Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 3871 - 3900 of 6727

Full-Text Articles in Physical Sciences and Mathematics

Principles Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord May 2014

Principles Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Principles of Information Security examines the field of information security to prepare information systems students for their future roles as business decision-makers. This textbook presents a balance of the managerial and the technical aspects of the discipline and addresses knowledge areas of the CISSP (Certified Information Systems Security Professional) certification throughout. The authors discuss information security within a real-world context, by including examples of issues faced by today's professionals and by including tools, such as an opening vignette and "Offline" boxes with interesting sidebar stories in each chapter. Principles of Information Security also offers extensive opportunities for hands-on work.


Roadmap To Information Security: For It And Infosec Managers, Michael Whitman, Herbert Mattord May 2014

Roadmap To Information Security: For It And Infosec Managers, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Roadmap to Information Security: For IT and Infosec Managers provides a solid overview of information security and its relationship to the information needs of an organization. Content is tailored to the unique needs of information systems professionals who find themselves brought in to the intricacies of information security responsibilities. The book is written for a wide variety of audiences looking to step up to emerging security challenges, ranging from students to experienced professionals. This book is designed to guide the information technology manager in dealing with the challenges associated with the security aspects of their role, providing concise guidance on …


Guide To Firewalls And Vpns, 3rd Edition, Michael Whitman, Herbert Mattord, Andrew Green May 2014

Guide To Firewalls And Vpns, 3rd Edition, Michael Whitman, Herbert Mattord, Andrew Green

Herbert J. Mattord

Firewalls are among the best-known network security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software, intrusion detection systems, and related tools. GUIDE TO FIREWALLS AND VPNs, THIRD EDITION explores firewalls in the context of these critical elements, providing an in-depth guide that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The book …


Principles Of Information Security, 4th Edition, Michael Whitman, Herbert Mattord May 2014

Principles Of Information Security, 4th Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

The fourth edition of Principles of Information Security explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Students will revel in the comprehensive coverage that includes a historical overview of information security, discussions on risk management and security technology, current certification information, and more. The text builds on internationally-recognized standards and bodies of knowledge to provide the knowledge and skills students need for their future roles as business decision-makers. Information security in the modern organization is a management issue which technology alone cannot answer; it is a problem that has important …


Pre-Computation In Width-W Τ-Adic Naf Implementations On Koblitz Curves, William Robert Trost May 2014

Pre-Computation In Width-W Τ-Adic Naf Implementations On Koblitz Curves, William Robert Trost

Theses and Dissertations

This paper examines scalar multiplication on Koblitz curves employing the Frobenius endomorphism. We examine simple binary scalar multiplication, binary Non Adjacent Formats or NAF's, followed by τ-NAF methods. We pay particular attention to width-τ-NAF where we focus on pre-computation. We present alternative pre-computation arrangements for αu for width sizes of 5 and 6 which are better than any previously published results since they: involve a single power of τ are based on least norms; and have a maximum of 2w - 2 - 1 elliptic curve operations. We then study widths of 7 and 8 producing efficient arrangements. …


Google Books As Infrastructure Of In/Justice: Towards A Sociotechnical Account Of Rawlsian Justice, Information, And Technology, Anna Lauren Hoffmann May 2014

Google Books As Infrastructure Of In/Justice: Towards A Sociotechnical Account Of Rawlsian Justice, Information, And Technology, Anna Lauren Hoffmann

Theses and Dissertations

The Google Books project is germane for examining underappreciated dimensions of social justice and access to information from a Rawlsian perspective. To date, however, the standard account of Rawls as applied to information and technology has focused almost exclusively on rights to access and information as a primary good (Drahos 1996; van den Hoven and Rooksby 2008; Duff 2011). In this dissertation, the author develops an alternative to the standard account--the sociotechnical account--that draws on underappreciated resources available within discussions of Rawls' work. Specifically, the author focuses on the importance of Rawls' basic structure argument and the value of self-respect--two …


