Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 361 - 390 of 6597

Full-Text Articles in Physical Sciences and Mathematics

An Empirical Assessment Of The Use Of Password Workarounds And The Cybersecurity Risk Of Data Breaches, Michael Joseph Rooney Jan 2023

An Empirical Assessment Of The Use Of Password Workarounds And The Cybersecurity Risk Of Data Breaches, Michael Joseph Rooney

CCE Theses and Dissertations

Passwords have been used for a long time to grant controlled access to classified spaces, electronics, networks, and more. However, the dramatic increase in user accounts over the past few decades has exposed the realization that technological measures alone cannot ensure a high level of IS security; this leaves the end-users holding a critical role in protecting their organization and personal information. The increased use of IS as a working tool for employees increases the number of accounts and passwords required. Despite being more aware of password entropy, users still often participate in deviant password behaviors, known as ‘password workarounds’ …


Assessing Spurious Correlations In Big Search Data, Jesse T. Richman, Ryan J. Roberts Jan 2023

Assessing Spurious Correlations In Big Search Data, Jesse T. Richman, Ryan J. Roberts

Political Science & Geography Faculty Publications

Big search data offers the opportunity to identify new and potentially real-time measures and predictors of important political, geographic, social, cultural, economic, and epidemiological phenomena, measures that might serve an important role as leading indicators in forecasts and nowcasts. However, it also presents vast new risks that scientists or the public will identify meaningless and totally spurious ‘relationships’ between variables. This study is the first to quantify that risk in the context of search data. We find that spurious correlations arise at exceptionally high frequencies among probability distributions examined for random variables based upon gamma (1, 1) and Gaussian random …


Learning Large Neighborhood Search For Vehicle Routing In Airport Ground Handling, Jianan Zhou, Yaoxin Wu, Zhiguang Cao, Wen Song, Jie Zhang, Zhenghua Chen Jan 2023

Learning Large Neighborhood Search For Vehicle Routing In Airport Ground Handling, Jianan Zhou, Yaoxin Wu, Zhiguang Cao, Wen Song, Jie Zhang, Zhenghua Chen

Research Collection School Of Computing and Information Systems

Dispatching vehicle fleets to serve flights is a key task in airport ground handling (AGH). Due to the notable growth of flights, it is challenging to simultaneously schedule multiple types of operations (services) for a large number of flights, where each type of operation is performed by one specific vehicle fleet. To tackle this issue, we first represent the operation scheduling as a complex vehicle routing problem and formulate it as a mixed integer linear programming (MILP) model. Then given the graph representation of the MILP model, we propose a learning assisted large neighborhood search (LNS) method using data generated …


Relationship Between Strategic Dexterity, Absorptive Capacity, And Competitive Advantage, Ifechide Monyei Jan 2023

Relationship Between Strategic Dexterity, Absorptive Capacity, And Competitive Advantage, Ifechide Monyei

Walden Dissertations and Doctoral Studies

Small- and medium-sized enterprise (SME) manufacturing executives and managers are concerned with the rapid technological changes involving artificial intelligence (AI), machine learning, and big data. To compete in the global landscape, effectively managing digital and artificial intelligence changes among SME manufacturing executives and managers is critical for leaders to compete in 2023 and beyond. Grounded in the dynamic capabilities view theory, the purpose of this quantitative correlation study was to examine the relationship between strategic dexterity, absorptive capacity, and competitive advantage. The participants were 66 executives and managers of SME manufacturing organizations who use big data and analytics daily and …


Strategies Information Technology Managers Use To Retain Qualified Information Technology Employees, Wayne Arnold Reu Jan 2023

Strategies Information Technology Managers Use To Retain Qualified Information Technology Employees, Wayne Arnold Reu

Walden Dissertations and Doctoral Studies

Retaining qualified information technology (IT) personnel can take time and effort, given the high demand for skilled positions. Business leaders are concerned with the high turnover of IT employees because of the cost of recruiting and training personnel and the disruption to organizational processes and performance. Grounded in job characteristics theory, the purpose of this qualitative pragmatic inquiry was to explore IT managers' strategies to retain qualified IT employees in organizations across the southwestern United States. Eight IT leaders participated because of their years of experience implementing strategies to retain qualified IT professionals. Data were collected using semistructured interviews and …


