Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 24 of 24

Full-Text Articles in Business

Automatic Speech Recognition For Air Traffic Control Using Convolutional Lstm, Sakshi Nakashe May 2024

Automatic Speech Recognition For Air Traffic Control Using Convolutional Lstm, Sakshi Nakashe

Electronic Theses, Projects, and Dissertations

The need for automatic speech recognition in air traffic control is critical as it enhances the interaction between the computer and human. Speech recognition helps to automatically transcribe the communication between the pilots and the air traffic controllers, which reduces the time taken for administrative tasks. This project aims to provide improvement to the Automatic Speech Recognition (ASR) system for air traffic control by investigating the impact of convolution LSTM model on ASR as suggested by previous studies. The research questions are: (Q1) Comparing the performance of ConvLSTM with other conventional models, how does ConvLSTM perform with respect to recognizing …


An Exploration Of Synergy Evaluation Application Model To Support Implementation On Merger And Acquisition, Jieping Mei May 2024

An Exploration Of Synergy Evaluation Application Model To Support Implementation On Merger And Acquisition, Jieping Mei

Electronic Theses, Projects, and Dissertations

ABSTRACT

The project focuses on a comprehensive system’s analysis and design of the front-end of the Synergy Evaluation Application Model (SEAM) system for mergers and acquisitions (M&As). The research questions asked are: Q1. How did the SEAM system incorporate the system requirements and design that incorporated the strategic goals and priorities of both the acquirer and the acquiree? Q2. What data sources will the SEAM system rely on, and how does it overcome data integration, automation, visualization challenges? Q3. How will the model identify build in potential synergies, both quantitative and qualitative? The research questions were analyzed through the SEAM …


Investigating The Potential Of Augmented Reality In Creating A Sense Of Place On College Campuses, Linda White May 2024

Investigating The Potential Of Augmented Reality In Creating A Sense Of Place On College Campuses, Linda White

Electronic Theses, Projects, and Dissertations

This project examines how designing an augmented reality (AR) campus navigation app can improve college students' sense of place and connection with California State University, San Bernardino (CSUSB). To guide the design of the app, I engaged in qualitative research using a curated campus walk protocol that invited students to walk to their favorite place on campus and record their walk while narrating it.

My analysis reveals the larger patterns that students use to select favorite places and favorite routes to those places, as well as how space navigation may lead to the formation of a sense of connection with …


Education As A Solution To Combat Rising Cybercrime Rates Against Children And Teenagers, Christian Javier Solis-Diaz Dec 2023

Education As A Solution To Combat Rising Cybercrime Rates Against Children And Teenagers, Christian Javier Solis-Diaz

Electronic Theses, Projects, and Dissertations

Ninety seven percent (97%) of people between the ages of 3 and 18 are found to be users of technology and internet services daily. This number also correlates with rising cyber crime rates against people in this age bracket. It is found that people between 3 and 18 years old are found to be technologically savvy but often lack the knowledge of how to protect themselves in online environments. Researchers have suggested that cybersecurity awareness training is an effective method at combating common forms of cyberattack such as social engineering. Social engineering attacks are found to make up 98% of …


Improving Credit Card Fraud Detection Using Transfer Learning And Data Resampling Techniques, Charmaine Eunice Mena Vinarta Dec 2023

Improving Credit Card Fraud Detection Using Transfer Learning And Data Resampling Techniques, Charmaine Eunice Mena Vinarta

Electronic Theses, Projects, and Dissertations

This Culminating Experience Project explores the use of machine learning algorithms to detect credit card fraud. The research questions are: Q1. What cross-domain techniques developed in other domains can be effectively adapted and applied to mitigate or eliminate credit card fraud, and how do these techniques compare in terms of fraud detection accuracy and efficiency? Q2. To what extent do synthetic data generation methods effectively mitigate the challenges posed by imbalanced datasets in credit card fraud detection, and how do these methods impact classification performance? Q3. To what extent can the combination of transfer learning and innovative data resampling techniques …


Early-Warning Prediction For Machine Failures In Automated Industries Using Advanced Machine Learning Techniques, Satnam Singh Dec 2023

Early-Warning Prediction For Machine Failures In Automated Industries Using Advanced Machine Learning Techniques, Satnam Singh

