Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 12 of 12
Full-Text Articles in Physical Sciences and Mathematics
The Insider Threat, Jacinda L. Wunderlich
The Insider Threat, Jacinda L. Wunderlich
Regis University Student Publications (comprehensive collection)
The Insider threat is defined similarly by experts in the information technology world for businesses, but addressing the threat has not been of great focus for most organizations. Technology and the Internet have grown exponentially over the past decade leading to changes in how business is conducted. Some basic business practices remain the same; protect the organization and its customers from breach of privacy. How data is gathered, stored, and retrieved has changed. Protecting the perimeter is still important, but these changes in technology now open the doors to a new threat; one that is known but not commonly protected …
Towards A Framework For Maintaining Defensibility In Encrypted Network Environments, John Prewett
Towards A Framework For Maintaining Defensibility In Encrypted Network Environments, John Prewett
Regis University Student Publications (comprehensive collection)
Network security professionals improve confidentiality and integrity of information technology resources when they incorporate encryption schemes into the transmission of network packets across their respective infrastructures. Ironically, network engineers and administrators that incorporate encryption strategies across their infrastructures must simultaneously confront the limitations of end-to-end encrypted network packets inasmuch as they severely impair visible, defensible network architectures. This project demonstrates how security professionals charged with maintaining network visibility can deploy encryption across their topologies without fear of compromising their ability to capture – then fully analyze – network traffic. In so doing, information technology industry practitioners and researchers may confidently …
A Qualitative Study To Explore The Low Number Of Women In Information Technology In The United States, William Baker
A Qualitative Study To Explore The Low Number Of Women In Information Technology In The United States, William Baker
Regis University Student Publications (comprehensive collection)
The number of women in Information Technology in the United States has historically been lower than the number of men in the field. This study explores the reasons behind this disparity and recommends steps that can be taken to increase the number of women in the field. This qualitative study examines why women are not attracted to the Information Technology field and examines reasons why women leave the field. Surveys were conducted with two populations, (1) women who currently work in Information Technology and (2) Information Technology recruiters. The results of these surveys were analyzed to see if there were …
Effecting Data Quality Through Data Governance: A Case Study In The Financial Services Industry, Patrick Egan
Effecting Data Quality Through Data Governance: A Case Study In The Financial Services Industry, Patrick Egan
Regis University Student Publications (comprehensive collection)
One of the most significant challenges faced by senior management today is implementing a data governance program to ensure that data is an asset to an organization's mission. New legislation aligned with continual regulatory oversight, increasing data volume growth, and the desire to improve data quality for decision making are driving forces behind data governance initiatives. Data governance involves reshaping existing processes and the way people view data along with the information technology required to create a consistent, secure and defined processes for handling the quality of an organization's data. In examining attempts to move towards making data an asset …
Collaboration Methods For Social Service Agencies: A Case Study Of Johnson County, Indiana, Larry Noonan
Collaboration Methods For Social Service Agencies: A Case Study Of Johnson County, Indiana, Larry Noonan
Regis University Student Publications (comprehensive collection)
Enabled by a shared Information Technology platform, social service agencies can collaborate and share information to better serve clients holistically, improve the agency's ability to raise funds, provide better statistics to stake holders, and predict social services needed in the future. Social service agencies have many barriers to overcome before successful collaboration such as security, client confidentiality, choosing a software stack, cost, and agreement among the agencies on what information they can share. This paper presents practical methodologies that can be used towards the development of an IT platform to support the collaboration of social service agencies in a local …
A Cisco-Based Proposal For Arne Core Routing Infrastructure, Ingrimar James
A Cisco-Based Proposal For Arne Core Routing Infrastructure, Ingrimar James
Regis University Student Publications (comprehensive collection)
