Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Business

PDF

2015

Institution
Keyword
Publication
Publication Type

Articles 1 - 26 of 26

Full-Text Articles in Computer Engineering

Creating Business Value From Digital Data Streams: The Role Of Organizational Interventions, Rajeev Sharma, Abhijith Anand, Tim Coltman Dec 2015

Creating Business Value From Digital Data Streams: The Role Of Organizational Interventions, Rajeev Sharma, Abhijith Anand, Tim Coltman

Abhijith Anand

No abstract provided.


The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy Nov 2015

The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy

The ITB Journal

Many businesses and consumers are wary of conducting business over the Internet due to a perceived lack of security. Electronic business is subject to a variety of threats such as unauthorised access, misappropriation, alteration and destruction of both data and systems. This paper explores the major security concerns of businesses and users and describes the cryptographic techniques used to reduce such risks.


Using A Work System Metamodel And Usdl To Build A Bridge Between Business Service Systems And Service Computing, Steven Alter, Alistair Barros Oct 2015

Using A Work System Metamodel And Usdl To Build A Bridge Between Business Service Systems And Service Computing, Steven Alter, Alistair Barros

Business Analytics and Information Systems

This paper explores the support for more comprehensive modeling of service systems than that possible through modeling methods developed through partial perspectives, with uncertainties about their wider suitability and need for integration with other methods in this domain. It responds to a Dual Call for Papers from INFORMS Service Science and IEEE Transactions on Service Computing requesting contributions that address the barely explored challenge of establishing links between business views of service systems and more technical views from service computing. Competing definitions of service reveal that most business views of service emphasize acts or outcomes produced for others, whereas a …


Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery Jun 2015

Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery

UNLV Gaming Research & Review Journal

Cross-selling different types of games could provide an opportunity for casino operators to generate additional time and money spent on gaming from existing patrons. One way to identify the patrons who are likely to cross-play is mining individual players’ gaming data using predictive analytics. Hence, this study aims to predict casino patrons’ propensity to play both slots and table games, also known as cross-gaming, by applying a data-mining algorithm to patrons’ gaming data. The Exhaustive Chi-squared Automatic Interaction Detector (E-CHAID) method was employed to predict cross-gaming propensity. The E-CHAID models based on the gaming-related behavioral data produced actionable model accuracy …


Fundamentals Of Library Instruction, Darren Sweeper Jun 2015

Fundamentals Of Library Instruction, Darren Sweeper

Sprague Library Scholarship and Creative Works

No abstract provided.


Design, Programming, And User-Experience, Kaila G. Manca May 2015

Design, Programming, And User-Experience, Kaila G. Manca

Honors Scholar Theses

This thesis is a culmination of my individualized major in Human-Computer Interaction. As such, it showcases my knowledge of design, computer engineering, user-experience research, and puts into practice my background in psychology, com- munications, and neuroscience.

I provided full-service design and development for a web application to be used by the Digital Media and Design Department and their students.This process involved several iterations of user-experience research, testing, concepting, branding and strategy, ideation, and design. It lead to two products.

The first product is full-scale development and optimization of the web appli- cation.The web application adheres to best practices. It was …


Institutional Maximization And Path Dependency – The Delay Of Implementation Of The Eu Public Sector Information Directive In Sweden, Jan Kallberg, Erik Lakomaa Mar 2015

Institutional Maximization And Path Dependency – The Delay Of Implementation Of The Eu Public Sector Information Directive In Sweden, Jan Kallberg, Erik Lakomaa

Jan Kallberg

The implementation of the EU public sector information (PSI) directive was expected to open up European governmental data sources for commercialization and create, conservatively estimated, a € 32 billion European public information market. Institutional arrangements and governmental path dependency has delayed the directive’s implementation in several countries, most notably Poland and Sweden. In this paper we use the Swedish case to examine how bureaucratic inertia and path dependence can stall the implementation of EU directives that conflicts with the member state’s internal bureaucratic agenda. Sweden usually implements EU directives rapidly and extensively. In the case of the PSI-directive however, the …


Identification Of Employee Engagement Practices Viewed As Critical To Retention: A Cross-Generational Comparison, Sharon R. Floyd Mar 2015

Identification Of Employee Engagement Practices Viewed As Critical To Retention: A Cross-Generational Comparison, Sharon R. Floyd

Dissertations

Purpose. The purpose of this study was to identify the employee engagement practices that millennial IT workers perceive as important to retention. The secondary purpose of the study was to determine whether a difference exists between the engagement practices that appeal to millennial IT workers and the engagement practices that appeal to remaining IT working groups, which include the baby boomers and generation X.

Methodology. A quantitative, descriptive, survey-based research method was chosen for this study. The population included information technology workers representing three generations of working adults, including baby boomers, generation Xers, and millennials. The sample included technology workers …


A Proposed Model For The Approach To Augmented Reality Deployment In Marketing Communications, Stephen O'Mahony Feb 2015

A Proposed Model For The Approach To Augmented Reality Deployment In Marketing Communications, Stephen O'Mahony

Dept. of Marketing & International Business Conference Material

In the contemporary landscape, human interaction is characterized by the pervasive mediation of intelligent agents. Owing to advances in computer science and engineering, phenomena once limited to fixed locations are metamorphosing from extraneous entities to implicit components of the everyday. Computing power has simultaneously enhanced and miniaturized to the extent that contemporary consumer devices demonstrate power equivalent to or greater than that of personal computers of recent memory. At the same time, network connectivity has proliferated to ubiquitous levels, reflected in the fact that the amount of inanimate objects connected to the Internet has recently surpassed the human population of …


