Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2971 - 3000 of 6721

Full-Text Articles in Physical Sciences and Mathematics

How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney Aug 2016

How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney

Harvey Enns

Competing values are a fact of organizational life. However, there are gaps in our understanding about how these opposing beliefs hinder influence processes. This article draws on interview data to demonstrate how Irish Chief Information Officers (CIOs) are able to convince their colleagues to support new projects within their firms in the face of competing values. Focused interviews were used to explore the influence process and the competing values phenomenon, since this type of research is at an early stage and qualitative methods and analysis serve as a rich source of theory development. The data showed that the CIOs who …


Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn Aug 2016

Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn

William D Salisbury PhD

Due to several recent highly publicized information breaches, information security has gained a higher profile. Hence, it is reasonable to expect that information security would receive an equally significant emphasis in the education of future systems professionals. A variety of security standards that various entities (e.g., NIST, COSO, ISACA-COBIT, ISO) have put forth emphasize the importance of information security from the very beginning of the system development lifecycle (SDLC) to avoid significant redesign in later phases. To determine the emphasis on security in typical systems analysis and design (SA&D) courses, we examine (1) to what extent security is emphasized in …


Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn Aug 2016

Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn

Thomas Ferratt

Due to several recent highly publicized information breaches, information security has gained a higher profile. Hence, it is reasonable to expect that information security would receive an equally significant emphasis in the education of future systems professionals. A variety of security standards that various entities (e.g., NIST, COSO, ISACA-COBIT, ISO) have put forth emphasize the importance of information security from the very beginning of the system development lifecycle (SDLC) to avoid significant redesign in later phases. To determine the emphasis on security in typical systems analysis and design (SA&D) courses, we examine (1) to what extent security is emphasized in …


Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn Aug 2016

Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn

Thomas Ferratt

Given declining management information systems (MIS) enrollments at our university, we seek to understand our students‘ selection of a major. Prior studies have found that students choose a major based on a number of factors, with subject matter interest consistently being most important. We contribute to the literature by developing a deeper understanding of what is meant by subject matter interest, which we refer to as smiFactors, for MIS as a major and career. Based on a qualitative analysis of open-ended survey questions completed by undergraduate business students, we confirm a number of smiFactors for MIS gleaned from recent studies …


Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns Aug 2016

Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns

Thomas Ferratt

We examine the effects of human resource management (HRM) practices (e.g., career development, social support, compensation, and security) on IT professionals‟ job search behavior. Job search is a relatively novel dependent variable in studies of voluntary withdrawal behavior, in general, and for IT professionals, in particular. From a universalistic perspective, HRM practices individually and in combination exhibit independently additive effects on job search behavior. Our study contrasts this perspective with configurational theory, hypothesizing that proposed idealtype configurations of HRM practices have synergistic effects on job search behavior. We contribute to the IT and broader HRM literature by theoretically explicating and …


A Novel Digital Image Classification Algorithm Via Low-Rank Sparse Bag-Of-Features Model, Xiu-Ming Zou, Huai-Jiang Sun, Sai Yang, Yan Zhu Aug 2016

A Novel Digital Image Classification Algorithm Via Low-Rank Sparse Bag-Of-Features Model, Xiu-Ming Zou, Huai-Jiang Sun, Sai Yang, Yan Zhu

Research Collection School of Computing and Information Systems

Bag-of-features (BoF) is one of the most well-known methods used to represent digital image features because of its simplicity and efficiency. A variety of improved algorithms have been employed to enhance the performance of BoF in characterization. However, challenges in the application of BoF in the field still exist. This study focused on BoF by decomposing local features and presented a novel framework for BoF on the basis of low-rank and sparse matrix decomposition to obtain a more robust and discriminative digital image classification. First, the local feature matrix of a digital image is decomposed into a low-rank matrix and …


Analyzing Clinical Depressive Symptoms In Twitter, Amir Hossein Yazdavar, Hussein S. Al-Olimat, Tanvi Banerjee, Krishnaprasad Thirunarayan, Amit P. Sheth Aug 2016

Analyzing Clinical Depressive Symptoms In Twitter, Amir Hossein Yazdavar, Hussein S. Al-Olimat, Tanvi Banerjee, Krishnaprasad Thirunarayan, Amit P. Sheth

Kno.e.sis Publications

350 million people are suffering from clinical depression worldwide.