Systems Engineering and Application Development (SEAD) Practicum provides opportunities for students to engage in proposing, designing, building and testing various projects related to information technology. There are several ongoing projects designed to upgrade, improve or revamp some aspect of the Academic Research Network, generally referred to as ARNe, and services or applications that are a part of its architecture. Regis University is in the process of replacing their current architecture and equipment that forms the core of ARNe in order to facilitate further upgrades and new projects within various aspects of ARNe. This paper examines and proposes a Cisco-based routing …
Enterprise Vault And Discovery Accelerator: Email Archiving And Discovery Solution Implementation And The Legal Landscape, David Beebe
Regis University Student Publications (comprehensive collection)
One of the most pressing Information Technology challenges organizations are facing today is managing the vast amount of data that exist at their company, especially with regard to email data. Over the last decade many legal regulations have been passed and amended to address these growing data concerns, especially with regard to email, as they contain critical business communications. These regulations require organizations to be able to quickly and accurately search and recover email data related to legal proceedings, which has led to an overwhelming adoption of email archiving and recovery solutions. Email archiving and recovery solutions allow organizations to …
Home Owner Associations (Hoas) Should Use Centralization And Modern Knowledge Management Practices To Effectively Distribute Their Covenants, Conditions And Restrictions (Cc&Rs) And To Improve Relations With Residents, Robert A. Ochoa
Regis University Student Publications (comprehensive collection)
This thesis will introduce the history of knowledge management, knowledge management of today, and the benefits of knowledge management practices. As an example of the need for knowledge management practices, the many problems being experienced by Home Owner Association's (HOA's) will be discussed, and the many creative ways that knowledge management practices are used today will be shared. There are many organizations that could benefit from knowledge management practices, and there are many solutions that could be used. The characteristics of an organization in trouble and in need of knowledge management practices will begin to surface in the form of …
Application Packaging Tracking System, Cormac Quillinan
Application Packaging Tracking System, Cormac Quillinan
Regis University Student Publications (comprehensive collection)
In the business world it is very difficult to manage and track user application installations and licensing. The primary problem with this area is currently there is no single solution that encapsulates the entire process. The current commercially available tracking systems, such as SMS, DevTrack and Installshield Tracking system, do not provide a complete solution. These products provide partial solutions. However, they do not address the entire problem. In this thesis we proposed an Application Packaging Tracking System. This system tracks application installations throughout the entire process, from submission to deployment.
Developing A Methodology For Creating Flexible Instructional Information Technology Laboratories, Daniel J. Ziesmer
Developing A Methodology For Creating Flexible Instructional Information Technology Laboratories, Daniel J. Ziesmer
Regis University Student Publications (comprehensive collection)
Many schools - particularly the more dynamic segments of high schools and community colleges - have begun to undertake instruction in the areas of PC repair, networking (vendor-neutral and specific alike), operating systems, wireless technologies, and so forth. For some schools, however, this leap forward has come only with a later realization that there are tremendous startup costs and ongoing expenses associated with such endeavors, especially considering that many of these instructional elements have historically called for independent instructional facilities. From this perspective, institutions may find they have to cut their programmatic vision short in the face of harsher budgetary …
Strategic Planning And Tactical Operations Framework Design And Implementation, Kenneth R. Houghtling
Strategic Planning And Tactical Operations Framework Design And Implementation, Kenneth R. Houghtling
Regis University Student Publications (comprehensive collection)
No abstract provided.
Volunteer System Project: Regis University Networking Lab Practicum, Desirea Duarte Ulibarri
Volunteer System Project: Regis University Networking Lab Practicum, Desirea Duarte Ulibarri
Regis University Student Publications (comprehensive collection)
The Regis University Networking Lab Practicum (NLP) allows MSCIT graduate students the opportunity to gain hands-on experience in IT topics in a controlled computer network environment. The NLP also introduces students to a wide range of external IT projects such as the Volunteer System Project. The Volunteer System Project was the construction of a database system for a non-profit organization. The Volunteer System captures all of the personnel data, work time and project affiliation information and is a critical tool in managing and maintaining a successful volunteer workforce. The performance of the original spreadsheet-based Volunteer System was declining and could …