Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Regis University MSCIT thesis

Articles 1 - 30 of 108

Full-Text Articles in Physical Sciences and Mathematics

Gender Equality With Agile In Software Engineering, Deborah P. Martin Apr 2011

Gender Equality With Agile In Software Engineering, Deborah P. Martin

Regis University Student Publications (comprehensive collection)

Women are under-represented in information technology careers in general and in the profession of software development in particular and their numbers are declining. Previous studies on this topic have investigated whether the reason for this is due to a difference in capability arising out of their gender, or whether the reason arises from social factors. A software development methodology called “Agile†has arisen in recent years which focus on collaboration, working software, and a sustainable workweek. Studies have shown that adopting Agile techniques in the classroom helps to retain women in computer information academic curricula and that adopting them in …


Risk Considerations When Determining Network In Infrastructure Upgrade Methodology, Gene Brandt Jan 2011

Risk Considerations When Determining Network In Infrastructure Upgrade Methodology, Gene Brandt

Regis University Student Publications (comprehensive collection)

Risk considerations when determining network infrastructure upgrade methodology have been interesting in areas of cost, time, and path. This paper evolved from a concrete look at upgrading a specific network to a more abstract investigation of the dangers inherent to upgrading large scale networks based on the form the upgrade took. Personal experience had suggested a remove and replace strategy might be most cost effective but planning, scope creep and other factors combined to show risk mitigation is best practiced on a small scale implementation when possible to reduce the consequences of even partial failure. A study of the cost …


Effecting Data Quality Through Data Governance: A Case Study In The Financial Services Industry, Patrick Egan Jan 2011

Effecting Data Quality Through Data Governance: A Case Study In The Financial Services Industry, Patrick Egan

Regis University Student Publications (comprehensive collection)

One of the most significant challenges faced by senior management today is implementing a data governance program to ensure that data is an asset to an organization's mission. New legislation aligned with continual regulatory oversight, increasing data volume growth, and the desire to improve data quality for decision making are driving forces behind data governance initiatives. Data governance involves reshaping existing processes and the way people view data along with the information technology required to create a consistent, secure and defined processes for handling the quality of an organization's data. In examining attempts to move towards making data an asset …


Leveraging Information Technology Within A Roman Catholic Diocese, Sidney K. Rodriguez Oct 2010

Leveraging Information Technology Within A Roman Catholic Diocese, Sidney K. Rodriguez

Regis University Student Publications (comprehensive collection)

Parishes within the Roman Catholic Church face many of the same concerns as any other non-profit organization. Dependencies on donations and volunteer help restrict the parish to leverage technology to gain efficiencies. Parishes have an additional concern. Although grouped under a Diocese, this hierarchical structure is not a standard, top-down directive organization. A Roman Catholic Diocese is a "subsidiarity". Decisions are made at the lowest level, specifically; decisions on how to operate and administer the parish are given to the pastor or parish director of that parish. Acknowledging that leveraging technology is a way to gain efficiencies, the ability to …


A Data Warehouse Solution Emphasizing The Use In Geographic Information Systems, Catherine Carpenter Oct 2010

A Data Warehouse Solution Emphasizing The Use In Geographic Information Systems, Catherine Carpenter

Regis University Student Publications (comprehensive collection)

This paper will explore use of a data warehouse solution for an electric utility that generates and transmits power across four US states. The pseudonym "Utility" will be used to represent the electric utility for security reasons. At Utility "X" several systems store information that is managed in silos that, in some cases, operate on proprietary database formats. This type of usage is identified as a barrier in the development of an enterprise-wide data source. A data warehouse can ultimately help to bridge the Utility "X" information gap, and provide added accessibility for the company to further develop technology, such …


A Comparative Analysis Of Auditing Within The Healthcare Database, Richard E. Butler Sep 2010

A Comparative Analysis Of Auditing Within The Healthcare Database, Richard E. Butler

Regis University Student Publications (comprehensive collection)

Healthcare database system utilization and processing demands are projected to increase significantly within the next decade due to governmental incentives, regulatory requirements, economic motivators and industry regulations. To that end, system engineers, architects, developers and solution providers will be pressured to meet these varied challenges while achieving or improving current system performance benchmarks. Healthcare database performance related to auditing has received little scholarly attention to date. A comparative analysis of two database auditing architectures is studied to identify efficiencies in auditing architectures within the healthcare domain. This study will explore and analyze native auditing supported by Microsoft's SQL Server 2008 …


