Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2761 - 2790 of 6720

Full-Text Articles in Physical Sciences and Mathematics

Information Technology Management Strategies To Implement Knowledge Management Systems, Mary Jane Mcgee Jan 2017

Information Technology Management Strategies To Implement Knowledge Management Systems, Mary Jane Mcgee

Walden Dissertations and Doctoral Studies

More than 38% of the U.S. public workforce will likely retire by 2030, which may result in a labor shortage. Business leaders may adopt strategies to mitigate knowledge loss within their organizations by capturing knowledge in a knowledge management system (KMS). The purpose of this single case study was to explore strategies that information technology (IT) managers use to develop and implement a KMS. The target population consisted of IT managers in a small-sized organization located in northwestern Florida who had implemented a KMS successfully. The conceptual framework for this study was organizational knowledge creation theory. The collection of public …


E-Business Strategy To Adopt Electronic Banking Services In Ethiopia, Teklebrhan Woldearegay Gebreslassie Jan 2017

E-Business Strategy To Adopt Electronic Banking Services In Ethiopia, Teklebrhan Woldearegay Gebreslassie

Walden Dissertations and Doctoral Studies

E-banking services in Ethiopia are increasing among low-income populations; however, with over 53 million mobile service users countrywide, more than 85% of the population still lacks access to banking services. A single case study was used to explore e-business strategies that bank managers use to promote the adoption of electronic banking services to the unbanked population in Ethiopia. The extended resource-based view of strategy served as the conceptual framework for this study. Data were collected from interviews with 12 experienced bank managers from leading commercial bank in Ethiopia. Data were analyzed using coding techniques and word clustering, with the help …


Collaboration Strategies To Reduce Technical Debt, Jeffrey Allen Miko Jan 2017

Collaboration Strategies To Reduce Technical Debt, Jeffrey Allen Miko

Walden Dissertations and Doctoral Studies

Inadequate software development collaboration processes can allow technical debt to accumulate increasing future maintenance costs and the chance of system failures. The purpose of this qualitative case study was to explore collaboration strategies software development leaders use to reduce the amount of technical debt created by software developers. The study population was software development leaders experienced with collaboration and technical debt at a large health care provider in the state of California. The data collection process included interviews with 8 software development leaders and reviewing 19 organizational documents relating to software development methods. The extended technology acceptance model was used …


Overcoming The Adverse Impact Of Internal Subculture Communications Within Organizations, Terrence Lee Farrier Jan 2017

Overcoming The Adverse Impact Of Internal Subculture Communications Within Organizations, Terrence Lee Farrier

Walden Dissertations and Doctoral Studies

The need for clear and organizationally effective communications is necessary to maintain sustainability as competition increases. Current research has not addressed problems associated with senior managers' clarity and intent and the misinterpretation by midlevel managers of that intent, causing division managers to misinterpret the company plans. Unresolved miscommunications may lead to destructive subculture development. This mixed methods design focused on how to minimize the confusion that manifests between senior and midlevel management within diverse and decentralized decision support structures. The secondary purpose was to advocate for the identification of divisional misalignment and provide information for a tool to help senior …


Nursing Approaches For Use And Sustainability Of Barcode Medication Administration Technology, Jackson Ngigi Njeru Jan 2017

Nursing Approaches For Use And Sustainability Of Barcode Medication Administration Technology, Jackson Ngigi Njeru

Walden Dissertations and Doctoral Studies

Approximately 43.4% of medication errors occur at the time of administration despite the use of bar code medication administration (BCMA) System. This trend has prompted a national effort to mitigate this problem in the United States. Implementing BCMA in health care settings is one of those efforts. Studies focusing on the approaches employed by nurses when using this system are scant. The purpose of this qualitative case study was to investigate strategies nurses and their leaders use to ensure BCMA is implemented, maximized, and sustained. The technology acceptance model was used to guide the study. The 2 research questions addressed …


So What Are You Going To Do With That? The Promises And Pitfalls Of Massive Data Sets, Sigrid Anderson Cordell, Melissa Gomis Jan 2017

So What Are You Going To Do With That? The Promises And Pitfalls Of Massive Data Sets, Sigrid Anderson Cordell, Melissa Gomis

UNL Libraries: Faculty Publications

This article takes as its case study the challenge of data sets for text mining, sources that offer tremendous promise for digital humanities (DH) methodology but present specific challenges for humanities scholars. These text sets raise a range of issues: What skills do you train humanists to have? What is the library’s role in enabling and supporting use of those materials? How do you allocate staff? Who oversees sustainability and data management? By addressing these questions through a specific use case scenario, this article shows how these questions are central to mapping out future directions for a range of library …


Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri Jan 2017

Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri

Articles

Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …


Easing Cross-Border Communication: Mobile-Mediated Communication And Its Framework, Kyungsub Choi, Young Soo Kim Jan 2017

Easing Cross-Border Communication: Mobile-Mediated Communication And Its Framework, Kyungsub Choi, Young Soo Kim

Research Collection School Of Computing and Information Systems

Communication is probably the most critical component of an organization engaged in a cross-border collaboration. Today’s smart devices substantially contribute to such communication. Combined with social media, mobile communication technologies are becoming the main platform for many core functions within organizations. In this paper, we identified seven media identifiable attributes: synchronicity (SYN), de-individuation and co-presence (DCP), accessibility readiness (ARD), cognizance of environment change (CEC), wearability-portability (WRB) modality-select (MDS) and visibility (VSB). These seven attributes significantly impact the course of mobile-mediated communication. We believe that development of a theoretical perspective that embraces the complexity of mobile-mediated communication is due in order …


Special Issue: Neutrosophic Theories Applied In Engineering, Florentin Smarandache, Jun Ye Jan 2017

Special Issue: Neutrosophic Theories Applied In Engineering, Florentin Smarandache, Jun Ye

Branch Mathematics and Statistics Faculty and Staff Publications

Neutrosophic sets and logic are generalizations of fuzzy and intuitionistic fuzzy sets and logic. Neutrosophic sets and logic are gaining significant attention in solving many real life decision making problems that involve uncertainty, impreciseness, vagueness, incompleteness, inconsistent, and indeterminacy. They have been applied in computational intelligence, multiple criteria decision making, image processing, medical diagnoses, etc. This Special Issue presents original research papers that report on state-of-the-art and recent advancements in neutrosophic sets and logic in soft computing, artificial intelligence, big and small data mining, decision making problems, and practical achievements.


Road Accidents Bigdata Mining And Visualization Using Support Vector Machines, Usha Lokala, Srinivas Nowduri, Prabhakar K. Sharma Jan 2017

Road Accidents Bigdata Mining And Visualization Using Support Vector Machines, Usha Lokala, Srinivas Nowduri, Prabhakar K. Sharma

Kno.e.sis Publications

Useful information has been extracted from the road accident data in United Kingdom (UK), using data analytics method, for avoiding possible accidents in rural and urban areas. This analysis make use of several methodologies such as data integration, support vector machines (SVM), correlation machines and multinomial goodness. The entire datasets have been imported from the traffic department of UK with due permission. The information extracted from these huge datasets forms a basis for several predictions, which in turn avoid unnecessary memory lapses. Since data is expected to grow continuously over a period of time, this work primarily proposes a new …


Relatedness-Based Multi-Entity Summarization, Kalpa Gunaratna, Amir Hossein Yazdavar, Krishnaprasad Thirunarayan, Amit Sheth, Gong Cheng Jan 2017

Relatedness-Based Multi-Entity Summarization, Kalpa Gunaratna, Amir Hossein Yazdavar, Krishnaprasad Thirunarayan, Amit Sheth, Gong Cheng

Kno.e.sis Publications

Representing world knowledge in a machine processable format is important as entities and their descriptions have fueled tremendous growth in knowledge-rich information processing platforms, services, and systems. Prominent applications of knowledge graphs include search engines (e.g., Google Search and Microsoft Bing), email clients (e.g., Gmail), and intelligent personal assistants (e.g., Google Now, Amazon Echo, and Apple’s Siri). In this paper, we present an approach that can summarize facts about a collection of entities by analyzing their relatedness in preference to summarizing each entity in isolation. Specifically, we generate informative entity summaries by selecting: (i) inter-entity facts that are similar and …


A Semantics-Based Measure Of Emoji Similarity, Sanjaya Wijeratne, Lakshika Balasuriya, Amit Sheth, Derek Doran Jan 2017

A Semantics-Based Measure Of Emoji Similarity, Sanjaya Wijeratne, Lakshika Balasuriya, Amit Sheth, Derek Doran

Kno.e.sis Publications

Emoji have grown to become one of the most important forms of communication on the web. With its widespread use, measuring the similarity of emoji has become an important problem for contemporary text processing since it lies at the heart of sentiment analysis, search, and interface design tasks. This paper presents a comprehensive analysis of the semantic similarity of emoji through embedding models that are learned over machine-readable emoji meanings in the EmojiNet knowledge base. Using emoji descriptions, emoji sense labels and emoji sense definitions, and with different training corpora obtained from Twitter and Google News, we develop and test …


