Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Aerospace industry (1)
- Automobile insurance fraud (1)
- Collaborative robot (1)
- Curriculum development (1)
- Cybersecurity (1)
-
- DACUM (1)
- Data mining (1)
- Decision tree (1)
- Exoskeleton (1)
- Human (1)
- Information assurance (1)
- Information security (1)
- Information systems (1)
- Information systems security (1)
- Job analysis (1)
- Maritime transportation (1)
- Navigation (1)
- Neural network (1)
- Partial least squares (1)
- Predictive analysis (1)
- SAS Enterprise Miner (1)
- Satellites (1)
- Special Operations Forces (1)
- Supply chains (1)
- Technology Acceptance Model (TAM) (1)
- Wearable support systems (1)
Articles 1 - 5 of 5
Full-Text Articles in Business
Cross Domain Iw Threats To Sof Maritime Missions: Implications For U.S. Sof, Gary C. Kessler, Diane M. Zorri
Cross Domain Iw Threats To Sof Maritime Missions: Implications For U.S. Sof, Gary C. Kessler, Diane M. Zorri
Publications
As cyber vulnerabilities proliferate with the expansion of connected devices, wherein security is often forsaken for ease of use, Special Operations Forces (SOF) cannot escape the obvious, massive risk that they are assuming by incorporating emerging technologies into their toolkits. This is especially true in the maritime sector where SOF operates nearshore in littoral zones. As SOF—in support to the U.S. Navy— increasingly operate in these contested maritime environments, they will gradually encounter more hostile actors looking to exploit digital vulnerabilities. As such, this monograph comes at a perfect time as the world becomes more interconnected but also more vulnerable.
Alpha Insurance: A Predictive Analytics Case To Analyze Automobile Insurance Fraud Using Sas Enterprise Miner (Tm), Richard Mccarthy, Wendy Ceccucci, Mary Mccarthy, Leila Halawi
Alpha Insurance: A Predictive Analytics Case To Analyze Automobile Insurance Fraud Using Sas Enterprise Miner (Tm), Richard Mccarthy, Wendy Ceccucci, Mary Mccarthy, Leila Halawi
Publications
Automobile Insurance fraud costs the insurance industry billions of dollars annually. This case study addresses claim fraud based on data extracted from Alpha Insurance’s automobile claim database. Students are provided the business problem and data sets. Initially, the students are required to develop their hypotheses and analyze the data. This includes identification of any missing or inaccurate data values and outliers as well as evaluation of the 22 variables. Next students will develop and optimize their predictive models using five techniques: regression, decision tree, neural network, gradient boosting, and ensemble. Then students will determine which model is the best fit …
Magic Triangle – Human, Exoskeleton, And Collaborative Robot Scenario, R. A. Goehlich, M. H. Rutsch, I. Krohne
Magic Triangle – Human, Exoskeleton, And Collaborative Robot Scenario, R. A. Goehlich, M. H. Rutsch, I. Krohne
Publications
The incidence of musculoskeletal disorders in workplaces with difficult ergonomic conditions is increasing. Today, there is a growing market for technical support systems that avoid repetitive strain on the musculoskeletal system. We have been observing two (parallel) lines of development: on the one hand, the development of exoskeletons supporting shop floor operators and, on the other hand, the development of collaborative robots for the creation of hybrid teams. The focus of our research is the combined application of exoskeletons AND collaborative robots for shop floor operators in the aerospace industry. Our approach is to analyze various scenarios to understand which …
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
Publications
Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …
Utilizing The Technology Acceptance Model To Assess The Employee Adoption Of Information Systems Security Measures, Cynthia M. Jones, Richard V. Mccarthy, Leila Halawi, Bahaudin Mujtaba
Utilizing The Technology Acceptance Model To Assess The Employee Adoption Of Information Systems Security Measures, Cynthia M. Jones, Richard V. Mccarthy, Leila Halawi, Bahaudin Mujtaba
Publications
In this study, the factors that affect employee acceptance of information systems security measures were examined by extending the Technology Acceptance Model. Partial least squares structural equation modeling was applied to examine these factors. 174 valid responses from employees from companies in various industry segments in the United States and Canada were analyzed. The results of the statistical analysis indicate that subjective norm moderated by management support showed the strongest effect on intention to use information systems security measures.