Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2041 - 2070 of 6720

Full-Text Articles in Physical Sciences and Mathematics

U.S. Census Explorer: A Gui And Visualization Tool For The U.S. Census Data Api, Timothy Snyder Jan 2019

U.S. Census Explorer: A Gui And Visualization Tool For The U.S. Census Data Api, Timothy Snyder

Williams Honors College, Honors Research Projects

U.S. Census Explorer is a software application that is designed to provide tools for intuitive exploration and analysis of United States census data for non-technical users. The application serves as an interface into the U.S. Census Bureau’s data API that enables a complete workflow from data acquisition to data visualization without the need for technical intervention from the user. The suite of tools provided include a graphical user interface for dynamically querying U.S. census data, geographic visualizations, and the ability to download your work to common spreadsheet and image formats for inclusion in external works.


Absorption Calculator: A Cross-Platform Application For Portable Data Analysis, Annmarie Kolbl Jan 2019

Absorption Calculator: A Cross-Platform Application For Portable Data Analysis, Annmarie Kolbl

Williams Honors College, Honors Research Projects

Traditional spectrometers are expensive and non-portable, making them inaccessible to the public. This application will be used in conjunction with spectrometer hardware developed by Erie Open Systems. The hardware itself is 3D printed and, in addition to being portable, enables data to be collected easily. The purpose of this project is to create a cross-platform application capable of reading the output from the spectrometer hardware, calculating the absorbance levels of the sample against the control, and recording the data in tables stored on the cloud. The end result will be an application that runs on iOS and Android, and is …


Automatic Identification Of Individual Drugs In Death Certificates, Soon Jye Kho, Amit Sheth, Olivier Bodenreider Jan 2019

Automatic Identification Of Individual Drugs In Death Certificates, Soon Jye Kho, Amit Sheth, Olivier Bodenreider

Kno.e.sis Publications

Background:

Establishing trends of drug overdoses requires the identification of individual drugs in death certificates, not supported by coding with the International Classification of Diseases. However, identifying drug mentions from the literal portion of death certificates remains challenging due to the variability of drug names.

Objectives:

To automatically identify individual drugs in death certificates.

Methods:

We use RxNorm to collect variants for drug names (generic names, synonyms, brand names) and we algorithmically generate common misspellings. We use this automatically compiled list to identify drug mentions from 703,106 death certificates and compare the performance of our automated approach to that of …


Doppler Radar-Based Non-Contact Health Monitoring For Obstructive Sleep Apnea Diagnosis: A Comprehensive Review, Vinh Phuc Tran, Adel Ali Al-Jumaily, Syed Mohammed Shamsul Islam Jan 2019

Doppler Radar-Based Non-Contact Health Monitoring For Obstructive Sleep Apnea Diagnosis: A Comprehensive Review, Vinh Phuc Tran, Adel Ali Al-Jumaily, Syed Mohammed Shamsul Islam

Research outputs 2014 to 2021

Today’s rapid growth of elderly populations and aging problems coupled with the prevalence of obstructive sleep apnea (OSA) and other health related issues have affected many aspects of society. This has led to high demands for a more robust healthcare monitoring, diagnosing and treatments facilities. In particular to Sleep Medicine, sleep has a key role to play in both physical and mental health. The quality and duration of sleep have a direct and significant impact on people’s learning, memory, metabolism, weight, safety, mood, cardio-vascular health, diseases, and immune system function. The gold-standard for OSA diagnosis is the overnight sleep monitoring …


Factors That Predict The Adoption Of Online Shopping In Saudi Arabia, Momen Nachar Jan 2019

Factors That Predict The Adoption Of Online Shopping In Saudi Arabia, Momen Nachar

