AIU News + Essays + Education + Culture + Science + Technology + Art + Design + Body + Mind + Spirit + Environment + Human Rights Master of Sociology + About AIU
Jorge José Luis Grass Compte Doctor of Education Education Argentina |
Christopher Ramogaladi Bachelor of Social Sciences Business Management Botswana |
Johnson Sambitla Tita Fangmbung Doctor of Science Conflict Resolution and Peace Building Cameroon |
Lobe Mpoh Constant Doctor of Business Administration Business Administration Cameroon |
Gissella Garate Tabja Bachelor of Business Administration Business Administration Peru |
Shane Anthony Mohammed Doctor of Philosophy Leadership and Governance Trinidad & Tobago |
Giannina Costa Lizama Doctor of Science Information Technology Chile |
Kennedy Jairus Chitsamatanga Doctor of Business Administration International Business China |
Nelson Oswaldo Monroy Puentes Bache lor of Science Architecture Colombia |
Mary Aluya Rechain Bachelor of Science Civil Engineering Côte d'Ivoire |
Cary Hermo Beatisula Doctor of Science Geotechnical Engineering Philippines |
Raheela Khalid Doctor of Science Health Science United Kingdom |
Ramona Teresa Gómez Bueno Doctor of Education Linguistics Dominican Republic |
Victoria Simón Sosa Doctor of Education Educational Sciences Dominican Republic |
Eugenio Leopoldo Sierra Guerrero Doctor of International Relations Foreign Policy and Diplomacy Dominican Republic |
Olivier Dardol Diaz Bache lor of Accounting Accounting Dominican Republic |
Karangwa Jean Bosco Master of Civil Engineering Transportation Engineering Rwanda |
Bise Wood Saint Eugene Bachelor of Sociology Sociology USA |
Edwin Manuel Pujols Soto Doctor of Education Mathematics Dominican Republic |
Ershed Kalahane TelfortErshed Kalahane Telfort Master of Business Administration Finance Dominican Republic |
Graham L Peveller Doctor of Philosophy Transsexuality England |
Mónica Ileana Monterroso Gularte Bachelor of Human Resources Human Resources Guatemala |
Francis Ansu Koroma Master of Science Information Technology Sierra Leone |
David Darlington Sombie Doctor of Management Project Management USA |
Samy Mohamed Sayed Ibrahim Master of Business Administration Hospitality Management Egypt |
Carlos Alberto Carcach Alfaro Doctor of Philosoph y Criminology El Salvador |
Juanita Nsue Bacale Bache lor of Marke ting Marketing and Administration Equatorial Guinea |
Natividad Ondo Bindang Bache lor of Finance and Banking Finance and Banking Equatorial Guinea |
Ronald Ebunola Johnson Bachelor of Science Computer Science Sierra Leone |
Surjit Singh Doctor of Philosophy Business Administration USA |
Juan Pablo Pacheco Herrera Bache lor of Business Administration Management Guatem ala |
Luis Fernando González Herrera Bachelor of Science Computer Engineering Honduras |
José Adalberto Palma Gómez Doctor of Science Psychology Honduras |
Marcella Artelene Royal Bachelor of Legal Studies Legal Studies Jamaica |
Johan Nieuwoudt Master of Science Mining Engineering South Africa |
Deven D. Cozad Doctor of Science Psychology USA |
Orinthia Fisher-Howe Doctor of Business Administration Strategic Management Jamaica |
Motebang John Makhetha Doctor of Philosophy Educational Management Lesotho |
Eric G. Lewis Master of Science Project Management Liberia |
Daniel Wolopa. Horace, Jr. Bachelor of Science Environmental Science Liberia |
Lada Dominic Bachelor of Humanitarian Health Humanitarian Health South Sudan |
Aura M. Calderon Alonzo Bachelor of Science Nutrition USA |
Lourenço Moio Adamsone Bachelor of Science Project Management Mozambique |
Bernardo Celestino Raquito Master of Management Rural Development Mozambique |
Aboubacar Saidou Doctor of Science Phsiotheraphy Niger |
Chukwudi Gerald Nnanna Doctor of Philosophy Business Administration Nigeria |
Valentín García Barragán Bache lor of Science Educational Information Systems Spain |
Elizabeth Makonese Master of Clinical Psychology Mental Health Counseling USA |
