Open Access. Powered by Scholars. Published by Universities.®
Digital Communications and Networking Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (46)
- Computer and Systems Architecture (45)
- Data Storage Systems (37)
- Library and Information Science (36)
- Business (35)
-
- Management Information Systems (33)
- Technology and Innovation (33)
- Communication (27)
- Physical Sciences and Mathematics (25)
- Computer Sciences (24)
- Operations Research, Systems Engineering and Industrial Engineering (23)
- Communication Technology and New Media (22)
- Social Media (21)
- E-Commerce (20)
- Operational Research (20)
- Business Intelligence (19)
- Electrical and Computer Engineering (19)
- Information Literacy (19)
- Management Sciences and Quantitative Methods (19)
- Science and Technology Studies (19)
- Archival Science (12)
- Cataloging and Metadata (12)
- Software Engineering (12)
- Hardware Systems (11)
- Systems and Communications (10)
- Other Computer Engineering (7)
- Electrical and Electronics (6)
- Institution
-
- California State University, San Bernardino (19)
- Singapore Management University (15)
- Kansas State University Libraries (13)
- California Polytechnic State University, San Luis Obispo (12)
- Selected Works (5)
-
- Western University (5)
- Tennessee State University (4)
- University of Kentucky (3)
- University of Massachusetts Amherst (3)
- Claremont Colleges (2)
- Florida International University (2)
- Georgia Southern University (2)
- James Madison University (2)
- Kennesaw State University (2)
- Purdue University (2)
- Technological University Dublin (2)
- University of Nebraska - Lincoln (2)
- University of Pennsylvania Carey Law School (2)
- University of Tennessee, Knoxville (2)
- Air Force Institute of Technology (1)
- Edith Cowan University (1)
- Embry-Riddle Aeronautical University (1)
- La Salle University (1)
- Loyola Marymount University and Loyola Law School (1)
- Marquette University (1)
- Maurer School of Law: Indiana University (1)
- Morehead State University (1)
- Old Dominion University (1)
- SIT Graduate Institute/SIT Study Abroad (1)
- San Jose State University (1)
- Keyword
-
- Security (5)
- Android (3)
- Cloud Computing (3)
- Digital preservation (3)
- Networking (3)
-
- Arduino (2)
- Assessment (2)
- Bluetooth (2)
- Data mining (2)
- Digital collections (2)
- Digitization (2)
- Energy (2)
- IaaS (2)
- Internet (2)
- Internet of things (2)
- Iot (2)
- Key management (2)
- Localization (2)
- Low (2)
- Management (2)
- Mobile devices (2)
- Mobile sink (2)
- Network (2)
- Open source software (2)
- PaaS (2)
- Sensor (2)
- Servers (2)
- Smart Grid (2)
- Social Media (2)
- Ultrasound (2)
- Publication
-
- Journal of International Technology and Information Management (19)
- Research Collection School Of Computing and Information Systems (15)
- Central Plains Network for Digital Asset Management (12)
- Computer Engineering (9)
- Electronic Thesis and Dissertation Repository (5)
-
- Computer Science Faculty Research (4)
- Masters Theses (4)
- All Faculty Scholarship (2)
- Articles (2)
- FIU Electronic Theses and Dissertations (2)
- Master's Theses (2)
- Matt Schultz (2)
- ASA Multidisciplinary Research Symposium (1)
- Branch Mathematics and Statistics Faculty and Staff Publications (1)
- CMC Senior Theses (1)
- Claremont-UC Undergraduate Research Conference on the European Union (1)
- Computer Science Faculty Publications (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Computer Science and Software Engineering (1)
- Doctoral Dissertations (1)
- Electronic Theses and Dissertations (1)
- Elinvo (Electronics, Informatics, and Vocational Education) (1)
- HON499 projects (1)
- Harold Herzog, PhD (1)
- Honors College Theses (1)
- Honors Thesis (1)
- Human Factors and Applied Psychology Student Conference (1)
- Independent Study Project (ISP) Collection (1)
- Indiana Law Journal (1)
- Information Science Faculty Publications (1)
- Publication Type
- File Type
Articles 31 - 60 of 120
Full-Text Articles in Digital Communications and Networking
Founding Sap Student User Group (Sug) At Southern Illinois University Carbondale - Siu Sug, Jihoon Park, Siuc Isat
Founding Sap Student User Group (Sug) At Southern Illinois University Carbondale - Siu Sug, Jihoon Park, Siuc Isat
ASA Multidisciplinary Research Symposium
Enterprise Computing has quickly become of paramount importance for businesses vying to survive in today’s unlimited competition market. SAP software has become a front runner and leader of business and technical innovation in the enterprise computing industry. Major fortune 500 companies are using SAP software as their main operating software. As the need for individuals knowledgeable on SAP has increased dramatically, learning SAP is becoming important for the market of employment