Electronic Theses, Projects, and Dissertations

This Culminating Experience Project explores the use of machine learning algorithms to detect machine failure. The research questions are: Q1) How does the quality of input data, including issues such as outliers, and noise, impact the accuracy and reliability of machine failure prediction models in industrial settings? Q2) How does the integration of SMOTE with feature engineering techniques influence the overall performance of machine learning models in detecting and preventing machine failures? Q3) What is the performance of different machine learning algorithms in predicting machine failures, and which algorithm is the most effective? The research findings are: Q1) Effective outlier …


A Systematic Literature Review Of Ransomware Attacks In Healthcare, Jasler Klien Adlaon May 2023

A Systematic Literature Review Of Ransomware Attacks In Healthcare, Jasler Klien Adlaon

Electronic Theses, Projects, and Dissertations

This culminating experience project conducted a Systematic Literature Review of ransomware in the healthcare industry. Due to COVID-19, there has been an increase in ransomware attacks that took healthcare by surprise. Although ransomware is a common attack, the current healthcare infrastructure and security mechanisms could not suppress these attacks. This project identifies peer-viewed literature to answer these research questions: “What current ransomware attacks are used in healthcare systems? “What ransomware attacks are likely to appear in the future?” and “What solutions or methods have been used to prepare, prevent, and recover from these attacks?” The purpose of this research is …


Healthcare Data Breaches: Analysis And Prevention, Nikita S. Dean May 2023

Healthcare Data Breaches: Analysis And Prevention, Nikita S. Dean

Electronic Theses, Projects, and Dissertations

It is evident that the healthcare sector continues to experience data breaches. This culminating experience project focuses on the need to maintain patient data privacy, minimize financial risks, and address public health concerns. The study examined data collected from U.S. Department of Health and Human Services from 2018 to 2023 to answer the following research questions: Q1. How many individuals are affected due to data breaches in healthcare & which States had the most affected individuals? Q2. What are the most common causes of healthcare data breaches & what measures can be taken to prevent this? and Q4. What are …


A Study Of Heart Disease Diagnosis Using Machine Learning And Data Mining, Intisar Ahmed Dec 2022

A Study Of Heart Disease Diagnosis Using Machine Learning And Data Mining, Intisar Ahmed

Electronic Theses, Projects, and Dissertations

Heart disease is the leading cause of death for people around the world today. Diagnosis for various forms of heart disease can be detected with numerous medical tests, however, predicting heart disease without such tests is very difficult. Machine learning can help process medical big data and provide hidden knowledge which otherwise would not be possible with the naked eye. The aim of this project is to explore how machine learning algorithms can be used in predicting heart disease by building an optimized model. The research questions are; 1) What Machine learning algorithms are used in the diagnosis of heart …


A Comparative Analysis Of Devices Via The Bluetooth Protocol In A Time Series Analysis, Joseph Vazquez May 2022

A Comparative Analysis Of Devices Via The Bluetooth Protocol In A Time Series Analysis, Joseph Vazquez

Electronic Theses, Projects, and Dissertations

The utilization of the Bluetooth protocol has provided many with the seamless transmission of data to multiple devices. Given its versatility and being an efficient process of connectivity, it has become one of the preferred methods of wireless connections. Despite this, an aspect of the Bluetooth function is still vulnerable to being exploited by having the data transmission stolen. This project answered the following questions: “How does one reduce the vulnerability by comparing normal and abnormal Bluetooth data?”, “How does one identify outlying variables within the data?” and “How can we improve the Bluetooth function?”. This project relied on previous …


Terms Of Service Agreement Contracts: An Overview Of Personal Risk Management And Recommendations For Enhancing User Awareness, Brenda Collazo Taylor May 2022

Terms Of Service Agreement Contracts: An Overview Of Personal Risk Management And Recommendations For Enhancing User Awareness, Brenda Collazo Taylor

Electronic Theses, Projects, and Dissertations

This cumulative project will explore the personal risks involved when a user agrees to an online service’s Terms of Service (TOS) Agreement contract, especially when a user checks the “I Agree” box on an online service’s TOS. The key questions were: (1) What are the personal risks involved when a user clicks on the “I Agree” box on an online service TOS Agreement? (2) How are these risks co-related? and (3) How can end users mitigate risks after they have agreed to the TOS? To answer the questions, various TOS agreements were reviewed, and a poll was conducted asking a …


A Study Of Social Engineering Concepts Within A Deceptive Defense, Jacob Glenn Oedekerk May 2022

