Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1711 - 1740 of 6720

Full-Text Articles in Physical Sciences and Mathematics

Obstacles With Data Security: Strategies From Carolina Universities, Yamiah R. Compton Jan 2020

Obstacles With Data Security: Strategies From Carolina Universities, Yamiah R. Compton

Walden Dissertations and Doctoral Studies

Some university data custodians lack information security strategies to prevent data security breaches. Reducing duplicitous use of personally identifiable information (PII) obtained maliciously from colleges and universities should be important to university data custodians, IT leadership of all levels, state legislators, and individuals that have an interest in moving into the cybersecurity space in higher education. Grounded in general systems theory, the purpose of this multiple qualitative case study was to examine information security strategies that university data custodians use to protect PII collected from staff, students, and other stakeholders. The participants consisted of 15 college and university data custodians …


Search Results: Predicting Ranking Algorithms With User Ratings And User-Driven Data, Gary Michael Taylor Jan 2020

Search Results: Predicting Ranking Algorithms With User Ratings And User-Driven Data, Gary Michael Taylor

Walden Dissertations and Doctoral Studies

The purpose of this correlational quantitative study was to examine the possible relationship between user-driven parameters, user ratings, and ranking algorithms. The study’s population consisted of students and faculty in the information technology (IT) field at a university in Huntington, WV. Arrow’s impossibility theorem was used as the theoretical framework for this study. Complete survey data were collected from 47 students and faculty members in the IT field, and a multiple regression analysis was used to measure the correlations between the variables. The model was able to explain 85% of the total variability in the ranking algorithm. The overall model …


Developing Cloud Computing Infrastructures In Developing Countries In Asia, Daryoush Charmsaz Moghaddam Jan 2020

Developing Cloud Computing Infrastructures In Developing Countries In Asia, Daryoush Charmsaz Moghaddam

Walden Dissertations and Doctoral Studies

Developing Cloud Computing Infrastructures in Developing Countries in Asia

by

Daryoush Charmsaz Moghaddam

MS, Sharif University, 2005

BS, Civil Aviation Higher Education Complex, 1985

Doctoral Study Submitted in Partial Fulfillment

of the Requirements for the Degree of

Doctor of Information Technology

Walden University

March 2020


Strategies For Implementing Successful It Security Systems In Small Businesses, Martins Donbruce Idahosa Jan 2020

Strategies For Implementing Successful It Security Systems In Small Businesses, Martins Donbruce Idahosa

Walden Dissertations and Doctoral Studies

Owners of small businesses who do not adequately protect business data are at high risk for a cyber attack. As data breaches against small businesses have increased, it has become a growing source of concern for consumers who rely on owners of small businesses to protect their data from data breaches. Grounded in general systems theory and routine activity approach, the focus of this qualitative multiple case study was to explore strategies used by owners of small businesses to protect confidential company data from cyber attacks. The process used for collecting data involved semistructured face-to-face interviews with 5 owners of …


Information Security Ambassadors’ Perceptions Of Peer-Led Motivation In Phishing Detection, Kingkane Malmquist Jan 2020

Information Security Ambassadors’ Perceptions Of Peer-Led Motivation In Phishing Detection, Kingkane Malmquist

Walden Dissertations and Doctoral Studies

Phishing rates are increasing yearly and continue to compromise data integrity. The need to guard business information is vital for organizations to meet their business objectives and legal obligations. The purpose of this phenomenological study was to explore security ambassadors’ perceptions of motivating their peers to adopt safe internet behaviors in a large medical campus in Minnesota. Hackman and Oldham’s job characteristic motivation theory was used to frame the study. Data were collected from semistructured interviews with 20 security ambassadors. Data coding and analysis yielded 7 themes: rewarding, value, personal interest, limited information security knowledge, increased interest, communication, and topics …


Strategies For Increasing Employee Productivity In Small Technology Consulting Businesses, Dalinda Yvonne Milne Jan 2020

Strategies For Increasing Employee Productivity In Small Technology Consulting Businesses, Dalinda Yvonne Milne

