Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 40

Full-Text Articles in Entire DC Network

Database Streaming Compression On Memory-Limited Machines, Damon F. Bruccoleri Jan 2018

Database Streaming Compression On Memory-Limited Machines, Damon F. Bruccoleri

CCE Theses and Dissertations

Dynamic Huffman compression algorithms operate on data-streams with a bounded symbol list. With these algorithms, the complete list of symbols must be contained in main memory or secondary storage. A horizontal format transaction database that is streaming can have a very large item list. Many nodes tax both the processing hardware primary memory size, and the processing time to dynamically maintain the tree. This research investigated Huffman compression of a transaction-streaming database with a very large symbol list, where each item in the transaction database schema’s item list is a symbol to compress. The constraint of a large symbol list …


Using Web Conferencing Technology To Foster Inclusive Course Experiences For Deaf And Hard-Of-Hearing Students, Elissa Weeden Jan 2018

Using Web Conferencing Technology To Foster Inclusive Course Experiences For Deaf And Hard-Of-Hearing Students, Elissa Weeden

CCE Theses and Dissertations

A mainstream course has several components that deaf and hard-of-hearing (DHH) students must reconcile. In class, components can include the instructor, projection display, whiteboard, interpreting, and real-time captioning. Outside the classroom, components can include materials from the instructor, notes generated by a note-taker, and a lecture transcript generated via real-time captioning. Web conferencing software can be harnessed to create inclusive experiences for DHH students. Such software can place all components of a class session on a single screen to create a composite screen solution that can be viewed by students in real-time and recorded for later, self-paced review. A composite …


Metrics For Aspect Mining Visualization, Gisle J. Jorgensen Jan 2018

Metrics For Aspect Mining Visualization, Gisle J. Jorgensen

CCE Theses and Dissertations

Aspect oriented programming has over the last decade become the subject of intense research within the domain of software engineering. Aspect mining, which is concerned with identification of cross cutting concerns in legacy software, is an important part of this domain. Aspect refactoring takes the identified cross cutting concerns and converts these into new software constructs called aspects. Software that have been transformed using this process becomes more modularized and easier to comprehend and maintain. The first attempts at mining for aspects were dominated by manual searching and parsing through source code using simple tools. More sophisticated techniques have since …


Assistive Technology Guidelines For Higher Education Disability Support Staff, Brenda Delee Jan 2018

Assistive Technology Guidelines For Higher Education Disability Support Staff, Brenda Delee

CCE Theses and Dissertations

With the changing laws and effective integration of assistive technology into the classroom environment, students can have the provision of multiple means to complete their work with greater independence. In post secondary education, any student who discloses a sensory, cognitive, or physical disability is eligible to request and receive assistive technology and other services. When used correctly, assistive technology can help students with reading, writing, math, and communication skills. With a possible influx of students, disability support staff must be prepared and willing to meet the needs and address issues relating to students with disabilities. If their needs are not …


Identifying Factors Contributing Towards Information Security Maturity In An Organization, Madhuri M. Edwards Jan 2018

Identifying Factors Contributing Towards Information Security Maturity In An Organization, Madhuri M. Edwards

CCE Theses and Dissertations

Information security capability maturity (ISCM) is a journey towards accurate alignment of business and security objectives, security systems, processes, and tasks integrated with business-enabled IT systems, security enabled organizational culture and decision making, and measurements and continuous improvements of controls and governance comprising security policies, processes, operating procedures, tasks, monitoring, and reporting. Information security capability maturity may be achieved in five levels: performing but ad-hoc, managed, defined, quantitatively governed, and optimized. These five levels need to be achieved in the capability areas of information integrity, information systems assurance, business enablement, security processes, security program management, competency of security team, security …


Conservation Of Limited Resources: Design Principles For Security And Usability On Mobile Devices, Ann-Marie Horcher Jan 2018

Conservation Of Limited Resources: Design Principles For Security And Usability On Mobile Devices, Ann-Marie Horcher

