Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

2010

Computer Sciences

Regis University MSCIT thesis

Articles 1 - 18 of 18

Full-Text Articles in Entire DC Network

Leveraging Information Technology Within A Roman Catholic Diocese, Sidney K. Rodriguez Oct 2010

Leveraging Information Technology Within A Roman Catholic Diocese, Sidney K. Rodriguez

Regis University Student Publications (comprehensive collection)

Parishes within the Roman Catholic Church face many of the same concerns as any other non-profit organization. Dependencies on donations and volunteer help restrict the parish to leverage technology to gain efficiencies. Parishes have an additional concern. Although grouped under a Diocese, this hierarchical structure is not a standard, top-down directive organization. A Roman Catholic Diocese is a "subsidiarity". Decisions are made at the lowest level, specifically; decisions on how to operate and administer the parish are given to the pastor or parish director of that parish. Acknowledging that leveraging technology is a way to gain efficiencies, the ability to …


A Data Warehouse Solution Emphasizing The Use In Geographic Information Systems, Catherine Carpenter Oct 2010

A Data Warehouse Solution Emphasizing The Use In Geographic Information Systems, Catherine Carpenter

Regis University Student Publications (comprehensive collection)

This paper will explore use of a data warehouse solution for an electric utility that generates and transmits power across four US states. The pseudonym "Utility" will be used to represent the electric utility for security reasons. At Utility "X" several systems store information that is managed in silos that, in some cases, operate on proprietary database formats. This type of usage is identified as a barrier in the development of an enterprise-wide data source. A data warehouse can ultimately help to bridge the Utility "X" information gap, and provide added accessibility for the company to further develop technology, such …


A Comparative Analysis Of Auditing Within The Healthcare Database, Richard E. Butler Sep 2010

A Comparative Analysis Of Auditing Within The Healthcare Database, Richard E. Butler

Regis University Student Publications (comprehensive collection)

Healthcare database system utilization and processing demands are projected to increase significantly within the next decade due to governmental incentives, regulatory requirements, economic motivators and industry regulations. To that end, system engineers, architects, developers and solution providers will be pressured to meet these varied challenges while achieving or improving current system performance benchmarks. Healthcare database performance related to auditing has received little scholarly attention to date. A comparative analysis of two database auditing architectures is studied to identify efficiencies in auditing architectures within the healthcare domain. This study will explore and analyze native auditing supported by Microsoft's SQL Server 2008 …


Layered Security Solutions Over Dependency Within Any Layer, Olga H. Brandt Aug 2010

Layered Security Solutions Over Dependency Within Any Layer, Olga H. Brandt

Regis University Student Publications (comprehensive collection)

Considering the advancement of computer systems and security solutions available in today's constantly changing world, there are various philosophies as to what is required (or adequate) in order to protect a system. This investigative study proposed to explore a possible problem with employing a layered security solution\ over dependence or reliance on any layer. A risk analysis was performed to determine where over dependence or reliance could happen and what could be done to prevent this. Various reviews and other findings online were researched and the data compiled using a qualitative methodology. Lastly, a recommendation is made on what is …


Driving Retail Sales Through Effective Supply Chain Management Technology, James Haws Jul 2010

Driving Retail Sales Through Effective Supply Chain Management Technology, James Haws

Regis University Student Publications (comprehensive collection)

Supply chain management coordinates the production and distribution of a product with the goal of increasing profitability and productivity. Advancements in technology and workflows in recent years have enabled distributors, suppliers, and retailers to operate more efficiently and effectively. Although significant technological advancements have been made in supply chain management, inventory management still causes a number of problems for retailers. The average out-of -stock rate nationally is approximately at an 8% level (Corsten & Gruen, 2003). Inadequate inventory management can reduce retail sales, drive up costs associated with transportation and storage, decrease customer loyalty, and ultimately lead to a significant …


Social Networking Privacy: A Qualitative Study Of The Risks And Effects Of Sharing Data To A Global Environment Via Facebook, Bryan L. Mack Jul 2010

Social Networking Privacy: A Qualitative Study Of The Risks And Effects Of Sharing Data To A Global Environment Via Facebook, Bryan L. Mack

Regis University Student Publications (comprehensive collection)

Young women have placed themselves at risk by disclosing private and sensitive data on their Facebook accounts. Privacy settings which can help prevent unauthorized access of this data exist, but some women choose to ignore them. This study is an attempt to gain an understanding of this phenomenon and answer the question of why young women choose to share personal information. Qualitative interviews of college students were conducted and the results interpreted in this paper. The results of this interview are intended to supply research for future studies which aim to minimize problems caused to individuals who choose to share …


