of breaches that are found online and are practiced to steal valuable information. Talking about different aspects that lead to data breaches and which are the main sector or main epicenter for data leaks. The analysis tells that most of the data breaches are done using emails and to overcome this limitation a system has been designed that will …
Evaluating And Securing Text-Based Java Code Through Static Code Analysis, Jeong Yang, Young Lee, Amanda Fernandez, Joshua Sanchez
Evaluating And Securing Text-Based Java Code Through Static Code Analysis, Jeong Yang, Young Lee, Amanda Fernandez, Joshua Sanchez
Journal of Cybersecurity Education, Research and Practice
As the cyber security landscape dynamically evolves and security professionals work to keep apace, modern-day educators face the issue of equipping a new generation for this dynamic landscape. With cyber-attacks and vulnerabilities substantially increased over the past years in frequency and severity, it is important to design and build secure software applications from the group up. Therefore, defensive secure coding techniques covering security concepts must be taught from beginning computer science programming courses to exercise building secure applications. Using static analysis, this study thoroughly analyzed Java source code in two textbooks used at a collegiate level, with the goal of …
Malaware Defensive: A Game To Train Users To Combat Malware, Tyler Moon, Tamirat Abegaz, Bryson Payne, Abi Salimi
Malaware Defensive: A Game To Train Users To Combat Malware, Tyler Moon, Tamirat Abegaz, Bryson Payne, Abi Salimi
Journal of Cybersecurity Education, Research and Practice
Several research findings indicate that basic cyber hygiene can potentially deter the majority of cyber threats. One of the ways cybersecurity professionals can prepare users to ensure proper hygiene is to help them develop their ability to spot the difference between normal and abnormal behavior in a computer system. Malware disrupts the normal behavior of a computer system. The lack of appropriate user training has been one of the main reasons behind the exposure of computer systems to threats, from social engineering to viruses, trojans, and ransomware. Basic knowledge about common behavioral characteristics of malware could help users identify potentially …
Dallas, Tx: The Staggering Wealth Gap, Macy Golman
Dallas, Tx: The Staggering Wealth Gap, Macy Golman
School of Professional Studies
In the summer of 2019, I had the privilege of serving as an AmeriCorps member with an organization called Equal Heart. One of Equal Heart’s main initiatives was to provide meals to children in underserved populations, to make sure that without school in session, these children would still be receiving food. Unfortunately, in many instances, without these meals, many of the children we served would likely not know when they would be eating their next fulfilling meal. There were certain pockets of Dallas that we would travel to everyday, places that were fifteen minutes maximum from my house, but places …
Elder Isolation In Immigrant Communities, Jessica Da Silva
Elder Isolation In Immigrant Communities, Jessica Da Silva
School of Professional Studies
This paper examined loneliness, as a measurement of perceived social isolation, in older immigrant adults. Previous research shows that older adults are more likely to experience social isolation and loneliness. Both of which have a direct correlation with their overall health (Wilson & Molton, 2010, Cacioppo et al., 2002) and mortality rates (Holt-Lunstad et al, 2015). Another international study found that immigrants in particular are at a higher risk for experiencing loneliness (Government of Canada, 2018). In this study, 35 immigrants and non-immigrants participants answered a survey which included 20 questions from the UCLA Loneliness Scale Version 3 (Russel, 1996). …
Becoming A Trauma Informed Care Organization, Katie Robery
Becoming A Trauma Informed Care Organization, Katie Robery
School of Professional Studies
The Brockton Area Mutli Services Inc or BAMSI is a private, non-profit human services organization providing services to adults and children with developmental disabilities, mental illness, behavioral health, and public health needs. Founded in 1975, BAMSI is in the business of “bringing people and services together.” BAMSI transforms lives by building the capacity of individuals, families, organizations, and communities to learn, thrive, and achieve their goals. BAMSI services promote the recovery, resiliency, and self-determination of the people we serve. As a human services leader, we strive to be the provider of choice. (Duffy, 2019) With an emphasis on respect and …
Diversity And Inclusion In The Workplace; Benefits, Challenges And Strategies For Success, Margaret Leone
Diversity And Inclusion In The Workplace; Benefits, Challenges And Strategies For Success, Margaret Leone
School of Professional Studies
In this case study I have explored the topic of diversity and inclusion in the workplace and learned how it can transform a business. When D&I is a serious business strategy supported by senior management it can help recruit and retain top talent, increase profits, and unleash creativity among other benefits. It is important to have leadership that is inclusive so they can set the tone for their staff
This case study evaluates the D&I culture at The Children’s Study Home (CHS) and explores best practices for improvement. CHS is a non-profit human service agency in Western MA, that’s mission …
A Case Study On The Best Practices Of The Facilitating Organization For Peer Recovery Support Services In The State Of New Hampshire, Maggie Ringey
A Case Study On The Best Practices Of The Facilitating Organization For Peer Recovery Support Services In The State Of New Hampshire, Maggie Ringey
School of Professional Studies
In working with the Facilitating Organization for Peer Recovery Support Services through Harbor Homes, I have found that the Recovery Community Organizations that receive support through the FO provide valuable services that help individuals that struggle with substance use disorder achieve and maintain long term sobriety and recovery. The RCOs throughout New Hampshire bridge gaps in services and treatments that are left untouched by traditional clinical methods and through regular check ins, participants at the RCOs have reported that the services provided resulted in positive outcomes in their lives. Throughout the course of this research, I found that the RCOs …
Managing Burnout And Secondary Traumatic Stress In Human Service Organizations, Naomi Ingram
Managing Burnout And Secondary Traumatic Stress In Human Service Organizations, Naomi Ingram
School of Professional Studies
This Case Study explores how burnout and secondary traumatic stress impact staffing, service delivery, and organizational effectiveness in a human service agency. The Case Study is focused around Ascentria Care Alliance’s Children & Family Services in Massachusetts, which encompasses three foster care programs: the Unaccompanied Refugee Minor (URM), Division of Children’s Services (DCS), and Intensive Foster Care (IFC) programs. Both individual and organizational approaches are needed to most effectively address burnout and secondary traumatic stress. Individual workers need to build resilience factors such as self-compassion and mindfulness, set appropriate boundaries with clients, engage in ongoing training, support, consultation, and supervision, …
The Mental Health Of Black Men: Stabilizing Trauma With Emotional Intelligence, Davis Brandford
The Mental Health Of Black Men: Stabilizing Trauma With Emotional Intelligence, Davis Brandford
School of Professional Studies
The purpose of this study is to explore the relationship between the impact of historical trauma and barriers on African-American males and the effects of emotional intelligence in reducing traumatic experiences. This research study is based on previous research and studies that explores the historical review of African- American oppression, trauma in black males, and mental health in the African American community. This study will utilize the historical trauma and emotional intelligence theories to explore barriers that African Americans have experienced over time and the role emotional intelligence can play to reduce trauma. It also explores the relevance of historical …