Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 61

Full-Text Articles in Entire DC Network

The Construction And Validation Of An Instructor Learning Analytics Implementation Model To Support At-Risk Students, Holly M. Mckee Dec 2015

The Construction And Validation Of An Instructor Learning Analytics Implementation Model To Support At-Risk Students, Holly M. Mckee

CCE Theses and Dissertations

With the widespread use of learning analytics tools, there is a need to explore how these technologies can be used to enhance teaching and learning. Little research has been conducted on what human processes are necessary to facilitate meaningful adoption of learning analytics. The research problem is that there is a lack of evidence-based guidance on how instructors can effectively implement learning analytics to support academically at-risk students with the purpose of improving learning outcomes. The goal was to develop and validate a model to guide instructors in the implementation of learning analytics tools to support academically at-risk students with …


An Examination Of Service Level Agreement Attributes That Influence Cloud Computing Adoption, Howard Gregory Hamilton Jun 2015

An Examination Of Service Level Agreement Attributes That Influence Cloud Computing Adoption, Howard Gregory Hamilton

CCE Theses and Dissertations

Cloud computing is perceived as the technological innovation that will transform future investments in information technology. As cloud services become more ubiquitous, public and private enterprises still grapple with concerns about cloud computing. One such concern is about service level agreements (SLAs) and their appropriateness.

While the benefits of using cloud services are well defined, the debate about the challenges that may inhibit the seamless adoption of these services still continues. SLAs are seen as an instrument to help foster adoption. However, cloud computing SLAs are alleged to be ineffective, meaningless, and costly to administer. This could impact widespread acceptance …


Service Quality And Perceived Value Of Cloud Computing-Based Service Encounters: Evaluation Of Instructor Perceived Service Quality In Higher Education In Texas, Eges Egedigwe Jun 2015

Service Quality And Perceived Value Of Cloud Computing-Based Service Encounters: Evaluation Of Instructor Perceived Service Quality In Higher Education In Texas, Eges Egedigwe

CCE Theses and Dissertations

Cloud computing based technology is becoming increasingly popular as a way to deliver quality education to community colleges, universities and other organizations. At the same time, compared with other industries, colleges have been slow on implementing and sustaining cloud computing services on an institutional level because of budget constraints facing many large community colleges, in addition to other obstacles. Faced with this challenge, key stakeholders are increasingly realizing the need to focus on service quality as a measure to improve their competitive position in today's highly competitive environment. Considering the amount of study done with cloud computing in education, very …


Investigating Categorization Preferences For Online Dating Sites, Scott Morrissette May 2015

Investigating Categorization Preferences For Online Dating Sites, Scott Morrissette

CCE Theses and Dissertations

The purpose of the study was to determine whether a three-category (3C) system for classifying profiles on online dating sites provides advantages over a two-category (2C) system as decision makers evaluate a long list of profiles. Two groups of single heterosexual or bisexual women ages 20 to 30 reviewed a list of 60 male profiles on simulated online dating sites to choose which profiled man they would most like to learn more about. One group (n = 53) evaluated the profiles using a 2C system; the other group (n = 56) used a 3C system. After making their choice, women …


A Dynamic Behavioral Biometric Approach To Authenticate Users Employing Their Fingers To Interact With Touchscreen Devices, Arturo Ponce May 2015

A Dynamic Behavioral Biometric Approach To Authenticate Users Employing Their Fingers To Interact With Touchscreen Devices, Arturo Ponce

CCE Theses and Dissertations

The use of mobile devices has extended to all areas of human life and has changed the way people work and socialize. Mobile devices are susceptible to getting lost, stolen, or compromised. Several approaches have been adopted to protect the information stored on these devices. One of these approaches is user authentication. The two most popular methods of user authentication are knowledge based and token based methods but they present different kinds of problems.

