Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Information technology

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 183

Full-Text Articles in Physical Sciences and Mathematics

Link Tank Oct 2023

Link Tank

DePaul Magazine

A new JD certificate program in information technology, cybersecurity and data privacy provides DePaul University students with proficiency in both law and tech.


Assessing The Moderating Effect Of Innovation On The Relationship Between Information Technology And Supply Chain Management: An Empirical Examination, Heba Hatamlah, Mahmoud Allahham, Ibrahim A. Abu-Alsondos, Alaa S. Mushtaha, Ghadeer M. Al-Anati, Mustafa Al-Shaikh Sep 2023

Assessing The Moderating Effect Of Innovation On The Relationship Between Information Technology And Supply Chain Management: An Empirical Examination, Heba Hatamlah, Mahmoud Allahham, Ibrahim A. Abu-Alsondos, Alaa S. Mushtaha, Ghadeer M. Al-Anati, Mustafa Al-Shaikh

Applied Mathematics & Information Sciences

This study examines how innovation (INN) influences the relationship between supply chain management and information technology in Jordan. 211 employees of Jordanian industrial enterprises who work in the Operations Department provided information for the study, which examines this subject. The findings indicate a close connection between information technology and supply chain management. Innovation also dramatically modifies the interaction between supply chain management and information technology. Management help may be the subject of future research.


Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda Jan 2023

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda

Walden Dissertations and Doctoral Studies

All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …


Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda Jan 2023

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda

Walden Dissertations and Doctoral Studies

All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …


Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo Jan 2023

Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo

Walden Dissertations and Doctoral Studies

Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …


The Relationship Between Organizational Knowledge Management Constructs And Organizational Flexibility, Marcus B. Williams Jan 2023

The Relationship Between Organizational Knowledge Management Constructs And Organizational Flexibility, Marcus B. Williams

Walden Dissertations and Doctoral Studies

The role that the information technology (IT) department serves is governed by the corporate culture and how it values the use of knowledge, including IT, to achieve a strategic competitive advantage. The purpose of this quantitative study was to examine the potential relationships between information acquisition, knowledge dissemination, shared interpretation, organizational memory, and organizational flexibility. Two theories served as the theoretical foundation for this study: contingency theory and the resource-based view of the firm. To answer the question of possible correlation between organizational flexibility and components of knowledge management, a randomly selected sample of 193 IT professionals employed at small- …


Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo Jan 2023

Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo

Walden Dissertations and Doctoral Studies

Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …


The Minority In The Minority, Black Women In Computer Science Fields: A Phenomenological Study, Blanche' D. Anderson Nov 2022

The Minority In The Minority, Black Women In Computer Science Fields: A Phenomenological Study, Blanche' D. Anderson

Doctoral Dissertations and Projects

The purpose of this transcendental phenomenological study was to describe the lived experiences of Black women with a bachelor’s, master’s, or doctoral degree in computer science, currently employed in the United States. The theory guiding this study was Krumboltz’s social learning theory of career decision-making, as it provides a foundation for understanding how a combination of factors leads to an individual’s educational and occupational preferences and skills. This qualitative study answered the following central research question: What are the lived experiences of Black women with a bachelor’s, master’s, or doctoral degree in computer science, currently employed in the United States? …


Assessing Automated Administration, Cary Coglianese, Alicia Lai Apr 2022

Assessing Automated Administration, Cary Coglianese, Alicia Lai

All Faculty Scholarship

To fulfill their responsibilities, governments rely on administrators and employees who, simply because they are human, are prone to individual and group decision-making errors. These errors have at times produced both major tragedies and minor inefficiencies. One potential strategy for overcoming cognitive limitations and group fallibilities is to invest in artificial intelligence (AI) tools that allow for the automation of governmental tasks, thereby reducing reliance on human decision-making. Yet as much as AI tools show promise for improving public administration, automation itself can fail or can generate controversy. Public administrators face the question of when exactly they should use automation. …


Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson Jan 2022

Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson

Walden Dissertations and Doctoral Studies

Business and IT leaders in financial services are concerned with the limited benefits they are reaping from information technology outsourcing (ITO) projects, despite continued heavy investments in ITO. Grounded in the transaction cost, agency, and resource-based view theories, the purpose of this quantitative correlational study was to examine the relationship between vendor/client complementarity, vendor technology maturity, vendor financial stability, and ITO success. Participants were 65 business and IT leaders in financial institutions engaged in ITO projects. The result of the multiple linear regression was significant, F(3, 61) = 4.845, p = .004, R2 = .192. In the final analysis, vendor/client …


From Negative To Positive Algorithm Rights, Cary Coglianese, Kat Hefter Jan 2022

From Negative To Positive Algorithm Rights, Cary Coglianese, Kat Hefter

All Faculty Scholarship

Artificial intelligence, or “AI,” is raising alarm bells. Advocates and scholars propose policies to constrain or even prohibit certain AI uses by governmental entities. These efforts to establish a negative right to be free from AI stem from an understandable motivation to protect the public from arbitrary, biased, or unjust applications of algorithms. This movement to enshrine protective rights follows a familiar pattern of suspicion that has accompanied the introduction of other technologies into governmental processes. Sometimes this initial suspicion of a new technology later transforms into widespread acceptance and even a demand for its use. In this paper, we …


Exploring Critical Success Factors For Implementing It Modernization Systems In Michigan State Agencies, Luc Armand Kamdem Jan 2022

Exploring Critical Success Factors For Implementing It Modernization Systems In Michigan State Agencies, Luc Armand Kamdem

Walden Dissertations and Doctoral Studies

Since 2001, most government organizations’ IT modernization programs had failed because of ineffective implementation strategies from IT leaders. The research problem was the absence of effective strategies to modernize IT legacy systems. The purpose of this qualitative single case study was to explore effective IT modernization strategies to revolutionize IT legacy systems. The researcher sought to answer how organizations create effective strategies to modernize IT legacy systems. The study used purposeful sampling, including 13 IT leaders, IT technicians, and customers based on their experience in implementing successful IT modernization programs’ strategies. Data were collected using semi-structured interviews and agency documentation. …


Antitrust By Algorithm, Cary Coglianese, Alicia Lai Jan 2022

Antitrust By Algorithm, Cary Coglianese, Alicia Lai

All Faculty Scholarship

Technological innovation is changing private markets around the world. New advances in digital technology have created new opportunities for subtle and evasive forms of anticompetitive behavior by private firms. But some of these same technological advances could also help antitrust regulators improve their performance in detecting and responding to unlawful private conduct. We foresee that the growing digital complexity of the marketplace will necessitate that antitrust authorities increasingly rely on machine-learning algorithms to oversee market behavior. In making this transition, authorities will need to meet several key institutional challenges—building organizational capacity, avoiding legal pitfalls, and establishing public trust—to ensure successful …


Comparison Of The Mental Burden On Nursing Care Providers With And Without Mat-Type Sleep State Sensors At A Nursing Home In Tokyo, Japan: Quasi-Experimental Study, Sakiko Itoh, Hwee-Pink Tan, Kenichi Kudo, Yasuko Ogata Jan 2022

Comparison Of The Mental Burden On Nursing Care Providers With And Without Mat-Type Sleep State Sensors At A Nursing Home In Tokyo, Japan: Quasi-Experimental Study, Sakiko Itoh, Hwee-Pink Tan, Kenichi Kudo, Yasuko Ogata

Research Collection School Of Computing and Information Systems

Background: Increasing need for nursing care has led to the increased burden on formal caregivers, with those in nursing homes having to deal with exhausting labor. Although research activities on the use of internet of things devices to support nursing care for older adults exist, there is limited evidence on the effectiveness of these interventions among formal caregivers in nursing homes. Objective: This study aims to investigate whether mat-type sleep state sensors for supporting nursing care can reduce the mental burden of formal caregivers in a nursing home. Methods: This was a quasi-experimental study at a nursing home in Tokyo, …


