Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (2966)
- Wright State University (632)
- Walden University (447)
- Selected Works (287)
- New Jersey Institute of Technology (137)
-
- University of Nebraska at Omaha (119)
- California State University, San Bernardino (96)
- Old Dominion University (95)
- San Jose State University (85)
- University of Dayton (82)
- The University of Maine (67)
- City University of New York (CUNY) (65)
- University of Nebraska - Lincoln (54)
- Air Force Institute of Technology (53)
- SelectedWorks (53)
- Technological University Dublin (51)
- University of South Florida (50)
- Kennesaw State University (46)
- Nova Southeastern University (43)
- Claremont Colleges (42)
- University of Arkansas, Fayetteville (42)
- University of Wisconsin Milwaukee (42)
- Western Kentucky University (41)
- Dakota State University (39)
- Institute of Business Administration (38)
- California Polytechnic State University, San Luis Obispo (36)
- Western University (35)
- Ateneo de Manila University (34)
- Governors State University (34)
- Purdue University (34)
- Keyword
-
- Machine learning (101)
- Information technology (93)
- Data mining (89)
- Social media (78)
- Twitter (64)
-
- Machine Learning (57)
- Cybersecurity (54)
- Semantic Web (54)
- Deep learning (52)
- Artificial intelligence (49)
- Online learning (49)
- Information Technology (47)
- Classification (46)
- Cloud computing (45)
- Information retrieval (45)
- Privacy (45)
- Big data (44)
- Database (43)
- Ontology (43)
- Computer science (42)
- Information security (41)
- Algorithms (40)
- Security (40)
- Databases (39)
- Information systems (39)
- Management (37)
- Clustering (36)
- Data Mining (36)
- Northern Ohio Data and Information Service (NODIS) (36)
- Technology (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (2872)
- Kno.e.sis Publications (541)
- Walden Dissertations and Doctoral Studies (447)
- Theses and Dissertations (116)
- Dissertations (107)
-
- Computer Science Faculty Publications (91)
- Computer Science and Engineering Faculty Publications (91)
- Theses Digitization Project (84)
- Master's Projects (68)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Electronic Theses and Dissertations (55)
- Dissertations and Theses Collection (Open Access) (50)
- Theses (46)
- USF Tampa Graduate Theses and Dissertations (46)
- CCE Theses and Dissertations (42)
- Information Systems and Quantitative Analysis Faculty Publications (41)
- Kyriakos MOURATIDIS (40)
- CGU Faculty Publications and Research (37)
- International Conference on Information and Communication Technologies (36)
- Open Educational Resources (34)
- Department of Information Systems & Computer Science Faculty Publications (33)
- Graduate Theses and Dissertations (33)
- All Capstone Projects (32)
- Masters Theses & Doctoral Dissertations (32)
- Articles (29)
- Conference papers (28)
- David LO (28)
- Journal of Spatial Information Science (28)
- All Maxine Goodman Levin School of Urban Affairs Publications (27)
- Saverio Perugini (25)
- Publication Type
Articles 3631 - 3660 of 6727
Full-Text Articles in Physical Sciences and Mathematics
Diffusion Of Technology In Small To Medium Medical Providers In Saudi Arabia, Ziad Hisham Arnaout
Diffusion Of Technology In Small To Medium Medical Providers In Saudi Arabia, Ziad Hisham Arnaout
Walden Dissertations and Doctoral Studies
The Saudi ministry of health reported that government health care spending doubled from 2008 to 2011. To address increased demand, the government encouraged small to medium enterprise (SME) growth. However, SME leaders could not leverage technology as a growth enabler because they lacked strategies to address operating inefficiencies associated with technology. Only 50% of hospitals fully implemented information technology. The purpose of this phenomenological study was to explore lived experiences of SME leaders on strategies needed to accelerate technology implementation. This exploration drew on a conceptual framework developed from Wainwright and Waring's framework addressing issues of technology adoption. Data were …
Marketing Strategies Of Mobile Game Application Entrepreneurs, Talaya Waller
Marketing Strategies Of Mobile Game Application Entrepreneurs, Talaya Waller
Walden Dissertations and Doctoral Studies
