Repository logo
 

Technology Systems

Permanent URI for this collectionhttp://hdl.handle.net/10342/45

Browse

Recent Submissions

Now showing 1 - 20 of 53
  • ItemOpen Access
    Type II Workplace Violence in the Service Providing Industries: An Exploratory Study
    (East Carolina University, July 2024) Ranger, Tavia
    Type II workplace violence is any form of threat or physical violence between an employee and clients/customers on the job site. The aim of this thesis is to investigate and highlight workplace violence in service providing industries. This study began when it was evident that there was not enough literature review on this sector and different types of workplace violence are encountered or the effects withing the service providing industry. Considering this topic may be sensitive and personal, qualitative analysis was used to collect data in a space where voluntary participation that were recruited from TikTok felt comfortable to share their experiences. Transcribed data from interviews were analyzed by NVivo 14 software and Shepperd et al. (2022) systems thinking workplace violence framework based off Rasmussen’s Risk Management Framework (Rasmussen, 1997). Results indicated that the service providing industry is exposed to constant verbal, physical, and sexual harassment which can be influenced by age, gender, and/or assumed socio-economic status. Hence, some employees not only expect these behaviors from customers but think it is a norm in the respective work sectors of customer service, hospitality, educators, and public sector. With the hopes of future research this study aims to contribute to develop safer environment, proactive measures to protect employees from violence, and its possible adverse effects.
  • ItemOpen Access
    Artificial Intelligence-based Access Management System
    (East Carolina University, 2023-04-27) Adenola, Victoria
    The foundation of cybersecurity is identity and access management (IAM). Its methods, procedures, and guidelines control identity access to digital resources and define the scope of identity permission over the resources. Every week, a new data breach or cyber threat is reported. A significant number of data breaches are caused by ineffective security features, software vulnerabilities, human error, malicious insiders, and the misappropriation of access and privileges. Artificial intelligence (AI) techniques can upgrade the access management system. As a result, research into artificial intelligence in IAM is required to enable organizations to take a more detailed and flexible approach to authentication and access control to mitigate cyber threats and other IAM challenges. This study explores the relationship between access management systems and artificial intelligence with regard to AI applications in identity and access management, specifically the monitoring, administration, and control of access privileges. The objective of this study was to provide evidence from the relevant literature to help understand how AI works in mitigating identified IAM challenges. The findings in this study demonstrate how artificial intelligence strengthens identity and access management in mitigating growing cyber threats, automating processes, and keeping up with technological advancements.
  • ItemOpen Access
    A Global Supply Network Design Model: A Resilient Management Approach
    (2021) Das, Kanchan; Annand, Adarsh; Ram, Mangey
  • ItemRestricted
    EVALUATION OF PHISHING ATTACKS AGAINST A HIGHER EDUCATION PUBLIC INSTITUTION
    (East Carolina University, 2022-04-22) Olson, Craig
    While security vendors have documented trends in phishing attacks across numerous industries, there remains a gap in available data for phishing attacks against higher education institutions.  This researcher studied phishing attacks delivered over the course of one year against the University of North Carolina at Charlotte. Research questions include: What were the component characteristics of phishing attacks against the university?  Which phishing attacks were successful? What possible countermeasures can be implemented to prevent such attacks? A Phishing Susceptibility Framework is proposed; the framework has two main sections – the Attacker Gambit that exhibits motivation and methodology, and the Victim Profile that reveals victim susceptibility and root weaknesses. Each section has three main elements that illustrate core components affecting the efficacy of a phishing attack. The purpose of this framework is to identify vulnerable end user segments as risk flash points for management to be aware of when safeguarding against phishing attacks. Results of the study determined attacker motivation skewed heavily toward financial gain and Business Email Compromise gift card attacks were most effective. Multivariate analysis determined Authority, Kindness and Urgency stressors all had positive correlation with compromised users and we concluded that a combination of these stressors indicated an improved efficacy of BEC gift card gambits against susceptible end users within the organization. This research contributes to the overall body of knowledge specific to phishing attacks against a higher education institution and provides valuable information for other higher education institutions which are likely to see similar attacks.
  • ItemOpen Access
    SURVEY OF SOCIAL ENGINEERS AND THE VALIDITY OF DEFENSIVE TECHNIQUES
    (East Carolina University, 2022-05-12) Austin, Adrian D