CCE Theses and Dissertations

Mobile devices have evolved from an accessory to the primary computing device for an increasing portion of the general population. Not only is mobile the primary device, consumers on average have multiple Internet-connected devices. The trend towards mobile has resulted in a shift to “mobile-first” strategies for delivering information and services in business organizations, universities, and government agencies. Though principles for good security design exist, those principles were formulated based upon the traditional workstation configuration instead of the mobile platform. Security design needs to follow the shift to a “mobile-first” emphasis to ensure the usability of the security interface. The …


Semi-Informed Multi-Agent Patrol Strategies, Chad E. Hardin Jan 2018

Semi-Informed Multi-Agent Patrol Strategies, Chad E. Hardin

CCE Theses and Dissertations

The adversarial multi-agent patrol problem is an active research topic with many real-world applications such as physical robots guarding an area and software agents protecting a computer network. In it, agents patrol a graph looking for so-called critical vertices that are subject to attack by adversaries. The agents are unaware of which vertices are subject to attack by adversaries and when they encounter such a vertex they attempt to protect it from being compromised (an adversary must occupy the vertex it targets a certain amount of time for the attack to succeed). Even though the terms adversary and attack are …


A Developmental Research Of A Taxonomy For Employees’ Mobile Device Cyberslacking And Commitment To The Organization In The Context Of Productivity, Saleh Alharthi Jan 2018

A Developmental Research Of A Taxonomy For Employees’ Mobile Device Cyberslacking And Commitment To The Organization In The Context Of Productivity, Saleh Alharthi

CCE Theses and Dissertations

While the introduction of the Internet facilitated the communication channels at the workplace to improve employees’ productivity, it also raised new challenges, such as Internet use for personal activities. Organizations face productivity losses due to employees’ involvement in counterproductive behaviors, such as cyberslacking. The frequency of mobile device cyberslacking is anticipated to increase due to continuous developments in online connectivity, applications, and the significant growth of mobile device usage worldwide. In addition, research has shown that employees’ commitment to their organization can encourage behaviors that positively influence productivity. Employee’s commitment is a crucial factor because it can benefit an organization …


An Empirical Assessment Of Senior Citizens’ Cybersecurity Awareness, Computer Self-Efficacy, Perceived Risk Of Identity Theft, Attitude, And Motivation To Acquire Cybersecurity Skills, Carlene G. Blackwood-Brown Jan 2018

An Empirical Assessment Of Senior Citizens’ Cybersecurity Awareness, Computer Self-Efficacy, Perceived Risk Of Identity Theft, Attitude, And Motivation To Acquire Cybersecurity Skills, Carlene G. Blackwood-Brown

CCE Theses and Dissertations

Cyber-attacks on Internet users have caused billions of dollars in losses annually. Cybercriminals launch attacks via threat vectors such as unsecured wireless networks and phishing attacks on Internet users who are usually not aware of such attacks. Senior citizens are one of the most vulnerable groups who are prone to cyber-attacks, and this is largely due to their limited cybersecurity awareness and skills. Within the last decade, there has been a significant increase in Internet usage among senior citizens. It was documented that senior citizens had the greatest rate of increase in Internet usage over all the other age groups …


The Impact Of Mindfulness On Non-Malicious Spillage Within Images On Social Networking Sites, Angela D. Landress Jan 2018

The Impact Of Mindfulness On Non-Malicious Spillage Within Images On Social Networking Sites, Angela D. Landress

CCE Theses and Dissertations

Insider threat by employees in organizations is a problematic issue in today’s fast-paced, internet-driven society. Gone are the days when securing the perimeter of one’s network protected their business. Security threats are now mobile, and employees have the ability to share sensitive business data with hundreds of people instantaneously from mobile devices. While prior research has addressed social networking topics such as trust in relation to information systems, the use of social networking sites, social networking security, and social networking sharing, there is a lack of research in the mindfulness of users who spill sensitive data contained within images posted …