Mobile game application entrepreneurs can offer many benefits to the U.S. economy; however, 80% of the entrepreneurs in this study stated that marketing their mobile applications was a major business challenge. Successful strategies that entrepreneurs have used to overcome their mobile game application marketing challenges may be beneficial to other entrepreneurs. Based on Schumpeter's theory of economic development and new value creation of technological innovation, the purpose of this phenomenological study was to explore the strategies that entrepreneurs have used to market their mobile game application development businesses successfully. Twenty mobile game application entrepreneurs from northern California, who successfully sustained …
Best Practices To Minimize Data Security Breaches For Increased Business Performance, Fedinand Jaiventume Kongnso
Best Practices To Minimize Data Security Breaches For Increased Business Performance, Fedinand Jaiventume Kongnso
Walden Dissertations and Doctoral Studies
In the United States, businesses have reported over 2,800 data compromises of an estimated 543 million records, with security breaches costing firms approximately $7.2 million annually. Scholars and industry practitioners have indicated a significant impact of security breaches on consumers and organizations. However, there are limited data on the best practices for minimizing the impact of security breaches on organizational performance. The purpose of this qualitative multicase study was to explore best practices technology leaders use to minimize data security breaches for increased business performance. Systems theory served as the conceptual framework for this study. Fourteen participants were interviewed, including …
An Exploration Of Wireless Networking And The Management Of Associated Security Risk, Helen Loretta Collins
An Exploration Of Wireless Networking And The Management Of Associated Security Risk, Helen Loretta Collins
Walden Dissertations and Doctoral Studies
The rapid expansion of wireless information technology (IT) coupled with a dramatic increase in security breaches forces organizations to develop comprehensive strategies for managing security risks. The problem addressed was the identification of security risk management practices and human errors of IT administrators, putting the organization at risk for external security intrusion. The purpose of this non-experimental quantitative study was to investigate and determine the security risk assessment practices used by IT administrators to protect the confidentiality and integrity of the organization's information. The research questions focused on whether the security risk management practices of IT administrators met or exceeded …
A Comprehensive Analysis Of Computer Use Among African Americans, Kandice Lauren Smith
A Comprehensive Analysis Of Computer Use Among African Americans, Kandice Lauren Smith
Walden Dissertations and Doctoral Studies
On average, African Americans receive lower wages in the workplace due to lack of advanced technical skills. The reason for technical deficiency among some African Americans is often lack of exposure to IT resources at an early age. The purpose of this ethnographic study was to identify and explore the factors that contribute to lack of IT resources available to some African Americans to cultivate IT skills. Information literacy theory formed the conceptual framework, which focused on information resources that African American and Caucasians use in the workforce for problem solving and retrieving information. Data were collected by conducting face-to-face …
Novel Incorportation Of Biomedical Engineering Algorithms (Bispectral Index Guided Or Anesthetic Concentration Guided) In Real-Time Decision Support To Prevent Intraoperative Awareness Using An Electronic Anesthesia Information Mananagement System, Amy Melanie Shanks
Wayne State University Dissertations
Background: Intraoperative awareness with explicit recall (AWR) is a feared complication of surgery that can lead to significant psychological distress. Several large prospective trials have been completed comparing two methods of monitoring anesthetic depth [minimum alveolar concentration (MAC) or electroencephalography (EEG) monitoring using the bispectral index (BIS)] for the prevention of AWR. However, these trials were conducted in high risk populations, limiting generalizability.
Research Hypothesis: Real-time decision support with Anesthesia Information Management System alerts based on a novel anesthetic concentration algorithm (incorporating the use of intravenous anesthetics) or an EEG-guided algorithm will reduce the known incidence of AWR.
