Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Cybersecurity (3)
- ARIMA (2)
- Blockchain (2)
- Consumer (2)
- Ethics (2)
-
- Healthcare (2)
- Internet (2)
- Random Forest (2)
- ToC (2)
- AI (1)
- Adaptive learning systems (1)
- Aeronautics (1)
- Aerospace (1)
- Agent-based Modeling (ABM) (1)
- And ICT and Social Environment. (1)
- Anticipatory governance (1)
- Application Design (1)
- Application Development (1)
- Artificial Intelligence (1)
- Artificial Neural Network (1)
- Assistive systems (1)
- Attitude (1)
- Audit (1)
- Augmented Reality (1)
- Aviation (1)
- Azure (1)
- Bias (1)
- Biomimicry (1)
- Bitcoin (1)
- Blacklist (1)
- Publication
-
- Journal of International Technology and Information Management (20)
- Ilker Karaca (2)
- SMU Data Science Review (2)
- Chancellor’s Honors Program Projects (1)
- Computer Ethics - Philosophical Enquiry (CEPE) Proceedings (1)
-
- Computer Science Faculty Publications and Presentations (1)
- Dissertations, Theses, and Capstone Projects (1)
- Engineering and Technology Management Student Projects (1)
- Honors Projects (1)
- Honors Theses (1)
- International Journal of Applied Management and Technology (1)
- J. Philip Craiger, Ph.D. (1)
- MPA/MPP/MPFM Capstone Projects (1)
- Research Collection School Of Computing and Information Systems (1)
- Publication Type
Articles 31 - 35 of 35
Full-Text Articles in Business
A Multilayer Secured Messaging Protocol For Rest-Based Services, Idongesit Efaemiode Eteng
A Multilayer Secured Messaging Protocol For Rest-Based Services, Idongesit Efaemiode Eteng
Journal of International Technology and Information Management
The lack of descriptive language and security guidelines poses a big challenge to implementing security in Representational State Transfer (REST) architecture. There is over reliance on Secure Socket Layer/Transport Layer Security (SSL/TLS), which in recent times has proven to be fallible. Some recent attacks against SSL/TLS include: POODLE, BREACH, CRIME, BEAST, FREAK etc. A secure messaging protocol is implemented in this work. The protocol is further compiled into a reusable library which can be called by other REST services. Using Feature Driven Development (FDD) software methodology, a two layer security protocol was developed. The first layer is a well hardened …
Agent-Based Modeling And Simulation Approaches In Stem Education Research, Shanna R. Simpson-Singleton, Xiangdong Che
Agent-Based Modeling And Simulation Approaches In Stem Education Research, Shanna R. Simpson-Singleton, Xiangdong Che
Journal of International Technology and Information Management
The development of best practices that deliver quality STEM education to all students, while minimizing achievement gaps, have been solicited by several national agencies. ABMS is a feasible approach to provide insight into global behavior based upon the interactions amongst agents and environments. In this review, we systematically surveyed several modeling and simulation approaches and discussed their applications to the evaluation of relevant theories in STEM education. It was found that ABMS is optimal to simulate STEM education hypotheses, as ABMS will sensibly present emergent theories and causation in STEM education phenomena if the model is properly validated and calibrated.
Table Of Contents Jitim Vol 28 Issue 4, 2019
Table Of Contents Jitim Vol 28 Issue 4, 2019
Journal of International Technology and Information Management
Table of Contents
Exploring Critical Success Factors For Data Integration And Decision-Making In Law Enforcement, Marquay Edmondson, Walter R. Mccollum, Mary-Margaret Chantre, Gregory Campbell
Exploring Critical Success Factors For Data Integration And Decision-Making In Law Enforcement, Marquay Edmondson, Walter R. Mccollum, Mary-Margaret Chantre, Gregory Campbell
International Journal of Applied Management and Technology
Agencies from various disciplines supporting law enforcement functions and processes have integrated, shared, and communicated data through ad hoc methods to address crime, terrorism, and many other threats in the United States. Data integration in law enforcement plays a critical role in the technical, business, and intelligence processes created by users to combine data from various sources and domains to transform them into valuable information. The purpose of this qualitative phenomenological study was to explore the current conditions of data integration frameworks through user and system interactions among law enforcement organizational processes. Further exploration of critical success factors used to …
Procure-To-Pay Software In The Digital Age: An Exploration And Analysis Of Efficiency Gains And Cybersecurity Risks In Modern Procurement Systems, Drew Lane
MPA/MPP/MPFM Capstone Projects
Procure-to-Pay (P2P) softwares are an integral part of the payment and procurement processing functions at large-scale governmental institutions. These softwares house all of the financial functions related to procurement, accounts payable, and often human resources, helping to facilitate and automate the process from initiation of a payment or purchase, to the actual disbursal of funds. Often, these softwares contain budgeting and financial reporting tools as part of the offering. As such an integral part of the financial process, these softwares obviously come at an immense cost from a set of reputable vendors. In the case of government, these vendors mainly …