Layered Security Solutions Over Dependency Within Any Layer, Olga H. Brandt Aug 2010

Layered Security Solutions Over Dependency Within Any Layer, Olga H. Brandt

Regis University Student Publications (comprehensive collection)

Considering the advancement of computer systems and security solutions available in today's constantly changing world, there are various philosophies as to what is required (or adequate) in order to protect a system. This investigative study proposed to explore a possible problem with employing a layered security solution\ over dependence or reliance on any layer. A risk analysis was performed to determine where over dependence or reliance could happen and what could be done to prevent this. Various reviews and other findings online were researched and the data compiled using a qualitative methodology. Lastly, a recommendation is made on what is …


Driving Retail Sales Through Effective Supply Chain Management Technology, James Haws Jul 2010

Driving Retail Sales Through Effective Supply Chain Management Technology, James Haws

Regis University Student Publications (comprehensive collection)

Supply chain management coordinates the production and distribution of a product with the goal of increasing profitability and productivity. Advancements in technology and workflows in recent years have enabled distributors, suppliers, and retailers to operate more efficiently and effectively. Although significant technological advancements have been made in supply chain management, inventory management still causes a number of problems for retailers. The average out-of -stock rate nationally is approximately at an 8% level (Corsten & Gruen, 2003). Inadequate inventory management can reduce retail sales, drive up costs associated with transportation and storage, decrease customer loyalty, and ultimately lead to a significant …


Social Networking Privacy: A Qualitative Study Of The Risks And Effects Of Sharing Data To A Global Environment Via Facebook, Bryan L. Mack Jul 2010

Social Networking Privacy: A Qualitative Study Of The Risks And Effects Of Sharing Data To A Global Environment Via Facebook, Bryan L. Mack

Regis University Student Publications (comprehensive collection)

Young women have placed themselves at risk by disclosing private and sensitive data on their Facebook accounts. Privacy settings which can help prevent unauthorized access of this data exist, but some women choose to ignore them. This study is an attempt to gain an understanding of this phenomenon and answer the question of why young women choose to share personal information. Qualitative interviews of college students were conducted and the results interpreted in this paper. The results of this interview are intended to supply research for future studies which aim to minimize problems caused to individuals who choose to share …


A Security Assessment Of Mobikey For Remote Access, Joseph Brooks Jun 2010

A Security Assessment Of Mobikey For Remote Access, Joseph Brooks

Regis University Student Publications (comprehensive collection)

Today, it is very common for employees to need to work when outside of the office. For various reasons, it's important that they be able to work anytime and anywhere. However, this raises security concerns about how this is accomplished. There are many options, such as virtual private networks (VPNs) and remote desktop solutions, but each comes with its own risks. A newer option is the MobiKEY from Route1, which allows users to connect to their work resources from anywhere. Route1 touts the MobiKEY, powered by MobiNET, as a much more secure method of remote access. How does it stack …


Evaluation Of Dnssec In Microsoft Windows And Microsoft Windows Server 2008 R2, Christopher Hair Jun 2010

Evaluation Of Dnssec In Microsoft Windows And Microsoft Windows Server 2008 R2, Christopher Hair

Regis University Student Publications (comprehensive collection)

The Domain Name System (DNS) provides important name resolution services on the Internet. The DNS has been found to have security flaws which have the potential to undermine the reliability of many Internet-based systems. DNS Security Extensions (DNSSEC) offers a long-term solution these DNS security flaws. However, DNSSEC adoption has been slow because it is challenging to deploy and administer. DNSSEC has also been criticized for not being an "end-toend" solution. Microsoft included support for DNSSEC in its latest operating systems, Windows Server 2008 R2 and Windows 7. This thesis concluded that DNSSEC features in Windows Server 2008 R2 and …


Inquiry In Support Of The Knowledge Sharing Life Cycle Within A Higher Education Database Practicum: A Case Study At Regis University, Martha Jorgensen May 2010

Inquiry In Support Of The Knowledge Sharing Life Cycle Within A Higher Education Database Practicum: A Case Study At Regis University, Martha Jorgensen

Regis University Student Publications (comprehensive collection)

