Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 1027

Full-Text Articles in Technology and Innovation

Sentinel Surveillance Of Sars-Cov-2 Rates And Equity Impacts Using Labor And Delivery Patients In Phoenix, Arizona, Caitlyn J. Linehan, Trisalyn Nelson, Celeste V. Bailey, Esma Gel, Dean V. Coonrod, Cheryl K. Roth May 2024

Sentinel Surveillance Of Sars-Cov-2 Rates And Equity Impacts Using Labor And Delivery Patients In Phoenix, Arizona, Caitlyn J. Linehan, Trisalyn Nelson, Celeste V. Bailey, Esma Gel, Dean V. Coonrod, Cheryl K. Roth

Department of Supply Chain Management and Analytics: Faculty and Staff Publications

Proactive management of SARS-CoV-2 requires timely and complete population data to track the evolution of the virus and identify at risk populations. However, many cases are asymptomatic and are not easily discovered through traditional testing efforts. Sentinel surveillance can be used to estimate the prevalence of infections for geographical areas but requires identification of sentinels who are representative of the larger population. Our goal is to evaluate applicability of a population of labor and delivery patients for sentinel surveillance system for monitoring the prevalence of SARS-CoV-2 infection. We tested 5307 labor and delivery patients from two hospitals in Phoenix, Arizona, …


Exploring Entrepreneurial Intention And Subjective Beliefs: A Comparative Analysis Of General Education Schools And Commercial Schools, Julia Riess, Bettina Fuhrmann, Gerhard Geissler Apr 2024

Exploring Entrepreneurial Intention And Subjective Beliefs: A Comparative Analysis Of General Education Schools And Commercial Schools, Julia Riess, Bettina Fuhrmann, Gerhard Geissler

International Journal for Business Education

This study examines the entrepreneurial intentions of Austrian secondary school students, specifically comparing students from commercial schools with those from general education schools. We analyzed 2,329 data sets and found that subjective beliefs, primarily behavioral and control beliefs, significantly influence entrepreneurial intentions. In addition, demographic factors such as gender, language, acquaintance with entrepreneurs, and school type play a significant role in explaining the variance in entrepreneurial intentions.

Our detailed analysis shows that students from commercial schools have stronger entrepreneurial intentions and subjective beliefs. Particularly notable are the differences in behavioral beliefs, where students from commercial schools find all aspects of …


Comparing Cognitive Theories Of Learning Transfer To Advance Cybersecurity Instruction, Assessment, And Testing, Daniel T. Hickey Ph.D., Ronald J. Kantor Apr 2024

Comparing Cognitive Theories Of Learning Transfer To Advance Cybersecurity Instruction, Assessment, And Testing, Daniel T. Hickey Ph.D., Ronald J. Kantor

Journal of Cybersecurity Education, Research and Practice

The cybersecurity threat landscape evolves quickly, continually, and consequentially. This means that the transfer of cybersecurity learning is crucial. We compared how different recognized “cognitive” transfer theories might help explain and synergize three aspects of cybersecurity education. These include teaching and training in diverse settings, assessing learning formatively & summatively, and testing & measuring achievement, proficiency, & readiness. We excluded newer sociocultural theories and their implications for inclusion as we explore those theories elsewhere. We first summarized the history of cybersecurity education and proficiency standards considering transfer theories. We then explored each theory and reviewed the most relevant cybersecurity education …


Leading Horses To Water During A Pandemic: Assuring Communication Learning For "Quants", Thomas Hall Mar 2024

Leading Horses To Water During A Pandemic: Assuring Communication Learning For "Quants", Thomas Hall

International Journal for Business Education

Students who are attracted to quantitative disciplines of study can be reluctant to devote much attention to the important task of communicating, and previous research (Hostager, 2018) has identified statistically significant differences in learning approaches by major among undergraduate business students. This paper presents results of learning assurance for writing skills (direct measures) even when the content of the course relates to the highly quantitative topics of data analytics and finance. The approach combines various pedagogical methods in an undergraduate, writing-intensive setting: traditional testing but in an iterative framework, “flipped classroom” intensive work using spreadsheet software, repeated submission of brief …


It Deployment And Integration – An Assessment Of Enabling And Inhibiting Factors, Lesley Matshwane, Carl Marnewick Feb 2024

It Deployment And Integration – An Assessment Of Enabling And Inhibiting Factors, Lesley Matshwane, Carl Marnewick

The African Journal of Information Systems

Although delivery of services in South Africa is the responsibility of all spheres of government, the provision of basic services lies at the doorstep of local municipalities. Local municipalities have, for many reasons, frequently been unable to live up to this mandate despite the fact that some of the challenges that they face can be addressed by using IT. This paper assesses factors enabling and inhibiting the efficient deployment and integration of IT in local municipalities. The technological, organizational and environmental (TOE) framework was deployed to assess the factors. A multiple case study in which semi-structured interviews were conducted produced …


Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D. Feb 2024

Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D.

