Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (2961)
- Wright State University (632)
- Walden University (447)
- Selected Works (287)
- New Jersey Institute of Technology (137)
-
- University of Nebraska at Omaha (119)
- California State University, San Bernardino (96)
- Old Dominion University (95)
- San Jose State University (85)
- University of Dayton (82)
- The University of Maine (67)
- City University of New York (CUNY) (65)
- University of Nebraska - Lincoln (54)
- Air Force Institute of Technology (53)
- SelectedWorks (53)
- Technological University Dublin (51)
- University of South Florida (50)
- Kennesaw State University (46)
- Nova Southeastern University (43)
- Claremont Colleges (42)
- University of Wisconsin Milwaukee (42)
- University of Arkansas, Fayetteville (41)
- Western Kentucky University (41)
- Dakota State University (39)
- Institute of Business Administration (38)
- California Polytechnic State University, San Luis Obispo (36)
- Western University (35)
- Ateneo de Manila University (34)
- Governors State University (34)
- Purdue University (34)
- Keyword
-
- Machine learning (101)
- Information technology (93)
- Data mining (89)
- Social media (78)
- Twitter (64)
-
- Machine Learning (57)
- Cybersecurity (54)
- Semantic Web (54)
- Deep learning (52)
- Artificial intelligence (49)
- Online learning (49)
- Information Technology (47)
- Classification (46)
- Cloud computing (45)
- Information retrieval (45)
- Privacy (45)
- Big data (44)
- Database (43)
- Ontology (43)
- Computer science (42)
- Information security (41)
- Algorithms (40)
- Security (40)
- Databases (39)
- Information systems (39)
- Management (37)
- Clustering (36)
- Data Mining (36)
- Northern Ohio Data and Information Service (NODIS) (36)
- Technology (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (2867)
- Kno.e.sis Publications (541)
- Walden Dissertations and Doctoral Studies (447)
- Theses and Dissertations (116)
- Dissertations (107)
-
- Computer Science Faculty Publications (91)
- Computer Science and Engineering Faculty Publications (91)
- Theses Digitization Project (84)
- Master's Projects (68)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Electronic Theses and Dissertations (55)
- Dissertations and Theses Collection (Open Access) (50)
- Theses (46)
- USF Tampa Graduate Theses and Dissertations (46)
- CCE Theses and Dissertations (42)
- Information Systems and Quantitative Analysis Faculty Publications (41)
- Kyriakos MOURATIDIS (40)
- CGU Faculty Publications and Research (37)
- International Conference on Information and Communication Technologies (36)
- Open Educational Resources (34)
- Department of Information Systems & Computer Science Faculty Publications (33)
- All Capstone Projects (32)
- Graduate Theses and Dissertations (32)
- Masters Theses & Doctoral Dissertations (32)
- Articles (29)
- Conference papers (28)
- David LO (28)
- Journal of Spatial Information Science (28)
- All Maxine Goodman Levin School of Urban Affairs Publications (27)
- Saverio Perugini (25)
- Publication Type
Articles 1231 - 1260 of 6720
Full-Text Articles in Physical Sciences and Mathematics
Boundary Precedence Image Inpainting Method Based On Self-Organizing Maps, Haibo Pen, Quan Wang, Zhaoxia Wang
Boundary Precedence Image Inpainting Method Based On Self-Organizing Maps, Haibo Pen, Quan Wang, Zhaoxia Wang
Research Collection School Of Computing and Information Systems
In addition to text data analysis, image analysis is an area that has increasingly gained importance in recent years because more and more image data have spread throughout the internet and real life. As an important segment of image analysis techniques, image restoration has been attracting a lot of researchers’ attention. As one of AI methodologies, Self-organizing Maps (SOMs) have been applied to a great number of useful applications. However, it has rarely been applied to the domain of image restoration. In this paper, we propose a novel image restoration method by leveraging the capability of SOMs, and we name …
Mixed Dish Recognition With Contextual Relation And Domain Alignment, Lixi Deng, Jingjing Chen, Chong-Wah Ngo, Qianru Sun, Sheng Tang, Yongdong Zhang, Tat-Seng Chua
Mixed Dish Recognition With Contextual Relation And Domain Alignment, Lixi Deng, Jingjing Chen, Chong-Wah Ngo, Qianru Sun, Sheng Tang, Yongdong Zhang, Tat-Seng Chua
Research Collection School Of Computing and Information Systems
Mixed dish is a food category that contains different dishes mixed in one plate, and is popular in Eastern and Southeast Asia. Recognizing the individual dishes in a mixed dish image is important for health related applications, e.g. to calculate the nutrition values of the dish. However, most existing methods that focus on single dish classification are not applicable to the recognition of mixed dish images. The main challenge of mixed dish recognition comes from three aspects: a wide range of dish types, the complex dish combination with severe overlap between different dishes and the large visual variances of same …
Spectral Tensor Train Parameterization Of Deep Learning Layers, A. Obukhov, M. Rakhuba, A. Liniger, Zhiwu Huang, S. Georgoulis, D. Dai, Van Gool L.
