Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Education

Predictive Accuracy Of Recommender Algorithms, William Blake Noffsinger Jan 2020

Predictive Accuracy Of Recommender Algorithms, William Blake Noffsinger

CCE Theses and Dissertations

Recommender systems present a customized list of items based upon user or item characteristics with the objective of reducing a large number of possible choices to a smaller ranked set most likely to appeal to the user. A variety of algorithms for recommender systems have been developed and refined including applications of deep learning neural networks. Recent research reports point to a need to perform carefully controlled experiments to gain insights about the relative accuracy of different recommender algorithms, because studies evaluating different methods have not used a common set of benchmark data sets, baseline models, and evaluation metrics. The …


Unix Administrator Information Security Policy Compliance: The Influence Of A Focused Seta Workshop And Interactive Security Challenges On Heuristics And Biases, John Palmer Mcconnell Jan 2020

Unix Administrator Information Security Policy Compliance: The Influence Of A Focused Seta Workshop And Interactive Security Challenges On Heuristics And Biases, John Palmer Mcconnell

CCE Theses and Dissertations

Information Security Policy (ISP) compliance is crucial to the success of healthcare organizations due to security threats and the potential for security breaches. UNIX Administrators (UXAs) in healthcare Information Technology (IT) maintain critical servers that house Protected Health Information (PHI). Their compliance with ISP is crucial to the confidentiality, integrity, and availability of PHI data housed or accessed by their servers. The use of cognitive heuristics and biases may negatively influence threat appraisal, coping appraisal, and ultimately ISP compliance behavior. These failures may result in insufficiently protected servers and put organizations at greater risk of data breaches and financial loss. …