Journal of Cybersecurity Education, Research and Practice

This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized identity, and smart contracts, and examines the application of secure blockchain across various educational functions such as enrollment management, degree auditing, and award processing. Each facet of the NIST Framework is utilized to explore the integration of blockchain technology and address persistent security concerns. The paper contributes to the literature by defining blockchain technology applications and opportunities within …


Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger Feb 2024

Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger

Journal of Cybersecurity Education, Research and Practice

This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through mentorship, collaboration, skill preparation, and other activities and touch points to increase students’ sense of belonging and connectedness in the cybersecurity profession. The goal of the project was focused on developing diverse, educated, and skilled cybersecurity personnel for employment within local industry and government to help curtail the current regional cybersecurity workforce gap that is emblematic of the lack of qualified cybersecurity personnel that presently exists nationwide. Emphasis throughout the project …


University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo Feb 2024

University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo

Journal of Cybersecurity Education, Research and Practice

This study examines cybersecurity awareness in universities by analyzing related research output across different disciplines at the University of Johannesburg. The diffusion of innovation theory is used in this study as a theoretical framework to explain how cybersecurity awareness diffuses across disciplines. The University of Johannesburg Institutional Repository database was the data source for this study. Variations in cybersecurity keyword searches and topic modeling techniques were used to identify the frequency and distribution of research output across different disciplines. The study reveals that cybersecurity awareness has diffused across various disciplines, including non-computer science disciplines such as business, accounting, and social …


Board Of Directors Role In Data Privacy Governance: Making The Transition From Compliance Driven To Good Business Stewardship, David Warner, Lisa Mckee Feb 2024

Board Of Directors Role In Data Privacy Governance: Making The Transition From Compliance Driven To Good Business Stewardship, David Warner, Lisa Mckee

Journal of Cybersecurity Education, Research and Practice

Data collection, use, leveraging, and sharing as a business practice and advantage has proliferated over the past decade. Along with this proliferation of data collection is the increase in regulatory activity which continues to morph exponentially around the globe. Adding to this complexity are the increasing business disruptions, productivity and revenue losses, settlements, fines, and penalties which can amount to over $15 million, with many penalties now being ascribed to the organization’s leadership, to include the Board of Directors (BoD), the CEO and members of the senior leadership team (SLT). Thus, boards of directors can no longer ignore and in …


Privacy Principles And Harms: Balancing Protection And Innovation, Samuel Aiello Feb 2024

Privacy Principles And Harms: Balancing Protection And Innovation, Samuel Aiello

Journal of Cybersecurity Education, Research and Practice

In today's digitally connected world, privacy has transformed from a fundamental human right into a multifaceted challenge. As technology enables the seamless exchange of information, the need to protect personal data has grown exponentially. Privacy has emerged as a critical concern in the digital age, as technological advancements continue to reshape how personal information is collected, stored, and utilized. This paper delves into the fundamental principles of privacy and explores the potential harm that can arise from the mishandling of personal data. It emphasizes the delicate balance between safeguarding individuals' privacy rights and fostering innovation in a data-driven society. By …


Towards Assessing Cybersecurity Posture Of Manufacturing Companies: Review And Recommendations, John Del Vecchio, Yair Levy, Ling Wang, Ajoy Kumar Jan 2024

Towards Assessing Cybersecurity Posture Of Manufacturing Companies: Review And Recommendations, John Del Vecchio, Yair Levy, Ling Wang, Ajoy Kumar

KSU Proceedings on Cybersecurity Education, Research and Practice

With the continued changes in the way businesses work, cyber-attack targets are in a constant state of flux between organizations, individuals, as well as various aspects of the supply chain of interconnected goods and services. As one of the 16 critical infrastructure sectors, the manufacturing sector is known for complex integrated Information Systems (ISs) that are incorporated heavily into production operations. Many of these ISs are procured and supported by third parties, also referred to as interconnected entities in the supply chain. Disruptions to manufacturing companies would not only have significant financial losses but would also have economic and safety …


