Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2401 - 2430 of 6720

Full-Text Articles in Physical Sciences and Mathematics

Personalized Prediction Of Suicide Risk For Web-Based Intervention, Amanuel Alambo, Manas Gaur, Ugur Kursuncu, Krishnaprasad Thirunarayan, Jeremiah Schumm, Jyotishman Pathak, Amit P. Sheth Jan 2018

Personalized Prediction Of Suicide Risk For Web-Based Intervention, Amanuel Alambo, Manas Gaur, Ugur Kursuncu, Krishnaprasad Thirunarayan, Jeremiah Schumm, Jyotishman Pathak, Amit P. Sheth

Kno.e.sis Publications

Across the United States, suicide is the second leading cause of death for people aged between 15 and 34, and younger people are more prone to mental health problems, suicidal thoughts, and behaviors. For instance, 80% of patients with Borderline Personality Disorder have suicide-related behaviors, and between 4-9% of them commit suicide. Moreover, the social stigma associated with mental health issues and suicide deter patients from sharing their experiences directly with others. In such a situation, social media that provides a free and open forum for voluntary expression can provide insights into suicide ideation and self-destructive behavior.

Reddit is a …


Poster: Image Disguising For Privacy-Preserving Deep Learning, Sagar Sharma, Keke Chen Jan 2018

Poster: Image Disguising For Privacy-Preserving Deep Learning, Sagar Sharma, Keke Chen

Kno.e.sis Publications

No abstract provided.


Khealth Digital Personalized Healthcare Technology For Pediatric Asthma, Utkarshani Jaimini, Hong Y. Yip, Revathy Venkataramanan, Dipesh Kadariya, Vaikunth Sridharan, Tanvi Banerjee, Krishnaprasad Thirunarayan, Maninder Kalra, Amit Sheth Jan 2018

Khealth Digital Personalized Healthcare Technology For Pediatric Asthma, Utkarshani Jaimini, Hong Y. Yip, Revathy Venkataramanan, Dipesh Kadariya, Vaikunth Sridharan, Tanvi Banerjee, Krishnaprasad Thirunarayan, Maninder Kalra, Amit Sheth

Kno.e.sis Publications

Episodic:Traditional Clinician Centric Healthcare

Questions to be answered:

1.Can we reduce the number of asthma attacks through continuous monitoring of the patient's health condition?

2.Can we predict the asthma attack based on the data collected from the patient?

3.Can we predict the asthma vulnerability score for a patient?

4.Can we predict the asthma severity level of a patient?

5.Can we understand the casual relationship between the asthma symptom and the possible factors responsible for it?


Khealth: A Personalized Healthcare Approach For Pediatric Asthma, Utkarshani Jaimini, Hong Y. Yip, Revathy Venkataramanan, Dipesh Kadariya, Vaikunth Sridharan, Tanvi Banerjee, Krishnaprasad Thirunarayan, Maninder Kalra, Amit Sheth Jan 2018

Khealth: A Personalized Healthcare Approach For Pediatric Asthma, Utkarshani Jaimini, Hong Y. Yip, Revathy Venkataramanan, Dipesh Kadariya, Vaikunth Sridharan, Tanvi Banerjee, Krishnaprasad Thirunarayan, Maninder Kalra, Amit Sheth

Kno.e.sis Publications

Can we assess the asthma control level, determine vulnerability, and medication compliance for a patient? Can we understand the causal relationship between the asthma symptom and possible factors responsible for it? Can we reduce the number of asthma attacks through continuous monitoring of the patient’s health condition?


Regression Analysis Of Open Source Project Impact: Relationships With Activity And Rewards, Vinod Kumar Ahuja Jan 2018

Regression Analysis Of Open Source Project Impact: Relationships With Activity And Rewards, Vinod Kumar Ahuja

Information Systems and Quantitative Analysis Faculty Publications

Engagement with open source projects is becoming an increasingly important part of how people work. In this regard, there is a growing interest in how we can better understand the dynamics within an open source project related to project activity, project contributor rewards, and project impact. In this paper, we summarize our work of exploring the relationships between these items.