Profiling Social Media Users With Selective Self-Disclosure Behavior, Wei Gong Aug 2016

Profiling Social Media Users With Selective Self-Disclosure Behavior, Wei Gong

Dissertations and Theses Collection

Social media has become a popular platform for millions of users to share activities and thoughts. Many applications are now tapping on social media to disseminate information (e.g., news), to promote products (e.g., advertisements), to manage customer relationship (e.g., customer feedback), and to source for investment (e.g., crowdfunding). Many of these applications require user profile knowledge to select the target social media users or to personalize messages to users. Social media user profiling is a task of constructing user profiles such as demographical labels, interests, and opinions, etc., using social media data. Among the social media user profiling research works, …


Intermediaries Vs Peer-To-Peer: A Study Of Lenders’ Incentive On A Donation-Based Crowdfunding Platform, Ling Ge, Zhiling Guo, Xuechen Luo Aug 2016

Intermediaries Vs Peer-To-Peer: A Study Of Lenders’ Incentive On A Donation-Based Crowdfunding Platform, Ling Ge, Zhiling Guo, Xuechen Luo

Research Collection School Of Computing and Information Systems

Donation-based crowdfunding platform Kiva seems to hold the promise of peer-to-peer lending with zero interest rate to help the poor. However, it is actually intermediated by microfinance institutions, which raise funds from Kiva lenders, disburse the funds to borrowers and collect high interest. Later Kiva launched another platform Kiva Zip that implements interest-free loans directly from lenders to borrowers. This unique setup enables us to examine how lenders choose between Kiva and Kiva Zip, i.e. a platform with intermediaries and a real P2P platform. We develop a theoretical model and explicate that the lenders trade-off is between the sustainability of …


Unsupervised Multi-Graph Cross-Modal Hashing For Large-Scale Multimedia Retrieval, Liang Xie, Lei Zhu, Guoqi Chen Aug 2016

Unsupervised Multi-Graph Cross-Modal Hashing For Large-Scale Multimedia Retrieval, Liang Xie, Lei Zhu, Guoqi Chen

Research Collection School Of Computing and Information Systems

With the advance of internet and multimedia technologies, large-scale multi-modal representation techniques such as cross-modal hashing, are increasingly demanded for multimedia retrieval. In cross-modal hashing, three essential problems should be seriously considered. The first is that effective cross-modal relationship should be learned from training data with scarce label information. The second is that appropriate weights should be assigned for different modalities to reflect their importance. The last is the scalability of training process which is usually ignored by previous methods. In this paper, we propose Multi-graph Cross-modal Hashing (MGCMH) by comprehensively considering these three points. MGCMH is unsupervised method which …


Probabilistic Robust Route Recovery With Spatio-Temporal Dynamics, Hao Wu, Jiangyun Mao, Weiwei Sun, Baihua Zheng, Hanyuan Zhang, Ziyang Chen, Wei Wang Aug 2016

Probabilistic Robust Route Recovery With Spatio-Temporal Dynamics, Hao Wu, Jiangyun Mao, Weiwei Sun, Baihua Zheng, Hanyuan Zhang, Ziyang Chen, Wei Wang

Research Collection School Of Computing and Information Systems

Vehicle trajectories are one of the most important data in location-based services. The quality of trajectories directly affects the services. However, in the real applications, trajectory data are not always sampled densely. In this paper, we study the problem of recovering the entire route between two distant consecutive locations in a trajectory. Most existing works solve the problem without using those informative historical data or solve it in an empirical way. We claim that a data-driven and probabilistic approach is actually more suitable as long as data sparsity can be well handled. We propose a novel route recovery system in …


