Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Physical Sciences and Mathematics

Examining The Effects Of Information And Communication Technologies In The Legal Representation Of Latin American Asylum Seekers, Victor M. Portillo Ochoa Dec 2021

Examining The Effects Of Information And Communication Technologies In The Legal Representation Of Latin American Asylum Seekers, Victor M. Portillo Ochoa

Open Access Theses & Dissertations

The purpose of this thesis was to explore how legal defense nonprofit organizations (NPO) are using Information and Communication Technologies (ICT) to provide legal defense for asylum seekers and improve the conditions of immigrants at detention centers. In addition, this research explored the impact of ICTs on legal defense NPOs, bottlenecks, and security implications when supporting vulnerable communities. ICTs profoundly impacted the way we interact in a post-pandemic world, and it presents new challenges and possibilities for legal defense nonprofit organizations that are helping vulnerable communities. This study consists of staff and volunteers from different legal defense nonprofit organizations NPOs …


How Does Land Cover Classification In Google Earth Engine Compare With Traditional Methods Of Land Cover Classification? What Are The Tradeoffs?, Carlos Sebastian Reyes May 2021

How Does Land Cover Classification In Google Earth Engine Compare With Traditional Methods Of Land Cover Classification? What Are The Tradeoffs?, Carlos Sebastian Reyes

Open Access Theses & Dissertations

The project focuses on comparing land cover classification of traditional methods such as ArcGIS with newer ones such as Google Earth Engine (GEE) as well as discussing any potential tradeoffs. Two studies were performed in both platforms, the first involved analyzing land cover change in the Middle Rio Grande (MRG) region of southern New Mexico, far west Texas, and northern Chihuahua, Mexico. The MRG study focused on urban and agricultural change in the region using two different classification methods. The second study focused on creating a post-hurricane damage assessment (PDA) with the goal of developing an automated method of estimating …


Understanding The Digital Lives Of Transnational Students: A Case Study, Chowaing Chagra Belekeh Jan 2020

Understanding The Digital Lives Of Transnational Students: A Case Study, Chowaing Chagra Belekeh

Open Access Theses & Dissertations

The proliferation and the fast-paced evolution of digital information communication technologies (ICTs) in contemporary times have arguably raised concern for us to comprehend what we do with these technologies and what these technologies do for us. The experience of engaging these technologies may not necessarily be the same for everyone—especially students who come from around the world to attain post-graduate degrees in the United States. This research focused on understanding the digital lives, choices, and experiences of transnational students who navigate and negotiate geopolitical borders and boundaries (physical)– in their quest for education. Using a case study analysis and collecting …


Estimating The Optimal Cutoff Point For Logistic Regression, Zheng Zhang Jan 2018

Estimating The Optimal Cutoff Point For Logistic Regression, Zheng Zhang

Open Access Theses & Dissertations

Binary classification is one of the main themes of supervised learning. This research is concerned about determining the optimal cutoff point for the continuous-scaled outcomes (e.g., predicted probabilities) resulting from a classifier such as logistic regression. We make note of the fact that the cutoff point obtained from various methods is a statistic, which can be unstable with substantial variation. Nevertheless, due partly to complexity involved in estimating the cutpoint, there has been no formal study on the variance or standard error of the estimated cutoff point.

In this Thesis, a bootstrap aggregation method is put forward to estimate the …


Essays On Sofwtare Development Projects: Impact Of Social And Technological Factors On Project Performance And Co-Diffusion Of Software Sourcing Arrangements, Niharika Dayyala Jan 2017

Essays On Sofwtare Development Projects: Impact Of Social And Technological Factors On Project Performance And Co-Diffusion Of Software Sourcing Arrangements, Niharika Dayyala

Open Access Theses & Dissertations

Software development is a complicated process which is accomplished by the combined effort of the key elements such as people, processes, and technology. Software development firms are on a constant quest to identify the best practices for managing the key elements to improve their software development project outcomes and to deliver successful software projects. This Dissertation aims to study key elements that can influence the software development project performance through three distinctive studies. The first essay of this Dissertation investigates the impact of people factors on software project outcomes. Specifically, it examines the impact of team characteristics on the software …


Enterprise Systems, Information Security Management Systems And Their Impact On Enterprise Risk: A 3-Essay Dissertation, Fernando Parra Reyes Jan 2015

Enterprise Systems, Information Security Management Systems And Their Impact On Enterprise Risk: A 3-Essay Dissertation, Fernando Parra Reyes

Open Access Theses & Dissertations

This 3-essay study offers a comprehensive examination of hypothetical concepts related to the behaviors, attitudes, outcomes, processes, experiences, manifestations and indicators connected with an organizationâ??s design, implementation and management of a coherent set of policies, processes and systems to manage risks to its information assets. Network analysis tools are used to examine the relationships found in Information Security Management Systems (ISMS) literature published within the last decade. This study examines the effect of upgrades and implementations of enterprise systems on enterprise risk, as perceived by external investors. Finally, this study also assesses the impact of external IT governance certifications on …


Three Essays On Global Ict Phenomenon: Productivity Paradox, Organizational Ict Use, And Privacy In Social Networks, Faruk Arslan Jan 2015

Three Essays On Global Ict Phenomenon: Productivity Paradox, Organizational Ict Use, And Privacy In Social Networks, Faruk Arslan

Open Access Theses & Dissertations

This Dissertation aims to investigate the global diversity in information systems by studying three distinctive phenomena. The first essay investigates the existence of "IT Productivity Paradox" within firms operating in developing countries using an empirical approach. IT Productivity Paradox has been a widely investigated topic within the context of developed countries and primarily studied within the context of developing countries using a single country. Our research addresses a gap in the literature, which is the study of IT Productivity Paradox across several developing countries with diverse characteristics. The second essay studies the contextual factors (firm characteristics and perception of external …


