Organizational Unit:
Technology Systems

Loading...
OrgUnit Logo

Date established

City

Country

ID

ROR Identifier

Publications

Item type:Publication, Access status: Restricted ,
EVALUATION OF PHISHING ATTACKS AGAINST A HIGHER EDUCATION PUBLIC INSTITUTION
(East Carolina University, 2022-04-22) Olson, Craig
While security vendors have documented trends in phishing attacks across numerous industries, there remains a gap in available data for phishing attacks against higher education institutions.  This researcher studied phishing attacks delivered over the course of one year against the University of North Carolina at Charlotte. Research questions include: What were the component characteristics of phishing attacks against the university?  Which phishing attacks were successful? What possible countermeasures can be implemented to prevent such attacks? A Phishing Susceptibility Framework is proposed; the framework has two main sections – the Attacker Gambit that exhibits motivation and methodology, and the Victim Profile that reveals victim susceptibility and root weaknesses. Each section has three main elements that illustrate core components affecting the efficacy of a phishing attack. The purpose of this framework is to identify vulnerable end user segments as risk flash points for management to be aware of when safeguarding against phishing attacks. Results of the study determined attacker motivation skewed heavily toward financial gain and Business Email Compromise gift card attacks were most effective. Multivariate analysis determined Authority, Kindness and Urgency stressors all had positive correlation with compromised users and we concluded that a combination of these stressors indicated an improved efficacy of BEC gift card gambits against susceptible end users within the organization. This research contributes to the overall body of knowledge specific to phishing attacks against a higher education institution and provides valuable information for other higher education institutions which are likely to see similar attacks.
Item type:Publication, Access status: Open Access ,
Item type:Publication, Access status: Open Access ,
A Global Supply Network Design Model: A Resilient Management Approach
(2021) Das, Kanchan; Annand, Adarsh; Ram, Mangey
Item type:Publication, Access status: Open Access ,
Artificial Intelligence-based Access Management System
(East Carolina University, 2023-04-27) Adenola, Victoria
The foundation of cybersecurity is identity and access management (IAM). Its methods, procedures, and guidelines control identity access to digital resources and define the scope of identity permission over the resources. Every week, a new data breach or cyber threat is reported. A significant number of data breaches are caused by ineffective security features, software vulnerabilities, human error, malicious insiders, and the misappropriation of access and privileges. Artificial intelligence (AI) techniques can upgrade the access management system. As a result, research into artificial intelligence in IAM is required to enable organizations to take a more detailed and flexible approach to authentication and access control to mitigate cyber threats and other IAM challenges. This study explores the relationship between access management systems and artificial intelligence with regard to AI applications in identity and access management, specifically the monitoring, administration, and control of access privileges. The objective of this study was to provide evidence from the relevant literature to help understand how AI works in mitigating identified IAM challenges. The findings in this study demonstrate how artificial intelligence strengthens identity and access management in mitigating growing cyber threats, automating processes, and keeping up with technological advancements.
Item type:Publication, Access status: Open Access ,
Type II Workplace Violence in the Service Providing Industries: An Exploratory Study
(East Carolina University, July 2024) Ranger, Tavia
Type II workplace violence is any form of threat or physical violence between an employee and clients/customers on the job site. The aim of this thesis is to investigate and highlight workplace violence in service providing industries. This study began when it was evident that there was not enough literature review on this sector and different types of workplace violence are encountered or the effects withing the service providing industry. Considering this topic may be sensitive and personal, qualitative analysis was used to collect data in a space where voluntary participation that were recruited from TikTok felt comfortable to share their experiences. Transcribed data from interviews were analyzed by NVivo 14 software and Shepperd et al. (2022) systems thinking workplace violence framework based off Rasmussen’s Risk Management Framework (Rasmussen, 1997). Results indicated that the service providing industry is exposed to constant verbal, physical, and sexual harassment which can be influenced by age, gender, and/or assumed socio-economic status. Hence, some employees not only expect these behaviors from customers but think it is a norm in the respective work sectors of customer service, hospitality, educators, and public sector. With the hopes of future research this study aims to contribute to develop safer environment, proactive measures to protect employees from violence, and its possible adverse effects.

Description

Search Results