Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Information systems

Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 37

Full-Text Articles in Physical Sciences and Mathematics

Learning And Understanding User Interface Semantics From Heterogeneous Networks With Multimodal And Positional Attributes, Meng Kiat Gary Ang, Ee-Peng Lim Mar 2023

Learning And Understanding User Interface Semantics From Heterogeneous Networks With Multimodal And Positional Attributes, Meng Kiat Gary Ang, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

User interfaces (UI) of desktop, web, and mobile applications involve a hierarchy of objects (e.g., applications, screens, view class, and other types of design objects) with multimodal (e.g., textual and visual) and positional (e.g., spatial location, sequence order, and hierarchy level) attributes. We can therefore represent a set of application UIs as a heterogeneous network with multimodal and positional attributes. Such a network not only represents how users understand the visual layout of UIs but also influences how users would interact with applications through these UIs. To model the UI semantics well for different UI annotation, search, and evaluation tasks, …


Structure-Aware Visualization Retrieval, Haotian Li, Yong Wang, Aoyu Wu, Huan Wei, Huamin. Qu May 2022

Structure-Aware Visualization Retrieval, Haotian Li, Yong Wang, Aoyu Wu, Huan Wei, Huamin. Qu

Research Collection School Of Computing and Information Systems

With the wide usage of data visualizations, a huge number of Scalable Vector Graphic (SVG)-based visualizations have been created and shared online. Accordingly, there has been an increasing interest in exploring how to retrieve perceptually similar visualizations from a large corpus, since it can benefit various downstream applications such as visualization recommendation. Existing methods mainly focus on the visual appearance of visualizations by regarding them as bitmap images. However, the structural information intrinsically existing in SVG-based visualizations is ignored. Such structural information can delineate the spatial and hierarchical relationship among visual elements, and characterize visualizations thoroughly from a new perspective. …


Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson Jan 2022

Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson

Walden Dissertations and Doctoral Studies

Business and IT leaders in financial services are concerned with the limited benefits they are reaping from information technology outsourcing (ITO) projects, despite continued heavy investments in ITO. Grounded in the transaction cost, agency, and resource-based view theories, the purpose of this quantitative correlational study was to examine the relationship between vendor/client complementarity, vendor technology maturity, vendor financial stability, and ITO success. Participants were 65 business and IT leaders in financial institutions engaged in ITO projects. The result of the multiple linear regression was significant, F(3, 61) = 4.845, p = .004, R2 = .192. In the final analysis, vendor/client …


Streaminghub: Interactive Stream Analysis Workflows, Yasith Jayawardana, Vikas G. Ashok, Sampath Jayarathna Jan 2022

Streaminghub: Interactive Stream Analysis Workflows, Yasith Jayawardana, Vikas G. Ashok, Sampath Jayarathna

Computer Science Faculty Publications

Reusable data/code and reproducible analyses are foundational to quality research. This aspect, however, is often overlooked when designing interactive stream analysis workflows for time-series data (e.g., eye-tracking data). A mechanism to transmit informative metadata alongside data may allow such workflows to intelligently consume data, propagate metadata to downstream tasks, and thereby auto-generate reusable, reproducible analytic outputs with zero supervision. Moreover, a visual programming interface to design, develop, and execute such workflows may allow rapid prototyping for interdisciplinary research. Capitalizing on these ideas, we propose StreamingHub, a framework to build metadata propagating, interactive stream analysis workflows using visual programming. We conduct …


Building And Using Digital Libraries For Etds, Edward A. Fox Mar 2021

Building And Using Digital Libraries For Etds, Edward A. Fox

The Journal of Electronic Theses and Dissertations

Despite the high value of electronic theses and dissertations (ETDs), the global collection has seen limited use. To extend such use, a new approach to building digital libraries (DLs) is needed. Fortunately, recent decades have seen that a vast amount of “gray literature” has become available through a diverse set of institutional repositories as well as regional and national libraries and archives. Most of the works in those collections include ETDs and are often freely available in keeping with the open-access movement, but such access is limited by the services of supporting information systems. As explained through a set of …


Querying Recurrent Convoys Over Trajectory Data, Munkh-Erdene Yadamjav, Zhifeng Bao, Baihua Zheng, Farhana M. Choudhury, Hanan Samet Sep 2020

Querying Recurrent Convoys Over Trajectory Data, Munkh-Erdene Yadamjav, Zhifeng Bao, Baihua Zheng, Farhana M. Choudhury, Hanan Samet