With Whom To Coordinate, Why And How In Ad-Hoc Social Media Communications During Crisis Response, Hemant Purohit, Shreyansh Bhatt, Andrew Hampton, Valerie L. Shalin, Amit P. Sheth, John M. Flach May 2014

With Whom To Coordinate, Why And How In Ad-Hoc Social Media Communications During Crisis Response, Hemant Purohit, Shreyansh Bhatt, Andrew Hampton, Valerie L. Shalin, Amit P. Sheth, John M. Flach

Kno.e.sis Publications

During crises affected people, well-wishers, and observers join social media communities to discuss the event. They often share useful information relevant to response coordination, for example, specific resource needs. However, responders face the challenge of massive data overload and lack the time to monitor social media traffic for important information. Analysis shows that only a small number of event related conversations are actionable. Moreover, responders do not know which sources are trustworthy. To address these challenges, response teams may apply manual filtering methods, resulting in limited coverage and quality. We propose a framework and interface for extracting specific resource-related information …


Mining Contrast Subspaces, Lei Duan, Guanting Tang, Jian Pei, James Bailey, Guozhu Dong, Akiko Campbell, Changjie Tang May 2014

Mining Contrast Subspaces, Lei Duan, Guanting Tang, Jian Pei, James Bailey, Guozhu Dong, Akiko Campbell, Changjie Tang

Kno.e.sis Publications

In this paper, we tackle a novel problem of mining contrast subspaces. Given a set of multidimensional objects in two classes C+  and C and a query object o, we want to find top-k subspaces S that maximize the ratio of likelihood of o in C+  against that in C. We demonstrate that this problem has important applications, and at the same time, is very challenging. It even does not allow polynomial time approximation. We present CSMiner, a mining method with various pruning techniques. CSMiner is substantially faster than the baseline method. Our …


Three Research Essays On The Effects Of Charity Website Design On Online Donations, Dong-Heon Austin Kwak May 2014

Three Research Essays On The Effects Of Charity Website Design On Online Donations, Dong-Heon Austin Kwak

Theses and Dissertations

This dissertation, which comprises three essays, examines the effects of charity website characteristics on people's attitudes and online donation behaviors based on the elaboration likelihood model of persuasion (Essay 1), the halo effect (Essay 2), and self-schema, congruity, and visual rhetoric (Essay 3).

Essay 1: The Elaborating Role of Personal Involvement with Charity Giving and Helper's High on the Effects of Website Quality: Multiple Roles of Variables

Although the Elaboration Likelihood Model (ELM) has been utilized for decades, researchers have not leveraged its full capabilities and richness in understanding the multiple roles postulate and employing the central and peripheral routes …


Three Essays On The Role Of It In Environmental Sustainability: Motivating Individuals To Use Green It, Enhancing Their User Experience, And Promoting Electricity Conservation, Abdullah Al Bizri May 2014

Three Essays On The Role Of It In Environmental Sustainability: Motivating Individuals To Use Green It, Enhancing Their User Experience, And Promoting Electricity Conservation, Abdullah Al Bizri

Theses and Dissertations

This dissertation focuses on the role of IT in environmental sustainability and electricity conservation through three research essays. The first essay makes a case for behavior research, with the focus on individuals' use of Green IT. Moreover, environmental studies lack a coherent theory that could identify the motivators of Green-IT beliefs. We develop the hedonic motivation theory, which synthesizes theoretical and philosophical thoughts on hedonism with concepts from environmental research. Using this theory, we develop a conceptual model that identifies the motivators of context-specific beliefs, attitudes, and uses of Green IT. We theorize that there are significant generational differences in …


Shopprofiler: Profiling Shops With Crowdsourcing Data, Xiaonan Guo, Eddie C. L. Chan, Ce Liu, Kaishun Wu, Siyuan Liu, Lionel Ni May 2014