Forcing Optimality And Brandt's Principle, Domenico Napoletani, Marco Panza, Daniele C. Struppa Jan 2017

Forcing Optimality And Brandt's Principle, Domenico Napoletani, Marco Panza, Daniele C. Struppa

Mathematics, Physics, and Computer Science Faculty Books and Book Chapters

We argue that many optimization methods can be viewed as representatives of “forcing”, a methodological approach that attempts to bridge the gap between data and mathematics on the basis of an a priori trust in the power of a mathematical technique, even when detailed, credible models of a phenomenon are lacking or do not justify the use of this technique. In particular, we show that forcing is implied in particle swarms optimization methods, and in modeling image processing problems through optimization. From these considerations, we extrapolate a principle for general data analysis methods, what we call ‘Brandt’s principle’, namely the …


A Novel Approach For Classifying Gene Expression Data Using Topic Modeling, Soon Jye Kho, Himi Yalamanchili, Michael L. Raymer, Amit Sheth Jan 2017

A Novel Approach For Classifying Gene Expression Data Using Topic Modeling, Soon Jye Kho, Himi Yalamanchili, Michael L. Raymer, Amit Sheth

Kno.e.sis Publications

Understanding the role of differential gene expression in cancer etiology and cellular process is a complex problem that continues to pose a challenge due to sheer number of genes and inter-related biological processes involved. In this paper, we employ an unsupervised topic model, Latent Dirichlet Allocation (LDA) to mitigate overfitting of high-dimensionality gene expression data and to facilitate understanding of the associated pathways. LDA has been recently applied for clustering and exploring genomic data but not for classification and prediction. Here, we proposed to use LDA inclustering as well as in classification of cancer and healthy tissues using lung cancer …


Identifying Depressive Disorder In The Twitter Population, Goonmeet Bajaj, Amir Hossein Yazdavar, Krishnaprasad Thirunarayan, Amit Sheth Jan 2017

Identifying Depressive Disorder In The Twitter Population, Goonmeet Bajaj, Amir Hossein Yazdavar, Krishnaprasad Thirunarayan, Amit Sheth

Kno.e.sis Publications

Depression is a highly prevalent public health challenge and a major cause of disability across the globe.

  • Annually 6.7% of Americans (that is, more than 16 million).
  • Traditional approaches to curb depression involve survey·based methods via phone or online questionnaires.
  • Large temporal gaps and cognitive bias.

Social media provides a method for learning users' feelings, emotions, behaviors, and decisions in real-time.


Using Embedded Mixed Methods In Studying Is Phenomena: Risks And Practical Remedies With An Illustration, Xiaodan Yu, Deepak Khazanchi Jan 2017

Using Embedded Mixed Methods In Studying Is Phenomena: Risks And Practical Remedies With An Illustration, Xiaodan Yu, Deepak Khazanchi

Information Systems and Quantitative Analysis Faculty Publications

Drawing on lessons learned from a mixed-methods research project, we illustrate how mixed research approaches are fruitful in studying the complexities and interactions inherent in IS phenomena, which is particularly relevant when one investigates relatively new and “messy” phenomena in that many opportunities for errors and omissions can arise. Mixed-methods research designs can also prove to be valuable in exploratory or new areas of research and provide empirical evidence from multiple sources and types of data that one can truly triangulate. In this paper, we discuss the risks associated with using a specific mixed-methods research strategy (i.e., embedded mixed-methods design) …


Cybersecurity Stovepiping, David Thaw Jan 2017

Cybersecurity Stovepiping, David Thaw

Articles

Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.

This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …


How Attitude Toward The Behavior, Subjective Norm, And Perceived Behavioral Control Affects Information Security Behavior Intention, David Philip Johnson Jan 2017

How Attitude Toward The Behavior, Subjective Norm, And Perceived Behavioral Control Affects Information Security Behavior Intention, David Philip Johnson

Walden Dissertations and Doctoral Studies

The education sector is at high risk for information security (InfoSec) breaches and in need of improved security practices. Achieving data protections cannot be through technical means alone. Addressing the human behavior factor is required. Security education, training, and awareness (SETA) programs are an effective method of addressing human InfoSec behavior. Applying sociobehavioral theories to InfoSec research provides information to aid IT security program managers in developing improved SETA programs. The purpose of this correlational study was to examine through the theoretical lens of the theory of planned behavior (TPB) how attitude toward the behavior (ATT), subjective norm (SN), and …