Spectral Tensor Train Parameterization Of Deep Learning Layers, A. Obukhov, M. Rakhuba, A. Liniger, Zhiwu Huang, S. Georgoulis, D. Dai, Van Gool L.
Research Collection School Of Computing and Information Systems
We study low-rank parameterizations of weight matrices with embedded spectral properties in the Deep Learning context. The low-rank property leads to parameter efficiency and permits taking computational shortcuts when computing mappings. Spectral properties are often subject to constraints in optimization problems, leading to better models and stability of optimization. We start by looking at the compact SVD parameterization of weight matrices and identifying redundancy sources in the parameterization. We further apply the Tensor Train (TT) decomposition to the compact SVD components, and propose a non-redundant differentiable parameterization of fixed TT-rank tensor manifolds, termed the Spectral Tensor Train Parameterization (STTP). We …
Sentiment-Oriented Metric Learning For Text-To-Image Retrieval, Quoc Tuan Truong, Hady W. Lauw
Sentiment-Oriented Metric Learning For Text-To-Image Retrieval, Quoc Tuan Truong, Hady W. Lauw
Research Collection School Of Computing and Information Systems
In this era of multimedia Web, text-to-image retrieval is a critical function of search engines and visually-oriented online platforms. Traditionally, the task primarily deals with matching a text query with the most relevant images available in the corpus. To an increasing extent, the Web also features visual expressions of preferences, imbuing images with sentiments that express those preferences. Cases in point include photos in online reviews as well as social media. In this work, we study the effects of sentiment information on text-to-image retrieval. Particularly, we present two approaches for incorporating sentiment orientation into metric learning for cross-modal retrieval. Each …
A Fully Dynamic Algorithm For K-Regret Minimizing Sets, Yanhao Wang, Yuchen Li, Raymond Chi-Wing Wong, Kian-Lee Tan
A Fully Dynamic Algorithm For K-Regret Minimizing Sets, Yanhao Wang, Yuchen Li, Raymond Chi-Wing Wong, Kian-Lee Tan
Research Collection School Of Computing and Information Systems
Selecting a small set of representatives from a large database is important in many applications such as multi-criteria decision making, web search, and recommendation. The k-regret minimizing set (k-RMS) problem was recently proposed for representative tuple discovery. Specifically, for a large database P of tuples with multiple numerical attributes, the k-RMS problem returns a size-r subset Q of P such that, for any possible ranking function, the score of the top-ranked tuple in Q is not much worse than the score of the kth-ranked tuple in P. Although the k-RMS problem has been extensively studied in the literature, existing methods …
Learning Network-Based Multi-Modal Mobile User Interface Embeddings, Gary Ang, Ee-Peng Lim
Learning Network-Based Multi-Modal Mobile User Interface Embeddings, Gary Ang, Ee-Peng Lim
Research Collection School Of Computing and Information Systems
Rich multi-modal information - text, code, images, categorical and numerical data - co-exist in the user interface (UI) design of mobile applications. UI designs are composed of UI entities supporting different functions which together enable the application. To support effective search and recommendation applications over mobile UIs, we need to be able to learn UI representations that integrate latent semantics. In this paper, we propose a novel unsupervised model - Multi-modal Attention-based Attributed Network Embedding (MAAN) model. MAAN is designed to capture both multi-modal and structural network information. Based on the encoder-decoder framework, MAAN aims to learn UI representations that …
Buffer Overflow And Sql Injection In C++, Noah Warren Kapley
Buffer Overflow And Sql Injection In C++, Noah Warren Kapley
Masters Theses & Specialist Projects
