Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Nova Southeastern University (41)
- Walden University (20)
- Regis University (12)
- Pace University (9)
- Claremont Colleges (8)
-
- Selected Works (8)
- University of Nebraska at Omaha (8)
- GALILEO, University System of Georgia (7)
- California State University, San Bernardino (6)
- Institute of Business Administration (5)
- Old Dominion University (5)
- Singapore Management University (5)
- University of Pennsylvania Carey Law School (4)
- Bryant University (3)
- Edith Cowan University (3)
- Golden Gate University School of Law (3)
- University of Rhode Island (3)
- Air Force Institute of Technology (2)
- Kennesaw State University (2)
- Valparaiso University (2)
- Antioch University (1)
- Association of Arab Universities (1)
- Brigham Young University (1)
- City University of New York (CUNY) (1)
- DePaul University (1)
- Dordt University (1)
- Eastern Michigan University (1)
- Embry-Riddle Aeronautical University (1)
- Fort Hays State University (1)
- Liberty University (1)
- Publication Year
- Publication
-
- CCE Theses and Dissertations (40)
- Walden Dissertations and Doctoral Studies (20)
- Regis University Student Publications (comprehensive collection) (12)
- CGU Faculty Publications and Research (8)
- Community Action Forum: Seidenberg School (8)
-
- Computer Science and Information Technology Grants Collections (6)
- Theses Digitization Project (6)
- International Conference on Information and Communication Technologies (5)
- Research Collection School Of Computing and Information Systems (5)
- All Faculty Scholarship (4)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (4)
- Theses and Dissertations (4)
- California Agencies (3)
- Information Systems and Quantitative Analysis Faculty Publications (3)
- Faculty and Research Publications (2)
- Information Technology Capstone Research Project Reports (2)
- Open Educational Resources (2)
- All Works (1)
- Antioch University Full-Text Dissertations & Theses (1)
- Applied Mathematics & Information Sciences (1)
- Articles by Maurer Faculty (1)
- Australian Information Security Management Conference (1)
- Bioinformatics Software Design Projects (1)
- Browse all Theses and Dissertations (1)
- Collection Development Reports and Documents (1)
- Computer Science Faculty Publications (1)
- Computer Science Faculty Publications and Presentations (1)
- Computer Science and Information Technology Ancillary Materials (1)
- Computer Sciences and Electrical Engineering Faculty Research (1)
- David Dampier (1)
- Publication Type
- File Type
Articles 1 - 30 of 183
Full-Text Articles in Physical Sciences and Mathematics
Link Tank
DePaul Magazine
A new JD certificate program in information technology, cybersecurity and data privacy provides DePaul University students with proficiency in both law and tech.
Assessing The Moderating Effect Of Innovation On The Relationship Between Information Technology And Supply Chain Management: An Empirical Examination, Heba Hatamlah, Mahmoud Allahham, Ibrahim A. Abu-Alsondos, Alaa S. Mushtaha, Ghadeer M. Al-Anati, Mustafa Al-Shaikh
Assessing The Moderating Effect Of Innovation On The Relationship Between Information Technology And Supply Chain Management: An Empirical Examination, Heba Hatamlah, Mahmoud Allahham, Ibrahim A. Abu-Alsondos, Alaa S. Mushtaha, Ghadeer M. Al-Anati, Mustafa Al-Shaikh
Applied Mathematics & Information Sciences
This study examines how innovation (INN) influences the relationship between supply chain management and information technology in Jordan. 211 employees of Jordanian industrial enterprises who work in the Operations Department provided information for the study, which examines this subject. The findings indicate a close connection between information technology and supply chain management. Innovation also dramatically modifies the interaction between supply chain management and information technology. Management help may be the subject of future research.
Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda
Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda
Walden Dissertations and Doctoral Studies
All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …
Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda
Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda
Walden Dissertations and Doctoral Studies
All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …
Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo
Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo
Walden Dissertations and Doctoral Studies
Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …
The Relationship Between Organizational Knowledge Management Constructs And Organizational Flexibility, Marcus B. Williams
The Relationship Between Organizational Knowledge Management Constructs And Organizational Flexibility, Marcus B. Williams
Walden Dissertations and Doctoral Studies
The role that the information technology (IT) department serves is governed by the corporate culture and how it values the use of knowledge, including IT, to achieve a strategic competitive advantage. The purpose of this quantitative study was to examine the potential relationships between information acquisition, knowledge dissemination, shared interpretation, organizational memory, and organizational flexibility. Two theories served as the theoretical foundation for this study: contingency theory and the resource-based view of the firm. To answer the question of possible correlation between organizational flexibility and components of knowledge management, a randomly selected sample of 193 IT professionals employed at small- …
Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo
Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo
Walden Dissertations and Doctoral Studies
Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …
The Minority In The Minority, Black Women In Computer Science Fields: A Phenomenological Study, Blanche' D. Anderson
The Minority In The Minority, Black Women In Computer Science Fields: A Phenomenological Study, Blanche' D. Anderson
Doctoral Dissertations and Projects
The purpose of this transcendental phenomenological study was to describe the lived experiences of Black women with a bachelor’s, master’s, or doctoral degree in computer science, currently employed in the United States. The theory guiding this study was Krumboltz’s social learning theory of career decision-making, as it provides a foundation for understanding how a combination of factors leads to an individual’s educational and occupational preferences and skills. This qualitative study answered the following central research question: What are the lived experiences of Black women with a bachelor’s, master’s, or doctoral degree in computer science, currently employed in the United States? …
Assessing Automated Administration, Cary Coglianese, Alicia Lai
Assessing Automated Administration, Cary Coglianese, Alicia Lai
All Faculty Scholarship
To fulfill their responsibilities, governments rely on administrators and employees who, simply because they are human, are prone to individual and group decision-making errors. These errors have at times produced both major tragedies and minor inefficiencies. One potential strategy for overcoming cognitive limitations and group fallibilities is to invest in artificial intelligence (AI) tools that allow for the automation of governmental tasks, thereby reducing reliance on human decision-making. Yet as much as AI tools show promise for improving public administration, automation itself can fail or can generate controversy. Public administrators face the question of when exactly they should use automation. …
Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson
Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson
Walden Dissertations and Doctoral Studies
Business and IT leaders in financial services are concerned with the limited benefits they are reaping from information technology outsourcing (ITO) projects, despite continued heavy investments in ITO. Grounded in the transaction cost, agency, and resource-based view theories, the purpose of this quantitative correlational study was to examine the relationship between vendor/client complementarity, vendor technology maturity, vendor financial stability, and ITO success. Participants were 65 business and IT leaders in financial institutions engaged in ITO projects. The result of the multiple linear regression was significant, F(3, 61) = 4.845, p = .004, R2 = .192. In the final analysis, vendor/client …
From Negative To Positive Algorithm Rights, Cary Coglianese, Kat Hefter
From Negative To Positive Algorithm Rights, Cary Coglianese, Kat Hefter
All Faculty Scholarship
Artificial intelligence, or “AI,” is raising alarm bells. Advocates and scholars propose policies to constrain or even prohibit certain AI uses by governmental entities. These efforts to establish a negative right to be free from AI stem from an understandable motivation to protect the public from arbitrary, biased, or unjust applications of algorithms. This movement to enshrine protective rights follows a familiar pattern of suspicion that has accompanied the introduction of other technologies into governmental processes. Sometimes this initial suspicion of a new technology later transforms into widespread acceptance and even a demand for its use. In this paper, we …
Exploring Critical Success Factors For Implementing It Modernization Systems In Michigan State Agencies, Luc Armand Kamdem
Exploring Critical Success Factors For Implementing It Modernization Systems In Michigan State Agencies, Luc Armand Kamdem
Walden Dissertations and Doctoral Studies