Eight Observations And 24 Research Questions About Open Source Projects: Illuminating New Realities, Matt Germonprez, Georg J.P. Link, Kevin Lumbard, Sean Goggins Jan 2018

Eight Observations And 24 Research Questions About Open Source Projects: Illuminating New Realities, Matt Germonprez, Georg J.P. Link, Kevin Lumbard, Sean Goggins

Information Systems and Quantitative Analysis Faculty Publications

The rapid acceleration of corporate engagement with open source projects is drawing out new ways for CSCW researchers to consider the dynamics of these projects. Research must now consider the complex ecosystems within which open source projects are situated, including issues of for-profit motivations, brokering foundations, and corporate collaboration. Localized project considerations cannot reveal broader workings of an open source ecosystem, yet much empirical work is constrained to a local context. In response, we present eight observations from our eight-year engaged field study about the changing nature of open source projects. We ground these observations through 24 research questions that …


Exploring The Impact Of Technology Capabilities On Trust In Virtual Teams, Deepak Khazanchi Jan 2018

Exploring The Impact Of Technology Capabilities On Trust In Virtual Teams, Deepak Khazanchi

Information Systems and Quantitative Analysis Faculty Publications

Purpose – In an environment of constant technological change, the use of virtual teams has become commonplace for many organizations. Virtual teams (VTs) bring together dispersed individuals with varying knowledge and skill sets to accomplish tasks. VTs rely heavily on information technology as the medium for communication and coordination of work. The issue of establishing and maintaining trust in VTs poses challenges for these dispersed workers. Previous research has established that higher trusting teams have better cooperation and experience improved outcomes. We hope to contribute to the literature on trust in VTs by exploring how technology can facilitate high trusting …


Exploring Welfare Recipients' Self-Sufficiency Barriers Through Information Management Systems In Tennessee, Valenta Eunice Nichols Jan 2018

Exploring Welfare Recipients' Self-Sufficiency Barriers Through Information Management Systems In Tennessee, Valenta Eunice Nichols

Walden Dissertations and Doctoral Studies

Families living on welfare in low-income impoverished neighborhoods encounter multiple barriers that need mitigating before seeking work to reach self-sufficiency. Many welfare recipients' self-sufficiency barriers are unnoticeable to caseworkers due to lack of data sharing to assess clients' needs through information technology processes. The purpose of this exploratory descriptive phenomenological qualitative study was to understand welfare recipients' viewpoints on socioeconomic barriers to living self-sufficiently and gain perspectives from human services caseworkers and technical resources on data sharing issues that impact recipients' ability to live independently from government assistance. Data collection and observational field notes resulted from in-depth interviews of 11 …


Strategies To Manage Cloud Computing Operational Costs, Frankie Nii A Sackey Jan 2018

Strategies To Manage Cloud Computing Operational Costs, Frankie Nii A Sackey

Walden Dissertations and Doctoral Studies

Information technology (IT) managers worldwide have adopted cloud computing because of its potential to improve reliability, scalability, security, business agility, and cost savings; however, the rapid adoption of cloud computing has created challenges for IT managers, who have reported an estimated 30% wastage of cloud resources. The purpose of this single case study was to explore successful strategies and processes for managing infrastructure operations costs in cloud computing. The sociotechnical systems (STS) approach was the conceptual framework for the study. Semistructured interviews were conducted with 6 IT managers directly involved in cloud cost management. The data were analyzed using a …


Overcoming Data Breaches And Human Factors In Minimizing Threats To Cyber-Security Ecosystems, Manouan Pierre-Marius Ayereby Jan 2018

Overcoming Data Breaches And Human Factors In Minimizing Threats To Cyber-Security Ecosystems, Manouan Pierre-Marius Ayereby