Research Collection School Of Computing and Information Systems

Moving objects equipped with location-positioning devices continuously generate a large amount of spatio-temporal trajectory data. An interesting finding over a trajectory stream is a group of objects that are travelling together for a certain period of time. Existing studies on mining co-moving objects do not consider an important correlation between co-moving objects, which is the reoccurrence of the movement pattern. In this study, we define a problem of finding recurrent pattern of co-moving objects from streaming trajectories and propose an efficient solution that enables us to discover recent co-moving object patterns repeated within a given time period. Experimental results on …


Data Breach Consequences And Responses: A Multi-Method Investigation Of Stakeholders, Hamid Reza Nikkhah May 2020

Data Breach Consequences And Responses: A Multi-Method Investigation Of Stakeholders, Hamid Reza Nikkhah

Graduate Theses and Dissertations

The role of information in today’s economy is essential as organizations that can effectively store and leverage information about their stakeholders can gain an advantage in their markets. The extensive digitization of business information can make organizations vulnerable to data breaches. A data breach is the unauthorized access to sensitive, protected, or confidential data resulting in the compromise of information security. Data breaches affect not only the breached organization but also various related stakeholders. After a data breach, stakeholders of the breached organizations show negative behaviors, which causes the breached organizations to face financial and non-financial costs. As such, the …


The Concept Of Representation Capability Of Databases And Its Application In Is Development, Lishuan Qin, Junkang Feng Jan 2020

The Concept Of Representation Capability Of Databases And Its Application In Is Development, Lishuan Qin, Junkang Feng

Journal of International Technology and Information Management

The representation capability of an information system in general and a database in particular seems an important and yet elusive concept, which is concerned with, in our view, how a database ever becomes capable of representing real-world objects accurately or otherwise. To explore how to approach and then define this concept, we explore what is meant and required by the statement that a database connection (i.e., a connection between database constructs such as entities in an Entity-relationship (ER) diagram and relations in a relational schema that are made available by a database) refers to, represents and accurately represents a …


Zero Textbook Cost Syllabus For Cis 2200h (Introduction To Information Systems And Technologies), Curtis Izen Aug 2018

Zero Textbook Cost Syllabus For Cis 2200h (Introduction To Information Systems And Technologies), Curtis Izen

Open Educational Resources

This course introduces students to information systems in business. Due to the rapid developments in Information Technology (IT) and the dramatic changes brought by these new technologies in the way companies operate, compete and do business, familiarity with information systems has become indispensable for the leaders of today and tomorrow's organizations.


An Interview With The Scorpion: Walter O’Brien, Walter O'Brien Nov 2016

An Interview With The Scorpion: Walter O’Brien, Walter O'Brien

The STEAM Journal

An interview with Walter O'Brien (hacker handle: "Scorpion"), known as a businessman, information technologist, executive producer, and media personality who is the founder and CEO of Scorpion Computer Services, Inc. O'Brien is also the inspiration for and executive producer of the CBS television series, Scorpion.


Improving Business Networking Through The Effective Utilisation Of Information Systems, Ylber Limani Oct 2016

Improving Business Networking Through The Effective Utilisation Of Information Systems, Ylber Limani

UBT International Conference

This Research addresses topics concerned with the enterprise models and information systems. The research is divided into two parts, in the first part is conducted the examination of business information systems in general, while in the second part the main factors of business networking are investigated.

The existing operational business practices and Information Technology infrastructure are not sufficiently used of efficiently sustain the effective business networking. A methodical analysis of the operational systems is performed in order to cover the main elements of the Information Systems and their utilisation for business needs. The implementation of a most important information business …


The Implementation Of Information Systems In Network Administration: The Improvement Of Intranet Utilization In Higher Education Institutions, Besnik Skenderi, Murat Retkoceri, Rina Sadriu Oct 2016

The Implementation Of Information Systems In Network Administration: The Improvement Of Intranet Utilization In Higher Education Institutions, Besnik Skenderi, Murat Retkoceri, Rina Sadriu

UBT International Conference

Management Information systems or MIS broadly refers to a Computer system of Information that provides manager the tool to organize, Asses and manage efficiently departments within an organization.

Information System Management serves to assist in the more effective and efficient management of information. These systems make possible the production and preservation.

