Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Entire DC Network

Application Of Big Data Technology, Text Classification, And Azure Machine Learning For Financial Risk Management Using Data Science Methodology, Oluwaseyi A. Ijogun Jan 2023

Application Of Big Data Technology, Text Classification, And Azure Machine Learning For Financial Risk Management Using Data Science Methodology, Oluwaseyi A. Ijogun

Electronic Theses and Dissertations

Data science plays a crucial role in enabling organizations to optimize data-driven opportunities within financial risk management. It involves identifying, assessing, and mitigating risks, ultimately safeguarding investments, reducing uncertainty, ensuring regulatory compliance, enhancing decision-making, and fostering long-term sustainability. This thesis explores three facets of Data Science projects: enhancing customer understanding, fraud prevention, and predictive analysis, with the goal of improving existing tools and enabling more informed decision-making. The first project examined leveraged big data technologies, such as Hadoop and Spark, to enhance financial risk management by accurately predicting loan defaulters and their repayment likelihood. In the second project, we investigated …


Blockchain Securities Issues: Decentralized Identity System With Key Management Perspective, Olalekan O. Adaramola Jan 2023

Blockchain Securities Issues: Decentralized Identity System With Key Management Perspective, Olalekan O. Adaramola

Electronic Theses and Dissertations

Blockchain was created many years ago to solve the problems of data transfer Integrity, several years later the issues persist. Blockchain securities are one of the most important considerations to be investigated, and data integrity is about ensuring the accuracy and validity of messages such that when they are read, they are the same as when they were first written. It is of the opinion that passing information across from one person to another cannot be the same as it was first said at the onset. Our work investigated Blockchain security issues, studying Integrity emanating from transactions across the blocks …


Working Here, There, And Everyware: The Impact Of Virtual Work On Employee Belonging, Martha Davis Jan 2022

Working Here, There, And Everyware: The Impact Of Virtual Work On Employee Belonging, Martha Davis

Electronic Theses and Dissertations

Globalization, improvements in information and communications technologies, and the COVID-19 outbreak have increased the prevalence of virtual work arrangements. This change in the workforce presents both opportunities and challenges to employees and their organizations, transforming how organizations operate and how workers interact with each other. This shift to more virtual work has a high likelihood of impacting other fundamental human motivations, such as the need to belong, which has significant implications for an employee’s well-being and the broader organization’s health. This study asks the question: How do collaborative technologies impact virtual employee belonging? The study proposes a conceptual framework of …


Decision-Making Framework For Circular Economy In Remanufacturing, Saleh Maffoudh Bagalagel Oct 2021

Decision-Making Framework For Circular Economy In Remanufacturing, Saleh Maffoudh Bagalagel

Electronic Theses and Dissertations

Product recovery and remanufacturing have received increasing attention in the past two decades due to environmental, legal and economic drivers. The concept of reverse logistics has evolved from an initiative to recycle raw materials such as paper and glass to a broad sustainable product recovery and remanufacturing approach to enable a transition to circular economy. Advanced manufacturing companies need to develop smart manufacturing-remanufacturing systems to maximize product value recovery utilizing Industry 4.0 principles. Research articles have accumulated over the years to suggest solutions to many product recovery and remanufacturing implementation problems. However, the common case of a family of products …


Work Order And Subassembly Identification And Tracking System, Israa El-Sabbagh Jul 2021

Work Order And Subassembly Identification And Tracking System, Israa El-Sabbagh

Electronic Theses and Dissertations

The research encompassed in this thesis includes the development of a work order and subassembly identification and tracking software system created in-house and tested at SPM Automation (Canada) Inc. The research is motivated by the significant losses the company is enduring and the recurring problems occurring at the facility (i.e., excess inventory, late ordering, reordering, misplaced components, etc.). These problems are critical in the progress and profits of the company.

An extensive literature review was completed, and the research gaps were presented. The optimal work order and subassembly process was created using Process Mapping Methodology, Cause-and-Effect Diagrams, and 5Why Analysis. …


Factors Affecting Perceptions Of Cybersecurity Readiness Among Workgroup It Managers, Thomas A. Chapman Jan 2019

Factors Affecting Perceptions Of Cybersecurity Readiness Among Workgroup It Managers, Thomas A. Chapman

Electronic Theses and Dissertations

The last decade has seen a dramatic increase in the number, frequency, and scope of cyberattacks, both in the United States and abroad. This upward trend necessitates that a significant aspect of any organization’s information systems strategy involves having a strong cybersecurity profile. Inherent in such a posture is the need to have IT managers who are experts in their field and who are willing and able to employ best practices and educate their users. Furthermore, IT managers need to have awareness of the technology landscape in and around their organizations. After many years of cybersecurity research, large corporations have …