Differences In Perceived Constraints Of Telework Utilization Among Teleworkers And Office Workers, Yolanda West Jan 2017

Differences In Perceived Constraints Of Telework Utilization Among Teleworkers And Office Workers, Yolanda West

Walden Dissertations and Doctoral Studies

Approximately 37% of the U.S. labor force currently works from a remote location. Costs and competition are driving organizations to increase the use of telework among remote workplaces. Increasing organizational knowledge of the perceptions of current teleworkers could increase its adoption by employees and improve its implementation by managers. The purpose of this research was to test hypotheses regarding the perceived levels of telework efficiency, social interaction, and technical support to determine in those perceptions differed between teleworkers and office workers. Goldratt's Theory of Constraints framed the quantitative research design. A purposive sample of 54 teleworkers and office workers in …


On The Security Of Nosql Cloud Database Services, Mohammad Ahmadian Jan 2017

On The Security Of Nosql Cloud Database Services, Mohammad Ahmadian

Electronic Theses and Dissertations

Processing a vast volume of data generated by web, mobile and Internet-enabled devices, necessitates a scalable and flexible data management system. Database-as-a-Service (DBaaS) is a new cloud computing paradigm, promising a cost-effective and scalable, fully-managed database functionality meeting the requirements of online data processing. Although DBaaS offers many benefits it also introduces new threats and vulnerabilities. While many traditional data processing threats remain, DBaaS introduces new challenges such as confidentiality violation and information leakage in the presence of privileged malicious insiders and adds new dimension to the data security. We address the problem of building a secure DBaaS for a …


The Relationship Between Nonprofit Organizations And Cloud Adoption Concerns, Dana Haywood Jan 2017

The Relationship Between Nonprofit Organizations And Cloud Adoption Concerns, Dana Haywood

Walden Dissertations and Doctoral Studies

Many leaders of nonprofit organizations (NPOs) in the United States do not have plans to adopt cloud computing. However, the factors accounting for their decisions is not known. This correlational study used the extended unified theory of acceptance and use of technology (UTAUT2) to examine whether performance expectancy, effort expectancy, social influence, facilitating conditions, hedonic motivation, price value, and habit can predict behavioral intention (BI) and use behavior (UB) of NPO information technology (IT) managers towards adopting cloud computing within the Phoenix metropolitan area of Arizona of the U.S. An existing UTAUT2 survey instrument was used with a sample of …


Exploring Security, Privacy, And Reliability Strategies To Enable The Adoption Of Iot, Daud Alyas Kamin Jan 2017

Exploring Security, Privacy, And Reliability Strategies To Enable The Adoption Of Iot, Daud Alyas Kamin

Walden Dissertations and Doctoral Studies

The Internet of things (IoT) is a technology that will enable machine-to-machine communication and eventually set the stage for self-driving cars, smart cities, and remote care for patients. However, some barriers that organizations face prevent them from the adoption of IoT. The purpose of this qualitative exploratory case study was to explore strategies that organization information technology (IT) leaders use for security, privacy, and reliability to enable the adoption of IoT devices. The study population included organization IT leaders who had knowledge or perceptions of security, privacy, and reliability strategies to adopt IoT at an organization in the eastern region …


Enhancing Existing Disaster Recovery Plans Using Backup Performance Indicators, Gwen White Jan 2017

Enhancing Existing Disaster Recovery Plans Using Backup Performance Indicators, Gwen White

Walden Dissertations and Doctoral Studies

Companies that perform data backup lose valuable data because they lack reliable data backup or restoration methods. The purpose of this study was to examine the need for a Six Sigma data backup performance indicator tool that clarifies the current state of a data backup method using an intuitive numerical scale. The theoretical framework for the study included backup theory, disaster recovery theory, and Six Sigma theory. The independent variables were implementation of data backup, data backup quality, and data backup confidence. The dependent variable was the need for a data backup performance indicator. An adapted survey instrument that measured …


Strategies To Support Survivors Of Corporate Downsizing, Joseph Linton Jan 2017

Strategies To Support Survivors Of Corporate Downsizing, Joseph Linton

Walden Dissertations and Doctoral Studies

Between 2003 and 2011, 1.2 million U.S. workers were laid off every year. Some organizational leaders of information technology/telecommunications organizations lack strategies to improve affective commitment to the organization after downsizing events. The strains of overwork, organizational changes, anxiety over job insecurity, and lack of choice often result in physical illness, emotional trauma, and extreme disengagement termed survivor syndrome. The purpose of this single case study was to explore strategies organizational leaders in the Midwest United States in information technology/telecommunications organizations used to improve affective commitment to the organization after downsizing. The conceptual framework was Herzberg's 2-factor theory. Data were …