    In the context of information technology, social engineering is a nexus of computers and humans. Defenders need to know how hackers and other deviant actors attempt to interact with users. Social engineers are sometimes the professionals who perform deviant behavior for a positive purpose to assist users in knowing what to look for when another actor performs a deviant act for fraudulent purposes. The purpose of this research was to ask questions of social engineers on both sides of the rule of law to determine if the current defensive techniques used to protect against deviant actors are having a positive effect on defense against said actors. The project utilized an Internet-based mixed methods survey sent to social engineers found using Reddit, a social media site. The project was begun with a series of questions devised to reduce the project's scope further. The questions were left with open-ended sections to allow for further research later. The questions were then placed in a survey created in Redcap, a program designed for distributing surveys included on the Internet. The social media site Reddit was chosen to distribute the survey. This was due in part to the Reddit being one of the world's top visited sites and the groups that were surveyed tended towards being more deviant than others based on the subject matter viewed. The survey was conducted for 2 months, and only 12 partial surveys were completed, at which point an interview was conducted with a person from the National Institute of Standards and Technology (NIST). Per the interview, it was determined that the main reason the survey did not succeed was due in part to the lack of being known in the community. Paraphrasing Stewart (2003), Borum (2010), and Karlins & Navarro (2008), a person known in the community of social engineers would have had a better chance of getting completed surveys. Much of this interpersonal trust would have come due to in-group status and the theory of trust transfer. The idea behind in-group status is that one would interact with the group to be surveyed; the researcher would then be seen as part of the group and not an interloper. Trust transfer theory is a concept that has been used in the consumer market for a while. This idea is that if a party trusts another person or entity and the new person or entity is associated with something already trusted, some of the trust can be transferred to the new entity. Trust transfer theory and in-group status contributed to the potential responders not completing the survey. Future research on this topic should endeavor to obtain in-group status before continuing; for a future researcher, this may take months to years to achieve.
  • ItemOpen Access
    Mobile Device Management Policy
    (2022-04-08) Meadows, Sydney
    The use of mobile devices in the workplace has grown significantly over the years. Most adults do not leave home without their phones, laptops, tablets, or other portable media devices. With this expansion, there needed to be a policy put in place to protect those devices from cybersecurity threats and threats that can occur. This is how the Mobile Device Management (MDM) Policy was created and has been implemented and most companies throughout the world. In this paper, I will go into depth about the MDM policy and why it is important in today's world of technology, especially within the workplace.
  • ItemOpen Access
    The Dangers of Online Shopping
    (2022-04-19) Meadows, Sydney
    Online shopping has become a crucial part of society in today’s age of technology. Many of us face identity theft, credit card theft, and more just by putting our personal information on shopping websites. Downloading things like VPNs, Antivirus Software, and Firewalls is one of many ways you can stay safe while surfing the internet and buying things online. Even what we think are secure sites like Amazon, have hackers constantly looking for loopholes in their sites. For this project, I will explain what makes online shopping dangerous, what can help you stay safe while shopping, and ways to prevent information theft while shopping in the future.
  • ItemOpen Access
    Is Digital Piracy a Crime?
    (2022-04-19) Sutton, Raegine
    Digital piracy is the unauthorized illegal copying and distribution of digital copyrighted content. Copyrighted content refers to Intellectual Property. Property that consist of intangible creations of the human intellect. Individuals that download songs, movies, and art from a website for free are committing digital piracy. For instance, watching a video on YouTube and transferring the URL to a MP3 converter on a different website and converting it to an MP3 music file for free is illegal. There are numerous names for digital piracy depending on the specific type of content being copied and distributed however this paper will examine digital piracy as a whole. The paper will begin with introducing digital piracy. Then the psychological aspects of digital piracy, why people choose to do it. The paper will then discuss the dangers and attacks associated with digital piracy. Lastly, it will discuss the consequences, solutions, and end with a conclusion on digital piracy.
  • ItemOpen Access
    Protecting Yourself from Targeted Ransomware
    (2022-04-19) Alston, Marcus
    In the Dynamic Environment we live in today, there are many devices that are becoming obsolete. They are becoming ancient with the times and many new technologies are trending in a rapid rate. However, some of these new devices have threats that are advanced. One of these new threats is called targeted ransomware. Targeted Ransomware is a new cyber threat that could possibly create issues in a business or in an organization. In this essay we will be going over the effects of Targeted Ransomware, the Dynamic and Functionality of Targeted Ransomware and what are some preventive measures that are being created to prevent Ransomware.
  • ItemOpen Access
    The Impact of Hands-On Simulation Laboratories on Teaching of Wireless Communications
    (2017-01-01) Chou, Te-Shun, 1964-; Vanderbye, Aaron
  • ItemOpen Access
    IPV6 Diffusion on the Internet Reaches a Critical Point
    (2018-02) Chou, Te-Shun; Pickard, John; Angolia, Mark
  • ItemOpen Access
    Technology Attributes, Organizational Learning Attributes, Service Attributes, and Electronic Health Record Implementation Success
    (2020-07) RANGARAJAN, ANURADHA
