Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1321 - 1350 of 6720

Full-Text Articles in Physical Sciences and Mathematics

Strategies Project Managers Use That Reduce Information Technology Project Failures In The Insurance Industry, Jamarcus Snipes Jan 2021

Strategies Project Managers Use That Reduce Information Technology Project Failures In The Insurance Industry, Jamarcus Snipes

Walden Dissertations and Doctoral Studies

The worldwide failure rate of information technology (IT) projects is approximately 65%. Insurance project managers who fail to successfully implement IT projects negatively impact organizational performance and profitability. Grounded in the management by objectives theory, the purpose of this qualitative multiple case study was to explore strategies project managers use to reduce IT project failures in the insurance industry. The participants comprised four IT project managers in Alabama who successfully used strategies to reduce IT project failures in the insurance industry. Data were collected from virtual semistructured interviews, company documents, existing literature, and journal notes. Thematic analysis was used to …


Strategies For Implementing Internet Of Things Devices In Manufacturing Environments, Todd Efrain Hernandez Jan 2021

Strategies For Implementing Internet Of Things Devices In Manufacturing Environments, Todd Efrain Hernandez

Walden Dissertations and Doctoral Studies

The Internet of Things (IoT) has been exploited as a threat vector for cyberattacks in manufacturing environments. Manufacturing industry leaders are concerned with cyberattacks because of the associated costs of damages and lost production for their organizations. Grounded in the general systems theory, the purpose of this multiple case study was to explore strategies electrical controls engineers use to implement secure IoT devices in manufacturing environments. The study participants were eight electrical controls engineers working in three separate manufacturing facilities located in the Midwest region of the United States. The data were collected by semistructured interviews and 15 organizational documents. …


Impact Of Information Breaches On Health Care Records, Anton Antony Arockiasamy Jan 2021

Impact Of Information Breaches On Health Care Records, Anton Antony Arockiasamy

Walden Dissertations and Doctoral Studies

Although there were almost 3.5 million reported information breaches of health care data in the first quarter of 2019, health care providers do not know the extent of digital and nondigital breaches of patient medical records. The purpose of this quantitative, comparative study was to identify the difference between the individual patient records affected by digital versus nondigital breaches for three types of health care entities in the United States, health care providers, health care plans, and health care clearinghouses. Allman’s privacy regulation theory, the National Institute of Standards and Technology Privacy Framework, and ecological systems theory comprised the theoretical …


Characteristics Of Authentic Entrepreneurial Leadership Within Information Technology Startups In Kenya, Christine Mukhwana Jan 2021

Characteristics Of Authentic Entrepreneurial Leadership Within Information Technology Startups In Kenya, Christine Mukhwana

Walden Dissertations and Doctoral Studies

In Kenya, over 60% of nascent entrepreneurs start businesses with minimal leadership experience, engendering founder-CEOs who cannot sustain a business beyond its formative years. The problem is the nascent entrepreneurs’ lack of understanding of effective leadership. The purpose of this qualitative, phenomenological study was to develop a more nuanced understanding of authentic leadership behavior from the perspective of nascent entrepreneurs. Authentic leadership theory and the three-factor model were used to conceptualize the study. The research question focused on nascent entrepreneurs’ lived experiences and understanding of authentic leadership. The participants in the study were entrepreneurs from the information technology industry in …


Mobile Network Infrastructure Security In Developing Countries – A Kenya Case Study, James M. Omanwa Jan 2021

Mobile Network Infrastructure Security In Developing Countries – A Kenya Case Study, James M. Omanwa

Walden Dissertations and Doctoral Studies

The usage of mobile network infrastructure to access internet resources for organizations is getting higher year by year in sub-Saharan Africa. However, there was an increase in malicious attacks on mobile networks and devices accessing mobile network infrastructure, targeting organizations’ private information. Grounded in Bandura’s social cognitive theory, the purpose of this multiple case study was to explore strategies security managers used to secure mobile network infrastructures from cyberattacks. Participants comprised four security managers in Kenya in two major cities who successfully implemented strategies to mitigate cyberattacks on the mobile network infrastructures. Data were gathered from video conference, face-to-face, semi-structured …