Quantum Computing: Computing Of The Future Made Reality, Janelle Mathis Jan 2024

Quantum Computing: Computing Of The Future Made Reality, Janelle Mathis

KSU Proceedings on Cybersecurity Education, Research and Practice

Abstract—Quantum computing is an emerging new area focused on technology consisting of quantum theory aspects such as electrons, sub-atomic particles, and other materials engineered using quantum mechanics. Through quantum mechanics, these computers can solve problems that classical computers deem too complex. Today the closest computing technology compared to quantum computers are supercomputers, but similarly to classical computers, supercomputers also have faults. With supercomputers, when a problem is deemed too complex, it is due to the classical machinery components within the computer, thus causing a halt in solving the task or problem. In contrast, these problems could be solved with a …


Rfid Key Fobs In Vehicles: Unmasking Vulnerabilities & Strengthening Security, Devon Magda, Bryson R. Payne Jan 2024

Rfid Key Fobs In Vehicles: Unmasking Vulnerabilities & Strengthening Security, Devon Magda, Bryson R. Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

No abstract provided.


The Impact Of Individual Techno-Characteristics On Information Privacy Concerns In The Diffusion Of Mobile Contact Tracing, Jiesen Lin, Dapeng Liu, Lemuria Carter Jan 2024

The Impact Of Individual Techno-Characteristics On Information Privacy Concerns In The Diffusion Of Mobile Contact Tracing, Jiesen Lin, Dapeng Liu, Lemuria Carter

KSU Proceedings on Cybersecurity Education, Research and Practice

In the wake of the global health crisis, mobile contact tracing applications have emerged as important tools in managing disease spread. However, their effectiveness heavily relies on mass adoption, significantly influenced by the public's information privacy concerns. To date, systematic examination of how these privacy concerns relate to the innovation adopter categories in mobile contact tracing remains sparse. Furthermore, the influence of individual techno-characteristics on these concerns is to be explored. This research seeks to fill these gaps. Drawing on the diffusion of innovation theory, we examine the impact of the key techno-characteristics—adopter category, propensity for identification misrepresentation, and exposure …


Exploring Information Privacy Concerns During The Covid-19 Pandemic: A Juxtaposition Of Three Models, Dapeng Liu, Lemuria Carter, Jiesen Lin Jan 2024

Exploring Information Privacy Concerns During The Covid-19 Pandemic: A Juxtaposition Of Three Models, Dapeng Liu, Lemuria Carter, Jiesen Lin

KSU Proceedings on Cybersecurity Education, Research and Practice

Government agencies across the globe utilize mobile applications to interact with constituents. In response to the global pandemic, several nations have employed contact tracing services to manage the spread of COVID-19. Extent literature includes various models that explore information privacy. Several researchers have highlighted the need to compare the effectiveness of diverse information privacy models. To fill this gap, we explore the impact of information privacy concerns on citizens’ willingness to download a federal contact tracing app. In particular, we compare three types of prevalent information privacy concerns: global information privacy concerns (GIPC), concern for information privacy (CFIP), and internet …


The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin Jan 2024

The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin

Journal of International Technology and Information Management

Research has extensively studied nonprofit organizations’ use of social media for communications and interactions with supporters. However, there has been limited research examining the impact of social media on charitable giving. This research attempts to address the gap by empirically examining the relationship between the use of social media and charitable giving for nonprofit organizations. We employ a data set of the Nonprofit Times’ top 100 nonprofits ranked by total revenue for the empirical analysis. As measures for social media traction, i.e., how extensively nonprofits draw supporters on their social media sites, we use Facebook Likes, Twitter Followers, and Instagram …


Explaining Variation In Adoption Of Organizational Innovation: A Social Network Approach, Pooria Assadi Jan 2024

Explaining Variation In Adoption Of Organizational Innovation: A Social Network Approach, Pooria Assadi

Journal of International Technology and Information Management

This article draws from the social network theory and examines how a social network approach can contribute to our understanding of the variation in the adoption of innovative, organization-wide information systems that can help businesses achieve sustainable competitive advantage. It highlights how the extant explanations for the adoption of information systems are limited in the way that they primarily assume organizations make innovation adoption decisions in isolation. It does so by building on growing research which recognizes that organizations are not isolated from one another; rather, they are interrelated through their inter-organizational networks which provide unique learning opportunities that are …