Predicting The Outcome Of Nba Games, Matthew Houde Apr 2021

Predicting The Outcome Of Nba Games, Matthew Houde

Honors Projects in Data Science

The aim of the project is to create a machine learning model to predict NBA games. The purpose is to build upon and improve existing models. Research into other predictive sports models and machine learning techniques was conducted to understand what is currently being done to predict NBA games and how effective it is in doing so. After a thorough literary review, the model was created using Python and a variety of machine learning techniques. The dataset used had an array of team statistics for both the home and away team for each corresponding matchup and two supporting features were …


To Thine Own Self Be True? Incentive Problems In Personalized Law, Jordan M. Barry, John William Hatfield, Scott Duke Kominers Feb 2021

To Thine Own Self Be True? Incentive Problems In Personalized Law, Jordan M. Barry, John William Hatfield, Scott Duke Kominers

William & Mary Law Review

Recent years have seen an explosion of scholarship on “personalized law.” Commentators foresee a world in which regulators armed with big data and machine learning techniques determine the optimal legal rule for every regulated party, then instantaneously disseminate their decisions via smartphones and other “smart” devices. They envision a legal utopia in which every fact pattern is assigned society’s preferred legal treatment in real time.

But regulation is a dynamic process; regulated parties react to law. They change their behavior to pursue their preferred outcomes— which often diverge from society’s—and they will continue to do so under personalized law: They …


Information Systems: No Boundaries! A Concise Approach To Understanding Information Systems For All Disciplines, Shane M. Schartz Jan 2021

Information Systems: No Boundaries! A Concise Approach To Understanding Information Systems For All Disciplines, Shane M. Schartz

Open Educational Resources

This book was created to provide a different experience for students beginning their studies in information systems. Instead of being bombarded with information from a business systems perspective, the goal of this book is to provide a baseline of material regarding information systems in all disciplines, not just business systems - hence the name No Boundaries!


Examining The Influence Of Perceived Risk On The Selection Of Internet Access In The U.S. Intelligence Community, Tyler Michael Pieron Jan 2021

Examining The Influence Of Perceived Risk On The Selection Of Internet Access In The U.S. Intelligence Community, Tyler Michael Pieron

CCE Theses and Dissertations

Information technology security policies are designed explicitly to protect IT systems. However, overly restrictive information security policies may be inadvertently creating an unforeseen information risk by encouraging users to bypass protected systems in favor of personal devices, where the potential loss of organizational intellectual property is greater.

Current models regarding the acceptance and use of technology, Technology Acceptance Model Version 3 (TAM3) and the Unified Theory of Acceptance and Use of Technology Version 2 (UTAUT2), address the use of technology in organizations and by consumers, but little research has been done to identify an appropriate model to begin to understand …


Rfid Adaption In Healthcare Organizations: An Integrative Framework, Ahed Abugabah, Louis Sanzogni, Luke Houghton, Ahmad Ali Alzubi, Alaa Abuqabbeh Jan 2021

Rfid Adaption In Healthcare Organizations: An Integrative Framework, Ahed Abugabah, Louis Sanzogni, Luke Houghton, Ahmad Ali Alzubi, Alaa Abuqabbeh

All Works

Radio frequency identification (RFID), also known as electronic label technology, is a non-contact automated identification technology that recognizes the target object and extracts relevant data and critical characteristics using radio frequency signals. Medical equipment information management is an important part of the construction of a modern hospital, as it is linked to the degree of diagnosis and care, as well as the hospital's benefits and growth. The aim of this study is to create an integrated view of a theoretical framework to identify factors that influence RFID adoption in healthcare, as well as to conduct an empirical review of the …


The Accumulation Of It Capability And Its Long-Term Effect On Financial Performance, Jin Ho Kim Jun 2020

The Accumulation Of It Capability And Its Long-Term Effect On Financial Performance, Jin Ho Kim

