Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2431 - 2460 of 6720

Full-Text Articles in Physical Sciences and Mathematics

Public Health Providers' Perceptions Of Electronic Health Records In A Disaster, Sherhonda Yvette Harper Jan 2018

Public Health Providers' Perceptions Of Electronic Health Records In A Disaster, Sherhonda Yvette Harper

Walden Dissertations and Doctoral Studies

The introduction of federal initiatives and incentives regarding health information technology fostered a movement towards the adoption of electronic health records (EHR). Implementation of EHRs sparked discussions among healthcare providers, patients, and others about the benefits or challenges of the move from the traditional paper method to the electronic version in healthcare settings. A knowledge gap in research involving the usefulness of EHRs and their impact to the delivery of care in other settings exists. The purpose of this qualitative study was to explore public health providers' perceptions of the meaningful use of EHRs in a disaster setting. Study participants …


Aligning Social Media, Mobile, Analytics, And Cloud Computing Technologies And Disaster Response, William Tuley Worthy Jan 2018

Aligning Social Media, Mobile, Analytics, And Cloud Computing Technologies And Disaster Response, William Tuley Worthy

Walden Dissertations and Doctoral Studies

After nearly 2 decades of advances in information and communications technologies (ICT) including social media, mobile, analytics, and cloud computing, disaster response agencies in the United States have not been able to improve alignment between ICT-based information and disaster response actions. This grounded theory study explored emergency response ICT managers' understanding of how social media, mobile, analytics, and cloud computing technologies (SMAC) are related to and can inform disaster response strategies. Sociotechnical theory served as the conceptual framework to ground the study. Data were collected from document reviews and semistructured interviews with 9 ICT managers from emergency management agencies in …


Initiating Factors Affecting Information Systems Project Success, Jonathan Olubunmi Afolabi Jan 2018

Initiating Factors Affecting Information Systems Project Success, Jonathan Olubunmi Afolabi

Walden Dissertations and Doctoral Studies

Information systems (IS) projects are complex and costly, but only a 3rd of IS projects are successful; the Standish Group reported that 32% of IS projects were successful in 2012. Although investments in research have led to improvements in practice, there is a general perception that management failures are responsible for the low rate of IS project success. The effects of initiating factors on project outcome had not been sufficiently explored; few IS researchers have explored the initiation phase. The purpose of this grounded theory study was to explore project initiation factors, including relational, as well as decision-making aspects, and …


Strategies Used By Cloud Security Managers To Implement Secure Access Methods, Eric Harmon Jan 2018

Strategies Used By Cloud Security Managers To Implement Secure Access Methods, Eric Harmon

Walden Dissertations and Doctoral Studies

Cloud computing can be used as a way to access services and resources for many organizations; however, hackers have created security concerns for users that incorporate cloud computing in their everyday functions. The purpose of this qualitative multiple case study was to explore strategies used by cloud security managers to implement secure access methods to protect data on the cloud infrastructure. The population for this study was cloud security managers employed by 2 medium size businesses in the Atlanta, Georgia metropolitan area and that have strategies to implement secure access methods to protect data on the cloud infrastructure. The technology …


Video Game Development Strategies For Creating Successful Cognitively Challenging Games, Walter K. Williams Jan 2018

Video Game Development Strategies For Creating Successful Cognitively Challenging Games, Walter K. Williams

Walden Dissertations and Doctoral Studies

The video game industry is a global multibillion dollar industry with millions of players. The process of developing video games is essential for the continued growth of the industry, and developers need to employ effective strategies that will help them to create successful games. The purpose of this explorative qualitative single case study was to investigate the design strategies of video game developers who have successfully created video games that are challenging, entertaining, and successful. The technology acceptance model served as a conceptual framework. The entire population for this study was members of a video game development team from a …


Organizational Information Security: Strategies To Minimize Workplace Cyberloafing For Increased Productivity, Hawazin Al Abbasi Jan 2018

Organizational Information Security: Strategies To Minimize Workplace Cyberloafing For Increased Productivity, Hawazin Al Abbasi

Walden Dissertations and Doctoral Studies

Productivity loss occurs in organizations that experience high levels of personal Internet use by employees on company time, which includes employees using smartphones to surf without needing the firm's Internet connection. The purpose of this qualitative phenomenological study was to explore reliable ways for organizational leaders to monitor or limit their employees' use of smartphone technology for personal use (cyberloafing) while on the job to minimize wasted work time. Social cognitive theory, which includes an emphasis on human behavioral changes based upon the environment, people, and behavior, served as the conceptual framework. The general research question was as follows: How …


Information Technology Infrastructure: Global Economy And National Development In Haiti, Reynolds Alcena Jan 2018

