Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Computer science (13)
- Information security (13)
- Computers (11)
- Data security (11)
- Books (10)
-
- Computer security (10)
- Continuous Query Monitoring (10)
- Northern Ohio Data and Information Service (NODIS) (9)
- Spatial Optimization (8)
- Big Data (7)
- Spatial databases (7)
- Austerity (6)
- Cyber Operations (6)
- Opinion Mining and Sentiment Analysis (6)
- Road Network Databases (6)
- Usability (6)
- Articles (5)
- Cloud computing (5)
- Cyber (5)
- Cyber operations (5)
- Data management (5)
- Expert Systems (5)
- Libraries (5)
- NoSQL (5)
- Nukes (5)
- Others (5)
- Sequestration (5)
- Algorithms (4)
- Artificial Intelligence (4)
- Cyber defense (4)
- Publication Year
- Publication
-
- Kyriakos MOURATIDIS (40)
- David LO (28)
- Saverio Perugini (25)
- Jan Kallberg (14)
- Ryan Schuetzler (12)
-
- Dr. Muhammad Zubair Asghar (11)
- Zhongmei Yao (11)
- Herbert J. Mattord (10)
- Ellen Cyran (9)
- Katarina Grolinger (5)
- Lance (Lijian) Chen (5)
- Donald Wynn (4)
- Edward Aractingi (4)
- Lorrie F Cranor (4)
- Michael F. Gorman (4)
- Harvey Enns (3)
- John Christian Smith (3)
- Thomas Ferratt (3)
- Vijayan K. Asari (3)
- Amy J Connolly (2)
- Arcot Desai NARASIMHALU (2)
- George J. Pappas (2)
- John J. Kanet (2)
- Johnny Wong (2)
- Luiz Fernando Capretz (2)
- Maizatul Akmar Ismail (2)
- Mark A. Jacobs (2)
- Michael P. Johnson (2)
- Ming Gao (2)
- Minghui QIU (2)
- File Type
Articles 1 - 30 of 287
Full-Text Articles in Physical Sciences and Mathematics
Healthcare It In Skilled Nursing And Post-Acute Care Facilities: Reducing Hospital Admissions And Re-Admissions, Improving Reimbursement And Improving Clinical Operations, Scott L. Hopes
Scott Hopes
Health information technology (HIT), which includes electronic health record (EHR) systems and clinical data analytics, has become a major component of all health care delivery and care management. The adoption of HIT by physicians, hospitals, post-acute care organizations, pharmacies and other health care providers has been accepted as a necessary (and recently, a government required) step toward improved quality, care coordination and reduced costs: “Better coordination of care provides a path to improving communication, improving quality of care, and reducing unnecessary emergency room use and hospital readmissions. LTPAC providers play a critical role in achieving these goals” (HealthIT.gov, 2013).
Though …
Trends In Phishing Attacks: Suggestions For Future Research, Ryan M. Schuetzler
Trends In Phishing Attacks: Suggestions For Future Research, Ryan M. Schuetzler
Ryan Schuetzler
Deception in computer-mediated communication is a widespread phenomenon. Cyber criminals are exploiting technological mediums to communicate with potential targets as these channels reduce both the deception cues and the risk of detection itself. A prevalent deception-based attack in computer-mediated communication is phishing. Prior phishing research has addressed the “bait” and “hook” components of phishing attacks, the human-computer interaction that takes place as users judge the veracity of phishing emails and websites, and the development of technologies that can aid users in identifying and rejecting these attacks. Despite the extant research on this topic, phishing attacks continue to be successful as …
When Disclosure Is Involuntary: Empowering Users With Control To Reduce Concerns, David W. Wilson, Ryan M. Schuetzler, Bradley Dorn, Jeffrey Gainer Proudfoot
When Disclosure Is Involuntary: Empowering Users With Control To Reduce Concerns, David W. Wilson, Ryan M. Schuetzler, Bradley Dorn, Jeffrey Gainer Proudfoot
Ryan Schuetzler
Modern organizations must carefully balance the practice of gathering large amounts of valuable data from individuals with the associated ethical considerations and potential negative public image inherent in breaches of privacy. As it becomes increasingly commonplace for many types of information to be collected without individuals' knowledge or consent, managers and researchers alike can benefit from understanding how individuals react to such involuntary disclosures, and how these reactions can impact evaluations of the data-collecting organizations. This research develops and empirically tests a theoretical model that shows how empowering individuals with a sense of control over their personal information can help …
Real-Time Embodied Agent Adaptation, Ryan M. Schuetzler, David W. Wilson
Real-Time Embodied Agent Adaptation, Ryan M. Schuetzler, David W. Wilson
Ryan Schuetzler
This paper reports on initial investigation of two emerging technologies, FaceFX and Smartbody, capable of creating life-like animations for embodied conversational agents (ECAs) such as the AVATAR agent. Real-time rendering and animation generation technologies can enable rapid adaptation of ECAs to changing circumstances. The benefits of each package are discussed.