Theses and Dissertations in Business Administration

Many scholars have been studying information technology (IT) capability and its impact on business performance. However, it has been debated whether the IT capability influences firm performance because prior literature shows mixed results. To understand this phenomenon, I performed two studies in this research, placed in two parts. First, by deploying the new concept of accumulation of IT capability, I attempted to reinvestigate the relationship between IT capability and business performance. Next, I examined what factors influence the accumulation of IT capability. In the first part, I suggested two novel constructs that measure the extent of the accumulation of IT …


Experiential Learning In The Technology Disciplines February 2020, Patricia Sendall, Christopher S. Stuetzle, Zachary A. Kissel, Tahir Hameed Feb 2020

Experiential Learning In The Technology Disciplines February 2020, Patricia Sendall, Christopher S. Stuetzle, Zachary A. Kissel, Tahir Hameed

Computer Science Faculty Publications

Learning-by-doing has long been a tradition in the technology disciplines. It is the "hands-on" work, combined with student reflection, feedback and assessment, that reinforces theory into practice. Over the past 40 years, experiential learning (EL) in higher education has grown beyond in-class assignments to include internships, cooperative education, team-based learning, project-based learning, community engagement, service learning, international and study-away experiences, capstone projects and research opportunities. This paper provides an overview of experiential education theory and practice in the undergraduate technology disciplines, and presents examples of how experiential learning practices have evolved over time at a medium-sized institution in the Northeast …


Factors That Influence The Perception Of Higher Education Leaders In The Adoption Process Of Instructional Technology And Distance Education, Diego Tibaquirá Jan 2020

Factors That Influence The Perception Of Higher Education Leaders In The Adoption Process Of Instructional Technology And Distance Education, Diego Tibaquirá

Theses and Dissertations

The problem addressed by this study was that many administrators at institutions of higher learning are faced with the task of finding ways to provide the latest technologies while being extremely constricted by budgets and the rising cost of education. The purpose of this study was to determine the factors that influence the perceptions of higher education leaders in the adoption process of Instructional Technology and Distance Education. This included an examination of the decision-making process and what determined if Instructional Technology and Distance Education were either implemented or upgraded at various higher learning institutions.

The researcher implemented a mixed-methods …


Smart Privacy For Iot: Privacy Embedded Design For Home Automation Systems, Love James Jan 2020

Smart Privacy For Iot: Privacy Embedded Design For Home Automation Systems, Love James

CCE Theses and Dissertations

The emerging paradigm shift in technology to make everyday devices more intelligent than previously considered also known as internet of things (IoT) has further elevated the importance of privacy not only in theory but also in practice. The intrusive nature of these devices and in particular, the home automation system is also beginning to raise privacy concerns which might impact their usage either by deterring potential users from adopting the technology or discouraging existing users from the continued use of these home automation systems.

This study was an empirical and quantitative study that evaluates the impact of users’ behavior when …


Examining The Creation Of Information Privacy Culture In Healthcare Organizations To Achieve Collective Hipaa Compliance Practice, Osborne Obeng Jan 2020

Examining The Creation Of Information Privacy Culture In Healthcare Organizations To Achieve Collective Hipaa Compliance Practice, Osborne Obeng

CCE Theses and Dissertations

The digitization and transfer of patient records has increased the risk of patient data being improperly handled by healthcare organizations. In light of this growing concern, the United States government and state authorities have implemented various regulations to mitigate the privacy concerns. Beside privacy regulations, healthcare organizations have been forced by other pressures such as organization’s competitive pressures, resources, ethical responsibilities, and legitimacy to implement privacy safeguards. However, surveys show that healthcare organizations fail to achieve information privacy compliance. This study examined the creation of information privacy culture from the different occupational communities in healthcare organizations to help achieve information …