Machine Learning Methods For Septic Shock Prediction, Aiman A. Darwiche Jan 2018

Machine Learning Methods For Septic Shock Prediction, Aiman A. Darwiche

CCE Theses and Dissertations

Sepsis is an organ dysfunction life-threatening disease that is caused by a dysregulated body response to infection. Sepsis is difficult to detect at an early stage, and when not detected early, is difficult to treat and results in high mortality rates. Developing improved methods for identifying patients in high risk of suffering septic shock has been the focus of much research in recent years. Building on this body of literature, this dissertation develops an improved method for septic shock prediction. Using the data from the MMIC-III database, an ensemble classifier is trained to identify high-risk patients. A robust prediction model …


Assessment Of Factors Influencing Intent-To-Use Big Data Analytics In An Organization: A Survey Study, Wayne Madhlangobe Jan 2018

Assessment Of Factors Influencing Intent-To-Use Big Data Analytics In An Organization: A Survey Study, Wayne Madhlangobe

CCE Theses and Dissertations

The central question was how the relationship between trust-in-technology and intent-to-use Big Data Analytics in an organization is mediated by both Perceived Risk and Perceived Usefulness. Big Data Analytics is quickly becoming a critically important driver for business success. Many organizations are increasing their Information Technology budgets on Big Data Analytics capabilities. Technology Acceptance Model stands out as a critical theoretical lens primarily due to its assessment approach and predictive explanatory capacity to explain individual behaviors in the adoption of technology. Big Data Analytics use in this study was considered a voluntary act, therefore, well aligned with the Theory of …


Computer-Supported Collaborative Learning Using Augmented And Virtual Reality In Museum Education, Ronald Punako Jr. Jan 2018

Computer-Supported Collaborative Learning Using Augmented And Virtual Reality In Museum Education, Ronald Punako Jr.

CCE Theses and Dissertations

Recent advancements in the cost, availability, and capability of augmented reality (AR) and virtual reality (VR) devices and software are spurring their mass distribution to the public. This fundamental shift in the use of AR and VR predominantly from military and academic research laboratories to the public presents new opportunities and challenges for the design of instructional technology. While studies of AR and VR have been conducted to inform the design of individual instructional products, few studies have focused on computer-supported collaborative learning (CSCL) products in which AR and VR learners work together toward shared learning goals.

The museum education …


Multi-Robot Complete Coverage Using Directional Constraints, Stefanus Malan Jan 2018

Multi-Robot Complete Coverage Using Directional Constraints, Stefanus Malan

CCE Theses and Dissertations

Complete coverage relies on a path planning algorithm that will move one or more robots, including the actuator, sensor, or body of the robot, over the entire environment. Complete coverage of an unknown environment is used in applications like automated vacuum cleaning, carpet cleaning, lawn mowing, chemical or radioactive spill detection and cleanup, and humanitarian de-mining.

The environment is typically decomposed into smaller areas and then assigned to individual robots to cover. The robots typically use the Boustrophedon motion to cover the cells. The location and size of obstacles in the environment are unknown beforehand. An online algorithm using sensor-based …


The Influence Of Website Design On Online Trust In Electronic Commerce Retailing Environments, Dinesh Khialani Jan 2018

The Influence Of Website Design On Online Trust In Electronic Commerce Retailing Environments, Dinesh Khialani

CCE Theses and Dissertations

E-commerce retail sales continue to experience significant growth in the United States (U.S.) annually. However, the contribution of e-commerce retail sales towards total retail sales in the U.S. remains low. Furthermore, the growth of e-commerce retail sales from year to year as a percentage of total retail sales in the U.S. is also fractional. The lack of online trust by consumers has been cited as a significant barrier to transacting online and a possible cause of this slow-moving trend.

