1600 Burrstone Road, Utica, NY 13502
(315) 792-3006
webmanager@utica.edu

Capstone Projects

Capstone Projects

Capstone projects are the final class or project in a course of study.  It is called a capstone because it represents a crowning achievement as a capstone does in architecture.  A capstone course may require a project or presentation while for others, it may include an assessment exam to test interdisciplinary skills such as math, writing, critical thinking, etc.  Often times, a capstone will include a final research paper exploring a topic of interest in the student’s individualized program of study.  Capstone projects give the opportunity for people to demonstrate the knowledge and skills that they have gained during their time studying a particular course.

Below, you will find sample capstone papers completed for the M.S. in Cybersecurity and Economic Crime Management programs. To view all completed theses, capstones, and dissertations completed amongst all of Utica University, follow these directions.

M.S. Cybersecurity – Intelligence and Forensics Dissertations

In an effort to promulgate Utica University’s graduate students’ capstone projects in the M.S. degree in Cybersecurity – Intelligence and Forensics, the Economic Crime and Cybersecurity Institute publishes dissertations chosen by faculty. The objective is to provide resources to individuals seeking information on topics such as cyberespionage, data breaches, digital investigations, cybercrime trends, digital investigations, cyberterrorism, honeypots, cloud security, doxing, mobile apps, unmanned aircraft systems, and other topics.

M.S. in Economic Crime Management Dissertations

In an effort to promulgate Utica University’s graduate students’ capstone projects in the M.S. degree in Economic crime Management, the Economic Crime Institute publishes dissertations chosen by faculty. The objective is to provide resources to individuals seeking information on topics such as economic crime investigations, data breaches, money laundering, identity theft, digital investigations, risk management, cybercrime trends, digital investigations, and other topics.


Leave a Reply

Your email address will not be published. Required fields are marked *