A Study Of Social Engineering Concepts Within A Deceptive Defense, Jacob Glenn Oedekerk

Electronic Theses, Projects, and Dissertations

Organizations fall victim to costly attacks every year. This has created a need for more successful layers of defense. To aid in this need for additional defense, this study researches a way to bolster an underused defense style called deceptive defense. Researchers agree that deceptive defense could be the future of cybersecurity, and they call for more research in the deceptive category. The unresolved question from these researchers is what attack style could be used with a deception-based defense against an attacker. From this unresolved question, it was also determined that social engineering should be used in this culminating experience …


Cyber Security Vulnerability Assessment In Learning Management Systems, Mohammad Rabie Dec 2021

Cyber Security Vulnerability Assessment In Learning Management Systems, Mohammad Rabie

Electronic Theses, Projects, and Dissertations

With online learning becoming in high demand to deliver training and education during the COVID-19 pandemic, cybercriminals have more opportunities to take advantage of vulnerable Learning Management Systems to steal information like training materials, and students' private information, or they try to make easy money by deploying ransomware. Regardless of the cybercriminal motivation, the compromised system has consequences on the organization that affects it financially, legally, and reputationally. This requires the organization to invest in choosing the most secure LMS and apply the required security controls to avoid such consequences that may cost them much more than expected.

This project …


Phishing For All Ages, Rachana Vann Dec 2021

Phishing For All Ages, Rachana Vann

Electronic Theses, Projects, and Dissertations

Since the start of the pandemic in 2020 and the increase in teleworking, we have witnessed a subsequent increase in cyber-attacks. This project focused on the tools and techniques a teleworker should use to stay safe from online predators. An online predator or hacker is defined as someone who uses the internet to get access to proprietary information or seek a ransom. This project sought to introduce tools and techniques that would help people of all ages to stay safe online. The questions asked were: What techniques do online predators use to lure their unsuspecting victims? On the American Generation …


Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim Dec 2021

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim

Electronic Theses, Projects, and Dissertations

Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …


Evaluation Of Recommended Modular Email Building Approaches, Palak Sadhwani Dec 2021

Evaluation Of Recommended Modular Email Building Approaches, Palak Sadhwani

Electronic Theses, Projects, and Dissertations

Customer relationship management acts as the backbone of marketing. For any company marketing is the most important sector to promote a company and attract customers. Email marketing is one of the most effective ways of digital marketing. However, the cost of design and development is time consuming and redundant. Marketers and project managers are frequently unassertive about how to solve these issues. Although there are blogs, articles and services available for marketing email development, the lack of research in the effectiveness of email building architecture bolsters the need for this study. The project presents an architecture that modularizes the way …


Managing And Securing Endpoints: A Solution For A Telework Environment, David Adame Aug 2021

Managing And Securing Endpoints: A Solution For A Telework Environment, David Adame

Electronic Theses, Projects, and Dissertations

This project introduces a business problem in which a water utility company – known as H2O District – was forced to discover and implement a solution that would enable the IT Department to effectively manage and secure their endpoints in a telework environment. Typically, an endpoint is defined as any device that is physically connected to a network. For the purposes of this project, the endpoints that the IT Department was concerned with consisted of Windows 10 PC’s, Laptops, and Apple iOS devices that employees use to access company resources while working outside of the corporate network. To properly manage …


Privacy Is Infringed In Plain Sight And How To Dissapear, Zachary Taylor May 2021

Privacy Is Infringed In Plain Sight And How To Dissapear, Zachary Taylor

Electronic Theses, Projects, and Dissertations

This culminating project explored how Amazon, Apple, Facebook, Google, and Microsoft infringe on their user's information privacy. Focus was on tools and techniques one can use to strengthen their information privacy. Privacy or information privacy was defined as the right to have some control over how your personal information is collected and used. This project will also introduce a verity of open-source tools and techniques that would help the unsuspected user to maintain their privacy.The questions asked were: what are some common techniques that Amazon, Apple, Facebook, Google, or Microsoft use to gain personal information?, At what cost would it …


An Analysis Of Online Internships And Video Conferencing Security, Joshua Trapp May 2021