Effective Strategies For Using Telecommuting By Owners Of Small Businesses, Thomas Law Jan 2023

Effective Strategies For Using Telecommuting By Owners Of Small Businesses, Thomas Law

Walden Dissertations and Doctoral Studies

Small business owners who lack effective strategies to incorporate telecommuting may be unable to retain teleworking employees, create a flexible working environment, or improve workforce morale, negatively impacting company productivity and profitability. Grounded in transformational leadership theory and sociotechnical systems theory, the purpose of this qualitative multiple case study was to explore strategies small business owners use to incorporate telecommuting to retain teleworking employees. Data were collected from five small business owners in Texas with at least 1 year of management experience and created and maintained remote working strategies. Data collection included semistructured interviews and company documents. Three themes emerged …


Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda Jan 2023

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda

Walden Dissertations and Doctoral Studies

All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …


A Sociotechnical Systems View Of Computer Self-Efficacy And Usability Determinants Of Technical Readiness, Stefani L. Tucker Jan 2023

A Sociotechnical Systems View Of Computer Self-Efficacy And Usability Determinants Of Technical Readiness, Stefani L. Tucker

Walden Dissertations and Doctoral Studies

The specific research problem was that it is unknown whether computer self-efficacy and usability determine technical readiness in hourly and exempt information technology support employees in the United States. The purpose of this correlational study was to examine the relationship between computer self-efficacy and technical readiness, usability and technical readiness, and computer self-efficacy, usability, and technical readiness in hourly and exempt information technology support employees in the United States. Sociotechnical system theory suggests that every transaction has a human and technical aspect; thus, the theoretical framework. The convenience sample included 136 information technology support employees aged 18-70. The regression results …


Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore Jan 2023

Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore

Walden Dissertations and Doctoral Studies

Some small businesses’ cybersecurity analysts lack strategies to prevent their organizations from compromising personally identifiable information (PII) via external cybersecurity threats. Small business leaders are concerned, as they are the most targeted critical infrastructures in the United States and are a vital part of the economic system as data breaches threaten the viability of these organizations. Grounded in routine activity theory, the purpose of this pragmatic qualitative inquiry was to explore strategies small business organizations utilize to prevent external cybersecurity threats. The participants were nine cybersecurity analysts who utilized strategies to defend small businesses from external threats. Data were collected …


Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore Jan 2023

Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore

Walden Dissertations and Doctoral Studies

Some small businesses’ cybersecurity analysts lack strategies to prevent their organizations from compromising personally identifiable information (PII) via external cybersecurity threats. Small business leaders are concerned, as they are the most targeted critical infrastructures in the United States and are a vital part of the economic system as data breaches threaten the viability of these organizations. Grounded in routine activity theory, the purpose of this pragmatic qualitative inquiry was to explore strategies small business organizations utilize to prevent external cybersecurity threats. The participants were nine cybersecurity analysts who utilized strategies to defend small businesses from external threats. Data were collected …


Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda Jan 2023

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda

Walden Dissertations and Doctoral Studies

All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …


Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo Jan 2023

Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo

Walden Dissertations and Doctoral Studies

Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …


Invasive Buckthorn Mapping: A Uav-Based Approach Utilizing Machine Learning, Gis, And Remote Sensing Techniques In The Upper Peninsula Of Michigan, Vikranth Madeppa Jan 2023

Invasive Buckthorn Mapping: A Uav-Based Approach Utilizing Machine Learning, Gis, And Remote Sensing Techniques In The Upper Peninsula Of Michigan, Vikranth Madeppa

