Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Business

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim Dec 2021

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim

Electronic Theses, Projects, and Dissertations

Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …


Integration Of Internet Of Things And Health Recommender Systems, Moonkyung Yang Dec 2021

Integration Of Internet Of Things And Health Recommender Systems, Moonkyung Yang

Electronic Theses, Projects, and Dissertations

The Internet of Things (IoT) has become a part of our lives and has provided many enhancements to day-to-day living. In this project, IoT in healthcare is reviewed. IoT-based healthcare is utilized in remote health monitoring, observing chronic diseases, individual fitness programs, helping the elderly, and many other healthcare fields. There are three main architectures of smart IoT healthcare: Three-Layer Architecture, Service-Oriented Based Architecture (SoA), and The Middleware-Based IoT Architecture. Depending on the required services, different IoT architecture are being used. In addition, IoT healthcare services, IoT healthcare service enablers, IoT healthcare applications, and IoT healthcare services focusing on Smartwatch …


Privacy Is Infringed In Plain Sight And How To Dissapear, Zachary Taylor May 2021

Privacy Is Infringed In Plain Sight And How To Dissapear, Zachary Taylor

Electronic Theses, Projects, and Dissertations

This culminating project explored how Amazon, Apple, Facebook, Google, and Microsoft infringe on their user's information privacy. Focus was on tools and techniques one can use to strengthen their information privacy. Privacy or information privacy was defined as the right to have some control over how your personal information is collected and used. This project will also introduce a verity of open-source tools and techniques that would help the unsuspected user to maintain their privacy.The questions asked were: what are some common techniques that Amazon, Apple, Facebook, Google, or Microsoft use to gain personal information?, At what cost would it …


Email Data Breach Analysis And Prevention Using Hook And Eye System, Shubhankar Jayant Jathar Jul 2020

Email Data Breach Analysis And Prevention Using Hook And Eye System, Shubhankar Jayant Jathar

Electronic Theses, Projects, and Dissertations

Due to the recent COVID-19 outbreak, there were a lot of data leaks from the health sector. This project is about the increase in data breach incidents that are taking place. In this project, There is an analysis of different types of breaches that are found online and are practiced to steal valuable information. Talking about different aspects that lead to data breaches and which are the main sector or main epicenter for data leaks. The analysis tells that most of the data breaches are done using emails and to overcome this limitation a system has been designed that will …


Quantum Computing: Principles And Applications, Yoshito Kanamori, Seong-Moo Yoo Jan 2020

Quantum Computing: Principles And Applications, Yoshito Kanamori, Seong-Moo Yoo

Journal of International Technology and Information Management

The development of quantum computers over the past few years is probably one of the significant advancements in the history of quantum computing. D-Wave quantum computer has been available for more than eight years. IBM has made its quantum computer accessible via its cloud service. Also, Microsoft, Google, Intel, and NASA have been heavily investing in the development of quantum computers and their applications. The quantum computer seems to be no longer just for physicists and computer scientists but also for information system researchers. This paper introduces the basic concepts of quantum computing and describes well-known quantum applications for non-physicists. …


Identifying Relationships Of Interest In Complex Environments By Using Channel Theory, Andreas Bildstein, Junkang Feng Sep 2019

Identifying Relationships Of Interest In Complex Environments By Using Channel Theory, Andreas Bildstein, Junkang Feng

Communications of the IIMA

Complex environments show a high degree of dynamics caused by vital interactions between objects within those environments and alterations through which the set of objects and their characteristics within those environments go over time. Within this work, we show that we can tame the level of complexity in dynamic environments by identifying relationships of interest between objects in such environments. To this end, we apply the theory of Information Flow, also known as Channel Theory, to the application area of smart manufacturing. We enhance the way how the Channel Theory has been applied so far by using an …


Agent-Based Modeling And Simulation Approaches In Stem Education Research, Shanna R. Simpson-Singleton, Xiangdong Che Jan 2019