Walden Dissertations and Doctoral Studies

Despite the increased numbers of online consumers, e-commerce growth is slow in the Kingdom of Saudi Arabia. In this correlational study, the technology acceptance model (TAM) was used as a theoretical framework to examine whether perceived ease of use of e-commerce platforms and perceived usefulness of e-commerce platforms could predict consumers' intention to adopt shopping online. A pre-existing TAM survey instrument was used to collect data from consumers (N = 95) who live in a City and have shopped at least once online. The regression analysis confirmed a positive statistically significant relationship between perceived ease of use of e-commerce platforms …


Exploring Information Technology Return On Investment Reports For Planning, Budgeting, And Implementation, Constantine Bitwayiki Jan 2019

Exploring Information Technology Return On Investment Reports For Planning, Budgeting, And Implementation, Constantine Bitwayiki

Walden Dissertations and Doctoral Studies

The failure rate of new government information technology (IT) projects in developing countries is high, with 35% classified as total failures and approximately 50% as partial failures. The population for this study was 10 senior managers of a public sector organization in Uganda selected because of high IT project successes achieved through leveraging IT return on investment (ROI) reports. The purpose of this qualitative single-case study was to explore the strategies Ugandan senior public sector officials used to leverage IT ROI reports during planning, budgeting, and implementation of IT projects to reduce failure rates. The conceptual frameworks were the strategic …


Innovation Strategies In Small Agrarian Businesses In Sierra Leone, Solomon Sorba Scholz Jan 2019

Innovation Strategies In Small Agrarian Businesses In Sierra Leone, Solomon Sorba Scholz

Walden Dissertations and Doctoral Studies

In 2015, a sharp decline in the sustainability of small agrarian businesses in Sierra Leone resulted in the gross domestic product declining by 41%. The purpose of this multiple case study was to explore the innovation strategies owners of small agrarian businesses use to sustain their businesses for longer than 5 years. The disruptive innovation theory was the conceptual framework for this study. The participants were 16 owners of small agrarian businesses from Makeni, Kenema, Bo, and Freetown districts in Sierra Leone who have sustained their businesses for longer than 5 years. Data were collected using semistructured interviews, personal notes, …


A Case Study On Social Media As An Effective Management Tool, Appolloh Omolloh Jan 2019

A Case Study On Social Media As An Effective Management Tool, Appolloh Omolloh

Walden Dissertations and Doctoral Studies

In small businesses in the United States, specifically those with fewer than 10 employees,

leaders may be skeptical of and resistant to the use of social media in their management

operations. Management literature does not indicate clear and effective guidelines and

policies detailing small marketing firms use of social media. The purpose of this

qualitative case study was to explore the perceptions of small marketing firm leaders

about the resources and knowledge needed for effective use of social media as a

management tool. Emerson's social exchange theory grounded the study. The study

targeted owners and managers of small marketing firms …


User-Centered Design Strategies For Clinical Brain-Computer Interface Assistive Technology Devices, Geraldine Light Jan 2019

User-Centered Design Strategies For Clinical Brain-Computer Interface Assistive Technology Devices, Geraldine Light

Walden Dissertations and Doctoral Studies

Although in the past 50 years significant advances based on research of brain-computer interface (BCI) technology have occurred, there is a scarcity of BCI assistive technology devices at the consumer level. This multiple case study explored user-centered clinical BCI device design strategies used by computer scientists designing BCI assistive technologies to meet patient-centered outcomes. The population for the study encompassed computer scientists experienced with clinical BCI assistive technology design located in the midwestern, northeastern, and southern regions of the United States, as well as western Europe. The multi-motive information systems continuance model was the conceptual framework for the study. Interview …


Leadership Strategies For Improving Employee Engagement In The Information Technology Industry, Geneva L. Reed Jan 2019

Leadership Strategies For Improving Employee Engagement In The Information Technology Industry, Geneva L. Reed

Walden Dissertations and Doctoral Studies

Disengaged employees in the information technology industry lead to decreased productivity, increased absenteeism, poor job performance, higher employee turnover, and reduced organizational effectiveness. The purpose of this multiple case study was to explore the leadership strategies that information technology leaders used to improve employee engagement. The transformational leadership theory was the conceptual framework for this study. Data were collected through semistructured interviews with 3 leaders of information technology companies in Illinois and a review of company documents. Data were analyzed through thematic analysis and using Yin's 5-step process of compiling, disassembling, reassembling, interpreting, and concluding data. The 3 emergent themes …


