Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 3211 - 3240 of 6721

Full-Text Articles in Physical Sciences and Mathematics

Effects Of Information Technology Risk Management And Institution Size On Financial Performance, Shaun D'Olene Kecia Barrett Jan 2016

Effects Of Information Technology Risk Management And Institution Size On Financial Performance, Shaun D'Olene Kecia Barrett

Walden Dissertations and Doctoral Studies

A negative relationship exists between unmanaged IT risk and financial performance of institutions of varying sizes. The purpose for this quantitative correlation study was to examine the relationship between IT risk management, institution size, and the financial performance of credit unions in Jamaica. Information Systems Audit and Control Association (ISACA) risk IT model provided the theoretical framework for the study. Audited financial statements and a web-based survey provided data for this study. One hundred and thirty employees from 13 credit unions in Jamaica participated in the study. Results of the multiple regression tests confirmed a statistically significant relationship between IT …


Epistemic Skills Deficiency In The Project Management Body Of Knowledge, Alex Hosch Jan 2016

Epistemic Skills Deficiency In The Project Management Body Of Knowledge, Alex Hosch

Walden Dissertations and Doctoral Studies

Information Technology (IT) projects continue to fail despite being managed by certified Project Management Professionals (PMP) and professionally trained non-certified Project Managers (PM). This study addressed PMPs and qualified PMs who continue to experience IT project failure at a high rate. The purpose of this qualitative multiple case study was to explore perspectives of PMs and their understanding of project management best practices in the Guide to the Project Management Body of Knowledge (PMBOK). There were 5 research questions focused on IT project failures, lessons learned, trends, deficiencies in project management framework, and adherence to standard PM practices. This study …


Effects Of An Integrated Electronic Health Record On An Academic Medical Center, Kenneth E. Koppenhaver Ii Jan 2016

Effects Of An Integrated Electronic Health Record On An Academic Medical Center, Kenneth E. Koppenhaver Ii

Walden Dissertations and Doctoral Studies

The debate about healthcare reform revolves around a triple aim of improving the health of populations, improving the patient experience, and reducing the cost of care. A major tool discussed in this debate has been the adoption of electronic health record (EHR) systems to record and guide care delivery. Due to low adoption rates and limited examples of success, the problem was a lack of understanding by healthcare organizations of how the EHR fundamentally changes an organization through the interactions of people, processes, and technology over time. The purpose of this case study was to explore the people, processes, and …


Challenges And Implications Of Implementing Strategic Intelligence Systems In Mexico, Hector De Jesus Rivera Ochoa Jan 2016

Challenges And Implications Of Implementing Strategic Intelligence Systems In Mexico, Hector De Jesus Rivera Ochoa

Walden Dissertations and Doctoral Studies

Business intelligence (BI) allows companies to make faster and better-informed decisions. Unfortunately, implementing BI systems in companies in developing countries is minimal. Limited and costly access to the technology, coupled with the cultural background affecting how people perceive BI, has restricted such implementations. The purpose of this phenomenological study was to explore and describe the lived experiences of chief executive officers (CEOs) in northern Mexico to obtain insight into the challenges of implementing BI systems. Research questions focused on the reasons behind the lack of BI systems implementation and the challenges faced by these officers when implementing a new system. …


The Impact Of Technology Acceptance And Openess To Innovaion On Software Implementation, Michael Marin Bertini Jan 2016

The Impact Of Technology Acceptance And Openess To Innovaion On Software Implementation, Michael Marin Bertini

Walden Dissertations and Doctoral Studies

Senior management decisions to foster innovation and adopt new technology solutions have serious implications for the success of their organization change initiatives. This project examined the issue of senior management decision or reasons of their decision to adopt new Enterprise Resource Planning (ERP) systems as a solution to solve their business problems. This project investigated the degree that perceived ease of use and usefulness of the ERP system influenced decisions made by senior managers to innovate. Roger's diffusion of innovations theory and Davis technology acceptance model theory were used to predict when senior managers were open to innovation, and whether …


Electronic Warrant Systems: The Effect Of Advanced Technologies On Arrest Performance, Gerald Lee Ward Jan 2016