The Introduction Of Big Data In Cloud Computing, Austin Gruenberg Jan 2021

The Introduction Of Big Data In Cloud Computing, Austin Gruenberg

Student Academic Conference

One of the fastest-growing technologies that many people are unaware of is the world of cloud computing. Having started in 2006, it is a relatively new technological advancement in the computer industry. The major branch of cloud computing that I decided to focus on was big data. I decided to research this topic to better understand what its current uses are, to see what the future holds for Big Data and cloud computing and because it is a growing, significant piece of technology being used in our society today. Big data and cloud computing are very important industries and have …


Successful Strategies For Adopting Open-Source Software, Balla Barro Jan 2021

Successful Strategies For Adopting Open-Source Software, Balla Barro

Walden Dissertations and Doctoral Studies

Middle-level information systems managers (ISMs) in small-scale organizations often have challenges in determining the most appropriate strategy for adopting open-source software (OSS) in their organizations. The ISMs need to determine the right strategy for adopting OSS to protect the organizations’ information technology infrastructure. Grounded in the diffusion of innovation theory, the objective of this multiple case study was to explore strategies middle-level ISMs used to adopt OSS in their small-scale organizations. Six middle-level ISMs from three small-scale organizations with experience of not less than six years in OSS adoption strategy in the city of Frederick, Maryland, shared their strategies during …


Reliable Data Collection: A Tool For Data Integrity In Nigeria, Stella Tonye Whyte Jan 2021

Reliable Data Collection: A Tool For Data Integrity In Nigeria, Stella Tonye Whyte

Walden Dissertations and Doctoral Studies

Unreliable and poor-quality data is a significant threat to governmental institutions because of its devastating impact on nations' social and economic well-being. Managers in government organizations require reliable data to inform economic planning and decision-making. Grounded in the theory of total quality management, the purpose of this qualitative multiple case study was to explore strategies information technology (IT) managers in sub-Saharan African countries use to ensure the reliability of data. The participants were 12 IT managers in three government establishments in Port Harcourt, Rivers State, Nigeria, responsible for ensuring the data reliability for economic planning and decision-making. The data collection …


Predictive Modeling Of Critical Temperatures In Superconducting Materials, Markus Hofmann, Natalia Sizochenko Jan 2021

Predictive Modeling Of Critical Temperatures In Superconducting Materials, Markus Hofmann, Natalia Sizochenko

Articles

n this study, we have investigated quantitative relationships between critical temperaturesof superconductive inorganic materials and the basic physicochemical attributes of these materials(also called quantitative structure-property relationships). We demonstrated that one of the mostrecent studies (titled "A data-driven statistical model for predicting the critical temperature of asuperconductor” and published in Computational Materials Science by K. Hamidieh in 2018) reportson models that were based on the dataset that contains 27% of duplicate entries. We aimed todeliver stable models for a properly cleaned dataset using the same modeling techniques (multiplelinear regression, MLR, and gradient boosting decision trees, XGBoost). The predictive ability ofour best …


Information Architecture For A Chemical Modeling Knowledge Graph, Adam R. Luxon Jan 2021

Information Architecture For A Chemical Modeling Knowledge Graph, Adam R. Luxon

Theses and Dissertations

Machine learning models for chemical property predictions are high dimension design challenges spanning multiple disciplines. Free and open-source software libraries have streamlined the model implementation process, but the design complexity remains. In order better navigate and understand the machine learning design space, model information needs to be organized and contextualized. In this work, instances of chemical property models and their associated parameters were stored in a Neo4j property graph database. Machine learning model instances were created with permutations of dataset, learning algorithm, molecular featurization, data scaling, data splitting, hyperparameters, and hyperparameter optimization techniques. The resulting graph contains over 83,000 nodes …


Proposed Data Governance Framework For Small And Medium Scale Enterprises (Smes), Rejoice Okoro Jan 2021

Proposed Data Governance Framework For Small And Medium Scale Enterprises (Smes), Rejoice Okoro

All Graduate Theses, Dissertations, and Other Capstone Projects

Data governance is not a one size fits all, instead, it should be an evolutionary process that can be started small and measurable along the way. This research aims at proposing a data governance framework by ensuring data management processes, data security and control are compliant with laws and policies. This article also presents the first results of a comparative analysis between three data privacy laws and outlines five components which together form a data governance framework for SMEs. The data governance model documents data quality roles and their type of interaction with data quality management activities exploring how data …


