Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Data Science (2)
- Analytical, Diagnostic and Therapeutic Techniques and Equipment (1)
- Applied Ethics (1)
- Artificial Intelligence and Robotics (1)
- Arts and Humanities (1)
-
- Bioethics and Medical Ethics (1)
- Communication (1)
- Databases and Information Systems (1)
- Equipment and Supplies (1)
- Information Security (1)
- Medicine and Health Sciences (1)
- Other Analytical, Diagnostic and Therapeutic Techniques and Equipment (1)
- Other Philosophy (1)
- Philosophy (1)
- Social Media (1)
- Social and Behavioral Sciences (1)
- Software Engineering (1)
- Theory and Algorithms (1)
Articles 1 - 3 of 3
Full-Text Articles in Other Computer Sciences
Algorithmic Bias: Causes And Effects On Marginalized Communities, Katrina M. Baha
Algorithmic Bias: Causes And Effects On Marginalized Communities, Katrina M. Baha
Undergraduate Honors Theses
Individuals from marginalized backgrounds face different healthcare outcomes due to algorithmic bias in the technological healthcare industry. Algorithmic biases, which are the biases that arise from the set of steps used to solve or analyze a problem, are evident when people from marginalized communities use healthcare technology. For example, many pulse oximeters, which are the medical devices used to measure oxygen saturation in the blood, are not able to accurately read people who have darker skin tones. Thus, people with darker skin tones are not able to receive proper health care due to their pulse oximetry data being inaccurate. This …
Identifying Social Media Users That Are Susceptible To Phishing Attacks, Zoe Metzger
Identifying Social Media Users That Are Susceptible To Phishing Attacks, Zoe Metzger
Undergraduate Honors Theses
Phishing scams are a billion-dollar problem. According to Threatpost, in 2020, business email compromise phishing attacks cost the US economy $ 1.8 billion. Social media phishing scams are also on the rise with 74% of companies experiencing social media attacks in 2021 according to Proofpoint. Educating users about phishing scams is an effective strategy for reducing phishing attacks. Despite efforts to combat phishing, the number of attacks continues to rise, likely indicative of a reticence of users to change online behaviors. Existing research into predicting vulnerable social media users that are susceptible to phishing mostly focuses on content analysis of …
Rbac Attack Exposure Auditor. Tracking User Risk Exposure Per Role-Based Access Control Permissions, Adelaide Damrau
Rbac Attack Exposure Auditor. Tracking User Risk Exposure Per Role-Based Access Control Permissions, Adelaide Damrau
Undergraduate Honors Theses
Access control models and implementation guidelines for determining, provisioning, and de-provisioning user permissions are challenging due to the differing approaches, unique for each organization, the lack of information provided by case studies concerning the organization’s security policies, and no standard means of implementation procedures or best practices. Although there are multiple access control models, one stands out, role-based access control (RBAC). RBAC simplifies maintenance by enabling administrators to group users with similar permissions. This approach to managing user permissions supports the principle of least privilege and separation of duties, which are needed to ensure an organization maintains acceptable user access …