The Influence Of Conversational Agent Embodiment And Conversational Relevance On Socially Desirable Responding, Ryan M. Schuetzler, Justin Scott Giboney, G. Mark Grimes, Jay F. Nunamaker Jr.
The Influence Of Conversational Agent Embodiment And Conversational Relevance On Socially Desirable Responding, Ryan M. Schuetzler, Justin Scott Giboney, G. Mark Grimes, Jay F. Nunamaker Jr.
Ryan Schuetzler
Conversational agents (CAs) are becoming an increasingly common component in a wide range of information systems. A great deal of research to date has focused on enhancing traits that make CAs more humanlike. However, few studies have examined the influence such traits have on information disclosure. This research builds on self-disclosure, social desirability, and social presence theories to explain how CA anthropomorphism affects disclosure of personally sensitive information. Taken together, these theories suggest that as CAs become more humanlike, the social desirability of user responses will increase. In this study, we use a laboratory experiment to examine the influence of …
Robustness Of Multiple Indicators In Automated Screening Systems For Deception Detection, Nathan Twyman, Jeffrey Gainer Proudfoot, Ryan M. Schuetzler, Aaron Elkins, Douglas C. Derrick
Robustness Of Multiple Indicators In Automated Screening Systems For Deception Detection, Nathan Twyman, Jeffrey Gainer Proudfoot, Ryan M. Schuetzler, Aaron Elkins, Douglas C. Derrick
Ryan Schuetzler
This study investigates the effectiveness of an automatic system for detection of deception by individuals with the use of multiple indicators of such potential deception. Deception detection research in the information systems discipline has postulated increased accuracy through a new class of screening systems that automatically conduct interviews and track multiple indicators of deception simultaneously. Understanding the robustness of this new class of systems and the limitations of its theoretical improved performance is important for refinement of the conceptual design. The design science proof-of-concept study presented here implemented and evaluated the robustness of these systems for automated screening for deception …
Kinesic Patterning In Deceptive And Truthful Interactions, Judee K. Burgoon, Ryan M. Schuetzler, David W. Wilson
Kinesic Patterning In Deceptive And Truthful Interactions, Judee K. Burgoon, Ryan M. Schuetzler, David W. Wilson
Ryan Schuetzler
A persistent question in the deception literature has been the extent to which nonverbal behaviors can reliably distinguish between truth and deception. It has been argued that deception instigates cognitive load and arousal that are betrayed through visible nonverbal indicators. Yet, empirical evidence has often failed to find statistically significant or strong relationships. Given that interpersonal message production is characterized by a high degree of simultaneous and serial patterning among multiple behaviors, it may be that patterns of behaviors are more diagnostic of veracity. Or it may be that the theorized linkage between internal states of arousal, cognitive taxation, and …
Man Vs. Machine: Investigating The Effects Of Adversarial System Use On End-User Behavior In Automated Deception Detection Interviews, Jeffrey Gainer Proudfoot, Randall Boyle, Ryan M. Schuetzler
Man Vs. Machine: Investigating The Effects Of Adversarial System Use On End-User Behavior In Automated Deception Detection Interviews, Jeffrey Gainer Proudfoot, Randall Boyle, Ryan M. Schuetzler
Ryan Schuetzler
