Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Physical Sciences and Mathematics

The Insider Threat, Jacinda L. Wunderlich Oct 2011

The Insider Threat, Jacinda L. Wunderlich

Regis University Student Publications (comprehensive collection)

The Insider threat is defined similarly by experts in the information technology world for businesses, but addressing the threat has not been of great focus for most organizations. Technology and the Internet have grown exponentially over the past decade leading to changes in how business is conducted. Some basic business practices remain the same; protect the organization and its customers from breach of privacy. How data is gathered, stored, and retrieved has changed. Protecting the perimeter is still important, but these changes in technology now open the doors to a new threat; one that is known but not commonly protected …


Towards A Framework For Maintaining Defensibility In Encrypted Network Environments, John Prewett Apr 2011

Towards A Framework For Maintaining Defensibility In Encrypted Network Environments, John Prewett

Regis University Student Publications (comprehensive collection)

Network security professionals improve confidentiality and integrity of information technology resources when they incorporate encryption schemes into the transmission of network packets across their respective infrastructures. Ironically, network engineers and administrators that incorporate encryption strategies across their infrastructures must simultaneously confront the limitations of end-to-end encrypted network packets inasmuch as they severely impair visible, defensible network architectures. This project demonstrates how security professionals charged with maintaining network visibility can deploy encryption across their topologies without fear of compromising their ability to capture – then fully analyze – network traffic. In so doing, information technology industry practitioners and researchers may confidently …


A Qualitative Study To Explore The Low Number Of Women In Information Technology In The United States, William Baker Apr 2011

A Qualitative Study To Explore The Low Number Of Women In Information Technology In The United States, William Baker

Regis University Student Publications (comprehensive collection)

The number of women in Information Technology in the United States has historically been lower than the number of men in the field. This study explores the reasons behind this disparity and recommends steps that can be taken to increase the number of women in the field. This qualitative study examines why women are not attracted to the Information Technology field and examines reasons why women leave the field. Surveys were conducted with two populations, (1) women who currently work in Information Technology and (2) Information Technology recruiters. The results of these surveys were analyzed to see if there were …


Automated Case Review System For Transitional Assistance, Don Minh Le Jan 2011

Automated Case Review System For Transitional Assistance, Don Minh Le

Theses Digitization Project

The purpose of this project was to create an automated Case Review System. The current Case Review System is a manual process that is being performed by Eligibility Lead Workers and Eligibility Worker Supervisors. The reviewers utilize an Excel sheet to record every individual reviewers results and print out many copies for the appropriate parties. The automated system is designed to track, and catch mistakes in determining eligibility of the welfare applicants. Moreover, Case Review System provides the Transitional Assistance Department (TAD) the ability to report error trends as a training tool to reduce future case errors. This system shall …


Trigeiawriter: A Content Management System, Mohan Prabhakara Ram Jan 2011

Trigeiawriter: A Content Management System, Mohan Prabhakara Ram

Theses Digitization Project

The purpose of this project was to design and implement a Content Management System (CSM). TrigeiaWriter is a Content Management System for Trigeia.com, a web based magazine site. Since TrigeiaWriter is used for a web based magazine, it incorperates different roles for the users and these roles are authors, editors, and administrators.


Effecting Data Quality Through Data Governance: A Case Study In The Financial Services Industry, Patrick Egan Jan 2011

Effecting Data Quality Through Data Governance: A Case Study In The Financial Services Industry, Patrick Egan

Regis University Student Publications (comprehensive collection)

One of the most significant challenges faced by senior management today is implementing a data governance program to ensure that data is an asset to an organization's mission. New legislation aligned with continual regulatory oversight, increasing data volume growth, and the desire to improve data quality for decision making are driving forces behind data governance initiatives. Data governance involves reshaping existing processes and the way people view data along with the information technology required to create a consistent, secure and defined processes for handling the quality of an organization's data. In examining attempts to move towards making data an asset …