E-commerce retail sales are paramount to the success and profitability of online merchants. It remains critical to understand the underlying determinants …


Development And Validation Of A Proof-Of-Concept Prototype For Analytics-Based Malicious Cybersecurity Insider Threat In A Real-Time Identification System, Angel L. Hueca Jan 2018

Development And Validation Of A Proof-Of-Concept Prototype For Analytics-Based Malicious Cybersecurity Insider Threat In A Real-Time Identification System, Angel L. Hueca

CCE Theses and Dissertations

Insider threat has continued to be one of the most difficult cybersecurity threat vectors detectable by contemporary technologies. Most organizations apply standard technology-based practices to detect unusual network activity. While there have been significant advances in intrusion detection systems (IDS) as well as security incident and event management solutions (SIEM), these technologies fail to take into consideration the human aspects of personality and emotion in computer use and network activity, since insider threats are human-initiated. External influencers impact how an end-user interacts with both colleagues and organizational resources. Taking into consideration external influencers, such as personality, changes in organizational polices …


Development Of A Client-Side Evil Twin Attack Detection System For Public Wi-Fi Hotspots Based On Design Science Approach, Liliana R. Horne Jan 2018

Development Of A Client-Side Evil Twin Attack Detection System For Public Wi-Fi Hotspots Based On Design Science Approach, Liliana R. Horne

CCE Theses and Dissertations

Users and providers benefit considerably from public Wi-Fi hotspots. Users receive wireless Internet access and providers draw new prospective customers. While users are able to enjoy the ease of Wi-Fi Internet hotspot networks in public more conveniently, they are more susceptible to a particular type of fraud and identify theft, referred to as evil twin attack (ETA). Through setting up an ETA, an attacker can intercept sensitive data such as passwords or credit card information by snooping into the communication links. Since the objective of free open (unencrypted) public Wi-Fi hotspots is to provide ease of accessibility and to entice …


Exploring Generational Differences In Text Messaging Usage And Habits, Daniel Wayne Long Jan 2018

Exploring Generational Differences In Text Messaging Usage And Habits, Daniel Wayne Long

CCE Theses and Dissertations

Members of society today embrace multiple communication media for various purposes and intents. Text messaging has been identified as the medium of choice for continual relationship maintenance and text messaging from mobile devices overshadows all other media forms for the support of social connections. Text messaging is changing everything from how operators market their plans to how advertisers and service providers reach consumers. But just as technology usage of social media and internet access are different across generational boundaries, text messaging usage and habits may also be different for various generational groups. The majority of peer-reviewed research regarding text messaging …


The Effects Of Student Activity Dashboards On Student Participation, Performance, And Persistence, Edwin Hill Jan 2018

The Effects Of Student Activity Dashboards On Student Participation, Performance, And Persistence, Edwin Hill

CCE Theses and Dissertations

Researchers have turned their attention to the use of learning analytics and dashboard systems in education. Schools are using knowledge gained in this area to address the issue of persistence to increase graduation rates. While dashboard systems have been developed and are starting to be implemented, it is not yet clear how activity and performance data from dashboards influences student behavior. In addition, much of the research has been focused on instructor-facing dashboards rather than student-facing dashboards. The current study implemented a student-facing dashboard in the learning management system and measured how information on the dashboard may have influenced participation …


Beyond Automated Assessment: Building Metacognitive Awareness In Novice Programmers In Cs1, James Prather Jan 2018

Beyond Automated Assessment: Building Metacognitive Awareness In Novice Programmers In Cs1, James Prather

CCE Theses and Dissertations

The primary task of learning to program in introductory computer science courses (CS1) cognitively overloads novices and must be better supported. Several recent studies have attempted to address this problem by understanding the role of metacognitive awareness in novices learning programming. These studies have focused on teaching metacognitive awareness to students by helping them understand the six stages of learning so students can know where they are in the problem-solving process, but these approaches are not scalable. One way to address scalability is to implement features in an automated assessment tool (AAT) that build metacognitive awareness in novice programmers. Currently, …


