Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2010

School of Computer & Information Science

Articles 1 - 30 of 57

Full-Text Articles in Physical Sciences and Mathematics

Preventing Computer Identity Theft, Donald R. Mcdaniel Dec 2010

Preventing Computer Identity Theft, Donald R. Mcdaniel

Regis University Student Publications (comprehensive collection)

The arrival of the information age has created new challenges to the ability of individuals to protect the security and privacy of their personal information. One such challenge is that of identity theft, which has caused a number of hardships upon its victims. Perpetrators of this fraud may use identities of others to obtain loans, steal money, and violate the law. This paper will discuss the characteristics of the offenders and victims of identity theft. A systematic approach for preventing identity theft will also be presented with the hopes of curtailing this epidemic.


Test-Driven Web Application Development: Increasing The Quality Of Web Development By Providing Framework With An Emphasis On Test-Driven Design And Development Methodologies, Jason Hall Dec 2010

Test-Driven Web Application Development: Increasing The Quality Of Web Development By Providing Framework With An Emphasis On Test-Driven Design And Development Methodologies, Jason Hall

Regis University Student Publications (comprehensive collection)

Web applications , especially those based on interpreted programming languages , are quickly becoming more utilized and more commonplace than traditional client applications. Despite this growth, no open solution has yet fulfilled the need of a risk-reducing development framework that supports test-driven methodologies and tools designed to coordinate the resources responsible for the most effective development of web applications based on interpreted programming languages. This research paper presents a test-driven development framework consisting of openly available components that can be used by development teams writing web applications based on interpreted programming languages based on the methodologies and tools used by …


Efficacy Of The United States Safe Harbor Framework, Margaret M. Beck Dec 2010

Efficacy Of The United States Safe Harbor Framework, Margaret M. Beck

Regis University Student Publications (comprehensive collection)

This study assessed the efficacy of the United States Safe Harbor Framework by approximating the size of a population of large United States organizations (50,000 - 500,000 employees) that were eligible to participate in the Safe Harbor that did not participate. The Safe Harbor Framework, administered by the United States Department of Commerce, is a voluntary program that assists United States organizations in complying with the European Union Data Privacy Directive. Out of a population of 337 large organizations, 168 were potentially eligible to participate in the Safe Harbor Framework. One hundred and ten, or 66%, of these organizations did …


Home Computer Security Can Be Improved Using Online Video Streaming Services, Russell Barber Nov 2010

Home Computer Security Can Be Improved Using Online Video Streaming Services, Russell Barber

Regis University Student Publications (comprehensive collection)

Home computer users face many new computer security threats. The rise of the internet has enabled viruses to spread rapidly. Educating computer users on security issues is one way to combat security threats. Video streaming web sites can provide a simple way to distribute educational videos to computer users. This project investigates the effectiveness of creating and distributing computer security educational videos on video streaming sites.


Hospital Network Infrastructure: A Modern Look Into The Network Backbone With Real Time Visibility, Homan Mike Hirad Nov 2010

Hospital Network Infrastructure: A Modern Look Into The Network Backbone With Real Time Visibility, Homan Mike Hirad

Regis University Student Publications (comprehensive collection)

For the purposes of this research, the "design science" discipline of Information Systems will structure the overall methodology and framework for results. By leveraging the design science framework, this study will dissect and analyze various parts of a hospital's network, to uncover substandard practices and problematic weaknesses that commonly result in an overall decrease in the quality of healthcare provided to patients, and negatively affect business operations of hospitals and healthcare facilities. For the purposes of this research the chosen hospital will be categorized as Mid-Western Hospital. This thesis will investigate, in a real world healthcare organization, fault management technologies …


A Clouded Future: Analysis Of Microsoft Windows Azure As A Platform For Hosting E-Science Applications, Ian Blair Nov 2010

A Clouded Future: Analysis Of Microsoft Windows Azure As A Platform For Hosting E-Science Applications, Ian Blair

Regis University Student Publications (comprehensive collection)

Microsoft Windows Azure is Microsoft's cloud based platform for hosting .NET applications. Azure provides a simple, cost effective method for outsourcing application hosting. Windows Azure has caught the eye of researchers in e-science who require parallel computing infrastructures to process mountains of data. Windows Azure offers the same benefits to e-science as it does to other industries. This paper examines the technology behind Azure and analyzes two case studies of e-science projects built on the Windows Azure platform.


