Annamaria Szakonyi - Academia.edu (original) (raw)

Uploads

Academic Contributions by Annamaria Szakonyi

Research paper thumbnail of Non-Traditional Education to Advance Women in Computing Careers in the St. Louis Metro

EDUCON - IEEE Global Engineering Education Conference, 2021

The Saint Louis Metropolitan Area has been one of the top American cities for tech startups while... more The Saint Louis Metropolitan Area has been one of the top American cities for tech startups while hosting a substantial number of fortune 500 companies. Usually, this translates into job opportunities for those living and working within the area. However, the immediate challenge is the lack of women within the workforce that is currently there. While one of the top 50 largest metropolitan areas, Saint Louis has a deficit of women in computer engineering related fields. This paper aims to address those issues while displaying what this city has done to increase the workforce in the metropolitan area. The authors review current initiatives while providing recommendations for enhancing those already present.

Papers by Annamaria Szakonyi

Research paper thumbnail of Dark Web

IGI Global eBooks, 2021

The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. Wi... more The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. With the internet, these crimes are able to occur anywhere in the world and limitless to whatever selected target. The anonymity of the internet allows criminal activity to flourish, and the number of unsuspecting victims is growing. From script kiddies to nation-states, this new method of internet-enabled crimes has strained governments. This chapter provides insight into how crimes related to online identity theft and fraud are carried out. Examined within this chapter are the evolution of cybercrime, history of identity theft, applications for internet anonymity, and discussion on effects caused by romance scams and data breaches. Finally, recommendations are provided on what organizations and individuals can do to protect themselves against these vicious crimes.

Research paper thumbnail of Non-Traditional Education to Advance Women in Computing Careers in the St. Louis Metro Region

2021 IEEE Global Engineering Education Conference (EDUCON), 2021

The Saint Louis Metropolitan Area has been one of the top American cities for tech startups while... more The Saint Louis Metropolitan Area has been one of the top American cities for tech startups while hosting a substantial number of fortune 500 companies. Usually, this translates into job opportunities for those living and working within the area. However, the immediate challenge is the lack of women within the workforce that is currently there. While one of the top 50 largest metropolitan areas, Saint Louis has a deficit of women in computer engineering related fields. This paper aims to address those issues while displaying what this city has done to increase the workforce in the metropolitan area. The authors review current initiatives while providing recommendations for enhancing those already present.

Research paper thumbnail of Using Technologies to Uncover Patterns in Human Trafficking

In this paper, the researchers provide a background of human trafficking, review the use and impl... more In this paper, the researchers provide a background of human trafficking, review the use and implications of digital currency, and apply machine learning techniques to analyze publicly available trafficking datasets. The study also provides recommendations related to data collection, management, and analysis to aid the vital fight against individuals' exploitation. The researchers conducted an exploratory data analysis using Python, RapidMiner, and Microsoft Excel towards an iterative review and interpretation of the dataset from the Counter Trafficking Data Collaborative (CTDC). The researchers found that there are more female victims of human trafficking in most age groups than male victims. However, for the age group between 39-47, there was a higher male victim count. Additionally, researchers found that the top five countries affected by human trafficking were the Philippines, Ukraine, Republic of Moldova, USA, and Cambodia. However, it must be noted that there are limitations to the overall data because they are provided voluntarily by organizations, and therefore, there is no equitable distribution of actual results from all countries and players. After mapping the country of origin and country of exploitation, it was made clear that there is a movement of victims from the country of origin to the country of exploitation. Lastly, researchers found that a complex combination of different variables is needed to provide accurate predictions for law enforcement and anti-trafficking organizations to aid them in fighting human trafficking, including country

Research paper thumbnail of Cybersecurity Education to Create Awareness in Artificial Intelligence Applications for Developers and End Users

Scientific Bulletin

This new era brings new promises of technology that will bring economic and societal benefits. Ar... more This new era brings new promises of technology that will bring economic and societal benefits. Artificial Intelligence is to be the disruptor for work and even military technological applications. However, developers and end-users will play keys roles in how this technology is developed and ultimately used. Among these two groups, there are cybersecurity concerns that need to be considered. In this paper, the researchers address the process of secure development and testing. Also, for the end-user appropriate methods, procedures, and recommendations are defined that can mitigate the overall use of this technology within an enterprise.

Research paper thumbnail of Dark Web

Handbook of Research on Theory and Practice of Financial Crimes

The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. Wi... more The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. With the internet, these crimes are able to occur anywhere in the world and limitless to whatever selected target. The anonymity of the internet allows criminal activity to flourish, and the number of unsuspecting victims is growing. From script kiddies to nation-states, this new method of internet-enabled crimes has strained governments. This chapter provides insight into how crimes related to online identity theft and fraud are carried out. Examined within this chapter are the evolution of cybercrime, history of identity theft, applications for internet anonymity, and discussion on effects caused by romance scams and data breaches. Finally, recommendations are provided on what organizations and individuals can do to protect themselves against these vicious crimes.