Biometric authentication methods have emerged in recent years as a way to deal with these problems. They use an individual’s unique characteristics for identification and have …


Efficient Variations Of The Quality Threshold Clustering Algorithm, Frank Loforte Jr. May 2015

Efficient Variations Of The Quality Threshold Clustering Algorithm, Frank Loforte Jr.

CCE Theses and Dissertations

Clustering gene expression data such that the diameters of the clusters formed are no greater than a specified threshold prompted the development of the Quality Threshold Clustering (QTC) algorithm. It iteratively forms clusters of non-increasing size until all points are clustered; the largest cluster is always selected first. The QTC algorithm applies in many other domains that require a similar quality guarantee based on cluster diameter. The worst-case complexity of the original QTC algorithm is (n5). Since practical applications often involve large datasets, researchers called for more efficient versions of the QTC algorithm.

This dissertation aimed to develop …


An Information Privacy Examination Of The Practices Of Pharmaceutical Companies Regarding Use Of Information Collected Through Their Websites, Shonda Dellena Brown May 2015

An Information Privacy Examination Of The Practices Of Pharmaceutical Companies Regarding Use Of Information Collected Through Their Websites, Shonda Dellena Brown

CCE Theses and Dissertations

Consumers have begun to take a more proactive approach to their healthcare by accessing pharmaceutical companies Websites to obtain health and drug information, support groups, rebates, coupons, as well as free drug trials. In exchange for these benefits, companies require consumers to voluntarily disclose information. However, research has shown that consumers continue to be concerned about how their information is managed, used, and distributed by companies, especially if accessed via the Web. To date, there has been limited empirical research to examine the actual online practices of companies when it comes to privacy, especially those of pharmaceutical companies. Using Delphi …


Investigating Roles Of Information Security Strategy, Roger V. Seeholzer May 2015

Investigating Roles Of Information Security Strategy, Roger V. Seeholzer

CCE Theses and Dissertations

A fundamental understanding of the complexities comprising an information security strategy (ISS) in an organization is lacking. Most ISS implementations in government organizations equate anti-virus or installing a firewall to that of an ISS. While use of hardware and software forms a good defense; neither comprises the essence of an ISS. The ISS best integrates with business and information system strategies from the start, forming and shaping the direction of overall strategy synergistically within large government organizations. The researcher used grounded theory and investigated what a large government organization’s choices were with the differing roles an information security professional (ISP) …


An Empirical Development Of Critical Value Factors For System Quality And Information Quality In Business Intelligence Systems Implementations, Paul Dooley May 2015

An Empirical Development Of Critical Value Factors For System Quality And Information Quality In Business Intelligence Systems Implementations, Paul Dooley

CCE Theses and Dissertations

Business intelligence (BI) systems have been widely recognized as a leading technology for many years. However, despite the high priority and importance placed on BI, there has been a significant lack of BI system implementation (BISI) success. BI systems are not considered to be conventional information systems (IS) and often rely on the integration of a complex information infrastructure. Consequently, the degree of information quality (IQ) and system quality (SQ) have not met expectations for BISI success.

This study was designed to determine how an organization may gain benefits in the context of BISI by uncovering the antecedents and critical …


The Importance Of A Pictorial Medical History In Assisting Medical Diagnosis Of Individuals With Intellectual Disabilities: A Telemedicine Approach, Grace Bonanno May 2015

The Importance Of A Pictorial Medical History In Assisting Medical Diagnosis Of Individuals With Intellectual Disabilities: A Telemedicine Approach, Grace Bonanno

CCE Theses and Dissertations

When face-to-face physical medical exams are not possible, virtual physical exams, in the form of a pictorial medical exam/history, can be substituted, and telemedicine can be the means to deliver these virtual exams. The goal of this work was to determine if presence in the form of a visual and/or pictorial medical history can be of benefit to clinicians in the diagnosis of medical conditions of individuals with developmental disabilities (DDs) and/or intellectual disabilities (IDs), in particular those who cannot, because of their cognitive and/or physical disabilities, verbally relate their illness to a clinician. Virtual exams can also be useful …