The Regis University database practicum provides an opportunity for students to get hands-on experience with Database Administrator (DBA) tasks as they support the virtual lab environment used by students enrolled in database courses at the university. The student DBA team is new each semester and has a short time to become familiar with the environment they are supporting and the tools they will be using. Inefficient communication and organization delay the resolution of production issues. This study analyzed the current knowledge sharing culture, technologies, and processes of the database practicum. The goal of the study was to determine accessibility of …


Energy Savings Through Multi-Level Security Clients, Keith S. Mcabee May 2010

Energy Savings Through Multi-Level Security Clients, Keith S. Mcabee

Regis University Student Publications (comprehensive collection)

In a multi-desktop environment, where users are required to access separate desktops to use different systems due to security requirements, the redundant desktop computers present a gross inefficiency in relation to power consumption even if each individual system is thoroughly examined and overhauled for energy efficiency. Several organizations require the use of separate networks and computer systems to perform different functions or access different data. The separation of networks is often the consequence of the need for security between the information and data on each individual system. The military is an excellent example of this situation. The need to separate …


A Strategy For Improving Performance On A Sharepoint Social Computing Portal, Matt Adkins May 2010

A Strategy For Improving Performance On A Sharepoint Social Computing Portal, Matt Adkins

Regis University Student Publications (comprehensive collection)

An important usability rule for any web site is the concept of speed. Failing to provide prompt pages and data will result in a negative view of the site and ultimately a lack of usership. In spite of this, many organizations implement web sites without a clear strategy regarding performance. This project explores three database strategies to consider when deploying a Microsoft SharePoint website with a social computing usage style. Although all of the strategies do not provide significant performance gains, the study illuminates several important factors that will increase performance in sites that use other usage styles. To properly …


Information Security Among Small Organizations: A Survey, Jason Carter Apr 2010

Information Security Among Small Organizations: A Survey, Jason Carter

Regis University Student Publications (comprehensive collection)

Small businesses are at extreme risk from network based attacks. A lack of security budget for hardware such as firewalls, intrusion detection systems, proxy servers, and web 2.0 gateway filters, plus a lack of technical expertise in network security, put small businesses at higher risk than larger companies. This paper researches the current state of small business network security and the types of threats they are seeing. It also looks at the factors that determine when and why security is implemented or modified.


Capability Maturity Model Integration (Cmmi) For Small Organizations, Kevin Scott Mar 2010

Capability Maturity Model Integration (Cmmi) For Small Organizations, Kevin Scott

Regis University Student Publications (comprehensive collection)

Software Process Improvement (SPI) is a large area of expertise that deals with software development standard processes and is a progression of proven methods of process improvement from many different methodologies. Personal Software Process (PSP) and Team Software Process (TSP) complement the implementation of Capability Maturity Model Implementation (CMMI) and can be applied gradually from the individual, to the team, and then to the organization. These solutions from Carnegie Melon's Software Engineering Institute (SEI) are leading edge for the field of process improvement. Solutions like this consume many resources, are very complex, require years to implement, and can be costly. …


Mapping System Management Of Two Erps (Oracle Ebusiness Suit And Peoplesoft), Eric Hernandez Mar 2010

Mapping System Management Of Two Erps (Oracle Ebusiness Suit And Peoplesoft), Eric Hernandez

Regis University Student Publications (comprehensive collection)

Due to the fact that Enterprise Resource Planning (ERP) vendors provide business solutions to address similar business challenges, most ERP products have a lot of similar components and functionalities. Using these similar components and functionalities, ERP system management of one ERP product can be mapped to a different ERP product. In this particular case, E-Business Suite's (EBS) system management is mapped against PeopleSoft (PS). By having an EBS Administrator indirectly collaborate with a PS administrator, a system management mapping table linking the two ERP systems was established. By allowing an EBS Administrator handle PS systems using the mapping solution, the …


The Use Of Olap Reporting Technology To Improve Patient Care Services Decision Making Within The University Health Center, Carlos M. Gonzalez Mar 2010

The Use Of Olap Reporting Technology To Improve Patient Care Services Decision Making Within The University Health Center, Carlos M. Gonzalez

Regis University Student Publications (comprehensive collection)

The purpose of this paper is to demonstrate that it is feasible for the student health center to leverage existing clinical data in a data warehouse by using OLAP reporting in order to improve patient care and health care services decision making. Historically, University health care centers have relied mainly on operational data sources for critical health care decision making. These sources of data do not contain enough information to allow health officials to recognize trends or predict how future changes in health care services might vastly improve overall heath care. Four proof of concept artifacts are constructed through design …


