Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

PDF

MS Computer and Information Technology

Articles 1 - 30 of 135

Full-Text Articles in Entire DC Network

An Analysis Of User-Centric Identity Technology Trends, Openid's First Act, Peter Motykowski Nov 2011

An Analysis Of User-Centric Identity Technology Trends, Openid's First Act, Peter Motykowski

Regis University Student Publications (comprehensive collection)

Identity technologies within Internet applications have evolved at an aggressive pace over the past decade. As a result, a variety of user-centric identity management technologies are available on the Internet today. The user-centric identity technology realm has become a fragmented ecosystem of standards, techniques, and technical approaches to identity management. A symptom of this fragmentation is the sluggish adoption of user-centric identity technologies by Internet users. A study titled, An Analysis of User-Centric Identity Technology Trends, OpenID"â„¢s First Act, aims to reveal identity technology adoption patterns of users that engage in the use of Internet applications secured by an authentication …


Drawbacks With It Outsourcing; Dealing With The End Of The Contract, Michael Muntean Sep 2011

Drawbacks With It Outsourcing; Dealing With The End Of The Contract, Michael Muntean

Regis University Student Publications (comprehensive collection)

Many companies have looked to outsourcing Information Technology infrastructure and business processes as a means to save capital and streamline company business and assets. While companies initially approach outsourcing engagements concentrating on the migration of data and services to the vendor company, they rarely take into account potential issues that could possibly cause an outsourcing engagement to fail. Failure to address these potential issues within the contract can lead a business to be stuck in an outsourcing engagement that offers little to no benefit to the company. This project presents the details of a survey performed at a business that …


A Project To Design, Implement, And Populate An Effective Geodatabase In Order To Re-Organize Geographic Information Systems Instructional A Small Community College, James C. Gibbons May 2011

A Project To Design, Implement, And Populate An Effective Geodatabase In Order To Re-Organize Geographic Information Systems Instructional A Small Community College, James C. Gibbons

Regis University Student Publications (comprehensive collection)

Geographic information systems instruction at a small community college was deemed inadequate by instructional staff and students. Inadequate resources and inefficient organization of data resulted in frustration for all users. Slow infrastructure resulted in excessive time needed to complete student projects and precluded the course objectives to be fully met. A project was completed to define requirements and recommendations, obtain necessary upgrades to both hardware and network infrastucture, reorganize data storage in a local geodatabase, and institute methods for more efficient instruction using ArcView and ArcCatalog applications from the software suite ArcGIS Desktop by ESRI. Subsequent adoption of the changes …


The Best Nix For A Combined Honeypot Sensor Server, Stephen M. Rodriguez Apr 2011

The Best Nix For A Combined Honeypot Sensor Server, Stephen M. Rodriguez

Regis University Student Publications (comprehensive collection)

The paper will examine (through case-study) the usability of open source operating systems software for a combined Honeypot sensor server. The study will scrutinize the use of two Unix variants, Linux Red Hat and the Sun Solaris operating systems as candidates for deployment of a combined Honeypot sensor server. Appropriate unbiased metrics, such as extensibility, reliability, ease of install and use, will be employed as a likely criterion to evaluate the operating systems for the role of hosting Honeypot sensor server software.


Gender Equality With Agile In Software Engineering, Deborah P. Martin Apr 2011

Gender Equality With Agile In Software Engineering, Deborah P. Martin

Regis University Student Publications (comprehensive collection)

Women are under-represented in information technology careers in general and in the profession of software development in particular and their numbers are declining. Previous studies on this topic have investigated whether the reason for this is due to a difference in capability arising out of their gender, or whether the reason arises from social factors. A software development methodology called “Agile†has arisen in recent years which focus on collaboration, working software, and a sustainable workweek. Studies have shown that adopting Agile techniques in the classroom helps to retain women in computer information academic curricula and that adopting them in …


When Is An Enterprise Service Bus (Esb) The Right Choice For An Integrated Technology Solution?, John (Gerry) Burns Feb 2011

When Is An Enterprise Service Bus (Esb) The Right Choice For An Integrated Technology Solution?, John (Gerry) Burns

Regis University Student Publications (comprehensive collection)

The Enterprise Service Bus (ESB) is an important systems integration technology often closely associated with Service Oriented Architecture (SOA). Some maintain that an ESB should not be used apart from SOA. Others see the ESB simply as the next generation of middleware, incorporating the best of its predecessors, Enterprise Application Integration (EAI) and Message Oriented Middleware (MOM), and a candidate for any integration requirement. Is the ESB a one-size-fits-all solution to be trusted for any integration requirement, or must its use be carefully considered with proper due diligence based on application complexity and/or the presence or absence of a defined …


