Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Business

Cryptocurrency Fraud: A Look Into The Frontier Of Fraud, Stafford C. Baum Nov 2018

Cryptocurrency Fraud: A Look Into The Frontier Of Fraud, Stafford C. Baum

Honors College Theses

This research project was conducted to look into what sort of frauds can be committed to steal unsuspecting investors’ cryptocurrencies. The inspiration for this research came in the form of the fact that millions of dollars are lost to cryptocurrency fraud each day, and many of these frauds are successful due to the public’s naivete towards the dangers of investing in cryptocurrencies. After researching many different cryptocurrency fraud cases, the frauds could be categorized into four major categories. These categories include Ponzi schemes, fake initial coin offering schemes, pump and dump schemes as well as cryptocurrency theft.


Custom Windows Patching Methodology - Comparative Analysis, Brent Michael Henderson Jan 2018

Custom Windows Patching Methodology - Comparative Analysis, Brent Michael Henderson

Electronic Theses and Dissertations

Windows Server Update Services has been a common mainstay among organizations with a heavy footprint of Windows operating systems since it was originally released as Software Update Services in 2002. While the product has grown in scope, the primary allure remains the same: WSUS offers organizations greater control over the patches that are released to their environment and saves bandwidth by allowing a centralized device to download and offer patches to internal clients rather than having each of those clients download the content they require from the Internet. Unfortunately, the product has a structural limitation in that it lacks the …