Three Studies On Cybersecurity Disclosure And Assurance, Patricia Navarro Velez Jan 2019

Three Studies On Cybersecurity Disclosure And Assurance, Patricia Navarro Velez

Electronic Theses and Dissertations

This dissertation comprises three experimental studies that explore how management's financial disclosure behavior and security strategies influence the costs associated with cybersecurity breaches. The first study examines the cost of litigation in connection with cybersecurity incidents. The purpose of this study is to determine how the characteristics and content of cybersecurity incidents' disclosure affects jurors' liability assessments. Specifically, this study explores how jurors react to management timeliness in disclosing the incident and the plausibility of the explanations provided to justify the disclosure strategy. The second and third studies explore the value relevance of cybersecurity risk management (CRM) assurance. In particular, …


Digital Forensic Tools & Cloud-Based Machine Learning For Analyzing Crime Data, Majeed Kayode Raji Jan 2018

Digital Forensic Tools & Cloud-Based Machine Learning For Analyzing Crime Data, Majeed Kayode Raji

Electronic Theses and Dissertations

Digital forensics is a branch of forensic science in which we can recreate past events using forensic tools for legal measure. Also, the increase in the availability of mobile devices has led to their use in criminal activities. Moreover, the rate at which data is being generated has been on the increase which has led to big data problems. With cloud computing, data can now be stored, processed and analyzed as they are generated. This thesis documents consists of three studies related to data analysis. The first study involves analyzing data from an android smartphone while making a comparison between …


Custom Windows Patching Methodology - Comparative Analysis, Brent Michael Henderson Jan 2018

Custom Windows Patching Methodology - Comparative Analysis, Brent Michael Henderson

Electronic Theses and Dissertations

Windows Server Update Services has been a common mainstay among organizations with a heavy footprint of Windows operating systems since it was originally released as Software Update Services in 2002. While the product has grown in scope, the primary allure remains the same: WSUS offers organizations greater control over the patches that are released to their environment and saves bandwidth by allowing a centralized device to download and offer patches to internal clients rather than having each of those clients download the content they require from the Internet. Unfortunately, the product has a structural limitation in that it lacks the …


Are You Ready? A Proposed Framework For The Assessment Of Digital Forensic Readiness, Andres Felipe Diaz Lopez Jan 2017

Are You Ready? A Proposed Framework For The Assessment Of Digital Forensic Readiness, Andres Felipe Diaz Lopez

Electronic Theses and Dissertations

This dissertation develops a framework to assess Digital Forensic Readiness (DFR) in organizations. DFR is the state of preparedness to obtain, understand, and present digital evidence when needed. This research collects indicators of digital forensic readiness from a systematic literature review. More than one thousand indicators were found and semantically analyzed to identify the dimensions to where they belong. These dimensions were subjected to a q-sort test and validated using association rules, producing a preliminary framework of DFR for practitioners. By classifying these indicators into dimensions, it was possible to distill them into 71 variables further classified into either extant …


Examining And Exposing The Darknet, Ton H. Don Jan 2017

Examining And Exposing The Darknet, Ton H. Don

Electronic Theses and Dissertations

This thesis consists of two studies; the first study is “Diving into the Darknet” and the second is “Exposing the Darknet on Mobile Devices”. The Darknet is a network of hidden sites and services which are built based on anonymity. In “Diving into the Darknet”, we applied different data science methods to establish the relationships between the data in the data set. This data set has information related to seller, drug types, and transactions. Additionally, we used Tableau to visualize the data set. For the second study, we took a digital forensics perspective of the Darknet. Orfox and Orbot, a …


An Analysis Of Faculty And Staff's Identification Of Malware Threats, Malora Quesinberry Aug 2016

An Analysis Of Faculty And Staff's Identification Of Malware Threats, Malora Quesinberry

Electronic Theses and Dissertations

This document presents findings related to faculty and staff member’s ability to identify malware threats. This study involved discovering the most common incidents of malware threats to higher education systems. From this research, eight categories of malware were identified to be the most common threats to higher education systems. This document also describes the impact of malware intrusions on higher education systems to emphasis the importance of recognizing malware threats. Faculty and staff members at a midsize southeastern university were presented with realistic scenarios to determine the ability to identify malware threats. The results indicate malware categories such as virus, …


The Landwarnet School, The Army Learning Model, And Appreciative Inquiry: How Is A Centralized Training Organization Improved By Introducing Decentralization?, Lisa Jayne Stamper Jan 2015