Dissertations, Master's Theses and Master's Reports

An Invasive species is a species that is alien or non-native to the ecosystem which causes harm to economic, environmental, or human health (E.O. 13112 of Feb 3, 1999). Invasive species have posed a serious threat to ecosystems across the globe. These invasive species have impacts on the biodiversity and productivity of invaded forests. Remotely sensed data is a valuable resource for understanding and addressing issues related to invasive species. This study presents a novel approach for mapping the distribution of two invasive plant species, Common and Glossy Buckthorn, using unmanned aerial vehicles (UAVs), machine learning algorithms, geographic information systems …


Dual-View Preference Learning For Adaptive Recommendation, Zhongzhou Liu, Yuan Fang, Min Wu Jan 2023

Dual-View Preference Learning For Adaptive Recommendation, Zhongzhou Liu, Yuan Fang, Min Wu

Research Collection School Of Computing and Information Systems

While recommendation systems have been widely deployed, most existing approaches only capture user preferences in the , i.e., the user's general interest across all kinds of items. However, in real-world scenarios, user preferences could vary with items of different natures, which we call the . Both views are crucial for fully personalized recommendation, where an underpinning macro-view governs a multitude of finer-grained preferences in the micro-view. To model the dual views, in this paper, we propose a novel model called Dual-View Adaptive Recommendation (DVAR). In DVAR, we formulate the micro-view based on item categories, and further integrate it with the …


Champions For Social Good: How Can We Discover Social Sentiment And Attitude-Driven Patterns In Prosocial Communication?, Raghava Rao Mukkamala, Robert J. Kauffman, Helle Zinner Henriksen Jan 2023

Champions For Social Good: How Can We Discover Social Sentiment And Attitude-Driven Patterns In Prosocial Communication?, Raghava Rao Mukkamala, Robert J. Kauffman, Helle Zinner Henriksen

Research Collection School Of Computing and Information Systems

The UN High Commissioner on Refugees (UNHCR) is pursuing a social media strategy to inform people about displaced populations and refugee emergencies. It is actively engaging public figures to increase awareness through its prosocial communications and improve social informedness and support for policy changes in its services. We studied the Twitter communications of UNHCR social media champions and investigated their role as high-profile influencers. In this study, we offer a design science research and data analytics framework and propositions based on the social informedness theory we propose in this paper to assess communication about UNHCR’s mission. Two variables—refugee-emergency and champion …


Wikipedia Web Table Interpretation, Keyword-Based Search, And Ranking, Kartikee Dabir Jan 2023

Wikipedia Web Table Interpretation, Keyword-Based Search, And Ranking, Kartikee Dabir

Master's Projects

Information retrieval and data interpretation on the web, for the purpose of gaining knowledgeable insights, has been a widely researched topic from the onset of the world wide web or what is today popularly known as the internet. Web tables are structured tabular data present amidst unstructured, heterogenous data on the web. This makes web tables a rich source of information for a variety of tasks like data analysis, data interpretation, and information retrieval pertaining to extracting knowledge from information present on the web. Wikipedia tables which are a subset of web tables hold a huge amount of useful data, …


High Performance Distributed File System Based On Blockchain, Ajinkya Rajguru Jan 2023

High Performance Distributed File System Based On Blockchain, Ajinkya Rajguru

Master's Projects

Distributed filesystem architectures use commodity hardware to store data on a large scale with maximum consistency and availability. Blockchain makes it possible to store information that can never be tampered with and incentivizes a traditional decentralized storage system. This project aimed to implement a decentralized filesystem that leverages the blockchain to keep a record of all the transactions on it. A conventional filesystem viz. GFS [1] or HDFS [2] uses designated servers owned by their organization to store the data and are governed by a master service. This project aimed at removing a single point of failure and makes use …


Robust Cache System For Web Search Engine Yioop, Rushikesh Padia Jan 2023

Robust Cache System For Web Search Engine Yioop, Rushikesh Padia

Master's Projects

Caches are the most effective mechanism utilized by web search engines to optimize the performance of search queries. Search engines employ caching at multiple levels to improve its performance, for example, caching posting list and caching result set. Caching query results reduces overhead of processing frequent queries and thus saves a lot of time and computing power. Yioop is an open-source web search engine which utilizes result cache to optimize searches. The current implementation utilizes a single dynamic cache based on Marker’s algorithm. The goal of the project is to improve the performance of cache in Yioop. To choose a …