Accelerating Aggregation Efficiency: Using Postgres As A Cache With Mongodb, Mason Q. Porter-Brown Jan 2021

Accelerating Aggregation Efficiency: Using Postgres As A Cache With Mongodb, Mason Q. Porter-Brown

Senior Projects Fall 2021

For decades now relational databases, namely SQL, have been the industry standard. However, recently MongoDB and other NoSQL databases have been growing in popularity due to their flexibility and scalability. SQL still has the upper hand in a variety of areas, including data consistency, advanced and established analytics functions, and efficient “JOIN” functions. This project focuses on MongoDB’s shortcomings when it comes to replicating “JOIN” operations using MongoDB’s aggregate functions. “JOIN” operations refer to the action of comparing data from one or more collections of data and joining similar data together in order to analyze and draw statistics from the …


Introducing A Test Framework For Quality Of Service Mechanisms In The Context Of Software-Defined Networking, Josiah Eleazar T. Regencia, William Emmanuel S. Yu Jan 2021

Introducing A Test Framework For Quality Of Service Mechanisms In The Context Of Software-Defined Networking, Josiah Eleazar T. Regencia, William Emmanuel S. Yu

Department of Information Systems & Computer Science Faculty Publications

In traditional non-distributed networking architecture, supporting Quality of Service (QoS) has been challenging due to its centralized nature. Software-Defined Networking (SDN) provides dynamic, flexible and scalable control and management for networks. This study introduces a test framework for testing QoS mechanisms and network topologies inside an SDN environment. Class-Based Queueing QoS mechanisms are tested as an anchor to test the introduced framework. Using a previous study as a benchmark to test the introduced framework, results show that the test framework works accordingly and is capable of producing accurate results. Moreover, results in this study show that the distributed Leaf-enforced QoS …


Cura Personalis: Institutionalizing Compassion During Emergency Remote Teaching, Ma. Monica L. Moreno, Ma. Mercedes T. Rodrigo, Johanna Marion R. Torres, Timothy Jireh Gaspar, Jenilyn L. Agapito Jan 2021

Cura Personalis: Institutionalizing Compassion During Emergency Remote Teaching, Ma. Monica L. Moreno, Ma. Mercedes T. Rodrigo, Johanna Marion R. Torres, Timothy Jireh Gaspar, Jenilyn L. Agapito

Department of Information Systems & Computer Science Faculty Publications

Faced with the fears and anxieties brought on by the COVID-19 crisis, educational institutions had to devise new compassion-based teaching and learning policies and approaches that recognized and provided for the pandemic’s psychological and emotional toll. This paper describes how the Ateneo de Manila University in the Philippines enacted its core value of cura personalis, care for the entire person, in the context of emergency remote teaching. We describe the circumstances that prompted the greater emphasis on compassion and the adjustments to classroom management, course content, class interactions, and assessment. Finally we describe the tradeoffs or costs of this …


Strategies To Monitor And Deter Cyberloafing In Small Businesses: A Case Study, Veronica Pugh Dooly Jan 2021

Strategies To Monitor And Deter Cyberloafing In Small Businesses: A Case Study, Veronica Pugh Dooly

Walden Dissertations and Doctoral Studies

Some information technology (IT) managers working for small businesses are struggling to monitor and deter cyberloafing. Strategies are needed to help IT practitioners to discourage cyberloafing and improve productivity while maintaining employee satisfaction. Grounded in adaptive structuration theory, the purpose of this qualitative multiple-case study was to explore strategies some small business IT managers use to monitor and deter cyberloafing. The participants were nine IT managers who successfully implemented cyberloafing monitoring and deterrence strategies in the United States. Data were collected via semistructured interviews and organization employee policy handbooks (n = 4) provided by the participants. Data were analyzed using …


Football’S Future: An Analytical Interpretation Of The Premier League, Hunter Witeof Jan 2021

Football’S Future: An Analytical Interpretation Of The Premier League, Hunter Witeof

Williams Honors College, Honors Research Projects

This project looks to take the statistics of soccer players and run them through an algorithm to determine how well a player is performing. The system that will be designed in the project will look to accomplish 3 main goals: allow the user to enter new statistics, store the data for all 38 game weeks for all 20 teams, and compute a score for each player’s performance for each game as well as the average of all of the player's scores.


