Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Electronic funds transfers (3)
- Web sites Design (3)
- Web sites Design. (3)
- Computer networks Security measures (2)
- Computer security (2)
-
- Cyberterrorism Prevention (2)
- Data mining (2)
- Information technology Management (2)
- Privacy (2)
- Security systems. (2)
- Accident (1)
- Agent-based Modeling (ABM) (1)
- Air travel (1)
- Air travel United States (1)
- Airlines Rates (1)
- Airlines Reservation systems (1)
- Airlines Reservation systems United States (1)
- Application software -- Development (1)
- Application software Development Evaluation (1)
- Artificial Intelligence/Machine Learning (1)
- BPMN notation (1)
- Banks and banking -- Automation (1)
- Blockchain (1)
- Business -- Data processing (1)
- Business Analytics (1)
- Business Data processing (1)
- Business Data processing Security measures (1)
- Business enterprises Computer networks Security measures Auditing (1)
- CMS (1)
- CRM banking (1)
- Publication Year
- Publication
- Publication Type
Articles 1 - 21 of 21
Full-Text Articles in Business
Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim
Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim
Electronic Theses, Projects, and Dissertations
Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …
Integration Of Internet Of Things And Health Recommender Systems, Moonkyung Yang
Integration Of Internet Of Things And Health Recommender Systems, Moonkyung Yang
Electronic Theses, Projects, and Dissertations
The Internet of Things (IoT) has become a part of our lives and has provided many enhancements to day-to-day living. In this project, IoT in healthcare is reviewed. IoT-based healthcare is utilized in remote health monitoring, observing chronic diseases, individual fitness programs, helping the elderly, and many other healthcare fields. There are three main architectures of smart IoT healthcare: Three-Layer Architecture, Service-Oriented Based Architecture (SoA), and The Middleware-Based IoT Architecture. Depending on the required services, different IoT architecture are being used. In addition, IoT healthcare services, IoT healthcare service enablers, IoT healthcare applications, and IoT healthcare services focusing on Smartwatch …
Privacy Is Infringed In Plain Sight And How To Dissapear, Zachary Taylor
Privacy Is Infringed In Plain Sight And How To Dissapear, Zachary Taylor
Electronic Theses, Projects, and Dissertations
This culminating project explored how Amazon, Apple, Facebook, Google, and Microsoft infringe on their user's information privacy. Focus was on tools and techniques one can use to strengthen their information privacy. Privacy or information privacy was defined as the right to have some control over how your personal information is collected and used. This project will also introduce a verity of open-source tools and techniques that would help the unsuspected user to maintain their privacy.The questions asked were: what are some common techniques that Amazon, Apple, Facebook, Google, or Microsoft use to gain personal information?, At what cost would it …
Email Data Breach Analysis And Prevention Using Hook And Eye System, Shubhankar Jayant Jathar
Email Data Breach Analysis And Prevention Using Hook And Eye System, Shubhankar Jayant Jathar
Electronic Theses, Projects, and Dissertations
Due to the recent COVID-19 outbreak, there were a lot of data leaks from the health sector. This project is about the increase in data breach incidents that are taking place. In this project, There is an analysis of different types of breaches that are found online and are practiced to steal valuable information. Talking about different aspects that lead to data breaches and which are the main sector or main epicenter for data leaks. The analysis tells that most of the data breaches are done using emails and to overcome this limitation a system has been designed that will …
Quantum Computing: Principles And Applications, Yoshito Kanamori, Seong-Moo Yoo
Quantum Computing: Principles And Applications, Yoshito Kanamori, Seong-Moo Yoo
Journal of International Technology and Information Management
The development of quantum computers over the past few years is probably one of the significant advancements in the history of quantum computing. D-Wave quantum computer has been available for more than eight years. IBM has made its quantum computer accessible via its cloud service. Also, Microsoft, Google, Intel, and NASA have been heavily investing in the development of quantum computers and their applications. The quantum computer seems to be no longer just for physicists and computer scientists but also for information system researchers. This paper introduces the basic concepts of quantum computing and describes well-known quantum applications for non-physicists. …
Identifying Relationships Of Interest In Complex Environments By Using Channel Theory, Andreas Bildstein, Junkang Feng
