Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

2017

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 56

Full-Text Articles in Business

Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj Dec 2017

Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj

Capstones

Breadcrumbs: Privacy as a Privilege Abstract

By: Prachi Bhardwaj

In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.

That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …


Multi-Step Tokenization Of Automated Clearing House Payment Transactions, Privin Alexander Nov 2017

Multi-Step Tokenization Of Automated Clearing House Payment Transactions, Privin Alexander

USF Tampa Graduate Theses and Dissertations

Since its beginnings in 1974, the Automated Clearing House (ACH) network has grown into one of the largest, safest, and most efficient payment systems in the world. An ACH transaction is an electronic funds transfer between bank accounts using a batch processing system.

Currently, the ACH Network moves almost $43 trillion and 25 billion electronic financial transactions each year. With the increasing movement toward an electronic, interconnected and mobile infrastructure, it is critical that electronic payments work safely and efficiently for all users. ACH transactions carry sensitive data, such as a consumer's name, account number, tax identification number, account holder …


A Conversation Centric Approach To Understanding And Supporting The Coordination Of Social Group-Activities, Richard P. Schuler Oct 2017

A Conversation Centric Approach To Understanding And Supporting The Coordination Of Social Group-Activities, Richard P. Schuler

Dissertations

Despite the widespread and large variety of communication tools available to us such as, text messaging, Skype, email, twitter, Facebook, instant messaging, GroupMe, WhatsApp, Snapchat, etc., many people still routinely find coordinating activities with our friends to be a very frustrating experience. Everyone, has at least once, encountered the difficulties involved with deciding what to do as a group. Some friends may be busy, others may have already seen the movie that the others want to see, and some do not like Mexican food. It is a challenge everyone has faced and continue to face. This is a result of …


Vungle Inc. Improves Monetization Using Big-Data Analytics, Bert De Reyck, Ioannis Fragkos, Yael Gruksha-Cockayne, Casey Lichtendahl, Hammond Guerin, Andre Kritzer Oct 2017

Vungle Inc. Improves Monetization Using Big-Data Analytics, Bert De Reyck, Ioannis Fragkos, Yael Gruksha-Cockayne, Casey Lichtendahl, Hammond Guerin, Andre Kritzer

Research Collection Lee Kong Chian School Of Business

The advent of big data has created opportunities for firms to customize their products and services to unprecedented levels of granularity. Using big data to personalize an offering in real time, however, remains a major challenge. In the mobile advertising industry, once a customer enters the network, an ad-serving decision must be made in a matter of milliseconds. In this work, we describe the design and implementation of an ad-serving algorithm that incorporates machine-learning methods to make personalized ad-serving decisions within milliseconds. We developed this algorithm for Vungle Inc., one of the largest global mobile ad networks. Our approach also …


Enhancing The Internet Of Things Architecture With Flow Semantics, Allen Ronald Deserranno Sep 2017

Enhancing The Internet Of Things Architecture With Flow Semantics, Allen Ronald Deserranno

USF Tampa Graduate Theses and Dissertations

Internet of Things (‘IoT’) systems are complex, asynchronous solutions often comprised of various software and hardware components developed in isolation of each other. These components function with different degrees of reliability and performance over an inherently unreliable network, the Internet. Many IoT systems are developed within silos that do not provide the ability to communicate or be interoperable with other systems and platforms. Literature exists on how these systems should be designed, how they should interoperate, and how they could be improved, but practice does not always consult literature.

The work brings together a proposed reference architecture for the IoT …


Combining Machine-Based And Econometrics Methods For Policy Analytics Insights, Robert J. Kauffman, Kwansoo Kim, Sang-Yong Tom Lee, Ai Phuong Hoang, Jing Ren Sep 2017

Combining Machine-Based And Econometrics Methods For Policy Analytics Insights, Robert J. Kauffman, Kwansoo Kim, Sang-Yong Tom Lee, Ai Phuong Hoang, Jing Ren

Research Collection School Of Computing and Information Systems

Computational Social Science (CSS) has become a mainstream approach in the empirical study of policy analytics issues in various domains of e-commerce research. This article is intended to represent recent advances that have been made for the discovery of new policy-related insights in business, consumer, and social settings. The approach discussed is fusion analytics, which combines machine-based methods from Computer Science (CS) and explanatory empiricism involving advanced Econometrics and Statistics. It explores several efforts to conduct research inquiry in different functional areas of Electronic Commerce and Information Systems (IS), with applications that represent different functional areas of business, as well …


Zero Textbook Cost Syllabus For Cis 3367 (Spreadsheet Applications In Business), Soniya Dsouza Aug 2017