Information Technology Infrastructure: Global Economy And National Development In Haiti, Reynolds Alcena

Walden Dissertations and Doctoral Studies

Political and environmental chaos recently experienced in Haiti has damaged the economic sector and telecommunication infrastructure. Developmental data from Haiti show 3 major trends: inadequate social and economic development, insufficient benefits from the global economy, and poorly planned information technology infrastructure (ITI). The specific problem addressed in this study is a knowledge gap in the views of stakeholders within Haiti's national culture on how the country's ITI can be developed to better engage Haiti in 21st century global and digital economy. The purpose of this qualitative case study was to explore the views of 48 expert participants regarding ITI development …


Staff Education Module For Bar Code Medication Administration, Francoise Juste Jan 2018

Staff Education Module For Bar Code Medication Administration, Francoise Juste

Walden Dissertations and Doctoral Studies

Bar Code Medication Administration (BCMA) is a technology-supported nursing tool that has become the standard of practice for medication administration. When used effectively and efficiently, this tool has the potential to reduce medication errors in acute care settings. In a pediatric unit at a major urban hospital in the northeast region of the United States, the absence of a BCMA nursing staff educational module affected the use of this safety tool leading to an increase of medication errors. The purpose of this DNP project was to develop a comprehensive educational module to promote BCMA in the pediatric unit of the …


Equity Trading Evaluation Strategies In Switzerland After The European Mifid Ii, Linn Kristina Karstadt Jan 2018

Equity Trading Evaluation Strategies In Switzerland After The European Mifid Ii, Linn Kristina Karstadt

Walden Dissertations and Doctoral Studies

Swiss bank traders are affected by technological and regulatory challenges, which may affect their broker voting process and may result in a change of trading and evaluation behavior in 2018. Compounded challenges exist when broker evaluation strategies are not effective or Markets in Financial Instruments Directive (MiFID) II compliant. This qualitative, single case study, built on efficient capital market hypothesis and innovative disruption theory, was focused on effective broker evaluation strategies after MiFID II in Switzerland. The sample consisted of 4 buy-side traders, who shared their unique perspectives. Methodological triangulation was achieved through semistructured interviews, a review of the institution's …


Risk Management Strategies To Prevent And Mitigate Emerging Operational Security Threats, Nancy Page Larrimore Jan 2018

Risk Management Strategies To Prevent And Mitigate Emerging Operational Security Threats, Nancy Page Larrimore

Walden Dissertations and Doctoral Studies

Dependence on technology brings security compromises that have become a global threat that costs businesses millions of dollars. More than 7.6 million South Carolinians incurred effects from the 162 security breaches reported in 2011-2015. The purpose of this multiple case study was to explore the risk management strategies small business leaders use to prevent and mitigate operational security threats that produce financial losses. The population for this study consisted of 6 business leaders in South Carolina who have demonstrated successful experience in preventing and mitigating operational security threats. Transformational leadership theory provided the conceptual framework for exploring the overreaching research …


Exploring Management Practices Of The Health Care System For Contractors, Gary L. Williams Jan 2018

Exploring Management Practices Of The Health Care System For Contractors, Gary L. Williams

Walden Dissertations and Doctoral Studies

Researchers have found that military members serving in war experienced changes in physical and mental health. Military members' healthcare is managed by the Department of Defense. The problem was that management practices of the system for providing long-term healthcare for employees of a contracting company working in foreign combat zones is either minimal or nonexistent. The purpose of this case study was to explore ways that contractor managers and government managers can work together to provide healthcare for those contract employees who will be deployed with the U.S. military. The primary research question was to determine what managers of contractors …


Social Media Policy To Support Employee Productivity In The Finance Industry, David Shaun Rogers Jan 2018

Social Media Policy To Support Employee Productivity In The Finance Industry, David Shaun Rogers

Walden Dissertations and Doctoral Studies

Business leaders may see social media as a distraction for their workers; however, blocking access could lead to a reduction in productivity. Using social media technologies with knowledge workers could achieve cost reductions for payroll of 30% to 35%. The purpose of this multiple case study was to explore how business leaders used a social media policy to support employee productivity. The conceptual framework for this study was social exchange theory, which supports the notion that dyad and small group interactions make up most interactions, and such interactions enhance employees' productivity. The research question was to explore how finance industry …


Employee Retention Strategies In The Information Technology Industry, Corey Harris Jan 2018

Employee Retention Strategies In The Information Technology Industry, Corey Harris

