Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Physical Sciences and Mathematics

Advanced Techniques For Computational And Information Sciences, William Guo, Chih-Cheng Hung, Paul Scheunders, Bor-Chen Kuo Dec 2015

Advanced Techniques For Computational And Information Sciences, William Guo, Chih-Cheng Hung, Paul Scheunders, Bor-Chen Kuo

Faculty and Research Publications

New techniques in computational and information sciences have played an important role in keeping advancing the so called knowledge economy. Advanced techniques have been introduced to or emerging in almost every field of the scientific world for hundreds of years, which has been accelerated since the late 1970s when the advancement in computers and digital technologies brought the world into the Information Era. In addition to the rapid development of computational intelligence and new data fusion techniques in the past thirty years [1–4], mobile and cloud computing, grid computing driven numeric computation models, big data intelligence, and other emerging technologies …


Informing And Performing: A Study Comparingadaptive Learning To Traditional Learning, Meg Coffin Murray, Jorge Perez Jul 2015

Informing And Performing: A Study Comparingadaptive Learning To Traditional Learning, Meg Coffin Murray, Jorge Perez

Faculty and Research Publications

Technology has transformed education, perhaps most evidently in course delivery options. However, compelling questions remain about how technology impacts learning. Adaptive learning tools are technology-based artifacts that interact with learners and vary presentation based upon that interaction. This study examines completion rates and exercise scores for students assigned adaptive learning exercises and compares them to completion rates and quiz scores for students assigned objective-type quizzes in a university digital literacy course. Current research explores the hypothesis that adapting instruction to an individual’s learning style results in better learning outcomes. Computer technology has long been seen as an answer to the …


Mobile Phishing Attacks And Mitigation Techniques, Hossain Shahriar, Tulin Klintic, Victor Clincy Jun 2015

Mobile Phishing Attacks And Mitigation Techniques, Hossain Shahriar, Tulin Klintic, Victor Clincy

Faculty and Research Publications

Mobile devices have taken an essential role in the portable computer world. Portability, small screen size, and lower cost of production make these devices popular replacements for desktop and laptop computers for many daily tasks, such as surfing on the Internet, playing games, and shopping online. The popularity of mobile devices such as tablets and smart phones has made them a frequent target of traditional web-based attacks, especially phishing. Mobile device-based phishing takes its share of the pie to trick users into entering their credentials in fake websites or fake mobile applications. This paper discusses various phishing attacks using mobile …


A Comparative Study Of Email Forensic Tools, Vamshee Krishna Devendran, Hossain Shahriar, Victor Clincy Jan 2015

A Comparative Study Of Email Forensic Tools, Vamshee Krishna Devendran, Hossain Shahriar, Victor Clincy

Faculty and Research Publications

Over the last decades, email has been the major carrier for transporting spam and malicious contents over the network. Email is also the primary source of numerous criminal activities on the Internet. Computer Forensics is a systematic process to retain and analyze saved emails for the purpose of legal proceedings and other civil matters. Email analysis is challenging due to not only various fields that can be forged by hackers or malicious users, but also the flexibility of composing, editing, deleting of emails using offline (e.g., MS Outlook) or online (e.g., Web mail) email applications. Towards this direction, a number …


Drip - Data Rich, Information Poor: A Concise Synopsis Of Data Mining, Muhammad Obeidat, Max North, Lloyd Burgess, Sarah North Dec 2014

Drip - Data Rich, Information Poor: A Concise Synopsis Of Data Mining, Muhammad Obeidat, Max North, Lloyd Burgess, Sarah North

Faculty and Research Publications

As production of data is exponentially growing with a drastically lower cost, the importance of data mining required to extract and discover valuable information is becoming more paramount. To be functional in any business or industry, data must be capable of supporting sound decision-making and plausible prediction. The purpose of this paper is concisely but broadly to provide a synopsis of the technology and theory of data mining, providing an enhanced comprehension of the methods by which massive data can be transferred into meaningful information.


Promoting Information Systems Major To Undergraduate Students - A Comprehensive Investigation, Lei Li, Chi Zhang, Guangzhi Zheng Oct 2014

Promoting Information Systems Major To Undergraduate Students - A Comprehensive Investigation, Lei Li, Chi Zhang, Guangzhi Zheng

Faculty and Research Publications

Weak enrollment growth has been a concern for many Information Systems (IS) programs in recent years although the IT/IS job market remains strong. Stimulating undergraduate students’ interest to IS programs have been a challenge. In this paper, the researchers took a comprehensive approach to study how to effectively promote a Management Information Systems (MIS) program to undergraduate students at a medium-size public university in the southeastern US. Using a survey-based method, the researchers first investigated the factors that impact students’ selection of majors and identified students’ perceptions on an MIS program. In this paper, an MIS program promotion strategy was …