Itil Adoption In Healthcare: A Study Of Process Impact At A New England Hospital A Study Of Process Impact At A New England Hospital, Dawn Almeida Feb 2011

Itil Adoption In Healthcare: A Study Of Process Impact At A New England Hospital A Study Of Process Impact At A New England Hospital, Dawn Almeida

Regis University Student Publications (comprehensive collection)

This is a study of how adopting Information Technology Infrastructure Library (ITIL) at a New England hospital impacted service management. The New England hospital began the adoption of ITIL by changing three existing ad-hoc processes to standardized processes following ITIL best practices. Those processes were knowledge management, software management and incident management. This study shows the impact on the quality of IT services and IT/business alignment, and the barriers faced during the adoption project. Using a qualitative methodology through action research, the study found the adoption of ITIL had a positive impact on service management. There is limited academic research …


Leveraging Information Technology Within A Roman Catholic Diocese, Sidney K. Rodriguez Oct 2010

Leveraging Information Technology Within A Roman Catholic Diocese, Sidney K. Rodriguez

Regis University Student Publications (comprehensive collection)

Parishes within the Roman Catholic Church face many of the same concerns as any other non-profit organization. Dependencies on donations and volunteer help restrict the parish to leverage technology to gain efficiencies. Parishes have an additional concern. Although grouped under a Diocese, this hierarchical structure is not a standard, top-down directive organization. A Roman Catholic Diocese is a "subsidiarity". Decisions are made at the lowest level, specifically; decisions on how to operate and administer the parish are given to the pastor or parish director of that parish. Acknowledging that leveraging technology is a way to gain efficiencies, the ability to …


A Data Warehouse Solution Emphasizing The Use In Geographic Information Systems, Catherine Carpenter Oct 2010

A Data Warehouse Solution Emphasizing The Use In Geographic Information Systems, Catherine Carpenter

Regis University Student Publications (comprehensive collection)

This paper will explore use of a data warehouse solution for an electric utility that generates and transmits power across four US states. The pseudonym "Utility" will be used to represent the electric utility for security reasons. At Utility "X" several systems store information that is managed in silos that, in some cases, operate on proprietary database formats. This type of usage is identified as a barrier in the development of an enterprise-wide data source. A data warehouse can ultimately help to bridge the Utility "X" information gap, and provide added accessibility for the company to further develop technology, such …


A Comparative Analysis Of Auditing Within The Healthcare Database, Richard E. Butler Sep 2010

A Comparative Analysis Of Auditing Within The Healthcare Database, Richard E. Butler

Regis University Student Publications (comprehensive collection)

Healthcare database system utilization and processing demands are projected to increase significantly within the next decade due to governmental incentives, regulatory requirements, economic motivators and industry regulations. To that end, system engineers, architects, developers and solution providers will be pressured to meet these varied challenges while achieving or improving current system performance benchmarks. Healthcare database performance related to auditing has received little scholarly attention to date. A comparative analysis of two database auditing architectures is studied to identify efficiencies in auditing architectures within the healthcare domain. This study will explore and analyze native auditing supported by Microsoft's SQL Server 2008 …


Layered Security Solutions Over Dependency Within Any Layer, Olga H. Brandt Aug 2010

Layered Security Solutions Over Dependency Within Any Layer, Olga H. Brandt

Regis University Student Publications (comprehensive collection)

Considering the advancement of computer systems and security solutions available in today's constantly changing world, there are various philosophies as to what is required (or adequate) in order to protect a system. This investigative study proposed to explore a possible problem with employing a layered security solution\ over dependence or reliance on any layer. A risk analysis was performed to determine where over dependence or reliance could happen and what could be done to prevent this. Various reviews and other findings online were researched and the data compiled using a qualitative methodology. Lastly, a recommendation is made on what is …


The Effects Of Information Technology Processes On Computerized Clinical Decision Support Systems, Shari Valenta Jul 2010

The Effects Of Information Technology Processes On Computerized Clinical Decision Support Systems, Shari Valenta

Regis University Student Publications (comprehensive collection)

One of the most significant challenges facing healthcare executives today is investing in clinical decision support systems (CDSS) that can support diverse data and decision making needs of physicians and managers to accomplish their organization's mission. The Health Information Technology for Economic and Clinical Health Act provisions of the American Recovery and Reinvestment Act economic stimulus package have brought billions of dollars in incentive funds for CDSS and other healthcare information technology. CDSS can help healthcare organizations automate inefficient processes, lower costs and improve patient care with better decision making. Risks, however are that pre-implementation and customization of CDSS can …