Deception is an inevitable component of human interaction. Researchers and practitioners are developing information systems to aid in the detection of deceptive communication. Information systems are typically adopted by end users to aid in completing a goal or objective (e.g., increasing the efficiency of a business process). However, end-user interactions with deception detection systems (adversarial systems) are unique because the goals of the system and the user are orthogonal. Prior work investigating systems-based deception detection has focused on the identification of reliable deception indicators. This research extends extant work by looking at how users of deception detection systems alter their …
Overview And Guidance On Agile Development In Large Organizations, Jordan B. Barlow, Justin Scott Giboney, Mark Jeffrey Keith, David W. Wilson, Ryan Schuetzler, Paul Benjamin Lowry, Anthony Vance
Overview And Guidance On Agile Development In Large Organizations, Jordan B. Barlow, Justin Scott Giboney, Mark Jeffrey Keith, David W. Wilson, Ryan Schuetzler, Paul Benjamin Lowry, Anthony Vance
Ryan Schuetzler
A continual debate surrounds the effectiveness of agile software development practices. Some organizations adopt agile practices to become more competitive, improve processes, and reduce costs. Other organizations are skeptical about whether agile development is beneficial. Large organizations face an additional challenge in integrating agile practices with existing standards and business processes. To examine the effects of agile development practices in large organizations, we review and integrate scientific literature and theory on agile software development. We further organize our theory and observations into a framework with guidelines for large organizations considering agile methodologies. Based on this framework, we present recommendations that …
Establishing A Foundation For Automated Human Credibility Screening, Jay F. Nunamaker Jr., Judee K. Burgoon, Nathan W. Twyman, Jeffrey Gainer Proudfoot, Ryan M. Schuetzler, Justin Scott Giboney
Establishing A Foundation For Automated Human Credibility Screening, Jay F. Nunamaker Jr., Judee K. Burgoon, Nathan W. Twyman, Jeffrey Gainer Proudfoot, Ryan M. Schuetzler, Justin Scott Giboney
Ryan Schuetzler
Automated human credibility screening is an emerging research area that has potential for high impact in fields as diverse as homeland security and accounting fraud detection. Systems that conduct interviews and make credibility judgments can provide objectivity, improved accuracy, and greater reliability to credibility assessment practices, need to be built. This study establishes a foundation for developing automated systems for human credibility screening.
Countermeasures And Eye Tracking Deception Detection, Ryan M. Schuetzler
Countermeasures And Eye Tracking Deception Detection, Ryan M. Schuetzler
Ryan Schuetzler
A new development in the field of deception detection is been the development of rapid, noncontact tools for automated detection. This research in progress paper describes a method for assessing the robustness of eye tracker-based deception detection to countermeasures employed by knowledgeable participants.
Facilitating Natural Conversational Agent Interactions: Lessons From A Deception Experiment, Ryan M. Schuetzler, Mark Grimes, Justin Scott Giboney, Joesph Buckman
Facilitating Natural Conversational Agent Interactions: Lessons From A Deception Experiment, Ryan M. Schuetzler, Mark Grimes, Justin Scott Giboney, Joesph Buckman
Ryan Schuetzler
This study reports the results of a laboratory experiment exploring interactions between humans and a conversational agent. Using the ChatScript language, we created a chat bot that asked participants to describe a series of images. The two objectives of this study were (1) to analyze the impact of dynamic responses on participants’ perceptions of the conversational agent, and (2) to explore behavioral changes in interactions with the chat bot (i.e. response latency and pauses) when participants engaged in deception. We discovered that a chat bot that provides adaptive responses based on the participant’s input dramatically increases the perceived humanness and …