See-Trend: Secure Traffic-Related Event Detection In Smart Communities, Stephan Olariu, Dimitrie C. Popescu Jan 2021

See-Trend: Secure Traffic-Related Event Detection In Smart Communities, Stephan Olariu, Dimitrie C. Popescu

Computer Science Faculty Publications

It has been widely recognized that one of the critical services provided by Smart Cities and Smart Communities is Smart Mobility. This paper lays the theoretical foundations of SEE-TREND, a system for Secure Early Traffic-Related EveNt Detection in Smart Cities and Smart Communities. SEE-TREND promotes Smart Mobility by implementing an anonymous, probabilistic collection of traffic-related data from passing vehicles. The collected data are then aggregated and used by its inference engine to build beliefs about the state of the traffic, to detect traffic trends, and to disseminate relevant traffic-related information along the roadway to help the driving public make informed …


Adversarial Specification Mining, Hong Jin Kang, David Lo Jan 2021

Adversarial Specification Mining, Hong Jin Kang, David Lo

Research Collection School Of Computing and Information Systems

There have been numerous studies on mining temporal specifications from execution traces. These approaches learn finite-state automata (FSA) from execution traces when running tests. To learn accurate specifications of a software system, many tests are required. Existing approaches generalize from a limited number of traces or use simple test generation strategies. Unfortunately, these strategies may not exercise uncommon usage patterns of a software system. To address this problem, we propose a new approach, adversarial specification mining, and develop a prototype, DICE (Diversity through Counter-Examples). DICE has two components: DICE-Tester and DICE-Miner. After mining Linear Temporal Logic specifications from an input …


Novel Techniques In Recovering, Embedding, And Enforcing Policies For Control-Flow Integrity, Yan Lin Jan 2021

Novel Techniques In Recovering, Embedding, And Enforcing Policies For Control-Flow Integrity, Yan Lin

Dissertations and Theses Collection (Open Access)

Control-Flow Integrity (CFI) is an attractive security property with which most injected and code-reuse attacks can be defeated, including advanced attacking techniques like Return-Oriented Programming (ROP). CFI extracts a control-flow graph (CFG) for a given program and instruments the program to respect the CFG. Specifically, checks are inserted before indirect branch instructions. Before these instructions are executed during runtime, the checks consult the CFG to ensure that the indirect branch is allowed to reach the intended target. Hence, any sort of controlflow hijacking would be prevented. There are three fundamental components in CFI enforcement. The first component is accurately recovering …


"Who Can Help Me?'': Knowledge Infused Matching Of Support Seekers And Support Providers During Covid-19 On Reddit, Manas Gaur, Kaushik Roy, Aditya Sharma, Biplav Srivastava, Amit Sheth Jan 2021

"Who Can Help Me?'': Knowledge Infused Matching Of Support Seekers And Support Providers During Covid-19 On Reddit, Manas Gaur, Kaushik Roy, Aditya Sharma, Biplav Srivastava, Amit Sheth

Publications

During the ongoing COVID-19 crisis, subreddits on Reddit, such as r/Coronavirus saw a rapid growth in user's requests for help (support seekers - SSs) including individuals with varying professions and experiences with diverse perspectives on care (support providers - SPs). Currently, knowledgeable human moderators match an SS with a user with relevant experience, i.e, an SP on these subreddits. This unscalable process defers timely care. We present a medical knowledge-infused approach to efficient matching of SS and SPs validated by experts for the users affected by anxiety and depression, in the context of with COVID-19. After matching, each SP to …


Context-Aware Retrieval-Based Deep Commit Message Generation, Haoye Wang, Xin Xia, David Lo, Qiang He, Xinyu Wang, John Grundy Jan 2021

Context-Aware Retrieval-Based Deep Commit Message Generation, Haoye Wang, Xin Xia, David Lo, Qiang He, Xinyu Wang, John Grundy

Research Collection School Of Computing and Information Systems

Commit messages recorded in version control systems contain valuable information for software development, maintenance, and comprehension. Unfortunately, developers often commit code with empty or poor quality commit messages. To address this issue, several studies have proposed approaches to generate commit messages from commit diffs. Recent studies make use of neural machine translation algorithms to try and translate git diffs into commit messages and have achieved some promising results. However, these learning-based methods tend to generate high-frequency words but ignore low-frequency ones. In addition, they suffer from exposure bias issues, which leads to a gap between training phase and testing phase. …


