Capstone Projects

Capstone projects are the final class or project in a course of study.  It is called a capstone because it represents a crowning achievement as a capstone does in architecture.  A capstone course may require a project or presentation while for others, it may include an assessment exam to test interdisciplinary skills such as math, writing, critical thinking, etc.  Often times, a capstone will include a final research paper exploring a topic of interest in the student’s individualized program of study.  Capstone projects give the opportunity for people to demonstrate the knowledge and skills that they have gained during their time studying a particular course.

Below, you will find sample capstone papers completed for the M.S. in Cybersecurity and Economic Crime Management programs. To view all completed theses, capstones, and dissertations completed amongst all of Utica College, follow these directions.

M.S. Cybersecurity – Intelligence and Forensics Dissertations

In an effort to promulgate Utica College’s graduate students’ capstone projects in the M.S. degree in Cybersecurity – Intelligence and Forensics, the Economic Crime and Cybersecurity Institute publishes dissertations chosen by faculty. The objective is to provide resources to individuals seeking information on topics such as cyberespionage, data breaches, digital investigations, cybercrime trends, digital investigations, cyberterrorism, honeypots, cloud security, doxing, mobile apps, unmanned aircraft systems, and other topics.


LAW ENFORCEMENT RESPONSE TO INTELLECTUAL PROPERTY CRIME:
HAS THE PRO-IP ACT MADE A DIFFERENCE?

By: Cynthia Ann Shaw

August 2014

>> read full capstone


 

The Internet, A Secret Minefield For Children
By David Plude
August 2013

>> read full capstone


The Implications of the Abandoned Property Doctrine of the Fourth Amendment on Data Deleted from the Cloud
By William Pizio
April 2013

>> read full capstone


North Korean Strategic Strategy: Combining Conventional Warfare With The Asymmetrical Effects of Cyber Warfare
By Jennifer J. Erlendson
March 2013

>> read full capstone


The Development of Cybersecurity Curriculum in Advanced Telecommunication Forensics
By Daniel Kalil and Richard Gloo
December 2012

>> read full capstone


Mitigating the Effects Of Doxing
By Ingrid Norris
December 2012

>> read full capstone


An Examination of Cyberbullying on Social Media And the Recommendations For Resolving It
By Nicole E. Lent-Miller
December 2012


Standardizing the Security of Mobile App Store Platforms
By Michael Clapsadl
November 2012

>> read full capstone


The Forensic Artifacts of Microsoft OneNote
By Cynthia Gonnella
August 2012

>> read full capstone


Mitigating The Impact of Anti-Forensic Techniques Through File System Analysis
By Gabriel A. Flynn
August 2012

>> read full capstone


An Analysis of the Vulnerability of Unmanned Aircraft Systems
By Daniel Brodsky
May 2012

>> read full capstone


Combating Botnets with Honeypots: The Legal Considerations
By Carilyn S. Fennell
May 2012

>> read full capstone


Virtual World Communities: An Examination of Current Digital Forensic Technology
By William Hartman
May 2012

>> read full capstone


Challenges of Digital Forensic Investigations in the Cloud Environment
By Candice Torres
May 2012

>> read full capstone


Network Security Through Open Source Intrusion Detection Systems
By Russell A. Tantillo
May 2012

>> read full capstone


A Proposal for a Windows Open Source Command Line Undelete Excavator WosClue
By Claude Turner
May 2012

>> read full capstone


The Use Of Steganography In Cyber-Terrorist Communications
By Kerry Mildon
March 2012

>> read full capstone


Developing a Suspicious File Triage Tool
By Kevin Stilwell
March 2012

>> read full capstone


 

M.S. in Economic Crime Management Dissertations

In an effort to promulgate Utica College’s graduate students’ capstone projects in the M.S. degree in Economic crime Management, the Economic Crime Institute publishes dissertations chosen by faculty. The objective is to provide resources to individuals seeking information on topics such as economic crime investigations, data breaches, money laundering, identity theft, digital investigations, risk management, cybercrime trends, digital investigations, and other topics.


Mitigating The Risk of Corruption in Emerging Markets Through Best Practices And Data Analytics
By Alex Koltsov
December 2013

>> read full capstone


Credit Card Fraud and Social Engineering

By Glenn A.  Hall
December 2012

>> read full capstone


Analysis Of Fraud Perpetrated Through ATM
By Lisa Frikker-Gruss
October 2012

>> read full capstone


The Current State Of Critical Infrastructure Protection
By Jessica Katz
December 2011

>> read full capstone


Into The Breach: Lessons Learned From Data Breach Research
By Christine Arevalo
January 2010

>> read full capstone


EXPLORING METHODOLOGIES TO INVESTIGATE CROSS-BORDER IDENTITY THEFT
IN THE SAN DIEGO–TIJUANA REGION:
FROM POINT OF USE TO PERPETRATOR

By: Daniel Clift

December 2013

>> Read Full Capstone