Driving Retail Sales Through Effective Supply Chain Management Technology, James Haws Jul 2010

Driving Retail Sales Through Effective Supply Chain Management Technology, James Haws

Regis University Student Publications (comprehensive collection)

Supply chain management coordinates the production and distribution of a product with the goal of increasing profitability and productivity. Advancements in technology and workflows in recent years have enabled distributors, suppliers, and retailers to operate more efficiently and effectively. Although significant technological advancements have been made in supply chain management, inventory management still causes a number of problems for retailers. The average out-of -stock rate nationally is approximately at an 8% level (Corsten & Gruen, 2003). Inadequate inventory management can reduce retail sales, drive up costs associated with transportation and storage, decrease customer loyalty, and ultimately lead to a significant …


Social Networking Privacy: A Qualitative Study Of The Risks And Effects Of Sharing Data To A Global Environment Via Facebook, Bryan L. Mack Jul 2010

Social Networking Privacy: A Qualitative Study Of The Risks And Effects Of Sharing Data To A Global Environment Via Facebook, Bryan L. Mack

Regis University Student Publications (comprehensive collection)

Young women have placed themselves at risk by disclosing private and sensitive data on their Facebook accounts. Privacy settings which can help prevent unauthorized access of this data exist, but some women choose to ignore them. This study is an attempt to gain an understanding of this phenomenon and answer the question of why young women choose to share personal information. Qualitative interviews of college students were conducted and the results interpreted in this paper. The results of this interview are intended to supply research for future studies which aim to minimize problems caused to individuals who choose to share …


Assessment Of Society's Awareness, Acceptance, And Demand For Robotic Wait Staff In Restaurant Operations, Jeffrey Parrent Jul 2010

Assessment Of Society's Awareness, Acceptance, And Demand For Robotic Wait Staff In Restaurant Operations, Jeffrey Parrent

Regis University Student Publications (comprehensive collection)

This research study consists of an assessment of participants' awareness of robotics in general and also their acceptance and consumer demand for mobile, humanoid robots in the role of robotic waiters in restaurants. The study also includes the awareness and consumer demand for Microsoft Surface Computers to be potentially used as restaurant tables capable of electronic order entry, payment, and entertainment. The social impacts of such high technology upon the human occupation of waiter or waitress were also examined relative to the resistance to automation from current human wait staff. The overall results of the study were luke-warm demand for …


A Security Assessment Of Mobikey For Remote Access, Joseph Brooks Jun 2010

A Security Assessment Of Mobikey For Remote Access, Joseph Brooks

Regis University Student Publications (comprehensive collection)

Today, it is very common for employees to need to work when outside of the office. For various reasons, it's important that they be able to work anytime and anywhere. However, this raises security concerns about how this is accomplished. There are many options, such as virtual private networks (VPNs) and remote desktop solutions, but each comes with its own risks. A newer option is the MobiKEY from Route1, which allows users to connect to their work resources from anywhere. Route1 touts the MobiKEY, powered by MobiNET, as a much more secure method of remote access. How does it stack …


Evaluation Of Dnssec In Microsoft Windows And Microsoft Windows Server 2008 R2, Christopher Hair Jun 2010

Evaluation Of Dnssec In Microsoft Windows And Microsoft Windows Server 2008 R2, Christopher Hair

Regis University Student Publications (comprehensive collection)

The Domain Name System (DNS) provides important name resolution services on the Internet. The DNS has been found to have security flaws which have the potential to undermine the reliability of many Internet-based systems. DNS Security Extensions (DNSSEC) offers a long-term solution these DNS security flaws. However, DNSSEC adoption has been slow because it is challenging to deploy and administer. DNSSEC has also been criticized for not being an "end-toend" solution. Microsoft included support for DNSSEC in its latest operating systems, Windows Server 2008 R2 and Windows 7. This thesis concluded that DNSSEC features in Windows Server 2008 R2 and …


Inquiry In Support Of The Knowledge Sharing Life Cycle Within A Higher Education Database Practicum: A Case Study At Regis University, Martha Jorgensen May 2010

Inquiry In Support Of The Knowledge Sharing Life Cycle Within A Higher Education Database Practicum: A Case Study At Regis University, Martha Jorgensen

Regis University Student Publications (comprehensive collection)