Connecting People And Ideas From Around The World: Global Innovation Platforms For Next-Generation Ecology And Beyond, P. Søgaard Jørgensen, F. Barraquand, V. Bonhomme, T. J. Curran, E. Cieraad, T. G. Ezard, L. Gherardi, R. A. Hayes, T. Poisot, R. Salguero-Gómez, Lucía Desoto, B. Swartz, J. M. Talbot, B. Wee, Naupaka B. Zimmerman Jan 2015

Connecting People And Ideas From Around The World: Global Innovation Platforms For Next-Generation Ecology And Beyond, P. Søgaard Jørgensen, F. Barraquand, V. Bonhomme, T. J. Curran, E. Cieraad, T. G. Ezard, L. Gherardi, R. A. Hayes, T. Poisot, R. Salguero-Gómez, Lucía Desoto, B. Swartz, J. M. Talbot, B. Wee, Naupaka B. Zimmerman

Biology Faculty Publications

We present a case for using Global Community Innovation Platforms (GCIPs), an approach to improve innovation and knowledge exchange in international scientific communities through a common and open online infrastructure. We highlight the value of GCIPs by focusing on recent efforts targeting the ecological sciences, where GCIPs are of high relevance given the urgent need for interdisciplinary, geographical, and cross-sector collaboration to cope with growing challenges to the environment as well as the scientific community itself. Amidst the emergence of new international institutions, organizations, and meetings, GCIPs provide a stable international infrastructure for rapid and long-term coordination that can be …


Unknown Exception Handling Tool Using Humans As Agents, Mwaka Mahanga Jan 2015

Unknown Exception Handling Tool Using Humans As Agents, Mwaka Mahanga

UNF Graduate Theses and Dissertations

In a typical workflow process, exceptions are the norm. Exceptions are defined as deviations from the normal sequence of activities and events. Exceptions can be divided into two broad categories: known exceptions (i.e., expected and predefined deviations) and unknown exceptions (i.e., unexpected and undefined deviations). Business Process Execution Language (BPEL) has become the de facto standard for executing business workflows with the use of web services. BPEL includes exception handling methods that are sufficient for known exception scenarios. Depending on the exception and the specifics of the exception handling tools, processes may either halt or move to completion. Instances of …


A Heuristic Text Analytic Approach For Classifying Research Articles, Steven Walczak, Deborah L. Kellogg Jan 2015

A Heuristic Text Analytic Approach For Classifying Research Articles, Steven Walczak, Deborah L. Kellogg

School of Information Faculty Publications

Classification of research articles is fundamental to analyze and understand research literature. Underlying concepts from both text analytics and concept mining form a foundation for the development of a quantitative heuristic methodology, the Scale of Theoretical and Applied Research (STAR), for classifying research. STAR demonstrates how concept mining may be used to classify research with respect to its theoretical and applied emphases. This research reports on evaluating the STAR heuristic classifier using the Business Analytics domain, by classifying 774 Business Analytics articles from 23 journals. The results indicate that STAR effectively evaluates overall article content of journals to be consistent …


Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo Jan 2015

Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo

All Faculty Scholarship

Many observers attribute the Internet’s success to two principles: Moore’s Law and Metcalfe’s Law. These precepts are often cited to support claims that larger networks are inevitably more valuable and that costs in a digital environment always decrease. This Article offers both a systematic description of both laws and then challenges the conventional wisdom by exploring their conceptual limitations. It also explores how alternative mechanisms, such as gateways and competition, can permit the realization benefits typically attributed to Moore’s Law and Metcalfe’s Law without requiring increases in network size.


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar Dec 2014

Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar

Maurice Dawson

Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …


Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim Dec 2014

Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim

Maurice Dawson

As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other software-based design methodologies. These methodologies include looking at software-based alternatives that could save a significant amount of money by reducing the amount of proprietary software. This chapter explores the use and integration of Open Source Software (OSS) in software-driven projects to include in enterprise organizations. Additionally, the legalities of the GNU General Public License (GPL), Lesser General Public License (LGPL), Berkeley Software Distribution (BSD), and Creative Commons are explored with the integration of these OSS solutions into organizations. …


A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson Dec 2014

A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson

Maurice Dawson

Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including utilities, regulators, energy markets, government entities, and even those that wish to exploit the cyber infrastructure. Cyber warfare is quickly becoming the method of warfare and the tool of military strategists. Additionally, it is has become a tool for governments to aid or exploit for their own personal benefits. For cyber terrorists there has been an overwhelmingly abundance of new tools and technologies available that have allowed criminal acts to occur virtually anywhere in the …


Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson Dec 2014

Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson

Maurice Dawson

Cyber security has become a matter of national, international, economic, and societal importance that affects multiple nations (Walker, 2012). Since the 1990s users have exploited vulnerabilities to gain access to networks for malicious purposes. In recent years the number of attacks on U.S. networks has continued to grow at an exponential rate. This includes malicious embedded code, exploitation of backdoors, and more. These attacks can be initiated from anywhere in the world from behind a computer with a masked Internet Protocol (IP) address. This type of warfare, cyber warfare, changes the landscape of war itself (Beidleman, 2009). This type of …


Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim Dec 2014

Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim

Maurice Dawson

As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other software-based design methodologies. These methodologies include looking at software-based alternatives that could save a significant amount of money by reducing the amount of proprietary software. This chapter explores the use and integration of Open Source Software (OSS) in software-driven projects to include in enterprise organizations. Additionally, the legalities of the GNU General Public License (GPL), Lesser General Public License (LGPL), Berkeley Software Distribution (BSD), and Creative Commons are explored with the integration of these OSS solutions into organizations. …