Methods: First, …
Community Discovery From Social Media By Low-Rank Matrix Recovery, Jinfeng Zhuang, Mei Tao, Steven C. H. Hoi, Xian-Sheng Hua, Yongdong Zhang
Community Discovery From Social Media By Low-Rank Matrix Recovery, Jinfeng Zhuang, Mei Tao, Steven C. H. Hoi, Xian-Sheng Hua, Yongdong Zhang
Research Collection School Of Computing and Information Systems
The pervasive usage and reach of social media have attracted a surge of attention in the multimedia research community. Community discovery from social media has therefore become an important yet challenging issue. However, due to the subjective generating process, the explicitly observed communities (e.g., group-user and user-user relationship) are often noisy and incomplete in nature. This paper presents a novel approach to discovering communities from social media, including the group membership and user friend structure, by exploring a low-rank matrix recovery technique. In particular, we take Flickr as one exemplary social media platform. We first model the observed indicator matrix …
Virtue Ethics: Examining Influences On The Ethical Commitment Of Information System Workers In Trusted Positions, John Max Gray
Virtue Ethics: Examining Influences On The Ethical Commitment Of Information System Workers In Trusted Positions, John Max Gray
CCE Theses and Dissertations
Despite an abundance of research on the problem of insider threats, only limited success has been achieved in preventing trusted insiders from committing security violations. Virtue ethics may be an approach that can be utilized to address this issue. Human factors such as moral considerations impact Information System (IS) design, use, and security; consequently they affect the security posture and culture of an organization. Virtue ethics based concepts have the potential to influence and align the moral values and behavior of information systems workers with those of an organization in order to provide increased protection of IS assets. An individual’s …
Incremental Sparse-Pca Feature Extraction For Data Streams, Jean-Pierre Nziga
Incremental Sparse-Pca Feature Extraction For Data Streams, Jean-Pierre Nziga
CCE Theses and Dissertations
Intruders attempt to penetrate commercial systems daily and cause considerable financial losses for individuals and organizations. Intrusion detection systems monitor network events to detect computer security threats. An extensive amount of network data is devoted to detecting malicious activities.
Storing, processing, and analyzing the massive volume of data is costly and indicate the need to find efficient methods to perform network data reduction that does not require the data to be first captured and stored. A better approach allows the extraction of useful variables from data streams in real time and in a single pass. The removal of irrelevant attributes …
Police Opinions Of Digital Evidence Response Handling In The State Of Georgia: An Examination From The Viewpoint Of Local Agencies’ Patrol Officers, Tanya Macneil
CCE Theses and Dissertations
This research examined opinions of local law enforcement agencies’ patrol officers in the State of Georgia regarding preparedness and expectations for handling of digital evidence. The increased criminal use of technology requires that patrol officers be prepared to handle digital evidence in many different situations. The researcher’s goal was to gain insight into how patrol officers view their preparedness to handle digital evidence as well as their opinions on management expectations regarding patrol officers’ abilities to handle digital evidence. The research focused on identifying whether a gap existed between patrol officers’ opinions of digital evidence and the patrol officers’ views …
Use Of Entropy For Feature Selection With Intrusion Detection System Parameters, Frank Acker
Use Of Entropy For Feature Selection With Intrusion Detection System Parameters, Frank Acker
CCE Theses and Dissertations
The metric of entropy provides a measure about the randomness of data and a measure of information gained by comparing different attributes. Intrusion detection systems can collect very large amounts of data, which are not necessarily manageable by manual means. Collected intrusion detection data often contains redundant, duplicate, and irrelevant entries, which makes analysis computationally intensive likely leading to unreliable results. Reducing the data to what is relevant and pertinent to the analysis requires the use of data mining techniques and statistics. Identifying patterns in the data is part of analysis for intrusion detections in which the patterns are categorized …
Designing An Effective Information Security Policy For Exceptional Situations In An Organization: An Experimental Study, George S. Antoniou
Designing An Effective Information Security Policy For Exceptional Situations In An Organization: An Experimental Study, George S. Antoniou
CCE Theses and Dissertations
An increasing number of researchers are recognizing the importance of the role played by employees in maintaining the effectiveness of an information security policy. Currently, little research exists to validate the relationship between the actions (behaviors) taken by employees in response to exceptional situations (antecedents) regarding an organization’s information security policy, the impact (consequences) those actions have on an organization, and the motives that prompt those actions. When these exceptional situations occur, employees may feel compelled to engage in behaviors that violate the terms of an information security policy because strict compliance with the policy could cause the organization to …
Motivating The Solicited And Unsolicited Sharing Of Tacit Knowledge Through The Process Of Externalization, Sheila Yvonne Sorensen
Motivating The Solicited And Unsolicited Sharing Of Tacit Knowledge Through The Process Of Externalization, Sheila Yvonne Sorensen
CCE Theses and Dissertations