A Complex Systems Simulation Study For Increasing Adaptive-Capacity, Kadambari Ram Jan 2017

A Complex Systems Simulation Study For Increasing Adaptive-Capacity, Kadambari Ram

Walden Dissertations and Doctoral Studies

Examination of empirical research confirmed that climate change is a complex problem of anthropological origin and revealed the need for a management framework to facilitate strategic decisions aimed at mitigating a rise in global temperatures of 2-°C linked to irresponsible and unsustainable business practices. The purpose of this simulation study was to develop a management framework of resilience, robustness, sustainability, and adaptive-capacity (RRSA) for organizations viewed as complex systems to address the current unsustainable state. As such, the evolutionary-RRSA prisoner's dilemma (PD) simulation was developed using an evolutionary game theory approach to agent based modeling and simulation, to generate data. …


Threat Intelligence In Support Of Cyber Situation Awareness, Billy Paul Gilliam Jan 2017

Threat Intelligence In Support Of Cyber Situation Awareness, Billy Paul Gilliam

Walden Dissertations and Doctoral Studies

Despite technological advances in the information security field, attacks by unauthorized individuals and groups continue to penetrate defenses. Due to the rapidly changing environment of the Internet, the appearance of newly developed malicious software or attack techniques accelerates while security professionals continue in a reactive posture with limited time for identifying new threats. The problem addressed in this study was the perceived value of threat intelligence as a proactive process for information security. The purpose of this study was to explore how situation awareness is enhanced by receiving advanced intelligence reports resulting in better decision-making for proper response to security …


Cyber-Security Policy Decisions In Small Businesses, Joanna Patterson Jan 2017

Cyber-Security Policy Decisions In Small Businesses, Joanna Patterson

Walden Dissertations and Doctoral Studies

Cyber-attacks against small businesses are on the rise yet small business owners often lack effective strategies to avoid these attacks. The purpose of this qualitative multiple case study was to explore the strategies small business owners use to make cyber-security decisions. Bertalanffy's general systems theory provided the conceptual framework for this study. A purposive sample of 10 small business owners participated in the interview process and shared their decision-making methodologies and influencers. The small business owners were vetted to ensure their strategies were effective through a series of qualification questions. The intent of the research question and corresponding interview questions …


Strategies To Manage Enterprise Information Technology Projects, Mario West Jan 2017

Strategies To Manage Enterprise Information Technology Projects, Mario West

Walden Dissertations and Doctoral Studies

Since 2005, most midsize company information technology (IT) projects had a 62.4% failure rate because of wrong project team communication skills or cost overruns. IT leaders expect negative IT project outcomes will cost over $2 billion by 2020. Using the actor-network theory, the purpose of this single case study was to explore strategies used by IT leaders from a midsize IT company in Washington, D.C. to plan and execute projects under budget and on time. Using purposeful sampling, 5 IT leaders were selected for this study because of their experience in implementing successful strategies for projects. Data were collected using …


Analysis Of Affective State As Covariate In Human Gait Identification, Kofi Agyemang Adumata Jan 2017

Analysis Of Affective State As Covariate In Human Gait Identification, Kofi Agyemang Adumata

Walden Dissertations and Doctoral Studies

There is an increased interest in the need for a noninvasive and nonintrusive biometric identification and recognition system such as Automatic Gait Identification (AGI) due to the rise in crime rates in the US, physical assaults, and global terrorism in public places. AGI, a biometric system based on human gait, can recognize people from a distance and current literature shows that AGI has a 95.75% success rate in a closely controlled laboratory environment. Also, this success rate does not take into consideration the effect of covariate factors such as affective state (mood state); and literature shows that there is a …


The Challenges Of Implementing Bring Your Own Device, Leslie Deshield Jan 2017

The Challenges Of Implementing Bring Your Own Device, Leslie Deshield

Walden Dissertations and Doctoral Studies

Research conducted by Tech Pro (2014) indicated that the Bring Your Own Device (BYOD) concept is gaining momentum with 74% of organizations already having some BYOD program or planning to implement one. While BYOD offers several benefits, it also presents challenges that concern information technology leaders and information security managers. This correlational study used the systems theory framework to examine the relationship between information security managers' intentions, perceptions of security, and compliance regarding BYOD implementation. Participants of the study consisted of information security managers in the eastern United States who had obtained the Certified Information Systems Manager certification. Data was …