User Identity Linkage By Latent User Space Modelling, Xin Mu, Feida Zhu, Ee-Peng Lim, Jing Xiao, Jianzong Wang, Zhi-Hua Zhou Aug 2016

User Identity Linkage By Latent User Space Modelling, Xin Mu, Feida Zhu, Ee-Peng Lim, Jing Xiao, Jianzong Wang, Zhi-Hua Zhou

Research Collection School Of Computing and Information Systems

User identity linkage across social platforms is an important problem of great research challenge and practical value. In real applications, the task often assumes an extra degree of difficulty by requiring linkage across multiple platforms. While pair-wise user linkage between two platforms, which has been the focus of most existing solutions, provides reasonably convincing linkage, the result depends by nature on the order of platform pairs in execution with no theoretical guarantee on its stability. In this paper, we explore a new concept of “Latent User Space” to more naturally model the relationship between the underlying real users and their …


Latent Semantic Indexing In The Discovery Of Cyber-Bullying In Online Text, Jacob L. Bigelow Jul 2016

Latent Semantic Indexing In The Discovery Of Cyber-Bullying In Online Text, Jacob L. Bigelow

Computer Science Summer Fellows

The rise in the use of social media and particularly the rise of adolescent use has led to a new means of bullying. Cyber-bullying has proven consequential to youth internet users causing a need for a response. In order to effectively stop this problem we need a verified method of detecting cyber-bullying in online text; we aim to find that method. For this project we look at thirteen thousand labeled posts from Formspring and create a bank of words used in the posts. First the posts are cleaned up by taking out punctuation, normalizing emoticons, and removing high and low …


Detection Of Cyberbullying In Sms Messaging, Bryan W. Bradley Jul 2016

Detection Of Cyberbullying In Sms Messaging, Bryan W. Bradley

Computer Science Summer Fellows

Cyberbullying is a type of bullying that uses technology such as cell phones to harass or malign another person. To detect acts of cyberbullying, we are developing an algorithm that will detect cyberbullying in SMS (text) messages. Over 80,000 text messages have been collected by software installed on cell phones carried by participants in our study. This paper describes the development of the algorithm to detect cyberbullying messages, using the cell phone data collected previously. The algorithm works by first separating the messages into conversations in an automated way. The algorithm then analyzes the conversations and scores the severity and …


Analyzing Clustered Web Concepts With Homology, Eric Nam Jul 2016

Analyzing Clustered Web Concepts With Homology, Eric Nam

Master's Projects

As data is being mined more and more from the Internet today, Data Science has become an important field of computing to make that data useful. Data Science allows people to turn all of that data into structured knowledge that is easily utilized, validated, and understandable. There are many known theories to analyze data, but this project will focus on a recently introduced method: analyzing text data with homology from mathematics to understand relationships between keyword-sets.

Using structures of algebraic topology as a starting point, keyword-sets in the text are represented by simplexes based on what they are and what …


On Understanding Preference For Agile Methods Among Software Developers, David Brian Bishop, Amit V. Deokar, Surendra Sarnikar Jul 2016

On Understanding Preference For Agile Methods Among Software Developers, David Brian Bishop, Amit V. Deokar, Surendra Sarnikar

Research & Publications

Agile methods are gaining widespread use in industry. Although management is keen on adopting agile, not all developers exhibit preference for agile methods. The literature is sparse in regard to why developers may show preference for agile. Understanding the factors informing the preference for agile can lead to more effective formation of teams, better training approaches, and optimizing software development efforts by focusing on key desirable components of agile. This study, using a grounded theory methodology, finds a variety of categories of factors that influence software developer preference for agile methods including self-efficacy, affective response, interpersonal response, external contingencies, and …


Introduction To Gis Using Open Source Software, 7th Ed, Frank Donnelly Jul 2016

Introduction To Gis Using Open Source Software, 7th Ed, Frank Donnelly

Open Educational Resources

This tutorial was created to accompany the GIS Practicum, a day-long workshop offered by the Newman Library at Baruch College CUNY that introduces participants to geographic information systems (GIS) using the open source software QGIS. The practicum introduces GIS as a concept for envisioning information and as a tool for conducting geographic analyses and creating maps. Participants learn how to navigate a GIS interface, how to prepare layers and conduct a basic geographic analysis, and how to create thematic maps. This tutorial was written using QGIS version 2.14 "Essen", a cross-platform (Windows, Mac, Linux) desktop GIS software package.