Knowledge Sharing And Customer Relations In Mobility, Katie Dyretha Moore Jan 2019

Knowledge Sharing And Customer Relations In Mobility, Katie Dyretha Moore

Walden Dissertations and Doctoral Studies

After the events of September 11, 2001, inadequacies in how government organizations and agencies shared knowledge and communication with defense mission partners became readily apparent. A reasonable U.S. government information technology expectation is the integrated use of mobile phones across organizations and agencies. Yet, it is difficult to meet this expectation, as the provisioning process for mobile devices can be different for each government organization or agency. The Department of Commerce National Institute of Standards and Technology does not set provisioning standards, and organizations and agencies determine policies tailored to their particular needs. Using Schein's theory on organizational culture, the …


Mobile Technology Deployment Strategies For Improving The Quality Of Healthcare, Won K. Song Jan 2019

Mobile Technology Deployment Strategies For Improving The Quality Of Healthcare, Won K. Song

Walden Dissertations and Doctoral Studies

Ineffective deployment of mobile technology jeopardizes healthcare quality, cost control, and access, resulting in healthcare organizations losing customers and revenue. A multiple case study was conducted to explore the strategies that chief information officers (CIOs) used for the effective deployment of mobile technology in healthcare organizations. The study population consisted of 3 healthcare CIOs and 2 healthcare information technology consultants who have experience in deploying mobile technology in a healthcare organization in the United States. The conceptual framework that grounded the study was Wallace and Iyer's health information technology value hierarchy. Data were collected using semistructured interviews and document reviews, …


Strategies That Mitigate It Infrastructure Demands Produced By Student Byod Usa, Martha Dunne Jan 2019

Strategies That Mitigate It Infrastructure Demands Produced By Student Byod Usa, Martha Dunne

Walden Dissertations and Doctoral Studies

The use of bring your own devices (BYOD) is a global phenomenon, and nowhere is it more evident than on a college campus. The use of BYOD on academic campuses has grown and evolved through time. The purpose of this qualitative multiple case study was to identify the successful strategies used by chief information officers (CIOs) to mitigate information technology infrastructure demands produced by student BYOD usage. The diffusion of innovation model served as the conceptual framework. The population consisted of CIOs from community colleges within North Carolina. The data collection process included semistructured, in-depth face-to-face interviews with 9 CIOs …


Incorporating Data Governance Frameworks In The Financial Industry, Tarlochan Singh Randhawa Jan 2019

Incorporating Data Governance Frameworks In The Financial Industry, Tarlochan Singh Randhawa

Walden Dissertations and Doctoral Studies

Data governance frameworks are critical to reducing operational costs and risks in the financial industry. Corporate data managers face challenges when implementing data governance frameworks. The purpose of this multiple case study was to explore the strategies that successful corporate data managers in some banks in the United States used to implement data governance frameworks to reduce operational costs and risks. The participants were 7 corporate data managers from 3 banks in North Carolina and New York. Servant leadership theory provided the conceptual framework for the study. Methodological triangulation involved assessment of nonconfidential bank documentation on the data governance framework, …


Public Servants' Perceptions Of The Cybersecurity Posture Of The Local Government In Puerto Rico, Julio C. Rodriguez Jan 2019

Public Servants' Perceptions Of The Cybersecurity Posture Of The Local Government In Puerto Rico, Julio C. Rodriguez

Walden Dissertations and Doctoral Studies

The absence of legislation, the lack of a standard cybersecurity framework, and the failure to adopt a resilient cybersecurity posture can be detrimental to the availability, confidentiality, and integrity of municipal information systems. The purpose of this phenomenological study was to understand the cybersecurity posture of municipalities from the perception of public servants serving in information technology (IT) leadership roles in highly populated municipalities in the San Juan-Carolina-Caguas Metropolitan Statistical Area of Puerto Rico. The study was also used to address key factors influencing the cybersecurity posture of these municipalities. The theoretical framework was open system theory used in combination …