Asuquo Bassey Ita Dcotor of Business Administration Business Administration Nigeria |
Oluwafemi Ikotun Bachelor of Interior Design Interior Design Nigeria |
Eduardo Alexis Gómez Bonagas Bachelor of Science Hydrology and Water Resources Management Panama |
Esther Pelly Batia Doctor of Healthcare Administration Healthcare Administration Papua New Guinea |
Rozenhout Wesley Paitoe Master of Science Leadership and Change Management Suriname |
Marecia Williams-Knights Bachelor of Finance Finance and Business Management West Indies |
Francisco Britez Leguizamón Bachelor of Science Systems Engineering Paraguay |
Deyner Vargas Bachelor of Science Psychology Peru |
Max Omar Peralta Guevara Bachelor of Science Industrial Engineering Peru |
Carlos Alberto Quipuzcoa Urdanivia Bachelor of Science Civil Engineering Peru |
Mathew Uwaigbe Oyourane Master of Science Health Science Sweden |
Minyoi Ilishebo Bachelor of Science Civil Engineering Zambia |
Armando Said Granados Flores Bache lor of Economics Urban Economics Peru |
Andres Ibero Reyes Inca Amaro Bachelor of Science Mechanical Engineering Peru |
Yesica M. Rojas Aponte Bachelor of Business Administration Marketing Peru |
Melquiades Sindolfo Vilchez Chamorro Master of Science Civil Engineering Peru |
Margaret Maulana Doctor of Business Administration Healthcare Administration Zimbabwe |
|
Research indicates that the
high rate of cybercrime
results from carelessness as
private industries and individuals
underestimate the risk
of cybercrime and therefore
fail to take adequate measures
to protect their information
and sensitive data. In addition,
over dependence by the
government on centralized
systems and lack of proper
guidelines on protecting personal
information contained
in these systems has left
millions of individual sensitive
information vulnerable.
In response to the increased
cases of cybercrime, governments
are investing millions of
dollars in building cyber skill and capability to as a cybercrime
prevention measure
(Dashora, 2011). Other scholars
have focused on the way
cybercrime influences other
issues in the modern society.
For instance, Fatima (2015)
explores the way cybercrime
influences the practices in
the apparent modern niche of
E-Banking. Fatima explores
the trends, the threats and
the strategies of combating
cybercrime in the E-Banking
niche while also investigating
the potential of biometrics in
addressing cybercrime in the
E-Banking niche.
An investigation
on the way cybercrime
influences the victimization of
women has also been conducted
(Halder & Jaishankar, 2012).
The authors explore the various
circumstances in which
women have been victimized
through cybercrime attacks.
Nelson, Phillips and Stuart
(2014) have developed a guide
to computer forensics and investigations.
The authors point
out to the past trends, the current
initiatives and the future
projections on the way computer
crime and investigations should be undertaken. Poole
and Sky-Mcllvain (2014)
explore the current trends and
recommend the way education
should be undertaken in
the modern age. Weisburd and
McEwen (2015) recommend
the way cybercrime should
be mapped with the aim of
developing and implementing
strategies that will deter
cybercrime. Stephenson and
Gilbert (2013) offer a guide on
the way cybercrime investigations
should be undertaken.
From the analysis of all the
literature cited in the paper,
it is apparent that there are
strategies that work, and
others that are ineffective
in deterring and combating
cybercrime challenges now
and into the future (Putnam &
Elliott, 2001).
Viruses form the highest
negative influence on users
in relation to cybercrime.
Majority of the internet users
report viruses as their main
threat as compared to the
number of people who report
losing money in a survey
conducted in 2012 and 2013
(McGuire,2013). Similarly, businesses report virus related
problems as their main
threat on security incident.
The samples were collected
through random sampling.