A Critical Analysis Of Payload Anomaly-Based Intrusion Detection Systems, Anthony F. Mercurio Oct 2010

A Critical Analysis Of Payload Anomaly-Based Intrusion Detection Systems, Anthony F. Mercurio

Regis University Student Publications (comprehensive collection)

Examining payload content is an important aspect of network security, particularly in today's volatile computing environment. An Intrusion Detection System (IDS) that simply analyzes packet header information cannot adequately secure a network from malicious attacks. The alternative is to perform deep-packet analysis using n-gram language parsing and neural network technology. Self Organizing Map (SOM), PAYL over Self-Organizing Maps for Intrusion Detection (POSEIDON), Anomalous Payload-based Network Intrusion Detection (PAYL), and Anagram are next-generation unsupervised payload anomaly-based IDSs. This study examines the efficacy of each system using the design-science research methodology. A collection of quantitative data and qualitative features exposes their strengths …


Leveraging Information Technology Within A Roman Catholic Diocese, Sidney K. Rodriguez Oct 2010

Leveraging Information Technology Within A Roman Catholic Diocese, Sidney K. Rodriguez

Regis University Student Publications (comprehensive collection)

Parishes within the Roman Catholic Church face many of the same concerns as any other non-profit organization. Dependencies on donations and volunteer help restrict the parish to leverage technology to gain efficiencies. Parishes have an additional concern. Although grouped under a Diocese, this hierarchical structure is not a standard, top-down directive organization. A Roman Catholic Diocese is a "subsidiarity". Decisions are made at the lowest level, specifically; decisions on how to operate and administer the parish are given to the pastor or parish director of that parish. Acknowledging that leveraging technology is a way to gain efficiencies, the ability to …


Database Concepts In A Virtual World, Janet L. Ochs Oct 2010

Database Concepts In A Virtual World, Janet L. Ochs

Regis University Student Publications (comprehensive collection)

This project explored the use of a 3-D virtual world in an introductory database course to reduce the amount of time required to learn database concepts. A Second Life 3-D model was built to clarify database concepts and students used the model to create a Microsoft Access inventory database. Thereafter, the students provided feedback by answering a voluntary survey. Eighty two percent of the students surveyed agreed that the 3-D model clarified terms such as records, tables, primary keys and relationships. Seventy five percent of the students believed that the model reduced the amount of time required to learn these …


Deep Packet Inspection And Its Effects On Net Neutrality, Michael A. Derose Oct 2010

Deep Packet Inspection And Its Effects On Net Neutrality, Michael A. Derose

Regis University Student Publications (comprehensive collection)

Deep packet inspection (DPI) is becoming increasingly important as a means to classify and control Internet traffic based on the content, applications, and users. Rather than just using packet header information, Internet Service Providers are using DPI for traffic management, routing and security. But by being able to control traffic by content, a growing number of public policy makers and users fear ISPs may discriminately charge more for faster delivery of their data, slow down applications or even deny access. They cite such practices as endangering the principle of net neutrality; the premise that all data on the Internet should …


Exploring The Benefits Of Buying Industry Leading It Infrastructure In A Healthcare Setting, Frank Biondolillo Oct 2010

Exploring The Benefits Of Buying Industry Leading It Infrastructure In A Healthcare Setting, Frank Biondolillo

Regis University Student Publications (comprehensive collection)

IT infrastructure leaders are under growing pressure to balance the demand for new and rapidly changing technologies in an era of fixed or declining IT budgets. They must buy wisely, make sure that every infrastructure dollar is spent wisely, and ensure it all fits into a preconceived plan that supports the organization's mission. This research looks at the IT literature, develops a qualitative research methodology and presents findings from a new study of IT infrastructure decision making in the healthcare industry. The findings show that healthcare technology leaders are building critical components of their infrastructure using the top two hardware …


Building Information Objects, Morales Cristobal Velez Oct 2010

Building Information Objects, Morales Cristobal Velez

Regis University Student Publications (comprehensive collection)

In order to stay competitive in today' business environment, organizations must realize data is a key asset that needs to be exploited in order to achieve success. The usual approach to this is the implementation of data warehouses and business intelligence applications. However, most data warehouses are underutilized by decision makers and knowledge workers due to their lack of technical knowledge about what the data represents and how to map it to the semantic business concepts of the enterprise. Through the integration of Information Objects with a Business Intelligence Reporting tool end-users can acquire consolidated view corporate information. Information Objects …


A Data Warehouse Solution Emphasizing The Use In Geographic Information Systems, Catherine Carpenter Oct 2010

A Data Warehouse Solution Emphasizing The Use In Geographic Information Systems, Catherine Carpenter

