Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Theses/Dissertations

2013

Institution
Keyword
Publication

Articles 1 - 19 of 19

Full-Text Articles in Business

Consumer Adoption Of Health Information Systems, Sankara Subramanian Srinivasan Dec 2013

Consumer Adoption Of Health Information Systems, Sankara Subramanian Srinivasan

Graduate Theses and Dissertations

At nearly 18 percent of the country's GDP, the U.S. healthcare industry continues to wrestle with growing cost and a quality of care that does not match the increased spending. The dominant focus to date has been on promoting Health IT (HIT) system implementation and digitizing health records at the provider's end, with scant attention to the role of the patient in the healthcare process. The source of inefficiency in the healthcare system is not only on account of shortcomings at the provider's end but also due to non-compliance (such as failing to adhere to medication advice and follow-up visits) …


Workforce Preparedness Of Information Systems Students: Perceptions Of Students, Alumni, And Employers, Susan Bristow Dec 2013

Workforce Preparedness Of Information Systems Students: Perceptions Of Students, Alumni, And Employers, Susan Bristow

Graduate Theses and Dissertations

Employers of newly hired higher education graduates report their new workforce is not prepared. Further research was required to discover insights to the workforce readiness gap. This concurrent mixed methods study explored what competencies influenced employer's perceptions of the work-readiness of Information Systems (ISYS) undergraduate students and discovered ISYS graduates' and current ISYS students' perceptions of their work-readiness. Participants consisted of a convenience sample including 69 ISYS program upperclassmen, 20 ISYS program alumni, and 8 employers of the ISYS program graduates. ISYS program alumni completed an online Qualtrics survey to measure the participants' perception of their workforce preparedness. ISYS program …


Research On The Establishment Of Promulgation System Of Maritime Safety Information In Chengshan Jiao Vts Center, Yunjiang Liu Aug 2013

Research On The Establishment Of Promulgation System Of Maritime Safety Information In Chengshan Jiao Vts Center, Yunjiang Liu

Maritime Safety & Environment Management Dissertations (Dalian)

No abstract provided.


A Study On The Application Of Information System In Patrol Vessel Management, Lei Li Aug 2013

A Study On The Application Of Information System In Patrol Vessel Management, Lei Li

Maritime Safety & Environment Management Dissertations (Dalian)

No abstract provided.


Economic Perspective On Cloud Computing: Three Essays, Abhijit Dutt Aug 2013

Economic Perspective On Cloud Computing: Three Essays, Abhijit Dutt

Theses and Dissertations

Improvements in Information Technology (IT) infrastructure and standardization of interoperability standards among heterogeneous Information System (IS) applications have brought a paradigm shift in the way an IS application could be used and delivered. Not only an IS application can be built using standardized component but also parts of it can be hosted by different organizations in different locations provided it can be accessed using the Internet. This dissertation is an attempt to uncover unique aspects of this phenomenon known as Software as a Service (SaaS).

The first essay examines design decision making by SaaS providers by analyzing effects of two …


Innovation-Ict-Cybersecurity: The Triad Relationship And Its Impact On Growth Competitiveness, Manal M. Yunis Aug 2013

Innovation-Ict-Cybersecurity: The Triad Relationship And Its Impact On Growth Competitiveness, Manal M. Yunis

Theses and Dissertations - UTB/UTPA

This study examines the global growth competitiveness of countries using the dynamics of growth, ICT, and innovation. It also introduces a new dynamic, cybersecurity, and argues that within a growth competitiveness framework, ICT, innovation, and cybersecurity mechanisms allow some countries to achieve higher ranks on the competitiveness ladder than others. Based on a theoretical framework that encompasses the economic growth model, the complementarity theory, and the international law theory, a model that integrates ICT, innovation, and cybersecurity, depicts the relationships amongst them and with growth competitiveness, and incorporates complementary factors with possible moderating effect is presented. The model proposed relationships …


Concept Graphs: Applications To Biomedical Text Categorization And Concept Extraction, Said Bleik May 2013

Concept Graphs: Applications To Biomedical Text Categorization And Concept Extraction, Said Bleik

