Open Access. Powered by Scholars. Published by Universities.®
- Discipline
Articles 1 - 2 of 2
Full-Text Articles in Education
Predictive Accuracy Of Recommender Algorithms, William Blake Noffsinger
Predictive Accuracy Of Recommender Algorithms, William Blake Noffsinger
CCE Theses and Dissertations
Recommender systems present a customized list of items based upon user or item characteristics with the objective of reducing a large number of possible choices to a smaller ranked set most likely to appeal to the user. A variety of algorithms for recommender systems have been developed and refined including applications of deep learning neural networks. Recent research reports point to a need to perform carefully controlled experiments to gain insights about the relative accuracy of different recommender algorithms, because studies evaluating different methods have not used a common set of benchmark data sets, baseline models, and evaluation metrics. The …
Unix Administrator Information Security Policy Compliance: The Influence Of A Focused Seta Workshop And Interactive Security Challenges On Heuristics And Biases, John Palmer Mcconnell
Unix Administrator Information Security Policy Compliance: The Influence Of A Focused Seta Workshop And Interactive Security Challenges On Heuristics And Biases, John Palmer Mcconnell
CCE Theses and Dissertations
Information Security Policy (ISP) compliance is crucial to the success of healthcare organizations due to security threats and the potential for security breaches. UNIX Administrators (UXAs) in healthcare Information Technology (IT) maintain critical servers that house Protected Health Information (PHI). Their compliance with ISP is crucial to the confidentiality, integrity, and availability of PHI data housed or accessed by their servers. The use of cognitive heuristics and biases may negatively influence threat appraisal, coping appraisal, and ultimately ISP compliance behavior. These failures may result in insufficiently protected servers and put organizations at greater risk of data breaches and financial loss. …