The Impact Of Technological Advances On Older Workers, Toni Mcintosh Jan 2020

The Impact Of Technological Advances On Older Workers, Toni Mcintosh

Walden Dissertations and Doctoral Studies

The general problem addressed in this study was the treatment of older workers in the information technology industry that contributes to age discrimination in the workplace. Age discrimination is against the law irrespective of whether it is aimed at older workers in the workforce or becoming job candidates at an advanced age. Although previous research has shown that age discrimination is prevalent in work environments, little has been suggested to eradicate the issue in the workplace. The purpose of this qualitative case study was to investigate the issue of age discrimination as it relates to workers over the age of …


The Perceptions And Lived Experiences Of Female Students In A Computer Science Program At A Community College, Terry Voldase Jan 2020

The Perceptions And Lived Experiences Of Female Students In A Computer Science Program At A Community College, Terry Voldase

Walden Dissertations and Doctoral Studies

America's higher education institutions have aligned computer science curricula with today's modern technology. Despite these efforts, data have shown that there is slow growth among young women majoring in computer science and even slower growth in this area at community colleges. Higher education institutions have also acknowledged a gap between men and women entering the computer science field and a need to explore options for computer science programs to engage women in the industry. The purpose of this phenomenological study was to gain an understanding of the perceptions and lived experiences of female students enrolled in computer classes at New …


A University-Based Forensics Training Center As A Regional Outreach, Education, And Research Activity, Rayford B. Vaughn, David A. Dampier Oct 2019

A University-Based Forensics Training Center As A Regional Outreach, Education, And Research Activity, Rayford B. Vaughn, David A. Dampier

David Dampier

This paper describes a university-based Forensics Training Center (FTC) established by a Department of Justice grant for the purpose of improving the ability of state and local law enforcement in the Southeastern part of the United States to address the rising incidence of computer based crime. The FTC effort is described along with supporting evidence of its need. The program is not only a service activity, but also contributes to the Mississippi State University (MSU) security program pedagogy, and research effort.


Data Visualization Assignments For Principles Of Information Technology Management (Csu), Jennifer Pitts Apr 2019

Data Visualization Assignments For Principles Of Information Technology Management (Csu), Jennifer Pitts

Computer Science and Information Technology Ancillary Materials

This set of ancillary materials for Principles of Information Technology Management was created under a Round Eleven Mini-Grant for Ancillary Materials Creation and Revision. The skills covered in these lessons, using the Tableau data visualization and analysis tool, include:

  • Instructor information for installing Tableau
  • Dashboard creation
  • Worksheet creation
  • Data segmentation and analysis
  • Geographic data visualization


Software Acquisition And Project Management (Ksu), Rebecca Rutherfoord, Dawn Tatum, Susan Vandeven, Richard Halstead-Nussloch, James Rutherfoord, Zhigang Li Apr 2019

Software Acquisition And Project Management (Ksu), Rebecca Rutherfoord, Dawn Tatum, Susan Vandeven, Richard Halstead-Nussloch, James Rutherfoord, Zhigang Li

Computer Science and Information Technology Grants Collections

This Grants Collection for Software Acquisition and Project Management was created under a Round Eleven ALG Textbook Transformation Grant.

Affordable Learning Georgia Grants Collections are intended to provide faculty with the frameworks to quickly implement or revise the same materials as a Textbook Transformation Grants team, along with the aims and lessons learned from project teams during the implementation process.

Documents are in .pdf format, with a separate .docx (Word) version available for download. Each collection contains the following materials:

  • Linked Syllabus
  • Initial Proposal
  • Final Report


Examining The Impact Of Learning Management Systems In Computer Programming Courses, Mohammed Naif Alatawi Jan 2019

Examining The Impact Of Learning Management Systems In Computer Programming Courses, Mohammed Naif Alatawi

CCE Theses and Dissertations

The development of software and communication technologies in education has led the majority of universities worldwide to integrate the functions of Learning Management Systems (LMSs) into their learning environments. LMSs offers several features that encourage their use by universities and other educational institutions, such as unlimited access to course content, easy tracking of learners’ progress and performance, and reduced costs in terms of both money and time. Most existing LMS studies have been focused on experienced LMS users who are familiar with its functions, with little consideration given to new users. Furthermore, although previous researchers have identified various means of …