Statistics from police recordings
on cybercrime on police
department show that fraud
as the most reported form
of cybercrime. However, the
data presented from the police
cases is not separated into
online and offline therefore
making the information hard
to analyze. These presented
the main challenge of conducting
research-using data
provided by the police. For
instance, the police were more
likely to record computers
fraud as cybercrime without
indicating if the crime was
committed online or offline
(McGuire, 2013).
Majority of the research on
cybercrime prevention are
based on review of relevant
literature and lack of adequate
information on the field is one
of the biggest challenges. Secondly,
much of the information
is obtained from self-reports
which as indicated earlier
has the challenge on existent
laws under which cybercrime
is reported. Limited data on
cybercrime and the emerging
forms of such crimes as
cyber terrorisms is the greatest
weakness of various researches
on cyber-crime prevention. In
addition, the survey questions
that are mostly used in the
conducting these researches
are self-selecting which implies
that the information collected
is limited in relation to the
actual cybercrime. Similarly,
most of the crimes are under
reported by the victims and
organizations due to the fear of
negative publicity. Therefore,
the actual information relating
to cybercrime is withheld
by the victims, which greatly
hinders finding an effective
solution to the problem (Rotich
et al, 2014).
Several modes are suggested
to help reduce increasing
rate of cybercrime. One is
the KVIRUS model, which is a
virus prevention model that
aim at identifying virus according
to their programs rather
than software signature. Other
models aim at identifying the
cybercriminal through using
the details of the internet service
Provider ISP and use the
necessary laws to apprehend
the criminal. However, with the
current technology advancement,
this is proving a little bit
difficult as criminal have come
with programs to avoid being
detected (Rotich et al, 2015).
The current study purposively
selected cybercrime policies
formulated by the United
States to address cybercrime.
The sampling criteria was Influenced
by the scope covered
by the policy, the resources required to implement the
policy effectively and reported
statistics related to the
problem that the policy aims
to address. Various resources
that included presidential
orders, state and federal laws
and regulations were used
as the primary data sources
for analysis. The analysis
evaluated existing policies
to determine their ability in
covering their intended goals.
The study focused on the
weakness and strengths of the
undefined policies evaluating
their flaws in curbing the
rising threat of cybercrime.
Although much of policies
were worked during the time
they were implemented, the
emerging trends in cybercrime
have made them ineffective
or useless. The study therefore
adopted the policy analysis
methodology to identify the
flaws in the selected polices
and recommending possible
changes that can be adopted
to ensure that the policies are
effective in combating the
rising threat of cybercrime
through multi-goal policy
analysis approach.
The multi-goal policy analysis
approach involves selecting
the impact of the goals of the
policy analyzed. The goals are
identified and accessed if they
meet the desired objectives set
by the policymakers (Weimer &
Vining, 2005). Next is predicting
the impact that is expected
with the modifications of the
policy to achieve the relevant
goals. The predicted impact
from the policy modifications
is valued as well as evaluating
the modifications that
are suggested for the policy.
The current study focuses on
understanding the current
polices on cybercrime through
evaluating their strength and
weakness to recommend necessary
changes that can make
them more effective. The current
study therefore involved
gathering the information
on the selected policies and analyzing to identify the problems
facing the policies and
recommended changes.
Recommendations
Based on the findings of the
analysis done by the current
study, it is recommended that
the computer and abuse act
should therefore be amended
to include all the computers
that are in the risk of cybercrime
attacks. The act only
covers protected computers
which include government
and financial institutions
computers (Jarrett & Bailie,
2015). Non –financial institutions
and other organizations
not covered under the
protected computer provision
of the CFAA act are incurring
millions in losing due to unauthorized
access to information
and data by cyber criminals.
In addition, criminal activities
on non-protected computers
give the criminals an advantage
to test various tools and
software through which they
can employ on protected computers
more easily. Similarly,
to the computer abuse act,
the study recommends that
the information intercept act
should be amended to include
the broad acts of criminal
activities committed on nonprotected
computers. Private
organizations computers hold
sensitive information that
although not directly related
to state matters, its disclosure
can have an indirect impact to
critical infrastructure. Based
on the study findings, it is
also recommended that the
government should amend the
identity theft clause to include
criminals who use identities
of people who do not exist
currently, the provisions of the
law only ally to people who
falsify the identity of other
existent people as their own.