The Regis University database practicum provides an opportunity for students to get hands-on experience with Database Administrator (DBA) tasks as they support the virtual lab environment used by students enrolled in database courses at the university. The student DBA team is new each semester and has a short time to become familiar with the environment they are supporting and the tools they will be using. Inefficient communication and organization delay the resolution of production issues. This study analyzed the current knowledge sharing culture, technologies, and processes of the database practicum. The goal of the study was to determine accessibility of …


A Framework Towards An Internalization Structure Using Document Repositories In The Context Of A Knowledge Management Strategy: A Case Study Of The First Colorado Title, Sharyl Swope May 2010

A Framework Towards An Internalization Structure Using Document Repositories In The Context Of A Knowledge Management Strategy: A Case Study Of The First Colorado Title, Sharyl Swope

Regis University Student Publications (comprehensive collection)

Knowledge management is a key to creating efficiency and consistency within an organization. Title examiners review documents that may affect the issuance of title insurance. Some documents may affect many properties and thus are reviewed many times. This paper seeks to develop a framework that will enable the knowledge gained by the first review of the document to be captured and shared. Exploring the ontology of the title insurance industry with respect to title searching and examinations through the development of a concept map was the first step. Surveying the members of the title department provided the specifics for the …


A Strategy For Improving Performance On A Sharepoint Social Computing Portal, Matt Adkins May 2010

A Strategy For Improving Performance On A Sharepoint Social Computing Portal, Matt Adkins

Regis University Student Publications (comprehensive collection)

An important usability rule for any web site is the concept of speed. Failing to provide prompt pages and data will result in a negative view of the site and ultimately a lack of usership. In spite of this, many organizations implement web sites without a clear strategy regarding performance. This project explores three database strategies to consider when deploying a Microsoft SharePoint website with a social computing usage style. Although all of the strategies do not provide significant performance gains, the study illuminates several important factors that will increase performance in sites that use other usage styles. To properly …


Information Security Among Small Organizations: A Survey, Jason Carter Apr 2010

Information Security Among Small Organizations: A Survey, Jason Carter

Regis University Student Publications (comprehensive collection)

Small businesses are at extreme risk from network based attacks. A lack of security budget for hardware such as firewalls, intrusion detection systems, proxy servers, and web 2.0 gateway filters, plus a lack of technical expertise in network security, put small businesses at higher risk than larger companies. This paper researches the current state of small business network security and the types of threats they are seeing. It also looks at the factors that determine when and why security is implemented or modified.


Capability Maturity Model Integration (Cmmi) For Small Organizations, Kevin Scott Mar 2010

Capability Maturity Model Integration (Cmmi) For Small Organizations, Kevin Scott

Regis University Student Publications (comprehensive collection)

Software Process Improvement (SPI) is a large area of expertise that deals with software development standard processes and is a progression of proven methods of process improvement from many different methodologies. Personal Software Process (PSP) and Team Software Process (TSP) complement the implementation of Capability Maturity Model Implementation (CMMI) and can be applied gradually from the individual, to the team, and then to the organization. These solutions from Carnegie Melon's Software Engineering Institute (SEI) are leading edge for the field of process improvement. Solutions like this consume many resources, are very complex, require years to implement, and can be costly. …


Mapping System Management Of Two Erps (Oracle Ebusiness Suit And Peoplesoft), Eric Hernandez Mar 2010

Mapping System Management Of Two Erps (Oracle Ebusiness Suit And Peoplesoft), Eric Hernandez

Regis University Student Publications (comprehensive collection)

Due to the fact that Enterprise Resource Planning (ERP) vendors provide business solutions to address similar business challenges, most ERP products have a lot of similar components and functionalities. Using these similar components and functionalities, ERP system management of one ERP product can be mapped to a different ERP product. In this particular case, E-Business Suite's (EBS) system management is mapped against PeopleSoft (PS). By having an EBS Administrator indirectly collaborate with a PS administrator, a system management mapping table linking the two ERP systems was established. By allowing an EBS Administrator handle PS systems using the mapping solution, the …


Evaluation And Development Of Selection Criteria To Guide Organizational Selection Of A Project Management Maturity Model, Diane Zandin Feb 2010

Evaluation And Development Of Selection Criteria To Guide Organizational Selection Of A Project Management Maturity Model, Diane Zandin

Regis University Student Publications (comprehensive collection)