Sustainability Of Rewards-Based Crowdfunding: A Quasi-Experimental Analysis Of Funding Targets And Backer Satisfaction, Michael Wessel, Rob Gleasure, Robert John Kauffman Jan 2021

Sustainability Of Rewards-Based Crowdfunding: A Quasi-Experimental Analysis Of Funding Targets And Backer Satisfaction, Michael Wessel, Rob Gleasure, Robert John Kauffman

Research Collection School Of Computing and Information Systems

Rewards-based crowdfunding presents an information asymmetry for participants due to the funding mechanism used. Campaign-backers trust creators to complete projects and deliver rewards as outlined prior to the fundraising process, but creators may discover better opportunities as they progress with a project. Despite this, the all-or-nothing (AON) mechanism on crowdfunding platforms incentivizes creators to set meager funding-targets that are easier to achieve but may offer limited slack when creators wish to simultaneously pursue emerging opportunities later in the project. We explore the related issues of how funding targets seem to be selected by the creators, and how dissatisfaction with the …


Deep Unsupervised Anomaly Detection, Tangqing Li, Zheng Wang, Siying Liu, Wen-Yan Lin Jan 2021

Deep Unsupervised Anomaly Detection, Tangqing Li, Zheng Wang, Siying Liu, Wen-Yan Lin

Research Collection School Of Computing and Information Systems

This paper proposes a novel method to detect anomalies in large datasets under a fully unsupervised setting. The key idea behind our algorithm is to learn the representation underlying normal data. To this end, we leverage the latest clustering technique suitable for handling high dimensional data. This hypothesis provides a reliable starting point for normal data selection. We train an autoencoder from the normal data subset, and iterate between hypothesizing normal candidate subset based on clustering and representation learning. The reconstruction error from the learned autoencoder serves as a scoring function to assess the normality of the data. Experimental results …


The Value Of Humanization In Customer Service, Yang Gao, Huaxia Rui, Shujing Sun Jan 2021

The Value Of Humanization In Customer Service, Yang Gao, Huaxia Rui, Shujing Sun

Research Collection School Of Computing and Information Systems

As algorithm-based agents become increasingly capable of handling customer service queries, customers are often uncertain whether they are served by humans or algorithms, and managers are left to question the value of human agents once the technology matures. The current paper studies this question by quantifying the impact of customers' enhanced perception of being served by human agents on customer service interactions. Our identification strategy hinges on the abrupt implementation by Southwest Airlines of a signature policy, which requires the inclusion of an agent's first name in responses on Twitter, thereby making the agent more humanized in the eyes of …


Facial Emotion Recognition With Noisy Multi-Task Annotations, S. Zhang, Zhiwu Huang, D.P. Paudel, Gool L. Van Jan 2021

Facial Emotion Recognition With Noisy Multi-Task Annotations, S. Zhang, Zhiwu Huang, D.P. Paudel, Gool L. Van

Research Collection School Of Computing and Information Systems

Human emotions can be inferred from facial expressions. However, the annotations of facial expressions are often highly noisy in common emotion coding models, including categorical and dimensional ones. To reduce human labelling effort on multi-task labels, we introduce a new problem of facial emotion recognition with noisy multitask annotations. For this new problem, we suggest a formulation from the point of joint distribution match view, which aims at learning more reliable correlations among raw facial images and multi-task labels, resulting in the reduction of noise influence. In our formulation, we exploit a new method to enable the emotion prediction and …


Smart Contracts: Will Fintech Be The Catalyst For The Next Global Financial Crisis?, Randall Duran, Paul Griffin Jan 2021

Smart Contracts: Will Fintech Be The Catalyst For The Next Global Financial Crisis?, Randall Duran, Paul Griffin

Research Collection School Of Computing and Information Systems

Purpose: This paper aims to examine the risks associated with smart contracts, a disruptive financial technology (FinTech) innovation, and assesses how in the future they could threaten the integrity of the global financial system. Design/methodology/approach: A qualitative approach is used to identify risk factors related to the use of new financial innovations, by examining how over-the-counter (OTC) derivatives contributed to the Global Financial Crisis (GFC) which occurred during 2007 and 2008. Based on this analysis, the potential for similar concerns with smart contracts are evaluated, drawing on the failure of The DAO on the Ethereum blockchain, which involved the loss …