How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström Jan 2024

How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström

Journal of International Technology and Information Management

This article investigates the relationship between digitalisation and business model changes in RoPax ports. The study is based on six RoPax ports in Northern Europe, examining their digitalisation efforts and the resulting changes in their business models, leading to further digital transformation. The paper offers insights by reviewing relevant literature on digitalisation’s role in business model innovation and its application in ports. The findings reveal that digitalisation supports relevant business model changes concerning port operation integration within logistics chains, communication, documentation flow, and cargo flow optimisation. However, exploring digitalisation’s potential for diversifying value propositions is still limited. Most digitalisation efforts …


An Empirical Study To Understand The Role Of Institution-Based Trust And Its Antecedents In Iot Adoption By Individuals, Anupam Kumar Nath, Amit Kumar Nath Jan 2024

An Empirical Study To Understand The Role Of Institution-Based Trust And Its Antecedents In Iot Adoption By Individuals, Anupam Kumar Nath, Amit Kumar Nath

Journal of International Technology and Information Management

ABSTRACT

The Internet of Things (IoT) enables the connection between humans, physical objects, and cyber objects, resulting in monitoring, automation, and decision-making capabilities. This connection can be complex and lead to uncertainty for individuals before adopting IoT technology. To address this, we conducted research on the role of Institution-based trust in the context of IoT adoption. Our model for IoT adoption is based on existing literature and includes the components of Institution-based trust and its antecedents. Through empirical testing, we confirmed that Institution-based trust positively affects IoT adoption at the individual level. Additionally, we found that User confirmation/disconfirmation and familiarity …


Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco Jan 2024

Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco

Journal of International Technology and Information Management

Developing an effective business analytics function within a company has become a crucial component to an organization’s competitive advantage today. Predictive analytics enables an organization to make proactive, data-driven decisions. While companies are increasing their investments in data and analytics technologies, little research effort has been devoted to understanding how to best convert analytics assets into positive business performance. This issue can be best studied from the socio-technical perspective to gain a holistic understanding of the key factors relevant to implementing predictive analytics. Based upon information from structured interviews with information technology and analytics executives of 11 organizations across the …


Competencies And Capabilities As Determinants Of Digital Entrepreneurship: An Empirical Validation, Arvind Gudi, Ravi Chinta, Alan Jin Jan 2024

Competencies And Capabilities As Determinants Of Digital Entrepreneurship: An Empirical Validation, Arvind Gudi, Ravi Chinta, Alan Jin

Journal of International Technology and Information Management

This study aims to examine the influence of digital competencies and awareness of digital capabilities on digital entrepreneurial drive in the pre-startup stages of hi-tech businesses. Based on primary data from a sample of 357 respondents, we tested the hypothesized relationships for direct and interactive effects on digital entrepreneurial drive. Our results show that digital competencies and awareness of digital capabilities influence entrepreneurial aspiration and commitment in the pre-startup phase. We use the digital entrepreneurship framework by Recker and von Briel (2019) as the theoretical foundation and demonstrate a novel approach to expand the dimensions of digital enabler, digital outcome, …


Does Personality Traits And Security Habits Influence Security Of Personal Identification Numbers? The Context Of Mobile Money Services In Tanzania., Daniel Ntabagi Koloseni Jan 2024

Does Personality Traits And Security Habits Influence Security Of Personal Identification Numbers? The Context Of Mobile Money Services In Tanzania., Daniel Ntabagi Koloseni

Journal of International Technology and Information Management

Security is an important ingredient in financial transactions; as such, it is imperative that attention should be paid to enhancing the security habits and user behaviours of mobile payment services. Establishing a link between security habits, personality characteristics, and security behaviours provides a new dimension to studying security behaviours regarding mobile money services. Therefore, this study investigates how personality traits affect security behaviours and habits and how security habits mediate the link between personality traits and PIN security practices. The study found that conscientiousness, openness to experience, extroversion and security habits influence PIN security practices, while conscientiousness, agreeableness, and neuroticism …


An Examination Of The Relationship Between Cheating In Online Classes And Technostress: Perceptions Of Business Faculty, Stacy Boyer-Davis, Kevin Berry, Amy Cooper Dec 2023

An Examination Of The Relationship Between Cheating In Online Classes And Technostress: Perceptions Of Business Faculty, Stacy Boyer-Davis, Kevin Berry, Amy Cooper

International Journal for Business Education

This research study investigated the relationship between technostress creators (techno-complexity, techno-insecurity, techno-invasion, techno-overload, and techno-uncertainty) and faculty perceptions of student cheating in online classes. Data were collected from faculty members of the Management and Organizational Behavior Teaching Society (MOBTS), a member of the AACSB Business Education Alliance, the American Society of Business and Behavioral Sciences (ASBBS), an interdisciplinary professional organization comprised of faculty teaching in accounting, finance, management, marketing, organizational behavior, and computer information systems, and other research panels during 2021 (N = 94). Findings from regression analysis indicated that the techno-complexity subconstruct is positively related to a faculty’s perception …