Organizations wishing to measurably and continuously improve processes often look towards maturity models, such as OPM3 and CMMI, as their panacea. However, selecting the wrong model for the organizations goals and resources can result in project failure. This study, focusing on OPM3 and CMMI, proposes a guidance tool that can help organizations select the right maturity model. The study is framed in the state government context due to the complexity and relative insularity of that environment. In addition to being a limited based, state governments have several limiters that factor into project selection, namely budget and taxpayer transparency. Using several …


An Agile Ba: A Case Study Of The Business Analyst In Agile, Nathan Wagner Jan 2010

An Agile Ba: A Case Study Of The Business Analyst In Agile, Nathan Wagner

Regis University Student Publications (comprehensive collection)

Companies adopting Agile software development methodologies are becoming a growing trend. The roles responsible for managing and participating in these types of projects must make a significant shift in focus when moving from the waterfall development process to a more adaptive way of working. Even with the growing adoption and increasing amount of study around Agile, the literature and texts prescribing the various Agile methodologies do not address the specific role of the Business Analayst. In this paper, the role of the Business Analyst in Agile is explored through a qualitative study within a large software development organization utilizing Agile …


A Cisco-Based Proposal For Arne Core Routing Infrastructure, Ingrimar James Oct 2009

A Cisco-Based Proposal For Arne Core Routing Infrastructure, Ingrimar James

Regis University Student Publications (comprehensive collection)

Systems Engineering and Application Development (SEAD) Practicum provides opportunities for students to engage in proposing, designing, building and testing various projects related to information technology. There are several ongoing projects designed to upgrade, improve or revamp some aspect of the Academic Research Network, generally referred to as ARNe, and services or applications that are a part of its architecture. Regis University is in the process of replacing their current architecture and equipment that forms the core of ARNe in order to facilitate further upgrades and new projects within various aspects of ARNe. This paper examines and proposes a Cisco-based routing …


A Pragmatic Evaluation Of An Academic Practicum's Knowledge Transfer Process, Luis F. Pacheco Aug 2009

A Pragmatic Evaluation Of An Academic Practicum's Knowledge Transfer Process, Luis F. Pacheco

Regis University Student Publications (comprehensive collection)

Practicums are designed to provide on-the-job learning experience for the students in their chosen occupational field. But do students actually benefit from practicums? This manuscript investigates linkages between knowledge repository systems and knowledge transfer in database technology practicums. It examines the literature on knowledge transfer, develops an Action Research methodology, and presents results of a new study in database academic practicums. The study focuses on a graduate school database technology practicum at Denver-based Regis University. As a member of an academic practicum team with responsibilities involving database administrative support to a group of students and faculty, the researcher seeks to …


Crm And Spiritual Care, Gary L. James Feb 2009

Crm And Spiritual Care, Gary L. James

Regis University Student Publications (comprehensive collection)

The Spiritual Care Department at Senior Care Residences does not have a computer database to record the chaplain's time during residents' visits, working with volunteers, and working with current or potential donors. This poses several problems such as keeping track of visits. Tracking this information will allow the chaplain to know whom he/she has provided spiritual care. This information is also critical for the volunteers he/she works with and current and potential donors. By implementing a CRM(Customer Relationship Management) application, the chaplain will have this information to help make informed decisions, and the automated computer system will help make recommendations.


A Strategy For Reducing I/O And Improving Query Processing Time In An Oracle Data Warehouse Environment, Chris Titus Jan 2009

A Strategy For Reducing I/O And Improving Query Processing Time In An Oracle Data Warehouse Environment, Chris Titus

Regis University Student Publications (comprehensive collection)

In the current information age as the saying goes, time is money. For the modern information worker, decisions must often be made quickly. Every extra minute spent waiting for critical data could mean the difference between financial gain and financial ruin. Despite the importance of timely data retrieval, many organizations lack even a basic strategy for improving the performance of their data warehouse based reporting systems. This project explores the idea that a strategy making use of three database performance improvement techniques can reduce I/O (input/output operations) and improve query processing time in an information system designed for reporting. To …


Development Of The Curriculum For The Introduction To Computer Science Course, Nancy Major Jan 2009

Development Of The Curriculum For The Introduction To Computer Science Course, Nancy Major

Regis University Student Publications (comprehensive collection)

This project proposes to reformat the curriculum for an Introduction to Computer Science course for high school students, currently taught as a one semester course. Several issues with the current course are addressed with recommendations for changes intended for the benefit of students at their school. In the past five years, enrollment in the school's Advanced Placement (AP) Computer Science course has decreased from 50 students to 25 students despite no significant change in overall enrollment or student demographics. For the portion of those students enrolled in the course who have taken the Advanced Placement exam during the past four …