Strategies To Recruit Skilled Workers In Manufacturing, Ina Renee Rawlinson Jan 2019

Strategies To Recruit Skilled Workers In Manufacturing, Ina Renee Rawlinson

Walden Dissertations and Doctoral Studies

Manufacturing hiring managers in the United States who fail to implement adequate recruitment strategies for skilled production workers experience reduced profits and sustainability challenges. The purpose of this multiple case study was to explore the strategies that successful manufacturing hiring managers in North Carolina used to recruit skilled production workers to sustain business profitability. Inductive analysis was guided by the human capital theory, and trustworthiness of interpretations was strengthened by member checking. The population for the study consisted of 4 business leaders who demonstrated the use of effective recruitment strategies to sustain profitability in manufacturing businesses in southeastern North Carolina. …


Analyzing Small Businesses' Adoption Of Big Data Security Analytics, Henry Mathias Jan 2019

Analyzing Small Businesses' Adoption Of Big Data Security Analytics, Henry Mathias

Walden Dissertations and Doctoral Studies

Despite the increased cost of data breaches due to advanced, persistent threats from malicious sources, the adoption of big data security analytics among U.S. small businesses has been slow. Anchored in a diffusion of innovation theory, the purpose of this correlational study was to examine ways to increase the adoption of big data security analytics among small businesses in the United States by examining the relationship between small business leaders' perceptions of big data security analytics and their adoption. The research questions were developed to determine how to increase the adoption of big data security analytics, which can be measured …


Successful Strategies For Using Knowledge Management In Small And Medium-Sized Enterprises, Josephine Kayaga Nsubuga-Mugoa Jan 2019

Successful Strategies For Using Knowledge Management In Small And Medium-Sized Enterprises, Josephine Kayaga Nsubuga-Mugoa

Walden Dissertations and Doctoral Studies

Knowledge management (KM) is vital for an organization to succeed in a highly dynamic and competitive world. The purpose of this multiple case study was to explore strategies that managers of small and medium-sized enterprises (SMEs) use to effectively integrate KM into business practices. The study population comprised 5 managers from 2 SMEs operating in Uganda. The eligibility criteria for this study were that participants had to be from Ugandan SMEs with a knowledge-intensive environment, managers with some responsibility of KM in the organization, and experienced with at least 1 year of successful KM practices. The conceptual framework for this …


Strategies To Improve Adoption Of The Federal Enterprise Architecture Framework, Michael John Caruso Jan 2019

Strategies To Improve Adoption Of The Federal Enterprise Architecture Framework, Michael John Caruso

Walden Dissertations and Doctoral Studies

The U.S. federal government spends millions of taxpayer dollars to implement the federal enterprise architecture framework (FEAF). This qualitative multiple case study extracted successful FEAF implementation strategies used by agencies in the Washington, DC, metropolitan area. The population for this study included 10 information technology (IT) planners in 3 federal agencies. Data were collected from semistructured interviews and triangulated in comparison to 33 public documents. General system theory was used as a conceptual framework for the study, and data analysis included reviews of the academic literature, thematic analysis, and member checking to identify themes and codes related to successful aspects …


Exploring Industry Cybersecurity Strategy In Protecting Critical Infrastructure, Mark Boutwell Jan 2019

Exploring Industry Cybersecurity Strategy In Protecting Critical Infrastructure, Mark Boutwell

Walden Dissertations and Doctoral Studies

Successful attacks on critical infrastructure have increased in occurrence and sophistication. Many cybersecurity strategies incorporate conventional best practices but often do not consider organizational circumstances and nonstandard critical infrastructure protection needs. The purpose of this qualitative multiple case study was to explore cybersecurity strategies used by information technology (IT) managers and compliance officers to mitigate cyber threats to critical infrastructure. The population for this study comprised IT managers and compliance officers of 4 case organizations in the Pacific Northwest United States. The routine activity theory developed by criminologist Cohen and Felson in 1979 was used as the conceptual framework. Data …