Walden Dissertations and Doctoral Studies

This mixed-methods study focused on the internal human factors responsible for data breaches that could cause adverse impacts on organizations. Based on the Swiss cheese theory, the study was designed to examine preventative measures that managers could implement to minimize potential data breaches resulting from internal employees' behaviors. The purpose of this study was to provide insight to managers about developing strategies that could prevent data breaches from cyber-threats by focusing on the specific internal human factors responsible for data breaches, the root causes, and the preventive measures that could minimize threats from internal employees. Data were collected from 10 …


Digital Strategies Senior Bank Executives In Mauritius Use To Improve Customer Service, Sailesh Sewpaul Jan 2018

Digital Strategies Senior Bank Executives In Mauritius Use To Improve Customer Service, Sailesh Sewpaul

Walden Dissertations and Doctoral Studies

Customers' use of digital banking has reshaped traditional banking, and senior level bank executives must know how to leverage this innovation to improve customer service to increase profitability. Using the technology acceptance model as the conceptual framework, the purpose of this multiple case study was to explore effective digital banking strategies that senior level executives used to improve customer service to increase profitability. The target population for this study included senior-level executives from 3 banks in Mauritius possessing successful development and implementation experience in digital banking strategies to improve customer service. Data were collected through semistructured interviews and organizational documents, …


Estimating The Optimal Cutoff Point For Logistic Regression, Zheng Zhang Jan 2018

Estimating The Optimal Cutoff Point For Logistic Regression, Zheng Zhang

Open Access Theses & Dissertations

Binary classification is one of the main themes of supervised learning. This research is concerned about determining the optimal cutoff point for the continuous-scaled outcomes (e.g., predicted probabilities) resulting from a classifier such as logistic regression. We make note of the fact that the cutoff point obtained from various methods is a statistic, which can be unstable with substantial variation. Nevertheless, due partly to complexity involved in estimating the cutpoint, there has been no formal study on the variance or standard error of the estimated cutoff point.

In this Thesis, a bootstrap aggregation method is put forward to estimate the …


User Interface Challenges Of Banking Atm Systems In Nigeria, Felix Chukwuma Aguboshim Jan 2018

User Interface Challenges Of Banking Atm Systems In Nigeria, Felix Chukwuma Aguboshim

Walden Dissertations and Doctoral Studies

The use of banking automated teller machine (ATM) technological innovations have significant importance and benefits in Nigeria, but numerous investigations have shown that illiterate and semiliterate Nigerians do not perceive them as useful or easy-to-use. Developing easy-to-use banking ATM system interfaces is essential to accommodate over 40% illiterate and semiliterate Nigerians, who are potential users of banking ATM systems. The purpose of this study was to identify strategies software developers of banking ATM systems in Nigeria use to create easy-to-use banking ATM system interfaces for a variety of people with varying abilities and literacy levels. The technology acceptance model was …


Analytic Extensions To The Data Model For Management Analytics And Decision Support In The Big Data Environment, Nsikak Etim Akpakpan Jan 2018

Analytic Extensions To The Data Model For Management Analytics And Decision Support In The Big Data Environment, Nsikak Etim Akpakpan

Walden Dissertations and Doctoral Studies

From 2006 to 2016, an estimated average of 50% of big data analytics and decision support projects failed to deliver acceptable and actionable outputs to business users. The resulting management inefficiency came with high cost, and wasted investments estimated at $2.7 trillion in 2016 for companies in the United States. The purpose of this quantitative descriptive study was to examine the data model of a typical data analytics project in a big data environment for opportunities to improve the information created for management problem-solving. The research questions focused on finding artifacts within enterprise data to model key business scenarios for …


Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii Jan 2018

Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii

Walden Dissertations and Doctoral Studies

The Federal Bureau of Investigation reported that cyber actors will likely increase cyber intrusions against healthcare systems and their concomitant medical devices because of the mandatory transition from paper to electronic health records, lax cyber security standards, and a higher financial payout for medical records in the deep web. The problem addressed in this quantitative correlational study was uncertainty surrounding the benefits of palm vein authentication adoption relative to the growing crime of medical identity theft. The purpose of this quantitative correlational study was to understand healthcare managers' and doctors' perceptions of the effectiveness of palm vein authentication technology. The …


Technology Acceptance And Compliance In Obstructive Sleep Apnea Patients, Asif Kidwai Jan 2018

Technology Acceptance And Compliance In Obstructive Sleep Apnea Patients, Asif Kidwai

Walden Dissertations and Doctoral Studies

The focus of this study is the problem of declining trend in obstructive sleep apnea (OSA) patient compliance. Studies reported improved compliance in patients with chronic diseases due to technology-based interventions. However, researchers have not investigated the advantages of technology to improve the compliance of OSA patients in detail. The specific problem was the lack of engagement between patients and healthcare managers, resulting in low compliance within OSA patients. The purpose of this qualitative study was to evaluate how technology-based interventions can improve OSA patient engagement with the healthcare managers resulting in improved compliance with treatment procedures. In this study, …


Management Strategies For Adopting Agile Methods Of Software Development In Distributed Teams, Igor A. Schtein Jan 2018

Management Strategies For Adopting Agile Methods Of Software Development In Distributed Teams, Igor A. Schtein

Walden Dissertations and Doctoral Studies

Between 2003 and 2015, more than 61% of U.S. software development teams failed to satisfy project requirements, budgets, or timelines. Failed projects cost the software industry an estimated 60 billion dollars. Lost opportunities and misused resources are often the result of software development leaders failing to implement appropriate methods for managing software projects. The purpose of this qualitative multiple case study was to explore strategies software development managers use in adopting Agile methodology in the context of distributed teams. The tenets of Agile approach are individual interaction over tools, working software over documentation, and collaboration over a contract. The conceptual …


Exploring Sme Vulnerabilities To Cyber-Criminal Activities Through Employee Behavior And Internet Access, Jerry Allen Twisdale Jan 2018

Exploring Sme Vulnerabilities To Cyber-Criminal Activities Through Employee Behavior And Internet Access, Jerry Allen Twisdale

Walden Dissertations and Doctoral Studies

Cybercriminal activity may be a relatively new concern to small and medium enterprises (SMEs), but it has the potential to create financial and liability issues for SME organizations. The problem is that SMEs are a future growth target for cybercrime activity as larger corporations begin to address security issues to reduce cybercriminal risks and vulnerabilities. The purpose of this study was to explore a small business owner's knowledge about to the principal elements of decision making for SME investment into cybersecurity education for employees with respect to internet access and employee vulnerabilities. The theoretical framework consisted of the psychological studies …


Effective Strategies For Managing The Outsourcing Of Information Technology, Marsha N. Hopwood Jan 2018

Effective Strategies For Managing The Outsourcing Of Information Technology, Marsha N. Hopwood

Walden Dissertations and Doctoral Studies

More than half of information technology (IT) outsourced projects fail, primarily due to a lack of effective management practices surrounding the outsourcing end-to-end process. Ineffective management of the IT outsourcing (ITO) process affects organizations in the form of higher than expected project costs, including greater vendor switching or reintegration costs, poor quality, and loss of profits. These effects indicate that some business leaders lack the strategies to effectively manage the ITO process. The purpose of this single-case study was to apply the transaction cost economics (TCE) theory to explore strategies 5 business professionals use to manage an ITO project in …


A Comparison Of Information Technology Mediated Customer Services Between The U.S. And China, Suhong Li, Hal Records, Robert Behling Jan 2018

A Comparison Of Information Technology Mediated Customer Services Between The U.S. And China, Suhong Li, Hal Records, Robert Behling

