Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2011

Theses/Dissertations

Regis University MSCIS thesis

Articles 1 - 8 of 8

Full-Text Articles in Physical Sciences and Mathematics

Use Of Service Oriented Architecture For Scada Networks, Scott H. Beavers May 2011

Use Of Service Oriented Architecture For Scada Networks, Scott H. Beavers

Regis University Student Publications (comprehensive collection)

Supervisory Control and Data Acquisition (SCADA) systems involve the use of distributed processing to operate geographically dispersed endpoint hardware components. They manage the control networks used to monitor and direct large-scale operations such as utilities and transit systems that are essential to national infrastructure. SCADA industrial control networks (ICNs) have long operated in obscurity and been kept isolated largely through strong physical security. Today, Internet technologies are increasingly being utilized to access control networks, giving rise to a growing concern that they are becoming more vulnerable to attack. Like SCADA, distributed processing is also central to cloud computing or, more …


Understanding Data Within The Enterprise To Control Or Reduce Data Storage Growth, Anthony Daubenmerkl Apr 2011

Understanding Data Within The Enterprise To Control Or Reduce Data Storage Growth, Anthony Daubenmerkl

Regis University Student Publications (comprehensive collection)

Data is collected from a number of entities within the business environment; it is the essential component that guides the decision making process. Data management is a topic that continues to be discussed as our ability to collect and store data expands. The purpose of this study was to determine whether the data, in the context of the enterprise and its management, was understood allowing best practice data collection and storage policies to be defined. Data collection and storage are tightly coupled in the discussion of storage growth. The literature review showed that a number of data management lifecycles and …


Towards A Framework For Maintaining Defensibility In Encrypted Network Environments, John Prewett Apr 2011

Towards A Framework For Maintaining Defensibility In Encrypted Network Environments, John Prewett

Regis University Student Publications (comprehensive collection)

Network security professionals improve confidentiality and integrity of information technology resources when they incorporate encryption schemes into the transmission of network packets across their respective infrastructures. Ironically, network engineers and administrators that incorporate encryption strategies across their infrastructures must simultaneously confront the limitations of end-to-end encrypted network packets inasmuch as they severely impair visible, defensible network architectures. This project demonstrates how security professionals charged with maintaining network visibility can deploy encryption across their topologies without fear of compromising their ability to capture – then fully analyze – network traffic. In so doing, information technology industry practitioners and researchers may confidently …


A Qualitative Study To Explore The Low Number Of Women In Information Technology In The United States, William Baker Apr 2011

A Qualitative Study To Explore The Low Number Of Women In Information Technology In The United States, William Baker

Regis University Student Publications (comprehensive collection)

The number of women in Information Technology in the United States has historically been lower than the number of men in the field. This study explores the reasons behind this disparity and recommends steps that can be taken to increase the number of women in the field. This qualitative study examines why women are not attracted to the Information Technology field and examines reasons why women leave the field. Surveys were conducted with two populations, (1) women who currently work in Information Technology and (2) Information Technology recruiters. The results of these surveys were analyzed to see if there were …


Evaluating Best Practices In Document Management, Angela Lokie Apr 2011

Evaluating Best Practices In Document Management, Angela Lokie

Regis University Student Publications (comprehensive collection)

The purpose of this research is to create a knowledgebase of best practices for records managers to select the vendor that best fits the individual needs of the organization. Investigative interviews were conducted with individuals from Association for Information and Image Management (AIIM) and the Project Management Institute (PMI). These project managers were asked questions in regards to the best practices when implementing a document management system. Best practices are relevant when implementing a document management solution. In order to consider best practices when implementing a document management solution, the following research objectives will be taken into consideration: How do …


Service Delivery Utilizing Wireless Technology Within The Air Traffic Control Communication And Navigation Domain To Improve Positioning Awareness, Samuel Durbin Apr 2011

Service Delivery Utilizing Wireless Technology Within The Air Traffic Control Communication And Navigation Domain To Improve Positioning Awareness, Samuel Durbin

Regis University Student Publications (comprehensive collection)

Current air traffic levels around the world have pushed the enterprise architecture deployed to support air traffic management to the breaking point. Technology limitations prevent expansion of the current solutions to handle rising utilization levels without adopting radically different information delivery approaches. Meanwhile, an architectural transition would present the opportunity to support business and safety requirements that are not currently addressable. The purpose of this research paper is to create a framework for more effectively sharing positioning information utilizing improved air traffic control navigation and communication systems.


A Methodology For Capturing Tacit Knowledge Within The Defense Industry, Stephen M. Dokus Apr 2011

A Methodology For Capturing Tacit Knowledge Within The Defense Industry, Stephen M. Dokus

Regis University Student Publications (comprehensive collection)

This study looks at the knowledge management practices used by study participants from the defense industry and offers a methodology for capturing tacit knowledge. Interviews were conducted with stakeholders involved in work teams focused on the development and acquisition of defense systems. Those interviewed held various staff and management positions in Program Management (PM), Enterprise Architecture (EA), and system safety auditing. This researcher conducted primary research in the form of a Case Study. Interviewees in the defense industry supporting the Army, Marine Corps and Military aeronautics were interviewed and asked to provide feedback on their experiences and knowledge of tacit …


Mandated Government Regulations In Healthcare: Is Healthcare It Overregulated? A Post Mandate Study, Mark Albright Mar 2011

Mandated Government Regulations In Healthcare: Is Healthcare It Overregulated? A Post Mandate Study, Mark Albright

Regis University Student Publications (comprehensive collection)

Over the past decade, healthcare organizations have been subjected to many federally mandated statutes to comply with. Three of the biggest statutes over the last decade are the Health Information Portability and Accountability Act (HIPAA), the Red Flag Rules, and the Health Information Technology for Clinical Health (HITECH). These mandates deal directly with the security of electronic patient information. To date, many entities have provided estimations of cost of compliance. Some have provided quantitative models to calculate the return of IT investments. Very few have attempted to look retrospectively and determine the level of and barriers to compliance. This quantitative …