Developing Health Information Technology (Hit) Programs And Hit Curriculum: The Southern Polytechnic State University Experience, Chi Zhang, Han Reichgelt, Rebecca H. Rutherfoord, Andy Ju An Wang Oct 2014

Developing Health Information Technology (Hit) Programs And Hit Curriculum: The Southern Polytechnic State University Experience, Chi Zhang, Han Reichgelt, Rebecca H. Rutherfoord, Andy Ju An Wang

Faculty and Research Publications

Health Information Technology (HIT) professionals are in increasing demand as healthcare providers need help in the adoption and meaningful use of Electronic Health Record (EHR) systems while the HIT industry needs workforce skilled in HIT and EHR development. To respond to this increasing demand, the School of Computing and Software Engineering at Southern Polytechnic State University designed and implemented a series of HIT educational programs. This paper summarizes our experience in the HIT curriculum development and provides an overview of HIT workforce development initiatives and major HIT and health information management (HIM) educational resources. It also provides instructional implications and …


Unraveling The Digital Literacy Paradox: How Higher Education Fails At The Fourth Literacy., Meg Coffin Murray, Jorge Perez Jul 2014

Unraveling The Digital Literacy Paradox: How Higher Education Fails At The Fourth Literacy., Meg Coffin Murray, Jorge Perez

Faculty and Research Publications

Governments around the globe are recognizing the economic ramifications of a digitally literate citizenry and implementing systemic strategies to advance digital literacy. Awareness of the growing importance of digital literacy in today’s workplace coexists paradoxically with apparent foot-dragging on the part of many universities in assessment and amplification of these important competencies. This paper makes a case for digital literacy, presents models of the complex construct, and presents the results of a digital literacy assessment administered to students enrolled in a senior seminar course at a regional university in the United States. Reflection on the study results evoked our mantra …


Analysis Of A Scholarly Social Networking Site: The Case Of The Dormant User, Meg Murray Mar 2014

Analysis Of A Scholarly Social Networking Site: The Case Of The Dormant User, Meg Murray

Faculty and Research Publications

Many scholarly social networking sites targeting an audience of academicians and researchers have appeared on the Internet in recent years. Their vision is to change the way researchers connect, share and collaborate to solve real world problems. Despite the hype, however, their impact on higher education is unclear. Studies exist that address the benefits of these sites, but studies that investigate the implications of how scholarly social networking systems vet information, including data related to user profiles and uploaded content, is nonexistent. This paper chronicles the system management of user information for an inactive user of a scholarly social networking …


The Adoption Of E-Learning Systems In Low Income Countries: The Case Of Ethiopia, Yonas Hagos, Solomon Negash Feb 2014

The Adoption Of E-Learning Systems In Low Income Countries: The Case Of Ethiopia, Yonas Hagos, Solomon Negash

Faculty and Research Publications

This paper presents the Technology Acceptance Model (TAM) to examine the adoption of e-learning system in low-income countries, the case of Ethiopia. The research uses a quantitative research approach to examine Ethiopian tertiary level distance students’ determinant factors for the acceptance of e-learning systems. A questionnaire-based survey was conducted to collect data from 255 undergraduate distance learners in a higher education institute in Ethiopia. The data were analyzed using the Structural Equation Modeling (SEM) (Hair et al, 2005) technique to examine the causal model. The results indicated that perceived usefulness and perceived ease of use significantly affected distance learners’ behavioral …


Rethinking Fs-Isac: An It Security Information Sharing Network Model For The Financial Services Sector, Charles Zhechao Liu, Humayun Zafar, Yoris A. Au Jan 2014

Rethinking Fs-Isac: An It Security Information Sharing Network Model For The Financial Services Sector, Charles Zhechao Liu, Humayun Zafar, Yoris A. Au

Faculty and Research Publications

This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing alliance in the financial services industry). Failure to encourage members to share their IT security-related information has seriously undermined the founding rationale of FS-ISAC. Our analysis shows that many information sharing alliances’ membership policies are plagued with the incentive misalignment issue and may result in a “free-riding” or “no information sharing” equilibrium. To address this issue, we propose a new information sharing membership policy that incorporates an insurance option and show that the proposed policy can align members’ incentives and lead to a socially optimal outcome. Moreover, …


A Comparative Review Of Information Technology Project Management In Private And Public Sector Organization, Muhammad Obeidat, Max North Jan 2014

A Comparative Review Of Information Technology Project Management In Private And Public Sector Organization, Muhammad Obeidat, Max North

Faculty and Research Publications

Both private and public sector organizations tend to recognize the prominence of information technology within project management techniques and practices. The primary objective of this paper is to present a comparative review of information technology within project management in private and public sectors. Moreover, this research provides an extensive review of related topics such as the evolution of information technology, factors contributing to project abandonment, and the tools and techniques of management that effect project success. In conclusion, the authors present a variety of practical and effective guidelines and recommend approaches for the successful deployment of information technology within project …