Buffer overflows and SQL Injection have plagued programmers for many years. A successful buffer overflow, innocuous or not, damages a computer’s permanent memory. Safer buffer overflow programs are presented in this thesis for the C programs characterizing string concatenation, string copy, and format get string, a C program which takes input and output from a keyboard, in most cases. Safer string concatenation and string copy programs presented in this thesis require the programmer to specify the amount of storage space necessary for the program’s execution. This safety mechanism is designed to help programmers avoid over specifying the amount of storage …
Iotbox: Sandbox Mining To Prevent Interaction Threats In Iot Systems, Hong Jin Kang, Sheng Qin Sim, David Lo
Iotbox: Sandbox Mining To Prevent Interaction Threats In Iot Systems, Hong Jin Kang, Sheng Qin Sim, David Lo
Research Collection School Of Computing and Information Systems
Internet of Things (IoT) apps provide great convenience but exposes us to new safety threats. Unlike traditional software systems, threats may emerge from the joint behavior of multiple apps. While prior studies use handcrafted safety and security policies to detect these threats, these policies may not anticipate all usages of the devices and apps in a smart home, causing false alarms. In this study, we propose to use the technique of mining sandboxes for securing an IoT environment. After a set of behaviors are analyzed from a bundle of apps and devices, a sandbox is deployed, which enforces that previously …
Collections As Data At Florida International University, Jamie Rogers
Collections As Data At Florida International University, Jamie Rogers
Works of the FIU Libraries
This presentation provides an overview of the concept of collections as data; shares information about our "dLOC as Data" grant initiative, a collaboration between the Digital Library of the Caribbean (dLOC), the Florida International University (FIU) Libraries Digital Collections Center, and the University of Florida Libraries, funded by the Mellon sub-award program, "Collections as Data: Part to Whole" ; as well as provides an opportunity to talk about how we can share more collections as data resources and undertake new and exciting projects at FIU.
Although the concept of collections as data isn't new, it is becoming more mainstream. As …
The Role Of Privacy Within The Realm Of Healthcare Wearables' Acceptance And Use, Thomas Jernejcic
The Role Of Privacy Within The Realm Of Healthcare Wearables' Acceptance And Use, Thomas Jernejcic
Masters Theses & Doctoral Dissertations
The flexibility and vitality of the Internet along with technological innovation have fueled an industry focused on the design of portable devices capable of supporting personal activities and wellbeing. These compute devices, known as wearables, are unique from other computers in that they are portable, specific in function, and worn or carried by the user. While there are definite benefits attributable to wearables, there are also notable risks, especially in the realm of security where personal information and/or activities are often accessible to third parties. In addition, protecting one’s private information is regularly an afterthought and thus lacking in maturity. …
Enconter: Entity Constrained Progressive Sequence Generation Via Insertion-Based Transformer, Lee Hsun Hsieh, Yang Yin Lee, Ee-Peng Lim
Enconter: Entity Constrained Progressive Sequence Generation Via Insertion-Based Transformer, Lee Hsun Hsieh, Yang Yin Lee, Ee-Peng Lim
Research Collection School Of Computing and Information Systems
Pretrained using large amount of data, autoregressive language models are able to generate high quality sequences. However, these models do not perform well under hard lexical constraints as they lack fine control of content generation process. Progressive insertion-based transformers can overcome the above limitation and efficiently generate a sequence in parallel given some input tokens as constraint. These transformers however may fail to support hard lexical constraints as their generation process is more likely to terminate prematurely. The paper analyses such early termination problems and proposes the ENtity-CONstrained insertion TransformER (ENCONTER), a new insertion transformer that addresses the above pitfall …
Efficient Retrieval Of Matrix Factorization-Based Top-K Recommendations: A Survey Of Recent Approaches, Duy Dung Le, Hady W. Lauw