Essays On The Digital Divide, Belal Abdelfattah Jan 2014

Essays On The Digital Divide, Belal Abdelfattah

Open Access Theses & Dissertations

The digital divide is a phenomenon that is globally persistent, despite rapidly decreasing costs in technology. While much of the variance in the adoption and use of information communication technology (ICT) that defines the digital divide can be explained by socioeconomic and demographic variables, there is still significant unaccounted variance that needs to be explained if the world's population is expected to be brought more fully into the digital age. The present research addresses this need with three cross-country studies. Study 1 primarily investigates the time individuals spend with traditional media sources as a likely explanation for their frequency of …


Public Social Network Sites And Social Recruiting, Abby Peters Jan 2014

Public Social Network Sites And Social Recruiting, Abby Peters

Open Access Theses & Dissertations

Social network sites (SNSs) are an increasingly popular form of social media used by individuals and organizations. As these platforms continue to transform the way people communicate with one another, they are simultaneously revolutionizing the way individuals interact with organizations. Part of this dramatic change is apparent in the processes by which organizations are recruiting employees and job seekers are pursuing employment. To investigate these phenomena, I employed the diffusion of innovations theory in a SNS context to examine the relationship between organizations' use of their corporate career website and their use of SNSs as recruiting sources. Subsequently, I used …


Three Essays On Social/Political Structures And Icts Use, Seungeui Ryu Jan 2014

Three Essays On Social/Political Structures And Icts Use, Seungeui Ryu

Open Access Theses & Dissertations

My research identifies how social structures affect the use of the Internet and/or a mobile chat application and how the Internet impacts the political structure of a nation. In my first essay of the 3-essay Dissertation, I am designing three models based on social structure theory that are used to study the Internet and a popular mobile chat application's use by managers in South Korea, with the help of a survey instrument. In my first essay, the contribution is on i) testing a model of manager's personal behavior on Information and Communication Technology (ICT) use at the individual level involving …


Utilizing Cyber Espionage To Combat Terrorism, Gary Adkins Jan 2013

Utilizing Cyber Espionage To Combat Terrorism, Gary Adkins

Open Access Theses & Dissertations

The world has effectively exited the Industrial Age and is firmly planted in the Information Age. Global communication at the speed of light has been a great asset to both businesses and private citizens. However, there is a dark side to the age we live in, where terrorist groups are able to communicate, plan, fund, recruit, and spread their message to the world. The relative anonymity the internet provides hinders law enforcement and security agencies in not only locating would-be terrorists but also in disrupting their operations. The internet is a loosely knit group of computers and routers and is …


A Semantic Web-Based Methodology For Describing Scientific Research Efforts, Aida Gandara Jan 2013

A Semantic Web-Based Methodology For Describing Scientific Research Efforts, Aida Gandara

Open Access Theses & Dissertations

Scientists produce research resources that are useful to future research and innovative efforts. In a typical scientific scenario, the results created by a collaborative team often include numerous artifacts, observations and relationships relevant to research findings, such as programs that generate data, parameters that impact outputs, workflows that describe processes, and publications, posters and presentations that explain results and findings. Scientists have options in what results to share and how to share them, however, there is no systematic approach to documenting scientific research and sharing it on the Web.

The goal of this research is to define a systematic approach …


Toward New Data And Information Management Solutions For Data-Intensive Ecological Research, Christine Marie Laney Jan 2013

Toward New Data And Information Management Solutions For Data-Intensive Ecological Research, Christine Marie Laney

Open Access Theses & Dissertations

Ecosystem health is deteriorating in many parts of the world due to direct and indirect anthropogenic pressures. Generating accurate, useful, and impactful models of past, current, and future states of ecosystem structure and function is a complex endeavor that often requires vast amounts of data from multiple sources and knowledge from collaborating researchers. Ecological data collection has improved rapidly over the past few decades due to the development, innovation, and large scale deployment of automated sensors, which are capable of measuring a gamut of ecosystem properties over broad spatiotemporal scales. Although complex ecosystem models and analyses are increasingly parameterized with …


Market Reactions To Publicly Announced Privacy And Security Breaches Suffered By Companies Listed On The United States Stock Exchanges: A Comparative Empirical Investigation, Adolfo S. Coronado Jan 2012

Market Reactions To Publicly Announced Privacy And Security Breaches Suffered By Companies Listed On The United States Stock Exchanges: A Comparative Empirical Investigation, Adolfo S. Coronado

Open Access Theses & Dissertations

Using a sample of security and privacy breaches the present research examines the comparative announcement impact between the two types of events. The first part of the dissertation analyzes the impact of publicly announced security and privacy breaches on abnormal stock returns, the change in firm risk, and abnormal trading volume are measured. The second part of the dissertation analyzes differential impact between security and privacy breaches on abnormal stock returns, the change in firm risk, and abnormal trading volume are measured.

Using a sample of 114 security (65) and privacy (49) breaches on average, security breaches resulted in more …


Supporting Novice Application Users In Learning By Trial And Error And Using Help, Oscar Daniel Andrade Jan 2009

Supporting Novice Application Users In Learning By Trial And Error And Using Help, Oscar Daniel Andrade

Open Access Theses & Dissertations

This thesis examines three related topics in analyzing user preferences for troubleshooting application usability problems and the kinds of issues that influence such preferences. The goal of this thesis is to propose (1) ways in which users can be supported to learn to use applications and (2) a model to rewrite help such that users are able to adapt its contents dynamically.

The consensus of documentation research is that users rarely use help, usually preferring to muddle through. To increase use of help, tutorials for novice users could be changed from guided presentations toward using the application's help system. To …