Zero Textbook Cost Syllabus For Cis 3367 (Spreadsheet Applications In Business), Soniya Dsouza

Open Educational Resources

The primary focus of this course is to learn how to construct and use powerful spreadsheets for effective managerial decision-making. This course is mostly project- oriented with a dual focus on spreadsheet engineering and quantitative modeling of financial applications. Students will learn to develop powerful spreadsheet models and perform data analysis using Pivot Tables, VLookUp, Data Validation techniques and Sub Total functions. Students will also learn how to enhance spreadsheets by creating dashboards on financial data. The Visual Basic (macro) concepts will also be introduced to students. With the knowledge and hands-on experience of these concepts, students will be prepared …


Detecting User Demographics In Twitter To Inform Health Trends In Social Media, Christopher R. Markson Jul 2017

Detecting User Demographics In Twitter To Inform Health Trends In Social Media, Christopher R. Markson

Dissertations

The widespread and popular use of social media and social networking applications offer a promising opportunity for gaining knowledge and insights regarding population health conditions thanks to the diversity and abundance of online user-generated information (UGHI) relating to healthcare and well-being. However, users on social media and social networking sites often do not supply their complete demographic information, which greatly undermines the value of the aforementioned information for health 2.0 research, e.g., for discerning disparities across population groups in certain health conditions. To recover the missing user demographic information, existing methods observe a limited scope of user behaviors, such as …


Multi-Authority Abs Supporting Dendritic Access Structure, Ruo Mo, Jian-Feng Ma, Ximeng Liu, Qi Li Jul 2017

Multi-Authority Abs Supporting Dendritic Access Structure, Ruo Mo, Jian-Feng Ma, Ximeng Liu, Qi Li

Research Collection School Of Computing and Information Systems

Attribute-based signature (ABS), which could realize fine-grained access control, was considered to be an importantmethod for anonymous authentication in cloud computing. However, normal ABS only provided simple accesscontrol through threshold structure and thus could not cope with the large-scale attribute sets of users in the cloud. Moreover,the attribute sets were supervised by only one attribute authority, which increased the cost of computation and storage.The whole system was in danger of collapsing once the attribute authority was breached. Aiming at tackling theproblems above, a novel scheme, was proposed called multi-authority ABS supporting dendritic access structure whichsupported any AND, OR and threshold …


How To Enable Future Faster Payments? An Evaluation Of A Hybrid Payments Settlement Mechanism, Zhiling Guo, Yuanzhi Huang Jul 2017

How To Enable Future Faster Payments? An Evaluation Of A Hybrid Payments Settlement Mechanism, Zhiling Guo, Yuanzhi Huang

Research Collection School Of Computing and Information Systems

In the era of Fintech innovation and e-commerce, faster settlement of massive retail transactions is crucial for business growth and financial system stability. However, speeding up payments settlement can create periodic liquidity shortfalls to banks which would incur high cost of funds in the settlement process. We propose a new hybrid settlement mechanism design that integrates features of real-time gross settlement, deferred net settlement, and central queue management structure. The hybrid mechanism is managed by an intermediary and is particularly suitable to settle large volume of small-value retail payments. We evaluate the mechanism using computer experiments and simulation. We find …


Does Director Interlock Impact The Diffusion Of Accounting Method Choice?, Jie Han, Nan Hu, Ling Liu, Gaoliang Tian Jul 2017

Does Director Interlock Impact The Diffusion Of Accounting Method Choice?, Jie Han, Nan Hu, Ling Liu, Gaoliang Tian

Research Collection School Of Computing and Information Systems

This paper examines the influence of director interlock on firms' discrete accounting method choices from the perspective of behavior diffusion. We argue that firm managers will imitate their interlocked-partner firm's accounting method choices when choosing their own accounting methods. We find that when there is an interlock relationship between two firms, their accounting method choices, including inventory and depreciation methods, are similar to each other, indicating that accounting method choices can diffuse across firms through director interlock. In addition, such similarity is greater the longer the interlock relationship between the two firms is and as uncertainty increases. Further, the interlock …


Mining Capstone Project Wikis For Knowledge Discovery, Swapna Gottipati, Venky Shankararaman, Melvrivk Goh Jul 2017

Mining Capstone Project Wikis For Knowledge Discovery, Swapna Gottipati, Venky Shankararaman, Melvrivk Goh

Research Collection School Of Computing and Information Systems

Wikis are widely used collaborative environments as sources of information and knowledge. The facilitate students to engage in collaboration and share information among members and enable collaborative learning. In particular, Wikis play an important role in capstone projects. Wikis aid in various project related tasks and aid to organize information and share. Mining project Wikis is critical to understand the students learning and latest trends in industry. Mining Wikis is useful to educationists and academicians for decision-making about how to modify the educational environment to improve student's learning. The main challenge is that the content or data in project Wikis …