Identifying Relationships Of Interest In Complex Environments By Using Channel Theory, Andreas Bildstein, Junkang Feng
Communications of the IIMA
Complex environments show a high degree of dynamics caused by vital interactions between objects within those environments and alterations through which the set of objects and their characteristics within those environments go over time. Within this work, we show that we can tame the level of complexity in dynamic environments by identifying ‘relationships of interest’ between objects in such environments. To this end, we apply the theory of Information Flow, also known as Channel Theory, to the application area of smart manufacturing. We enhance the way how the Channel Theory has been applied so far by using an …
Agent-Based Modeling And Simulation Approaches In Stem Education Research, Shanna R. Simpson-Singleton, Xiangdong Che
Agent-Based Modeling And Simulation Approaches In Stem Education Research, Shanna R. Simpson-Singleton, Xiangdong Che
Journal of International Technology and Information Management
The development of best practices that deliver quality STEM education to all students, while minimizing achievement gaps, have been solicited by several national agencies. ABMS is a feasible approach to provide insight into global behavior based upon the interactions amongst agents and environments. In this review, we systematically surveyed several modeling and simulation approaches and discussed their applications to the evaluation of relevant theories in STEM education. It was found that ABMS is optimal to simulate STEM education hypotheses, as ABMS will sensibly present emergent theories and causation in STEM education phenomena if the model is properly validated and calibrated.
Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr
Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr
Journal of International Technology and Information Management
The discovery of useful or worthwhile process models must be performed with due regards to the transformation that needs to be achieved. The blend of the data representations (i.e data mining) and process modelling methods, often allied to the field of Process Mining (PM), has proven to be effective in the process analysis of the event logs readily available in many organisations information systems. Moreover, the Process Discovery has been lately seen as the most important and most visible intellectual challenge related to the process mining. The method involves automatic construction of process models from event logs about any domain …
Developing Focused Auditing Tools: A Practical Framework For Creating Formalized Multi-Level Security Policy Specifications, Barbara Ann Brough
Developing Focused Auditing Tools: A Practical Framework For Creating Formalized Multi-Level Security Policy Specifications, Barbara Ann Brough
Theses Digitization Project
The purpose of this study is that formalized policy specifications and focused penetration testing are needed to effectively audit any information system. Designing and maintaining the security system information is the primary duty of the cyber security professional. In today's world, nearly all government agencies manage some form of financial, defense, national security, and/or privacy information security policies. It is also necessary in this environment that agencies are accountable for auditing the security systems that protect this information.
The Implementation Of A Thin Client In The Department Of Defense Network System, Sung Ju In
The Implementation Of A Thin Client In The Department Of Defense Network System, Sung Ju In
Theses Digitization Project
The purpose of this project is to introduce and analyze a thin client solution that could enhance the overall Department of Defense (DoD) network system as well as its IT security posture, minimize risk from external threats, and ease of network operations.
Queuepay.Com: Building A System For Cardholders' Transaction Security, Jose Ramon Gonzalez
Queuepay.Com: Building A System For Cardholders' Transaction Security, Jose Ramon Gonzalez
Theses Digitization Project
The purpose of this project was to apply the skills learned in the MBA program to help develop a solution to a problem that costs billions of dollars every year in fraudulent related losses arising from the use of payment cards such as debit cards, credit cards, charge cards or prepaid cards. The project analyzes the industry of payment cards, the emergence of the problem, and builds a prototype that addresses the problem. Queuepay.com is designed to provide services to its cardholders that will significantly reduce the risk of fraud.
Online Privacy Policy Of The Thirty Dow Jones Corporations: Compliance With Ftc Fair Information Practice Principles And Readability Assessment, Yuanxiang Li
Theses Digitization Project
This project conducted a statistical study of online privacy to examine how well corporations comply with FIPs and assess how easy their privacy was to read.