Information Systems and Analytics Department Faculty Journal Articles

Information technology mediated customer service is a reality of the 21st century. More and more companies have moved their customer services from in store and in person to online through computer or mobile devices. Using 442 responses collected from one USA university (234 responses) and two Chinese universities (208 responses), the study investigates customer preferences over two service delivery models (either in store or online) on five types of purchasing (retail, eating-out, banking, travel and entertainment) and their perception difference in customer service quality between those two delivery models in the U.S. and China. The results show that the majority …


Developing A Cyberterrorism Policy: Incorporating Individual Values, Osama Bassam J. Rabie Jan 2018

Developing A Cyberterrorism Policy: Incorporating Individual Values, Osama Bassam J. Rabie

Theses and Dissertations

Preventing cyberterrorism is becoming a necessity for individuals, organizations, and governments. However, current policies focus on technical and managerial aspects without asking for experts and non-experts values and preferences for preventing cyberterrorism. This study employs value focused thinking and public value forum to bare strategic measures and alternatives for complex policy decisions for preventing cyberterrorism. The strategic measures and alternatives are per socio-technical process.


Data Warehousing Class Project Report, Gaya Haciane, Chuan Chieh Lu, Rassaniya Lerdphayakkarat, Rudraxi Mitra Jan 2018

Data Warehousing Class Project Report, Gaya Haciane, Chuan Chieh Lu, Rassaniya Lerdphayakkarat, Rudraxi Mitra

Engineering and Technology Management Student Projects

Data mining is widely described or defined as the discipline of: “making sense of the data”. In today’s day and age, the rise of ubiquity of information calls for more advanced and developed techniques to mine the data and come up with insights. Data mining finds applications in many different fields and industries: Whether it is in Embryology, Crops, Elections, or Business Marketing...etc. It is not a wild assumption to consider that every organization in the world has some data mining capabilities or its main activity necessitates it and they have some third party organization doing that for them. One …


Strategies Certified Project Management Professionals Use To Prevent Counterproductive Behavior, Lisa Annika Christin Hansson-Vazquez Jan 2018

Strategies Certified Project Management Professionals Use To Prevent Counterproductive Behavior, Lisa Annika Christin Hansson-Vazquez

Walden Dissertations and Doctoral Studies

Project managers who fail to apply strategies to prevent counterproductive work behavior in information technology projects could negatively affect users, budget costs, timelines, or projects. The purpose of this multiple case study was to explore strategies that project managers used to prevent counterproductive work behavior that put project success at risk. Social learning theory was the conceptual framework for this study. Data were collected through document review of published Project Management Institute (PMI) material as well as semistructured interviews with 10 project managers who were members of a PMI chapter in the southeastern United States, and who held a project …


Small Business Owners' Search For Profitability Under The Affordable Care Act, Alton Simpson Jan 2018

Small Business Owners' Search For Profitability Under The Affordable Care Act, Alton Simpson

Walden Dissertations and Doctoral Studies

Health care costs for small businesses have been rising annually for the past few decades. Congress voted to pass the Affordable Care Act (ACA) to lower the cost of health care in 2010. The purpose of this phenomenological study was to explore small business owners' experiences in implementing ACA requirements and how the ACA affects small businesses as their owners work to make these organizations profitable. Complex adaptive systems theory formed the conceptual framework for this study Data were gathered during face-to-face and telephone interviews with a sample of 20 small business owners in the Philadelphia region. The research questions …


Complexity Theory Of Leadership And Management Information, Mark Aloysius Simpson Jan 2018

Complexity Theory Of Leadership And Management Information, Mark Aloysius Simpson

Walden Dissertations and Doctoral Studies

Implementing effective leadership strategies in management of information systems (MIS) can positively influence overall organizational performance. This study was an exploration of the general problem of failure to lead effectively in the current knowledge-based economy and the resulting deleterious effects on organizational performance and threats to continuing organizational viability. The specific problem was the lack of understanding regarding the interaction of leadership processes with MIS functions and the impact on organizational success. Managers' and employees' lived experiences of leadership in small- to medium-sized enterprises were explored, as well as how those experiences influenced the organization's adaptive responses regarding technology and …