Marketing The Mountain State: A Large N Study Of User Engagement On Twitter, Kirk Richardson Jun 2017

Marketing The Mountain State: A Large N Study Of User Engagement On Twitter, Kirk Richardson

Capstone Projects – Politics and Government

Much of the evolving research on the use of social media in destination marketing emphasizes how information diffusion influences the reputational image of place. The present study uses Twitter data to focus on the relative differences in user engagement across discrete account types. Specifically, this is done to examine how the official destination marketing organization of Montana—the Montana Office of Tourism (MTOT)—performs relative to other account types. Several regression analyses conducted on Twitter data associated with an ongoing MTOT place branding campaign reveal that tweets sent from ‘official’ accounts are more likely to be retweeted, and are estimated to receive …


The Dark Side Of Banning Hacking Technique Discussion, Qiu-Hong Wang, Ting Zhang Le Jun 2017

The Dark Side Of Banning Hacking Technique Discussion, Qiu-Hong Wang, Ting Zhang Le

Research Collection School Of Computing and Information Systems

Prior studies have evidenced the effectiveness of more severe and broader enforcement in deterringcybercrimes. This study addresses the other side of the story. Our data analysis shows that theenforcement against the production / distribution / possession of computer misuse tools tends toincrease the contribution on detection and protection related posts in online hacker forums. Butthis enforcement may discourage those contributors who had originally actively contributed to theprotection discussions. Thus government regulations have to be cautiously justify the incentives ofmultiple parties in the cybersecurity context.


Charitable Fundraising: Gaining Donors' Trust On Online Platforms, Deserinas Sulaeman Jun 2017

Charitable Fundraising: Gaining Donors' Trust On Online Platforms, Deserinas Sulaeman

Research Collection School Of Computing and Information Systems

Trust is crucial in the relationships between charitable fundraisers and potential donors. This study examines factors that can help fundraisers gain potential donors’ trust, which is crucial to the success of the campaigns. Examining charitable fundraising campaigns on an online platform, this study finds that trust issues can be mitigated by providing a campaign description that is more sophisticated, more informative, and with fewer errors. Additionally, setting a higher campaign funding goal tends to lead to a more successful campaign. These characteristics likely reflect a competent, committed, and passionate fundraiser. On the other hand, mere exposure to a wide set …


On Self-Selection Biases In Online Product Reviews, Nan Hu, Paul A. Pavlou, Jie Zhang Jun 2017

On Self-Selection Biases In Online Product Reviews, Nan Hu, Paul A. Pavlou, Jie Zhang

Research Collection School Of Computing and Information Systems

Online product reviews help consumers infer product quality, and the mean (average) rating is often used as a proxy for product quality. However, two self-selection biases, acquisition bias (mostly consumers with a favorable predisposition acquire a product and hence write a product review) and underreporting bias (consumers with extreme, either positive or negative, ratings are more likely to write reviews than consumers with moderate product ratings), render the mean rating a biased estimator of product quality, and they result in the well-known J-shaped (positively skewed, asymmetric, bimodal) distribution of online product reviews. To better understand the nature and consequences of …


Online Advertising, Retail Platform Openness, And Long Tail Sellers, Jianqing Chen, Zhiling Guo Jun 2017

Online Advertising, Retail Platform Openness, And Long Tail Sellers, Jianqing Chen, Zhiling Guo

Research Collection School Of Computing and Information Systems

It becomes increasingly popular that some large online retailers such as Amazon open their platforms to allow third-party retail competitors to sell on their own platforms. We develop an analytical model to examine this retailer market place model and its business impact. We assume that a leading retailer has both valuation advantage that may come from its reputation and information advantage that may come from its brand awarenewss. We find that the availability of relatively low-cost advertising through social media or search engine can effectively reduce the leading retailer's information advantage, and thus be an important driving force for its …


The Retransmission Of Rumor And Rumor Correction Messages On Twitter, Alton Y. K. Chua, Cheng-Ying Tee, Augustine Pang, Ee-Peng Lim Jun 2017

The Retransmission Of Rumor And Rumor Correction Messages On Twitter, Alton Y. K. Chua, Cheng-Ying Tee, Augustine Pang, Ee-Peng Lim