A Systems Approach To Countermeasures In Credibility Assessment Interviews, Nathan Twyman, Ryan M. Schuetzler, Jeffrey Gainer Proudfoot, Aaron Elkins
A Systems Approach To Countermeasures In Credibility Assessment Interviews, Nathan Twyman, Ryan M. Schuetzler, Jeffrey Gainer Proudfoot, Aaron Elkins
Ryan Schuetzler
Countermeasures, or techniques for hiding guilt during a credibility assessment examination, have long been an important topic in cognitive psychology and criminal justice fields. With recent IS research on automated screening systems, understanding the potential for countermeasures in this new paradigm is of increasing importance. This paper reports on a large experiment examining countermeasures in an automated deception detection screening context. The effectiveness of traditional countermeasure types (mental and physical) are examined, as well as an exploratory approach of trying several countermeasures at once. The exploratory approach was tested to investigate a proposed novel systems-inspired solution to countermeasures—triangulating on deception …
Research-Based Web Design & Usability Guidelines [2006 Edition], Michael O. Leavitt, Ben Shneiderman, Robert W. Bailey, Carol Barnum, John Bosley, Barbara Chaparro, Joseph Dumas, Melody Y. Ivory, Bonnie John, Hal Miller-Jacobs, Sanjay J. Koyani, James R. Lewis, Stanley Page, Judith Ramey, Janice (Ginny) Redish, Jean Scholtz, Steve Wigginton, Cari A. Wolfson, Larry E. Wood, Don Zimmerman
Research-Based Web Design & Usability Guidelines [2006 Edition], Michael O. Leavitt, Ben Shneiderman, Robert W. Bailey, Carol Barnum, John Bosley, Barbara Chaparro, Joseph Dumas, Melody Y. Ivory, Bonnie John, Hal Miller-Jacobs, Sanjay J. Koyani, James R. Lewis, Stanley Page, Judith Ramey, Janice (Ginny) Redish, Jean Scholtz, Steve Wigginton, Cari A. Wolfson, Larry E. Wood, Don Zimmerman
Barbara S. Chaparro
The new edition of the U.S. Department of Health and Human Services’ (HHS) Research-Based Web Design and Usability Guidelines. These guidelines reflect HHS’ commitment to identifying innovative, research-based approaches that result in highly responsive and easy-to-use Web sites for the public.
These guidelines help move us in that direction by providing practical, yet authoritative, guidance on a broad range of Web design and communication issues. Having access to the best available research helps to ensure we make the right decisions the first time around and reduces the possibility of errors and costly mistakes.
Learning To Love Data (Week): Creating Data Services Awareness On Campus, Katie M. Wissel, Lisa Deluca
Learning To Love Data (Week): Creating Data Services Awareness On Campus, Katie M. Wissel, Lisa Deluca
Kathryn Wissel, MBA, MI
The Graph Database: Jack Of All Trades Or Just Not Sql?, George F. Hurlburt, Maria R. Lee, George K. Thiruvathukal
The Graph Database: Jack Of All Trades Or Just Not Sql?, George F. Hurlburt, Maria R. Lee, George K. Thiruvathukal
George K. Thiruvathukal
This special issue of IT Professional focuses on the graph database. The graph database, a relatively new phenomenon, is well suited to the burgeoning information era in which we are increasingly becoming immersed. Here, the guest editors briefly explain how a graph database works, its relation to the relational database management system (RDBMS), and its quantitative and qualitative pros and cons, including how graph databases can be harnessed in a hybrid environment. They also survey the excellent articles submitted for this special issue.
