Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (8)
- Physical Sciences and Mathematics (8)
- Information Security (7)
- Social and Behavioral Sciences (3)
- Artificial Intelligence and Robotics (2)
-
- Business Law, Public Responsibility, and Ethics (2)
- Education (2)
- Engineering (2)
- Finance and Financial Management (2)
- Online and Distance Education (2)
- Operations and Supply Chain Management (2)
- Automotive Engineering (1)
- Business Administration, Management, and Operations (1)
- E-Commerce (1)
- Entrepreneurial and Small Business Operations (1)
- Human Factors Psychology (1)
- Management Information Systems (1)
- Organizational Behavior and Theory (1)
- Other Education (1)
- Psychology (1)
- Risk Analysis (1)
- Science and Technology Studies (1)
- Social Psychology and Interaction (1)
- Sociology (1)
- Technology and Innovation (1)
Articles 1 - 10 of 10
Full-Text Articles in Business
The Ethical And Legal Implications Of Iot Data In Business Organizations, Kennedy Bellamy
The Ethical And Legal Implications Of Iot Data In Business Organizations, Kennedy Bellamy
Cybersecurity Undergraduate Research Showcase
The Internet of Things (IoT) has transformed how our day to day lives by implementing and evolving technology that allows data to be exchanged between interconnected devices without the need for human involvement. This paper investigates the implications of IoT expansion and development in corporate organizations, focusing on both the opportunities and challenges it brings. IoT encompasses a wide range of data kinds, from sensor readings to user interactions, across industries such as manufacturing, healthcare, and retail. However, greater connection raises ethical and legal challenges, especially over data privacy, ownership, and control. Potential breaches of privacy and illegal data access …
How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim
How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim
Cybersecurity Undergraduate Research Showcase
The powers of OpenAI's groundbreaking AI language model, ChatGPT, startled millions of users when it was released in November. But for many, the tool's ability to further accomplish the goals of evil actors swiftly replaced their initial excitement with significant concerns. ChatGPT gives malicious actors additional ways to possibly compromise sophisticated cybersecurity software. Leaders in a sector that is currently suffering from a 38% global spike in data breaches in 2022 must acknowledge the rising influence of AI and take appropriate action. Cybercriminals are writing more complex and focused business email compromise (BEC) and other phishing emails with the assistance …
Applicable Mitigation Strategies And Technology Propositions: Preventing Scamming In Marginalized Populations, Grace Nicole Sandhofer-Adams
Applicable Mitigation Strategies And Technology Propositions: Preventing Scamming In Marginalized Populations, Grace Nicole Sandhofer-Adams
Cybersecurity Undergraduate Research Showcase
This essay serves as a proposal for new technology and mitigation against the scamming of marginalized individuals (i.e., those over the age of 65). Research supports this outline, giving background to the types of scams, and prevention strategies currently seen in the cybersecurity landscape. It is evident that the methods we currently use to combat scamming attacks are not effective, therefore, I propose a new solution. This proposed telecommunications strategy is necessary to prevent scamming of all internet users, no matter the device. This telecommunication strategy would use artificial intelligence and machine learning to constantly improve its detection over time, …
A Call For Research: Ethical Dilemmas Of Autonomous Vehicle Manufacturers, Remy Harwood
A Call For Research: Ethical Dilemmas Of Autonomous Vehicle Manufacturers, Remy Harwood
Cybersecurity Undergraduate Research Showcase
While autonomous vehicles accounted for about 31.4 million vehicles on the road in 2019 (Placek). They have continued to flood the market and have a projected growth to 58 million in just 8 years from now (Placek) As well as a market cap in the billions of dollars. Even the comparatively new AV company Tesla has over 3 times the market cap value of the leading non AV brand Toyota (Market Cap) who are also working toward AVs as well, like their level 2 teammate driver assistance. Following Moore’s Law, as technology continues to improve, their social impact and ethical …
The Impact Of Ethical Hacking Within Small Businesses, Nygia Tribbey
The Impact Of Ethical Hacking Within Small Businesses, Nygia Tribbey
Cybersecurity Undergraduate Research Showcase
The Internet has brought about a new way for businesses to reach their customers. With the help of social media, websites, and email marketing, small businesses have gained a lot of new customers. However, these new online customers have also opened up their businesses to a whole new world of cyber crime. Cyber crime is the illegal use of computers and networks to cause damage or steal information. This type of crime affects small businesses as well as large corporations. Small businesses often find themselves at a disadvantage because they don't have the resources to hire an ethical hacker or …
Cyber Threat On The High Seas. A Growing Threat To Infrastructure, James Cummins
Cyber Threat On The High Seas. A Growing Threat To Infrastructure, James Cummins
Cybersecurity Undergraduate Research Showcase
In a growing digital and cloud-connected world, all aspects of our lives are becoming interconnected. All these interconnections breed a possibility for ever-increasing cybersecurity threats. The oceans are not impervious to these attacks. In this research paper, we address the following questions.