Walden Dissertations and Doctoral Studies

Unproductive employees in technology consulting small businesses negatively affect organizational output and profits. Investing in employee productivity is beneficial to ensuring an organization’s ability to improve their profits and sustainability as business leaders have an influential role in identifying and addressing the root causes of employee productivity issues in their organizations. The conceptual framework that grounded this doctoral study was Thomas Gilbert’s behavioral engineering model. The participants in this study consisted of 8 leaders in a Texas technology consulting small business with experience in increasing employee productivity. Data were collected through in-person semistructured interviews and business documents. Methodological triangulation was …


Strategies Federal Government It Project Managers Use To Migrate It Systems To The Cloud, Latonya Denise Griffith Jan 2020

Strategies Federal Government It Project Managers Use To Migrate It Systems To The Cloud, Latonya Denise Griffith

Walden Dissertations and Doctoral Studies

Several processes, security, and confidentiality challenges cause the slow adoption of cloud computing within the federal government. Information Technology (IT) senior leadership in the federal government is concerned about the slow adoption of cloud computing because it impedes federal IT systems management. Grounded in the technology acceptance model, the purpose of this exploratory multiple case study was to explore strategies federal government IT project managers used to select systems to migrate to the cloud. Participants consisted of 10 IT project managers from 3 federal organizations in Virginia and Washington, D.C., responsible for migrating federal government systems to the cloud. Data …


A Study On Real-Time Database Technology And Its Applications, Geethmi Nimantha Dissanayake Jan 2020

A Study On Real-Time Database Technology And Its Applications, Geethmi Nimantha Dissanayake

Masters Theses

No abstract provided.


Repositories For Taxonomic Data: Where We Are And What Is Missing, Aurélian Miralles, Teddy Bruy, Katherine Wolcott, Mark D. Scherz, Dominik Begerow, Bank Beszteri, Michael Bonkowski, Janine Felden, Birgit Gemeinholzer, Frank Glaw, Frank Oliver Glöckner, Oliver Hawlitschek, Ivaylo Kostadinov, Tim W. Nattkemper, Christian Printzen, Jasmin Renz, Nataliya Rybalka, Marc Stadler, Tanja Weibulat, Thomas Wilke, Susanne S. Renner, Miguel Vences Jan 2020

Repositories For Taxonomic Data: Where We Are And What Is Missing, Aurélian Miralles, Teddy Bruy, Katherine Wolcott, Mark D. Scherz, Dominik Begerow, Bank Beszteri, Michael Bonkowski, Janine Felden, Birgit Gemeinholzer, Frank Glaw, Frank Oliver Glöckner, Oliver Hawlitschek, Ivaylo Kostadinov, Tim W. Nattkemper, Christian Printzen, Jasmin Renz, Nataliya Rybalka, Marc Stadler, Tanja Weibulat, Thomas Wilke, Susanne S. Renner, Miguel Vences

Harold W. Manter Laboratory: Library Materials

Natural history collections are leading successful large-scale projects of specimen digitization (images, metadata, DNA barcodes), thereby transforming taxonomy into a big data science. Yet, little effort has been directed towards safeguarding and subsequently mobilizing the considerable amount of original data generated during the process of naming 15,000–20,000 species every year. From the perspective of alpha-taxonomists, we provide a review of the properties and diversity of taxonomic data, assess their volume and use, and establish criteria for optimizing data repositories. We surveyed 4,113 alpha-taxonomic studies in representative journals for 2002, 2010, and 2018, and found an increasing yet comparatively limited use …


Data Governance And The Emerging University, Michael J. Madison Jan 2020

Data Governance And The Emerging University, Michael J. Madison

Book Chapters

Knowledge and information governance questions are tractable primarily in institutional terms, rather than in terms of abstractions such as knowledge itself or individual or social interests. This chapter offers the modern research university as an example. Practices of data-intensive research by university-based researchers, sometimes reduced to the popular phrase “Big Data,” pose governance challenges for the university. The chapter situates those challenges in the traditional understanding of the university as an institution for understanding forms and flows of knowledge. At a broad level, the chapter argues that the new salience of data exposes emerging shifts in the social, cultural, and …


Strategies For It Product Managers To Manage Microservice Systems In Enterprises, Walter Zrzavy Jan 2020

Strategies For It Product Managers To Manage Microservice Systems In Enterprises, Walter Zrzavy