Blockchain And Smart Contracts: The Missing Link In Copyright Licensing?, Balazs Bodo, Daniel Gervais, Joao Pedro Quintais
Blockchain And Smart Contracts: The Missing Link In Copyright Licensing?, Balazs Bodo, Daniel Gervais, Joao Pedro Quintais
Daniel J Gervais
Vetcompass Australia: A National Big Data Collection System For Veterinary Science, Paul Mcgreevy, Peter Thomson, Navneet K. Dhand, David Raubenheimer, Sophie Masters, Caroline S. Mansfield, Timothy Baldwin, Ricardo J. Soares Magalhaes, Jacquie Rand, Peter Hill, Anne Peaston, James Gilkerson, Martin Combs, Shane Raidal, Peter Irwin, Peter Irons, Richard Squires, David Brodbelt, Jeremy Hammond
Vetcompass Australia: A National Big Data Collection System For Veterinary Science, Paul Mcgreevy, Peter Thomson, Navneet K. Dhand, David Raubenheimer, Sophie Masters, Caroline S. Mansfield, Timothy Baldwin, Ricardo J. Soares Magalhaes, Jacquie Rand, Peter Hill, Anne Peaston, James Gilkerson, Martin Combs, Shane Raidal, Peter Irwin, Peter Irons, Richard Squires, David Brodbelt, Jeremy Hammond
Paul McGreevy, PhD
The Use And Effectiveness Of Online Social Media In Volunteer Organizations, Amy J. Connolly
The Use And Effectiveness Of Online Social Media In Volunteer Organizations, Amy J. Connolly
Amy J Connolly
Volunteer organizations face two challenges not found in non-volunteer organizations: recruiting and retaining volunteers. While social media use is increasing amongst individuals, its use and effectiveness for volunteer recruitment and retention by volunteer organizations is unknown. The dissertation reports the results of three studies to investigate this important question. Using a mixed-methods approach, it addressed the dual nature of social media and its effectiveness by including volunteer organizations and social media users. This dissertation found that although volunteer organizations are not using social media effectively, they could virtualize requirements of the recruitment process by focusing on relatable events instead of …
The Use And Effectiveness Of Online Social Media In Volunteer Organizations, Amy J. Connolly
The Use And Effectiveness Of Online Social Media In Volunteer Organizations, Amy J. Connolly
Amy J Connolly
Volunteer organizations face two challenges not found in non-volunteer organizations: recruiting and retaining volunteers. While social media use is increasing amongst individuals, its use and effectiveness for volunteer recruitment and retention by volunteer organizations is unknown. The dissertation reports the results of three studies to investigate this important question. Using a mixed-methods approach, it addressed the dual nature of social media and its effectiveness by including volunteer organizations and social media users. This dissertation found that although volunteer organizations are not using social media effectively, they could virtualize requirements of the recruitment process by focusing on relatable events instead of …
An Object Oriented Approach To Modeling And Simulation Of Routing In Large Communication Networks, Armin Mikler, Johnny S. Wong, Vasant Honavar
An Object Oriented Approach To Modeling And Simulation Of Routing In Large Communication Networks, Armin Mikler, Johnny S. Wong, Vasant Honavar
Johnny Wong
The complexity (number of entities, interactions between entities, and resulting emergent dynamic behavior) of large communication environments which contain hundreds of nodes and links make simulation an important tool for the study of such systems. Given the difficulties associated with complete analytical treatment of complex dynamical systems, it is often the only practical tool that is available. This paper presents an example of a flexible, modular, object-oriented toolbox designed to support modeling and experimental analysis of a large family of heuristic knowledge representation and decision functions for adaptive self-managing communication networks with particular emphasis on routing strategies. It discusses in …
Design And Implementation Of A Media Uploading System, Mu Zhang, Johnny S. Wong, Wallapak Tavanapong
Design And Implementation Of A Media Uploading System, Mu Zhang, Johnny S. Wong, Wallapak Tavanapong
Johnny Wong
This paper presents the design and performance analysis of an uploading system that automatically uploads multimedia files to a centralized server given client hard deadlines. If not uploaded by the deadlines, existing files may be lost or new files cannot be recorded. The uploading systems with hard deadlines have several important applications in practice. For instance, such systems can be used in hospitals to gather videos generated from medical devices from various operating rooms for post-procedure analysis and in law enforcement to collect video recordings from police cars during routine patrolling. In this paper, we study the uploading system with …
Ipm Information Technology, John K. Vandyk
Ipm Information Technology, John K. Vandyk
John K. VanDyk
The use of information technology to obtain and manage IPM information will continue to grow. By applying the basic principles of information taxonomies such as tagging information with terms from vocabularies, filtering and aggregation, knowledge workers will have the necessary tools to become increasingly informed about the realm ofiPM.