Efficient Retrieval Of Matrix Factorization-Based Top-K Recommendations: A Survey Of Recent Approaches, Duy Dung Le, Hady W. Lauw
Research Collection School Of Computing and Information Systems
Top-k recommendation seeks to deliver a personalized list of k items to each individual user. An established methodology in the literature based on matrix factorization (MF), which usually represents users and items as vectors in low-dimensional space, is an effective approach to recommender systems, thanks to its superior performance in terms of recommendation quality and scalability. A typical matrix factorization recommender system has two main phases: preference elicitation and recommendation retrieval. The former analyzes user-generated data to learn user preferences and item characteristics in the form of latent feature vectors, whereas the latter ranks the candidate items based on the …
Dismastd: An Efficient Distributed Multi-Aspect Streaming Tensor Decomposition, Keyu Yang, Yunjun Gao, Yifeng Shen, Baihua Zheng, Lu Chen
Dismastd: An Efficient Distributed Multi-Aspect Streaming Tensor Decomposition, Keyu Yang, Yunjun Gao, Yifeng Shen, Baihua Zheng, Lu Chen
Research Collection School Of Computing and Information Systems
Tensor decomposition is a fundamental multidimensional data analysis tool for many data-driven applications, such as social computing, computer vision, and bioinformatics, to name but a few. However, the rapidly increasing streaming data nowadays introduces new challenges to traditional static tensor decomposition. It requires an efficient distributed dynamic tensor decomposition without re-computing the whole tensor from scratch. In this paper, we propose DisMASTD, an efficient distributed multi-aspect streaming tensor decomposition. First, we prove the optimal tensor partitioning problem is NP-hard. Second, we present two heuristic tensor partitioning approaches to ensure the load balancing. Third, we develop a distributed multi-aspect streaming tensor …
Newslink: Empowering Intuitive News Search With Knowledge Graphs, Yueji Yang, Yuchen Li, Anthony Tung
Newslink: Empowering Intuitive News Search With Knowledge Graphs, Yueji Yang, Yuchen Li, Anthony Tung
Research Collection School Of Computing and Information Systems
News search tools help end users to identify relevant news stories. However, existing search approaches often carry out in a "black-box" process. There is little intuition that helps users understand how the results are related to the query. In this paper, we propose a novel news search framework, called NEWSLINK, to empower intuitive news search by using relationship paths discovered from open Knowledge Graphs (KGs). Specifically, NEWSLINK embeds both a query and news documents to subgraphs, called subgraph embeddings, in the KG. Their embeddings' overlap induces relationship paths between the involving entities. Two major advantages are obtained by incorporating subgraph …
Building And Using Digital Libraries For Etds, Edward A. Fox
Building And Using Digital Libraries For Etds, Edward A. Fox
The Journal of Electronic Theses and Dissertations
Despite the high value of electronic theses and dissertations (ETDs), the global collection has seen limited use. To extend such use, a new approach to building digital libraries (DLs) is needed. Fortunately, recent decades have seen that a vast amount of “gray literature” has become available through a diverse set of institutional repositories as well as regional and national libraries and archives. Most of the works in those collections include ETDs and are often freely available in keeping with the open-access movement, but such access is limited by the services of supporting information systems. As explained through a set of …
Analysis Of System Performance Metrics Towards The Detection Of Cryptojacking In Iot Devices, Richard Matthews
Analysis Of System Performance Metrics Towards The Detection Of Cryptojacking In Iot Devices, Richard Matthews
Masters Theses & Doctoral Dissertations