A Knowledge Management System (Kms) Using A Storytelling-Based Approach To Collect Tacit Knowledge, Nicholas Shaw Jan 2018

A Knowledge Management System (Kms) Using A Storytelling-Based Approach To Collect Tacit Knowledge, Nicholas Shaw

CCE Theses and Dissertations

Since the 1990s, Knowledge Management Systems (KMS) have been largely unsuccessful in the collection of tacit knowledge. The process, whether through direct input by the holder of the tacit knowledge or through an intermediary such as the collection of tacit knowledge through interviews and videos, has not succeeded. Reasons encompass the organizational (such as culture of the organization), the technological (example: poor tools), and the individual (example: knowledge is power, i.e. where experts with rare knowledge results in knowledge hoarding instead of transfer). The purpose of this study was to demonstrate that tacit knowledge could be successfully and consistently collected …


An Operational Management Competency Model For Online Education Administrators, Fanniel Demarks Jan 2018

An Operational Management Competency Model For Online Education Administrators, Fanniel Demarks

CCE Theses and Dissertations

Despite the steady rise in online education and increasingly empirical studies on related learning technologies and technology support, there is considerable evidence that the field has not kept the pace with studies related to online education administrators (OEAs). Further investigation was needed into OEAs’ practice of day-to-day administration of their programs. Therefore, this study examined OEAs’ perceptions of their areas of responsibility, tasks to be accomplished and skills and knowledge needed for them to get the job done. A three-round Delphi research technique was employed as a structured group communication method between five participants to answer three research questions. The …


Factors That Contribute To The Resistance To Cloud Computing Adoption By Tech Companies Vs. Non-Tech Companies, Zadok Hakim Jan 2018

Factors That Contribute To The Resistance To Cloud Computing Adoption By Tech Companies Vs. Non-Tech Companies, Zadok Hakim

CCE Theses and Dissertations

Cloud computing (CC) may be the most significant development in recent history for businesses seeking to utilize technology. However, the adoption of CC hinges on many factors, and can have a greater positive impact on organizational performance. This study examined the different factors that contribute to the resistance to CC adoption. Anchored in The Theory of Technology-Organization-Environment (TOE), the study used a qualitative, grounded theory approach to develop a theoretical model for the acceptance of CC across firms. CC can have significant effects on efficiency and productivity for firms, but these effects will only be realized if IT usage becomes …


Multidimensional Knowledge Flow Dynamics In Context, Lina Lo Jan 2018

Multidimensional Knowledge Flow Dynamics In Context, Lina Lo

CCE Theses and Dissertations

Knowledge is a sustainable advantage and knowledge assets can increase value with use. A snowball effect of knowledge advantage advocates effective knowledge management and fosters its continual growth as it flows. Knowledge, however, flows unevenly throughout an organization and the problem is that the fundamental dynamics of these flows are still not well characterized in theoretical and computational models. This study built on existing work—knowledge-flow theory, need knowledge generation, and the critical success factors for enterprise resource planning implementation—to examine the multidimensional knowledge-flow phenomenon in context, and used the case study methodology for knowledge-flow theory building. The research question was …


Standardizing Instructional Definition And Content Supporting Information Security Compliance Requirements, Theresa Curran Jan 2018

Standardizing Instructional Definition And Content Supporting Information Security Compliance Requirements, Theresa Curran

CCE Theses and Dissertations

Information security (IS)-related risks affect global public and private organizations on a daily basis. These risks may be introduced through technical or human-based activities, and can include fraud, hacking, malware, insider abuse, physical loss, mobile device misconfiguration or unintended disclosure. Numerous and diverse regulatory and contractual compliance requirements have been mandated to assist organizations proactively prevent these types of risks. Two constants are noted in these requirements. The first constant is requiring organizations to disseminate security policies addressing risk management through secure behavior. The second constant is communicating policies through IS awareness, training and education (ISATE) programs. Compliance requirements direct …