Regis University Student Publications (comprehensive collection)

This paper will explore use of a data warehouse solution for an electric utility that generates and transmits power across four US states. The pseudonym "Utility" will be used to represent the electric utility for security reasons. At Utility "X" several systems store information that is managed in silos that, in some cases, operate on proprietary database formats. This type of usage is identified as a barrier in the development of an enterprise-wide data source. A data warehouse can ultimately help to bridge the Utility "X" information gap, and provide added accessibility for the company to further develop technology, such …


Towards Establishing A Change Management Process At An Academic Research Laboratory Network, Russell Moult Oct 2010

Towards Establishing A Change Management Process At An Academic Research Laboratory Network, Russell Moult

Regis University Student Publications (comprehensive collection)

This report focuses on the evaluation and development of a change management process for the Regis University Academic Research Network (ARNe), and specifically the SEAD Practicum. The author originally proposed expanding on a security audit performed on the ARNe in 2008, and researched, evaluated and presents several risk assessment methodologies. This broad approach was later focused on the practical aspects of developing a change management process for the ARNe/SEAD Practicum, based on researching applicable standards and best practice guidance. A management questionnaire and user survey were developed and distributed to obtain valuable opinions and perspectives from the individuals most directly …


A Comparative Analysis Of Auditing Within The Healthcare Database, Richard E. Butler Sep 2010

A Comparative Analysis Of Auditing Within The Healthcare Database, Richard E. Butler

Regis University Student Publications (comprehensive collection)

Healthcare database system utilization and processing demands are projected to increase significantly within the next decade due to governmental incentives, regulatory requirements, economic motivators and industry regulations. To that end, system engineers, architects, developers and solution providers will be pressured to meet these varied challenges while achieving or improving current system performance benchmarks. Healthcare database performance related to auditing has received little scholarly attention to date. A comparative analysis of two database auditing architectures is studied to identify efficiencies in auditing architectures within the healthcare domain. This study will explore and analyze native auditing supported by Microsoft's SQL Server 2008 …


Storage Virtualization Promises Agility In The Data Center, Peter Egli Sep 2010

Storage Virtualization Promises Agility In The Data Center, Peter Egli

Regis University Student Publications (comprehensive collection)

Data storage and protection has moved to the forefront of Information Technology solutions because the business value of data has gained in rank and importance in the world of internet commerce. Modern business models are built around instant and continuous data availability and they would not be able to function without this quality. This level of data availability requires data storage technologies to be of increased flexibility and higher performance. However the more sophisticated technologies pose a greater challenge to the architects of data storage solutions who are required to evaluate products of much higher complexity and administrators who need …


Implementing Functionality To Identify And Fix Time Gaps, And Generate Custom Reports And Graphs Will Improve The Analysis, Modification And Reporting Off Tidal Data In Ireland, Shane Galvin Sep 2010

Implementing Functionality To Identify And Fix Time Gaps, And Generate Custom Reports And Graphs Will Improve The Analysis, Modification And Reporting Off Tidal Data In Ireland, Shane Galvin

Regis University Student Publications (comprehensive collection)

The Irish National Tide Gauge Network (ITGN) is ongoing development involving the Marine Institute (MI) and a number of public sector organisations to develop a permanent tidal monitoring infrastructure. As part of this ongoing work the MI wish to be able to analyse the existing ITGN dataset for time gaps, and make changes to the dataset if needed, they would also like to be able to view custom reports and graphs based on the ITGN dataset. This thesis presents a webbased and windows application to meet the aforementioned needs of the Marine Institute and ITGN.


Professional Implications Of Using Online Social Networking Systems By Persons Who Are Blind, Steven A. Kurutz Sep 2010

Professional Implications Of Using Online Social Networking Systems By Persons Who Are Blind, Steven A. Kurutz

Regis University Student Publications (comprehensive collection)

The online social networking (OSN) phenomenon has grown dramatically over the past decade, with websites such as Facebook and Twitter becoming household names. Although a lot of literature exists on online social networking systems, little exists on these systems' practical impact on the offline world, beyond cyberspace. Similarly, little attention has been given to the use of these systems by persons who are blind or have other disabilities. This research attempts to redress this situation by exploring the relationship between the usage of OSN systems and professional achievement for persons who are blind.