Electronic Warrant Systems: The Effect Of Advanced Technologies On Arrest Performance, Gerald Lee Ward

Walden Dissertations and Doctoral Studies

Public safety is negatively affected when arrest warrant information is not available to law enforcement officers, judges, prosecutors, and other criminal justice practitioners. The U.S. Government and the criminal justice community have advocated for electronic warrant systems (e-warrants). Peace officers know that when e-warrant systems deliver warrant information to them immediately from multiple jurisdictions, their safety is increased. However, the factors that cause these e-warrants systems to improve safety are not known. The purpose of this historical data analysis study was to determine if the use of e-warrant systems resulted in shorter clearance times than the use of legacy paper-based …


Watertight And 2-Manifold Surface Meshes Using Dual Contouring With Tetrahedral Decomposition Of Grid Cubes, Tanweer Rashid, Sharmin Sultana, Michel A. Audette Jan 2016

Watertight And 2-Manifold Surface Meshes Using Dual Contouring With Tetrahedral Decomposition Of Grid Cubes, Tanweer Rashid, Sharmin Sultana, Michel A. Audette

Computational Modeling & Simulation Engineering Faculty Publications

The Dual Contouring algorithm (DC) is a grid-based process used to generate surface meshes from volumetric data. The advantage of DC is that it can reproduce sharp features by inserting vertices anywhere inside the grid cube, as opposed to the Marching Cubes (MC) algorithm that can insert vertices only on the grid edges. However, DC is unable to guarantee 2-manifold and watertight meshes due to the fact that it produces only one vertex for each grid cube. We present a modified Dual Contouring algorithm that is capable of overcoming this limitation. Our method decomposes an ambiguous grid cube into a …


On Analyzing Geotagged Tweets For Location-Based Patterns, Philips Kokoh Prasetyo, Palakorn Achananuparp, Ee Peng Lim Jan 2016

On Analyzing Geotagged Tweets For Location-Based Patterns, Philips Kokoh Prasetyo, Palakorn Achananuparp, Ee Peng Lim

Research Collection School Of Computing and Information Systems

Geotagged social media is becoming highly popular as social media access is now made very easy through a wide range of mobile apps which automatically detect and augment social media posts with geo-locations. In this paper, we analyze two kinds of location-based patterns. The first is the association between location attributes and the locations of user tweets. The second is location association pattern which comprises a pair of locations that are co-visited by users. We demonstrate that through tracking the Twitter data of Singapore-based users, we are able to reveal association between users tweeting from school locations and the school …


Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson Jan 2016

Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson

CCE Theses and Dissertations

The overall security posture of information systems (IS) depends on the behaviors of the IS users. Several studies have shown that users are the greatest vulnerability to IS security. The proliferation of smartphones is introducing an entirely new set of risks, threats, and vulnerabilities. Smartphone devices amplify this data exposure problem by enabling instantaneous transmission and storage of personally identifiable information (PII) by smartphone users, which is becoming a major security risk. Moreover, companies are also capitalizing on the availability and powerful computing capabilities of these smartphone devices and developing a bring-your-own-device (BYOD) program, which makes companies susceptible to divulgence …


Evaluating The Enterprise Resource Planning (Erp) Systems’ Success At The Individual Level Of Analysis In The Middle East, Mohammad Alzoubi Jan 2016

Evaluating The Enterprise Resource Planning (Erp) Systems’ Success At The Individual Level Of Analysis In The Middle East, Mohammad Alzoubi

CCE Theses and Dissertations

Although ERP systems have been depicted as a solution in many organizations, there are many negative reports on ERP success, benefits, and effect on user’s performance. Previous research noted that there is a lack of knowledge and awareness of ERP systems and their overall value to ERP organizations. ERP systems have been widely studied during the past decade, yet they often fail to deliver the intended benefits originally expected. One notable reason for their failures is the lack of understanding in users’ requirements. This dissertation study was designed to understand the relative importance of system quality (SQ), IQ (IQ), service …


An Empirical Study Of Authentication Methods To Secure E-Learning System Activities Against Impersonation Fraud, Shauna Beaudin Jan 2016

