Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Editor (4)
- Table (4)
- Contents (3)
- Cyber Security (3)
- Cyber security (3)
-
- Technology (3)
- Computer science (2)
- Information (2)
- Information Systems (2)
- Information security (2)
- Information systems (2)
- International (2)
- Journal (2)
- Management (2)
- Open Source Software (2)
- Open Source Software and Virtualization (2)
- Project Management (2)
- Terrorism (2)
- 5.2 ECONOMICS AND BUSINESS (1)
- 5.8 MEDIA AND COMMUNICATIONS (1)
- Academic -- UNF -- Computing; Workflow; Unknown exceptions; BPEL4PEOPLE; Web Services; Human Task; SWIMs (1)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (1)
- Augmented reality (1)
- Bibliographic instruction (1)
- Bibliometric (1)
- Bootstrap (1)
- Business Analytics (1)
- Business Value of Digital Data (1)
- Business analytics (1)
- Business service (1)
- Publication
-
- Journal of International Technology and Information Management (8)
- Maurice Dawson (5)
- Abhijith Anand (1)
- All Faculty Scholarship (1)
- Biology Faculty Publications (1)
-
- Business Analytics and Information Systems (1)
- Dept. of Marketing & International Business Conference Material (1)
- Dissertations (1)
- Honors Scholar Theses (1)
- Jan Kallberg (1)
- School of Information Faculty Publications (1)
- Sprague Library Scholarship and Creative Works (1)
- The ITB Journal (1)
- UNF Graduate Theses and Dissertations (1)
- UNLV Gaming Research & Review Journal (1)
- Publication Type
Articles 1 - 26 of 26
Full-Text Articles in Computer Engineering
Creating Business Value From Digital Data Streams: The Role Of Organizational Interventions, Rajeev Sharma, Abhijith Anand, Tim Coltman
Creating Business Value From Digital Data Streams: The Role Of Organizational Interventions, Rajeev Sharma, Abhijith Anand, Tim Coltman
Abhijith Anand
No abstract provided.
The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy
The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy
The ITB Journal
Many businesses and consumers are wary of conducting business over the Internet due to a perceived lack of security. Electronic business is subject to a variety of threats such as unauthorised access, misappropriation, alteration and destruction of both data and systems. This paper explores the major security concerns of businesses and users and describes the cryptographic techniques used to reduce such risks.
Using A Work System Metamodel And Usdl To Build A Bridge Between Business Service Systems And Service Computing, Steven Alter, Alistair Barros
Using A Work System Metamodel And Usdl To Build A Bridge Between Business Service Systems And Service Computing, Steven Alter, Alistair Barros
Business Analytics and Information Systems
This paper explores the support for more comprehensive modeling of service systems than that possible through modeling methods developed through partial perspectives, with uncertainties about their wider suitability and need for integration with other methods in this domain. It responds to a Dual Call for Papers from INFORMS Service Science and IEEE Transactions on Service Computing requesting contributions that address the barely explored challenge of establishing links between business views of service systems and more technical views from service computing. Competing definitions of service reveal that most business views of service emphasize acts or outcomes produced for others, whereas a …
Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery
Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery
UNLV Gaming Research & Review Journal
Cross-selling different types of games could provide an opportunity for casino operators to generate additional time and money spent on gaming from existing patrons. One way to identify the patrons who are likely to cross-play is mining individual players’ gaming data using predictive analytics. Hence, this study aims to predict casino patrons’ propensity to play both slots and table games, also known as cross-gaming, by applying a data-mining algorithm to patrons’ gaming data. The Exhaustive Chi-squared Automatic Interaction Detector (E-CHAID) method was employed to predict cross-gaming propensity. The E-CHAID models based on the gaming-related behavioral data produced actionable model accuracy …
Fundamentals Of Library Instruction, Darren Sweeper
Fundamentals Of Library Instruction, Darren Sweeper
Sprague Library Scholarship and Creative Works
No abstract provided.
Design, Programming, And User-Experience, Kaila G. Manca
Design, Programming, And User-Experience, Kaila G. Manca
Honors Scholar Theses
This thesis is a culmination of my individualized major in Human-Computer Interaction. As such, it showcases my knowledge of design, computer engineering, user-experience research, and puts into practice my background in psychology, com- munications, and neuroscience.