    Electronic Health Record (EHR) is a technology innovation which has the potential to offer valuable benefits to the healthcare industry such as improved quality of patient care and safety, optimization of healthcare workflow processes and availability of electronic data for clinical research. The implementation success of EHR is therefore significant to the healthcare industry in the United States and around the world. Prior studies in research literature have considered the impact of technology attributes, organizational learning attributes, and service attributes on information technology implementations in various other domains based on theories such as Theory of Reasoned Action (TRA), Theory of Planned Behavior (TRB) and Technology Acceptance Model (TAM), but none have considered their association with implementation success in a comprehensive manner within a single study pertaining to the healthcare domain as this study does. Hence, this study addresses an essential research gap. The approach used by this study in conducting the research based on a multi-factor research model (including the aforementioned attributes) is consistent with the general method used by academic researchers whereby the ability of a unique and selective list of factors to predict certain outcomes is leveraged. The data for this research study was collected using a questionnaire survey instrument based on the Likert scale. Structural Equation Modeling (SEM) was used for data analysis due to the presence of latent variables in the research model. The results of the statistical analyses support the hypotheses confirming positive associations between technology attributes (ease of use, result demonstrability, performance expectancy), organizational learning attributes (organizational learning capability, organizational absorptive capacity), service attributes (service-dominant orientation), and EHR implementation success. The results of this study are of importance to both academicians and practitioners.
  • ItemOpen Access
    Research of Leadership Qualities Exhibited by Female Leaders'
    (East Carolina University, 2020-12-03) Isenhour, Leslie
    What does it take to be a new leader in technology? The idea that it takes one specific attribute over another begs to question, what attributes are most important? The research within this thesis will argue that some attributes stand out among all leaders. This report will also explore a current and cultural perspective of female leadership in technology by spotlighting the successes of a select group of women. These successes will provide insight into additional traits that female technology leaders will have to exhibit to achieve the same level of success as their male counterparts. Finally, the report will summarize the quality attributes that will prepare tomorrow's female workforce to even the playing field in technological leadership roles.
  • ItemOpen Access
    Evaluation of Underreporting of Work-Related Injuries and Illnesses in the United States Military
    (East Carolina University, 2020-06-22) O'Connell, Floyd
    The purpose of the research was to characterize underreporting of occupational illnesses and injuries among the United States (U.S.) military veterans. The researcher interviewed 100 U.S. veterans and 100 U.S. civilians. A semi-structured interview questionnaire was used to collect both qualitative and quantitative data in an effort to identify the causes of underreporting of injuries and illnesses among U.S. military veterans. A similar survey evaluated U.S. civilians' perceptions and experience of underreporting of injuries and illnesses and allowed for comparison. Due to the lack of empirical research on employee underreporting, the questions were derived from literature reviews, reflections with the thesis committee, and the researcher's life experiences as a U.S. Disabled Veteran. The surveys were designed so that they could help answer and measure the three research questions that the researcher had. The researcher wanted to know to what degree is underreporting occurring in the military. Secondly, does underreporting of work-related injuries and illnesses continue after the military. Finally, is underreporting of work-related injuries and illnesses higher during the military or after the military. The surveys, which were conducted through in-person and telephone interviews, focused on understanding the participants' experience related to incentive programs, fear of reporting, and the stigma associated with reporting. The research showed that underreporting is a significant problem in the military and different factors can influence how often it happens. Underreporting in the U.S. workforce was less than the military, but it was still higher than expected. The research also showed that different factors influence underreporting in the military when compared to the U.S. workforce.
  • ItemOpen Access
    GOAL SETTING AND UNETHICAL BEHAVIOR: IMPLICATIONS FOR OCCUPATIONAL SAFETY AND HEALTH AND THE SAFETY INCENTIVE PROGRAM
    (East Carolina University, 2020-06-22) Judge, Korin
    Goal setting is a popular and often beneficial tool used to motivate workers worldwide. Recent research has revealed that negative side-effects including unethical behavior are associated with goal setting. In occupational safety and health (OSH), injury reduction goals are regularly used within safety incentive programs (SIP) or as standalone practice. Unethical behavior in the form of failing to report injury or illness is possible and its consequences severe: inaccurate data leads to incorrect allocation of resources for worker protection and in turn, more injury and illness. To investigate any link between OSH goal setting and injury reporting, anonymous surveys and interviews collecting worker experiences were compiled within various industries. An analysis of 31 responses using Fisher's Exact Test revealed statistically significant associations: participants whose organizations used injury-reduction goals reported that coworkers failed to report injuries more often than workers whose organizations did not use such goals. Instances of non-reporting due to incentives, coworker or supervisor disapproval as well as informal disciplinary action were associated more strongly with organizations that used goal setting than those that did not. More research into why these specific factors discourage injury reporting in the presence of goal setting is needed in order to potentially mitigate their effects.