An Empirical Study Of Authentication Methods To Secure E-Learning System Activities Against Impersonation Fraud, Shauna Beaudin

CCE Theses and Dissertations

Studies have revealed that securing Information Systems (IS) from intentional misuse is a concern among organizations today. The use of Web-based systems has grown dramatically across industries including e-commerce, e-banking, e-government, and e learning to name a few. Web-based systems provide e-services through a number of diverse activities. The demand for e-learning systems in both academic and non-academic organizations has increased the need to improve security against impersonation fraud. Although there are a number of studies focused on securing Web-based systems from Information Systems (IS) misuse, research has recognized the importance of identifying suitable levels of authenticating strength for various …


An Experimental Study On The Role Of Password Strength And Cognitive Load On Employee Productivity, Stephen Mujeye Jan 2016

An Experimental Study On The Role Of Password Strength And Cognitive Load On Employee Productivity, Stephen Mujeye

CCE Theses and Dissertations

The proliferation of information systems (IS) over the past decades has increased the demand for system authentication. While the majority of system authentications are password-based, it is well documented that passwords have significant limitations. To address this issue, companies have been placing increased requirements on the user to ensure their passwords are more complex and consequently stronger. In addition to meeting a certain complexity threshold, the password must also be changed on a regular basis. As the cognitive load increases on the employees using complex passwords and changing them often, they may have difficulty recalling their passwords. As such, the …


Capturing, Eliciting, And Prioritizing (Cep) Non-Functional Requirements Metadata During The Early Stages Of Agile Software Development, Richard Rabin Maiti Jan 2016

Capturing, Eliciting, And Prioritizing (Cep) Non-Functional Requirements Metadata During The Early Stages Of Agile Software Development, Richard Rabin Maiti

CCE Theses and Dissertations

Agile software engineering has been a popular methodology to develop software rapidly and efficiently. However, the Agile methodology often favors Functional Requirements (FRs) due to the nature of agile software development, and strongly neglects Non-Functional Requirements (NFRs). Neglecting NFRs has negative impacts on software products that have resulted in poor quality and higher cost to fix problems in later stages of software development.

This research developed the CEP “Capture Elicit Prioritize” methodology to effectively gather NFRs metadata from software requirement artifacts such as documents and images. Artifact included the Optical Character Recognition (OCR) artifact which gathered metadata from images. The …


Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig Jan 2016

Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig

CCE Theses and Dissertations

Hackers external to the organization continue to wreak havoc upon the information systems infrastructure of firms through breaches of security defenses, despite constant development of and continual investment in new IS security countermeasures by security professionals and vendors. These breaches are exceedingly costly and damaging to the affected organizations. The continued success of hackers in the face of massive amounts of security investments suggests that the defenders are losing and that the hackers can innovate at a much faster pace.

Underground hacker communities have been shown to be an environment where attackers can learn new techniques and share tools pertaining …


An Empirical Investigation Of The Willingness Of Us Intelligence Community Analysts To Contribute Knowledge To A Knowledge Management System (Kms) In A Highly Classified And Sensitive Environment, Robert Hambly Jan 2016

An Empirical Investigation Of The Willingness Of Us Intelligence Community Analysts To Contribute Knowledge To A Knowledge Management System (Kms) In A Highly Classified And Sensitive Environment, Robert Hambly

CCE Theses and Dissertations

Since September 11, 2001, the United States Government (USG) has possessed unparalleled capability in terms of dedicated intelligence and information collection assets supporting the analysts of the Intelligence Community (IC). The USG IC has sponsored, developed, and borne witness to extraordinary advances in technology, techniques, and procedures focused on knowledge harvesting, knowledge sharing, and collaboration. Knowledge, within successful (effective & productive) organizations, exists as a commodity; a commodity that can be created, captured, imparted, shared, and leveraged. The research problem that this study addressed is the challenge of maintaining strong organizational effectiveness and productivity through the use of an information …


Data Analytics On Consumer Behavior In Omni-Channel Retail Banking, Card And Payment Services, Geng Dan Jan 2016