What Motivates High School Students To Take Precautions Against The Spread Of Influenza? A Data Science Approach To Latent Modeling Of Compliance With Preventative Practice, William L. Romine, Tanvi Banerjee, William R. Folk, Lloyd H. Barrow Jul 2016

What Motivates High School Students To Take Precautions Against The Spread Of Influenza? A Data Science Approach To Latent Modeling Of Compliance With Preventative Practice, William L. Romine, Tanvi Banerjee, William R. Folk, Lloyd H. Barrow

Kno.e.sis Publications

– This study focuses on a central question: What key behavioral factors influence high school students’ compliance with preventative measures against the transmission of influenza? We use multilevel logistic regression to equate logit measures for eight precautions to students’ latent compliance levels on a common scale. Using linear regression, we explore the efficacy of knowledge of influenza, affective perceptions about influenza and its prevention, prior illness, and gender in predicting compliance. Hand washing and respiratory etiquette are the easiest precautions for students, and hand sanitizer use and keeping the hands away from the face are the most difficult. Perceptions of …


Real-Time Salient Object Detection With A Minimum Spanning Tree, Wei-Chih Tu, Shengfeng He, Qingxiong Yang, Shao-Yi Chien Jul 2016

Real-Time Salient Object Detection With A Minimum Spanning Tree, Wei-Chih Tu, Shengfeng He, Qingxiong Yang, Shao-Yi Chien

Research Collection School Of Computing and Information Systems

In this paper, we present a real-time salient object detection system based on the minimum spanning tree. Due to the fact that background regions are typically connected to the image boundaries, salient objects can be extracted by computing the distances to the boundaries. However, measuring the image boundary connectivity efficiently is a challenging problem. Existing methods either rely on superpixel representation to reduce the processing units or approximate the distance transform. Instead, we propose an exact and iteration free solution on a minimum spanning tree. The minimum spanning tree representation of an image inherently reveals the object geometry information in …


Ordinal Text Quantification, Giovanni Da San Martino, Wei Gao, Fabrizio Sebastiani Jul 2016

Ordinal Text Quantification, Giovanni Da San Martino, Wei Gao, Fabrizio Sebastiani

Research Collection School Of Computing and Information Systems

In recent years there has been a growing interest in text quantification, a supervised learning task where the goal is to accurately estimate, in an unlabelled set of items, the prevalence (or "relative frequency") of each class c in a predefined set C. Text quantification has several applications, and is a dominant concern in fields such as market research, the social sciences, political science, and epidemiology. In this paper we tackle, for the first time, the problem of ordinal text quantification, defined as the task of performing text quantification when a total order is defined on the set of classes; …


The Impact Of Nasd Rule 2711 And Nyse Rule 472 On Analyst Behavior: The Strategic Timing Of Recommendations Issued On Weekends, Yi Dong, Nan Hu Jul 2016

The Impact Of Nasd Rule 2711 And Nyse Rule 472 On Analyst Behavior: The Strategic Timing Of Recommendations Issued On Weekends, Yi Dong, Nan Hu

Research Collection School Of Computing and Information Systems

Amendments to NASD Rule 2711 and NYSE Rule 472, enacted in May 2002, mandate that sell-side analysts disclose the distribution of their security recommendations by buy, hold and sell category. This regulation enhances the transparency of analysts' information and mitigates the long-recognized optimistic bias in their recommendations. However, we find that analysts are more likely to issue sell recommendations or downgrade revisions on weekends when investors have limited attention after these rule changes. This pattern is more pronounced for prestigious analysts, who are more likely to influence stock prices. Market reaction tests reveal an incomplete immediate response and a greater …