Social Engineering Cyber Threats, Young B. Choi, Josh Rubin Dec 2023

Social Engineering Cyber Threats, Young B. Choi, Josh Rubin

Journal of Global Awareness

The article explores the pervasive threat of social engineering in cybersecurity, emphasizing its success in infiltrating information systems by manipulating individuals rather than employing traditional hacking methods. The author underscores the vulnerability arising from human trust, as individuals, especially those lacking technology education, tend to be targets. While cryptography offers partial security, social engineering complicates overall system security. Mitigation strategies include educating employees on threats, risks, and security policies, coupled with enforcing penalties for noncompliance. Additionally, employing two-factor authentication and physical token-based access adds layers of protection. The article delves into semantic attacks, classifying various exploitation methods and emphasizing the …


Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman Dec 2023

Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman

Journal of Cybersecurity Education, Research and Practice

Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …


Education As A Solution To Combat Rising Cybercrime Rates Against Children And Teenagers, Christian Javier Solis-Diaz Dec 2023

Education As A Solution To Combat Rising Cybercrime Rates Against Children And Teenagers, Christian Javier Solis-Diaz

Electronic Theses, Projects, and Dissertations

Ninety seven percent (97%) of people between the ages of 3 and 18 are found to be users of technology and internet services daily. This number also correlates with rising cyber crime rates against people in this age bracket. It is found that people between 3 and 18 years old are found to be technologically savvy but often lack the knowledge of how to protect themselves in online environments. Researchers have suggested that cybersecurity awareness training is an effective method at combating common forms of cyberattack such as social engineering. Social engineering attacks are found to make up 98% of …


How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim Dec 2023

How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim

Cybersecurity Undergraduate Research Showcase

The powers of OpenAI's groundbreaking AI language model, ChatGPT, startled millions of users when it was released in November. But for many, the tool's ability to further accomplish the goals of evil actors swiftly replaced their initial excitement with significant concerns. ChatGPT gives malicious actors additional ways to possibly compromise sophisticated cybersecurity software. Leaders in a sector that is currently suffering from a 38% global spike in data breaches in 2022 must acknowledge the rising influence of AI and take appropriate action. Cybercriminals are writing more complex and focused business email compromise (BEC) and other phishing emails with the assistance …


Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu Nov 2023

Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu

Journal of Cybersecurity Education, Research and Practice

This pilot study aims to assess the acceptability of Open University’s training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post experimental design was employed. 43 self-selected participants were recruited via an online register and posters at the university (excluding IT related courses). Participants completed the Human Aspects of Information Security Questionnaire (HAIS-Q) and Fear of Missing Out (FoMO) Scale. They then completed all games and quizzes in the GICAST course before repeating the HAIS-Q and …


Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang Nov 2023

Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang

Journal of Cybersecurity Education, Research and Practice

Recent advances in Artificial Intelligence (AI) have brought society closer to the long-held dream of creating machines to help with both common and complex tasks and functions. From recommending movies to detecting disease in its earliest stages, AI has become an aspect of daily life many people accept without scrutiny. Despite its functionality and promise, AI has inherent security risks that users should understand and programmers must be trained to address. The ICE (integrity, confidentiality, and equity) cybersecurity labs developed by a team of cybersecurity researchers addresses these vulnerabilities to AI models through a series of hands-on, inquiry-based labs. Through …


Analysis Of Us Airline Stocks Performance Using Latent Dirichlet Allocation (Lda), Amina Issoufou Anaroua Nov 2023

Analysis Of Us Airline Stocks Performance Using Latent Dirichlet Allocation (Lda), Amina Issoufou Anaroua

Beyond: Undergraduate Research Journal

Various events, such as changes in the interest rate or the hijacking of a commercial aircraft, can lead to significant shifts in airline stock performance. This study aimed to measure the impact of aviation-related news announcements on the stock performance of US airlines, focusing on different topics. The dataset included aviation news covering airlines, airports, regulations, safety, accidents, manufacturers, MRO, incidents, aviation training, general aviation, and others obtained from Aviation Voice. To uncover patterns that could explain the movements of US airline stocks, a natural language processing technique called Latent Dirichlet Allocation (LDA) was employed. The process involved text mining …