Research Collection Lee Kong Chian School Of Business

This article seeks to examine the relationships among source credibility, message plausibility, message type (rumor or rumor correction) and retransmission of tweets in a rumoring situation. From a total of 5,885 tweets related to the rumored death of the founding father of Singapore Lee Kuan Yew, 357 original tweets without an “RT” prefix were selected and analyzed using negative binomial regression analysis. The results show that source credibility and message plausibility are correlated with retransmission. Also, rumor correction tweets are retweeted more than rumor tweets. Moreover, message type moderates the relationship between source credibility and retransmission as well as that …


Joint Optimization Of Resource Provisioning In Cloud Computing, Jonathan David Chase, Dusit Niyato May 2017

Joint Optimization Of Resource Provisioning In Cloud Computing, Jonathan David Chase, Dusit Niyato

Research Collection School Of Computing and Information Systems

Cloud computing exploits virtualization to provision resources efficiently. Increasingly, Virtual Machines (VMs) have high bandwidth requirements; however, previous research does not fully address the challenge of both VM and bandwidth provisioning. To efficiently provision resources, a joint approach that combines VMs and bandwidth allocation is required. Furthermore, in practice, demand is uncertain. Service providers allow the reservation of resources. However, due to the dangers of over-and under-provisioning, we employ stochastic programming to account for this risk. To improve the efficiency of the stochastic optimization, we reduce the problem space with a scenario tree reduction algorithm, that significantly increases tractability, whilst …


Country 2.0: Upgrading Cities With Smart Technologies, Steven M. Miller May 2017

Country 2.0: Upgrading Cities With Smart Technologies, Steven M. Miller

Asian Management Insights

Advancements in technology are being used to transform our cities into smart cities, but the process is not without its risks.


The Creation Of A Building Map Application For A University Setting, William T. Whitesell Apr 2017

The Creation Of A Building Map Application For A University Setting, William T. Whitesell

Senior Honors Theses

The use of navigational technology in mobile and web devices has sharply increased in recent years. With the capability to create interactive maps now available, navigating in real time between locations has become possible. This is especially essential in areas and organizations experiencing rapid expansion like Liberty University (LU). Therefore, the author proposes a project to create an interactive map application (IMA) for LU’s academic buildings that is scalable and usable through both the university’s website and with a mobile application. There are several considerations that must be taken into account when creating the LU map application, such as development …


Factored Similarity Models With Social Trust For Top-N Item Recommendation, Guibing Guo, Jie Zhang, Feida Zhu, Xingwei Wang Apr 2017

Factored Similarity Models With Social Trust For Top-N Item Recommendation, Guibing Guo, Jie Zhang, Feida Zhu, Xingwei Wang

Research Collection School of Computing and Information Systems

Trust-aware recommender systems have attracted much attention recently due to the prevalence of social networks. However, most existing trust-based approaches are designed for the recommendation task of rating prediction. Only few trust-aware methods have attempted to recommend users an ordered list of interesting items, i.e., item recommendation. In this article, we propose three factored similarity models with the incorporation of social trust for item recommendation based on implicit user feedback. Specifically, we introduce a matrix factorization technique to recover user preferences between rated items and unrated ones in the light of both user-user and item-item similarities. In addition, we claim …


Viewability Prediction For Display Advertising, Chong Wang Apr 2017

Viewability Prediction For Display Advertising, Chong Wang

Dissertations

As a massive industry, display advertising delivers advertisers’ marketing messages to attract customers through graphic banners on webpages. Display advertising is also the most essential revenue source of online publishers. Currently, advertisers are charged by user response or ad serving. However, recent studies show that users barely click or convert display ads. Moreover, about half of the ads are actually never seen by users. In this case, advertisers cannot enhance their brand awareness and increase return on investment. Publishers also lose much revenue. Therefore, the ad pricing standards are shifting to a new model: ad impressions are paid if they …


Understanding The Information-Based Transformation Of Strategy And Society, Eric K. Clemons, Rajiv M. Dewan, Robert J. Kauffman, Thomas A. Weber Apr 2017

Understanding The Information-Based Transformation Of Strategy And Society, Eric K. Clemons, Rajiv M. Dewan, Robert J. Kauffman, Thomas A. Weber

Research Collection School Of Computing and Information Systems

The world economy is undergoing dramatic changes, largely driven by the new availability of fine-grained information. Innovative ways of using data—large and small—have also prompted a rethinking of the boundaries for the combination and use of knowledge. The strategic design of information flows in the economy has the upside of higher economic rents and competitive advantage, as well as the downsides of wealth inequality and abuse of power. This has brought a wide range of regulatory challenges. To understand the nature of these sweeping changes, it is important to examine the new ways information is used, and how information flows …


Inferring User Consumption Preferences From Social Media, Yang Li, Jing Jiang, Ting Liu Mar 2017

Inferring User Consumption Preferences From Social Media, Yang Li, Jing Jiang, Ting Liu