A Security Assessment Of Mobikey For Remote Access, Joseph Brooks Jun 2010

A Security Assessment Of Mobikey For Remote Access, Joseph Brooks

Regis University Student Publications (comprehensive collection)

Today, it is very common for employees to need to work when outside of the office. For various reasons, it's important that they be able to work anytime and anywhere. However, this raises security concerns about how this is accomplished. There are many options, such as virtual private networks (VPNs) and remote desktop solutions, but each comes with its own risks. A newer option is the MobiKEY from Route1, which allows users to connect to their work resources from anywhere. Route1 touts the MobiKEY, powered by MobiNET, as a much more secure method of remote access. How does it stack …


Evaluation Of Dnssec In Microsoft Windows And Microsoft Windows Server 2008 R2, Christopher Hair Jun 2010

Evaluation Of Dnssec In Microsoft Windows And Microsoft Windows Server 2008 R2, Christopher Hair

Regis University Student Publications (comprehensive collection)

The Domain Name System (DNS) provides important name resolution services on the Internet. The DNS has been found to have security flaws which have the potential to undermine the reliability of many Internet-based systems. DNS Security Extensions (DNSSEC) offers a long-term solution these DNS security flaws. However, DNSSEC adoption has been slow because it is challenging to deploy and administer. DNSSEC has also been criticized for not being an "end-toend" solution. Microsoft included support for DNSSEC in its latest operating systems, Windows Server 2008 R2 and Windows 7. This thesis concluded that DNSSEC features in Windows Server 2008 R2 and …


Inquiry In Support Of The Knowledge Sharing Life Cycle Within A Higher Education Database Practicum: A Case Study At Regis University, Martha Jorgensen May 2010

Inquiry In Support Of The Knowledge Sharing Life Cycle Within A Higher Education Database Practicum: A Case Study At Regis University, Martha Jorgensen

Regis University Student Publications (comprehensive collection)

The Regis University database practicum provides an opportunity for students to get hands-on experience with Database Administrator (DBA) tasks as they support the virtual lab environment used by students enrolled in database courses at the university. The student DBA team is new each semester and has a short time to become familiar with the environment they are supporting and the tools they will be using. Inefficient communication and organization delay the resolution of production issues. This study analyzed the current knowledge sharing culture, technologies, and processes of the database practicum. The goal of the study was to determine accessibility of …


Energy Savings Through Multi-Level Security Clients, Keith S. Mcabee May 2010

Energy Savings Through Multi-Level Security Clients, Keith S. Mcabee

Regis University Student Publications (comprehensive collection)

In a multi-desktop environment, where users are required to access separate desktops to use different systems due to security requirements, the redundant desktop computers present a gross inefficiency in relation to power consumption even if each individual system is thoroughly examined and overhauled for energy efficiency. Several organizations require the use of separate networks and computer systems to perform different functions or access different data. The separation of networks is often the consequence of the need for security between the information and data on each individual system. The military is an excellent example of this situation. The need to separate …


A Strategy For Improving Performance On A Sharepoint Social Computing Portal, Matt Adkins May 2010

A Strategy For Improving Performance On A Sharepoint Social Computing Portal, Matt Adkins

Regis University Student Publications (comprehensive collection)

An important usability rule for any web site is the concept of speed. Failing to provide prompt pages and data will result in a negative view of the site and ultimately a lack of usership. In spite of this, many organizations implement web sites without a clear strategy regarding performance. This project explores three database strategies to consider when deploying a Microsoft SharePoint website with a social computing usage style. Although all of the strategies do not provide significant performance gains, the study illuminates several important factors that will increase performance in sites that use other usage styles. To properly …


Information Security Among Small Organizations: A Survey, Jason Carter Apr 2010

Information Security Among Small Organizations: A Survey, Jason Carter

Regis University Student Publications (comprehensive collection)

Small businesses are at extreme risk from network based attacks. A lack of security budget for hardware such as firewalls, intrusion detection systems, proxy servers, and web 2.0 gateway filters, plus a lack of technical expertise in network security, put small businesses at higher risk than larger companies. This paper researches the current state of small business network security and the types of threats they are seeing. It also looks at the factors that determine when and why security is implemented or modified.