Locating Potential Aspect Interference Using Clustering Analysis, Brian Todd Bennett May 2015

Locating Potential Aspect Interference Using Clustering Analysis, Brian Todd Bennett

CCE Theses and Dissertations

Software design continues to evolve from the structured programming paradigm of the 1970s and 1980s and the object-oriented programming (OOP) paradigm of the 1980s and 1990s. The functional decomposition design methodology used in these paradigms reduced the prominence of non-functional requirements, which resulted in scattered and tangled code to address non-functional elements. Aspect-oriented programming (AOP) allowed the removal of crosscutting concerns scattered throughout class code into single modules known as aspects. Aspectization resulted in increased modularity in class code, but introduced new types of problems that did not exist in OOP. One such problem was aspect interference, in which aspects …


Image Enhancement Of Cancerous Tissue In Mammography Images, Richard Thomas Richardson Apr 2015

Image Enhancement Of Cancerous Tissue In Mammography Images, Richard Thomas Richardson

CCE Theses and Dissertations

This research presents a framework for enhancing and analyzing time-sequenced mammographic images for detection of cancerous tissue, specifically designed to assist radiologists and physicians with the detection of breast cancer. By using computer aided diagnosis (CAD) systems as a tool to help in the detection of breast cancer in computed tomography (CT) mammography images, previous CT mammography images will enhance the interpretation of the next series of images. The first stage of this dissertation applies image subtraction to images from the same patient over time. Image types are defined as temporal subtraction, dual-energy subtraction, and Digital Database for Screening Mammography …


Affect And Online Privacy Concerns, David Charles Castano Apr 2015

Affect And Online Privacy Concerns, David Charles Castano

CCE Theses and Dissertations

The purpose of this study was to investigate the influence of affect on privacy concerns and privacy behaviors. A considerable amount of research in the information systems field argues that privacy concerns, usually conceptualized as an evaluation of privacy risks, influence privacy behaviors. However, recent theoretical work shows that affect, a pre-cognitive evaluation, has a significant effect on preferences and choices in risky situations. Affect is contrasted with cognitive issues in privacy decision making and the role of affective versus cognitive-consequentialist factors is reviewed in privacy context.

A causal model was developed to address how affect influences privacy concerns and …


Governance And Organizational Sponsorship As Success Factors In Free/Libre And Open Source Software Development: An Empirical Investigation Using Structural Equation Modeling, Aleksandr Blekh Apr 2015

Governance And Organizational Sponsorship As Success Factors In Free/Libre And Open Source Software Development: An Empirical Investigation Using Structural Equation Modeling, Aleksandr Blekh

CCE Theses and Dissertations

Recent advances in information technologies and subsequent explosive growth of computer software use in practically all aspects of everyday life provide tremendous opportunities and benefits for improving people's lives. However, significant proportion of software projects represents cancelled, abandoned or otherwise failed projects. This situation exists not only in commercial software products or government information systems, but also in an increasingly popular and important domain of free/libre and open source software (FLOSS).

The problem of failures in software development projects requires identification and understanding of the factors of success and their interrelationships. Practice and previous research suggest that governance of software …


Immunology Inspired Detection Of Data Theft From Autonomous Network Activity, Theodore O. Cochran Apr 2015

Immunology Inspired Detection Of Data Theft From Autonomous Network Activity, Theodore O. Cochran

CCE Theses and Dissertations

The threat of data theft posed by self-propagating, remotely controlled bot malware is increasing. Cyber criminals are motivated to steal sensitive data, such as user names, passwords, account numbers, and credit card numbers, because these items can be parlayed into cash. For anonymity and economy of scale, bot networks have become the cyber criminal’s weapon of choice. In 2010 a single botnet included over one million compromised host computers, and one of the largest botnets in 2011 was specifically designed to harvest financial data from its victims. Unfortunately, current intrusion detection methods are unable to effectively detect data extraction techniques …