Nowadays the business, institutions and organization use MIS to certain functions or the entire organization. Some of the most important applicants are in dimensions or functions such as human resources, finance, marketing, manufacturing, asset management etc.

The primary definition shows that the primary task of management information system (MIS. …


Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson Jan 2016

Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson

CCE Theses and Dissertations

The overall security posture of information systems (IS) depends on the behaviors of the IS users. Several studies have shown that users are the greatest vulnerability to IS security. The proliferation of smartphones is introducing an entirely new set of risks, threats, and vulnerabilities. Smartphone devices amplify this data exposure problem by enabling instantaneous transmission and storage of personally identifiable information (PII) by smartphone users, which is becoming a major security risk. Moreover, companies are also capitalizing on the availability and powerful computing capabilities of these smartphone devices and developing a bring-your-own-device (BYOD) program, which makes companies susceptible to divulgence …


Evaluating The Enterprise Resource Planning (Erp) Systems’ Success At The Individual Level Of Analysis In The Middle East, Mohammad Alzoubi Jan 2016

Evaluating The Enterprise Resource Planning (Erp) Systems’ Success At The Individual Level Of Analysis In The Middle East, Mohammad Alzoubi

CCE Theses and Dissertations

Although ERP systems have been depicted as a solution in many organizations, there are many negative reports on ERP success, benefits, and effect on user’s performance. Previous research noted that there is a lack of knowledge and awareness of ERP systems and their overall value to ERP organizations. ERP systems have been widely studied during the past decade, yet they often fail to deliver the intended benefits originally expected. One notable reason for their failures is the lack of understanding in users’ requirements. This dissertation study was designed to understand the relative importance of system quality (SQ), IQ (IQ), service …


Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig Jan 2016

Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig

CCE Theses and Dissertations

Hackers external to the organization continue to wreak havoc upon the information systems infrastructure of firms through breaches of security defenses, despite constant development of and continual investment in new IS security countermeasures by security professionals and vendors. These breaches are exceedingly costly and damaging to the affected organizations. The continued success of hackers in the face of massive amounts of security investments suggests that the defenders are losing and that the hackers can innovate at a much faster pace.

Underground hacker communities have been shown to be an environment where attackers can learn new techniques and share tools pertaining …


On Neighborhood Effects In Location-Based Social Networks, Thanh-Nam Doan, Freddy Chong-Tat Chua, Ee-Peng Lim Dec 2015

On Neighborhood Effects In Location-Based Social Networks, Thanh-Nam Doan, Freddy Chong-Tat Chua, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

In this paper, we analyze factors that determine the check-in decisions of users on venues using a location-based social network dataset. Based on a Foursquare dataset constructed from Singapore-based users, we devise a stringent criteria to identify the actual home locations of a subset of users. Using these users' check-ins, we aim to ascertain the neighborhood effect on the venues visited, compared with the activity level of users. We further formulate the check-in count prediction and check-in prediction tasks. A comprehensive set of features have been defined and they encompass information from users, venues, their neighbors, and friendship networks. We …


Continuous Monitoring Of Enterprise Risks: A Delphi Feasibility Study, Robert Baksa May 2015

Continuous Monitoring Of Enterprise Risks: A Delphi Feasibility Study, Robert Baksa

Dissertations

A constantly evolving regulatory environment, increasing market pressure to improve operations, and rapidly changing business conditions are creating the need for ongoing assurance that organizational risks are continually and adequately mitigated. Enterprises are perpetually exposed to fraud, poor decision making and/or other inefficiencies that can lead to significant financial loss and/or increased levels of operating risk. Increasingly, Information Systems are being harnessed to reinvent the risk management process. One promising technology is Continuous Auditing, which seeks to transform the audit process from periodic reviews of a few transactions to a continuous review of all transactions. However, the highly integrated, rapidly …


Communication Constructs That Influence Information Technology Project Failure, Vanessa Lajuan Ruth Mackey Jan 2015

Communication Constructs That Influence Information Technology Project Failure, Vanessa Lajuan Ruth Mackey

Walden Dissertations and Doctoral Studies

Ineffective communication behavioral constructs in the workplace that lead to information technology (IT) project failure and in some cases organization failure are increasingly becoming a management concern. Despite this trend, there is little research on the communication behavioral constructs that contribute to IT project failure rates. The purpose of this phenomenological study was to explore the lived experiences of business analysts, programmers, and programmer analysts pertaining to the behavioral constructs associated with effective and ineffective communication. The research questions addressed these behaviors from a conceptual framework based on communication theory, organizational information processing theory, and critical social theory. This framework …