To discourage illegal access
to information and data on
providers of storage services,
the policy should be expanded
to include the illegal sharing
of information by the service
providers who have access of
such information as a cybercrime.
Cybercrime is unarguably
a complex challenge in
the modern world that is defined
by immense technological
undertakings. Therefore,
it is imperative that working
strategies are employed in
combating its threats. Based
on the findings on the study, it
is recommended that organizations
such as homeland
department of security develop
a case-specific approach
in developing tactics that will
prevent future repeats. The
department of homeland security
has adopted regulatory
procedures that focus on the
parties at the risk of experiencing
cyber-attacks and doing
away with the focus on the
groups that initiate cybercrime
attacks which is proving an
effective measure reduce cybercrime
attacks (Department
of Homeland Security, 2015).
Lastly, organizations should
set aside investment that
will fund research activities
to determine the fronts that
make it easier for perpetrators
to initiate cybercrime attacks.
The study also recommends
that organizations implement
both technological measures
such applying latest security
patches, up to date antivirus,
operating systems and computer
application, password
protection, maintaining a
strict validation for the data
input, monitoring the processes
as well as procedures
of external contractors who
have access to the organizations
computer systems.
Others include performing
regular scans to the network
securities and activities, and
create awareness on cybercrime
prevention among their
employees. This will create an
environment where everyone
is cautious of the rising thereat
on preventing cybercrime.
The United States congress
should increase the resources
and the funding to fighting
cybercrime. the government
allocated $14 billion in the 2016
year to cyber security and
plans to increase this by 35% to
$19 billion in the coming 2017
budget (The White House,2016).
This is essential as cybercrime
criminals are organizing
themselves in forms of groups
and outsourcing funding from
terrorist groups and other
criminal’s organizations to advance
their criminal activities.
With the potential to utilize
modern technologies in facilitating
cybercrime, the extent
of the damages caused by such
actions has therefore increased.
The government should also
increase the capacity of its
agencies ad department the
fight with cybercrime through
more resource allocations, provision of relevant training
and skills in handling the crisis.
Similarly, the information sharing
policies from the presidential
directives on cybercrime
can be very effective in combating
the threat of cybercrime
if well enacted. However, the
policies are very ambiguous
as currently constituted and
require comprehensive reforms
to ensure they are easily
implemented and workable.
For instance, the provision on
information sharing is currently
limited by the existing legal
barriers on information sharing
between the government and
the private sectors.
The study also recommends
the establishment of a specific
national agency that will coordinate
efforts of preventing
cybercrime, its mitigation and
prosecution just like the case
with the drugs. The agency
should comprise of top strategic,
business and technical
thinkers outside the government.
The agency will push for
proposals and recommendations
on the effective legislations
and actions to combat
cybercrime through enhancing
cyber security awareness,
maintaining the security of
the private and government
sectors and empowering
the American public to take
charge of their digital security.
Currently, cybercrime handled
by the DHS and other federal
agencies which include the
FBI, the US Secret Service and
US Immigrations and Customs
Enforcement (ICE) which
have been assigned other
responsibilities by the federal
government (Department of
Homeland Security, 2016).
Such an agency should focus
on creating a good working relationship
between the private
and the government sectors
especially in combating
cybercrime. The government
should also embrace creating
awareness through education
and training to provide the
public with accurate, consistent
and reliable information
on cybercrime. The department
of Homeland Security
that currently coordinates
cybercrime prevention efforts
should increase training and
awareness initiatives for the
public sector. Other initiatives
include creating an effective
cyber workforce that is responsible
for ensuring cyber
security through enforcing the
enacted legislations in combating
cybercrime.
The End
BIBLIOGRAPHY.