Walden Dissertations and Doctoral Studies

Many information technology (IT) product managers have experienced significant challenges in adopting microservice architecture (MSA) systems successfully in their organizations. Inefficiencies resulting from MSA system adoption are of concern to IT product managers as these inefficiencies increase the cost of maintenance and increase the time to deliver software updates to the business. Grounded in the technology-organization-environment theory, the purpose of this qualitative multiple case study was to explore the strategies used by IT product managers for the domain-driven design and development and operations practices to reduce the inefficiencies during the MSA system adoption. The participants were 18 IT product managers …


Automatic Distinction Between Twitter Bots And Humans, Jeremiah Stubbs Jan 2020

Automatic Distinction Between Twitter Bots And Humans, Jeremiah Stubbs

All Undergraduate Theses and Capstone Projects

Weak artificial intelligence uses encoded functions of rules to process information. This kind of intelligence is competent, but lacks consciousness, and therefore cannot comprehend what it is doing. In another view, strong artificial intelligence has a mind of its own that resembles a human mind. Many of the bots on Twitter are only following a set of encoded rules. Previous studies have created machine learning algorithms to determine whether a Twitter account was being run by a human or a bot. Twitter bots are improving and some are even fooling humans. Creating a machine learning algorithm that differentiates a bot …


Development And Field Testing Of A Mall For Filipino With A Reusable Framework For Mobile-Based Drills, Jenilyn Agapito, Dominique Marie Antoinette Manahan, Ma. Monica L. Moreno, Jose Isidro Beraquit, Ingrid Yvonne Herras, Kevin Arnel C. Mora, Johanna Marion R. Torres, Ma. Mercedes T. Rodrigo Jan 2020

Development And Field Testing Of A Mall For Filipino With A Reusable Framework For Mobile-Based Drills, Jenilyn Agapito, Dominique Marie Antoinette Manahan, Ma. Monica L. Moreno, Jose Isidro Beraquit, Ingrid Yvonne Herras, Kevin Arnel C. Mora, Johanna Marion R. Torres, Ma. Mercedes T. Rodrigo

Department of Information Systems & Computer Science Faculty Publications

This paper describes the development and field testing of Ibigkas! Filipino, a mobile game that exercises learners’ fluency in identifying synonyms (kasingkahulugan) and antonyms (kasalungat) in the Filipino language. Twenty-four students from Grades 4, 5, and 6 were invited to play and answer comprehension tests to determine whether the game helped them improve their understanding of the content. Self-report questionnaires assessed the extent to which they enjoyed it. Additionally, three teachers were invited to a focus group discussion (FGD) to gather their insights about the game and how they may use it in their classes. Self-report feedback from students showed …


Managing Inventory: A Study Of Databases And Database Management Systems, Jemal M. Jemal Jan 2020

Managing Inventory: A Study Of Databases And Database Management Systems, Jemal M. Jemal

Senior Independent Study Theses

Databases play an important role in the storage and manipulation of data. Databases and database management systems allow for fast and efficient data querying that has recently become increasingly important in most companies and organizations. This paper introduces a few of the different types of database management systems that are in widespread use today. It introduces some important terminology related to databases and database management systems. This paper also briefly discusses web user interfaces, highlighting important user interface design principles. Finally, an inventory management system is implemented for a local stationery store and is integrated with a web application to …


Measuring Differential Forest Growth In The Sheepscot River Headwaters With Bitemporal Lidar, Soren Denlinger Jan 2020

Measuring Differential Forest Growth In The Sheepscot River Headwaters With Bitemporal Lidar, Soren Denlinger

Honors Theses

In recent years, lidar has proven itself as a forestry tool capable of accurate, large- scale inventories. Lidar has even shown utility in multitemporal analysis and growth assessment, given high-resolution or small-scale point clouds. However, lidar’s efficacy as a multitemporal tool with relatively low-resolution, large-scale datasets is comparatively unknown. In this study, I compared forest in Midcoast Maine bitemporally, with publicly available datasets from the years 2007 and 2012. Specifically, I compared differences in growth characteristics of riparian, wetland, and upland forests. Although the 2007 dataset (created for geomorphological research) and the 2012 dataset (statewide, general-purpose) possess varying point densities …


Building Something With The Raspberry Pi, Richard Kordel Jan 2020

Building Something With The Raspberry Pi, Richard Kordel

Presidential Research Grants

In 2017 Ryan Korn and I submitted a grant proposal in the annual Harrisburg University President’s Grant process. Our proposal was to partner with a local high school to install a classroom of 20 Raspberry Pi’s, along with the requisite peripherals. In that classroom students would be challenged to design something that combined programming with physical computing. In our presentation to the school we suggested that this project would give students the opportunity to be “amazing.”