Data Analytics On Consumer Behavior In Omni-Channel Retail Banking, Card And Payment Services, Geng Dan

Research Collection School Of Computing and Information Systems

Innovations in financial services have created challenges for banks that Information Systems (IS) research can address. My interests involve transaction cost theory, substitution and complementarity theory, and consumer informedness theory to understand consumer behavior and firm performance in the omni-channel world of digital banking. At a high level, my research inquiry asks: How can financial institutions take advantage of the deep insights that data analytics and management science modeling create on consumer behavior and channel management decision-making? And how can changes in payments and services in retail banking be understood in spatial and temporal terms? I am working on three …


Online Arima Algorithms For Time Series Prediction, Chenghao Liu, Hoi, Steven C. H., Peilin Zhao, Jianling Sun Jan 2016

Online Arima Algorithms For Time Series Prediction, Chenghao Liu, Hoi, Steven C. H., Peilin Zhao, Jianling Sun

Research Collection School Of Computing and Information Systems

Autoregressive integrated moving average (ARIMA) is one of the most popular linear models for time series forecasting due to its nice statistical properties and great flexibility. However, its parameters are estimated in a batch manner and its noise terms are often assumed to be strictly bounded, which restricts its applications and makes it inefficient for handling large-scale real data. In this paper, we propose online learning algorithms for estimating ARIMA models under relaxed assumptions on the noise terms, which is suitable to a wider range of applications and enjoys high computational efficiency. The idea of our ARIMA method is to …


Top-K Dominating Queries On Incomplete Data, Xiaoye Miao, Yunjun Gao, Baihua Zheng, Gang Chen, Huiyong Cui Jan 2016

Top-K Dominating Queries On Incomplete Data, Xiaoye Miao, Yunjun Gao, Baihua Zheng, Gang Chen, Huiyong Cui

Research Collection School Of Computing and Information Systems

The top-k dominating (TKD) query returns the k objects that dominate the maximum number of objects in a given dataset. It combines the advantages of skyline and top-k queries, and plays an important role in many decision support applications. Incomplete data exists in a wide spectrum of real datasets, due to device failure, privacy preservation, data loss, and so on. In this paper, for the first time, we carry out a systematic study of TKD queries on incomplete data, which involves the data having some missing dimensional value(s). We formalize this problem, and propose a suite of efficient algorithms for …


Insights From Machine-Learned Diet Success Prediction, Ingmar Weber, Palakorn Achananuparp Jan 2016

Insights From Machine-Learned Diet Success Prediction, Ingmar Weber, Palakorn Achananuparp

Research Collection School Of Computing and Information Systems

To support people trying to lose weight and stay healthy, more and more fitness apps have sprung up including the ability to track both calories intake and expenditure. Users of such apps are part of a wider “quantified self“ movement and many opt-in to publicly share their logged data. In this paper, we use public food diaries of more than 4,000 long-term active MyFitnessPal users to study the characteristics of a (un-)successful diet. Concretely, we train a machine learning model to predict repeatedly being over or under self-set daily calories goals and then look at which features contribute to the …


A Comparison Of Fundamental Network Formation Principles Between Offline And Online Friends On Twitter, Felicia Natali, Feida Zhu Jan 2016

A Comparison Of Fundamental Network Formation Principles Between Offline And Online Friends On Twitter, Felicia Natali, Feida Zhu

Research Collection School Of Computing and Information Systems

We investigate the differences between how some of the fundamental principles of network formation apply among offline friends and how they apply among online friends on Twitter. We consider three fundamental principles of network formation proposed by Schaefer et al.: reciprocity, popularity, and triadic closure. Overall, we discover that these principles mainly apply to offline friends on Twitter. Based on how these principles apply to offline versus online friends, we formulate rules to predict offline friendship on Twitter. We compare our algorithm with popular machine learning algorithms and Xiewei’s random walk algorithm. Our algorithm beats the machine learning algorithms on …


Friendship Maintenance And Prediction In Multiple Social Networks, Roy Ka-Wei Lee, Ee-Peng Lim Jan 2016