Assessing The Fit Between Child Welfare Information Systems And Frontline Workers: Development Of A Task-Technology Fit Instrument, Kurt William Heisler Jul 2014

Assessing The Fit Between Child Welfare Information Systems And Frontline Workers: Development Of A Task-Technology Fit Instrument, Kurt William Heisler

Health Services Research Dissertations

States and the federal government continue to invest heavily in child welfare information systems (CWIS) to improve caseworkers' performance, but the extent to which these systems meet caseworkers' needs is unclear. In the field of child welfare there are no reliable user-evaluation measures states can use to assess the degree to which a CWIS meets caseworkers' needs, and identify which specific features of the CWIS most need improvement. The study developed such a measure based on the task-technology fit (TTF) framework, which posits that users will evaluate the usefulness of a technology based on how well it meets their tasks …


Workforce Preparedness Of Information Systems Students: Perceptions Of Students, Alumni, And Employers, Susan Bristow Dec 2013

Workforce Preparedness Of Information Systems Students: Perceptions Of Students, Alumni, And Employers, Susan Bristow

Graduate Theses and Dissertations

Employers of newly hired higher education graduates report their new workforce is not prepared. Further research was required to discover insights to the workforce readiness gap. This concurrent mixed methods study explored what competencies influenced employer's perceptions of the work-readiness of Information Systems (ISYS) undergraduate students and discovered ISYS graduates' and current ISYS students' perceptions of their work-readiness. Participants consisted of a convenience sample including 69 ISYS program upperclassmen, 20 ISYS program alumni, and 8 employers of the ISYS program graduates. ISYS program alumni completed an online Qualtrics survey to measure the participants' perception of their workforce preparedness. ISYS program …


Designing An Mis Database For Selection And Recruitment, Umakant Mishra Sep 2013

Designing An Mis Database For Selection And Recruitment, Umakant Mishra

Umakant Mishra

Selection and recruitment is a key HR function and it is often necessary to maintain at least a small database of all the candidates who have been invited in past interviews. This information may be considered as a part of HR MIS and may be maintained by HR department along with other HR MIS such as employee information, transfers, performance appraisals, trainings etc.

This recruitment MIS database includes all the candidates after the preliminary scrutiny is over. When the candidates go through different stages of interviews, the MIS also captures all their interview results. Maintaining this information not only helps …


Management Information Systems Vs. Other Information Systems, Umakant Mishra Aug 2013

Management Information Systems Vs. Other Information Systems, Umakant Mishra

Umakant Mishra

A Management Information System (MIS) is a systematic organization and presentation of information that is generally required by the management of an organization. In one sense MIS is a part or subset of the Information Management System of an Organization. There are different types of information systems such as, Transaction Processing System (TPS), Decision Support System (DSS), Executive Support System (ESS) etc. having some differences and some overlapping.

MIS is different from DSS as the later uses unstructured data to take non-standard decisions. MIS is different from TPS and the later is used for day-to-day transactions of the organization. Thus …


How To Implement Access Rights In An Mis Project, Umakant Mishra Aug 2013

How To Implement Access Rights In An Mis Project, Umakant Mishra

Umakant Mishra

The MIS data is critical to an organization and should be protected from misuse by wrong persons. Although The MIS data is typically meant for the senior managers each MIS report may not be required by every manager. The access to MIS data is determined by the role of an individual in the organization and controlled by the MIS administrator accordingly. The access is generally determined by the following parameters, (a) the type of user (such as staff or manager etc.), (b) the type of data (whether general data or managerial data), (c) level of access (read/ write/ admin access) …


Wikis: Transactive Memory Systems In Digital Form, Paul Jackson Jan 2012

Wikis: Transactive Memory Systems In Digital Form, Paul Jackson

Research outputs 2012

Wikis embed information about authors, tags, hyperlinks and other metadata into the information they create. Wiki functions use this metadata to provide pointers which allow users to track down, or be informed of, the information they need. In this paper we provide a firm theoretical conceptualization for this type of activity by showing how this metadata provides a digital foundation for a Transactive Memory System (TMS). TMS is a construct from group psychology which defines directory-based knowledge sharing processes to explain the phenomenon of "group mind". We analyzed the functions and data of two leading Wiki products to understand where …


Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby Aug 2009

Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby

International Conference on Information and Communication Technologies

Information technology forms an important part of the healthcare solution. Accurate and up-to-date information is essential to continuous quality improvement in any organization, and particularly so in an area as complex as healthcare. Therefore, diverse information systems must be integrated across the healthcare enterprise. The knowledge base in the medical field is large, complex, and growing rapidly. It includes scientific knowledge, as well as familiarity with the day-to-day business of providing healthcare. It is crucial to identify the processes in the healthcare sector that would most benefit from the support of information technology. This study is focused on the analysis …


Ore: A Framework To Measure Organizational Risk During Information Systems Evolution, Aditya Agrawal, Gavin Finnie, Padmanabhan Krishnan Jan 2009

Ore: A Framework To Measure Organizational Risk During Information Systems Evolution, Aditya Agrawal, Gavin Finnie, Padmanabhan Krishnan

Padmanabhan Krishnan

Information systems (IS) change initiatives often represent the single largest investment (and therefore risk) for large corporations, yet there exist few management frameworks in the literature to help decision makers measure organizational risk in a balanced manner during this organization-wide change process. The ORE framework has been developed as a design science artifact based on the Leavitt diamond paradigm as a multi-criteria, relative risk, condition consequence, management decision framework enabling decision makers to calculate and compare risk evolution at fixed points of the change cycle and make structured and balanced risk mitigation decisions. In this chapter the principles, architecture and …


The Impact On Organizational Performance Of Contextual Factors, Strategy And Management Control Systems, Nazmi Saeb Jarrar Jan 2009

The Impact On Organizational Performance Of Contextual Factors, Strategy And Management Control Systems, Nazmi Saeb Jarrar

Theses: Doctorates and Masters

This dissertation examined antecedents of the use of contemporary management control systems (MCS) by testing the alignment of strategic and contextual variables with variables of contemporary systems of control in the organization. The study further explored the performance consequences of the implementation of these control systems, and the manner in which strategy can influence the organization’s control culture and management accounting practices. The impact of contextual factors, notably size and structural arrangements, such as decentralization and diversification, on management's choice of control systems were also examined. Hence, the study addressed the need for a better understanding of the association between …


Relative Importance, Specific Investment And Ownership In Interorganizational Systems., Kunsoo Han, Robert J. Kauffman, Barrie R. Nault Sep 2008

Relative Importance, Specific Investment And Ownership In Interorganizational Systems., Kunsoo Han, Robert J. Kauffman, Barrie R. Nault

Research Collection School Of Computing and Information Systems

Implementation and maintenance of interorganizational systems (IOS) require investments by all the participating firms. Compared with intraorganizational systems, however, there are additional uncertainties and risks. This is because the benefits of IOS investment depend not only on a firm's own decisions, but also on those of its business partners. Without appropriate levels of investment by all the firms participating in an IOS, they cannot reap the full benefits. Drawing upon the literature in institutional economics, we examine IOS ownership as a means to induce value-maximizing noncontractible investments. We model the impact of two factors derived from the theory of incomplete …


The Impact Of Cultural Differences In Temporal Perception On Global Software Development Teams, Richard William Egan May 2008

The Impact Of Cultural Differences In Temporal Perception On Global Software Development Teams, Richard William Egan

Dissertations

This dissertation investigated the impact of cultural differences in temporal perception on globally dispersed software development teams. Literature and anecdotal evidence suggest that these temporal differences affect individual communication quality, which in turn will affect individual satisfaction and trust within global teams. Additionally, the temporal dispersion of the team was expected to affect an individual's sense of temporal disruption which, in turn, was expected to affect individual satisfaction and trust. Differences in temporal perception were expected to moderate this impact on perceived temporal disruption. A Fortune 100 Company that carried out software testing in Ireland, the United States, China and …


Supporting Individual Time Management Through The Capture And Display Of Temporal Structures, Dezhi Wu Aug 2005

Supporting Individual Time Management Through The Capture And Display Of Temporal Structures, Dezhi Wu

Dissertations

This thesis work examines the time management strategies of individuals in an academic institution and gathers information on the complex temporal structures they experience and manage. Its focus is on understanding the relationship between the quality of individual time management and an individual's understanding and use of temporal structures. This work consists of an exploratory field study to gather data on how people use temporal structures with electronic tools. It is followed by a survey that is given to a larger group of respondents in the same subject population examined with the field study. The survey examines the hypotheses developed …