While several U. S. firms have invested in Knowledge Management (KM) tools and software, it has become apparent that investments must be made in additional facets of KM, such as knowledge sharing (KS), thought by many researchers to be the most important component of KM. Of the two types of KS, explicit and tacit, the sharing of tacit knowledge has been shown to contribute the most to an organization’s performance. However, since tacit knowledge is difficult to both convey and acquire, this unshared tacit knowledge may ultimately harm an organization when, without the appropriate knowledge, individuals cannot effectively perform their …
Implicit Measures And Online Risks, Lucinda W. Wang
Implicit Measures And Online Risks, Lucinda W. Wang
CCE Theses and Dissertations
Information systems researchers typically use self-report measures, such as questionnaires to study consumers’ online risk perception. The self-report approach captures the conscious perception of online risk but not the unconscious perception that precedes and dominates human being’s decision-making. A theoretical model in which implicit risk perception precedes explicit risk evaluation is proposed. The research model proposes that implicit risk affects both explicit risk and the attitude towards online purchase. In a direct path, the implicit risk affects attitude towards purchase. In an indirect path, the implicit risk affects explicit risk, which in turn affects attitude towards purchase.
The stimulus used …
Push Or Pull? A Website's Strategic Choice Of Content Delivery Mechanism, Dan Ma
Push Or Pull? A Website's Strategic Choice Of Content Delivery Mechanism, Dan Ma
Research Collection School Of Computing and Information Systems
Really simple syndication (RSS) technology enables an alternative delivery mechanism for online content. Instead of waiting passively for users to pull online content out, websites can push it to potential users through RSS. This is expected to significantly affect user behavior, website profitability, and market equilibrium. This research uses an economic model to study the impact of RSS adoption and examine whether it increases a website’s profit and competitive advantage. The findings are intriguing: they demonstrate that RSS can either increase or decrease website profit. In a competitive context, RSS adoption can actually be a disadvantage; in some cases, it …
Testing Data Vault-Based Data Warehouse, Connard N. Williams
Testing Data Vault-Based Data Warehouse, Connard N. Williams
Electronic Theses and Dissertations
Data warehouse (DW) projects are undertakings that require integration of disparate sources of data, a well-defined mapping of the source data to the reconciled data, and effective Extract, Transform, and Load (ETL) processes. Owing to the complexity of data warehouse projects, great emphasis must be placed on an agile-based approach with properly developed and executed test plans throughout the various stages of designing, developing, and implementing the data warehouse to mitigate against budget overruns, missed deadlines, low customer satisfaction, and outright project failures. Yet, there are often attempts to test the data warehouse exactly like traditional back-end databases and legacy …
Interpretative Phenomenological Analysis Of Accessibility Awareness Among Faculty In Online Learning Environments, Rachael Sessler Trinkowsky
Interpretative Phenomenological Analysis Of Accessibility Awareness Among Faculty In Online Learning Environments, Rachael Sessler Trinkowsky
CCE Theses and Dissertations
Although all organizations and institutions should consider accessibility when developing online content, inaccessibility is a recurring issue in recent literature pertaining to online learning environments (OLEs) and faculty accessibility awareness. The goal was to describe how online faculty gain knowledge regarding accessibility, to explore the lived experiences of online faculty who have worked with students who have disabilities, and to gain a better understanding of how faculty experience the process of accessibility implementation. The following research questions guided this study: How do faculty in OLEs experience encounters regarding accessibility for students who have print related disabilities? How do faculty in …
An Investigation Of The Factors Contributing To The Development Of Poorly Defined Is Strategies For Firms In The United States, Karen B. Lacaden
An Investigation Of The Factors Contributing To The Development Of Poorly Defined Is Strategies For Firms In The United States, Karen B. Lacaden
CCE Theses and Dissertations
Although empirical research has shown that a clearly defined information system (IS) strategy has a positive impact to a firm’s performance and a poorly defined IS strategy has a negative impact to a firms’ performance, firms still develop poorly defined IS strategies. Further compounding the problem, research has revealed that 87% of the business executives believe information systems are a critical enabler to their firms' strategic realization, yet only 33% of business executives involve the Chief Information Officer (CIO) in their firm’s business strategy development. The main goal of this research study is to empirically identify factors which impact development …
Approaches For Developing A Model For Information And Communication Technology (Ict) Implementation In The Higher Education Environment, Thomas Edward Kurtz
Approaches For Developing A Model For Information And Communication Technology (Ict) Implementation In The Higher Education Environment, Thomas Edward Kurtz
CCE Theses and Dissertations
This dissertation investigates approaches for the development of an implementation model for ICT systems in the higher education environment. ICT systems have been implemented in various education settings, but have been narrowly focused in nature. There lacks a generalizable model to implement these systems in higher education settings. The research questions in this study sought to identify the criteria that can be used to develop and evaluate the implementation model.