Since 2001, most government organizations’ IT modernization programs had failed because of ineffective implementation strategies from IT leaders. The research problem was the absence of effective strategies to modernize IT legacy systems. The purpose of this qualitative single case study was to explore effective IT modernization strategies to revolutionize IT legacy systems. The researcher sought to answer how organizations create effective strategies to modernize IT legacy systems. The study used purposeful sampling, including 13 IT leaders, IT technicians, and customers based on their experience in implementing successful IT modernization programs’ strategies. Data were collected using semi-structured interviews and agency documentation. …
Antitrust By Algorithm, Cary Coglianese, Alicia Lai
Antitrust By Algorithm, Cary Coglianese, Alicia Lai
All Faculty Scholarship
Technological innovation is changing private markets around the world. New advances in digital technology have created new opportunities for subtle and evasive forms of anticompetitive behavior by private firms. But some of these same technological advances could also help antitrust regulators improve their performance in detecting and responding to unlawful private conduct. We foresee that the growing digital complexity of the marketplace will necessitate that antitrust authorities increasingly rely on machine-learning algorithms to oversee market behavior. In making this transition, authorities will need to meet several key institutional challenges—building organizational capacity, avoiding legal pitfalls, and establishing public trust—to ensure successful …
Comparison Of The Mental Burden On Nursing Care Providers With And Without Mat-Type Sleep State Sensors At A Nursing Home In Tokyo, Japan: Quasi-Experimental Study, Sakiko Itoh, Hwee-Pink Tan, Kenichi Kudo, Yasuko Ogata
Comparison Of The Mental Burden On Nursing Care Providers With And Without Mat-Type Sleep State Sensors At A Nursing Home In Tokyo, Japan: Quasi-Experimental Study, Sakiko Itoh, Hwee-Pink Tan, Kenichi Kudo, Yasuko Ogata
Research Collection School Of Computing and Information Systems
Background: Increasing need for nursing care has led to the increased burden on formal caregivers, with those in nursing homes having to deal with exhausting labor. Although research activities on the use of internet of things devices to support nursing care for older adults exist, there is limited evidence on the effectiveness of these interventions among formal caregivers in nursing homes. Objective: This study aims to investigate whether mat-type sleep state sensors for supporting nursing care can reduce the mental burden of formal caregivers in a nursing home. Methods: This was a quasi-experimental study at a nursing home in Tokyo, …
Predicting The Outcome Of Nba Games, Matthew Houde
Predicting The Outcome Of Nba Games, Matthew Houde
Honors Projects in Data Science
The aim of the project is to create a machine learning model to predict NBA games. The purpose is to build upon and improve existing models. Research into other predictive sports models and machine learning techniques was conducted to understand what is currently being done to predict NBA games and how effective it is in doing so. After a thorough literary review, the model was created using Python and a variety of machine learning techniques. The dataset used had an array of team statistics for both the home and away team for each corresponding matchup and two supporting features were …
To Thine Own Self Be True? Incentive Problems In Personalized Law, Jordan M. Barry, John William Hatfield, Scott Duke Kominers
To Thine Own Self Be True? Incentive Problems In Personalized Law, Jordan M. Barry, John William Hatfield, Scott Duke Kominers
William & Mary Law Review
Recent years have seen an explosion of scholarship on “personalized law.” Commentators foresee a world in which regulators armed with big data and machine learning techniques determine the optimal legal rule for every regulated party, then instantaneously disseminate their decisions via smartphones and other “smart” devices. They envision a legal utopia in which every fact pattern is assigned society’s preferred legal treatment in real time.
But regulation is a dynamic process; regulated parties react to law. They change their behavior to pursue their preferred outcomes— which often diverge from society’s—and they will continue to do so under personalized law: They …
Information Systems: No Boundaries! A Concise Approach To Understanding Information Systems For All Disciplines, Shane M. Schartz
Information Systems: No Boundaries! A Concise Approach To Understanding Information Systems For All Disciplines, Shane M. Schartz
Open Educational Resources
This book was created to provide a different experience for students beginning their studies in information systems. Instead of being bombarded with information from a business systems perspective, the goal of this book is to provide a baseline of material regarding information systems in all disciplines, not just business systems - hence the name No Boundaries!
Examining The Influence Of Perceived Risk On The Selection Of Internet Access In The U.S. Intelligence Community, Tyler Michael Pieron
Examining The Influence Of Perceived Risk On The Selection Of Internet Access In The U.S. Intelligence Community, Tyler Michael Pieron
CCE Theses and Dissertations
Information technology security policies are designed explicitly to protect IT systems. However, overly restrictive information security policies may be inadvertently creating an unforeseen information risk by encouraging users to bypass protected systems in favor of personal devices, where the potential loss of organizational intellectual property is greater.