Detecting Rumors From Microblogs With Recurrent Neural Networks, Jing Ma, Wei Gao, Prasenjit Mitra, Sejeong Kwon, Bernard J. Jansen, Kam-Fai Wong, Meeyoung Cha Jul 2016

Detecting Rumors From Microblogs With Recurrent Neural Networks, Jing Ma, Wei Gao, Prasenjit Mitra, Sejeong Kwon, Bernard J. Jansen, Kam-Fai Wong, Meeyoung Cha

Research Collection School Of Computing and Information Systems

Microblogging platforms are an ideal place for spreading rumors and automatically debunking rumors is a crucial problem. To detect rumors, existing approaches have relied on hand-crafted features for employing machine learning algorithms that require daunting manual effort. Upon facing a dubious claim, people dispute its truthfulness by posting various cues over time, which generates long-distance dependencies of evidence. This paper presents a novel method that learns continuous representations of microblog events for identifying rumors. The proposed model is based on recurrent neural networks (RNN) for learning the hidden representations that capture the variation of contextual information of relevant posts over …


On Very Large Scale Test Collection For Landmark Image Search Benchmarking, Zhiyong Cheng, Jialie Shen Jul 2016

On Very Large Scale Test Collection For Landmark Image Search Benchmarking, Zhiyong Cheng, Jialie Shen

Research Collection School Of Computing and Information Systems

High quality test collections have been becoming more and more important for the technological advancement in geo-referenced image retrieval and analytics. In this paper, we present a large scale test collection to support robust performance evaluation of landmark image search and corresponding construction methodology. Using the approach, we develop a very large scale test collection consisting of three key components: (1) 355,141 images of 128 landmarks in five cities across three continents crawled from Flickr; (2) different kinds of textual features for each image, including surrounding text (e.g. tags), contextual data (e.g. geo-location and upload time), and metadata (e.g. uploader …


Which Information Sources Are More Effective And Reliable In Video Search, Cheng Zhiyong, Xuanchong Li, Jialie Shen, Alexander G. Hauptmann Jul 2016

Which Information Sources Are More Effective And Reliable In Video Search, Cheng Zhiyong, Xuanchong Li, Jialie Shen, Alexander G. Hauptmann

Research Collection School Of Computing and Information Systems

It is common that users are interested in finding video segments, which contain further information about the video contents in a segment of interest. To facilitate users to find and browse related video contents, video hyperlinking aims at constructing links among video segments with relevant information in a large video collection. In this study, we explore the effectiveness of various video features on the performance of video hyperlinking, including subtitle, metadata, content features (i.e., audio and visual), surrounding context, as well as the combinations of those features. Besides, we also test different search strategies over different types of queries, which …


Build Emotion Lexicon From The Mood Of Crowd Via Topic-Assisted Joint Non-Negative Matrix Factorization, Kaisong Song, Wei Gao, Ling Chen, Shi Feng, Daling Wang, Chengqi Zhang Jul 2016

Build Emotion Lexicon From The Mood Of Crowd Via Topic-Assisted Joint Non-Negative Matrix Factorization, Kaisong Song, Wei Gao, Ling Chen, Shi Feng, Daling Wang, Chengqi Zhang

Research Collection School Of Computing and Information Systems

Kaisong Song, Wei Gao, Ling Chen, Shi Feng, Daling Wang, and Chengqi Zhang. (2016). . In , pages 773–776, Pisa, Italy. ACM Press. https://doi.org/10.1145/2911451.2914759


Self-Regulated Incremental Clustering With Focused Preferences, Di Wang, Ah-Hwee Tan Jul 2016

