Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Business

An Analysis And Examination Of Consensus Attacks In Blockchain Networks, Thomas R. Clark May 2023

An Analysis And Examination Of Consensus Attacks In Blockchain Networks, Thomas R. Clark

Senior Honors Projects, 2020-current

This paper examines consensus attacks as they relate to blockchain networks. Consensus attacks are a significant threat to the security and integrity of blockchain networks, and understanding these attacks is crucial for developers and stakeholders. The primary contribution of the paper is to present blockchain and consensus attacks in a clear and accessible manner, with the aim of making these complex concepts easily understandable for a general audience. Using literature review, the paper identifies various methods to prevent consensus attacks, including multi-chain networks, proof-of-work consensus algorithms, and network auditing and monitoring. An analysis revealed that these methods for preventing consensus …


Firm Transparency Of Risk Oversight: An Examination Of Cybersecurity Governance Disclosures, Laurie E. Ereddia May 2023

Firm Transparency Of Risk Oversight: An Examination Of Cybersecurity Governance Disclosures, Laurie E. Ereddia

Doctoral Dissertations

In this study, I examine factors associated with firm transparency of board oversight using the setting of cybersecurity risk. The SEC requires that, to the extent cybersecurity risks are material, firms must disclose the nature of the board’s role in overseeing the management of that risk, allowing investors to assess how the board is fulfilling its risk oversight duties. Using textual analysis, I identify 2,921 firms that report material cybersecurity risk factors in their annual reports. From these firms’ 2021 proxy statement filings, I hand collect data relating to 12 different elements of cybersecurity board oversight and create an overall …


The Evolution Of The Chief Technology Officer And The Modernization Of Technology In Education, Brian Skibinski Jan 2023

The Evolution Of The Chief Technology Officer And The Modernization Of Technology In Education, Brian Skibinski

All Student Theses

The role of technology in education has changed dramatically over the past 20 years. From the advent of individual workstations to networked labs to one-to-one technologies, computers have transformed how teachers and students consume information. School districts today support hundreds if not thousands of devices and end users. Technology supports mission critical systems like financial, human resources, library, and student information systems and ensures they are integrating rostering information to numerous third-party programs like Clever, Classlink or textbook specific websites. They also support the district operations as well by assisting in or managing building automation controls which can include lighting, …


Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda Jan 2023

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda

Walden Dissertations and Doctoral Studies

All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …


Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda Jan 2023

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda

Walden Dissertations and Doctoral Studies

All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …


Small Business Office Network, Michael Gerome Jan 2023

Small Business Office Network, Michael Gerome

Williams Honors College, Honors Research Projects

This project will emulate a small office network environment. The project will demonstrate the process of building and configuring the network to meet the requirements laid out in the project plan. This network includes four subnets with Windows 10 end devices and a Kali Linux device, it also includes five Cisco layer 2 switches and three Cisco routers. There are also three subnets connecting the routers to each other to enable routing between the subnets. After the network environment is set up, various penetration tests are performed from the Kali Linux device to gather information. The Nmap reconnaissance tool is …


The Market’S Reaction To The Disclosure Of A Cybersecurity Breach, Jill L. Mattucci Jan 2023

The Market’S Reaction To The Disclosure Of A Cybersecurity Breach, Jill L. Mattucci

Honors Theses and Capstones

No abstract provided.


Cybersecurity Breaches And Auditor Turnover, Kilian O'Connell Jan 2023

Cybersecurity Breaches And Auditor Turnover, Kilian O'Connell

Honors Theses and Capstones

No abstract provided.


Cybersecurity Breaches And Auditor Turnover, Kilian O'Connell Jan 2023

Cybersecurity Breaches And Auditor Turnover, Kilian O'Connell

Honors Theses and Capstones

No abstract provided.