Improving Requirements Elicitation By Leveraging The Discipline Of Screenwriting, Albert Gardella Sep 2010

Improving Requirements Elicitation By Leveraging The Discipline Of Screenwriting, Albert Gardella

Regis University Student Publications (comprehensive collection)

As the field of Engineering has expanded, researchers and practitioners have shown increasing interest in the role of high quality Requirements Engineering (RE) in the System Development Life Cycle (SDLC) and its impact in determining project success. Traditionally, the literature has been dominated by an effort to establish a wider acceptance of the scenario based approach. New ideas, however, are emerging within the past decade which shows researchers presenting various ways that narrative storytelling might be applied to the scenario based approach. This project contributes to the latest wave of literature that looks at narrative and the scenario based approach …


The Relationship Of Techies To General Users In Closing The Digital Divide Within Mid-Sized Law Firms, Peter Y. Floyd M. Aug 2010

The Relationship Of Techies To General Users In Closing The Digital Divide Within Mid-Sized Law Firms, Peter Y. Floyd M.

Regis University Student Publications (comprehensive collection)

This empirical case study examined the Digital Divide (the knowledge gaps between General Users and ICT) in the setting of two mid-sized, AV-rated, law firms (252 employees) located in Nevada. Specific attention was focused on the relationships of IT professionals (Techies) to General Users in closing the Digital Divide. A total of 138 respondents were divided into 130 General Users and 8 Techies. Each respondent completed a questionnaire, which was delivered and compiled by FormSpring.com. Most General Users (71%) were female. The most likely to be successful with ICT began using ICT at an early age, reported a high level …


An Examination Of Online Learning Security Requirements Within A Virtual Learning Environment Of An Irish University, Caroline Horan Aug 2010

An Examination Of Online Learning Security Requirements Within A Virtual Learning Environment Of An Irish University, Caroline Horan

Regis University Student Publications (comprehensive collection)

As the adoption of e-learning and need for lifelong learning increases, it is vital the administrator of a virtual learning environment continually ensures reliable and secure data. This case study engaged in the initial steps of analyzing the use and security needs of a virtual learning service within a university of Ireland. The university provided two virtual learning services which were comparatively analyzed, from a security and data protection perspective. In addition, survey results obtained from the university user community for one of the e-learning services were examined. Findings from the study were presented as user security requirements and recommendations, …


A Framework For The Automatic Physical Configuration And Tuning Of A Mysql Community Server, Kevin Spillane Aug 2010

A Framework For The Automatic Physical Configuration And Tuning Of A Mysql Community Server, Kevin Spillane

Regis University Student Publications (comprehensive collection)

Manual physical configuration and tuning of database servers, is a complicated task requiring a high level of expertise. Database administrators must consider numerous possibilities, to determine a candidate configuration for implementation. In recent times database vendors have responded to this problem, providing solutions which can automatically configure and tune their products. Poor configuration choices, resulting in performance degradation commonplace in manual configurations, have been significantly reduced in these solutions. However, no such solution exists for MySQL Community Server. This thesis, proposes a novel framework for automatically tuning a MySQL Community Server. A first iteration of the framework has been built …


Sql Injection Attacks And Countermeasures: A Survey Of Website Development Practices, Evan Ryder Aug 2010

Sql Injection Attacks And Countermeasures: A Survey Of Website Development Practices, Evan Ryder

Regis University Student Publications (comprehensive collection)

This study involved the development and subsequent use of a bespoke SQL Injection vulnerability scanner to analyze a set of unique approaches to common tasks, identified by conducting interviews with developers of high-traffic Web sites. The vulnerability scanner was developed to address many recognized shortcomings in existing scanning software, principal among which were the requirements for a comprehensive yet lightweight solution, with which to quickly test targeted aspects of online applications; and a scriptable, Linux-based system. Emulations of each approach were built, using PHP and MySQL, which were then analyzed with the aid of the bespoke scanner. All discovered vulnerabilities …


Layered Security Solutions Over Dependency Within Any Layer, Olga H. Brandt Aug 2010

Layered Security Solutions Over Dependency Within Any Layer, Olga H. Brandt

Regis University Student Publications (comprehensive collection)

Considering the advancement of computer systems and security solutions available in today's constantly changing world, there are various philosophies as to what is required (or adequate) in order to protect a system. This investigative study proposed to explore a possible problem with employing a layered security solution\ over dependence or reliance on any layer. A risk analysis was performed to determine where over dependence or reliance could happen and what could be done to prevent this. Various reviews and other findings online were researched and the data compiled using a qualitative methodology. Lastly, a recommendation is made on what is …


Requirement Specification Stage Of The Project Lifecycle Of Computerized Systems & The Standards That Can Be Implemented, Nicola Grace Aug 2010