Dissertations

As science advances, the underlying literature grows rapidly providing valuable knowledge mines for researchers and practitioners. The text content that makes up these knowledge collections is often unstructured and, thus, extracting relevant or novel information could be nontrivial and costly. In addition, human knowledge and expertise are being transformed into structured digital information in the form of vocabulary databases and ontologies. These knowledge bases hold substantial hierarchical and semantic relationships of common domain concepts. Consequently, automating learning tasks could be reinforced with those knowledge bases through constructing human-like representations of knowledge. This allows developing algorithms that simulate the human reasoning …


The Chain-Link Fence Model: A Framework For Creating Security Procedures, Robert F. Houghton May 2013

The Chain-Link Fence Model: A Framework For Creating Security Procedures, Robert F. Houghton

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Information technology security professionals are facing an ever growing threat to the networks that they defend. The process for creating procedures to help stem this threat is very difficult for security professionals. The Chain-Link Fence Model helps security professionals by guiding them through the process of creating and implementing new security procedures.


Communication Artifacts And Interaction Evaluation For Requirements Engineering, Miloslava Plachkinova May 2013

Communication Artifacts And Interaction Evaluation For Requirements Engineering, Miloslava Plachkinova

UNLV Theses, Dissertations, Professional Papers, and Capstones

This paper aims to answer an important question regarding the development of new information systems (IS): "What is the predominant factor for the selection of communication artifacts for requirements engineering (RE)?". Many researchers have focused on the RE and communication as separate disciplines, but little or no research addressed the RE communication issues. These problems are important because they often lead to misunderstanding and misinterpretation of the gathered requirements. We develop expectations about the RE communication process based on prior literature from both disciplines and we test them through several case studies. Our methodology consists of analysis of six case …


Senior Project Report - Doctest, Stephen Weessies Mar 2013

Senior Project Report - Doctest, Stephen Weessies

Computer Engineering

DocTest is a program that, simply put, allows a programmer or user to document STANAG 4586 (a standard for unmanned aerial vehicle interoperability) messages and test the vehicle system at Lockheed Martin [5]. The program is extensible to allow for further development aiding our software team to do what they do best and not get bogged down in tedious but necessary documentation. DocTest is also used to aid in testing, keeping track of the issues and bugs found and creating a document that captures each issue so an issue is not missed or forgotten. This program was made for use …


The Informavore Shopper: Analysis Of Information Foraging, System Design, And Purchasing Behavior In Online Retail Stores, Jeff Min Teck Hong Jan 2013

The Informavore Shopper: Analysis Of Information Foraging, System Design, And Purchasing Behavior In Online Retail Stores, Jeff Min Teck Hong

Dissertations and Theses Collection (Open Access)

Global online retail sales are on the rise and are predicted to experience a double digit growth annually over the next three years. Given little marginal cost involved in adding new products and brands to their catalogues, online retailers tend to increase product and brand offerings to increase sales by selling products that could not have been sold due to space constraints in physical stores. Frank Urbanowski, Director of MIT Press, attributed the 12% increase in sales of backlist titles directly to increased accessibility to these titles through the Internet. For consumers, the ability to buy products that they would …


Integrating The Sap Software Into The Manufacturing Engineering Curriculum, Lin Qian Jan 2013

Integrating The Sap Software Into The Manufacturing Engineering Curriculum, Lin Qian

Open Access Theses

The concept of Enterprise Resource Planning (ERP) was developed to integrate data efficiently and eliminate redundancy within organizations. Worldwide industries rely on ERP systems to keep a competitive advantage in world market place. Besides, cross-functional knowledge is required in industry. It is critical that schools integrate ERP concepts and methods in to academic curricula for Technology and Engineering School.

This thesis examined the effectiveness of a simulation game as a method for teaching for ERP systems in Technology and Engineering. The quasi-experimental design was used in this study to determine if the SAP simulation game had an impact on students' …


Developing Focused Auditing Tools: A Practical Framework For Creating Formalized Multi-Level Security Policy Specifications, Barbara Ann Brough Jan 2013

Developing Focused Auditing Tools: A Practical Framework For Creating Formalized Multi-Level Security Policy Specifications, Barbara Ann Brough

Theses Digitization Project

The purpose of this study is that formalized policy specifications and focused penetration testing are needed to effectively audit any information system. Designing and maintaining the security system information is the primary duty of the cyber security professional. In today's world, nearly all government agencies manage some form of financial, defense, national security, and/or privacy information security policies. It is also necessary in this environment that agencies are accountable for auditing the security systems that protect this information.