Friendship Maintenance And Prediction In Multiple Social Networks, Roy Ka-Wei Lee, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Due to the proliferation of online social networks (OSNs), users find themselves participating in multiple OSNs. These users leave their activity traces as they maintain friendships and interact with other users in these OSNs. In this work, we analyze how users maintain friendship in multiple OSNs by studying users who have accounts in both Twitter and Instagram. Specifically, we study the similarity of a user's friendship and the evenness of friendship distribution in multiple OSNs. Our study shows that most users in Twitter and Instagram prefer to maintain different friendships in the two OSNs, keeping only a small clique of …


Leveraging Client Processing For Location Privacy In Mobile Local Search, Wisam Mohamed Eltarjaman Jan 2016

Leveraging Client Processing For Location Privacy In Mobile Local Search, Wisam Mohamed Eltarjaman

Electronic Theses and Dissertations

Usage of mobile services is growing rapidly. Most Internet-based services targeted for PC based browsers now have mobile counterparts. These mobile counterparts often are enhanced when they use user's location as one of the inputs. Even some PC-based services such as point of interest Search, Mapping, Airline tickets, and software download mirrors now use user's location in order to enhance their services. Location-based services are exactly these, that take the user's location as an input and enhance the experience based on that. With increased use of these services comes the increased risk to location privacy. The location is considered an …


Towards Developing An Intelligent Agent To Assist In Patient Diagnosis Using Neural Networks On Unstructured Patient Clinical Notes: Initial Analysis And Models, Ma. Regina Justina E. Estuar, Christian E. Pulmano Jan 2016

Towards Developing An Intelligent Agent To Assist In Patient Diagnosis Using Neural Networks On Unstructured Patient Clinical Notes: Initial Analysis And Models, Ma. Regina Justina E. Estuar, Christian E. Pulmano

Department of Information Systems & Computer Science Faculty Publications

Technological advances in information-communication technologies in the health ecosystem have allowed for the recording and consumption of massive amounts of structured and unstructured health data. In developing countries, the use of Electronic Medical Records (EMR) is necessary to address the need for efficient delivery of services and informed decision-making, especially at the local level where health facilities and practitioners may be lacking. Text mining is a variation of data mining that tries to extract non-trivial information and knowledge from unstructured text. This study aims to determine the feasibility of integrating an intelligent agent within EMRs for automatic diagnosis prediction based …


Towards An Infodemiological Algorithm For Classification Of Filipino Health Tweets, Ma. Regina Justina E. Estuar, Kennedy E. Espina, Delfin Jay Sabido Ix, Raymond Josef Edward Lara, Vikki Car De Los Reyes Jan 2016

Towards An Infodemiological Algorithm For Classification Of Filipino Health Tweets, Ma. Regina Justina E. Estuar, Kennedy E. Espina, Delfin Jay Sabido Ix, Raymond Josef Edward Lara, Vikki Car De Los Reyes

Department of Information Systems & Computer Science Faculty Publications

Finding innovative ICT solutions to enhance the Philippines’ health sector is part and parcel of the Philippine eHealth Strategic Framework and Plan 2020 program. This study sees the opportunity of using collected Twitter data to create a model that processes tweets to produce a dataset that may be relevant in the field of epidemiology and infodemiology. Through the collection of relevant tweets, future studies may make use of the output of this research for various purposes, such as the improvement of epidemiological systems of the Department of Health in support of the eHealth strategy. In this study, we …


An Investigation Of Socio-Technical Components Of Knowledge Management System (Kms) Usage, Noel Wint Jr. Jan 2016

An Investigation Of Socio-Technical Components Of Knowledge Management System (Kms) Usage, Noel Wint Jr.