What threats do commercial ships face today?
What actions are necessary to mitigate these threats?
Cybersecurity In Fintech Companies, Efstratios Zouros
Cybersecurity In Fintech Companies, Efstratios Zouros
Cybersecurity Undergraduate Research Showcase
Have you recently accessed your bank account online? Have you accessed any financial instrument through your computer or your mobile device? If you are reading this, chances are you have. Every time you utilize those services, you ultimately put your trust in the financial institutions that offer them. You trust that they can securely keep your private information, while also keeping your savings safe. Ultimately, there is a certain dependability and trust in financial institutions that have been present on earth before most of us.
Understanding The Effectivity And Increased Reliance Of Credit Risk Machine Learning Models In Banking, Grishma Baruah
Understanding The Effectivity And Increased Reliance Of Credit Risk Machine Learning Models In Banking, Grishma Baruah
Cybersecurity Undergraduate Research Showcase
Credit risk analysis and making accurate investment and lending decisions has been a challenge for the financial industry for many years, as can be seen with the 2008 financial crisis. However, with the rise of machine learning models and predictive analytics, there has been a shift to increased reliance on technology for determining credit risk. This transition to machine learning comes with both advantages, such as potentially eliminating human error and assumptions from lending decisions, and disadvantages, such as time constraints, data usage inabilities, and lack of understanding nuances in machine learning models. In this paper, I look at four …
Cybersecurity Maturity Model Certification (Cmmc) Compliance For Dod Contractors, Sierra Burnett
Cybersecurity Maturity Model Certification (Cmmc) Compliance For Dod Contractors, Sierra Burnett
Cybersecurity Undergraduate Research Showcase
The DoD is currently taking a supply-chain risk management strategy to foster cybersecurity. This unique strategy is often referred to as CMMC which stands for “Cybersecurity Maturity Model Certification”. The approach requires that all the 300,000 DoD contractors acquire third-party authentication that may attain the requirements for the CMMC maturity level suitable to the work they desire to do for the DoD. CMMC typically examines the organization's capability to safeguard Federal Contract Information as well as CUI. It integrates various cybersecurity standards already in place and plots the best practices alongside processes to five maturity levels that range from the …
Leverage Psychological Factors Associated With Lapses In Cybersecurity In Organizational Management, Chad Holm
Leverage Psychological Factors Associated With Lapses In Cybersecurity In Organizational Management, Chad Holm
Cybersecurity Undergraduate Research Showcase
With computers being a standard part of life now with the evolution of the internet, many aspects of our lives have changed, and new ways of thinking must come. One of the biggest challenges in most cyber security problems is not related to the software or the hardware; it is the people that are using the computers to access the data and communicate with others, where the hackers could simply find a weak entry point that naturally exists and a weak link caused by human hands. The human factor as an “insider threat” will affect unauthorized access, credentials stealing, and …