The Relationship Between Leadership Style And Cognitive Style To Software Project Success, Jacquelyne L. Wilson Jan 2018

The Relationship Between Leadership Style And Cognitive Style To Software Project Success, Jacquelyne L. Wilson

Walden Dissertations and Doctoral Studies

Project managers can be change agents providing direction and motivation for subordinates to meet and exceed goals; however, there is a lack of information about the soft skills needed to achieve project success. Understanding the relationship between cognitive style and transformational leadership to software project outcomes is important. This study describes the lived experiences of software project managers by focusing on their attitudes towards, perceptions of, and behaviors related to using transformational leadership and cognitive styles in agile software development environments. Husserlian phenomenological design was used to identify the structure of participants' experiences. The naturalistic decision-making model and the theory …


Relationship Between Software Development Team Structure, Ambiguity, Volatility, And Project Failure, Dominic Martinelli Saxton Jan 2018

Relationship Between Software Development Team Structure, Ambiguity, Volatility, And Project Failure, Dominic Martinelli Saxton

Walden Dissertations and Doctoral Studies

Complex environments like the United States Air Force's advanced weapon systems are highly reliant on externally developed software, which is often delivered late, over budget, and with fewer benefits than expected. Grounded in Galbraith's organizational information processing theory, the purpose of this correlational study was to examine the relationship between software development team structure, ambiguity, volatility and software project failure. Participants included 23 members of the Armed Forces Communications and Electronics Association in the southeastern United States who completed 4 project management surveys. Results of multiple regression analysis indicated the model as a whole was able to predict software project …


Successful Strategies For Implementing An Enterprise Resource Planning System, Arrogah Adade-Boafo Jan 2018

Successful Strategies For Implementing An Enterprise Resource Planning System, Arrogah Adade-Boafo

Walden Dissertations and Doctoral Studies

The enterprise resource planning (ERP) implementation success rate is as low as 30%. Researchers have shown that ERP system implementation could cause both system and organization failures, affecting operations and stakeholders, alike. The technology-organization-environment conceptual framework was used to ground this qualitative single-case study. The purpose of the study was to explore strategies that a manufacturing firm in Ghana used to implement ERP systems successfully. The population of this case study comprised 5 stakeholders from a manufacturing firm in Ghana who had success in implementing an ERP system. Data were collected using face-to-face semistructured interviews and review of various corporate …


Black Business Owners Overcoming Barriers In Texas, Henry Williams Jan 2018

Black Business Owners Overcoming Barriers In Texas, Henry Williams

Walden Dissertations and Doctoral Studies

Black entrepreneurs in the state of Texas reported that they did not achieve the same level of success as nonminority enterprises. Many Black entrepreneurs have obtained education from top tier institutions and have the managerial experiences, skills, and working knowledge that facilitate business success, but they are not able to sustain business growth. The purpose of this phenomenological study was to explore the lived experiences of Black Texan entrepreneurs. This research was established using the conceptual framework of human capital. The overarching research question concerned the lived experiences of Black Texas entrepreneurs who were not as successful in business as …


A Grounded Theory Of Emergent Leadership In Nonhierarchical Virtual Teams, Randall Fleming Jan 2018

A Grounded Theory Of Emergent Leadership In Nonhierarchical Virtual Teams, Randall Fleming

Walden Dissertations and Doctoral Studies

A Grounded Theory of Emergent Leadership in Nonhierarchical Virtual Teams

by

Randall David Fleming

MS, Colorado Technical University, 2008

BA, The Ohio State University, 1984

Dissertation Submitted in Partial Fulfillment

of the Requirements for the Degree of

Doctor of Philosophy

Management

Walden University

November 2018