Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 38

Full-Text Articles in Entire DC Network

Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder Oct 2017

Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder

KSU Proceedings on Cybersecurity Education, Research and Practice

Millions of people willingly expose their lives via Internet technologies every day, and even those who stay off the Internet find themselves exposed through data breaches. Trillions of private information records flow through the Internet. Marketers gather personal preferences to coerce shopping behavior, while providers gather personal information to provide enhanced services. Few users have considered where their information is going or who has access to it. Even fewer are aware of how decisions made in their own lives expose significant pieces of information, which can be used to harm the very organizations they are affiliated with by cyber attackers. …


A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi Oct 2017

A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi

KSU Proceedings on Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


Experiments With Applying Artificial Immune System In Network Attack Detection, Alexis Cooper Oct 2017

Experiments With Applying Artificial Immune System In Network Attack Detection, Alexis Cooper

KSU Proceedings on Cybersecurity Education, Research and Practice

The assurance of security within a network is difficult due to the variations of attacks. This research conducts various experiments to implement an Artificial Immune System based Intrusion Detection System to identify intrusions using the Negative Selection Algorithm. This research explores the implementation of an Artificial Immune System opposed to the industry standard of machine learning. Various experiments were conducted to identify a method to separate data to avoid false-positive results. The use of an Artificial Immune System requires a self and nonself classification to determine if an intrusion is present within the network. The results of an Artificial Immune …


Reducing Human Error In Cyber Security Using The Human Factors Analysis Classification System (Hfacs)., Tommy Pollock Oct 2017

Reducing Human Error In Cyber Security Using The Human Factors Analysis Classification System (Hfacs)., Tommy Pollock

KSU Proceedings on Cybersecurity Education, Research and Practice

For several decades, researchers have stated that human error is a significant cause of information security breaches, yet it still remains to be a major issue today. Quantifying the effects of security incidents is often a difficult task because studies often understate or overstate the costs involved. Human error has always been a cause of failure in many industries and professions that is overlooked or ignored as an inevitability. The problem with human error is further exacerbated by the fact that the systems that are set up to keep networks secure are managed by humans. There are several causes of …


A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard Nilsen, Yair Levy, Steven Terrell, Dawn Beyer Oct 2017

A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard Nilsen, Yair Levy, Steven Terrell, Dawn Beyer

KSU Proceedings on Cybersecurity Education, Research and Practice

Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and …


Voice Hacking Proof Of Concept: Using Smartphones To Spread Ransomware To Traditional Pcs, Leonardo I. Mazuran, Bryson R. Payne, Tamirat T. Abegaz Oct 2017

Voice Hacking Proof Of Concept: Using Smartphones To Spread Ransomware To Traditional Pcs, Leonardo I. Mazuran, Bryson R. Payne, Tamirat T. Abegaz

KSU Proceedings on Cybersecurity Education, Research and Practice

This paper presents a working proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue exploit, spreading …


Security Device Roles, Vabrice Wilder Oct 2017

Security Device Roles, Vabrice Wilder

KSU Proceedings on Cybersecurity Education, Research and Practice

“An abstract of this article was published in the proceedings of the Conference on Cybersecurity Education, Research & Practice, 2017”. Communication has evolved since the beginning of mankind from smoke signals to drones to now the internet. In a world filled with technology the security of one’s device is not to be taken for granted. A series of research was done in order to gather details about network devices that can aid in the protection of one’s information while being transferred through the internet. The findings included but not limited to, switches, the seven layers of OSI, routers, firewalls, load …


Analyzing Http Requests For Web Intrusion Detection, Sara Althubiti, Xiaohong Yuan, Albert Esterline Oct 2017

Analyzing Http Requests For Web Intrusion Detection, Sara Althubiti, Xiaohong Yuan, Albert Esterline

KSU Proceedings on Cybersecurity Education, Research and Practice

Many web application security problems related to intrusion have resulted from the rapid development of web applications. To reduce the risk of web application problems, web application developers need to take measures to write secure applications to prevent known attacks. When such measures fail, it is important to detect such attacks and find the source of the attacks to reduce the estimated risks. Intrusion detection is one of the powerful techniques designed to identify and prevent harm to the system. Most defensive techniques in Web Intrusion Systems are not able to deal with the complexity of cyber-attacks in web applications. …