Can Flight Data Recorder Memory Be Stored On The Cloud?, Yair Wiseman
Can Flight Data Recorder Memory Be Stored On The Cloud?, Yair Wiseman
Journal of Aviation Technology and Engineering
Flight data recorders (FDRs, or black boxes) generate data that is collected on an embedded memory device. A well-known difficulty with these devices is that the embedded memory device runs out of space. To avoid getting into this problematic situation, the software of the FDR is designed to operate in a watchful mode, constantly working to minimize the use of memory space; otherwise a larger FDR would be needed. However, larger FDRs can be a problem because they have very rigorous requirements; thus, enlargement is costly. Outcomes of this research include the recommendation to send FDR data to a remote …
Towards A Development Of A Mobile Application Security Invasiveness Index, Sam Espana
Towards A Development Of A Mobile Application Security Invasiveness Index, Sam Espana
KSU Proceedings on Cybersecurity Education, Research and Practice
The economic impact of Mobile IP, the standard that allows IP sessions to be maintained even when switching between different cellular towers or networks, has been staggering in terms of both scale and acceleration (Doherty, 2016). As voice communications transition to all-digital, all-IP networks such as 4G, there will be an increase in risk due to vulnerabilities, malware, and hacks that exist for PC-based systems and applications (Harwood, 2011). According to Gostev (2006), in June, 2004, a well-known Spanish virus collector known as VirusBuster, emailed the first known mobile phone virus to Kaspersky Lab, Moscow. Targeting the Symbian OS, the …
Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang
Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang
Journal of International Technology and Information Management
With the recent advances in computer technology along with pervasive internet accesses, data analytics is getting more attention than ever before. In addition, research areas on data analysis are diverging and integrating lots of different fields such as a business and social sector. Especially, recent researches focus on the data analysis for a better intelligent decision making and prediction system. This paper analyzes data collected from current IT learners who have already studied various IT subjects to find the IT learners’ learning patterns. The most popular learning patterns are identified through an association rule data mining using an arules package …
The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman
The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman
Journal of International Technology and Information Management
Business analytics, defined as the use of data to make better, more relevant, evidence-based business decisions, has received a great deal of attention in practitioner circles. Organizations have adopted business analytics in an effort to improve revenue, product placement, and customer satisfaction. Professional sports teams are no different. While analytics has been used for over 30 years, the use of analytics by professional sports teams is a relatively new concept. However, it is unclear whether the teams that have adopted analytics are seeing any results. If not, then perhaps analytics is not the right solution. Analyses across the four, major …
A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao
A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao
Journal of International Technology and Information Management
This research studies attitude and readiness of STEM majoring and success with
the data from a survey with a total of 501 viable responses, with respect to STEM
(science, technology, engineering, and mathematics) related majors that are
essential and fundamental to skills relevant to big data business analytics.
Recruiting and keeping students in STEM areas have attracted a large body of
attention in pedagogical studies. An effective way of achieving such a goal is to
show them how rewarding and self-fulfilling STEM careers can be toward
perspective students. One example of the abundance of STEM careers is the rapid
growth …
An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris
An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris
Journal of International Technology and Information Management
The explosive growth and rapid proliferation of smartphones and other mobile
devices that access data over communication networks has necessitated advocating
and implementing security constraints for the purpose of abetting safe computing.
