21. The Potential Role of Cyber-liability Insurance In Data Breach Litigation Open Access Author: Mccoy, Eric S Title: The Potential Role of Cyber-liability Insurance In Data Breach Litigation Area of Honors: Security and Risk Analysis Keywords: cyber lawISACinsuranceliabilityriskinformation securityinformation technologydata breach File: Download Final_Thesis_Eric_McCoy_4-12Edits.pdf Thesis Supervisors: John Watson Bagby, Thesis SupervisorMarc Aaron Friedenberg, Thesis Honors Advisor
22. A New Wave of Terror: An Analysis of Current Trends in Terrorism and the Death of Religious Extremism Open Access Author: Richards, Adelina Lynn Title: A New Wave of Terror: An Analysis of Current Trends in Terrorism and the Death of Religious Extremism Area of Honors: Security and Risk Analysis Keywords: risk analysisterrorismclashofcivilizationscultureanti-government terrorismwaves File: Download Richards.Adelina_SRA_Thesis_4-13.pdf Thesis Supervisors: Donald Richard Shemanski, Thesis SupervisorDonald Richard Shemanski, Thesis Honors AdvisorDr. Edward J Glantz, Faculty Reader
23. Comparing the Evolution of Counter-terrorism Responses in the United States (U.S.) and United Kingdom (U.K.) Open Access Author: Showan, Nathan Daniel Title: Comparing the Evolution of Counter-terrorism Responses in the United States (U.S.) and United Kingdom (U.K.) Area of Honors: Security and Risk Analysis Keywords: United StatesUnited KingdomCounter terrorismTerrorismresponseincident commandpolice investigationlegislative changesterrorist events File: Download Showan-Nathan-US-UK-CounterTerrorismResponses__V-F_.pdf Thesis Supervisors: Peter Kent Forster, Thesis SupervisorDr. Edward J Glantz, Thesis Honors Advisor
24. MOTIVATIONS AND ENABLERS PRESENT IN DECEPTION OPERATIONS: HISTORICAL CASE STUDY EXAMPLE - OPERATION FORTITUDE Open Access Author: Eberhardt, Gabrielle Patricia Title: MOTIVATIONS AND ENABLERS PRESENT IN DECEPTION OPERATIONS: HISTORICAL CASE STUDY EXAMPLE - OPERATION FORTITUDE Area of Honors: Security and Risk Analysis Keywords: deceptionentitiesmotivationsbiasesenablersOperation FORTITUDEexploitawarevulnerable File: Download GETHESIS2018.pdf Thesis Supervisors: Jacob Lehner Graham, Thesis SupervisorDinghao Wu, Thesis Honors Advisor
25. Data Fusion of Security Logs to Measure Critical Security Controls to Increase Situation Awareness Open Access Author: Kennedy, Matthew Title: Data Fusion of Security Logs to Measure Critical Security Controls to Increase Situation Awareness Area of Honors: Security and Risk Analysis Keywords: metricssecurity metricsdata fusionsituation awarenessjdlsecurity logscybersecurity File: Download Final_Kennedy_SHC_2018.pdf Thesis Supervisors: Nicklaus A Giacobe, Thesis SupervisorDinghao Wu, Thesis Honors Advisor
26. Polymorphic Homework and Laboratory System: An Instructional Tool for Combating Cheating Open Access Author: Kohler, Ryan J Title: Polymorphic Homework and Laboratory System: An Instructional Tool for Combating Cheating Area of Honors: Security and Risk Analysis Keywords: CybersecurityEducationCheatingSituation AwarenessChallenge-Based LearningPolymorphism File: Download kohler.r-SHC_Thesis.pdf Thesis Supervisors: Nicklaus A Giacobe, Thesis SupervisorDinghao Wu, Thesis Honors Advisor
27. Understanding the Reproducibility of Crowd-reported Security Vulnerabilities Open Access Author: Cuevas Villalba, Alejandro Ed Title: Understanding the Reproducibility of Crowd-reported Security Vulnerabilities Area of Honors: Security and Risk Analysis Keywords: vulnerabilitycvedatasetreproducibilityuser-studyreport File: Download alejandro_cuevas-thesis.pdf Thesis Supervisors: Peng Liu, Thesis SupervisorDinghao Wu, Thesis Honors Advisor
28. SPREADING AWARENESS OF SEX TRAFFICKING IN PENNSYLVANIA AND ONLINE Open Access Author: Callaghan, Daniella F Title: SPREADING AWARENESS OF SEX TRAFFICKING IN PENNSYLVANIA AND ONLINE Area of Honors: Security and Risk Analysis Keywords: Sex TraffickingPennsylvaniaBackpage.com File: Download SPREADING_AWARENESS_OF_SEX_TRAFFICKING_IN_PENNSYLVANIA_AND_ONLINE_dfc.pdf Thesis Supervisors: Dr. Edward J Glantz, Thesis SupervisorDr. Edward J Glantz, Thesis Honors AdvisorPeter Kent Forster, Faculty Reader
29. BENEFITS OF CYBER SECURITY LABS ON RASPBERRY PI’S Open Access Author: Brown, Carson Mcleod Title: BENEFITS OF CYBER SECURITY LABS ON RASPBERRY PI’S Area of Honors: Security and Risk Analysis Keywords: Raspberry PiCyber SecurityEducationVirtual Machines File: Download Thesis_current_-_Mendeley.pdf Thesis Supervisors: Michael Keith Hills, Thesis SupervisorDr. Edward J Glantz, Thesis Honors Advisor
30. The Practicality of Serious Games as a Pedagogy for Training Aspiring Intelligence Analysts Open Access Author: Tatone, Jessica Title: The Practicality of Serious Games as a Pedagogy for Training Aspiring Intelligence Analysts Area of Honors: Security and Risk Analysis Keywords: Keywords: intelligence analysisStructured Analytic Techniquessimulationsserious gamesanalytic exerciseintelligence analysisStructured Analytic Techniquessimulationsserious gamesanalytic exerciseeducation File: Download Tatone_Jessica_The_Practicality_of_Serious_Games_as_a_Pedagogy_for_Training_Aspiring_Intelligence_Analysts.pdf Thesis Supervisors: Jacob Lehner Graham, Thesis SupervisorDonald Richard Shemanski, Thesis Honors Advisor