How To Implement A Content Management System, Jonathan M. Smith
How To Implement A Content Management System, Jonathan M. Smith
Library Faculty Publications & Presentations
Web content management systems (CMS) are increasingly becoming the preferred solution for library websites and intranets. This session will describe the entire process of implementing CMS; from requirements gathering to post-launch evaluation. We will take a look at several popular open source CMS, and discuss the technical requirements for hosting these systems. Project management principles will be applied to the process, and usability testing methods will be discussed as part of the design and evaluation phases.
The Development Of A Framework For Enterprise Security Architecture And Its Application In Organizations, Yi-Ting Shen
The Development Of A Framework For Enterprise Security Architecture And Its Application In Organizations, Yi-Ting Shen
Theses Digitization Project
The main purpose of this study is to develop an enterprise security framework that is based on a comprehensive following the Zachman EA architecture. The enterprise architecture (EA) is a long-term view or blueprint for an organization. It is a very important blueprint for balancing business and IT technology and for adding value to an organization. Security is also an essential dimension for enterprises nowadays. This paper will incorporate the security dimension with the Zachman EA framework, which intends to serve as an enterprise security framework in assisting an organization to successfully and effectively implement security.
Evaluating Microsoft .Net Technology: Implementation Online Store, Jie Dou
Evaluating Microsoft .Net Technology: Implementation Online Store, Jie Dou
Theses Digitization Project
The purpose of this project is to design, develop and implement an e-commerce shopping cart system based on Microsoft.NET technology and to evaluate ASP.NET technology by developing a shopping cart system.
Disintermediation In The United States Air Travel Industry Who Hold The Power Of Booking Strength, Preenida Gajaseni
Disintermediation In The United States Air Travel Industry Who Hold The Power Of Booking Strength, Preenida Gajaseni
Theses Digitization Project
The purpose of this study is to investigate the correlation of U.S. domestic air travelers and patterns of air travel purchase within the U.S. air travel industry. Influences on the patterns of air travel purchase involved 1) demographic characteristics of travelers 2) benefits to the customer 3) customer attitude toward service providers' (defined as airlines, web-based travel agents, and traditional travel agents and 4) information sources used to select and book a flight for business and leisure trips.
Micro-Payment Exchange System, Yiyao Hao
Micro-Payment Exchange System, Yiyao Hao
Theses Digitization Project
The purpose of this project is to investigate the infrastructure requirements for a currency exchange market for holders of currencies issued through the Lightweight Currency Protocol. The Lightweight Currency Protocol was designed as a means for entities to issue currencies for the purpose of cultivating low value business transactions between collaborating nodes in a peer-to-peer market.
A Secure, Payment-Based Email Delivery System, Ni Deng
A Secure, Payment-Based Email Delivery System, Ni Deng
Theses Digitization Project
The purpose of this project is to design, build and implement a secure, payment-based email delivery system that provides privacy and reduces spam.
Pdf Shopping System With The Lightweight Currency Protocol, Yingzhuo Wang
Pdf Shopping System With The Lightweight Currency Protocol, Yingzhuo Wang
Theses Digitization Project
This project is a web application for two types of bookstores an E-Bookstore and a PDF-Bookstore. Both are document sellers, however, The E-Bookstore is not a currency user. The PDF-Bookstore sells PDF documents and issues a lightweight currency called Scart. Customers can sell their PDF documents to earn Scart currency and buy PDF documents by paying with Scart.
Customer Relationship Management For Banking System, Pingyu Hou
Customer Relationship Management For Banking System, Pingyu Hou
Theses Digitization Project
The purpose of this project is to design, build, and implement a Customer Relationship Management (CRM) system for a bank. CRM BANKING is an online application that caters to strengthening and stabilizing customer relationships in a bank.
Data Warehouse Applications In Modern Day Business, Carla Mounir Issa
Data Warehouse Applications In Modern Day Business, Carla Mounir Issa
Theses Digitization Project
Data warehousing provides organizations with strategic tools to achieve the competitive advantage that organazations are constantly seeking. The use of tools such as data mining, indexing and summaries enables management to retrieve information and perform thorough analysis, planning and forcasting to meet the changes in the market environment. in addition, The data warehouse is providing security measures that, if properly implemented and planned, are helping organizations ensure that their data quality and validity remain intact.