Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- ETD (2)
- Cloud Computing (1)
- Cloud Firewalls (1)
- Cloud Networks (1)
- Cloud Security (1)
-
- Collaborative Advantage (1)
- Collaborative Relationships (1)
- Customer Base Complexity (1)
- Darknet (1)
- Data Visualization (1)
- Financial Performance (1)
- Hardware Firewalls (1)
- Interorganizational Information Systems (1)
- Logistics (1)
- Market Performance (1)
- Mobile Digital Forensics (1)
- Network Security (1)
- Operational Performance (1)
- Packet Classification (1)
- Packet Filtering (1)
- Relational Outcomes (1)
- Supply Base Complexity (1)
- Supply Chain (1)
- Supply Chain Information Technology (1)
- Supply Chain Management (1)
- Tableau (1)
Articles 1 - 4 of 4
Full-Text Articles in Business
Examining And Exposing The Darknet, Ton H. Don
Examining And Exposing The Darknet, Ton H. Don
Electronic Theses and Dissertations
This thesis consists of two studies; the first study is “Diving into the Darknet” and the second is “Exposing the Darknet on Mobile Devices”. The Darknet is a network of hidden sites and services which are built based on anonymity. In “Diving into the Darknet”, we applied different data science methods to establish the relationships between the data in the data set. This data set has information related to seller, drug types, and transactions. Additionally, we used Tableau to visualize the data set. For the second study, we took a digital forensics perspective of the Darknet. Orfox and Orbot, a …
Roles Of Information Technology In Supply Chain Management, Akhadian S. Harnowo
Roles Of Information Technology In Supply Chain Management, Akhadian S. Harnowo
Electronic Theses and Dissertations
Supply Chain Information Technology (SCIT) is a key enabler of effective supply chain management (SCM) activities. In 2013, $300 billion was spent on SCIT by firms globally, an increase by 1.8% and 3.8% compared to 2012 and 2011, respectively. With such significant investments, firms face risks of eroded financial performance if SCIT does not perform as expected. In fact, there is a mix of evidence with some firms benefiting from SCIT while others failing to benefit from investing in SCIT. Despite substantial research relating to utilizing information technology in a SCM context, the impact of SCIT on firm performance remains …
The Impact Of Cloud Computing In Supply Chain Collaborative Relationships, Collaborative Advantage And Relational Outcomes, Maria E. Aviles
The Impact Of Cloud Computing In Supply Chain Collaborative Relationships, Collaborative Advantage And Relational Outcomes, Maria E. Aviles
Electronic Theses and Dissertations
The purpose of this study is to explore the collaborative advantages and relational outcomes that organizations obtain from having strong collaborative relationships. With business competing as supply chains of multiple relationships, the reliance on inter-firm relationships has increased and become central strategy for organizations. Logistics computing technologies in the cloud may facilitate collaboration in the supply chain, although there are conflicting viewpoints regarding cloud viability. This study also evaluates the effect that cloud computing technology has on collaborative advantage and relational outcomes in small and large organizations. The model developed here is based on a cross-disciplinary theoretical perspective, which combines …
A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr
A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr
Electronic Theses and Dissertations
The rapid expansion in networking has provided tremendous opportunities to access an unparalleled amount of information. Everyone connects to a network to gain access and to share this information. However when someone connects to a public network, his private network and information becomes vulnerable to hackers and all kinds of security threats. Today, all networks needs to be secured, and one of the best security policies is firewall implementation.
Firewalls can be hardware or cloud based. Hardware based firewalls offer the advantage of faster response time, whereas cloud based firewalls are more flexible. In reality the best form of firewall …