The design science research methodology selected for this study used product criteria defined in a literature review to guide the development of the model. An expert panel consisting of administrators, …
Identifying Key Determinants Of Service Provider Effectiveness And The Impact It Has On Outsourced Security Success, James B. Lewis
Identifying Key Determinants Of Service Provider Effectiveness And The Impact It Has On Outsourced Security Success, James B. Lewis
CCE Theses and Dissertations
The purpose of this research was to identify key determinants of service provider effectiveness and how it impacts outsourced security success. As environments have become more robust and dynamic, many organizations have made the decision to leverage external security expertise and have outsourced many of their information technology security functions to Managed Security Service Providers (MSSPs).
Information Systems Outsourcing, at its core, is when a customer chooses to outsource certain information technology functions or services to a service provider and engages in a legally binding agreement. While legal contracts govern many aspects of an outsourcing arrangement, it cannot serve as …
Profiling Web Archives For Efficient Memento Query Routing, Sawood Alam, Michael L. Nelson, Herbert Van De Sompel, Lyudmila L. Balakireva, Harihar Shankar, David S. H. Rosenthal
Profiling Web Archives For Efficient Memento Query Routing, Sawood Alam, Michael L. Nelson, Herbert Van De Sompel, Lyudmila L. Balakireva, Harihar Shankar, David S. H. Rosenthal
Computer Science Faculty Publications
No abstract provided.
Push, Pull, And Spill: A Transdisciplinary Case Study In Municipal Open Government, Jan Whittington, Ryan Calo, Mike Simon, Jesse Woo, Meg Young, Perter Schmiedeskamp
Push, Pull, And Spill: A Transdisciplinary Case Study In Municipal Open Government, Jan Whittington, Ryan Calo, Mike Simon, Jesse Woo, Meg Young, Perter Schmiedeskamp
Articles
Municipal open data raises hopes and concerns. The activities of cities produce a wide array of data, data that is vastly enriched by ubiquitous computing. Municipal data is opened as it is pushed to, pulled by, and spilled to the public through online portals, requests for public records, and releases by cities and their vendors, contractors, and partners. By opening data, cities hope to raise public trust and prompt innovation. Municipal data, however, is often about the people who live, work, and travel in the city. By opening data, cities raise concern for privacy and social justice.