This single-case mechanism study examined the effects of cryptojacking on Internet of Things (IoT) device performance metrics. Cryptojacking is a cyber-threat that involves stealing the computational resources of devices belonging to others to generate cryptocurrencies. The resources primarily include the processing cycles of devices and the additional electricity needed to power this additional load. The literature surveyed showed that cryptojacking has been gaining in popularity and is now one of the top cyberthreats. Cryptocurrencies offer anyone more freedom and anonymity than dealing with traditional financial institutions which make them especially attractive to cybercriminals. Other reasons for the increasing popularity of …
Realium: Building The Future Of Real Estate On The Blockchain, Demitri Haddad
Realium: Building The Future Of Real Estate On The Blockchain, Demitri Haddad
Undergraduate Honors Theses
This paper discusses the prospective challenges, limitations and opportunities in the real estate sector for blockchain. It outlines the idea of Realium, a financial technology application that aims to assist in the purchase, sale, and legal compliance of real estate assets. For more information see docs.realium.io
Stabilization Of Cultural Innovations Depends On Population Density: Testing An Epidemiological Model Of Cultural Evolution Against A Global Dataset Of Rock Art Sites And Climate-Based Estimates Of Ancient Population Densities, Richard Walker, Anders Eriksson, Camille Ruiz, Taylor Howard Newton, Francesco Casalegno
Stabilization Of Cultural Innovations Depends On Population Density: Testing An Epidemiological Model Of Cultural Evolution Against A Global Dataset Of Rock Art Sites And Climate-Based Estimates Of Ancient Population Densities, Richard Walker, Anders Eriksson, Camille Ruiz, Taylor Howard Newton, Francesco Casalegno
Department of Information Systems & Computer Science Faculty Publications
Demographic models of human cultural evolution have high explanatory potential but weak empirical support. Here we use a global dataset of rock art sites and climate and genetics-based estimates of ancient population densities to test a new model based on epidemiological principles. The model focuses on the process whereby a cultural innovation becomes endemic in a population; predicting that this cannot occur unless population density exceeds a critical threshold. Analysis of the data; using a Bayesian statistical framework; shows that the model has stronger empirical support than a proportional model; where detection is directly proportional to population density; or a …
Mass Incarceration In Nebraska: Data And Historical Analysis Of Inmates From 1980-2020, Anna Krause
Mass Incarceration In Nebraska: Data And Historical Analysis Of Inmates From 1980-2020, Anna Krause
Honors Theses
This study examines Nebraska Department of Corrections inmate data from 1980-2020, looking specifically at inmate demographics and offense trends. State-of-the-art data analysis is conducted to collect, modify, and visualize the data sources. Inmates are organized by each decade they were incarcerated within. The current active prison population is also examined in their own research group. The demographic and offense trends are compared with previous local and national research. Historical context is given for evolving trends in offenses. Solutions for Nebraska prison overcrowding are presented from various interest groups. This study aims to enlighten all interested Nebraskans on who inhabits their …
A High-Accuracy And Power-Efficient Self-Optimizing Wireless Water Level Monitoring Iot Device For Smart City, Tsun-Kuang Chi, Hsiao-Chi Chen, Shih-Lun Chen, Patricia Angela R. Abu
A High-Accuracy And Power-Efficient Self-Optimizing Wireless Water Level Monitoring Iot Device For Smart City, Tsun-Kuang Chi, Hsiao-Chi Chen, Shih-Lun Chen, Patricia Angela R. Abu
Department of Information Systems & Computer Science Faculty Publications
In this paper; a novel self-optimizing water level monitoring methodology is proposed for smart city applications. Considering system maintenance; the efficiency of power consumption and accuracy will be important for Internet of Things (IoT) devices and systems. A multi-step measurement mechanism and power self-charging process are proposed in this study for improving the efficiency of a device for water level monitoring applications. The proposed methodology improved accuracy by 0.16–0.39% by moving the sensor to estimate the distance relative to different locations. Additional power is generated by executing a multi-step measurement while the power self-optimizing process used dynamically adjusts the settings …