Walden Dissertations and Doctoral Studies

Productivity declines when employees voluntarily leave an organization. The purpose of this case study was to explore strategies that business leaders use to reduce turnover among their skilled information technology (IT) professionals in the Dallas-Fort Worth area. Six business leaders were selected because they had implemented strategies to retain skilled IT professionals. Herzberg's 2-factor theory was the conceptual framework for this doctoral study. Data were collected from semistructured interviews and review of the organization's policies, procedures, and personnel handbook. Data analysis consisted of assembling the data, organizing the data into codes, compiling the data into themes, and interpreting and disclosing …


Reducing Internal Theft And Loss In Small Businesses, Eric L. Luster Jan 2018

Reducing Internal Theft And Loss In Small Businesses, Eric L. Luster

Walden Dissertations and Doctoral Studies

Every year, several documented data breaches happen in the United States, resulting in the exposure of millions of electronic records. The purpose of this single-case study was to explore strategies some information technology managers used to monitor employees and reduce internal theft and loss. The population for this study consisted of 5 information technology managers who work within the field of technology in the southwestern region of the United States. Participants were selected using purposeful sampling. The conceptual framework for this study included elements from information and communication boundary theories. Data were collected from semistructured interviews, company standard operating procedures, …


Leveraging Artificial Intelligence To Improve Provider Documentation In Patient Medical Records, Evangeline C. Ozurigbo Jan 2018

Leveraging Artificial Intelligence To Improve Provider Documentation In Patient Medical Records, Evangeline C. Ozurigbo

Walden Dissertations and Doctoral Studies

Clinical documentation is at the center of a patient's medical record; this record contains all the information applicable to the care a patient receives in the hospital. The practice problem addressed in this project was the lack of clear, consistent, accurate, and complete patient medical records in a pediatric hospital. Although the occurrence of incomplete medical records has been a known issue for the project hospital, the issue was further intensified following the implementation of the 10th revision of International Classification of Diseases (ICD-10) standard for documentation, which resulted in gaps in provider documentation that needed to be filled. Based …


Patient Satisfaction Management In Office Visits And Telehealth In Health Care Technology, Todd Price Jan 2018

Patient Satisfaction Management In Office Visits And Telehealth In Health Care Technology, Todd Price

Walden Dissertations and Doctoral Studies

Telehealth and remote medical treatments have begun to be more commonly used in healthcare systems. Researchers have theorized that providers' abilities to treat patients are not directly tied to the proximity of the patient to the doctor, but by the identification and treatment of the patient's symptoms. Although the treatment and cure rates are being established within individual health systems and professional medical associations, empirical research is lacking regarding patient satisfaction with this remote treatment situation. The purpose of this quantitative study was to address this gap by examining satisfaction ratings of patients between virtual provider visits and face-to-face provider …


A Study Of Groupthink In Project Teams, John Reaves Jan 2018

A Study Of Groupthink In Project Teams, John Reaves

Walden Dissertations and Doctoral Studies

Project teams advance a common goal by working together on projects that require a diverse set of skills and are difficult for 1 person to complete. In this study, there was an exploration of the antecedents to groupthink in project teams from the perspectives of project managers. Many companies use project managers to complete critical objectives; avoiding groupthink is crucial to their success. The purpose of this research was to understand why project teams are susceptible to groupthink and what precautions managers can take to avoid it. The conceptual framework utilized in this study was Janis' concept of groupthink, which …


Strategies For Healthcare Payer Information Technology Integration After Mergers And Acquisitions, Kishore Maranganti Jan 2018

Strategies For Healthcare Payer Information Technology Integration After Mergers And Acquisitions, Kishore Maranganti

Walden Dissertations and Doctoral Studies

Despite the high rate of failure in merger and acquisition (M&A) transactions, many organizations continue to rely on M&As as their primary growth strategy and to address market competition. The purpose of this qualitative single case study was to explore strategies managers from a large healthcare payer in the midwestern United States used to achieve operational and strategic synergies during the postacquisition information technology (IT) integration phase. Haspeslagh and Jemison's acquisition integration approaches model was the conceptual framework for the study. Methodological triangulation was established by analyzing the data from the semistructured interviews of 6 senior executives and 6 IT …


The Effects Of Computer Crimes On The Management Of Disaster Recovery, Tim Gene Proffitt Jan 2018

The Effects Of Computer Crimes On The Management Of Disaster Recovery, Tim Gene Proffitt

Walden Dissertations and Doctoral Studies

The effects of a technology disaster on an organization can include a prolonged disruption, loss of reputation, monetary damages, and the inability to remain in business. Although much is known about disaster recovery and business continuance, not much research has been produced on how businesses can leverage other technology frameworks to assist information technology disaster recovery. The problem was the lack of organizational knowledge to recover from computer crime interruptions given the maturity level of existing disaster recovery programs. The purpose of this Delphi study was to understand how disaster recovery controls and processes can be modified to improve response …