Design And Implementation Of A Podcast Recording Studio For Business Communications, Timothy W. Mclaughlin Feb 2010

Design And Implementation Of A Podcast Recording Studio For Business Communications, Timothy W. Mclaughlin

Regis University Student Publications (comprehensive collection)

Podcasting is the creation of recorded information and its delivery over the Internet, using web syndication technology. Businesses around the world are increasing their use of podcasts as a means for delivering information to their customers and employees. The purpose of this project paper is to examine the business need for podcasting, and to demonstrate that businesses can assemble an inexpensive recording studio to create podcasts. The review of previous literature included an examination of why podcasting has become important to business communications; how some businesses are currently using podcasting as a communications tool; the technology involved in podcasting; and …


Evaluation And Development Of Selection Criteria To Guide Organizational Selection Of A Project Management Maturity Model, Diane Zandin Feb 2010

Evaluation And Development Of Selection Criteria To Guide Organizational Selection Of A Project Management Maturity Model, Diane Zandin

Regis University Student Publications (comprehensive collection)

Organizations wishing to measurably and continuously improve processes often look towards maturity models, such as OPM3 and CMMI, as their panacea. However, selecting the wrong model for the organizations goals and resources can result in project failure. This study, focusing on OPM3 and CMMI, proposes a guidance tool that can help organizations select the right maturity model. The study is framed in the state government context due to the complexity and relative insularity of that environment. In addition to being a limited based, state governments have several limiters that factor into project selection, namely budget and taxpayer transparency. Using several …


An Agile Ba: A Case Study Of The Business Analyst In Agile, Nathan Wagner Jan 2010

An Agile Ba: A Case Study Of The Business Analyst In Agile, Nathan Wagner

Regis University Student Publications (comprehensive collection)

Companies adopting Agile software development methodologies are becoming a growing trend. The roles responsible for managing and participating in these types of projects must make a significant shift in focus when moving from the waterfall development process to a more adaptive way of working. Even with the growing adoption and increasing amount of study around Agile, the literature and texts prescribing the various Agile methodologies do not address the specific role of the Business Analayst. In this paper, the role of the Business Analyst in Agile is explored through a qualitative study within a large software development organization utilizing Agile …


Realizing The Technical Advantages Of Star Transformation, Karen L. Darling Dec 2009

Realizing The Technical Advantages Of Star Transformation, Karen L. Darling

Regis University Student Publications (comprehensive collection)

Data warehousing and business intelligence go hand in hand, each gives the other purpose for development, maintenance and improvement. Both have evolved over a few decades and build upon initial development. Management initiatives further drive the need and complexity of business intelligence, while in turn expanding the end user community so that business change, results and strategy are affected at the business unit level. The literature, including a recent business intelligence user survey, demonstrates that query performance is the most significant issue encountered. Oracle's data warehouse 10g.2 is examined with improvements to query optimization via "best practice" through Star Transformation. …


Computer Crime And Identity Theft, Harry A. Hunter Nov 2009

Computer Crime And Identity Theft, Harry A. Hunter

Regis University Student Publications (comprehensive collection)

The problem at hand is the increased amount of vulnerabilities and security hazards for individuals engaging in e-commerce, business transactions over the World Wide Web. Since the majority of people aren't paying their bills by mailing in their payment to the vendor, they pay for the items they purchase online, which makes them open to hackers and social engineering attacks. They place their credit card/debit card numbers, their phone number and home address, and even their birth date information on company websites. All these security vulnerabilities make the risk of identity theft increasingly high. Identity theft is when an individual's …


A Cisco-Based Proposal For Arne Core Routing Infrastructure, Ingrimar James Oct 2009

A Cisco-Based Proposal For Arne Core Routing Infrastructure, Ingrimar James

Regis University Student Publications (comprehensive collection)

Systems Engineering and Application Development (SEAD) Practicum provides opportunities for students to engage in proposing, designing, building and testing various projects related to information technology. There are several ongoing projects designed to upgrade, improve or revamp some aspect of the Academic Research Network, generally referred to as ARNe, and services or applications that are a part of its architecture. Regis University is in the process of replacing their current architecture and equipment that forms the core of ARNe in order to facilitate further upgrades and new projects within various aspects of ARNe. This paper examines and proposes a Cisco-based routing …


Integration And Deployment Techniques In Combination With Development Methodologies, Brian E. Nesbitt Oct 2009

