Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Business

Cyber Security Vulnerability Assessment In Learning Management Systems, Mohammad Rabie Dec 2021

Cyber Security Vulnerability Assessment In Learning Management Systems, Mohammad Rabie

Electronic Theses, Projects, and Dissertations

With online learning becoming in high demand to deliver training and education during the COVID-19 pandemic, cybercriminals have more opportunities to take advantage of vulnerable Learning Management Systems to steal information like training materials, and students' private information, or they try to make easy money by deploying ransomware. Regardless of the cybercriminal motivation, the compromised system has consequences on the organization that affects it financially, legally, and reputationally. This requires the organization to invest in choosing the most secure LMS and apply the required security controls to avoid such consequences that may cost them much more than expected.

This project …


Phishing For All Ages, Rachana Vann Dec 2021

Phishing For All Ages, Rachana Vann

Electronic Theses, Projects, and Dissertations

Since the start of the pandemic in 2020 and the increase in teleworking, we have witnessed a subsequent increase in cyber-attacks. This project focused on the tools and techniques a teleworker should use to stay safe from online predators. An online predator or hacker is defined as someone who uses the internet to get access to proprietary information or seek a ransom. This project sought to introduce tools and techniques that would help people of all ages to stay safe online. The questions asked were: What techniques do online predators use to lure their unsuspecting victims? On the American Generation …


Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim Dec 2021

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim

Electronic Theses, Projects, and Dissertations

Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …


Evaluation Of Recommended Modular Email Building Approaches, Palak Sadhwani Dec 2021

Evaluation Of Recommended Modular Email Building Approaches, Palak Sadhwani

Electronic Theses, Projects, and Dissertations

Customer relationship management acts as the backbone of marketing. For any company marketing is the most important sector to promote a company and attract customers. Email marketing is one of the most effective ways of digital marketing. However, the cost of design and development is time consuming and redundant. Marketers and project managers are frequently unassertive about how to solve these issues. Although there are blogs, articles and services available for marketing email development, the lack of research in the effectiveness of email building architecture bolsters the need for this study. The project presents an architecture that modularizes the way …


Managing And Securing Endpoints: A Solution For A Telework Environment, David Adame Aug 2021

Managing And Securing Endpoints: A Solution For A Telework Environment, David Adame

Electronic Theses, Projects, and Dissertations

This project introduces a business problem in which a water utility company – known as H2O District – was forced to discover and implement a solution that would enable the IT Department to effectively manage and secure their endpoints in a telework environment. Typically, an endpoint is defined as any device that is physically connected to a network. For the purposes of this project, the endpoints that the IT Department was concerned with consisted of Windows 10 PC’s, Laptops, and Apple iOS devices that employees use to access company resources while working outside of the corporate network. To properly manage …


Privacy Is Infringed In Plain Sight And How To Dissapear, Zachary Taylor May 2021

Privacy Is Infringed In Plain Sight And How To Dissapear, Zachary Taylor

Electronic Theses, Projects, and Dissertations

This culminating project explored how Amazon, Apple, Facebook, Google, and Microsoft infringe on their user's information privacy. Focus was on tools and techniques one can use to strengthen their information privacy. Privacy or information privacy was defined as the right to have some control over how your personal information is collected and used. This project will also introduce a verity of open-source tools and techniques that would help the unsuspected user to maintain their privacy.The questions asked were: what are some common techniques that Amazon, Apple, Facebook, Google, or Microsoft use to gain personal information?, At what cost would it …


An Analysis Of Online Internships And Video Conferencing Security, Joshua Trapp May 2021

An Analysis Of Online Internships And Video Conferencing Security, Joshua Trapp

Electronic Theses, Projects, and Dissertations

This culminating experience project explored online internships and video conferencing security. The research questions asked focus on the effectiveness of online versus in-person internships, internship curriculum, third-party internships, video-conferencing applications and their security, advantages of micro-internships, and benefits of internships to all stakeholders. To answer these research questions, data was collected on the security and encryption of video conferencing, and a literature review was conducted using the following terms: Employment, Internship, Video, Video conferencing, Virtual, Online, Electronic, Technology, and Security. Key findings include: (1) Online internships can provide employers with a global pool of employable candidates with increased diversity. (2) …


Analysis Of Immigration Trends In The U.S. To Discover Patterns And Make Better Policy Decisions, Amita Tandon May 2021

Analysis Of Immigration Trends In The U.S. To Discover Patterns And Make Better Policy Decisions, Amita Tandon

Electronic Theses, Projects, and Dissertations

Immigration is one of the most hotly debated topics in the US. Merely taking a look at the types of immigrant and non-immigrant visas issued by the US government, one can realize the complexity of the law governing the numerous intricacies involved with the issue of immigration (Golash-Boza, 2009). With the ever-increasing population of immigrants in the US, a good understanding of immigration’s impact on the US society is more important than ever before. The objective of this project was to increase our understanding of immigration’s impact on the US society by investigating the general trends in Visa Applications, employers, …


Reshaping Organizational Processes And Workflows Through Integration Of Blockchain Technology, Elijah E. Maggini May 2021

Reshaping Organizational Processes And Workflows Through Integration Of Blockchain Technology, Elijah E. Maggini

Electronic Theses, Projects, and Dissertations

Cybercrime is becoming increasingly sophisticated and devastating as time carries on while many processes and workflows that exist within organizations are stagnant. This project analyzed Blockchain Technology as a use-case for building upon simple processes and workflows that are often overlooked within organizations for the purpose of hardening security and strengthening non-repudiation. This project examined three main questions relating to; how Blockchain can enhance traditional cyber security practices, how Blockchain can be introduced to organizations as a ground-breaking and worthwhile solution to countering cyber-attacks, and the benefits and risks of implementing Blockchain within an organization. An investigation of traditional cyber …