Capability Maturity Model Integration (Cmmi) For Small Organizations, Kevin Scott Mar 2010

Capability Maturity Model Integration (Cmmi) For Small Organizations, Kevin Scott

Regis University Student Publications (comprehensive collection)

Software Process Improvement (SPI) is a large area of expertise that deals with software development standard processes and is a progression of proven methods of process improvement from many different methodologies. Personal Software Process (PSP) and Team Software Process (TSP) complement the implementation of Capability Maturity Model Implementation (CMMI) and can be applied gradually from the individual, to the team, and then to the organization. These solutions from Carnegie Melon's Software Engineering Institute (SEI) are leading edge for the field of process improvement. Solutions like this consume many resources, are very complex, require years to implement, and can be costly. …


The Use Of Olap Reporting Technology To Improve Patient Care Services Decision Making Within The University Health Center, Carlos M. Gonzalez Mar 2010

The Use Of Olap Reporting Technology To Improve Patient Care Services Decision Making Within The University Health Center, Carlos M. Gonzalez

Regis University Student Publications (comprehensive collection)

The purpose of this paper is to demonstrate that it is feasible for the student health center to leverage existing clinical data in a data warehouse by using OLAP reporting in order to improve patient care and health care services decision making. Historically, University health care centers have relied mainly on operational data sources for critical health care decision making. These sources of data do not contain enough information to allow health officials to recognize trends or predict how future changes in health care services might vastly improve overall heath care. Four proof of concept artifacts are constructed through design …


Mapping System Management Of Two Erps (Oracle Ebusiness Suit And Peoplesoft), Eric Hernandez Mar 2010

Mapping System Management Of Two Erps (Oracle Ebusiness Suit And Peoplesoft), Eric Hernandez

Regis University Student Publications (comprehensive collection)

Due to the fact that Enterprise Resource Planning (ERP) vendors provide business solutions to address similar business challenges, most ERP products have a lot of similar components and functionalities. Using these similar components and functionalities, ERP system management of one ERP product can be mapped to a different ERP product. In this particular case, E-Business Suite's (EBS) system management is mapped against PeopleSoft (PS). By having an EBS Administrator indirectly collaborate with a PS administrator, a system management mapping table linking the two ERP systems was established. By allowing an EBS Administrator handle PS systems using the mapping solution, the …


Design And Implementation Of A Podcast Recording Studio For Business Communications, Timothy W. Mclaughlin Feb 2010

Design And Implementation Of A Podcast Recording Studio For Business Communications, Timothy W. Mclaughlin

Regis University Student Publications (comprehensive collection)

Podcasting is the creation of recorded information and its delivery over the Internet, using web syndication technology. Businesses around the world are increasing their use of podcasts as a means for delivering information to their customers and employees. The purpose of this project paper is to examine the business need for podcasting, and to demonstrate that businesses can assemble an inexpensive recording studio to create podcasts. The review of previous literature included an examination of why podcasting has become important to business communications; how some businesses are currently using podcasting as a communications tool; the technology involved in podcasting; and …


Evaluation And Development Of Selection Criteria To Guide Organizational Selection Of A Project Management Maturity Model, Diane Zandin Feb 2010

Evaluation And Development Of Selection Criteria To Guide Organizational Selection Of A Project Management Maturity Model, Diane Zandin

Regis University Student Publications (comprehensive collection)

Organizations wishing to measurably and continuously improve processes often look towards maturity models, such as OPM3 and CMMI, as their panacea. However, selecting the wrong model for the organizations goals and resources can result in project failure. This study, focusing on OPM3 and CMMI, proposes a guidance tool that can help organizations select the right maturity model. The study is framed in the state government context due to the complexity and relative insularity of that environment. In addition to being a limited based, state governments have several limiters that factor into project selection, namely budget and taxpayer transparency. Using several …


An Agile Ba: A Case Study Of The Business Analyst In Agile, Nathan Wagner Jan 2010

An Agile Ba: A Case Study Of The Business Analyst In Agile, Nathan Wagner

Regis University Student Publications (comprehensive collection)

Companies adopting Agile software development methodologies are becoming a growing trend. The roles responsible for managing and participating in these types of projects must make a significant shift in focus when moving from the waterfall development process to a more adaptive way of working. Even with the growing adoption and increasing amount of study around Agile, the literature and texts prescribing the various Agile methodologies do not address the specific role of the Business Analayst. In this paper, the role of the Business Analyst in Agile is explored through a qualitative study within a large software development organization utilizing Agile …