Leadership Skills To Sustain High-Tech Entrepreneurial Ventures, Zoaib Z. Rangwala Jan 2018

Leadership Skills To Sustain High-Tech Entrepreneurial Ventures, Zoaib Z. Rangwala

Walden Dissertations and Doctoral Studies

High-tech (HT) innovation-oriented entrepreneurs start 35% more ventures and create 10% more jobs in the first 5 years of operation than the rest of the private sector and drive significant economic growth across all industries; however, more than 50% of the entrepreneurial HT ventures fail during the first 5 years of operations. Guided by the conceptual framework of transformational leadership theory, the purpose of this multicase study was to explore skills used by successful entrepreneurial leaders to sustain their HT ventures in Silicon Valley, California. Data collection was from 8 participants in semistructured 1-on-1 interviews and 3 participants in a …


Exploring The Implementation Of Cloud Security To Minimize Electronic Health Records Cyberattacks, Lamonte Bryant Tyler Jan 2018

Exploring The Implementation Of Cloud Security To Minimize Electronic Health Records Cyberattacks, Lamonte Bryant Tyler

Walden Dissertations and Doctoral Studies

Health care leaders lack the strategies to implement cloud security for electronic medical records to prevent a breach of patient data. The purpose of this qualitative case study was to explore strategies senior information technology leaders in the healthcare industry use to implement cloud security to minimize electronic health record cyberattacks. The theory supporting this study was routine activities theory. Routine activities theory is a theory of criminal events that can be applied to technology. The study's population consisted of senior information technology leaders from a medical facility in a large northeastern city. Data collection included semistructured interviews, phone interviews, …


Support Vector Machines For Image Spam Analysis, Aneri Chavda, Katerina Potika, Fabio Di Troia, Mark Stamp Jan 2018

Support Vector Machines For Image Spam Analysis, Aneri Chavda, Katerina Potika, Fabio Di Troia, Mark Stamp

Faculty Publications, Computer Science

Email is one of the most common forms of digital communication. Spam is unsolicited bulk email, while image spam consists of spam text embedded inside an image. Image spam is used as a means to evade text-based spam filters, and hence image spam poses a threat to email-based communication. In this research, we analyze image spam detection using support vector machines (SVMs), which we train on a wide variety of image features. We use a linear SVM to quantify the relative importance of the features under consideration. We also develop and analyze a realistic “challenge” dataset that illustrates the limitations …


Automating Ciri Ratings Of Human Rights Reports Using Gate, Joshua M. Joiner Jan 2018

Automating Ciri Ratings Of Human Rights Reports Using Gate, Joshua M. Joiner

UNF Graduate Theses and Dissertations

This thesis involves parsing document-based reports from the United States Human Rights Reports and rating the human practices for various countries based on the CIRI (Cingranelli-Richards) Human Rights Data Project dataset. The United States Human Rights Reports are annual reports that cover internationally recognized human rights practices regarding individual, civil, political, and worker rights. Students, scholars, policymakers, and analysts used the CIRI data for practical and research purposes. CIRI analyzed the annual reports from 1981 to 2011 and then stopped releasing the dataset for any further years, but a possible reason is due to the manual process of scouring the …


Smart-Teleprompter: An Online Teleprompter With Text Editing, Mikyla Wilfred Jan 2018

Smart-Teleprompter: An Online Teleprompter With Text Editing, Mikyla Wilfred

Williams Honors College, Honors Research Projects

Mikyla Wilfred

Major: Computer Science

Project Sponsor: Dr. Collard

Number of Project Credits: 3

Smart-Teleprompter

The smart-teleprompter is a website that allows a logged in user to edit text files as well as teleprompt them straight to the screen. A teleprompter is used by newscasters and other media professionals to read scripts while still looking at or near the camera. My project uses this concept creating a page that defaults to white font on a black background that can scroll through the script. The website allows the logged in user to save defaults of font color, background color, font style …


Perceptions Of Female Cybersecurity Professionals Toward Factors That Encourage Females To The Cybersecurity Field, Kembley Kay Lingelbach Jan 2018

Perceptions Of Female Cybersecurity Professionals Toward Factors That Encourage Females To The Cybersecurity Field, Kembley Kay Lingelbach