I provided full-service design and development for a web application to be used by the Digital Media and Design Department and their students.This process involved several iterations of user-experience research, testing, concepting, branding and strategy, ideation, and design. It lead to two products.
The first product is full-scale development and optimization of the web appli- cation.The web application adheres to best practices. It was …
Institutional Maximization And Path Dependency – The Delay Of Implementation Of The Eu Public Sector Information Directive In Sweden, Jan Kallberg, Erik Lakomaa
Institutional Maximization And Path Dependency – The Delay Of Implementation Of The Eu Public Sector Information Directive In Sweden, Jan Kallberg, Erik Lakomaa
Jan Kallberg
The implementation of the EU public sector information (PSI) directive was expected to open up European governmental data sources for commercialization and create, conservatively estimated, a € 32 billion European public information market. Institutional arrangements and governmental path dependency has delayed the directive’s implementation in several countries, most notably Poland and Sweden. In this paper we use the Swedish case to examine how bureaucratic inertia and path dependence can stall the implementation of EU directives that conflicts with the member state’s internal bureaucratic agenda. Sweden usually implements EU directives rapidly and extensively. In the case of the PSI-directive however, the …
Identification Of Employee Engagement Practices Viewed As Critical To Retention: A Cross-Generational Comparison, Sharon R. Floyd
Identification Of Employee Engagement Practices Viewed As Critical To Retention: A Cross-Generational Comparison, Sharon R. Floyd
Dissertations
Purpose. The purpose of this study was to identify the employee engagement practices that millennial IT workers perceive as important to retention. The secondary purpose of the study was to determine whether a difference exists between the engagement practices that appeal to millennial IT workers and the engagement practices that appeal to remaining IT working groups, which include the baby boomers and generation X.
Methodology. A quantitative, descriptive, survey-based research method was chosen for this study. The population included information technology workers representing three generations of working adults, including baby boomers, generation Xers, and millennials. The sample included technology workers …
A Proposed Model For The Approach To Augmented Reality Deployment In Marketing Communications, Stephen O'Mahony
A Proposed Model For The Approach To Augmented Reality Deployment In Marketing Communications, Stephen O'Mahony
Dept. of Marketing & International Business Conference Material
In the contemporary landscape, human interaction is characterized by the pervasive mediation of intelligent agents. Owing to advances in computer science and engineering, phenomena once limited to fixed locations are metamorphosing from extraneous entities to implicit components of the everyday. Computing power has simultaneously enhanced and miniaturized to the extent that contemporary consumer devices demonstrate power equivalent to or greater than that of personal computers of recent memory. At the same time, network connectivity has proliferated to ubiquitous levels, reflected in the fact that the amount of inanimate objects connected to the Internet has recently surpassed the human population of …
Connecting People And Ideas From Around The World: Global Innovation Platforms For Next-Generation Ecology And Beyond, P. Søgaard Jørgensen, F. Barraquand, V. Bonhomme, T. J. Curran, E. Cieraad, T. G. Ezard, L. Gherardi, R. A. Hayes, T. Poisot, R. Salguero-Gómez, Lucía Desoto, B. Swartz, J. M. Talbot, B. Wee, Naupaka B. Zimmerman
Connecting People And Ideas From Around The World: Global Innovation Platforms For Next-Generation Ecology And Beyond, P. Søgaard Jørgensen, F. Barraquand, V. Bonhomme, T. J. Curran, E. Cieraad, T. G. Ezard, L. Gherardi, R. A. Hayes, T. Poisot, R. Salguero-Gómez, Lucía Desoto, B. Swartz, J. M. Talbot, B. Wee, Naupaka B. Zimmerman
Biology Faculty Publications
We present a case for using Global Community Innovation Platforms (GCIPs), an approach to improve innovation and knowledge exchange in international scientific communities through a common and open online infrastructure. We highlight the value of GCIPs by focusing on recent efforts targeting the ecological sciences, where GCIPs are of high relevance given the urgent need for interdisciplinary, geographical, and cross-sector collaboration to cope with growing challenges to the environment as well as the scientific community itself. Amidst the emergence of new international institutions, organizations, and meetings, GCIPs provide a stable international infrastructure for rapid and long-term coordination that can be …
Unknown Exception Handling Tool Using Humans As Agents, Mwaka Mahanga
Unknown Exception Handling Tool Using Humans As Agents, Mwaka Mahanga
UNF Graduate Theses and Dissertations