Remote data access using mobile devices is particularly popular among students at
institutions of higher education. To ensure safe harbor for constituents, it is
imperative for colleges and universities to establish, disseminate, and enforce
mobile device security artifacts, where artifacts is defined as policies, procedures,
guidelines or other documented or undocumented protocols. The purpose of this
study is to explore the existence of, specific content of, and the …
Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy
Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy
Journal of International Technology and Information Management
The penetration of the internet, smart-phones and tablets has witnessed tremendous increase in the number of people playing online games in the past few years. Social networking site (SNS) games are a subset of digital games. They are platform based, multiplayer and reveal the real identity of the player. These games are hosted on social networks such as Facebook, where in people play with many other players online. The risks associated with social network gaming are addiction, theft, fraud, loneliness, anxiety, aggression, poor academic performance, cognition distortion etc. This study aims to understand the user motivations to continue to play …
Violating Of Individual Privacy: Moroccan Perceptions Of The Ban Of Voip Services, Tyler Delhees
Violating Of Individual Privacy: Moroccan Perceptions Of The Ban Of Voip Services, Tyler Delhees
Independent Study Project (ISP) Collection
On January 6, 2016, the Moroccan telecommunications regulatory agency, the ANRT, announced a ban onVoice Over Internet Protocol(VoIP) calling services such as Skype, WhatsApp, and Viber. The ban triggered sweeping opposition among the Moroccan public, opening discussion of digital rights, censorship, and Internet governance. Considering liberal democratic rights in the 2011 Moroccan Constitution and a history of censorship, this study analyzes the official justification of the ANRT alongside additional explanations involving business interests and the security services. The purpose of this study is to gauge the perceptions of Moroccans on the decision of the ANRT and provide a holistic explanation. …
Toward Distributed At-Scale Hybrid Network Test With Emulation And Simulation Symbiosis, Rong Rong
Toward Distributed At-Scale Hybrid Network Test With Emulation And Simulation Symbiosis, Rong Rong
FIU Electronic Theses and Dissertations
In the past decade or so, significant advances were made in the field of Future Internet Architecture (FIA) design. Undoubtedly, the size of Future Internet will increase tremendously, and so will the complexity of its users’ behaviors. This advancement means most of future Internet applications and services can only achieve and demonstrate full potential on a large-scale basis. The development of network testbeds that can validate key design decisions and expose operational issues at scale is essential to FIA research. In conjunction with the development and advancement of FIA, cyber-infrastructure testbeds have also achieved remarkable progress. For meaningful network studies, …
After The Avalanche: The Post-Snowden Intelligence Politics Between The United States, The United Kingdom, And Germany, Jobel Kyle P. Vecino
After The Avalanche: The Post-Snowden Intelligence Politics Between The United States, The United Kingdom, And Germany, Jobel Kyle P. Vecino
Claremont-UC Undergraduate Research Conference on the European Union
The revelations of PRISM and XKeyscore by ex-National Security Agency (NSA) analyst Edward Snowden resulted in arguably the largest intelligence leak so far in the 21st century. The leak revealed that the NSA was working with the British Government Communications Headquarters (GCHQ) on surveillance and data collection of individuals throughout Europe. Similarly, the NSA also colluded with the German Federal Intelligence Service (BND) on similar data collection and surveillance activities. Whereas the British government reacted relatively benignly to the revelations despite cries of government abuse, the German government reacted negatively to the revelations, eventually opening a rift between Washington …
Routing Algorithm With Uneven Clustering For Energy Heterogeneous Wireless Sensor Networks, Ying Zhang, Wei Xiong, Dezhi Han, Wei Chen, Jun Wang
Routing Algorithm With Uneven Clustering For Energy Heterogeneous Wireless Sensor Networks, Ying Zhang, Wei Xiong, Dezhi Han, Wei Chen, Jun Wang
Computer Science Faculty Research
Aiming at the “hotspots” problem in energy heterogeneous wireless sensor networks, a routing algorithm of heterogeneous sensor network with multilevel energies based on uneven clustering is proposed. In this algorithm, the energy heterogeneity of the nodes is fully reflected in the mechanism of cluster-heads’ election. It optimizes the competition radius of the cluster-heads according to the residual energy of the nodes. This kind of uneven clustering prolongs the lifetime of the cluster-heads with lower residual energies or near the sink nodes. In data transmission stage, the hybrid multihop transmission mode is adopted, and the next-hop routing election fully takes account …
Haptic Foot Feedback For Kicking Training In Virtual Reality, Hank Huang, Hong Tan
Haptic Foot Feedback For Kicking Training In Virtual Reality, Hank Huang, Hong Tan
The Summer Undergraduate Research Fellowship (SURF) Symposium