Shopprofiler: Profiling Shops With Crowdsourcing Data, Xiaonan Guo, Eddie C. L. Chan, Ce Liu, Kaishun Wu, Siyuan Liu, Lionel Ni

Research Collection School Of Computing and Information Systems

Sensing data from mobile phones provide us exciting and profitable applications. Recent research focuses on sensing indoor environment, but suffers from inaccuracy because of the limited reachability of human traces or requires human intervention to perform sophisticated tasks. In this paper, we present ShopProfiler, a shop profiling system on crowdsourcing data. First, we extract customer movement patterns from traces. Second, we improve accuracy of building floor plan by adopting a gradient-based approach and then localize shops through WiFi heat map. Third, we categorize shops by designing an SVM classifier in shop space to support multi-label classification. Finally, we infer brand …


Declarative-Procedural Memory Interaction In Learning Agents, Wenwen Wang, Ah-Hwee Tan, Loo-Nin Teow, Tan Yuan-Sin May 2014

Declarative-Procedural Memory Interaction In Learning Agents, Wenwen Wang, Ah-Hwee Tan, Loo-Nin Teow, Tan Yuan-Sin

Research Collection School Of Computing and Information Systems

It has been well recognized that human makes use of both declarative memory and procedural memory for decision making and problem solving. In this paper, we propose a computational model with the overall architecture and individual processes for realizing the interaction between the declarative and procedural memory based on self-organizing neural networks. We formalize two major types of memory interactions and show how each of them can be embedded into autonomous reinforcement learning agents. Our experiments based on the Toad and Frog puzzle and a strategic game known as Starcraft Broodwar have shown that the cooperative interaction between declarative knowledge …


Haptics In Remote Collaborative Exercise Systems For Seniors, Hesam Alizadeh, Richard Tang, Ehud Sharlin, Anthony Tang May 2014

Haptics In Remote Collaborative Exercise Systems For Seniors, Hesam Alizadeh, Richard Tang, Ehud Sharlin, Anthony Tang

Research Collection School Of Computing and Information Systems

Group exercise provides motivation to follow and maintain a healthy daily exercise schedule while enjoying beneficial encouragement and social support from friends and exercise partners. However, mobility and transportation issues frequently prevent seniors from engaging in group activities. To address this problem, we investigated the exercise needs of seniors and developed a prototype remote exercise system. Our system uses haptic feedback to simulate assistive pushing and pulling of limbs when exercising with a partner. We developed three distinct vibration metaphors -- constant push/pull, corrective feedback, and notification -- to convey engagement and connection between exercise partners. We conducted a preliminary …


Handling Location Uncertainty In Event Driven Experimentation, Kartik Muralidharan, Srinivasan Seshan, Narayan Ramasubbu, Rajesh Krishna Balan May 2014

Handling Location Uncertainty In Event Driven Experimentation, Kartik Muralidharan, Srinivasan Seshan, Narayan Ramasubbu, Rajesh Krishna Balan

Research Collection School Of Computing and Information Systems

The wide spread use of smart phones has ushered in a wave of context-based advertising services that operate on pre-defined user events. A prime example is Location Based Advertising. What is missing though, is the ability to experiment with these services under varying event conditions with real users using their regular phones in real-world environments. Such experiments provide greater insight into user needs for and responsiveness towards context-based advertising applications. However, these event-driven experiments rely on data that arrive from sources such as mobile sensors which have inherent uncertainties associated with them. This effects the interpretation of the outcome of …


On Coordinating Pervasive Persuasive Agents, Budhitama Subagdja, Ah-Hwee Tan May 2014

On Coordinating Pervasive Persuasive Agents, Budhitama Subagdja, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

There is a growing interest in applying multiagent systems for smart-home environment supporting self-caring elderly. In this paper we investigate situations and conditions for coordination for such kind of system. We specify a high level architecture of it based on the notions of beliefs, desires, and intentions for both individual and group behavior of the agents including the human occupant's. The framework enables flexible coordinations among loosely-coupled heterogeneous agents that converse with the user. This work is conducted towards producing a coordination framework for agents and people in such a kind of smart-home environment as mentioned.