In a typical workflow process, exceptions are the norm. Exceptions are defined as deviations from the normal sequence of activities and events. Exceptions can be divided into two broad categories: known exceptions (i.e., expected and predefined deviations) and unknown exceptions (i.e., unexpected and undefined deviations). Business Process Execution Language (BPEL) has become the de facto standard for executing business workflows with the use of web services. BPEL includes exception handling methods that are sufficient for known exception scenarios. Depending on the exception and the specifics of the exception handling tools, processes may either halt or move to completion. Instances of …
A Heuristic Text Analytic Approach For Classifying Research Articles, Steven Walczak, Deborah L. Kellogg
A Heuristic Text Analytic Approach For Classifying Research Articles, Steven Walczak, Deborah L. Kellogg
School of Information Faculty Publications
Classification of research articles is fundamental to analyze and understand research literature. Underlying concepts from both text analytics and concept mining form a foundation for the development of a quantitative heuristic methodology, the Scale of Theoretical and Applied Research (STAR), for classifying research. STAR demonstrates how concept mining may be used to classify research with respect to its theoretical and applied emphases. This research reports on evaluating the STAR heuristic classifier using the Business Analytics domain, by classifying 774 Business Analytics articles from 23 journals. The results indicate that STAR effectively evaluates overall article content of journals to be consistent …
Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo
Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo
All Faculty Scholarship
Many observers attribute the Internet’s success to two principles: Moore’s Law and Metcalfe’s Law. These precepts are often cited to support claims that larger networks are inevitably more valuable and that costs in a digital environment always decrease. This Article offers both a systematic description of both laws and then challenges the conventional wisdom by exploring their conceptual limitations. It also explores how alternative mechanisms, such as gateways and competition, can permit the realization benefits typically attributed to Moore’s Law and Metcalfe’s Law without requiring increases in network size.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Maurice Dawson
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …
Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim
Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim
Maurice Dawson
As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other software-based design methodologies. These methodologies include looking at software-based alternatives that could save a significant amount of money by reducing the amount of proprietary software. This chapter explores the use and integration of Open Source Software (OSS) in software-driven projects to include in enterprise organizations. Additionally, the legalities of the GNU General Public License (GPL), Lesser General Public License (LGPL), Berkeley Software Distribution (BSD), and Creative Commons are explored with the integration of these OSS solutions into organizations. …
A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson
A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson
Maurice Dawson
Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including utilities, regulators, energy markets, government entities, and even those that wish to exploit the cyber infrastructure. Cyber warfare is quickly becoming the method of warfare and the tool of military strategists. Additionally, it is has become a tool for governments to aid or exploit for their own personal benefits. For cyber terrorists there has been an overwhelmingly abundance of new tools and technologies available that have allowed criminal acts to occur virtually anywhere in the …
Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson
Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson
Maurice Dawson
Cyber security has become a matter of national, international, economic, and societal importance that affects multiple nations (Walker, 2012). Since the 1990s users have exploited vulnerabilities to gain access to networks for malicious purposes. In recent years the number of attacks on U.S. networks has continued to grow at an exponential rate. This includes malicious embedded code, exploitation of backdoors, and more. These attacks can be initiated from anywhere in the world from behind a computer with a masked Internet Protocol (IP) address. This type of warfare, cyber warfare, changes the landscape of war itself (Beidleman, 2009). This type of …
Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim
Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim
Maurice Dawson
As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other software-based design methodologies. These methodologies include looking at software-based alternatives that could save a significant amount of money by reducing the amount of proprietary software. This chapter explores the use and integration of Open Source Software (OSS) in software-driven projects to include in enterprise organizations. Additionally, the legalities of the GNU General Public License (GPL), Lesser General Public License (LGPL), Berkeley Software Distribution (BSD), and Creative Commons are explored with the integration of these OSS solutions into organizations. …