The Dna Cloud: Is It Alive?, Theodoros Bargiotas
The Dna Cloud: Is It Alive?, Theodoros Bargiotas
LSU Doctoral Dissertations
In this analysis, I will firstly be presenting the current knowledge concerning the materiality of the internet based Cloud, which I will henceforth be referring to as simply the Cloud. For organisation purposes I have created two umbrella categories under which I place the ongoing research in the field. Scholars have been addressing the issue of Cloud materiality through broadly two prisms: sociological materiality and geopolitical materiality. The literature of course deals with the intricacies of the Cloud based on its present ferromagnetic storage functionality. However, developments in synthetic biology have caused private tech companies and University spin-offs to flirt …
Choosing Isds As A Major: Predictive Analysis, Sarah Johnson
Choosing Isds As A Major: Predictive Analysis, Sarah Johnson
Honors Theses
No abstract provided.
Bilateral Variational Autoencoder For Collaborative Filtering, Quoc Tuan Truong, Aghiles Salah, Hady W. Lauw
Bilateral Variational Autoencoder For Collaborative Filtering, Quoc Tuan Truong, Aghiles Salah, Hady W. Lauw
Research Collection School Of Computing and Information Systems
Preference data is a form of dyadic data, with measurements associated with pairs of elements arising from two discrete sets of objects. These are users and items, as well as their interactions, e.g., ratings. We are interested in learning representations for both sets of objects, i.e., users and items, to predict unknown pairwise interactions. Motivated by the recent successes of deep latent variable models, we propose Bilateral Variational Autoencoder (BiVAE), which arises from a combination of a generative model of dyadic data with two inference models, user- and item-based, parameterized by neural networks. Interestingly, our model can take the form …
Explainable Recommendation With Comparative Constraints On Product Aspects, Trung-Hoang Le, Hady W. Lauw
Explainable Recommendation With Comparative Constraints On Product Aspects, Trung-Hoang Le, Hady W. Lauw
Research Collection School Of Computing and Information Systems
To aid users in choice-making, explainable recommendation models seek to provide not only accurate recommendations but also accompanying explanations that help to make sense of those recommendations. Most of the previous approaches rely on evaluative explanations, assessing the quality of an individual item along some aspects of interest to the user. In this work, we are interested in comparative explanations, the less studied problem of assessing a recommended item in comparison to another reference item.
In particular, we propose to anchor reference items on the previously adopted items in a user's history. Not only do we aim at providing comparative …
Enhancing Healthcare Professional And Caregiving Staff Informedness With Data Analytics For Chronic Disease Management, Na Liu, Robert John Kauffman
Enhancing Healthcare Professional And Caregiving Staff Informedness With Data Analytics For Chronic Disease Management, Na Liu, Robert John Kauffman
Research Collection School Of Computing and Information Systems
An important area in healthcare to which data analytics can be applied is chronic disease management. The chronic care model is mostly patient-centric, so patients have been considered as the end users of data analytics. The information needs of healthcare providers have been overlooked. Drawing upon the theory of informedness and the transtheoretical model of health behavior change, we use a multicase study approach to investigate the information needs of different caregiving stakeholders in the spectrum of chronic diseases, and how data analytics can be designed to meet the varying needs of professionals and staff to support their informedness.