Self-Regulated Incremental Clustering With Focused Preferences, Di Wang, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Due to their online learning nature, incremental clustering techniques can handle a continuous stream of data. In particular, various incremental clustering techniques based on Adaptive Resonance Theory (ART) have been shown to have low computational complexity in adaptive learning and are less sensitive to noisy information. However, parameter regularization in existing ART clustering techniques is applied either on different features or on different clusters exclusively. In this paper, we introduce Interest-Focused Clustering based on Adaptive Resonance Theory (IFC-ART), which self-regulates the vigilance parameter associated with each feature and each cluster. As such, we can incorporate the domain knowledge of the …


The Effects Of Multiple Query Evidences On Social Image Retrieval, Zhiyong Cheng, Jialie Shen, Haiyan Miao Jul 2016

The Effects Of Multiple Query Evidences On Social Image Retrieval, Zhiyong Cheng, Jialie Shen, Haiyan Miao

Research Collection School Of Computing and Information Systems

System performance assessment and comparison are fundamental for large-scale image search engine development. This article documents a set of comprehensive empirical studies to explore the effects of multiple query evidences on large-scale social image search. The search performance based on the social tags, different kinds of visual features and their combinations are systematically studied and analyzed. To quantify the visual query complexity, a novel quantitative metric is proposed and applied to assess the influences of different visual queries based on their complexity levels. Besides, we also study the effects of automatic text query expansion with social tags using a pseudo …


Mhealth Support System For Researchers And Participants, Taskina Fayezeen Jul 2016

Mhealth Support System For Researchers And Participants, Taskina Fayezeen

Master's Theses (2009 -)

With the proliferation of mobile technologies, there is a significant increase of research using mobile devices in the medical and public health area. Mobile technology has improved the efficiency of healthcare delivery effectively. Mobile Health or mHealth is an interdisciplinary research area which has been active for more than a decade. Much research has been conducted and many software research tools (mHealth Support System) have been developed. Despite the time length, there is a significant gap in the mHealth research area regarding software research tools. Individual research groups are developing their own software research tool though there is a significant …


Three Strategies To Success: Learning Adversary Models In Security Games, Nika Haghtalab, Fei Fang, Thanh Hong Nguyen, Arunesh Sinha, Ariel D. Procaccia, Milind Tambe Jul 2016

Three Strategies To Success: Learning Adversary Models In Security Games, Nika Haghtalab, Fei Fang, Thanh Hong Nguyen, Arunesh Sinha, Ariel D. Procaccia, Milind Tambe

Research Collection School Of Computing and Information Systems

State-of-the-art applications of Stackelberg security games -- including wildlife protection -- offer a wealth of data, which can be used to learn the behavior of the adversary. But existing approaches either make strong assumptions about the structure of the data, or gather new data through online algorithms that are likely to play severely suboptimal strategies. We develop a new approach to learning the parameters of the behavioral model of a bounded rational attacker (thereby pinpointing a near optimal strategy), by observing how the attacker responds to only three defender strategies. We also validate our approach using experiments on real and …


Learning Compact Visual Representation With Canonical Views For Robust Mobile Landmark Search, Lei Zhu, Jialie Shen, Xiaobai Liu, Liang Xie, Liqiang Nie Jul 2016

Learning Compact Visual Representation With Canonical Views For Robust Mobile Landmark Search, Lei Zhu, Jialie Shen, Xiaobai Liu, Liang Xie, Liqiang Nie

Research Collection School Of Computing and Information Systems

Mobile Landmark Search (MLS) recently receives increasing attention. However, it still remains unsolved due to two important issues. One is high bandwidth consumption of query transmission, and the other is the huge visual variations of query images. This paper proposes a Canonical View based Compact Visual Representation (2CVR) to handle these problems via novel three-stage learning. First, a submodular function is designed to measure visual representativeness and redundancy of a view set. With it, canonical views, which capture key visual appearances of landmark with limited redundancy, are efficiently discovered with an iterative mining strategy. Second, multimodal sparse coding is applied …