Assessing The Impact Of A Geospatial Information System For Improving Campus Emergency Decision-Making Of Novice Crisis Managers, Adam R. Albina Jan 2018

Assessing The Impact Of A Geospatial Information System For Improving Campus Emergency Decision-Making Of Novice Crisis Managers, Adam R. Albina

CCE Theses and Dissertations

A significant increase in campus-based emergencies warrants the investigation into emergency management information systems that serve a novice crisis decision-maker. Institutions of higher education that are not large enough to have dedicated emergency management offices generally press novice decision-makers into emergency management roles. An investigation was conducted to assess the impact of an emergency management geospatial information system on the decision performance of novice crisis managers through the use of a scenario-based simulation. A mixed method sequential explanatory method was used to collect quasi-experimental data on decision time, decision accuracy and situational awareness. Qualitative analysis was conducted through interviews with …


Machine Learning For Exploring State Space Structure In Genetic Regulatory Networks, Rodney H. Thomas Jan 2018

Machine Learning For Exploring State Space Structure In Genetic Regulatory Networks, Rodney H. Thomas

CCE Theses and Dissertations

Genetic regulatory networks (GRN) offer a useful model for clinical biology. Specifically, such networks capture interactions among genes, proteins, and other metabolic factors. Unfortunately, it is difficult to understand and predict the behavior of networks that are of realistic size and complexity. In this dissertation, behavior refers to the trajectory of a state, through a series of state transitions over time, to an attractor in the network. This project assumes asynchronous Boolean networks, implying that a state may transition to more than one attractor. The goal of this project is to efficiently identify a network's set of attractors and to …


Assessing The Role Of Critical Value Factors (Cvfs) On Users’ Resistance Of Urban Search And Rescue Robotics, Marion A. Brown Jan 2018

Assessing The Role Of Critical Value Factors (Cvfs) On Users’ Resistance Of Urban Search And Rescue Robotics, Marion A. Brown

CCE Theses and Dissertations

Natural and manmade disasters have brought urban search and rescue (USAR) robots to the technology forefront as a means of providing additional support for search and rescue workers. The loss of life among victims and rescue workers necessitates the need for a wider acceptance of this assistive technology. Disasters, such as hurricane Harvey in 2017, hurricane Sandy in 2012, the 2012 United States tornadoes that devastated 17 states, the 2011 Australian floods, the 2011 Japan and 2010 Haiti earthquakes, the 2010 West Virginia coal mine explosions, the 2009 Typhoon caused mudslides in Taiwan, the 2001 Collapse of the World Trade …


Wireless Sensor Network Clustering With Machine Learning, Larry Townsend Jan 2018

Wireless Sensor Network Clustering With Machine Learning, Larry Townsend

CCE Theses and Dissertations

Wireless sensor networks (WSNs) are useful in situations where a low-cost network needs to be set up quickly and no fixed network infrastructure exists. Typical applications are for military exercises and emergency rescue operations. Due to the nature of a wireless network, there is no fixed routing or intrusion detection and these tasks must be done by the individual network nodes. The nodes of a WSN are mobile devices and rely on battery power to function. Due the limited power resources available to the devices and the tasks each node must perform, methods to decrease the overall power consumption of …


Probabilistic Clustering Ensemble Evaluation For Intrusion Detection, Steven M. Mcelwee Jan 2018

Probabilistic Clustering Ensemble Evaluation For Intrusion Detection, Steven M. Mcelwee

CCE Theses and Dissertations

Intrusion detection is the practice of examining information from computers and networks to identify cyberattacks. It is an important topic in practice, since the frequency and consequences of cyberattacks continues to increase and affect organizations. It is important for research, since many problems exist for intrusion detection systems. Intrusion detection systems monitor large volumes of data and frequently generate false positives. This results in additional effort for security analysts to review and interpret alerts. After long hours spent reviewing alerts, security analysts become fatigued and make bad decisions. There is currently no approach to intrusion detection that reduces the workload …