Nosql Databases In Kubernetes, Parth Sandip Mehta Jan 2023

Nosql Databases In Kubernetes, Parth Sandip Mehta

Master's Projects

With the increasing popularity of deploying applications in containers, Kubernetes (K8s) has become one of the most accepted container orchestration systems. Kubernetes helps maintain containers smoothly and simplifies DevOps with powerful automations. It was originally developed as a tool to manage stateless microservices that run seamlessly in containers. The ephemeral nature of pods, the smallest deployable unit, in Kubernetes was well-aligned with stateless applications since destroying and recreating pods didn’t impact applications. There was a need to provision solutions around stateful workloads like databases so as to take advantage of K8s. This project explores this need, the challenges associated and …


Graph Deep Learning Based Hashtag Recommender For Reels On Social Media, Sriya Balineni Jan 2023

Graph Deep Learning Based Hashtag Recommender For Reels On Social Media, Sriya Balineni

Master's Projects

Many businesses, including Facebook, Netflix, and YouTube, rely heavily on a recommendation system. Recommendation systems are algorithms that attempt to provide consumers with relevant suggestions for items such as movies, videos, or reels (microvideos) to watch, hashtags for their posts, songs to listen to, and products to purchase. In many businesses, recommender systems are essential because they can generate enormous amounts of revenue and make the platform stand out when compared to others. Reels are a feature of the social media platforms that enable users to create and share videos of up to sixty seconds in length. Individuals, businesses, and …


Progenitor Cell Isolation From Mouse Epididymal Adipose Tissue And Sequencing Library Construction, Qianglin Liu, Chaoyang Li, Yuxia Li, Leshan Wang, Xujia Zhang, Buhao Deng, Peidong Gao, Mohammad Shiri, Fozi Alkaifi, Junxing Zhao, Jacqueline M. Stephens, Constantine A. Simintiras, Joseph Francis, Jiangwen Sun, Xing Fu Jan 2023

Progenitor Cell Isolation From Mouse Epididymal Adipose Tissue And Sequencing Library Construction, Qianglin Liu, Chaoyang Li, Yuxia Li, Leshan Wang, Xujia Zhang, Buhao Deng, Peidong Gao, Mohammad Shiri, Fozi Alkaifi, Junxing Zhao, Jacqueline M. Stephens, Constantine A. Simintiras, Joseph Francis, Jiangwen Sun, Xing Fu

Computer Science Faculty Publications

Here, we present a protocol to isolate progenitor cells from mouse epididymal visceral adipose tissue and construct bulk RNA and assay for transposase-accessible chromatin with sequencing (ATAC-seq) libraries. We describe steps for adipose tissue collection, cell isolation, and cell staining and sorting. We then detail procedures for both ATAC-seq and RNA sequencing library construction. This protocol can also be applied to other tissues and cell types directly or with minor modifications.

For complete details on the use and execution of this protocol, please refer to Liu et al. (2023).1

*1 Liu, Q., Li, C., Deng, B., Gao, P., …


Strategies Information Technology Leaders Used In Implementing Remote Work During The Covid-19, Jouliana Kamal Barghouth Jan 2023

Strategies Information Technology Leaders Used In Implementing Remote Work During The Covid-19, Jouliana Kamal Barghouth

Walden Dissertations and Doctoral Studies

With the imposed lockdown in many countries due to the spread of COVID-19, many leaders were forced to adopt online technologies in transitioning employees to remote work. Leaders not adopting online technologies or remote work during a pandemic are highly susceptible to business closure. Grounded in the technology acceptance model, the purpose of this qualitative single case study was to explore strategies information technology (IT) leaders in Kuwait used to successfully transition employees to remote work during the pandemic. The participants were six IT leaders from a single multinational IT organization who contributed to strategy development during the pandemic to …