As part of the grant, the top three students would be given scholarships to HU and the top five finalists would all be permitted …


Ethics Of Collection And Use Of Consumer Information On The Internet, Thanh M. Pham Jan 2020

Ethics Of Collection And Use Of Consumer Information On The Internet, Thanh M. Pham

Walden Dissertations and Doctoral Studies

Consumer online activities can generate massive volumes of data that private companies may collect and use for business purposes. Consumer personal data need to be protected from unauthorized access and misuse. The specific problem is that consumers have little control regarding their data being collected and used by private companies. The purpose of this qualitative archival research was to explore business practices involving collection and use of consumer data without an individual’s consent. This study used the big data ethical conceptual framework to focus on various privacy issues, including those related to ownership, transparency, ethics, and consumer privacy laws. Archival …


E-Commerce Strategies Small And Medium Enterprises Use To Market Products In Ghana, Joseph Kwaku Amaglo Jan 2020

E-Commerce Strategies Small And Medium Enterprises Use To Market Products In Ghana, Joseph Kwaku Amaglo

Walden Dissertations and Doctoral Studies

Small and medium enterprise (SME) business owners face challenges in adopting e-commerce strategies to market products. By utilizing e-commerce technology and tools, SME business owners could reach more customers and improve their business performance. Grounded in the technology acceptance model, the purpose of this qualitative multiple case study was to explore the strategies some SME business owners in the furniture industry used to adopt e-commerce to market products in Ghana. The participants comprised 5 SME business owners from 5 different furniture firms in Ghana who adopted e-commerce strategies to market products. Sources of data included semi-structured interviews, interview notes, and …


User Perception Of The U.S. Open Government Data Success Factors, Joy Alatta Jan 2020

User Perception Of The U.S. Open Government Data Success Factors, Joy Alatta

Walden Dissertations and Doctoral Studies

This quantitative correlational study used the information systems success model to examine the relationship between the U.S. federal departments' open data users' perception of the system quality, perception of information quality, perception of service quality, and the intent to use open data from U.S. federal departments. A pre-existing information system success model survey instrument was used to collect data from 122 open data users. The result of the standard multiple linear regression was statistically significant to predict the intent to use the U.S. open government data F(3,99) = 6479.916, p <0.01 and accounted for 99% of the variance in the intent to use the U.S. open government data (R²= .995), adjusted R²= .995. The interdependent nature of information quality, system quality, and service quality may have contributed to the value of the R². Cronbach's alpha for this study is α=.99, and the value could be attributed to the fact that users of open data are not necessarily technical oriented, and were not able to distinguish the differences between the meanings of the variables. The result of this study confirmed that there is a relationship between the user's perception of the system quality, perception of information quality, perception of service quality, and the intent to use open data from U.S. federal departments. The findings from this study might contribute to positive social change by enabling the solving of problems in the healthcare, education, energy sector, research community, digitization, and preservation of e-government activities. Using study, the results of this study, IT software engineers in the US federal departments, may be able to improve the gathering of user specifications and requirements in information system design.


Exploring Strategies For Adapting Traditional Vehicle Design Frameworks To Autonomous Vehicle Design, Alex Munoz Jan 2020

Exploring Strategies For Adapting Traditional Vehicle Design Frameworks To Autonomous Vehicle Design, Alex Munoz

Walden Dissertations and Doctoral Studies

Fully autonomous vehicles are expected to revolutionize transportation, reduce the cost of ownership, contribute to a cleaner environment, and prevent the majority of traffic accidents and related fatalities. Even though promising approaches for achieving full autonomy exist, developers and manufacturers have to overcome a multitude of challenged before these systems could find widespread adoption. This multiple case study explored the strategies some IT hardware and software developers of self-driving cars use to adapt traditional vehicle design frameworks to address consumer and regulatory requirements in autonomous vehicle designs. The population consisted of autonomous driving technology software and hardware developers who are …