Requirement Specification Stage Of The Project Lifecycle Of Computerized Systems & The Standards That Can Be Implemented, Nicola Grace

Regis University Student Publications (comprehensive collection)

Understanding requirement specifications was an integral part of information systems design and was critical to the success of interactive systems. However, specifying these requirements was not simple to achieve. This research, including a literature review, describes general methods to support requirement specification analysis that can be adapted into a range of situations in accordance with relevant standards. The main techniques discussed were risk management, stage-based lifecycle models and frameworks. Additionally, as part of the methodology and project history, the methods for implementation, process improvements and schedule of the research was examined. A case study with statistical analysis was described to …


Web 2.0 Technologies Within A Higher Education Online Database Practicum Supporting A New Collaborated Methodology, Sandra Blackman Aug 2010

Web 2.0 Technologies Within A Higher Education Online Database Practicum Supporting A New Collaborated Methodology, Sandra Blackman

Regis University Student Publications (comprehensive collection)

Since the introduction of Web 2.0 technologies in 2004, computer based communication has evolved adding a new dimension to formal and informal knowledge sharing. Focusing on Web 2.0 technologies Facebook and Twitter, this case study researches the use of these tools to enhance a higher education online database practicum environment. This paper presents practical methodologies that can be used to incorporate Web 2.0 technologies to support knowledge sharing in a distance learning database practicum.


The Effects Of Information Technology Processes On Computerized Clinical Decision Support Systems, Shari Valenta Jul 2010

The Effects Of Information Technology Processes On Computerized Clinical Decision Support Systems, Shari Valenta

Regis University Student Publications (comprehensive collection)

One of the most significant challenges facing healthcare executives today is investing in clinical decision support systems (CDSS) that can support diverse data and decision making needs of physicians and managers to accomplish their organization's mission. The Health Information Technology for Economic and Clinical Health Act provisions of the American Recovery and Reinvestment Act economic stimulus package have brought billions of dollars in incentive funds for CDSS and other healthcare information technology. CDSS can help healthcare organizations automate inefficient processes, lower costs and improve patient care with better decision making. Risks, however are that pre-implementation and customization of CDSS can …


Driving Retail Sales Through Effective Supply Chain Management Technology, James Haws Jul 2010

Driving Retail Sales Through Effective Supply Chain Management Technology, James Haws

Regis University Student Publications (comprehensive collection)

Supply chain management coordinates the production and distribution of a product with the goal of increasing profitability and productivity. Advancements in technology and workflows in recent years have enabled distributors, suppliers, and retailers to operate more efficiently and effectively. Although significant technological advancements have been made in supply chain management, inventory management still causes a number of problems for retailers. The average out-of -stock rate nationally is approximately at an 8% level (Corsten & Gruen, 2003). Inadequate inventory management can reduce retail sales, drive up costs associated with transportation and storage, decrease customer loyalty, and ultimately lead to a significant …


Prism: The Development Of An Online Repository For Information Security Education Resources, Vincent Garramone Jul 2010

Prism: The Development Of An Online Repository For Information Security Education Resources, Vincent Garramone

Regis University Student Publications (comprehensive collection)

The goal of this study was to develop, implement and evaluate an online system that would allow intuitive sharing and retrieval of information security (IS) education materials, and a corresponding taxonomic system relevant to common contexts in which IS concepts are taught. After determining initial requirements, popular open-source content management systems were evaluated. The most suitable solution was customized, and implemented as the Public Repository for Information Security Material (PRISM) website. An initial organizational taxonomy was developed, and the repository was populated with resources from several sources. Evaluations of PRISM suggest that core functionalities have been suitably designed and implemented, …


Social Networking Privacy: A Qualitative Study Of The Risks And Effects Of Sharing Data To A Global Environment Via Facebook, Bryan L. Mack Jul 2010

Social Networking Privacy: A Qualitative Study Of The Risks And Effects Of Sharing Data To A Global Environment Via Facebook, Bryan L. Mack

Regis University Student Publications (comprehensive collection)

Young women have placed themselves at risk by disclosing private and sensitive data on their Facebook accounts. Privacy settings which can help prevent unauthorized access of this data exist, but some women choose to ignore them. This study is an attempt to gain an understanding of this phenomenon and answer the question of why young women choose to share personal information. Qualitative interviews of college students were conducted and the results interpreted in this paper. The results of this interview are intended to supply research for future studies which aim to minimize problems caused to individuals who choose to share …