Usable Security Using Goms: A Study To Evaluate And Compare The Usability Of User Accounts On E-Government Websites, Amran Din Apr 2015

Usable Security Using Goms: A Study To Evaluate And Compare The Usability Of User Accounts On E-Government Websites, Amran Din

CCE Theses and Dissertations

The term e-Government refers to providing citizens a series of services that can be conveniently conducted over the Internet. However, the potential to redefine and transform e-Government increasingly relies on citizens successfully establishing and managing a user account profile online. E-Government has not adequately addressed user-centric designs for social inclusion of all citizens on e-Government websites. There is a lack of research on the usability of user account management, and a clear lack of innovation in incorporating user-friendly authentication interfaces to accommodate a diverse user population given the wealth of existing research in web authentication techniques within Identity Management. The …


News Feeds Clustering Research Study, Haytham Abuel-Futuh Apr 2015

News Feeds Clustering Research Study, Haytham Abuel-Futuh

CCE Theses and Dissertations

With over 0.25 billion web pages hosted in the World Wide Web, it is virtually impossible to navigate through the Internet. Many applications try to help users achieve this task. For example, search engines build indexes to make the entire World Wide Web searchable, and news curators allow users to browse topics of interest on different structured sites. One problem that arises for these applications and others with similar goals is identifying documents with similar contents. This helps the applications show users documents with unique contents as well as group various similar documents under similar topics. There has been a …


Formative Research On An Instructional Design Theory For Virtual Patients In Clinical Education: A Pressure Ulcer Prevention Clinical Reasoning Case, Manon Maitland Schladen Mar 2015

Formative Research On An Instructional Design Theory For Virtual Patients In Clinical Education: A Pressure Ulcer Prevention Clinical Reasoning Case, Manon Maitland Schladen

CCE Theses and Dissertations

Despite advances in health care over the past decades, medical errors and omissions remain significant threats to patient safety and health. A large number of these mistakes are made by trainees, persons who are just beginning to build the case-based experiences that will transform them from novices to expert practitioners. Clinicians use both intuitive and deductive problem-solving skills in caring for patients and they acquire expertise in applying these skills through interaction with many and varied cases.

The contemporary heath care environment, with decreased lengths of stay for patients and reduced duty hours for trainees, makes getting optimal patient exposure …


An Enhanced Mapreduce Workload Allocation Tool For Spot Market Resources, John Stephen Hudzina Mar 2015

An Enhanced Mapreduce Workload Allocation Tool For Spot Market Resources, John Stephen Hudzina

CCE Theses and Dissertations

When a cloud user allocates a cluster to execute a map-reduce workload, the user must determine the number and type of virtual machine instances to minimize the workload's financial cost. The cloud user may rent on-demand instances at a fixed price or spot instances at a variable price to execute the workload. Although the cloud user may bid on spot virtual machine instances at a reduced rate, the spot market auction may delay the workload's start or terminate the spot instances before the workload completes. The cloud user requires a forecast for the workload's financial cost and completion time to …


The Impact Of Image Synonyms In Graphical-Based Authentication Systems, Jonathan William Sparks Mar 2015

The Impact Of Image Synonyms In Graphical-Based Authentication Systems, Jonathan William Sparks

CCE Theses and Dissertations

Traditional text-based passwords used for authentication in information systems have several known issues in the areas of usability and security. Research has shown that when users generate passwords for systems, they tend to create passwords that are subject to compromise more so than those created randomly by the computer. Research has also shown that users have difficulty remembering highly secure, randomly created, text-based passwords.