Procure-To-Pay Software In The Digital Age: An Exploration And Analysis Of Efficiency Gains And Cybersecurity Risks In Modern Procurement Systems, Drew Lane Jan 2019

Procure-To-Pay Software In The Digital Age: An Exploration And Analysis Of Efficiency Gains And Cybersecurity Risks In Modern Procurement Systems, Drew Lane

MPA/MPP/MPFM Capstone Projects

Procure-to-Pay (P2P) softwares are an integral part of the payment and procurement processing functions at large-scale governmental institutions. These softwares house all of the financial functions related to procurement, accounts payable, and often human resources, helping to facilitate and automate the process from initiation of a payment or purchase, to the actual disbursal of funds. Often, these softwares contain budgeting and financial reporting tools as part of the offering. As such an integral part of the financial process, these softwares obviously come at an immense cost from a set of reputable vendors. In the case of government, these vendors mainly …


Strategies For Using Information And Communication Technologies To Improve Profitability, Rodney Mciver Jan 2019

Strategies For Using Information And Communication Technologies To Improve Profitability, Rodney Mciver

Walden Dissertations and Doctoral Studies

Small business owners in a range of industries continually adapt to take advantage of technological developments in accounting, marketing, and communication. The purpose of this multiple case study was to explore strategies that small business owners operating in the central region of North Carolina used to implement information and communication technology (ICT). Roger's diffusion of innovation theory grounded the study. Data collection included face-to-face semistructured interviews with 6 owners of small businesses who successfully implemented ICT, field notes from site observations, and reviews of participant websites. Interviews were transcribed and participants were engaged in member checking. Data were analyzed using …


Predicting How People Vote From How They Tweet, Rao B. Vinnakota Jan 2019

Predicting How People Vote From How They Tweet, Rao B. Vinnakota

Senior Projects Spring 2019

In 2016 Donald Trump stunned the nation and not a single pollster predicted the outcome. For the last few decades, pollsters have relied on phone banking as their main source of information. There is reason to believe that this method does not present the complete picture it once did due to several factors--less landline usage, a younger and more active electorate, and the rise of social media. Social media specifically has grown in prominence and become a forum for political debate. This project quantitatively analyzes political twitter data and leverages machine learning techniques such as Naive-Bayes to model election results. …


Exploring Strategies To Integrate Disparate Bioinformatics Datasets, Charbel Bader Fakhry Jan 2019

Exploring Strategies To Integrate Disparate Bioinformatics Datasets, Charbel Bader Fakhry

Walden Dissertations and Doctoral Studies

Distinct bioinformatics datasets make it challenging for bioinformatics specialists to locate the required datasets and unify their format for result extraction. The purpose of this single case study was to explore strategies to integrate distinct bioinformatics datasets. The technology acceptance model was used as the conceptual framework to understand the perceived usefulness and ease of use of integrating bioinformatics datasets. The population of this study included bioinformatics specialists of a research institution in Lebanon that has strategies to integrate distinct bioinformatics datasets. The data collection process included interviews with 6 bioinformatics specialists and reviewing 27 organizational documents relating to integrating …


A Delphi Study Analysis Of Best Practices For Data Quality And Management In Healthcare Information Systems, Olivia L. Pollard Jan 2019

A Delphi Study Analysis Of Best Practices For Data Quality And Management In Healthcare Information Systems, Olivia L. Pollard

Walden Dissertations and Doctoral Studies

Healthcare in the US continues to suffer from the poor data quality practices processes that would ensure accuracy of patient health care records and information. A lack of current scholarly research on best practices in data quality and records management has failed to identify potential flaws within the relatively new electronic health records environment that affect not only patient safety but also cost, reimbursements, services, and most importantly, patient safety. The focus of this study was to current best practices using a panel of 25 health care industry data quality experts. The conceptual lens was developed from the International Monetary …