Strategies For Information Technology Employee Retention, Stephen Horton Jan 2020

Strategies For Information Technology Employee Retention, Stephen Horton

Walden Dissertations and Doctoral Studies

Information technology (IT) employee retention is essential to IT departments tasked with supporting the goals and objectives of the organization. IT employees manage, support, and direct IT to drive business, pursue innovation, and create a competitive edge. The purpose of this qualitative exploratory multiple case study was to identify strategies that IT managers use to retain IT employees in order to support the goals and objectives of the IT organization. The population for this study consisted of 5 IT managers in the transportation industry. The IT managers selected for this study had subordinates and delegation duties and worked for employers …


Transfer Equivalency Site For The Registrar, Janelle N. Rohrbach, Alissa C. Cielecki, Jules A. Turner Jan 2020

Transfer Equivalency Site For The Registrar, Janelle N. Rohrbach, Alissa C. Cielecki, Jules A. Turner

Capstone Showcase

The website, arcadia-transfer-equiv.com, was drafted and created for Bill Enick, Registrar at Arcadia University. This was an expansion of a preliminary version of the website created by Caleigh Diefenthaler, Christian Charney, and Dylan Power. The site includes two transfer equivalency tools which can be used to search for course equivalencies by academic institution or by a given Arcadia course. The tools, which pull from a database maintained by the Registrar, will display courses that have transferred to the University successfully. The website also hosts two interactive forms. These forms allow Arcadia students to request approval for courses that have or …


Understanding The Digital Lives Of Transnational Students: A Case Study, Chowaing Chagra Belekeh Jan 2020

Understanding The Digital Lives Of Transnational Students: A Case Study, Chowaing Chagra Belekeh

Open Access Theses & Dissertations

The proliferation and the fast-paced evolution of digital information communication technologies (ICTs) in contemporary times have arguably raised concern for us to comprehend what we do with these technologies and what these technologies do for us. The experience of engaging these technologies may not necessarily be the same for everyone—especially students who come from around the world to attain post-graduate degrees in the United States. This research focused on understanding the digital lives, choices, and experiences of transnational students who navigate and negotiate geopolitical borders and boundaries (physical)– in their quest for education. Using a case study analysis and collecting …


Word Embedding Driven Concept Detection In Philosophical Corpora, Dylan Hayton-Ruffner Jan 2020

Word Embedding Driven Concept Detection In Philosophical Corpora, Dylan Hayton-Ruffner

Honors Projects

During the course of research, scholars often explore large textual databases for segments of text relevant to their conceptual analyses. This study proposes, develops and evaluates two algorithms for automated concept detection in theoretical corpora: ACS and WMD retrieval. Both novel algorithms are compared to key word retrieval, using a test set from the Digital Ricoeur corpus tagged by scholarly experts. WMD retrieval outperforms key word search on the concept detection task. Thus, WMD retrieval is a promising tool for concept detection and information retrieval systems focused on theoretical corpora.


A Content Analysis-Based Approach To Explore Simulation Verification And Identify Its Current Challenges, Christopher J. Lynch, Saikou Y. Diallo, Hamdi Kavak, Jose J. Padilla Jan 2020

A Content Analysis-Based Approach To Explore Simulation Verification And Identify Its Current Challenges, Christopher J. Lynch, Saikou Y. Diallo, Hamdi Kavak, Jose J. Padilla

VMASC Publications

Verification is a crucial process to facilitate the identification and removal of errors within simulations. This study explores semantic changes to the concept of simulation verification over the past six decades using a data-supported, automated content analysis approach. We collect and utilize a corpus of 4,047 peer-reviewed Modeling and Simulation (M&S) publications dealing with a wide range of studies of simulation verification from 1963 to 2015. We group the selected papers by decade of publication to provide insights and explore the corpus from four perspectives: (i) the positioning of prominent concepts across the corpus as a whole; (ii) a comparison …


Structure-Priority Image Restoration Through Genetic Algorithm Optimization, Zhaoxia Wang, Haibo Pen, Ting Yang, Quan Wang Jan 2020