As means to further supplement athletic performances increases, virtual reality is becoming helpful to sports in terms of cognitive training such as reaction, mentality, and game strategies. With the aid of haptic feedback, interaction with virtual objects increases by another dimension, in addition to the presence of visual and auditory feedback. This research presents an integrated system of a virtual reality environment, motion tracking system, and a haptic unit designed for the dorsal foot. The prototype simulates a scenario of virtual kicking and returns haptic response upon collision between the user’s foot and virtual object. The overall system was evaluated …
Topology Design And Delay Control For Communication Networks In Smart Grid, Xiaodong Wang
Topology Design And Delay Control For Communication Networks In Smart Grid, Xiaodong Wang
Doctoral Dissertations
Stability is a critical concern in the design and maintenance of power systems. Different approaches have been proposed for the analysis of power grid stability in various scenarios depending on small or large perturbations and the speed of the phenomenon of interest. In this work, we consider the power grid as a group of flocking birds, as synchronization is the key issue in both contexts. The framework of partial difference equation (PdE) is used to analyze the system stability, when designing the communication network of the power grid network for conveying measurements between different power stations. Both the cases where …
The Design And Validation Of A Wireless Bat-Mounted Sonar Recording System, Jeremy Joseph Langford
The Design And Validation Of A Wireless Bat-Mounted Sonar Recording System, Jeremy Joseph Langford
Masters Theses
Scientists studying the behavior of bats monitor their echolocation calls, as their calls are important for navigation and feeding, but scientist are typically restricted to ground-based recording. Recording bat calls used for echolocation from the back of the bat as opposed to the ground offers the opportunity to study bat echolocation from a vantage otherwise only offered to the bats themselves. However, designing a bat mounted in-flight audio recording system, (bat-tag), capable of recording the ultra-sound used in bat echolocation presents a unique set of challenges. Chiefly, the bat-tag must be sufficiently light weight as to not overburden the bat, …
A Multilingual Semi-Supervised Approach In Deriving Singlish Sentic Patterns For Polarity Detection, Siaw Ling Lo, Erik Cambria, Raymond Chiong, David Cornforth
A Multilingual Semi-Supervised Approach In Deriving Singlish Sentic Patterns For Polarity Detection, Siaw Ling Lo, Erik Cambria, Raymond Chiong, David Cornforth
Research Collection School Of Computing and Information Systems
Due to the huge volume and linguistic variation of data shared online, accurate detection of the sentiment of a message (polarity detection) can no longer rely on human assessors or through simple lexicon keyword matching. This paper presents a semi-supervised approach in constructing essential toolkits for analysing the polarity of a localised scarce-resource language, Singlish (Singaporean English). Corpus-based bootstrapping using a multilingual, multifaceted lexicon was applied to construct an annotated testing dataset, while unsupervised methods such as lexicon polarity detection, frequent item extraction through association rules and latent semantic analysis were used to identify the polarity of Singlish n-grams before …
Climbing Up Cloud Nine: Performance Enhancement Techniques For Cloud Computing Environments, Mohamed Abusharkh
Climbing Up Cloud Nine: Performance Enhancement Techniques For Cloud Computing Environments, Mohamed Abusharkh
Electronic Thesis and Dissertation Repository
With the transformation of cloud computing technologies from an attractive trend to a business reality, the need is more pressing than ever for efficient cloud service management tools and techniques. As cloud technologies continue to mature, the service model, resource allocation methodologies, energy efficiency models and general service management schemes are not yet saturated. The burden of making this all tick perfectly falls on cloud providers. Surely, economy of scale revenues and leveraging existing infrastructure and giant workforce are there as positives, but it is far from straightforward operation from that point. Performance and service delivery will still depend on …
Mims: Mobile Interruption Management System, Mohammad Kayes Kaykobad
Mims: Mobile Interruption Management System, Mohammad Kayes Kaykobad
Master's Theses (2009 -)
Mobile devices are increasing in an astronomical rate throughout the world. While it is bringing a lot of comfort to the users it is not coming without any hazards. Now a user is susceptible to mobile call interruptions wherever he is, whether he is in the middle of a very important discussion or in a very important task like performing a complicated emergency operation in a hospital. As a result researchers have been studying to find ways to minimize cost of mobile interruptions. In this thesis we have proposed a mobile interruption management system in which callers have been grouped …
The Fcc And The “Pre-Internet”, John Blevins
The Fcc And The “Pre-Internet”, John Blevins
Indiana Law Journal
Network neutrality has dominated broadband policy debates for the past decade. While important, network neutrality overshadows other policy levers that are equally important to the goals of better, cheaper, and more open broadband service. This lack of perspective has historical precedent—and understanding this history can help refocus today’s policy debate. In the 1960s and 1970s, telephone companies threatened the growth of the nascent data industry. The FCC responded with a series of rulemakings known as the “Computer Inquiries” proceedings. In the literature, Computer Inquiries enjoys hallowed status as a key foundation of the Internet’s rise.