Agent-Based Modeling And Simulation Approaches In Stem Education Research, Shanna R. Simpson-Singleton, Xiangdong Che

Journal of International Technology and Information Management

The development of best practices that deliver quality STEM education to all students, while minimizing achievement gaps, have been solicited by several national agencies. ABMS is a feasible approach to provide insight into global behavior based upon the interactions amongst agents and environments. In this review, we systematically surveyed several modeling and simulation approaches and discussed their applications to the evaluation of relevant theories in STEM education. It was found that ABMS is optimal to simulate STEM education hypotheses, as ABMS will sensibly present emergent theories and causation in STEM education phenomena if the model is properly validated and calibrated.


Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr Dec 2017

Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr

Journal of International Technology and Information Management

The discovery of useful or worthwhile process models must be performed with due regards to the transformation that needs to be achieved. The blend of the data representations (i.e data mining) and process modelling methods, often allied to the field of Process Mining (PM), has proven to be effective in the process analysis of the event logs readily available in many organisations information systems. Moreover, the Process Discovery has been lately seen as the most important and most visible intellectual challenge related to the process mining. The method involves automatic construction of process models from event logs about any domain …


Developing Focused Auditing Tools: A Practical Framework For Creating Formalized Multi-Level Security Policy Specifications, Barbara Ann Brough Jan 2013

Developing Focused Auditing Tools: A Practical Framework For Creating Formalized Multi-Level Security Policy Specifications, Barbara Ann Brough

Theses Digitization Project

The purpose of this study is that formalized policy specifications and focused penetration testing are needed to effectively audit any information system. Designing and maintaining the security system information is the primary duty of the cyber security professional. In today's world, nearly all government agencies manage some form of financial, defense, national security, and/or privacy information security policies. It is also necessary in this environment that agencies are accountable for auditing the security systems that protect this information.


The Implementation Of A Thin Client In The Department Of Defense Network System, Sung Ju In Jan 2013

The Implementation Of A Thin Client In The Department Of Defense Network System, Sung Ju In

Theses Digitization Project

The purpose of this project is to introduce and analyze a thin client solution that could enhance the overall Department of Defense (DoD) network system as well as its IT security posture, minimize risk from external threats, and ease of network operations.


Queuepay.Com: Building A System For Cardholders' Transaction Security, Jose Ramon Gonzalez Jan 2013

Queuepay.Com: Building A System For Cardholders' Transaction Security, Jose Ramon Gonzalez

Theses Digitization Project

The purpose of this project was to apply the skills learned in the MBA program to help develop a solution to a problem that costs billions of dollars every year in fraudulent related losses arising from the use of payment cards such as debit cards, credit cards, charge cards or prepaid cards. The project analyzes the industry of payment cards, the emergence of the problem, and builds a prototype that addresses the problem. Queuepay.com is designed to provide services to its cardholders that will significantly reduce the risk of fraud.


Online Privacy Policy Of The Thirty Dow Jones Corporations: Compliance With Ftc Fair Information Practice Principles And Readability Assessment, Yuanxiang Li Jan 2012

Online Privacy Policy Of The Thirty Dow Jones Corporations: Compliance With Ftc Fair Information Practice Principles And Readability Assessment, Yuanxiang Li

Theses Digitization Project

This project conducted a statistical study of online privacy to examine how well corporations comply with FIPs and assess how easy their privacy was to read.


How To Implement A Content Management System, Jonathan M. Smith Aug 2010

How To Implement A Content Management System, Jonathan M. Smith

Library Faculty Publications & Presentations

Web content management systems (CMS) are increasingly becoming the preferred solution for library websites and intranets. This session will describe the entire process of implementing CMS; from requirements gathering to post-launch evaluation. We will take a look at several popular open source CMS, and discuss the technical requirements for hosting these systems. Project management principles will be applied to the process, and usability testing methods will be discussed as part of the design and evaluation phases.