Current models regarding the acceptance and use of technology, Technology Acceptance Model Version 3 (TAM3) and the Unified Theory of Acceptance and Use of Technology Version 2 (UTAUT2), address the use of technology in organizations and by consumers, but little research has been done to identify an appropriate model to begin to understand …
Rfid Adaption In Healthcare Organizations: An Integrative Framework, Ahed Abugabah, Louis Sanzogni, Luke Houghton, Ahmad Ali Alzubi, Alaa Abuqabbeh
Rfid Adaption In Healthcare Organizations: An Integrative Framework, Ahed Abugabah, Louis Sanzogni, Luke Houghton, Ahmad Ali Alzubi, Alaa Abuqabbeh
All Works
Radio frequency identification (RFID), also known as electronic label technology, is a non-contact automated identification technology that recognizes the target object and extracts relevant data and critical characteristics using radio frequency signals. Medical equipment information management is an important part of the construction of a modern hospital, as it is linked to the degree of diagnosis and care, as well as the hospital's benefits and growth. The aim of this study is to create an integrated view of a theoretical framework to identify factors that influence RFID adoption in healthcare, as well as to conduct an empirical review of the …
The Accumulation Of It Capability And Its Long-Term Effect On Financial Performance, Jin Ho Kim
The Accumulation Of It Capability And Its Long-Term Effect On Financial Performance, Jin Ho Kim
Theses and Dissertations in Business Administration
Many scholars have been studying information technology (IT) capability and its impact on business performance. However, it has been debated whether the IT capability influences firm performance because prior literature shows mixed results. To understand this phenomenon, I performed two studies in this research, placed in two parts. First, by deploying the new concept of accumulation of IT capability, I attempted to reinvestigate the relationship between IT capability and business performance. Next, I examined what factors influence the accumulation of IT capability. In the first part, I suggested two novel constructs that measure the extent of the accumulation of IT …
Experiential Learning In The Technology Disciplines February 2020, Patricia Sendall, Christopher S. Stuetzle, Zachary A. Kissel, Tahir Hameed
Experiential Learning In The Technology Disciplines February 2020, Patricia Sendall, Christopher S. Stuetzle, Zachary A. Kissel, Tahir Hameed
Computer Science Faculty Publications
Learning-by-doing has long been a tradition in the technology disciplines. It is the "hands-on" work, combined with student reflection, feedback and assessment, that reinforces theory into practice. Over the past 40 years, experiential learning (EL) in higher education has grown beyond in-class assignments to include internships, cooperative education, team-based learning, project-based learning, community engagement, service learning, international and study-away experiences, capstone projects and research opportunities. This paper provides an overview of experiential education theory and practice in the undergraduate technology disciplines, and presents examples of how experiential learning practices have evolved over time at a medium-sized institution in the Northeast …
Factors That Influence The Perception Of Higher Education Leaders In The Adoption Process Of Instructional Technology And Distance Education, Diego Tibaquirá
Factors That Influence The Perception Of Higher Education Leaders In The Adoption Process Of Instructional Technology And Distance Education, Diego Tibaquirá
Theses and Dissertations
The problem addressed by this study was that many administrators at institutions of higher learning are faced with the task of finding ways to provide the latest technologies while being extremely constricted by budgets and the rising cost of education. The purpose of this study was to determine the factors that influence the perceptions of higher education leaders in the adoption process of Instructional Technology and Distance Education. This included an examination of the decision-making process and what determined if Instructional Technology and Distance Education were either implemented or upgraded at various higher learning institutions.
The researcher implemented a mixed-methods …
Smart Privacy For Iot: Privacy Embedded Design For Home Automation Systems, Love James
Smart Privacy For Iot: Privacy Embedded Design For Home Automation Systems, Love James
CCE Theses and Dissertations
The emerging paradigm shift in technology to make everyday devices more intelligent than previously considered also known as internet of things (IoT) has further elevated the importance of privacy not only in theory but also in practice. The intrusive nature of these devices and in particular, the home automation system is also beginning to raise privacy concerns which might impact their usage either by deterring potential users from adopting the technology or discouraging existing users from the continued use of these home automation systems.