How Do Users Answer Matlab Questions On Q&A Sites? A Case Study On Stack Overflow And Mathworks, Mahshid Naghashzadeh, Amir Hagshenas, Ashkan Sami, David Lo
How Do Users Answer Matlab Questions On Q&A Sites? A Case Study On Stack Overflow And Mathworks, Mahshid Naghashzadeh, Amir Hagshenas, Ashkan Sami, David Lo
Research Collection School Of Computing and Information Systems
MATLAB is an engineering programming language with various toolboxes that has a dedicated Question and Answer (Q&A) platform on the MathWorks website, which is similar to Stack Overflow (SO). Moreover, some MATLAB users ask their questions on SO. This paper aims to compare these two Q&A platforms to see what kind of questions are asked and how developers answer these questions in each platform. The result of our analysis on 80,382 MATLAB questions on SO and 266,367 questions on MathWorks show that MATLAB questions on topics ranging from the MATLAB software installation to questions related to programming received high votes …
Learning To Assess The Quality Of Stroke Rehabilitation Exercises, Min Hun Lee, Daniel P. Siewiorek, Asim Smailagic, Alexandre Bernardino, Sergi Bermúdez I Badia
Learning To Assess The Quality Of Stroke Rehabilitation Exercises, Min Hun Lee, Daniel P. Siewiorek, Asim Smailagic, Alexandre Bernardino, Sergi Bermúdez I Badia
Research Collection School Of Computing and Information Systems
Due to the limited number of therapists, task-oriented exercises are often prescribed for post-stroke survivors as in-home rehabilitation. During in-home rehabilitation, a patient may become unmotivated or confused to comply prescriptions without the feedback of a therapist. To address this challenge, this paper proposes an automated method that can achieve not only qualitative, but also quantitative assessment of stroke rehabilitation exercises. Specifically, we explored a threshold model that utilizes the outputs of binary classifiers to quantify the correctness of a movements into a performance score. We collected movements of 11 healthy subjects and 15 post-stroke survivors using a Kinect sensor …
Can We Classify Cashless Payment Solution Implementations At The Country Level?, Dennis Ng, Robert J. Kauffman, Paul Robert Griffin
Can We Classify Cashless Payment Solution Implementations At The Country Level?, Dennis Ng, Robert J. Kauffman, Paul Robert Griffin
Research Collection School Of Computing and Information Systems
This research commentary proposes a 3-D implementation classification framework to assist service providers and business leaders in understanding the kinds of contexts in which more or less successful cashless payment solutions are observed at point-of-sale (PoS) settings. Three constructs characterize the framework: the digitalization of the local implementation environment; the relative novelty of a given payment technology solution in a country at a specific point in time; and the development status of the country’s national infrastructure. The framework is motivated by a need to support cross-country research in this domain. We analyze eight country mini-cases based on an eight-facet (2 …
A Consent Framework For The Internet Of Things In The Gdpr Era, Gerald Chikukwa
A Consent Framework For The Internet Of Things In The Gdpr Era, Gerald Chikukwa
Masters Theses & Doctoral Dissertations
The Internet of Things (IoT) is an environment of connected physical devices and objects that communicate amongst themselves over the internet. The IoT is based on the notion of always-connected customers, which allows businesses to collect large volumes of customer data to give them a competitive edge. Most of the data collected by these IoT devices include personal information, preferences, and behaviors. However, constant connectivity and sharing of data create security and privacy concerns. Laws and regulations like the General Data Protection Regulation (GDPR) of 2016 ensure that customers are protected by providing privacy and security guidelines to businesses. Data …
Towards Identity Relationship Management For Internet Of Things, Mohammad Muntasir Nur
Towards Identity Relationship Management For Internet Of Things, Mohammad Muntasir Nur
Masters Theses & Doctoral Dissertations
Identity and Access Management (IAM) is in the core of any information systems. Traditional IAM systems manage users, applications, and devices within organizational boundaries, and utilize static intelligence for authentication and access control. Identity federation has helped a lot to deal with boundary limitation, but still limited to static intelligence – users, applications and devices must be under known boundaries. However, today’s IAM requirements are much more complex. Boundaries between enterprise and consumer space, on premises and cloud, personal devices and organization owned devices, and home, work and public places are fading away. These challenges get more complicated for Internet …