Visual Analysis Of Uncertainty In Trajectories, Lu Lu, Nan Cao, Siyuan Liu, Lionel Ni, Xiaoru Yuan, Huamin Qu May 2014

Visual Analysis Of Uncertainty In Trajectories, Lu Lu, Nan Cao, Siyuan Liu, Lionel Ni, Xiaoru Yuan, Huamin Qu

Research Collection School Of Computing and Information Systems

Mining trajectory datasets has many important applications. Real trajectory data often involve uncertainty due to inadequate sampling rates and measurement errors. For some trajectories, their precise positions cannot be recovered and the exact routes that vehicles traveled cannot be accurately reconstructed. In this paper, we investigate the uncertainty problem in trajectory data and present a visual analytics system to reveal, analyze, and solve the uncertainties associated with trajectory samples. We first propose two novel visual encoding schemes called the road map analyzer and the uncertainty lens for discovering road map errors and visually analyzing the uncertainty in trajectory data respectively. …


Simple Effective Named Entity Recognition For Microblogs: Arabic As An Example, Kareem Darwish, Wei Gao May 2014

Simple Effective Named Entity Recognition For Microblogs: Arabic As An Example, Kareem Darwish, Wei Gao

Research Collection School Of Computing and Information Systems

No abstract provided.


Detecting Anomaly Collections Using Extreme Feature Ranks, Hanbo Dai, Feida Zhu, Ee Peng Lim, Hwee Hwa Pang May 2014

Detecting Anomaly Collections Using Extreme Feature Ranks, Hanbo Dai, Feida Zhu, Ee Peng Lim, Hwee Hwa Pang

Research Collection School Of Computing and Information Systems

Detecting anomaly collections is an important task with many applications, including spam and fraud detection. In an anomaly collection, entities often operate in collusion and hold different agendas to normal entities. As a result, they usually manifest collective extreme traits, i.e., members of an anomaly collection are consistently clustered toward the top or bottom ranks on certain features. We therefore propose to detect these anomaly collections by extreme feature ranks. We introduce a novel anomaly definition called Extreme Rank Anomalous Collection or ERAC. We propose a new measure of anomalousness capturing collective extreme traits based on a statistical model. As …


Creating An Information Systems Security Culture Through An Integrated Model Of Employees Compliance, Mohammad I. Merhi May 2014

Creating An Information Systems Security Culture Through An Integrated Model Of Employees Compliance, Mohammad I. Merhi

Theses and Dissertations - UTB/UTPA

Employees’ non-compliance with information systems security policies has been identified as a major threat to organizational data and information systems. This dissertation investigates the process underlying information systems security compliance in organizations with the focus on employees. The process model is complex, comprising many normative, attitudinal, psychological, environmental, and organizational factors. Therefore, the study of information security compliance requires a holistic assessment of all these factors. This dissertation seeks to achieve this objective by offering a comprehensive and integrated model of employee behavior especially focused towards information security compliance. The research framework is influenced by the Reciprocal Determinism Theory which …


An Integrated Model For User Attribute Discovery: A Case Study On Political Affiliation Identification, Swapna Gottipati, Minghui Qiu, Liu Yang, Feida Zhu, Jing Jiang May 2014

An Integrated Model For User Attribute Discovery: A Case Study On Political Affiliation Identification, Swapna Gottipati, Minghui Qiu, Liu Yang, Feida Zhu, Jing Jiang

Research Collection School Of Computing and Information Systems

Discovering user demographic attributes from social media is a problem of considerable interest. The problem setting can be generalized to include three components — users, topics and behaviors. In recent studies on this problem, however, the behavior between users and topics are not effectively incorporated. In our work, we proposed an integrated unsupervised model which takes into consideration all the three components integral to the task. Furthermore, our model incorporates collaborative filtering with probabilistic matrix factorization to solve the data sparsity problem, a computational challenge common to all such tasks. We evaluated our method on a case study of user …