An Analysis Of Online Internships And Video Conferencing Security, Joshua Trapp

Electronic Theses, Projects, and Dissertations

This culminating experience project explored online internships and video conferencing security. The research questions asked focus on the effectiveness of online versus in-person internships, internship curriculum, third-party internships, video-conferencing applications and their security, advantages of micro-internships, and benefits of internships to all stakeholders. To answer these research questions, data was collected on the security and encryption of video conferencing, and a literature review was conducted using the following terms: Employment, Internship, Video, Video conferencing, Virtual, Online, Electronic, Technology, and Security. Key findings include: (1) Online internships can provide employers with a global pool of employable candidates with increased diversity. (2) …


Analysis Of Immigration Trends In The U.S. To Discover Patterns And Make Better Policy Decisions, Amita Tandon May 2021

Analysis Of Immigration Trends In The U.S. To Discover Patterns And Make Better Policy Decisions, Amita Tandon

Electronic Theses, Projects, and Dissertations

Immigration is one of the most hotly debated topics in the US. Merely taking a look at the types of immigrant and non-immigrant visas issued by the US government, one can realize the complexity of the law governing the numerous intricacies involved with the issue of immigration (Golash-Boza, 2009). With the ever-increasing population of immigrants in the US, a good understanding of immigration’s impact on the US society is more important than ever before. The objective of this project was to increase our understanding of immigration’s impact on the US society by investigating the general trends in Visa Applications, employers, …


Reshaping Organizational Processes And Workflows Through Integration Of Blockchain Technology, Elijah E. Maggini May 2021

Reshaping Organizational Processes And Workflows Through Integration Of Blockchain Technology, Elijah E. Maggini

Electronic Theses, Projects, and Dissertations

Cybercrime is becoming increasingly sophisticated and devastating as time carries on while many processes and workflows that exist within organizations are stagnant. This project analyzed Blockchain Technology as a use-case for building upon simple processes and workflows that are often overlooked within organizations for the purpose of hardening security and strengthening non-repudiation. This project examined three main questions relating to; how Blockchain can enhance traditional cyber security practices, how Blockchain can be introduced to organizations as a ground-breaking and worthwhile solution to countering cyber-attacks, and the benefits and risks of implementing Blockchain within an organization. An investigation of traditional cyber …


Creating Accountability And Increasing Efficiency By Implementing An It Service Management Solution, Priscilla Leon Jun 2020

Creating Accountability And Increasing Efficiency By Implementing An It Service Management Solution, Priscilla Leon

Electronic Theses, Projects, and Dissertations

Creating a culture that values accountability and efficiency is a difficult task for any organization. Without metrics or systems in place to help with these problems, the task becomes nearly impossible. The focus shifts from accountability to covering your tracks and decreased efficiency are usually blamed on external factors. In higher education, the problem is far more severe. Management leadership and staff are accountable to the stakeholders of higher education, such as the students, community, and faculty. A lack of accountability and a decrease in efficiency, in the Education Department, have led to a need for a technological solution that …


Implementing The Malcolm Baldrige Process For A Financial Institution: An Insiders Perspective, Scott Murray Mar 2020

Implementing The Malcolm Baldrige Process For A Financial Institution: An Insiders Perspective, Scott Murray

Electronic Theses, Projects, and Dissertations

The Malcolm Baldrige Framework for Performance Excellence outlines best practices for strategic and operational processes. Enterprises that achieve the award do so not for the award itself – but for the transformation that takes place along the way. Although the fifty-page summaries of Malcolm Baldrige award winning organizations are posted on the National Institute of Science and Technology (NIST) (https://www.nist.gov/baldrige/award-recipients), the process and effort used to create such applications has not been documented. This project documents and provides an internal perspective and lessons learned from the early stages of the Malcolm Baldrige journey for a medium size financial institution. The …


Sharepoint Design And Implementation - An Enterprise Architecture Solution, Zachary Mckellar Mar 2020

Sharepoint Design And Implementation - An Enterprise Architecture Solution, Zachary Mckellar

Electronic Theses, Projects, and Dissertations

Having a solid enterprise architecture foundation is critical to the success and growth of a business. Considering the volatility of many industries, businesses must consistently grow, innovate, and advance their technology to ensure high availability of their products and systems. Seeing that projects fail more than they succeed, it stresses the importance of having a strong enterprise architecture (Schneider, 2020). With this said, it is imperative that a business creates a proper collaborative environment to ensure that all future implementations and developments within their environments are successful. Without these foundations, an enterprise will fail to grow.

This project provides an …