Evidence-Based-Review-Of-Academic-Web-Search-Engines-Preprint.Pdf, Jody C. Fagan 5609471
Evidence-Based-Review-Of-Academic-Web-Search-Engines-Preprint.Pdf, Jody C. Fagan 5609471
Jody C Fagan
Assessing Differences Between Physician's Realized And Anticipated Gains From Electronic Health Record Adoption, Lori T. Peterson, Eric W. Ford, John Eberhardt, T. R. Huerta
Assessing Differences Between Physician's Realized And Anticipated Gains From Electronic Health Record Adoption, Lori T. Peterson, Eric W. Ford, John Eberhardt, T. R. Huerta
Lori Peterson
Return on investment (ROI) concerns related to Electronic Health Records (EHRs) are a major barrier to the technology’s adoption. Physicians generally rely upon early adopters to vet new technologies prior to putting them into widespread use. Therefore, early adopters’ experiences with EHRs play a major role in determining future adoption patterns. The paper’s purposes are: (1) to map the EHR value streams that define the ROI calculation; and (2) to compare Current Users’ and Intended Adopters’ perceived value streams to identify similarities, differences and governing constructs. Primary data was collected by the Texas Medical Association, which surveyed 1,772 physicians on …
Success Stories In Knowledge Management Systems, Leila Halawi, Richard Mccarthy, Janine Aronson
Success Stories In Knowledge Management Systems, Leila Halawi, Richard Mccarthy, Janine Aronson
Leila A. Halawi
Irresistible Bargains: Navigating The Surveillance Society, Robert M. Pallitto
Irresistible Bargains: Navigating The Surveillance Society, Robert M. Pallitto
Robert M Pallitto
State Preserving Extreme Learning Machine For Face Recognition, Md. Zahangir Alom, Paheding Sidike, Vijayan K. Asari, Tarek M. Taha
State Preserving Extreme Learning Machine For Face Recognition, Md. Zahangir Alom, Paheding Sidike, Vijayan K. Asari, Tarek M. Taha
Vijayan K. Asari
Extreme Learning Machine (ELM) has been introduced as a new algorithm for training single hidden layer feed-forward neural networks (SLFNs) instead of the classical gradient-based algorithms. Based on the consistency property of data, which enforce similar samples to share similar properties, ELM is a biologically inspired learning algorithm with SLFNs that learns much faster with good generalization and performs well in classification applications. However, the random generation of the weight matrix in current ELM based techniques leads to the possibility of unstable outputs in the learning and testing phases. Therefore, we present a novel approach for computing the weight matrix …
Intensity And Resolution Enhancement Of Local Regions For Object Detection And Tracking In Wide Area Surveillance, Evan Krieger, Vijayan K. Asari, Saibabu Arigela, Theus H. Aspiras
Intensity And Resolution Enhancement Of Local Regions For Object Detection And Tracking In Wide Area Surveillance, Evan Krieger, Vijayan K. Asari, Saibabu Arigela, Theus H. Aspiras
Vijayan K. Asari
Object tracking in wide area motion imagery is a complex problem that consists of object detection and target tracking over time. This challenge can be solved by human analysts who naturally have the ability to keep track of an object in a scene. A computer vision solution for object tracking has the potential to be a much faster and efficient solution. However, a computer vision solution faces certain challenges that do not affect a human analyst. To overcome these challenges, a tracking process is proposed that is inspired by the known advantages of a human analyst. First, the focus of …
A Modular Approach For Key-Frame Selection In Wide Area Surveillance Video Analysis, Almabrok Essa, Paheding Sidike, Vijayan K. Asari
A Modular Approach For Key-Frame Selection In Wide Area Surveillance Video Analysis, Almabrok Essa, Paheding Sidike, Vijayan K. Asari
Vijayan K. Asari
This paper presents an efficient preprocessing algorithm for big data analysis. Our proposed key-frame selection method utilizes the statistical differences among subsequent frames to automatically select only the frames that contain the desired contextual information and discard the rest of the insignificant frames.
We anticipate that such key frame selection technique will have significant impact on wide area surveillance applications such as automatic object detection and recognition in aerial imagery. Three real-world datasets are used for evaluation and testing and the observed results are encouraging.