Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Business

Cryptocurrency Fraud: A Look Into The Frontier Of Fraud, Stafford C. Baum Nov 2018

Cryptocurrency Fraud: A Look Into The Frontier Of Fraud, Stafford C. Baum

Honors College Theses

This research project was conducted to look into what sort of frauds can be committed to steal unsuspecting investors’ cryptocurrencies. The inspiration for this research came in the form of the fact that millions of dollars are lost to cryptocurrency fraud each day, and many of these frauds are successful due to the public’s naivete towards the dangers of investing in cryptocurrencies. After researching many different cryptocurrency fraud cases, the frauds could be categorized into four major categories. These categories include Ponzi schemes, fake initial coin offering schemes, pump and dump schemes as well as cryptocurrency theft.


Equifax: Anatomy Of A Security Breach, Ashton Glenn Nov 2018

Equifax: Anatomy Of A Security Breach, Ashton Glenn

Honors College Theses

The infamous 2017 Equifax breach not only compromised millions of citizens’ data, but the breach also left Equifax vulnerable to lawsuits that claim the company acted negligently. This thesis analyzes the events and facts behind the incident to determine the probable outcome of the main case against Equifax. A claim of a breach can come from either Equifax’s data protection or breach response. This thesis concludes the results of the case depends on the final court to determine if Equifax acted negligently with its data protection. If the case ends in the Eleventh District Court of Appeals, the court will …