Integration And Deployment Techniques In Combination With Development Methodologies, Brian E. Nesbitt

Regis University Student Publications (comprehensive collection)

Efficient and inefficient pairings of software development methodologies and software integration and deployment techniques exist. Often times the automation of code integration and deployment is chosen but the full benefit of these technologies are throttled by the incorporation of a development methodology. It can be hypothesized that the evolution of software development created this situation along with the latency of implementing development methodologies. This work examines four scenarios comprised of traditional and conventional development methodologies with manual and automated software integration and deployment techniques. Similar web-based software applications were selected from waterfall (traditional) and agile (conventional) run project development teams. …


Pmo Lite For Colorado Housing And Finance Authority, Sheri Lowrance Aug 2009

Pmo Lite For Colorado Housing And Finance Authority, Sheri Lowrance

Regis University Student Publications (comprehensive collection)

The focus of this professional project was to identify the appropriate services for a lightweight project management office (PMO) to implement at a company referred to with the alias Not-For-Profit Organization (NFPO), and then to complete the first phase of this implementation. NFPO had lower project success rates than desired. They wanted to integrate project management practices into their organization in order to be more effective in meeting their mission. In order to determine the best approach to do this, lightweight and heavyweight project management methodologies and PMOs were examined. Based on NFPO's smaller staff size, their culture, managements' desire …


A Pragmatic Evaluation Of An Academic Practicum's Knowledge Transfer Process, Luis F. Pacheco Aug 2009

A Pragmatic Evaluation Of An Academic Practicum's Knowledge Transfer Process, Luis F. Pacheco

Regis University Student Publications (comprehensive collection)

Practicums are designed to provide on-the-job learning experience for the students in their chosen occupational field. But do students actually benefit from practicums? This manuscript investigates linkages between knowledge repository systems and knowledge transfer in database technology practicums. It examines the literature on knowledge transfer, develops an Action Research methodology, and presents results of a new study in database academic practicums. The study focuses on a graduate school database technology practicum at Denver-based Regis University. As a member of an academic practicum team with responsibilities involving database administrative support to a group of students and faculty, the researcher seeks to …


An Investigation Into The Development Of A Practical Gis Mapping Tool Supporting Emissions Inventory Information, Elizabeth J. Davis-Noland Jul 2009

An Investigation Into The Development Of A Practical Gis Mapping Tool Supporting Emissions Inventory Information, Elizabeth J. Davis-Noland

Regis University Student Publications (comprehensive collection)

Environmental Protection Agency (EPA) regulations call for States to submit for EPA review and approval State Implementation Plans (SIPs) which establish goals and emission reduction strategies for improving air quality in national parks and wilderness areas. State and tribe air quality analysts therefore need the ability to display and analyze emissions inventory data in relation to geographic locations. However, due to budget and other constraints, traditional Graphical Information Systems (GIS) tools are often not available. Today, traditional GIS are being challenged in various domains by a variety of free or low-cost internet accessible services. Leveraging the availability of the Google …


Software Simulation And Emergency Response Training: A Case Study, Heather Burke Apr 2009

Software Simulation And Emergency Response Training: A Case Study, Heather Burke

Regis University Student Publications (comprehensive collection)

Emergency response training has several shortcomings that affect its effectiveness. Full-scale exercises are effective, but expensive, cumbersome and time consuming to plan and conduct. Discussion based trainings are much more cost effective and easy to plan, but the retention rate is lower on covered material. It is important to get the most out of limited training budgets by finding a way to be both efficient and effective with time and money. In this case study, the problems of the 2002 New Mexico Public Health ICS training are analyzed. This training provides good examples of how traditional training tools, style and …


Development Of A Data Acquisition System For An Ecommerce Website, Paul Hughes Feb 2009

Development Of A Data Acquisition System For An Ecommerce Website, Paul Hughes

Regis University Student Publications (comprehensive collection)

First Stop Sports (http://www.firststopsports.com) is a small sports collectibles and memorabilia eCommerce company, specializing in NFL and NCAA collectible football helmets and other sports memorabilia. First Stop Sports current web site has shown some inadequacies and limited capabilities with historical customer ordering information capture. "They are struggling to advance business development and increase revenue.? It is the scope of this project to investigate, design, and develop a prototype data acquisition system for First Stop Sports. This prototype would only focus on one specific product line, but it would need to have the same look, feel and functionality as the existing …