The Landwarnet School, The Army Learning Model, And Appreciative Inquiry: How Is A Centralized Training Organization Improved By Introducing Decentralization?, Lisa Jayne Stamper

Electronic Theses and Dissertations

This exploratory, qualitative case study describes how a centralized training organization (LandWarNet School) was improved by introducing decentralization (Army Learning Model) toward “the best competitive position” or "sweet spot," defined by Brafman and Beckstrom (2006) as “enough decentralization for creativity, but sufficient structure and controls to ensure consistency” (pp. 189, 191). Any presence of the six chaordic elements of a decentralized organization, as described by Hock (1999), was also considered.

LandWarNet School (LWNS) trains approximately 6000 US Army Soldiers annually and is centrally organized. The new Army Learning Model (ALM) is a vision for a more decentralized training approach where …


Stakeholder Perceptions Of A University Response To Crisis, Katherine M. Kelley Aug 2014

Stakeholder Perceptions Of A University Response To Crisis, Katherine M. Kelley

Electronic Theses and Dissertations

The purpose of this study was to contribute to current theory-driven research in crisis communication by examining the perceptions of multiple stakeholder groups to a university crisis response strategy. Two main questions were examined in this dissertation. The first question attempted to determine if a significant difference existed between stakeholder groups and their perception of university reputation, responsibility for the crisis, and potential supportive behaviors toward the university following the university’s response to a crisis. The second asked if Coombs’s Situational Crisis Communication Theory is a practical application for universities.

The participants were from 4 stakeholder groups associated with a …


Financial Forest, Karen Carlson Jan 2014

Financial Forest, Karen Carlson

Electronic Theses and Dissertations

Regular savings behavior is critical for low-income Americans to achieve financial mobility. New technology tools are being used to improve personal awareness and attention to financial goals. This thesis reviews mobile learning (mLearning) research and leading commercial personal finance smartphone apps, both of which inform the design of Financial Forest, a savings app. Participants in the 4-week Financial Forest savings study are found to have a statistically significant improved perception of the difficulty of building an emergency fund.


Consumer Engagement In Travel-Related Social Media, Xu Li Jan 2013

Consumer Engagement In Travel-Related Social Media, Xu Li

Electronic Theses and Dissertations

The term of "consumer engagement" is extensively used in the digital era. It is believed that engaged consumers play an important role in products/services referral and recommendation, new product/service development and experience/value co-creation. Although the notion of consumer engagement sounds compelling, it is not fully developed in theory. Different interpretations coexist, resulting in confusion and misuse of the concept. This study attempts to define consumer engagement and develop a conceptual framework of consumer engagement, addressing antecedents of consumer engagement in online context. Moreover, some situational and social media usage-related factors are incorporated into the framework. A set of propositions are …


The Impact Of The User-It Artifact Interaction On Technology Implementation And Value: Mobile Social Networking And Mobile Social Capital, Donghyun Kim Jan 2012

The Impact Of The User-It Artifact Interaction On Technology Implementation And Value: Mobile Social Networking And Mobile Social Capital, Donghyun Kim

Electronic Theses and Dissertations

Despite investment and cutting-edge features, the majority of new mobile phone subscribers have adopted low-cost handsets instead of the latest mobile devices (Karjaluoto et al., 2005). According to the U.S. Census Bureau report, only 37% of cell phone users selected a smartphone in 2007. The Census Bureau forecasted the figure would increase by less than 10% in 2008. However, only 24% of cell phone users owned a smartphone in 2010, 27 % in 2011 and 30% in 2012. Therefore, the purpose of this study is to propose a conceptual model of the impact of mobile social capital on mobile networks …


Customer Relationship Marketing By Destination Marketing Organizations Does It Lead To Favorable Behavioral Intentions To Meeting Planners?, Jumyong Lee Jan 2011

Customer Relationship Marketing By Destination Marketing Organizations Does It Lead To Favorable Behavioral Intentions To Meeting Planners?, Jumyong Lee

Electronic Theses and Dissertations

In convention market, one of the fastest growing sectors in hospitality industry, meeting planners play an important role to select a destination for their event. Therefore, a good relationship with them can be a competitive advantage for a convention destination considering a fierce competition among the destinations. The objective of this study is to develop an empirically valid relationship marketing (RM) model that would verify the antecedents, mediators, and consequence of the relationship between the destination marketing organization (DMO) and meeting planners. This study found three antecedents (i.e., customer orientation, familiarity, and reputation) of the RM mediating constructs that consist …