The Development Of A Framework For Enterprise Security Architecture And Its Application In Organizations, Yi-Ting Shen Jan 2008

The Development Of A Framework For Enterprise Security Architecture And Its Application In Organizations, Yi-Ting Shen

Theses Digitization Project

The main purpose of this study is to develop an enterprise security framework that is based on a comprehensive following the Zachman EA architecture. The enterprise architecture (EA) is a long-term view or blueprint for an organization. It is a very important blueprint for balancing business and IT technology and for adding value to an organization. Security is also an essential dimension for enterprises nowadays. This paper will incorporate the security dimension with the Zachman EA framework, which intends to serve as an enterprise security framework in assisting an organization to successfully and effectively implement security.


Evaluating Microsoft .Net Technology: Implementation Online Store, Jie Dou Jan 2006

Evaluating Microsoft .Net Technology: Implementation Online Store, Jie Dou

Theses Digitization Project

The purpose of this project is to design, develop and implement an e-commerce shopping cart system based on Microsoft.NET technology and to evaluate ASP.NET technology by developing a shopping cart system.


Disintermediation In The United States Air Travel Industry Who Hold The Power Of Booking Strength, Preenida Gajaseni Jan 2005

Disintermediation In The United States Air Travel Industry Who Hold The Power Of Booking Strength, Preenida Gajaseni

Theses Digitization Project

The purpose of this study is to investigate the correlation of U.S. domestic air travelers and patterns of air travel purchase within the U.S. air travel industry. Influences on the patterns of air travel purchase involved 1) demographic characteristics of travelers 2) benefits to the customer 3) customer attitude toward service providers' (defined as airlines, web-based travel agents, and traditional travel agents and 4) information sources used to select and book a flight for business and leisure trips.


Micro-Payment Exchange System, Yiyao Hao Jan 2005

Micro-Payment Exchange System, Yiyao Hao

Theses Digitization Project

The purpose of this project is to investigate the infrastructure requirements for a currency exchange market for holders of currencies issued through the Lightweight Currency Protocol. The Lightweight Currency Protocol was designed as a means for entities to issue currencies for the purpose of cultivating low value business transactions between collaborating nodes in a peer-to-peer market.


A Secure, Payment-Based Email Delivery System, Ni Deng Jan 2005

A Secure, Payment-Based Email Delivery System, Ni Deng

Theses Digitization Project

The purpose of this project is to design, build and implement a secure, payment-based email delivery system that provides privacy and reduces spam.


Pdf Shopping System With The Lightweight Currency Protocol, Yingzhuo Wang Jan 2005

Pdf Shopping System With The Lightweight Currency Protocol, Yingzhuo Wang

Theses Digitization Project

This project is a web application for two types of bookstores an E-Bookstore and a PDF-Bookstore. Both are document sellers, however, The E-Bookstore is not a currency user. The PDF-Bookstore sells PDF documents and issues a lightweight currency called Scart. Customers can sell their PDF documents to earn Scart currency and buy PDF documents by paying with Scart.


Customer Relationship Management For Banking System, Pingyu Hou Jan 2004

Customer Relationship Management For Banking System, Pingyu Hou

Theses Digitization Project

The purpose of this project is to design, build, and implement a Customer Relationship Management (CRM) system for a bank. CRM BANKING is an online application that caters to strengthening and stabilizing customer relationships in a bank.


Data Warehouse Applications In Modern Day Business, Carla Mounir Issa Jan 2002

Data Warehouse Applications In Modern Day Business, Carla Mounir Issa

Theses Digitization Project

Data warehousing provides organizations with strategic tools to achieve the competitive advantage that organazations are constantly seeking. The use of tools such as data mining, indexing and summaries enables management to retrieve information and perform thorough analysis, planning and forcasting to meet the changes in the market environment. in addition, The data warehouse is providing security measures that, if properly implemented and planned, are helping organizations ensure that their data quality and validity remain intact.