CCE Theses and Dissertations

Existing literature indicates that although both academics and practitioners recognize knowledge management (KM) as a source of competitive advantage, users are not always willing to use a knowledge management system (KMS). Because of the social nature of knowledge transfer, a KMS can be considered a socio-technical system. Many explanations have been presented for this failure to utilize the KMS. These explanations include a number of the socio-technical factors relating to people, processes, and technologies. While these factors may have significant explanatory power when examined independently, existing studies have not sufficiently addressed the interactions among all three socio-technical factors or their …


Electronic Medical Records (Emr): An Empirical Testing Of Factors Contributing To Healthcare Professionals’ Resistance To Use Emr Systems, Emmanuel Patrick Bazile Jan 2016

Electronic Medical Records (Emr): An Empirical Testing Of Factors Contributing To Healthcare Professionals’ Resistance To Use Emr Systems, Emmanuel Patrick Bazile

CCE Theses and Dissertations

The benefits of using electronic medical records (EMRs) have been well documented; however, despite numerous financial benefits and cost reductions being offered by the federal government, some healthcare professionals have been reluctant to implement EMR systems. In fact, prior research provides evidence of failed EMR implementations due to resistance on the part of physicians, nurses, and clinical administrators. In 2010, only 25% of office-based physicians have basic EMR systems and only 10% have fully functional systems. One of the hindrances believed to be responsible for the slow implementation rates of EMR systems is resistance from healthcare professionals not truly convinced …


Patient Portals: Achieving Technology Acceptance And Meaningful Use In Independent Physician-Managed Practices, Kimberly W. Bartholomew Jan 2016

Patient Portals: Achieving Technology Acceptance And Meaningful Use In Independent Physician-Managed Practices, Kimberly W. Bartholomew

CCE Theses and Dissertations

As the bulk of medical health records shift from paper-based file systems to electronic formats, the promise of the transformation process called healthcare reform included adding efficiencies to medical practice workflows, lower costs, improved quality of care and most important, and the freeing of patient information from traditional propriety silos. With this incoming largess of protected health information data now viewable through online patient portals, patients can be empowered to become educated and active in their own health care decisions, but only if they have admission to their information. A digital divide currently exists in many medical practices where only …


The Successful Implementation Of Electronic Health Records At Small Rural Hospitals, Daniel Richardson Jan 2016

The Successful Implementation Of Electronic Health Records At Small Rural Hospitals, Daniel Richardson

Walden Dissertations and Doctoral Studies

Electronic health records (EHRs) have been in use since the 1960s. U.S. rural hospital leaders and administrators face significant pressure to implement health information technology because of the American Recovery and Reinvestment Act of 2009. However, some leaders and managers of small rural hospital lack strategies to develop and implement EHRs. The focus of this descriptive phenomenological study was to explore lived experiences of hospital leaders and administrators who have used successful strategies to implement EHRs in small rural hospitals. Diffusion of innovation theory shaped the theoretical framework of this study. Data were collected through telephone interviews conducted with participants …


Evaluating Distributed Word Representations For Predicting Missing Words In Sentences, Saniya Saifee Jan 2016

Evaluating Distributed Word Representations For Predicting Missing Words In Sentences, Saniya Saifee

Dissertations and Theses

In recent years, the distributed representation of words in vector space or word embeddings have become very popular as they have shown significant improvements in many statistical natural language processing (NLP) tasks as compared to traditional language models like Ngram. In this thesis, we explored various state-of-the-art methods like Latent Semantic Analysis, word2vec, and GloVe to learn the distributed representation of words. Their performance was compared based on the accuracy achieved when tasked with selecting the right missing word in the sentence, given five possible options. For this NLP task we trained each of these methods using a training corpus …


Information Source Detection Via Maximum A Posteriori Estimation, Biao Chang, Feida Zhu, Enhong Chen, Qi. Liu Jan 2016

Information Source Detection Via Maximum A Posteriori Estimation, Biao Chang, Feida Zhu, Enhong Chen, Qi. Liu

Research Collection School Of Computing and Information Systems

The problem of information source detection, whose goal is to identify the source of a piece of information from a diffusion process (e.g., computer virus, rumor, epidemic, and so on), has attracted ever-increasing attention from research community in recent years. Although various methods have been proposed, such as those based on centrality, spectral and belief propagation, the existing solutions still suffer from high time complexity and inadequate effectiveness. To this end, we revisit this problem in the paper and present a comprehensive study from the perspective of likelihood approximation. Different from many previous works, we consider both infected and uninfected …