Bessant, J. (2014). Democracy Bytes: New Media, New Politics
and Generational Change. Springer. • Broadhurst, R., Grabosky, P., Alazab, M.,
Bouhours, B., & Chon, S. (2014). An Analysis of the Nature of Groups Engaged in
Cyber crime. An Analysis of the Nature of Groups engaged in Cyber crime, International
Journal of Cyber Criminology, 8(1), 1-20. • Brown, C. S. (2015). Investigating
and prosecuting cyber crime: forensic dependencies and barriers to justice.
International Journal of Cyber Criminology, 9(1), 55. • Bucci, S. P., Rosenzweig,
P., & Inserra, D. (2013). A congressional guide: Seven steps to US Security, Prosperity,
and Freedom in Cyberspace.Heritage Foundation Backgrounder, (2785).
• Byrne, J., & Marx, G. (2011). Technological innovations in crime prevention
and policing. A review of the research on implementation and impact. Journal
of Police Studies, 20(3), 17-40. • Casey, E. (2011). Digital evidence and computer
crime: Forensic science, computers, and the internet. Academic press. • Choo,
K. K. R. (2011). The cyber threat landscape: Challenges and future research directions.
Computers & Security, 30(8), 719-731. • Choudhury, R. R., Basak, S., &
Guha, D. (2013). Cyber Crimes-Challenges & Solutions. International Journal of
Computer Science and Information Technologies, 4(5). • Clarke, R., Dempsey,
G., Ooi, C. N., & O'Connor, R. F. (1998, February). Technological Aspects of Internet
Crime Prevention'. In Proc. Conf.'Internet Crime', Australian Institute for
Criminology, Melbourne University (pp. 16-17). • Dashora, K. (2011). Cyber crime
in the society: Problems and preventions. Journal of Alternative Perspectives in
the Social Sciences, 3(1), 240-259. • Department of homeland security. (2015). Using
the Cybersecurity Framework | Homeland Security. Retrieved from https://
www.dhs.gov/using-cybersecurity-framework# • Department of Homeland
Security. (2016). Combating Cyber Crime | Homeland Security. Retrieved from
https://www.dhs.gov/topic/combating-cyber-crime • Department of Justice.
(2015). Computer Crime and Intellectual Property Section (CCIPS) | Department
of Justice. Retrieved from https://www.justice.gov/criminal-ccips • Fatima, A.
(2015). E-Banking Security Issues? Is There A Solution in Biometrics?. The Journal
of Internet Banking and Commerce, 2011. • Federal Trade commision. (2008).
CAN-SPAM Rule | Federal Trade Commission. Retrieved from https://www.ftc.
gov/enforcement/rules/rulemaking-regulatory-reform-proceedings/can-spamrule
• Federal Trade Commission. (1998). Identity Theft and Assumption Deterrence
Act | Federal Trade Commission. Retrieved October 9, 2016, from https://
www.ftc.gov/node/119459 • Halder, D., & Jaishankar, K. (2012). Cyber crime and
the victimization of women: laws, rights and regulations. Information Science
Reference. • Jarrett, M., & Bailie, M. (2015). Prosecuting Computer Crimes. Office
of Legal Education Executive Office for United States Attorneys. Retrieved from
https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/
ccmanual.pdf • McMahon, R., Serrato, D., Bressler, L., & Bressler, M. (2015).
Fighting cyber crime calls for developing effective strategy. Journal of Technology
Research, 6, 1. • McQuade, S. C. (2006). Understanding and managing cyber
crime. Boston: Pearson/Allyn and Bacon.
A part of this globalized society
lived very happy because
they said to themselves:
we have already achieved
everything, there’re no limits
to trade, people travel everywhere
and communication is
instantaneous. What more can
you ask of this world?
We were still in the mad
rush of global commerce and
instant communication.
A new virus comes to us and
many, among rulers and part
of the population, thought that
with the power of this new
society, that would soon end.
But Oh Surprise of surprises!
The virus is in its
second wave in Europe and
this humanity with so much
science and technology can’t
with such a small being.
Confinements are heard: in
some countries severe, in others,
recommendations, but all
to continue without being able
to do the previous life.