The Implementation Of A Thin Client In The Department Of Defense Network System, Sung Ju In Jan 2013

The Implementation Of A Thin Client In The Department Of Defense Network System, Sung Ju In

Theses Digitization Project

The purpose of this project is to introduce and analyze a thin client solution that could enhance the overall Department of Defense (DoD) network system as well as its IT security posture, minimize risk from external threats, and ease of network operations.


An Analysis Of Underlying Competencies And Computer And Information Technology Learning Objectives For Business Analysis, Ryan Thomas Quigley Jan 2013

An Analysis Of Underlying Competencies And Computer And Information Technology Learning Objectives For Business Analysis, Ryan Thomas Quigley

Open Access Theses

This research examines whether the Computer and Information Technology (CIT) department at Purdue University should develop a business analyst concentration. The differences between system and business analysts, evolution of the business analyst profession, job demand and trends, and applicable model curricula were explored to support this research. Review of relevant literature regarding the topics suggested that a business analyst concentration should be developed. A gap analysis was performed to determine how well selected CIT courses address the skills and competencies required by today's business analysts. The primary finding, as a result of the analysis, was that CIT courses alone are …


Queuepay.Com: Building A System For Cardholders' Transaction Security, Jose Ramon Gonzalez Jan 2013

Queuepay.Com: Building A System For Cardholders' Transaction Security, Jose Ramon Gonzalez

Theses Digitization Project

The purpose of this project was to apply the skills learned in the MBA program to help develop a solution to a problem that costs billions of dollars every year in fraudulent related losses arising from the use of payment cards such as debit cards, credit cards, charge cards or prepaid cards. The project analyzes the industry of payment cards, the emergence of the problem, and builds a prototype that addresses the problem. Queuepay.com is designed to provide services to its cardholders that will significantly reduce the risk of fraud.


Women Authors Of Technical Writing Textbooks From 1923 To 1973, Melissa Nicole Wampler Jan 2013

Women Authors Of Technical Writing Textbooks From 1923 To 1973, Melissa Nicole Wampler

Masters Theses

"The published histories of technical writing textbooks do not usually include many women-authored textbooks. To find out why women-authored textbooks have been marginalized in these pedagogical histories, I selected seven women-authored textbooks and four men-authored textbooks published from 1923 to 1973, investigated the backgrounds of the authors and key features of their textbooks, and used the collected data to compare the women-authored textbooks to the men-authored textbooks. I was not able to find any reason why the women-authored textbooks have been or should be marginalized in histories of technical writing textbooks; however, my study had several limitations. My thesis begins …


Lexis In Chemical Engineering Discourse: Analyzing Style In Chemical Engineering Research Articles Through A Rhetorical Lens, David Lamar Young Jan 2013

Lexis In Chemical Engineering Discourse: Analyzing Style In Chemical Engineering Research Articles Through A Rhetorical Lens, David Lamar Young

Masters Theses

"This study examines the style of chemical engineering research articles to discover stylistic trends that may be applicable to authors looking to publish their own research. Rhetorical stylistic analysis was used as a research method to allow for thorough analysis of all articles in the sample. Ten research articles from the two prominent chemical engineering journals were chosen using specific criteria to constitute a sample of articles that could most accurately represent the population of chemical engineering research articles. Each article was then analyzed line by line to identify markers of chemical engineering research article style, including the following: ▬Use …


Consumer Acceptance Of Mobile Payments In Restaurants, Anna Shatskikh Jan 2013

Consumer Acceptance Of Mobile Payments In Restaurants, Anna Shatskikh

USF Tampa Graduate Theses and Dissertations

Regardless all the advantages of MPs, it has not reach the sizable customer base. In this paper, we examined the core drivers of using mobile payments (MPs) in restaurant industry from the consumers' perspective. Based on the Technology Acceptance Model (TAM), we developed a six factor model to reveal the determinants of consumers' intention to use MPs in restaurant. Security, subjective norm, compatibility with lifestyle, and previous experience with MPs were added to the traditional two factor TAM model (usefulness and ease of use). 300 respondents were recruited from an online survey agency and 258 valid responses were included in …