Generic Design Methodology For Smart Manufacturing Systems From A Practical Perspective, Part I—Digital Triad Concept And Its Application As A System Reference Model, Zhuming Bi, Wen-Jun Zhang, Chong Wu, Chaomin Luo, Lida Xu Jan 2021

Generic Design Methodology For Smart Manufacturing Systems From A Practical Perspective, Part I—Digital Triad Concept And Its Application As A System Reference Model, Zhuming Bi, Wen-Jun Zhang, Chong Wu, Chaomin Luo, Lida Xu

Information Technology & Decision Sciences Faculty Publications

Rapidly developed information technologies (IT) have continuously empowered manufacturing systems and accelerated the evolution of manufacturing system paradigms, and smart manufacturing (SM) has become one of the most promising paradigms. The study of SM has attracted a great deal of attention for researchers in academia and practitioners in industry. However, an obvious fact is that people with different backgrounds have different expectations for SM, and this has led to high diversity, ambiguity, and inconsistency in terms of definitions, reference models, performance matrices, and system design methodologies. It has been found that the state of the art SM research is limited …


Coherence And Identity Learning For Arbitrary-Length Face Video Generation, Shuquan Ye, Chu Han, Jiaying Lin, Guoqiang Han, Shengfeng He Jan 2021

Coherence And Identity Learning For Arbitrary-Length Face Video Generation, Shuquan Ye, Chu Han, Jiaying Lin, Guoqiang Han, Shengfeng He

Research Collection School Of Computing and Information Systems

Face synthesis is an interesting yet challenging task in computer vision. It is even much harder to generate a portrait video than a single image. In this paper, we propose a novel video generation framework for synthesizing arbitrary-length face videos without any face exemplar or landmark. To overcome the synthesis ambiguity of face video, we propose a divide-and-conquer strategy to separately address the video face synthesis problem from two aspects, face identity synthesis and rearrangement. To this end, we design a cascaded network which contains three components, Identity-aware GAN (IA-GAN), Face Coherence Network, and Interpolation Network. IA-GAN is proposed to …


Activity Based Traffic Indicator System For Monitoring The Covid-19 Pandemic, Justin Junsay, Aaron Joaquin Lebumfacil, Ivan George Tarun, William Emmanuel S. Yu Jan 2021

Activity Based Traffic Indicator System For Monitoring The Covid-19 Pandemic, Justin Junsay, Aaron Joaquin Lebumfacil, Ivan George Tarun, William Emmanuel S. Yu

Department of Information Systems & Computer Science Faculty Publications

This study describes an activity based traffic indicator system to provide information for COVID-19 pandemic management. The activity based traffic indicator system does this by utilizing a social probability model based on the birthday paradox to determine the exposure risk, the probability of meeting someone infected (PoMSI). COVID-19 data, particularly the 7-day moving average of the daily growth rate of cases (7-DMA of DGR) and cumulative confirmed cases of next week covering a period from April to September 2020, were then used to test PoMSI using Pearson correlation to verify whether it can be used as a factor for the …


Transactional Distances During Emergency Remote Teaching Experiences, Ma. Monica L. Moreno, Ma. Mercedes T. Rodrigo, Johanna Marion R. Torres, Timothy Jireh Gaspar, Jenilyn L. Agapito Jan 2021

Transactional Distances During Emergency Remote Teaching Experiences, Ma. Monica L. Moreno, Ma. Mercedes T. Rodrigo, Johanna Marion R. Torres, Timothy Jireh Gaspar, Jenilyn L. Agapito

Department of Information Systems & Computer Science Faculty Publications

The Transactional Distance Theory posits that successful remote learning occurs when teachers decrease psychological or transactional gaps. Narrowing the transactional distance can be achieved through a balance of appropriate course structure and dialogue, fostering healthy student autonomy in the process. This paper describes the Emergency Remote Teaching experiences of faculty and students of the Ateneo de Manila University in the Philippines. It examines these experiences in the context of the transactional distance framework. Findings show that a sudden shift to remote learning mandates greater student autonomy, which increases transactional distance. Because of this, efforts by faculty to increase student-teacher dialogue …