There is also a wave of
protests because we have a
life created for commerce:
large centers to watch sporting
events, also large shopping
centers, cinemas, bars, restaurants,
but we are seeing that
people no longer know how to
make a life only at home.
And what is our pending assignment
or subject in the face
of so much abundance?
On the contrary, another
part of the inhabitants of our
planet said: a development in
this way can’t be possible or
sustainable. We have forgotten
that abundance is for the
few; 10% of the population
owns the world’s wealth.
We are at a point of reflection:
we change or we change.
Our pending assignment is:
The Biosphere.
The Biosphere comprises
the life that surrounds the
Earth.
The life that surrounds the
Earth is made up of:
· The flora
· The fauna
Human beings necessarily
contribute and participate in
that life that surrounds the
Earth. When we speak about
Biosphere we refer to the
Global Ecosystem. The concept
of Ecosystem arises with Arthur Tansley in 1935.
This wonderful world, in
this stage of Capitalism or
Globalization, was made
with a development that only
prevailed: obtaining resources
from wherever it was without
thinking about whether
they were renewable or not,
without measuring the consequences
of all the changes that
were made.
There are some countries
that need 7 planets Earth to
continue their production
career. We reserve names for
professional ethics for people
born in those countries who
will surely feel bad for what
they are not guilty of.
What is the Biosphere? What
have we done with it? Our
global Ecosystem formed by
the balance of what constitutes
our planet Earth, speaking
about flora, fauna and
terrestrial constitution, has a
balance that allows it to exist.
This balance is maintained
within a system that receives external elements which need
to self-regulate in order for it
to be sustained.
About our planet and its
existence we have the Gaia
hypothesis, now Theory, by
James Lovelock that considers
the Earth as a living being
that is maintained, that needs
the balance of all the elements
that exist in it. Here comes
the Second Law of Thermodynamics
and the self-regulation
of systems, which Ilyia
Prigogine very well details in
his work, Just an illusion?
The Lovelock equilibrium
and the Prigogine equilibrium don’t refer to a system where
everything is stable; it refers to
elements that enter the system
and those that leave, maintaining
stability.
According to Prigogine: “Our
age is characterized, more than
any other, by a growing diversification
of knowledge, techniques
and modes of thought.
However, we live in a unique
world in which each area
involves the others; for this
reason I consider it essential to
clarify certain concomitants”.
(Prigogine 2009, p. 47)
What is happening with our
planet today?
With the flora and the
development of commerce
in Globalization, vegetation
is eliminated because in this
place we are going to build
a residential or commercial
development or whatever
we want and the life of all
vegetation in that space is
eliminated.
The same thing happens
with the Fauna. If we
remove all vegetation from a
space, the animals that lived
there have to find another area
to live if they have not already
been killed.
Nowadays, the human beings,
faced with the spread of
the coronavirus, have had to
confine themselves to their
homes, we see animals walking
in the streets: our enemies,
human beings, it seems they
disappeared. Yes, there is a
self-regulation of the life system,
what is happening today
is that we have passed the
limits in which it can maintain
balance, so we see organizations
and organizations looking
for ways for human beings
to maintain the necessary
balance for life.
The United Nations Educational,
Scientific and Cultural
Organization (UNESCO), has
the 2030 Agenda for Sustainable
Development.
Nowadays we see countries
that in the face of deforestation
caused by urban developments
are creating green areas on the
roofs, for example England in
London. Human beings are
destroying the global ecosystem
and now what it follows is
the violence against each other.
Everywhere we are seeing acts
of violence by some human
beings against others.
What else is missing from
our planet Earth?
According to Lovelock, the
coronavirus exists because
the human being has created
elements that allow the virus
to live.
We have a pending assignment
Educate ourselves to make a
world possible.
• Educate ourselves for the life of
all beings also considering the
life of our planet.
• We can do it but we must want
to do it.
• We say that we are rational beings,
but violence means lack of reasoning;
I get this by generating fear
in others.