Research paper thumbnail of Non-Traditional Education to Advance Women in Computing Careers in the St. Louis Metro

EDUCON - IEEE Global Engineering Education Conference, 2021

The Saint Louis Metropolitan Area has been one of the top American cities for tech startups while... more The Saint Louis Metropolitan Area has been one of the top American cities for tech startups while hosting a substantial number of fortune 500 companies. Usually, this translates into job opportunities for those living and working within the area. However, the immediate challenge is the lack of women within the workforce that is currently there. While one of the top 50 largest metropolitan areas, Saint Louis has a deficit of women in computer engineering related fields. This paper aims to address those issues while displaying what this city has done to increase the workforce in the metropolitan area. The authors review current initiatives while providing recommendations for enhancing those already present.

Research paper thumbnail of Dark Web

IGI Global eBooks, 2021

The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. Wi... more The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. With the internet, these crimes are able to occur anywhere in the world and limitless to whatever selected target. The anonymity of the internet allows criminal activity to flourish, and the number of unsuspecting victims is growing. From script kiddies to nation-states, this new method of internet-enabled crimes has strained governments. This chapter provides insight into how crimes related to online identity theft and fraud are carried out. Examined within this chapter are the evolution of cybercrime, history of identity theft, applications for internet anonymity, and discussion on effects caused by romance scams and data breaches. Finally, recommendations are provided on what organizations and individuals can do to protect themselves against these vicious crimes.

Research paper thumbnail of Non-Traditional Education to Advance Women in Computing Careers in the St. Louis Metro Region

2021 IEEE Global Engineering Education Conference (EDUCON), 2021

The Saint Louis Metropolitan Area has been one of the top American cities for tech startups while... more The Saint Louis Metropolitan Area has been one of the top American cities for tech startups while hosting a substantial number of fortune 500 companies. Usually, this translates into job opportunities for those living and working within the area. However, the immediate challenge is the lack of women within the workforce that is currently there. While one of the top 50 largest metropolitan areas, Saint Louis has a deficit of women in computer engineering related fields. This paper aims to address those issues while displaying what this city has done to increase the workforce in the metropolitan area. The authors review current initiatives while providing recommendations for enhancing those already present.

Research paper thumbnail of Using Technologies to Uncover Patterns in Human Trafficking

In this paper, the researchers provide a background of human trafficking, review the use and impl... more In this paper, the researchers provide a background of human trafficking, review the use and implications of digital currency, and apply machine learning techniques to analyze publicly available trafficking datasets. The study also provides recommendations related to data collection, management, and analysis to aid the vital fight against individuals' exploitation. The researchers conducted an exploratory data analysis using Python, RapidMiner, and Microsoft Excel towards an iterative review and interpretation of the dataset from the Counter Trafficking Data Collaborative (CTDC). The researchers found that there are more female victims of human trafficking in most age groups than male victims. However, for the age group between 39-47, there was a higher male victim count. Additionally, researchers found that the top five countries affected by human trafficking were the Philippines, Ukraine, Republic of Moldova, USA, and Cambodia. However, it must be noted that there are limitations to the overall data because they are provided voluntarily by organizations, and therefore, there is no equitable distribution of actual results from all countries and players. After mapping the country of origin and country of exploitation, it was made clear that there is a movement of victims from the country of origin to the country of exploitation. Lastly, researchers found that a complex combination of different variables is needed to provide accurate predictions for law enforcement and anti-trafficking organizations to aid them in fighting human trafficking, including country

Research paper thumbnail of Cybersecurity Education to Create Awareness in Artificial Intelligence Applications for Developers and End Users

Scientific Bulletin

This new era brings new promises of technology that will bring economic and societal benefits. Ar... more This new era brings new promises of technology that will bring economic and societal benefits. Artificial Intelligence is to be the disruptor for work and even military technological applications. However, developers and end-users will play keys roles in how this technology is developed and ultimately used. Among these two groups, there are cybersecurity concerns that need to be considered. In this paper, the researchers address the process of secure development and testing. Also, for the end-user appropriate methods, procedures, and recommendations are defined that can mitigate the overall use of this technology within an enterprise.

Research paper thumbnail of Dark Web

Handbook of Research on Theory and Practice of Financial Crimes

The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. Wi... more The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. With the internet, these crimes are able to occur anywhere in the world and limitless to whatever selected target. The anonymity of the internet allows criminal activity to flourish, and the number of unsuspecting victims is growing. From script kiddies to nation-states, this new method of internet-enabled crimes has strained governments. This chapter provides insight into how crimes related to online identity theft and fraud are carried out. Examined within this chapter are the evolution of cybercrime, history of identity theft, applications for internet anonymity, and discussion on effects caused by romance scams and data breaches. Finally, recommendations are provided on what organizations and individuals can do to protect themselves against these vicious crimes.