Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Databases and Information Systems (4)
- Business (2)
- Business Law, Public Responsibility, and Ethics (2)
- Information Security (2)
- Other Computer Sciences (2)
-
- Programming Languages and Compilers (2)
- Artificial Intelligence and Robotics (1)
- Computer Engineering (1)
- Digital Communications and Networking (1)
- Economics (1)
- Engineering (1)
- Graphics and Human Computer Interfaces (1)
- OS and Networks (1)
- Other Computer Engineering (1)
- Social and Behavioral Sciences (1)
- Software Engineering (1)
- Keyword
-
- Android (1)
- Bitcoin (1)
- Blockchain (1)
- Business Models (1)
- CFR 21 (1)
-
- Cognitive Computing (1)
- Computer Science (1)
- Currency (1)
- Cyber (1)
- Cyberdefense (1)
- Cybereducation (1)
- Cybersecurity (1)
- Data mining (1)
- Database (1)
- Debugging (1)
- Fraud (1)
- Help Desk (1)
- Mobile Application (1)
- Mobile Implementation (1)
- Parks (1)
- Pharmaceutical Trials (1)
- Pharmceutical (1)
- Regulatory Compliance (1)
- Security fraud (1)
- Software tracking (1)
- Testing (1)
- WorkFlow (1)
Articles 1 - 8 of 8
Full-Text Articles in Physical Sciences and Mathematics
Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly
Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly
HON499 projects
The aim of this paper is to offer an introduction to the exploding field of cybersecurity by asking what are the most important concepts or topics that a new member of the field of cybersecurity should know. This paper explores this question from three perspectives: from the realm of business and how the cyber world is intertwined with modern commerce, including common weaknesses and recommendations, from the academic arena examining how cybersecurity is taught and how it should be taught in a classroom or laboratory environment, and lastly, from the author’s personal experience with the cyber world. Included information includes …
Using Blockchain Technology To Facilitate Anti-Money Laundering Efforts, Dominick J. Battistini
Using Blockchain Technology To Facilitate Anti-Money Laundering Efforts, Dominick J. Battistini
Economic Crime Forensics Capstones
Money laundering can be defined as any act or attempted act to conceal or disguise the identity of illegally obtained proceeds so that they appear to have originated from legitimate sources (Money Laundering, 2016). It is difficult to determine the magnitude of money laundering because these illicit financial flows remain hidden (Schott, 2006). A report issued by the United Nations Office on Drugs and Crime (UNODC) quoted that the total of all criminal proceeds amounted to $2.1 trillion in 2009. The study also shows that “Less than 1 percent of global illicit financial flows are currently seized and frozen” (Pietschmann …
Findapark Implementation, David Laratta
Findapark Implementation, David Laratta
Mathematics and Computer Science Capstones
FindAPark is a web service application designed to help a user search for a local hike or vacation revolving around hiking or cycling. Workplan The workplan for this capstone is to create the System Proposal which includes detailed information about the completion of all the items in the System Proposal except the Functional, Structural, and Behavioral Models.
Learning To Troubleshoot: A Support Process Model Case Study, Rachelle Solt
Learning To Troubleshoot: A Support Process Model Case Study, Rachelle Solt
Mathematics and Computer Science Capstones
A great deal of time is spent teaching new support and help desk staff members how to triage, investigate, and test new issues that they encounter, both the time of the new employee and the time of the experienced staff member asked to train them. This is especially true when each new ticket could be connected to any of the various aspects of a product; hardware, software, user interface, process, data integrity, user access. Often times, new support employees are unsure of the general steps to take in order to investigate a problem with as well as where to begin …
Analyzing Proactive Fraud Detection Software Tools And The Push For Quicker Solutions, Kerri Aiken
Analyzing Proactive Fraud Detection Software Tools And The Push For Quicker Solutions, Kerri Aiken
Economic Crime Forensics Capstones
This paper focuses on proactive fraud detection software tools and how these tools can help detect and prevent possible fraudulent schemes. In addition to relying on routine audits, companies are designing proactive methods that involve the inclusion of software tools to detect and deter instances of fraud and abuse. This paper discusses examples of companies using ACL and SAS software programs and how the software tools have positively changed their auditing systems.
Novelis Inc., an aluminum and recycling company, implemented ACL into their internal audit software system. Competitive Health Analytics (Division of Humana) implemented SAS in order to improve their …
Cognitive Computing Creates Value In Healthcare And Shows Potential For Business Value, Stephen Knowles
Cognitive Computing Creates Value In Healthcare And Shows Potential For Business Value, Stephen Knowles
Mathematics and Computer Science Capstones
This research paper examines cognitive computing relative to how businesses in healthcare may use cognitive systems to analyze big data to create a competitive advantage. It explains the underlying technologies, such as machine learning and natural language processing, and gives an overview of the technology driving the world's most popular cognitive computing system, IBM Watson. It examines case studies that show businesses applying cognitive systems to derive value from big data and discusses how this may be used to develop business value and provide analysis for strategic processing. It also touches on challenges of cognitive computing. The paper concludes with …
Electronic Validation In The Pharmaceutical Industry, Victor Decouto, S Singh
Electronic Validation In The Pharmaceutical Industry, Victor Decouto, S Singh
Mathematics and Computer Science Capstones
The authors investigate whether or not companies within the pharmaceutical industry still have a hard time effectively designing and following an electronic validation system. With increased data integrity issues from electronic systems, the FDA introduced 21 CFR Part 11 in 1997 to allow for the use of electronic signature and records for processes within the pharmaceutical industry. This regulation also required that the computer and electronic systems be available for audits and inspections by the FDA. In order to comply with 21 CFR Part 11 and adapt to new technology, companies must have an electronic validation system. The electronic validation …
Building And Safety Department Android Mobile Application, Nary Simms
Building And Safety Department Android Mobile Application, Nary Simms
Mathematics and Computer Science Capstones
Research has found that Americans spend 4.5 hours watching television, 1.5 hours listening to the radio, about half an hour reading print and spend a whooping five plus hours per day in digital media (online, mobile, other). Out of these five hours, two hours and twenty minutes are spent on a mobile device (phone or tablet), which is a massive increase of about 575 percent from the twenty-four minutes that was reported in 2010. Flurry, an analytic app company, released data about their tracking of more than 300,000 apps in 2013, and they found the average time spent per day …