This article presents …
Mining User Viewpoints In Online Discussions, Minghui Qiu
Mining User Viewpoints In Online Discussions, Minghui Qiu
Dissertations and Theses Collection (Open Access)
Online discussion forums are a type of social media which contains rich usercontributed facts, opinions, and user interactions on diverse topics. The large volume of opinionated data generated in online discussions provides an ideal testbed for user opinion mining. In particular, mining user opinions on social and political issues from online discussions is useful not only to government organizations and companies but also to social and political scientists. In this dissertation, we propose to study the task of mining user viewpoints or stances from online discussions on social and political issues. Specifically, we will talk about our proposed approaches for …
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Publications and Research
There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …
Are Features Equally Representative? A Feature-Centric Recommendation, Chenyi Zhang, Ke Wang, Ee-Peng Lim, Qinneng Xu, Jianling Sun, Hongkun Yu
Are Features Equally Representative? A Feature-Centric Recommendation, Chenyi Zhang, Ke Wang, Ee-Peng Lim, Qinneng Xu, Jianling Sun, Hongkun Yu
Research Collection School Of Computing and Information Systems
Typically a user prefers an item (e.g., a movie) because she likes certain features of the item (e.g., director, genre, producer). This observation motivates us to consider a feature-centric recommendation approach to item recommendation: instead of directly predicting the rating on items, we predict the rating on the features of items, and use such ratings to derive the rating on an item. This approach offers several advantages over the traditional item-centric approach: it incorporates more information about why a user chooses an item, it generalizes better due to the denser feature rating data, it explains the prediction of item ratings …
Major Challenges And Solutions For Utilizing Big Data In The Maritime Industry, Sadaharu Koga
Major Challenges And Solutions For Utilizing Big Data In The Maritime Industry, Sadaharu Koga
World Maritime University Dissertations
The dissertation is a study of big data for the use in the maritime industry. Today’s society is information-intensive. The term “big data” is becoming more common. In fact, some maritime companies and institutions have already been trying to utilize big data for enhancing maritime safety and environmental protection. In order to promote this trend, the dissertation tries to identify common and important challenges for the whole maritime industry in terms of the utilization of big data and propose corresponding solutions. First, by reviewing the definitions of big data, three major features are identified. Big data takes electronic form, is …
Collaboration Portal For Researchers At Eastern Illinois University, Fatemeh Khastkhodaardekani
Collaboration Portal For Researchers At Eastern Illinois University, Fatemeh Khastkhodaardekani
Masters Theses
This thesis addresses a need for an online collaboration environment for the researchers at Eastern Illinois University (EIU). As the solution, it provides a portal for researchers (students and faculties) who wish to explore and collaborate on projects based on ideas from those who may not have the necessary skills. This is considered to help developing projects based on the ideas as well as making teams, and teach different groups of people different perspectives. Therefore, it offers a learning environment. I started off by examining existing tools and methodologies to satisfy this purpose. As the result, the deliverable project is …
Data Breach (Regulatory) Effects, David Thaw
Multidimensional Context Awareness In Mobile Devices, Zhuo Wei, Robert H. Deng, Jialie Shen, Jixiang Zhu, Kun Ouyang, Yongdong Wu
Multidimensional Context Awareness In Mobile Devices, Zhuo Wei, Robert H. Deng, Jialie Shen, Jixiang Zhu, Kun Ouyang, Yongdong Wu
Research Collection School Of Computing and Information Systems
With the increase of mobile computation ability and the development of wireless network transmission technology, mobile devices not only are the important tools of personal life (e.g., education and entertainment), but also emerge as indispensable "secretary" of business activities (e.g., email and phone call). However, since mobile devices could work under complex and dynamic local and network conditions, they are vulnerable to local and remote security attacks. In real applications, different kinds of data protection are required by various local contexts. To provide appropriate protection, we propose a multidimensional context (MContext) scheme to comprehensively model and characterize the scene and …
Travel Recommendation Via Author Topic Model Based Collaborative Filtering, Shuhui Jiang, Xueming Qian, Jialie Shen, Tao Mei
Travel Recommendation Via Author Topic Model Based Collaborative Filtering, Shuhui Jiang, Xueming Qian, Jialie Shen, Tao Mei
Research Collection School Of Computing and Information Systems
While automatic travel recommendation has attracted a lot of attentions, the existing approaches generally suffer from different kinds of weaknesses. For example, sparsity problem can significantly degrade the performance of traditional collaborative filtering (CF). If a user only visits very few locations, accurate similar user identification becomes very challenging due to lack of sufficient information. Motivated by this concern, we propose an Author Topic Collaborative Filtering (ATCF) method to facilitate comprehensive Points of Interest (POIs) recommendation for social media users. In our approach, the topics about user preference (e.g., cultural, cityscape, or landmark) are extracted from the textual description of …