Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Business

Can You Hack It? Validating Predictors For It Boot Camps, Courtney Gear Jan 2016

Can You Hack It? Validating Predictors For It Boot Camps, Courtney Gear

All Graduate Theses, Dissertations, and Other Capstone Projects

Given the large number of information technology jobs open and lack of qualified individuals to fill them, coding boot camps have sprung up in response to this skill gap by offering a specialized training program in an accelerated format. This fast growth has created a need to measure these training programs and understand their effectiveness. In the present study, a series of analyses examined whether specific or combinations of predictors were valid for training performance in this coding academy. Self-rated, daily efficacy scores were used as outcome variables of training success and correlation results showed a positive relationship with efficacy …


Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar Dec 2015

Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar

Maurice Dawson

Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …