Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 3631 - 3660 of 6727

Full-Text Articles in Physical Sciences and Mathematics

Diffusion Of Technology In Small To Medium Medical Providers In Saudi Arabia, Ziad Hisham Arnaout Jan 2015

Diffusion Of Technology In Small To Medium Medical Providers In Saudi Arabia, Ziad Hisham Arnaout

Walden Dissertations and Doctoral Studies

The Saudi ministry of health reported that government health care spending doubled from 2008 to 2011. To address increased demand, the government encouraged small to medium enterprise (SME) growth. However, SME leaders could not leverage technology as a growth enabler because they lacked strategies to address operating inefficiencies associated with technology. Only 50% of hospitals fully implemented information technology. The purpose of this phenomenological study was to explore lived experiences of SME leaders on strategies needed to accelerate technology implementation. This exploration drew on a conceptual framework developed from Wainwright and Waring's framework addressing issues of technology adoption. Data were …


Marketing Strategies Of Mobile Game Application Entrepreneurs, Talaya Waller Jan 2015

Marketing Strategies Of Mobile Game Application Entrepreneurs, Talaya Waller

Walden Dissertations and Doctoral Studies

Mobile game application entrepreneurs can offer many benefits to the U.S. economy; however, 80% of the entrepreneurs in this study stated that marketing their mobile applications was a major business challenge. Successful strategies that entrepreneurs have used to overcome their mobile game application marketing challenges may be beneficial to other entrepreneurs. Based on Schumpeter's theory of economic development and new value creation of technological innovation, the purpose of this phenomenological study was to explore the strategies that entrepreneurs have used to market their mobile game application development businesses successfully. Twenty mobile game application entrepreneurs from northern California, who successfully sustained …


Best Practices To Minimize Data Security Breaches For Increased Business Performance, Fedinand Jaiventume Kongnso Jan 2015

Best Practices To Minimize Data Security Breaches For Increased Business Performance, Fedinand Jaiventume Kongnso

Walden Dissertations and Doctoral Studies

In the United States, businesses have reported over 2,800 data compromises of an estimated 543 million records, with security breaches costing firms approximately $7.2 million annually. Scholars and industry practitioners have indicated a significant impact of security breaches on consumers and organizations. However, there are limited data on the best practices for minimizing the impact of security breaches on organizational performance. The purpose of this qualitative multicase study was to explore best practices technology leaders use to minimize data security breaches for increased business performance. Systems theory served as the conceptual framework for this study. Fourteen participants were interviewed, including …


An Exploration Of Wireless Networking And The Management Of Associated Security Risk, Helen Loretta Collins Jan 2015

An Exploration Of Wireless Networking And The Management Of Associated Security Risk, Helen Loretta Collins

Walden Dissertations and Doctoral Studies

The rapid expansion of wireless information technology (IT) coupled with a dramatic increase in security breaches forces organizations to develop comprehensive strategies for managing security risks. The problem addressed was the identification of security risk management practices and human errors of IT administrators, putting the organization at risk for external security intrusion. The purpose of this non-experimental quantitative study was to investigate and determine the security risk assessment practices used by IT administrators to protect the confidentiality and integrity of the organization's information. The research questions focused on whether the security risk management practices of IT administrators met or exceeded …


A Comprehensive Analysis Of Computer Use Among African Americans, Kandice Lauren Smith Jan 2015

A Comprehensive Analysis Of Computer Use Among African Americans, Kandice Lauren Smith

Walden Dissertations and Doctoral Studies

On average, African Americans receive lower wages in the workplace due to lack of advanced technical skills. The reason for technical deficiency among some African Americans is often lack of exposure to IT resources at an early age. The purpose of this ethnographic study was to identify and explore the factors that contribute to lack of IT resources available to some African Americans to cultivate IT skills. Information literacy theory formed the conceptual framework, which focused on information resources that African American and Caucasians use in the workforce for problem solving and retrieving information. Data were collected by conducting face-to-face …


Novel Incorportation Of Biomedical Engineering Algorithms (Bispectral Index Guided Or Anesthetic Concentration Guided) In Real-Time Decision Support To Prevent Intraoperative Awareness Using An Electronic Anesthesia Information Mananagement System, Amy Melanie Shanks Jan 2015

Novel Incorportation Of Biomedical Engineering Algorithms (Bispectral Index Guided Or Anesthetic Concentration Guided) In Real-Time Decision Support To Prevent Intraoperative Awareness Using An Electronic Anesthesia Information Mananagement System, Amy Melanie Shanks

Wayne State University Dissertations

Background: Intraoperative awareness with explicit recall (AWR) is a feared complication of surgery that can lead to significant psychological distress. Several large prospective trials have been completed comparing two methods of monitoring anesthetic depth [minimum alveolar concentration (MAC) or electroencephalography (EEG) monitoring using the bispectral index (BIS)] for the prevention of AWR. However, these trials were conducted in high risk populations, limiting generalizability.

Research Hypothesis: Real-time decision support with Anesthesia Information Management System alerts based on a novel anesthetic concentration algorithm (incorporating the use of intravenous anesthetics) or an EEG-guided algorithm will reduce the known incidence of AWR.

Methods: First, …


Community Discovery From Social Media By Low-Rank Matrix Recovery, Jinfeng Zhuang, Mei Tao, Steven C. H. Hoi, Xian-Sheng Hua, Yongdong Zhang Jan 2015

Community Discovery From Social Media By Low-Rank Matrix Recovery, Jinfeng Zhuang, Mei Tao, Steven C. H. Hoi, Xian-Sheng Hua, Yongdong Zhang

Research Collection School Of Computing and Information Systems

The pervasive usage and reach of social media have attracted a surge of attention in the multimedia research community. Community discovery from social media has therefore become an important yet challenging issue. However, due to the subjective generating process, the explicitly observed communities (e.g., group-user and user-user relationship) are often noisy and incomplete in nature. This paper presents a novel approach to discovering communities from social media, including the group membership and user friend structure, by exploring a low-rank matrix recovery technique. In particular, we take Flickr as one exemplary social media platform. We first model the observed indicator matrix …


Virtue Ethics: Examining Influences On The Ethical Commitment Of Information System Workers In Trusted Positions, John Max Gray Jan 2015

Virtue Ethics: Examining Influences On The Ethical Commitment Of Information System Workers In Trusted Positions, John Max Gray

CCE Theses and Dissertations

Despite an abundance of research on the problem of insider threats, only limited success has been achieved in preventing trusted insiders from committing security violations. Virtue ethics may be an approach that can be utilized to address this issue. Human factors such as moral considerations impact Information System (IS) design, use, and security; consequently they affect the security posture and culture of an organization. Virtue ethics based concepts have the potential to influence and align the moral values and behavior of information systems workers with those of an organization in order to provide increased protection of IS assets. An individual’s …


Incremental Sparse-Pca Feature Extraction For Data Streams, Jean-Pierre Nziga Jan 2015

Incremental Sparse-Pca Feature Extraction For Data Streams, Jean-Pierre Nziga

CCE Theses and Dissertations

Intruders attempt to penetrate commercial systems daily and cause considerable financial losses for individuals and organizations. Intrusion detection systems monitor network events to detect computer security threats. An extensive amount of network data is devoted to detecting malicious activities.

Storing, processing, and analyzing the massive volume of data is costly and indicate the need to find efficient methods to perform network data reduction that does not require the data to be first captured and stored. A better approach allows the extraction of useful variables from data streams in real time and in a single pass. The removal of irrelevant attributes …


Police Opinions Of Digital Evidence Response Handling In The State Of Georgia: An Examination From The Viewpoint Of Local Agencies’ Patrol Officers, Tanya Macneil Jan 2015

Police Opinions Of Digital Evidence Response Handling In The State Of Georgia: An Examination From The Viewpoint Of Local Agencies’ Patrol Officers, Tanya Macneil

CCE Theses and Dissertations

This research examined opinions of local law enforcement agencies’ patrol officers in the State of Georgia regarding preparedness and expectations for handling of digital evidence. The increased criminal use of technology requires that patrol officers be prepared to handle digital evidence in many different situations. The researcher’s goal was to gain insight into how patrol officers view their preparedness to handle digital evidence as well as their opinions on management expectations regarding patrol officers’ abilities to handle digital evidence. The research focused on identifying whether a gap existed between patrol officers’ opinions of digital evidence and the patrol officers’ views …


Use Of Entropy For Feature Selection With Intrusion Detection System Parameters, Frank Acker Jan 2015

Use Of Entropy For Feature Selection With Intrusion Detection System Parameters, Frank Acker

CCE Theses and Dissertations

The metric of entropy provides a measure about the randomness of data and a measure of information gained by comparing different attributes. Intrusion detection systems can collect very large amounts of data, which are not necessarily manageable by manual means. Collected intrusion detection data often contains redundant, duplicate, and irrelevant entries, which makes analysis computationally intensive likely leading to unreliable results. Reducing the data to what is relevant and pertinent to the analysis requires the use of data mining techniques and statistics. Identifying patterns in the data is part of analysis for intrusion detections in which the patterns are categorized …


Designing An Effective Information Security Policy For Exceptional Situations In An Organization: An Experimental Study, George S. Antoniou Jan 2015

Designing An Effective Information Security Policy For Exceptional Situations In An Organization: An Experimental Study, George S. Antoniou

CCE Theses and Dissertations

An increasing number of researchers are recognizing the importance of the role played by employees in maintaining the effectiveness of an information security policy. Currently, little research exists to validate the relationship between the actions (behaviors) taken by employees in response to exceptional situations (antecedents) regarding an organization’s information security policy, the impact (consequences) those actions have on an organization, and the motives that prompt those actions. When these exceptional situations occur, employees may feel compelled to engage in behaviors that violate the terms of an information security policy because strict compliance with the policy could cause the organization to …


Motivating The Solicited And Unsolicited Sharing Of Tacit Knowledge Through The Process Of Externalization, Sheila Yvonne Sorensen Jan 2015

Motivating The Solicited And Unsolicited Sharing Of Tacit Knowledge Through The Process Of Externalization, Sheila Yvonne Sorensen

CCE Theses and Dissertations

While several U. S. firms have invested in Knowledge Management (KM) tools and software, it has become apparent that investments must be made in additional facets of KM, such as knowledge sharing (KS), thought by many researchers to be the most important component of KM. Of the two types of KS, explicit and tacit, the sharing of tacit knowledge has been shown to contribute the most to an organization’s performance. However, since tacit knowledge is difficult to both convey and acquire, this unshared tacit knowledge may ultimately harm an organization when, without the appropriate knowledge, individuals cannot effectively perform their …


Implicit Measures And Online Risks, Lucinda W. Wang Jan 2015

Implicit Measures And Online Risks, Lucinda W. Wang

CCE Theses and Dissertations

Information systems researchers typically use self-report measures, such as questionnaires to study consumers’ online risk perception. The self-report approach captures the conscious perception of online risk but not the unconscious perception that precedes and dominates human being’s decision-making. A theoretical model in which implicit risk perception precedes explicit risk evaluation is proposed. The research model proposes that implicit risk affects both explicit risk and the attitude towards online purchase. In a direct path, the implicit risk affects attitude towards purchase. In an indirect path, the implicit risk affects explicit risk, which in turn affects attitude towards purchase.

The stimulus used …


Push Or Pull? A Website's Strategic Choice Of Content Delivery Mechanism, Dan Ma Jan 2015

Push Or Pull? A Website's Strategic Choice Of Content Delivery Mechanism, Dan Ma

Research Collection School Of Computing and Information Systems

Really simple syndication (RSS) technology enables an alternative delivery mechanism for online content. Instead of waiting passively for users to pull online content out, websites can push it to potential users through RSS. This is expected to significantly affect user behavior, website profitability, and market equilibrium. This research uses an economic model to study the impact of RSS adoption and examine whether it increases a website’s profit and competitive advantage. The findings are intriguing: they demonstrate that RSS can either increase or decrease website profit. In a competitive context, RSS adoption can actually be a disadvantage; in some cases, it …


Testing Data Vault-Based Data Warehouse, Connard N. Williams Jan 2015

Testing Data Vault-Based Data Warehouse, Connard N. Williams

Electronic Theses and Dissertations

Data warehouse (DW) projects are undertakings that require integration of disparate sources of data, a well-defined mapping of the source data to the reconciled data, and effective Extract, Transform, and Load (ETL) processes. Owing to the complexity of data warehouse projects, great emphasis must be placed on an agile-based approach with properly developed and executed test plans throughout the various stages of designing, developing, and implementing the data warehouse to mitigate against budget overruns, missed deadlines, low customer satisfaction, and outright project failures. Yet, there are often attempts to test the data warehouse exactly like traditional back-end databases and legacy …


Interpretative Phenomenological Analysis Of Accessibility Awareness Among Faculty In Online Learning Environments, Rachael Sessler Trinkowsky Jan 2015

Interpretative Phenomenological Analysis Of Accessibility Awareness Among Faculty In Online Learning Environments, Rachael Sessler Trinkowsky

CCE Theses and Dissertations

Although all organizations and institutions should consider accessibility when developing online content, inaccessibility is a recurring issue in recent literature pertaining to online learning environments (OLEs) and faculty accessibility awareness. The goal was to describe how online faculty gain knowledge regarding accessibility, to explore the lived experiences of online faculty who have worked with students who have disabilities, and to gain a better understanding of how faculty experience the process of accessibility implementation. The following research questions guided this study: How do faculty in OLEs experience encounters regarding accessibility for students who have print related disabilities? How do faculty in …


An Investigation Of The Factors Contributing To The Development Of Poorly Defined Is Strategies For Firms In The United States, Karen B. Lacaden Jan 2015

An Investigation Of The Factors Contributing To The Development Of Poorly Defined Is Strategies For Firms In The United States, Karen B. Lacaden

CCE Theses and Dissertations

Although empirical research has shown that a clearly defined information system (IS) strategy has a positive impact to a firm’s performance and a poorly defined IS strategy has a negative impact to a firms’ performance, firms still develop poorly defined IS strategies. Further compounding the problem, research has revealed that 87% of the business executives believe information systems are a critical enabler to their firms' strategic realization, yet only 33% of business executives involve the Chief Information Officer (CIO) in their firm’s business strategy development. The main goal of this research study is to empirically identify factors which impact development …


Approaches For Developing A Model For Information And Communication Technology (Ict) Implementation In The Higher Education Environment, Thomas Edward Kurtz Jan 2015

Approaches For Developing A Model For Information And Communication Technology (Ict) Implementation In The Higher Education Environment, Thomas Edward Kurtz

CCE Theses and Dissertations

This dissertation investigates approaches for the development of an implementation model for ICT systems in the higher education environment. ICT systems have been implemented in various education settings, but have been narrowly focused in nature. There lacks a generalizable model to implement these systems in higher education settings. The research questions in this study sought to identify the criteria that can be used to develop and evaluate the implementation model.

The design science research methodology selected for this study used product criteria defined in a literature review to guide the development of the model. An expert panel consisting of administrators, …


Identifying Key Determinants Of Service Provider Effectiveness And The Impact It Has On Outsourced Security Success, James B. Lewis Jan 2015

Identifying Key Determinants Of Service Provider Effectiveness And The Impact It Has On Outsourced Security Success, James B. Lewis

CCE Theses and Dissertations

The purpose of this research was to identify key determinants of service provider effectiveness and how it impacts outsourced security success. As environments have become more robust and dynamic, many organizations have made the decision to leverage external security expertise and have outsourced many of their information technology security functions to Managed Security Service Providers (MSSPs).

Information Systems Outsourcing, at its core, is when a customer chooses to outsource certain information technology functions or services to a service provider and engages in a legally binding agreement. While legal contracts govern many aspects of an outsourcing arrangement, it cannot serve as …


Profiling Web Archives For Efficient Memento Query Routing, Sawood Alam, Michael L. Nelson, Herbert Van De Sompel, Lyudmila L. Balakireva, Harihar Shankar, David S. H. Rosenthal Jan 2015

Profiling Web Archives For Efficient Memento Query Routing, Sawood Alam, Michael L. Nelson, Herbert Van De Sompel, Lyudmila L. Balakireva, Harihar Shankar, David S. H. Rosenthal

Computer Science Faculty Publications

No abstract provided.


Push, Pull, And Spill: A Transdisciplinary Case Study In Municipal Open Government, Jan Whittington, Ryan Calo, Mike Simon, Jesse Woo, Meg Young, Perter Schmiedeskamp Jan 2015

Push, Pull, And Spill: A Transdisciplinary Case Study In Municipal Open Government, Jan Whittington, Ryan Calo, Mike Simon, Jesse Woo, Meg Young, Perter Schmiedeskamp

Articles

Municipal open data raises hopes and concerns. The activities of cities produce a wide array of data, data that is vastly enriched by ubiquitous computing. Municipal data is opened as it is pushed to, pulled by, and spilled to the public through online portals, requests for public records, and releases by cities and their vendors, contractors, and partners. By opening data, cities hope to raise public trust and prompt innovation. Municipal data, however, is often about the people who live, work, and travel in the city. By opening data, cities raise concern for privacy and social justice.

This article presents …


Mining User Viewpoints In Online Discussions, Minghui Qiu Jan 2015

Mining User Viewpoints In Online Discussions, Minghui Qiu

Dissertations and Theses Collection (Open Access)

Online discussion forums are a type of social media which contains rich usercontributed facts, opinions, and user interactions on diverse topics. The large volume of opinionated data generated in online discussions provides an ideal testbed for user opinion mining. In particular, mining user opinions on social and political issues from online discussions is useful not only to government organizations and companies but also to social and political scientists. In this dissertation, we propose to study the task of mining user viewpoints or stances from online discussions on social and political issues. Specifically, we will talk about our proposed approaches for …


Framing The Question, "Who Governs The Internet?", Robert J. Domanski Jan 2015

Framing The Question, "Who Governs The Internet?", Robert J. Domanski

Publications and Research

There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …


Are Features Equally Representative? A Feature-Centric Recommendation, Chenyi Zhang, Ke Wang, Ee-Peng Lim, Qinneng Xu, Jianling Sun, Hongkun Yu Jan 2015

Are Features Equally Representative? A Feature-Centric Recommendation, Chenyi Zhang, Ke Wang, Ee-Peng Lim, Qinneng Xu, Jianling Sun, Hongkun Yu

Research Collection School Of Computing and Information Systems

Typically a user prefers an item (e.g., a movie) because she likes certain features of the item (e.g., director, genre, producer). This observation motivates us to consider a feature-centric recommendation approach to item recommendation: instead of directly predicting the rating on items, we predict the rating on the features of items, and use such ratings to derive the rating on an item. This approach offers several advantages over the traditional item-centric approach: it incorporates more information about why a user chooses an item, it generalizes better due to the denser feature rating data, it explains the prediction of item ratings …


Major Challenges And Solutions For Utilizing Big Data In The Maritime Industry, Sadaharu Koga Jan 2015

Major Challenges And Solutions For Utilizing Big Data In The Maritime Industry, Sadaharu Koga

World Maritime University Dissertations

The dissertation is a study of big data for the use in the maritime industry. Today’s society is information-intensive. The term “big data” is becoming more common. In fact, some maritime companies and institutions have already been trying to utilize big data for enhancing maritime safety and environmental protection. In order to promote this trend, the dissertation tries to identify common and important challenges for the whole maritime industry in terms of the utilization of big data and propose corresponding solutions. First, by reviewing the definitions of big data, three major features are identified. Big data takes electronic form, is …


Collaboration Portal For Researchers At Eastern Illinois University, Fatemeh Khastkhodaardekani Jan 2015

Collaboration Portal For Researchers At Eastern Illinois University, Fatemeh Khastkhodaardekani

Masters Theses

This thesis addresses a need for an online collaboration environment for the researchers at Eastern Illinois University (EIU). As the solution, it provides a portal for researchers (students and faculties) who wish to explore and collaborate on projects based on ideas from those who may not have the necessary skills. This is considered to help developing projects based on the ideas as well as making teams, and teach different groups of people different perspectives. Therefore, it offers a learning environment. I started off by examining existing tools and methodologies to satisfy this purpose. As the result, the deliverable project is …


Data Breach (Regulatory) Effects, David Thaw Jan 2015

Data Breach (Regulatory) Effects, David Thaw

Articles

No abstract provided.


Multidimensional Context Awareness In Mobile Devices, Zhuo Wei, Robert H. Deng, Jialie Shen, Jixiang Zhu, Kun Ouyang, Yongdong Wu Jan 2015

Multidimensional Context Awareness In Mobile Devices, Zhuo Wei, Robert H. Deng, Jialie Shen, Jixiang Zhu, Kun Ouyang, Yongdong Wu

Research Collection School Of Computing and Information Systems

With the increase of mobile computation ability and the development of wireless network transmission technology, mobile devices not only are the important tools of personal life (e.g., education and entertainment), but also emerge as indispensable "secretary" of business activities (e.g., email and phone call). However, since mobile devices could work under complex and dynamic local and network conditions, they are vulnerable to local and remote security attacks. In real applications, different kinds of data protection are required by various local contexts. To provide appropriate protection, we propose a multidimensional context (MContext) scheme to comprehensively model and characterize the scene and …


Travel Recommendation Via Author Topic Model Based Collaborative Filtering, Shuhui Jiang, Xueming Qian, Jialie Shen, Tao Mei Jan 2015

Travel Recommendation Via Author Topic Model Based Collaborative Filtering, Shuhui Jiang, Xueming Qian, Jialie Shen, Tao Mei

Research Collection School Of Computing and Information Systems

While automatic travel recommendation has attracted a lot of attentions, the existing approaches generally suffer from different kinds of weaknesses. For example, sparsity problem can significantly degrade the performance of traditional collaborative filtering (CF). If a user only visits very few locations, accurate similar user identification becomes very challenging due to lack of sufficient information. Motivated by this concern, we propose an Author Topic Collaborative Filtering (ATCF) method to facilitate comprehensive Points of Interest (POIs) recommendation for social media users. In our approach, the topics about user preference (e.g., cultural, cityscape, or landmark) are extracted from the textual description of …