Graphical-based passwords have been shown to be highly memorable for users when applied to system authentication. However, graphical-based authentication systems require additional cognitive load to recognize and enter a password compared to traditional text-based authentication that …


An Interpretive Phenomenological Analysis Inquiry Into Facebook Newcomer Motivations For Participatory Activities, Kristin Raub Mar 2015

An Interpretive Phenomenological Analysis Inquiry Into Facebook Newcomer Motivations For Participatory Activities, Kristin Raub

CCE Theses and Dissertations

This qualitative study provided insight into the phenomenon of newcomers in social networking, in particular, to understand what role specific Facebook features play in motivating content sharing and contribution among newcomers. Research indicated that the first several months or years of social networking site (SNS) membership are the most crucial in terms of indicating long-term participation and commitment to the SNS. Long-term participation is specifically manifested through interactions with peers who are members of the same website and through interactivity such as content sharing and contribution. A number of quantitative studies have focused on motivations for user contribution in social …


A Makeover For The Captured Lecture: Applying Multimedia Learning Principles To Lecture Video, Richard Alan Lamb Mar 2015

A Makeover For The Captured Lecture: Applying Multimedia Learning Principles To Lecture Video, Richard Alan Lamb

CCE Theses and Dissertations

Making video recordings of large classroom lectures and putting them online is increasingly common in distance and blended learning courses. However, the best way to use lecture video is not well understood. Using long streams of one-way communication is not consistent with best practices in online learning. During lectures, students assume a largely passive role. They think faster than instructors speak, so boredom and daydreaming are common. Yet, when complex or novel ideas are presented, students may have inadequate time to encode, organize, and integrate the input with prior experience. Especially for students with low prior knowledge of the subject …


Examining Social Network Site Usage By Older Adults: A Phenomenological Approach, Betsy Baugess Mar 2015

Examining Social Network Site Usage By Older Adults: A Phenomenological Approach, Betsy Baugess

CCE Theses and Dissertations

The Internet has infiltrated our daily lives in many ways. Social networking on the Internet is a great example of how the Internet has expanded interpersonal communication. Many individuals have made social networking sites, like FaceBook and Twitter, an essential part of their lives and use these platforms to communicate daily. Until recently, young people have been the primary participants in this fast-growing phenomenon, and older adults' participation in the Internet, specifically social networking sites, has lagged far behind. However, in recent years, there has been a noteworthy increase in the number of older adult participants. The increase in older …


A Heuristic Evolutionary Method For The Complementary Cell Suppression Problem, Hira B. Herrington Feb 2015

A Heuristic Evolutionary Method For The Complementary Cell Suppression Problem, Hira B. Herrington

CCE Theses and Dissertations

Cell suppression is a common method for disclosure avoidance used to protect sensitive information in two-dimensional tables where row and column totals are published along with non-sensitive data. In tables with only positive cell values, cell suppression has been demonstrated to be non-deterministic NP-hard. Therefore, finding more efficient methods for producing low-cost solutions is an area of active research.

Genetic algorithms (GA) have shown to be effective in finding good solutions to the cell suppression problem. However, these methods have the shortcoming that they tend to produce a large proportion of infeasible solutions. The primary goal of this research was …


Role-Based Access Control Administration Of Security Policies And Policy Conflict Resolution In Distributed Systems, Stephen Sakawa Kibwage Feb 2015

Role-Based Access Control Administration Of Security Policies And Policy Conflict Resolution In Distributed Systems, Stephen Sakawa Kibwage

CCE Theses and Dissertations

Security models using access control policies have over the years improved from Role-based access control (RBAC) to newer models which have added some features like support for distributed systems and solving problems in older security policy models such as identifying policy conflicts. Access control policies based on hierarchical roles provide more flexibility in controlling system resources for users. The policies allow for granularity when extended to have both allow and deny permissions as well as weighted priority attribute for the rules in the policies. Such flexibility allows administrators to succinctly specify access for their system resources but also prone to …


Identifying Unethical Personally Identifiable Information (Pii) Privacy Violations Committed By Is/It Practitioners: A Comparison To Computing Moral Exemplars, Mark H. Rosenbaum Feb 2015

Identifying Unethical Personally Identifiable Information (Pii) Privacy Violations Committed By Is/It Practitioners: A Comparison To Computing Moral Exemplars, Mark H. Rosenbaum