Strategies To Reduce The Fiscal Impact Of Cyberattacks, Shirley Denise Smith Jan 2019

Strategies To Reduce The Fiscal Impact Of Cyberattacks, Shirley Denise Smith

Walden Dissertations and Doctoral Studies

A single cyberattack event involving 1 major corporation can cause severe business and social devastation. In this single case study, a major U.S. airline company was selected for exploration of the strategies information technology administrators and airline managers implemented to reduce the financial devastation that may be caused by a cyberattack. Seven participants, of whom 4 were airline managers and 3 were IT administrators, whose primary responsibility included implementation of strategies to plan for and respond to cyberattacks participated in the data collection process. This study was grounded on the general systems theory. Data collection entailed semistructured face-to-face and telephone …


Strategizing Effective Succession Planning For Information Technology Executives, Michael Barr Jan 2019

Strategizing Effective Succession Planning For Information Technology Executives, Michael Barr

Walden Dissertations and Doctoral Studies

Organizations across the United States lose hundreds of millions of dollars each year due to the lack of effective succession planning for information technology executives. The purpose of this single case study was to explore strategies for the development and implementation of effective succession plans for future information technology executives. Bass and Avolio's transformational leadership theory was the conceptual framework for this study. The 3 participants were selected based upon their roles as executives in technology-related positions and their experiences with succession planning. Data were collected using semistructured interviews with these executives from a company headquartered in Kansas City, Missouri. …


Managing Security Objectives For Effective Organizational Performance Information Security Management, Ramamohan Gutta Jan 2019

Managing Security Objectives For Effective Organizational Performance Information Security Management, Ramamohan Gutta

Walden Dissertations and Doctoral Studies

Information is a significant asset to organizations, and a data breach from a cyberattack harms reputations and may result in a massive financial loss. Many senior managers lack the competencies to implement an enterprise risk management system and align organizational resources such as people, processes, and technology to prevent cyberattacks on enterprise assets. The purpose of this Delphi study was to explore how the managerial competencies for information security and risk management senior managers help in managing security objectives and practices to mitigate security risks. The National Institute of Standards and Technology framework served as the foundation for this study. …


Strategies For Cloud Services Adoption In Saudi Arabia, Wessam Hussein Abdulghani Mahmoud Jan 2019

Strategies For Cloud Services Adoption In Saudi Arabia, Wessam Hussein Abdulghani Mahmoud

Walden Dissertations and Doctoral Studies

The adoption rate of cloud computing is low among business organizations in Saudi Arabia, despite the cost-€saving benefits of using cloud services. The purpose of this multiple case study was to explore the strategies that information technology (IT) leaders in the manufacturing industry in Saudi Arabia used to adopt cloud computing to reduce IT costs. The target population of this study consisted of 5 IT leaders from 5 different manufacturing companies in Saudi Arabia who successfully adopted cloud computing in their companies to reduce IT costs. Rogers's diffusion of innovation theory was the conceptual framework for this research. Data collected …


Cybersecurity Strategies To Protect Information Systems In Small Financial Institutions, Johnny Fadel Rawass Jan 2019

Cybersecurity Strategies To Protect Information Systems In Small Financial Institutions, Johnny Fadel Rawass

Walden Dissertations and Doctoral Studies

Leaders of financial institutions face challenges in protecting data because of the increased use of computer networks in the commerce and governance aspects of their businesses. The purpose of this single case study was to explore the strategies that leaders of a small financial institution used to protect information systems from cyber threats. The actor-network theory was the conceptual framework for this study. Data were collected through face-to-face, semistructured interviews with 5 leaders of a small financial institution in Qatar and a review of company documents relevant to information security, cybersecurity, and risk management. Using thematic analysis and Yin'€™s 5-€step …