"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Secuity Awareness Campaign, Rachael Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky Jenkins Oct 2017

"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Secuity Awareness Campaign, Rachael Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky Jenkins

KSU Proceedings on Cybersecurity Education, Research and Practice

This article discusses the lessons learned after implementing a successful university-wide cyber security campaign. The Cyber Security Awareness Committee (CyberSAC), a group comprised of diverse units across campus, collaborated together on resources, talent, people, equipment, technology, and assessment practices to meet strategic goals for cyber safety and education. The project involves assessing student learning and behavior changes after participating in a Cyber Security Password Awareness event that was run as a year-long campaign targeting undergraduate students. The results have implications for planning and implementing university-wide initiatives in the field of cyber security, and more broadly, higher education at large.


Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang Oct 2017

Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang

KSU Proceedings on Cybersecurity Education, Research and Practice

Since web browsers have become essential to accomplishing everyday tasks, developing secure web applications has become a priority in order to protect user data, corporate databases and critical infrastructure against cyber-crimes . This research presents a game-like (gamification) approach to teach key concepts and skills on how to develop secure web applications. Gamification draws on motivational models, one of psychological theories. Gamification design has great potential over traditional education where we often find students demotivated and lecturers failing to engage them in learning activities. This research created game-like learning modules to teach top vulnerabilities and countermeasures for these top vulnerabilities …


Sports Team’S Well-Being: An Integrative Perspective Of The Role Of Conflict And Emotional Intelligence On Trust And Happiness, Drew Sannes, Wooyang Kim Sep 2017

Sports Team’S Well-Being: An Integrative Perspective Of The Role Of Conflict And Emotional Intelligence On Trust And Happiness, Drew Sannes, Wooyang Kim

Atlantic Marketing Association Proceedings

No abstract provided.


Sponsorship-Linked Marketing: Using Social Media Brand Affinity Data To Determine Sport Sponsorship Effectiveness, Daniel White, Corey White, Darin White Sep 2017

Sponsorship-Linked Marketing: Using Social Media Brand Affinity Data To Determine Sport Sponsorship Effectiveness, Daniel White, Corey White, Darin White

Atlantic Marketing Association Proceedings

No abstract provided.


Using A Social Machine For Promotional Marketing On Campus: A Case Study, Matt Hettche, Caleb Tupper, Connor Rooney Sep 2017

Using A Social Machine For Promotional Marketing On Campus: A Case Study, Matt Hettche, Caleb Tupper, Connor Rooney

Atlantic Marketing Association Proceedings

No abstract provided.


Understanding How To Make Literature Reviews Easier For Business Scholars, Cathleen S. Jones Dr., Jacqueline C. Klentzin Sep 2017

Understanding How To Make Literature Reviews Easier For Business Scholars, Cathleen S. Jones Dr., Jacqueline C. Klentzin

Atlantic Marketing Association Proceedings

No abstract provided.


Emotional Exhaustion And Its Role In Service Sabotage Among Retail Sales Employees, Diane R. Edmondson, Lucy Matthews, Cheryl Ward Sep 2017

Emotional Exhaustion And Its Role In Service Sabotage Among Retail Sales Employees, Diane R. Edmondson, Lucy Matthews, Cheryl Ward

Atlantic Marketing Association Proceedings

No abstract provided.


Buyer-Seller Communications: Constructs And Measurement, Stephen C. Carlson Sep 2017

Buyer-Seller Communications: Constructs And Measurement, Stephen C. Carlson

Atlantic Marketing Association Proceedings

No abstract provided.


Marketing With Art: How Artists Benefit From Marketing, Pj Forrest, William Piper Sep 2017

Marketing With Art: How Artists Benefit From Marketing, Pj Forrest, William Piper

Atlantic Marketing Association Proceedings

No abstract provided.


Marketing Automation Risk Assessment: A Systematic Review, William R. Benz, Thomas Tanner Sep 2017

Marketing Automation Risk Assessment: A Systematic Review, William R. Benz, Thomas Tanner

Atlantic Marketing Association Proceedings

No abstract provided.