This Article, however, argues that …
Stpp: Spatial-Temporal Phase Profiling Based Method For Relative Rfid Tag Localization, Longfei Shangguan, Zheng Yang, Alex X. Liu, Zimu Zhou, Yunhao Liu
Stpp: Spatial-Temporal Phase Profiling Based Method For Relative Rfid Tag Localization, Longfei Shangguan, Zheng Yang, Alex X. Liu, Zimu Zhou, Yunhao Liu
Research Collection School Of Computing and Information Systems
Many object localization applications need the relative locations of a set of objects as oppose to their absolute locations. Although many schemes for object localization using radio frequency identification (RFID) tags have been proposed, they mostly focus on absolute object localization and are not suitable for relative object localization because of large error margins and the special hardware that they require. In this paper, we propose an approach called spatial-temporal phase profiling (STPP) to RFID-based relative object localization. The basic idea of STPP is that by moving a reader over a set of tags during which the reader continuously interrogating …
Passively Testing Routing Protocols In Wireless Sensor Networks, Xiaoping Che, Stephane Maag, Hwee-Xian Tan, Hwee-Pink Tan
Passively Testing Routing Protocols In Wireless Sensor Networks, Xiaoping Che, Stephane Maag, Hwee-Xian Tan, Hwee-Pink Tan
Research Collection School Of Computing and Information Systems
Smart systems are today increasingly developed with the number of wireless sensor devices that drastically increases. They are implemented within several contexts through our environment. Thus, sensed data transported in ubiquitous systems are important and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed to wireless sensor networks (WSN). However, one stage that is often neglected before their deployment, is the conformance testing process, a crucial and challenging step. Active testing techniques commonly used in wired networks are not suitable to WSN and passive approaches are needed. While some works …
Privacy And The Information Age: A Longitudinal View, Charles E. Downing
Privacy And The Information Age: A Longitudinal View, Charles E. Downing
Journal of International Technology and Information Management
As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? …
Practitioners' Expectations On Automated Fault Localization, Pavneet Singh Kochhar, Xin Xia, David Lo, Shanping Li
Practitioners' Expectations On Automated Fault Localization, Pavneet Singh Kochhar, Xin Xia, David Lo, Shanping Li
Research Collection School Of Computing and Information Systems
Software engineering practitioners often spend significant amount of time and effort to debug. To help practitioners perform this crucial task, hundreds of papers have proposed various fault localization techniques. Fault localization helps practitioners to find the location of a defect given its symptoms (e.g., program failures). These localization techniques have pinpointed the locations of bugs of various systems of diverse sizes, with varying degrees of success, and for various usage scenarios. Unfortunately, it is unclear whether practitioners appreciate this line of research. To fill this gap, we performed an empirical study by surveying 386 practitioners from more than 30 countries …
Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown
Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown
Journal of International Technology and Information Management
Assessment is now at the center of the new business education zeitgeist. This focus is the direct result of feedback from the business community regarding the growing gap between their needs and graduates from many business schools. Recently this divide has fallen under even closer scrutiny because of increasing student debt and the growing controversy over return-on- investment. Today business leaders are looking for web-savvy, problem-solving graduates. To this end, AACSB and regional accrediting bodies are calling for the adoption of comprehensive collaborative learning strategies to better align graduates’ skill sets with the real needs of business. Crowdsourcing, which is …
Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar
Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar
Journal of International Technology and Information Management
The rapid adoption of IT governance (ITG) frameworks in organizations worldwide, along with the subsequent need to select and integrate overlapping ITG frameworks has presented practitioners with challenges in choice and integration of frameworks. In this respect, the purpose of this study was to explore the ITG frameworks integration (ITGFI) challenges faced by organizations worldwide; develop and test a theory-based integrated ITG challenges (IIC) taxonomy model created from extant literature; and validate and compare these with those empirically extracted from three case studies in the United Arab Emirates (UAE). The results present the audience with a taxonomy of a prioritized …
Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee
Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee
Journal of International Technology and Information Management
Using the data collected from several universities in China and the United States, which have drastically different piracy rates, economic development stages, income levels, and national cultures, this study aims to identify which demographic factors affect software piracy significantly. Totally, the dataset includes 600 valid responses. Multivariate data analysis, supported by Multivariate Analysis of Variance and Turkey’s test, reveals that among various factors, country difference and gender most significantly influence software piracy. In addition, this study offers recommendations on how to curb software piracy effectively.
An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong
An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong
Journal of International Technology and Information Management
Drawn upon upper echelon theory and organizational theory, this research proposes to examine the impact of CEO turnover in IT firms on firm performance in terms of both sustainable accounting performance and market performance. We find that CEO turnover is a significant determinant of firm performance, especially in IT firms. This paper contributes to the IS literature by investigating the CEO turnover impact in IT firms compared to other industries. This study also has practical implications by providing the guideline for IT firms on the CEO turnover policy. Such firms should place additional emphasis on their succession planning efforts.
Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa
Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa
Journal of International Technology and Information Management
Facebook is one of the world’s leading social networking sites. It is pervasive in students’ lives and can impact their academic careers in a variety of ways. However, little research exists evaluating the use of Facebook in minority academic settings. An early step in this direction is to gain an understanding of how different student demographic groups use Facebook. An interest in further assessment of Facebook’s role in diverse segments of academia motivates the collection and analysis of Facebook-related data from minority serving institutions such as Historically Black Colleges or Universities (HBCUs) and Hispanic Serving Institutions (HSIs). This study presents …
Performance Optimization Of Network Protocols For Ieee 802.11s-Based Smart Grid Communications, Nico Saputro
Performance Optimization Of Network Protocols For Ieee 802.11s-Based Smart Grid Communications, Nico Saputro
FIU Electronic Theses and Dissertations
The transformation of the legacy electric grid to Smart Grid (SG) poses numerous challenges in the design and development of an efficient SG communications network. While there has been an increasing interest in identifying the SG communications network and possible SG applications, specific research challenges at the network protocol have not been elaborated yet. This dissertation revisited each layer of a TCP/IP protocol stack which basically was designed for a wired network and optimized their performance in IEEE 802.11s-based Advanced Metering Infrastructure (AMI) communications network against the following challenges: security and privacy, AMI data explosion, periodic simultaneous data reporting scheduling, …
Spectrally Efficient Cooperative Relay Networks Using Signal Space Diversity, Muhammad Ajmal Khan
Spectrally Efficient Cooperative Relay Networks Using Signal Space Diversity, Muhammad Ajmal Khan
Electronic Thesis and Dissertation Repository
Cooperative relaying has received widespread attention in recent years from both academic and industrial communities. It offers significant benefits in enabling connectivity as well as in increasing coverage, power saving, spatial diversity and channel capacity. However, one of the main limitations of the conventional cooperative relaying system is the repetition of the received data by the relays, which reduces the spectral efficiency and the data rate. In this thesis, signal space diversity (SSD) based technique is proposed to incorporate into the conventional relaying system to enhance spectral efficiency, data rate and system performance.
Firstly, SSD is introduced into a two-way …