Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

The Future Of Artificial Intelligence In The Healthcare Industry, Erika Bonnist May 2021

The Future Of Artificial Intelligence In The Healthcare Industry, Erika Bonnist

Honors Theses

Technology has played an immense role in the evolution of healthcare delivery for the United States and on an international scale. Today, perhaps no innovation offers more potential than artificial intelligence. Utilizing machine intelligence as opposed to human intelligence for the purposes of planning, offering solutions, and providing insights, AI has the ability to alter traditional dynamics between doctors, patients, and administrators; this reality is now producing both elation at artificial intelligence's medical promise and uncertainty regarding its capacity in current systems. Nevertheless, current trends reveal that interest in AI among healthcare stakeholders is continuously increasing, and with the current …


A Comprehensive Cybersecurity Policy For The United States Government According To Cyberattacks And Exploits In The 21st Century, Diana Hallisey Apr 2020

A Comprehensive Cybersecurity Policy For The United States Government According To Cyberattacks And Exploits In The 21st Century, Diana Hallisey

Honors Program Contracts

Adversaries launch cyberattacks or cyber-exploits with contrasting intentions and desired outcomes. A cyberattack is a malicious attempt by a state, third party, or individual to disrupt a computer’s network; whereas, a cyber-exploit is an action that uncovers and steals “confidential” information from a computer’s data. 1 Within this research paper, the main adversary of such cyberattacks and/or exploits will be the nation-state. The victims of these cyberattacks will range from multinational corporations, such as Sony, to nuclear programs in Iran. This essay will focus on four motivations behind such cyberattacks: (1) private sector hacking (the theft of intellectual property) (2) …


A Policy Mechanism For Federal Recommendation Of Security Standards For Mobile Devices That Conduct Transactions, Ariel Huckabay Jan 2019

A Policy Mechanism For Federal Recommendation Of Security Standards For Mobile Devices That Conduct Transactions, Ariel Huckabay

Electronic Theses and Dissertations

The proliferation of mobile devices in the BRIC countries has prompted them to develop policies to manage the security of these devices. In China, mobile devices are a primary tool for payments. As a result, China instituted in 2017 a cyber security policy that applies to mobile devices giving China broad authority to manage cyber threats. The United States has a similar need for a cyber policy. Mobile devices are likely to become a primary payment tool in the United States soon. DHS has also identified a need for more effective security policy in mobile devices for government operations. This …


Cybersecurity In The Classroom: Bridging The Gap Between Computer Access And Online Safety, Andrew Malecki Jan 2018

Cybersecurity In The Classroom: Bridging The Gap Between Computer Access And Online Safety, Andrew Malecki

Cyber Security Capstone Research Project Reports

According to ISACA, there will be a global shortage of 2 million cybersecurity professionals worldwide by 2019. Additionally, according to Experian Data Breach Resolution, as much as 80% of all network breaches can be traced to employee negligence. These problems will not solve themselves, and they likewise won’t improve without drastic action. An effort needs to be made to help direct interested and qualified individuals to the field of cybersecurity to move toward closing this gap. Moreover, steps need to be made to better inform the public of general safety measures while online, including the safeguarding of sensitive information.

A …


Adapting Information Operations To A Changing World: Future Options For The United States Government, Edwin L. Armistead Jan 2008

Adapting Information Operations To A Changing World: Future Options For The United States Government, Edwin L. Armistead

Theses: Doctorates and Masters

In 1998, the Department of Defense in the United States released the first of a series of seminal policies on Information Operations (IO). Entitled Joint Publication 3-13, this instruction laid out for the first time, in an unclassified format, how the American military forces could utilise this particular element of power. As a relative newly defined activity, this publication proposed to revolutionise the manner in which warfare, diplomacy, business and a number of other areas are conducted. However, this radical transformation in the United States government with regard to IQ has not occurred over the last decade and a significant …