Ethnic Diversity, Decision Making Processes And The Marketing Environment, Thomas Tanner, Heather Kirkwood Sep 2017

Ethnic Diversity, Decision Making Processes And The Marketing Environment, Thomas Tanner, Heather Kirkwood

Atlantic Marketing Association Proceedings

No abstract provided.


Leadership In A Knowledge Economy: Building An Innovative Marketing And Branding Organization, Sonia Lambert, Myles Bassell, Hershey H. Friedman Sep 2017

Leadership In A Knowledge Economy: Building An Innovative Marketing And Branding Organization, Sonia Lambert, Myles Bassell, Hershey H. Friedman

Atlantic Marketing Association Proceedings

No abstract provided.


College Student Financial Literacy And Credit Card Usage: Have Either Knowledge Or Behaviors Improved?, Elizabeth C. Alexander, Deanna Mader Sep 2017

College Student Financial Literacy And Credit Card Usage: Have Either Knowledge Or Behaviors Improved?, Elizabeth C. Alexander, Deanna Mader

Atlantic Marketing Association Proceedings

No abstract provided.


Student Self-Assessment Of Job Interview Skills: The Need For Coaching In Marketing Education, Michael A. Jones, George W. Stone Sep 2017

Student Self-Assessment Of Job Interview Skills: The Need For Coaching In Marketing Education, Michael A. Jones, George W. Stone

Atlantic Marketing Association Proceedings

No abstract provided.


Native And Non-Native Advertising On Facebook: A Content Analysis, Cynthia B. Hanson Sep 2017

Native And Non-Native Advertising On Facebook: A Content Analysis, Cynthia B. Hanson

Atlantic Marketing Association Proceedings

No abstract provided.


Using Digital Content Marketing To Build The College Brand: Leveraging A Content-Rich Website Into A Distinctive University Brand, Julie M. Pharr Sep 2017

Using Digital Content Marketing To Build The College Brand: Leveraging A Content-Rich Website Into A Distinctive University Brand, Julie M. Pharr

Atlantic Marketing Association Proceedings

No abstract provided.


Who Are The Centennials: Marketing Implications Of Social Media Use And Preferences, Sue Y. Mcgorry, Meghan R. Mcgorry Sep 2017

Who Are The Centennials: Marketing Implications Of Social Media Use And Preferences, Sue Y. Mcgorry, Meghan R. Mcgorry

Atlantic Marketing Association Proceedings

No abstract provided.


The Role Of Social Media And Social Networking As Marketing Delivery Systems For Preventive Health Care Information, Joseph D. Cangelosi, David Kim, Ken Griffin, Edward Ranelli Sep 2017

The Role Of Social Media And Social Networking As Marketing Delivery Systems For Preventive Health Care Information, Joseph D. Cangelosi, David Kim, Ken Griffin, Edward Ranelli

Atlantic Marketing Association Proceedings

No abstract provided.


There’S No Such Thing As A Free Lunch: The Inherently Flawed Relationship Between Physicians And Pharmaceutical Companies’ Gifts, David P. Paul Iii Sep 2017

There’S No Such Thing As A Free Lunch: The Inherently Flawed Relationship Between Physicians And Pharmaceutical Companies’ Gifts, David P. Paul Iii

Atlantic Marketing Association Proceedings

No abstract provided.


The Use Of Business Intelligence To Market The Sustainability Of "Unique Products", Dennis F. X. Mathaisel, Clare L. Comm Sep 2017

The Use Of Business Intelligence To Market The Sustainability Of "Unique Products", Dennis F. X. Mathaisel, Clare L. Comm

Atlantic Marketing Association Proceedings

No abstract provided.


A Look At Religious Tourism Marketing: What Do Consumers Prefer?, Sally Sledge Sep 2017

A Look At Religious Tourism Marketing: What Do Consumers Prefer?, Sally Sledge

Atlantic Marketing Association Proceedings

No abstract provided.


Foreign Direct Investment Within The Southeastern United States: Micropolitan Statistical Areas And The Labor Force, W. Frank Thompson Jr. Sep 2017

Foreign Direct Investment Within The Southeastern United States: Micropolitan Statistical Areas And The Labor Force, W. Frank Thompson Jr.

Atlantic Marketing Association Proceedings

No abstract provided.