Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Physical Sciences and Mathematics

Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly Nov 2016

Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly

HON499 projects

The aim of this paper is to offer an introduction to the exploding field of cybersecurity by asking what are the most important concepts or topics that a new member of the field of cybersecurity should know. This paper explores this question from three perspectives: from the realm of business and how the cyber world is intertwined with modern commerce, including common weaknesses and recommendations, from the academic arena examining how cybersecurity is taught and how it should be taught in a classroom or laboratory environment, and lastly, from the author’s personal experience with the cyber world. Included information includes …


Using Blockchain Technology To Facilitate Anti-Money Laundering Efforts, Dominick J. Battistini Aug 2016

Using Blockchain Technology To Facilitate Anti-Money Laundering Efforts, Dominick J. Battistini

Economic Crime Forensics Capstones

Money laundering can be defined as any act or attempted act to conceal or disguise the identity of illegally obtained proceeds so that they appear to have originated from legitimate sources (Money Laundering, 2016). It is difficult to determine the magnitude of money laundering because these illicit financial flows remain hidden (Schott, 2006). A report issued by the United Nations Office on Drugs and Crime (UNODC) quoted that the total of all criminal proceeds amounted to $2.1 trillion in 2009. The study also shows that “Less than 1 percent of global illicit financial flows are currently seized and frozen” (Pietschmann …


Findapark Implementation, David Laratta May 2016

Findapark Implementation, David Laratta

Mathematics and Computer Science Capstones

FindAPark is a web service application designed to help a user search for a local hike or vacation revolving around hiking or cycling. Workplan The workplan for this capstone is to create the System Proposal which includes detailed information about the completion of all the items in the System Proposal except the Functional, Structural, and Behavioral Models.


Learning To Troubleshoot: A Support Process Model Case Study, Rachelle Solt May 2016

Learning To Troubleshoot: A Support Process Model Case Study, Rachelle Solt

Mathematics and Computer Science Capstones

A great deal of time is spent teaching new support and help desk staff members how to triage, investigate, and test new issues that they encounter, both the time of the new employee and the time of the experienced staff member asked to train them. This is especially true when each new ticket could be connected to any of the various aspects of a product; hardware, software, user interface, process, data integrity, user access. Often times, new support employees are unsure of the general steps to take in order to investigate a problem with as well as where to begin …


Analyzing Proactive Fraud Detection Software Tools And The Push For Quicker Solutions, Kerri Aiken May 2016

Analyzing Proactive Fraud Detection Software Tools And The Push For Quicker Solutions, Kerri Aiken

Economic Crime Forensics Capstones

This paper focuses on proactive fraud detection software tools and how these tools can help detect and prevent possible fraudulent schemes. In addition to relying on routine audits, companies are designing proactive methods that involve the inclusion of software tools to detect and deter instances of fraud and abuse. This paper discusses examples of companies using ACL and SAS software programs and how the software tools have positively changed their auditing systems.

Novelis Inc., an aluminum and recycling company, implemented ACL into their internal audit software system. Competitive Health Analytics (Division of Humana) implemented SAS in order to improve their …


Cognitive Computing Creates Value In Healthcare And Shows Potential For Business Value, Stephen Knowles May 2016

Cognitive Computing Creates Value In Healthcare And Shows Potential For Business Value, Stephen Knowles

Mathematics and Computer Science Capstones

This research paper examines cognitive computing relative to how businesses in healthcare may use cognitive systems to analyze big data to create a competitive advantage. It explains the underlying technologies, such as machine learning and natural language processing, and gives an overview of the technology driving the world's most popular cognitive computing system, IBM Watson. It examines case studies that show businesses applying cognitive systems to derive value from big data and discusses how this may be used to develop business value and provide analysis for strategic processing. It also touches on challenges of cognitive computing. The paper concludes with …


Electronic Validation In The Pharmaceutical Industry, Victor Decouto, S Singh Jan 2016

Electronic Validation In The Pharmaceutical Industry, Victor Decouto, S Singh

Mathematics and Computer Science Capstones

The authors investigate whether or not companies within the pharmaceutical industry still have a hard time effectively designing and following an electronic validation system. With increased data integrity issues from electronic systems, the FDA introduced 21 CFR Part 11 in 1997 to allow for the use of electronic signature and records for processes within the pharmaceutical industry. This regulation also required that the computer and electronic systems be available for audits and inspections by the FDA. In order to comply with 21 CFR Part 11 and adapt to new technology, companies must have an electronic validation system. The electronic validation …


Building And Safety Department Android Mobile Application, Nary Simms Jan 2016

Building And Safety Department Android Mobile Application, Nary Simms

Mathematics and Computer Science Capstones

Research has found that Americans spend 4.5 hours watching television, 1.5 hours listening to the radio, about half an hour reading print and spend a whooping five plus hours per day in digital media (online, mobile, other). Out of these five hours, two hours and twenty minutes are spent on a mobile device (phone or tablet), which is a massive increase of about 575 percent from the twenty-four minutes that was reported in 2010. Flurry, an analytic app company, released data about their tracking of more than 300,000 apps in 2013, and they found the average time spent per day …