Knowledge Management In An Organisational Climate Of Uncertainty And Change: A Longitudinal Case Study Of An Australian University, Denise Gengatharen Apr 2014

Knowledge Management In An Organisational Climate Of Uncertainty And Change: A Longitudinal Case Study Of An Australian University, Denise Gengatharen

Denise E Gengatharen

Universities are in the knowledge business and are expected to be at the forefront of knowledge management (KM). However, KM in a university is complex given the diversity of stakeholder groups. This is exacerbated in the Australian context by the changing climate of rationalisation, corporatisation and marketisation universities faced in the past decade. This paper investigates KM strategies in an Australian university to uncover barriers to knowledge-sharing among academics. Although the organisational infrastructure supports KM, many academics have not actively embraced it. One reason is that they struggle with KM for operational excellence in the increasing administrative aspects of the …


Hierarchical Interest Graph From Tweets, Pavan Kapanipathi, Prateek Jain, Chitra Venkataramani, Amit P. Sheth Apr 2014

Hierarchical Interest Graph From Tweets, Pavan Kapanipathi, Prateek Jain, Chitra Venkataramani, Amit P. Sheth

Kno.e.sis Publications

Industry and researchers have identified numerous ways to monetize microblogs for personalization and recommendation. A common challenge across these different works is the identification of user interests. Although techniques have been developed to address this challenge, a flexible approach that spans multiple levels of granularity in user interests has not been forthcoming. In this work, we focus on exploiting hierarchical semantics of concepts to infer richer user interests expressed as a Hierarchical Interest Graph. To create such graphs, we utilize users' tweets to first ground potential user interests to structured background knowledge such as Wikipedia Category Graph. We then adapt …


A Trust-Aware System For Personalized User Recommendations In Social Networks, Magdalini Eirinaki, Malamati Louta, Iraklis Varlamis Apr 2014

A Trust-Aware System For Personalized User Recommendations In Social Networks, Magdalini Eirinaki, Malamati Louta, Iraklis Varlamis

Faculty Publications

Social network analysis has recently gained a lot of interest because of the advent and the increasing popularity of social media, such as blogs, social networking applications, microblogging, or customer review sites. In this environment, trust is becoming an essential quality among user interactions and the recommendation for useful content and trustful users is crucial for all the members of the network. In this paper, we introduce a framework for handling trust in social networks, which is based on a reputation mechanism that captures the implicit and explicit connections between the network members, analyzes the semantics and dynamics of these …


The Promises And Challenges Of Innovating Through Big Data And Analytics In Healthcare, Donald E. Wynn, Renée M. E. Pratt Apr 2014

The Promises And Challenges Of Innovating Through Big Data And Analytics In Healthcare, Donald E. Wynn, Renée M. E. Pratt

MIS/OM/DS Faculty Publications

In this article, we present the promises and challenges of big data and analytics (BD&A) in healthcare, informed by our observations of and interviews with healthcare providers in the US and European Union (EU). We then provide a set of recommendations for capitalizing on the extraordinary innovation opportunities available through big data.


Reliability Guided Resource Allocation For Large-Scale Supercomputing Systems, Shruti Umamaheshwaran Apr 2014

Reliability Guided Resource Allocation For Large-Scale Supercomputing Systems, Shruti Umamaheshwaran

Open Access Theses

In high performance computing systems, parallel applications request a large number of resources for long time periods. In this scenario, if a resource fails during the application runtime, it would cause all applications using this resource to fail. The probability of application failure is tied to the inherent reliability of resources used by the application. Our investigation of high performance computing systems operating in the field has revealed a significant difference in the measured operational reliability of individual computing nodes. By adding awareness of the individual system nodes' reliability to the scheduler along with the predicted reliability needs of parallel …


A Farm Management Information System With Task-Specific, Collaborative Mobile Apps And Cloud Storage Services, Jonathan Tyler Welte Apr 2014

A Farm Management Information System With Task-Specific, Collaborative Mobile Apps And Cloud Storage Services, Jonathan Tyler Welte

Open Access Theses

Modern production agriculture is beginning to advance beyond deterministic, scheduled operations between relatively few people to larger scale, information-driven efficiency in order to respond to the challenges of field variability and meet the needs of a growing population. Since no two farms are the same with respect to information and management structure, a specialized farm management information system (FMIS) which is tailored to the realities on the ground of individual farms is likely to be more effective than generalized FMIS available today.

This thesis presents the design of a FMIS using proven user-centered design principles. This approach resulted in the …


A Computer-Based Approach For Identifying Student Conceptual Change, Junchao Yan Apr 2014

A Computer-Based Approach For Identifying Student Conceptual Change, Junchao Yan

Open Access Theses

Misconceptions are commonly encountered in many areas of science and engineering where a to-be-learned concept conflicts with prior knowledge. Conceptual change is an approach for identifying and repairing the misconceptions. One of the ways to promote student conceptual change is providing students with ontological schema training. However, assessment of conceptual change relies on qualitative analysis of student responses. With the exponential growth of qualitative data in the form of graphical representations or written responses, the process of data analysis relying on human experts has become time-consuming and costly. This study took the advantages of natural language processing and machine learning …


A Sandbox Development For Demonstrating Bom Transmission In A Plm And Erp Integrated System, Zhen Zeng Apr 2014

A Sandbox Development For Demonstrating Bom Transmission In A Plm And Erp Integrated System, Zhen Zeng

Open Access Theses

Integrating Product Lifecycle Management (PLM) and Enterprise Resource Planning (ERP) in a company is important. Currently, many companies have difficulties on integrating PLM and ERP systems. This study developed a prototype (sandbox) of PLM and ERP integrated system for demonstrating BOM transmission in a PLM and ERP integrated system, describing key aspects of system integration and BOM transmission. This sandbox will facilitate users' knowledge on how to process transactions in a PLM and ERP integrated system. The BOM accuracy was examined by comparing BOM data in PLM system to BOM data in ERP system after implementing engineering changes. This study …


Automatic Objects Removal For Scene Completion, Jianjun Yang, Yin Wang, Honggang Wang, Kun Hua, Wei Wang, Ju Shen Apr 2014

Automatic Objects Removal For Scene Completion, Jianjun Yang, Yin Wang, Honggang Wang, Kun Hua, Wei Wang, Ju Shen

Computer Science Faculty Publications

With the explosive growth of Web-based cameras and mobile devices, billions of photographs are uploaded to the Internet. We can trivially collect a huge number of photo streams for various goals, such as 3D scene reconstruction and other big data applications. However, this is not an easy task due to the fact the retrieved photos are neither aligned nor calibrated. Furthermore, with the occlusion of unexpected foreground objects like people, vehicles, it is even more challenging to find feature correspondences and reconstruct realistic scenes. In this paper, we propose a structure-based image completion algorithm for object removal that produces visually …


Leveraging Social Media And Web Of Data For Crisis Response Coordination, Carlos Castillo, Fernando Diaz, Hemant Purohit Apr 2014

Leveraging Social Media And Web Of Data For Crisis Response Coordination, Carlos Castillo, Fernando Diaz, Hemant Purohit

Kno.e.sis Publications

There is an ever increasing number of users in social media (1B+ Facebook users, 500M+ Twitter users) and ubiquitous mobile access (6B+ mobile phone subscribers) who share their observations and opinions. In addition, the Web of Data and existing knowledge bases keep on growing at a rapid pace. In this scenario, we have unprecedented opportunities to improve crisis response by extracting social signals, creating spatio-temporal mappings, performing analytics on social and Web of Data, and supporting a variety of applications. Such applications can help provide situational awareness during an emergency, improve preparedness, and assist during the rebuilding/recovery phase of a …