• Life must be: our life, the life of others
and the life of the planet; in each
one this is our pending assignment
BIBLIOGRAPHY. Lovelock, J. Entrevista.- Español – Julio 19- 2020. Retrieved from: https://www.climaterra.org/post/
lovelock-la-biosfera-y-yo-estamos-en-el-%C3%BAltimo-1-de-nuestras-vidas | Lovelock, J. – Original Interview- English - July
18- 2020- Retrieved from: https://www.theguardian.com/environment/2020/jul/18/james-lovelock-the-biosphere-and-i-are-both-inthe-
last-1-per-cent-of-our-lives | Lovelock, J. Gaia, una nueva visión de la vida sobre la Tierra. Retrieved from: http://
mateandoconlaciencia.zonalibre.org/gaia.pdf | Lovelock, J.- Gaia. Retrieved from: https://www.youtube.com/watch?v=GIFRg2skuDI
| Organización de las Naciones Unidas para la Educación, la Ciencia y la Cultura (UNESCO), Página Oficial.
Retrieved from: https://es.unesco.org/about-us/introducing-unesco | Prigogine, I. (2009). ¿Tan solo una ilusión?. Barcelona:
Tusquest Editores. | UNESCO – AGENDA 2030 - DESARROLLO SOSTENIBLE. Retrieved from: https://es.unesco.org/
sdgs | UNESCO – Objetivos de Desarrollo Sostenible. Retrieved from: https://es.unesco.org/sdgs
Dr. Franklin Valcin President/Academic Dean |
Dr. José Mercado Chief Executive Officer Chairman of the Board of Trustees |
Ricardo González, PhD Provost |
Dr. Ricardo Gonzalez Chief Operation Officer and MKT Director |
Linda Collazo Logistics Coordinator |
Dr. Silvia Restorff Academic Advisor |
Dr. Miriam Garibaldi Viceprovost for Research |
Irina Ivashuk Alumni Association Coordinator |
Dr. Prakash Menon Academic Advisor |
Dr. Ofelia Miller Director of AIU |
Clara Margalef Director of Special Projects of AIU |
Carlos Aponte Telecommunications Coordinator |
Juan Pablo Moreno Director of Operations |
David Jung Corporate/Legal Counsel |
Dr. Nilani Ljunggren De Silva Academic Advisor |
Paula Viera Director of Intelligence Systems |
Bruce Kim Advisor/Consultant |
Dr. Scott Wilson Academic Advisor |
Felipe Gomez Design Director / IT Supervisor |
Thomas Kim Corporate/ Accounting Counsel |
Dr. Mohammad Shaidul Islam Academic Advisor |
Daritza Ysla IT Coordinator |
Camila Correa Quality Assurance Coordinator |
Dr. Edgar Colon Academic Advisor |
Nadeem Awan Chief Programming Officer |
Maricela Esparza Administrative Coordinator |
Deborah Rodriguez Academic Tutor Coordinator |
Dr. Jack Rosenzweig Dean of Academic Affairs |
Chris Benjamin IT and Hosting Support |
Cyndy Dominguez Academic Tutor Coordinator |
Dr. Edward Lambert Academic Director |
Mayra Bolivar Accounting Coordinator |
Kinmberly Diaz Admissions Support Tutor |
Dr. Ariadna Romero Advisor Coordinator |
Roberto Aldrett Communications Coordinator |
Amalia Aldrett Admissions Coordinator |
Nadia Gabaldon Academic Coordinator |
Giovanni Castillo IT Support |
Sandra Garcia Admissions Coordinator |
Jhanzaib Awan Senior Programmer |
Jaime Rotlewicz Dean of Admissions |
Jose Neuhaus Admissions Support |
Leonardo Salas Human Resource Manager |
Dr. Mario Rios Academic Advisor |
Junko Shimizu Admissions Coordinator |
Benjamin Joseph IT and Technology Support |
Michael Phillips Registrar’s Office |
Veronica Amuz Admissions Coordinator |
Rosie Perez Finance Coordinator |
Rene Cordon Admissions Support |
Alba Ochoa Admissions Coordinator |
Chris Soto Admissions Counselor |
Jenis Garcia Admissions Counselor |
|