This study was an empirical and quantitative study that evaluates the impact of users’ behavior when …
Examining The Creation Of Information Privacy Culture In Healthcare Organizations To Achieve Collective Hipaa Compliance Practice, Osborne Obeng
Examining The Creation Of Information Privacy Culture In Healthcare Organizations To Achieve Collective Hipaa Compliance Practice, Osborne Obeng
CCE Theses and Dissertations
The digitization and transfer of patient records has increased the risk of patient data being improperly handled by healthcare organizations. In light of this growing concern, the United States government and state authorities have implemented various regulations to mitigate the privacy concerns. Beside privacy regulations, healthcare organizations have been forced by other pressures such as organization’s competitive pressures, resources, ethical responsibilities, and legitimacy to implement privacy safeguards. However, surveys show that healthcare organizations fail to achieve information privacy compliance. This study examined the creation of information privacy culture from the different occupational communities in healthcare organizations to help achieve information …
The Impact Of Technological Advances On Older Workers, Toni Mcintosh
The Impact Of Technological Advances On Older Workers, Toni Mcintosh
Walden Dissertations and Doctoral Studies
The general problem addressed in this study was the treatment of older workers in the information technology industry that contributes to age discrimination in the workplace. Age discrimination is against the law irrespective of whether it is aimed at older workers in the workforce or becoming job candidates at an advanced age. Although previous research has shown that age discrimination is prevalent in work environments, little has been suggested to eradicate the issue in the workplace. The purpose of this qualitative case study was to investigate the issue of age discrimination as it relates to workers over the age of …
The Perceptions And Lived Experiences Of Female Students In A Computer Science Program At A Community College, Terry Voldase
The Perceptions And Lived Experiences Of Female Students In A Computer Science Program At A Community College, Terry Voldase
Walden Dissertations and Doctoral Studies
America's higher education institutions have aligned computer science curricula with today's modern technology. Despite these efforts, data have shown that there is slow growth among young women majoring in computer science and even slower growth in this area at community colleges. Higher education institutions have also acknowledged a gap between men and women entering the computer science field and a need to explore options for computer science programs to engage women in the industry. The purpose of this phenomenological study was to gain an understanding of the perceptions and lived experiences of female students enrolled in computer classes at New …
A University-Based Forensics Training Center As A Regional Outreach, Education, And Research Activity, Rayford B. Vaughn, David A. Dampier
A University-Based Forensics Training Center As A Regional Outreach, Education, And Research Activity, Rayford B. Vaughn, David A. Dampier
David Dampier
This paper describes a university-based Forensics Training Center (FTC) established by a Department of Justice grant for the purpose of improving the ability of state and local law enforcement in the Southeastern part of the United States to address the rising incidence of computer based crime. The FTC effort is described along with supporting evidence of its need. The program is not only a service activity, but also contributes to the Mississippi State University (MSU) security program pedagogy, and research effort.
Data Visualization Assignments For Principles Of Information Technology Management (Csu), Jennifer Pitts
Data Visualization Assignments For Principles Of Information Technology Management (Csu), Jennifer Pitts
Computer Science and Information Technology Ancillary Materials
This set of ancillary materials for Principles of Information Technology Management was created under a Round Eleven Mini-Grant for Ancillary Materials Creation and Revision. The skills covered in these lessons, using the Tableau data visualization and analysis tool, include:
- Instructor information for installing Tableau
- Dashboard creation
- Worksheet creation
- Data segmentation and analysis
- Geographic data visualization
Software Acquisition And Project Management (Ksu), Rebecca Rutherfoord, Dawn Tatum, Susan Vandeven, Richard Halstead-Nussloch, James Rutherfoord, Zhigang Li
Software Acquisition And Project Management (Ksu), Rebecca Rutherfoord, Dawn Tatum, Susan Vandeven, Richard Halstead-Nussloch, James Rutherfoord, Zhigang Li
Computer Science and Information Technology Grants Collections
This Grants Collection for Software Acquisition and Project Management was created under a Round Eleven ALG Textbook Transformation Grant.
Affordable Learning Georgia Grants Collections are intended to provide faculty with the frameworks to quickly implement or revise the same materials as a Textbook Transformation Grants team, along with the aims and lessons learned from project teams during the implementation process.
Documents are in .pdf format, with a separate .docx (Word) version available for download. Each collection contains the following materials:
- Linked Syllabus
- Initial Proposal
- Final Report
Examining The Impact Of Learning Management Systems In Computer Programming Courses, Mohammed Naif Alatawi
Examining The Impact Of Learning Management Systems In Computer Programming Courses, Mohammed Naif Alatawi
CCE Theses and Dissertations
The development of software and communication technologies in education has led the majority of universities worldwide to integrate the functions of Learning Management Systems (LMSs) into their learning environments. LMSs offers several features that encourage their use by universities and other educational institutions, such as unlimited access to course content, easy tracking of learners’ progress and performance, and reduced costs in terms of both money and time. Most existing LMS studies have been focused on experienced LMS users who are familiar with its functions, with little consideration given to new users. Furthermore, although previous researchers have identified various means of …