Student Interaction With Content In Online And Hybrid Courses: Leading Horses To The Proverbial Water, Meg Murray, Jorge Perez, Debra Geist, Alison Hedrick Jul 2013

Student Interaction With Content In Online And Hybrid Courses: Leading Horses To The Proverbial Water, Meg Murray, Jorge Perez, Debra Geist, Alison Hedrick

Faculty and Research Publications

Permutations of traditional and online learning are rapidly advancing along a blended continuum, prompting conjecture that learning and e-learning will soon be indistinguishable. As variations of blended learning evolve, educators worldwide must develop better understanding of how effective interaction with course content impacts engagement and learning. This study compares patterns of access to instructional content in online and hybrid courses offered at a regional university in the United States. Frequency counts and access rates were examined for course content in four categories: core materials, direct support, indirect support, and ancillary materials. Observed results were echoed in responses to a survey …


An Approach To Nearest Neighboring Search For Multi-Dimensional Data, Yong Shi, Li Zhang, Lei Zhu Mar 2011

An Approach To Nearest Neighboring Search For Multi-Dimensional Data, Yong Shi, Li Zhang, Lei Zhu

Faculty and Research Publications

Finding nearest neighbors in large multi-dimensional data has always been one of the research interests in data mining field. In this paper, we present our continuous research on similarity search problems. Previously we have worked on exploring the meaning of K nearest neighbors from a new perspective in PanKNN [20]. It redefines the distances between data points and a given query point Q, efficiently and effectively selecting data points which are closest to Q. It can be applied in various data mining fields. A large amount of real data sets have irrelevant or obstacle information which greatly affects the effectiveness …


A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade Jul 2010

A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade

Faculty and Research Publications

Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine …


Database Security: What Students Need To Know, Meg C. Murray Jan 2010

Database Security: What Students Need To Know, Meg C. Murray

Faculty and Research Publications

Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data. Students in the computing disciplines must develop an …


Animated Courseware Support For Teaching Database Design, Meg C. Murray, Mario Guimaraes Jan 2009

Animated Courseware Support For Teaching Database Design, Meg C. Murray, Mario Guimaraes

Faculty and Research Publications

Database technologies are a core component of computing technology curricula. Their importance will only continue to expand as more and more data are retained in database systems. An effective database system is predicated on a good data model. Database design is the conceptualization of an underlying data model that progresses from identifying user requirements to graphically depicting those requirements and finally mapping the graphical models to a set of tables implemented in a physical database system. The abstract nature of much of database design makes it challenging to teach. This paper presents a set of software animations designed to support …


Animated Database Courseware: Using Animations To Extend Conceptual Understanding Of Database Concepts, Meg Murray, Mario Guimaraes Dec 2008

Animated Database Courseware: Using Animations To Extend Conceptual Understanding Of Database Concepts, Meg Murray, Mario Guimaraes

Faculty and Research Publications

Teaching abstract concepts can be best supported with supplemental instructional materials such as software animations. Visualization and animations have been shown to increase student motivation and help students develop deeper understandings. Through an NSF funded CCLI grant, a set of animations to support the teaching of database concepts is being developed and made freely available. Current modules available cover areas such as database design, interactive SQL, stored procedures and triggers, transactions and database security. In this paper, we provide an overview of the Animated Database Courseware (ADbC) as well as provide examples of how this software might be utilized in …


Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade Oct 2005

Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade

Faculty and Research Publications

Information systems students continue to struggle to successfully complete computer programming classes. Learning how to program is difficult, and failure and attrition rates in college level programming classes remain at an unacceptably high rate. Since many IS students take a programming course as part of their program of study, IS educators should better understand why IS students tend to achieve low success rates in programming courses and what can be done to improve success rates. Little research to date has addressed potential reasons for student failure in programming principles courses. Many educators simply assume that high failure rates are acceptable …


Enemy At The Gate: Threats To Information Security, Michael E. Whitman Aug 2003

Enemy At The Gate: Threats To Information Security, Michael E. Whitman

Faculty and Research Publications

A firm can build more effective security strategies by identifying and ranking the severity of potential threats to its IS efforts.


Considerations For An Effective Telecommunications-Use Policy, Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts Jun 1999

Considerations For An Effective Telecommunications-Use Policy, Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts

Faculty and Research Publications

Recent changes in federal telecommunications legislation have underscored the importance of an up-to-date and effective telecommunications-use policy in business organizations. With the proliferation of the Internet, intranets, and email as commonplace business tools, the potential for misuse and subsequent liability has become an increasing concern. Even though the recent Supreme Court decision struck down the obscenity provisions of the Communications Decency Act (CDA), it left intact legislation that effectively mandates development of a sound telecommunications-use policy. In addition to potential liability for systems misuse, organizations have also had to address issues of individual employee privacy within the new systems.

This …