Research Collection School Of Computing and Information Systems

Social Media has already become a new arena of our lives and involved different aspects of our social presence. Users' personal information and activities on social media presumably reveal their personal interests, which offer great opportunities for many e-commerce applications. In this paper, we propose a principled latent variable model to infer user consumption preferences at the category level (e.g. inferring what categories of products a user would like to buy). Our model naturally links users' published content and following relations on microblogs with their consumption behaviors on e-commerce websites. Experimental results show our model outperforms the state-of-the-art methods significantly …


Modeling Adoption Dynamics In Social Networks, Minh Duc Luu Feb 2017

Modeling Adoption Dynamics In Social Networks, Minh Duc Luu

Dissertations and Theses Collection

This dissertation studies the modeling of user-item adoption dynamics where an item can be an innovation, a piece of contagious information or a product. By “adoption dynamics” we refer to the process of users making decision choices to adopt items based on a variety of user and item factors. In the context of social networks, “adoption dynamics” is closely related to “item diffusion”. When a user in a social network adopts an item, she may influence her network neighbors to adopt the item. Those neighbors of her who adopt the item then continue to trigger more adoptions. As this progress …


Assessing Differences Between Physician's Realized And Anticipated Gains From Electronic Health Record Adoption, Lori T. Peterson, Eric W. Ford, John Eberhardt, T. R. Huerta Jan 2017

Assessing Differences Between Physician's Realized And Anticipated Gains From Electronic Health Record Adoption, Lori T. Peterson, Eric W. Ford, John Eberhardt, T. R. Huerta

Lori Peterson

Return on investment (ROI) concerns related to Electronic Health Records (EHRs) are a major barrier to the technology’s adoption. Physicians generally rely upon early adopters to vet new technologies prior to putting them into widespread use. Therefore, early adopters’ experiences with EHRs play a major role in determining future adoption patterns. The paper’s purposes are: (1) to map the EHR value streams that define the ROI calculation; and (2) to compare Current Users’ and Intended Adopters’ perceived value streams to identify similarities, differences and governing constructs. Primary data was collected by the Texas Medical Association, which surveyed 1,772 physicians on …


Information Technology Training To Promote Collaboration Among Multiple Generations, Gregg Foster Jan 2017

Information Technology Training To Promote Collaboration Among Multiple Generations, Gregg Foster

Walden Dissertations and Doctoral Studies

The decision to implement information technology (IT) initiatives to enhance collaboration among veterans, baby boomers, Generation X, Generation Y, and Fifth Generation employees continues to challenge organizational leaders. The purpose of this nonexperimental study was to identify how the implementation of information technology initiatives, coupled with the knowledge of learning styles, might enhance collaboration among generational cohort employees. The generational cohort theory, Maslow's hierarchy of needs theory, and the technology acceptance model were the theoretical frameworks used to develop an understanding of the relationships among the cohorts and the acceptance of technology to enhance collaboration. Data were collected from a …


Strategies To Improve Engagement Among Public Sector Information Technology Employees, Michelle Dawn Benham Jan 2017

Strategies To Improve Engagement Among Public Sector Information Technology Employees, Michelle Dawn Benham

Walden Dissertations and Doctoral Studies

Disengaged employees decrease organizations' efficiencies and profitability. Engaged employees provide greater productivity and performance while being less likely to incur job burnout and exhaustion. However, public sector organizational leaders still struggle to engage their information technology (IT) employees. Partnering with a large public sector organization in the Phoenix, Arizona, metropolitan area, in a case study design, this study explored the strategies that public sector business leaders use to increase productivity through engaging IT employees. The conceptual framework for this study was the job demands-resources framework. Four participants were selected through purposeful sampling from a population of 7 IT leaders who …


Using An Online Learning Tutorial To Teach Rea Data Modelling In Accounting Information Systems Courses, Poh Sun Seow, Gary Pan Jan 2017

Using An Online Learning Tutorial To Teach Rea Data Modelling In Accounting Information Systems Courses, Poh Sun Seow, Gary Pan

Research Collection School Of Accountancy

Online learning has been gaining widespread adoption due to its success in enhancing student-learning outcomes and improving student academic performance. This paper describes an online tutorial to teach resource-event-agent (REA) data modeling in an undergraduate accounting information systems course. The REA online tutorial reflects a self-study application designed to help students improve their understanding of the REA data model. As such, the tutorial acts as a supplement to lectures by reinforcing the concepts and incorporating practices to assess student understanding. Instructors can access the REA online tutorial at http://smu.sg/rea. An independent survey by the University's Centre for Teaching Excellence found …