Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Databases and Information Systems (4)
- Management Information Systems (4)
- Technology and Innovation (3)
- Communication (2)
- Finance and Financial Management (2)
-
- Information Security (2)
- Organizational Communication (2)
- Social and Behavioral Sciences (2)
- Sociology (2)
- Artificial Intelligence and Robotics (1)
- Business Administration, Management, and Operations (1)
- Business and Corporate Communications (1)
- Community-Based Learning (1)
- Graphics and Human Computer Interfaces (1)
- Health Information Technology (1)
- Health and Medical Administration (1)
- Interpersonal and Small Group Communication (1)
- Medicine and Health Sciences (1)
- Organization Development (1)
- Organizational Behavior and Theory (1)
- Other Computer Sciences (1)
- Portfolio and Security Analysis (1)
- Software Engineering (1)
- Theory and Algorithms (1)
- Work, Economy and Organizations (1)
- Keyword
-
- Information technology (4)
- Breach (2)
- Computer science (2)
- Information science (2)
- Management (2)
-
- Appreciative Inquiry (1)
- Artificial Intelligence (1)
- Community of practice (1)
- Computer engineering (1)
- Computer-mediated communications in teams (1)
- Countermeasures (1)
- Cyber (1)
- Decision-Support Systems (1)
- Financial services (1)
- Genetic Programming (1)
- Hacker (1)
- Health care management (1)
- Information systems (1)
- Innovation (1)
- KMS Usage (1)
- Knowledge (1)
- Knowledge Management (1)
- Knowledge Management Systems (1)
- Meaningful Use (1)
- Organizational Learning (1)
- Patient portal (1)
- Security (1)
- Security incident (1)
- Social networking sites in teams (1)
- Socio-technical Systems (1)
Articles 1 - 6 of 6
Full-Text Articles in Business
An Analysis Of The Relationship Between Security Information Technology Enhancements And Computer Security Breaches And Incidents, Linda Betz
CCE Theses and Dissertations
Financial services institutions maintain large amounts of data that include both intellectual property and personally identifiable information for employees and customers. Due to the potential damage to individuals, government regulators hold institutions accountable for ensuring that personal data are protected and require reporting of data security breaches. No company wants a data breach, but finding a security incident or breach early in the attack cycle may decrease the damage or data loss a company experiences. In multiple high profile data breaches reported in major news stories over the past few years, there is a pattern of the adversary being inside …
Automatically Defined Templates For Improved Prediction Of Non-Stationary, Nonlinear Time Series In Genetic Programming, David Moskowitz
Automatically Defined Templates For Improved Prediction Of Non-Stationary, Nonlinear Time Series In Genetic Programming, David Moskowitz
CCE Theses and Dissertations
Soft methods of artificial intelligence are often used in the prediction of non-deterministic time series that cannot be modeled using standard econometric methods. These series, such as occur in finance, often undergo changes to their underlying data generation process resulting in inaccurate approximations or requiring additional human judgment and input in the process, hindering the potential for automated solutions.
Genetic programming (GP) is a class of nature-inspired algorithms that aims to evolve a population of computer programs to solve a target problem. GP has been applied to time series prediction in finance and other domains. However, most GP-based approaches to …
Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig
Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig
CCE Theses and Dissertations
Hackers external to the organization continue to wreak havoc upon the information systems infrastructure of firms through breaches of security defenses, despite constant development of and continual investment in new IS security countermeasures by security professionals and vendors. These breaches are exceedingly costly and damaging to the affected organizations. The continued success of hackers in the face of massive amounts of security investments suggests that the defenders are losing and that the hackers can innovate at a much faster pace.
Underground hacker communities have been shown to be an environment where attackers can learn new techniques and share tools pertaining …
A Study Of The Success Of Group Formation In Virtual Teams Using Computer-Mediated Communications, Eliel Melón-Ramos
A Study Of The Success Of Group Formation In Virtual Teams Using Computer-Mediated Communications, Eliel Melón-Ramos
CCE Theses and Dissertations
In the digital domain, virtual teams within organizations and corporations are becoming common. Restructuring an organization or corporation is vital because competition and globalization are increasing. In this era of globalization, distributed working groups need to develop a competitive advantage in these ever-changing environments. Historically, teams had experienced problems stemming from geographical and temporal limitations. With the increase of technology in telecommunications, organizations are increasingly forming virtual teams, which have become critical to the survival of nearly any corporate entity.
Virtual teams have some of the same problems that regular teams have. One of the key challenges is the method …
An Investigation Of Socio-Technical Components Of Knowledge Management System (Kms) Usage, Noel Wint Jr.
An Investigation Of Socio-Technical Components Of Knowledge Management System (Kms) Usage, Noel Wint Jr.
CCE Theses and Dissertations
Existing literature indicates that although both academics and practitioners recognize knowledge management (KM) as a source of competitive advantage, users are not always willing to use a knowledge management system (KMS). Because of the social nature of knowledge transfer, a KMS can be considered a socio-technical system. Many explanations have been presented for this failure to utilize the KMS. These explanations include a number of the socio-technical factors relating to people, processes, and technologies. While these factors may have significant explanatory power when examined independently, existing studies have not sufficiently addressed the interactions among all three socio-technical factors or their …
Patient Portals: Achieving Technology Acceptance And Meaningful Use In Independent Physician-Managed Practices, Kimberly W. Bartholomew
Patient Portals: Achieving Technology Acceptance And Meaningful Use In Independent Physician-Managed Practices, Kimberly W. Bartholomew
CCE Theses and Dissertations
As the bulk of medical health records shift from paper-based file systems to electronic formats, the promise of the transformation process called healthcare reform included adding efficiencies to medical practice workflows, lower costs, improved quality of care and most important, and the freeing of patient information from traditional propriety silos. With this incoming largess of protected health information data now viewable through online patient portals, patients can be empowered to become educated and active in their own health care decisions, but only if they have admission to their information. A digital divide currently exists in many medical practices where only …