CCE Theses and Dissertations

In some instances, Information Systems and Information Technology (IS/IT) practitioners have been noted to commit privacy violations to Personally Identifiable Information (PII). However, computing exemplars, due to their notable dispositional Hallmark Features of morality, understandings of ethical abstractions, and other components that comprise their virtuous makeups, are theoretically less likely to commit privacy violations to PII. This research attempted to verify if those IS/IT practitioners who identify with some of the Hallmark Features of moral and computing exemplar were less willing to commit privacy violations to PII than were those IS/IT practitioners that did not identify themselves with some of …


The Effect Of Computerized Cognitive Training On The Working Memory And Mathematics Achievement Of Low Achievers, Shalette Ashman-East Jan 2015

The Effect Of Computerized Cognitive Training On The Working Memory And Mathematics Achievement Of Low Achievers, Shalette Ashman-East

CCE Theses and Dissertations

Computerized cognitive training is recognized as an appropriate tool in enhancing working memory in individuals with and without physical limitations. Previous researchers have examined the application of computerized cognitive training in stroke patients, children suffering from ADHD, and older adults. Presently, there is a lack of controlled studies regarding computerized cognitive training in low-achieving primary school students. The goal of this study was to examine the interactions among working memory, computerized cognitive training and academic achievement. Specifically, the study sought to determine whether low-achieving primary school students would significantly improve their mathematics achievement (as measured by the Grade Four Literacy …


Dynamic Game-Theoretic Models To Determine The Value Of Intrusion Detection Systems In The Face Of Uncertainty, David Paul Moured Jan 2015

Dynamic Game-Theoretic Models To Determine The Value Of Intrusion Detection Systems In The Face Of Uncertainty, David Paul Moured

CCE Theses and Dissertations

Firms lose millions of dollars every year to cyber-attacks and the risk to these companies is growing exponentially. The threat to monetary and intellectual property has made Information Technology (IT) security management a critical challenge to firms. Security devices, including Intrusion Detections Systems (IDS), are commonly used to help protect these firms from malicious users by identifying the presence of malicious network traffic. However, the actual value of these devices remains uncertain among the IT security community because of the costs associated with the implementation of different monitoring strategies that determine when to inspect potentially malicious traffic and the costs …


Design And Development Of A Framework For Traffic Management In A Global Manufacturing Enterprise: The American Standard Case Study, Nathaniel J. Melby Jan 2015

Design And Development Of A Framework For Traffic Management In A Global Manufacturing Enterprise: The American Standard Case Study, Nathaniel J. Melby

CCE Theses and Dissertations

Managed Bandwidth Services (MBSs) use Quality of Service (QoS) guarantees to effectively control traffic flows and reduce network delay. In the past, the provision of MBS in a global manufacturing enterprise was a difficult task for network administrators. However, advances in recently emerging technologies, such as Multiprotocol Label Switching (MPLS), Generalized Multiprotocol Label Switching (GMPLS), Integrated Services (IntServ), Differentiated Services (DiffServ), and Constraint-based Routing (CBR), hold promise to make MBS implementation more manageable. QoS technologies, such as DiffServ and IntServ, offer the benefits of better application performance and delivery of reliable network service. As a consequence of network traffic loads, …


Digital Forensics Tool Interface Visualization, Roberto A. Altiero Jan 2015

Digital Forensics Tool Interface Visualization, Roberto A. Altiero

CCE Theses and Dissertations

Recent trends show digital devices utilized with increasing frequency in most crimes committed. Investigating crime involving these devices is labor-intensive for the practitioner applying digital forensics tools that present possible evidence with results displayed in tabular lists for manual review. This research investigates how enhanced digital forensics tool interface visualization techniques can be shown to improve the investigator's cognitive capacities to discover criminal evidence more efficiently. This paper presents visualization graphs and contrasts their properties with the outputs of The Sleuth Kit (TSK) digital forensic program. Exhibited is the textual-based interface proving the effectiveness of enhanced data presentation. Further demonstrated …