CCE Theses and Dissertations

Despite multiple national, educational, and industry initiatives, women continue to be underrepresented in the cybersecurity field. Only 11% of cybersecurity professionals, globally, are female. This contributes to the growing overall shortage of workers in the field. This research addressed the significant underrepresentation of females in the cybersecurity workforce. There are many practitioner and industry studies that suggest self-efficacy, discrimination and organizational culture play important roles in the low rate of women in the cybersecurity field. A limited number of scholarly studies identify causal factors; however, there is not a general consensus or framework to explain the problem thoroughly. Moreover, there …


Knowledge Sharing Among Academics In Higher Education Institutions In Saudi Arabia, Fahad M. Alsaadi Jan 2018

Knowledge Sharing Among Academics In Higher Education Institutions In Saudi Arabia, Fahad M. Alsaadi

CCE Theses and Dissertations

The Ministry of Higher Education (MOHE) in Saudi Arabia aims to move toward a knowledge-based economy and many knowledge management (KM) and knowledge sharing (KS) initiatives have been taken to accelerate the achievement of this goal. Despite the substantial body of research into KS in the business environment, research that investigates factors that promote KS practices among academics in higher education institutions (HEIs) is generally limited, but particularly in Saudi Arabia. To bridge this gap, the goal was to explore what individual and organizational factors contribute to a person’s willingness to share knowledge and develop a profile of the current …


Evaluation Of Machine Learning Techniques For Early Identification Of At-Risk Students, Mansour Hamoud Awaji Jan 2018

Evaluation Of Machine Learning Techniques For Early Identification Of At-Risk Students, Mansour Hamoud Awaji

CCE Theses and Dissertations

Student attrition is one of the long-standing problems facing higher education institutions despite the extensive research that has been undertaken to address it. To increase students’ success and retention rates, there is a need for early alert systems that facilitate the identification of at-risk students so that remedial measures may be taken in time to reduce the risk. However, incorporating ML predictive models into early warning systems face two main challenges: improving the accuracy of timely predictions and the generalizability of predictive models across on-campus and online courses. The goal of this study was to develop and evaluate predictive models …


Code: Coherence Based Decision Boundaries For Feature Correspondence, Wen-Yan Lin, Fan Wang, Ming-Ming Cheng, Sai-Kit Yeung, Philip H. S. Torr, Jiangbo Lu Jan 2018

Code: Coherence Based Decision Boundaries For Feature Correspondence, Wen-Yan Lin, Fan Wang, Ming-Ming Cheng, Sai-Kit Yeung, Philip H. S. Torr, Jiangbo Lu

Research Collection School Of Computing and Information Systems

A key challenge in feature correspondence is the difficulty in differentiating true and false matches at a local descriptor level. This forces adoption of strict similarity thresholds that discard many true matches. However, if analyzed at a global level, false matches are usually randomly scattered while true matches tend to be coherent (clustered around a few dominant motions), thus creating a coherence based separability constraint. This paper proposes a non-linear regression technique that can discover such a coherence based separability constraint from highly noisy matches and embed it into a correspondence likelihood model. Once computed, the model can filter the …


User-Friendly Deniable Storage For Mobile Devices, Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen-Tao Zhu, Yingjiu Li, Zhan. Wang Jan 2018

User-Friendly Deniable Storage For Mobile Devices, Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen-Tao Zhu, Yingjiu Li, Zhan. Wang

Research Collection School Of Computing and Information Systems

Mobile devices are prevalently used to process sensitive data, but traditional encryption may not work when an adversary is able to coerce the device owners to disclose the encryption keys. Plausibly Deniable Encryption (PDE) is thus designed to protect sensitive data against this powerful adversary. In this paper, we present MobiPluto, a user-friendly PDE scheme for denying the existence of sensitive data stored on mobile devices. A salient difference between MobiPluto and the existing PDE systems is that any block-based file systems can be deployed on top of it. To further improve usability and deniability of MobiPluto, we introduce a …


Exact And Heuristic Approaches For The Multi-Agent Orienteering Problem With Capacity Constraints, Wenjie Wang, Hoong Chuin Lau, Shih-Fen Cheng Jan 2018

Exact And Heuristic Approaches For The Multi-Agent Orienteering Problem With Capacity Constraints, Wenjie Wang, Hoong Chuin Lau, Shih-Fen Cheng

Research Collection School Of Computing and Information Systems

This paper introduces and addresses a new multiagent variant of the orienteering problem (OP), namely the multi-agent orienteering problem with capacity constraints (MAOPCC). Different from the existing variants of OP, MAOPCC allows a group of visitors to concurrently visit a node but limits the number of visitors simultaneously being served at each node. In this work, we solve MAOPCC in a centralized manner and optimize the total collected rewards of all agents. A branch and bound algorithm is first proposed to find an optimal MAOPCC solution. Since finding an optimal solution for MAOPCC can become intractable as the number of …