Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Engineering

Cyber Social Threats 2021: Ai, Covid-19 Vaccine, Detection And Countering Strategies, Ugur Kursuncu, Jeremy Blackburn, Yelena Mejova, Megan Squire, Amit Sheth Jun 2021

Cyber Social Threats 2021: Ai, Covid-19 Vaccine, Detection And Countering Strategies, Ugur Kursuncu, Jeremy Blackburn, Yelena Mejova, Megan Squire, Amit Sheth

Publications

In recent years, online platforms have been utilized for promoting harmful content and behavior such as extremism, harassment, mis/disinformation, human trafficking, genderbased violence among others affecting our society, often leading to real-world events. Such content and behaviors are inherently complex, making the recognition of these narratives challenging for researchers as well as social media companies. The Cyber Social Threats (CySoc) Workshop 2021 aimed to facilitate a rich forum for researchers and practitioners from both academia and industry in the areas of computing and social science, to discuss novel avenues for research on interdisciplinary aspects of harmful communications on social media, …


Social Engineering Knowledge Measured As A Security Countermeasure, Christopher Artejus Sanders Jan 2018

Social Engineering Knowledge Measured As A Security Countermeasure, Christopher Artejus Sanders

Theses and Dissertations

Social Engineering has become a significant threat to the security of business, government, and academic institutions. As vulnerabilities to social engineering attacks increase, organizations must incorporate risk mitigation strategies to their portfolios of Information Systems Security Countermeasures (ISSC). The goal is to implement mitigation strategies that balance the cost of implementation, the privacy of employees, and the resulting expected costs of social engineering attacks. In this paper we develop an analytical model that calculates the total cost of protection, including the trade-off between the cost of implementing protection strategies and the resulting expected cost of social engineering attacks. We use …


The Application Of Lean Six Sigma To Improve A Business Process: A Study Of The Order Processing Process At An Automobile Manufacturing Facility, Sherrian Francina Ellis Jan 2016

The Application Of Lean Six Sigma To Improve A Business Process: A Study Of The Order Processing Process At An Automobile Manufacturing Facility, Sherrian Francina Ellis

Theses and Dissertations

The objective of this study is to explore the application of Lean Six Sigma to determine root causes of process inefficiency and make recommendations for improving the order processing process at an automobile manufacturing facility. State of the art process quality improvement initiatives Lean, Six Sigma, and Lean Six Sigma are used to explore literature and provide a strong theoretical background for this study. Since the study utilizes both quantitative and qualitative data, the study’s methodological approach is classified as mixed methodology. The study is empirical in nature, and single case study is strategy chosen to complete the study. The …