Structure-Priority Image Restoration Through Genetic Algorithm Optimization, Zhaoxia Wang, Haibo Pen, Ting Yang, Quan Wang

Research Collection School Of Computing and Information Systems

With the significant increase in the use of image information, image restoration has been gaining much attention by researchers. Restoring the structural information as well as the textural information of a damaged image to produce visually plausible restorations is a challenging task. Genetic algorithm (GA) and its variants have been applied in many fields due to their global optimization capabilities. However, the applications of GA to the image restoration domain still remain an emerging discipline. It is still challenging and difficult to restore a damaged image by leveraging GA optimization. To address this problem, this paper proposes a novel GA-based …


The Topicality Of The Learning Organization: Is The Concept Still Relevant Today?, Siu Loon Hoe Jan 2020

The Topicality Of The Learning Organization: Is The Concept Still Relevant Today?, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

This chapter introduces the current level of interest in the learning organization and usefulness of the concept at the present time. It reviews authors who have recently and explicitly commented on the topicality of the learning organization, offers a qualitative content analysis of recent journal publications on learning organizations justifying the need for the concept, and uses quantitative research using print media indicators and Google Trends to identify the number of publications related to the learning organization over time. The results suggest that while the level of interest in the learning organization among scientific researchers has grown, the level of …


Teacher-Student Networks With Multiple Decoders For Solving Math Word Problem, Jipeng Zhang, Roy Ka-Wei Lee, Ee-Peng Lim, Wei Qin, Lei Wang, Jie Shao, Qianru Sun Jan 2020

Teacher-Student Networks With Multiple Decoders For Solving Math Word Problem, Jipeng Zhang, Roy Ka-Wei Lee, Ee-Peng Lim, Wei Qin, Lei Wang, Jie Shao, Qianru Sun

Research Collection School Of Computing and Information Systems

Math word problem (MWP) is challenging due to the limitation in training data where only one “standard” solution is available. MWP models often simply fit this solution rather than truly understand or solve the problem. The generalization of models (to diverse word scenarios) is thus limited. To address this problem, this paper proposes a novel approach, TSN-MD, by leveraging the teacher network to integrate the knowledge of equivalent solution expressions and then to regularize the learning behavior of the student network. In addition, we introduce the multiple-decoder student network to generate multiple candidate solution expressions by which the final answer …


Coupled Rain Streak And Background Estimation Via Separable Element-Wise Attention, Yinjie Tan, Qiang Wen, Jing Qin, Jianbo Jiao, Guoqiang Han, Shengfeng He Jan 2020

Coupled Rain Streak And Background Estimation Via Separable Element-Wise Attention, Yinjie Tan, Qiang Wen, Jing Qin, Jianbo Jiao, Guoqiang Han, Shengfeng He

Research Collection School Of Computing and Information Systems

Single image de-raining is challenging especially in the scenarios with dense rain streaks. Existing methods resolve this problem by predicting the rain streaks of the image, which constrains the network to focus on local rain streaks features. However, dense rain streaks are visually similar to mist or fog (with large intensities), in this case, the training objective should be shifted to image recovery instead of extracting rain streaks. In this paper, we propose a coupled rain streak and background estimation network that explores the intrinsic relations between two tasks. In particular, our network produces task-dependent feature maps, each part of …


Deep Sequential Real Estate Recommendation Approach For Solving Item Cold Start Problem, Jirut Polohakul Jan 2020

Deep Sequential Real Estate Recommendation Approach For Solving Item Cold Start Problem, Jirut Polohakul

Chulalongkorn University Theses and Dissertations (Chula ETD)

The item cold-start problem occurs when a recommendation system cannot recommend new items owing to record deficiencies and new listing omissions. When searching for real estate, users can register a concurrent interest in recent and prior projects. Thus, an approach to recommend cold-start and warm-start items simultaneously must be determined. Furthermore, unrequired membership and stop-by behavior cause real estate recommendations to have many cold-start and new users. This characteristic encourages the use of a content-based approach and a session-based recommendation system. Herein, we propose a real estate recommendation approach for solving the item cold-start problem with acceptable warm-start item recommendations …