Diversification Strategies Business Managers Use To Improve Profitability, Kayode Itiola Jan 2023

Diversification Strategies Business Managers Use To Improve Profitability, Kayode Itiola

Walden Dissertations and Doctoral Studies

A lack of diversification strategies can negatively impact business profitability. Business managers of small and medium-sized enterprises who implement appropriate diversification strategies can improve business profitability, ensuring the firm’s sustainability. Grounded in the modern portfolio theory, the purpose of this qualitative single case study was to explore diversification strategies business managers use to improve profitability. The participants were five business managers who successfully used diversification strategies to enhance business profitability. Sources for data collection were semi-structured interviews, company archival documents, and field notes. Data were analyzed using thematic analysis. Four themes emerged: concentric diversification strategy, horizontal diversification strategy, customer needs …


Understanding U.S. Customers' Intention To Adopt Robo-Advisor Technology, Deborah Wall Jan 2023

Understanding U.S. Customers' Intention To Adopt Robo-Advisor Technology, Deborah Wall

Walden Dissertations and Doctoral Studies

Finance and information technology scholars wrote that there is a literature gap on what factors drive investors in Western financial markets to use a Robo-advisor to manage their investments. The purpose of this qualitative, single case study with embedded units is to understand the adoption intentions of retail investors in U.S. markets to use a Robo-advisor instead of a human advisor. A single case study design addressed the literature gap, and qualitative data from seven semi=structured interviews, reflective field notes, and archival data were triangulated to answer the research question. This study was grounded in a theoretical framework that includes …


Effective Strategies For Using Telecommuting By Owners Of Small Businesses, Thomas Law Jan 2023

Effective Strategies For Using Telecommuting By Owners Of Small Businesses, Thomas Law

Walden Dissertations and Doctoral Studies

Small business owners who lack effective strategies to incorporate telecommuting may be unable to retain teleworking employees, create a flexible working environment, or improve workforce morale, negatively impacting company productivity and profitability. Grounded in transformational leadership theory and sociotechnical systems theory, the purpose of this qualitative multiple case study was to explore strategies small business owners use to incorporate telecommuting to retain teleworking employees. Data were collected from five small business owners in Texas with at least 1 year of management experience and created and maintained remote working strategies. Data collection included semistructured interviews and company documents. Three themes emerged …


Knowledge-Sharing Practice As A Tool In Organizational Development In Nigerian Higher Educational Institutions, Emmanuel Ajiri Ojo Jan 2023

Knowledge-Sharing Practice As A Tool In Organizational Development In Nigerian Higher Educational Institutions, Emmanuel Ajiri Ojo

Walden Dissertations and Doctoral Studies

AbstractUnderstanding knowledge management is key to understanding organizational development and innovations. Inadequate knowledge-sharing practices in Nigerian educational institutions has impeded innovation and management development. The purpose of this qualitative modified Delphi study was to seek consensus among administrators from Nigerian educational institutions and scholars from Nigerian universities regarding knowledge-sharing practices that nourish innovation in Nigerian higher educational institutions. The organizational development framework was used to guide the study. Data collection included a nonprobability purposive sampling of 25 participants and three rounds of surveys administered online. A consensus was reached on eight factors after coding and thematic analysis: setting knowledge-sharing expectations, …


Developing Consensus On The Use Of Emotional Intelligence Training In Small Utility Companies, Nathaniel E. Holloway Jan 2023

Developing Consensus On The Use Of Emotional Intelligence Training In Small Utility Companies, Nathaniel E. Holloway

Walden Dissertations and Doctoral Studies

Park and Shaw shared the impact on organizations from unmotivated and unsatisfied employees link to higher turnover ratios. The use of emotional intelligence in manager training lowered employee turnover by 13%. The problem address in this Delphi study was that small utility companies do not have an emotional intelligence plan in place for managerial training. Goleman and Mayer’s framework was used as the theorical lens for examining response of participants to the Delphi study. A panel of experts submitted data in the form of responses to three rounds of questions regarding the use of emotional intelligence training in small businesses. …


Campus Safety Data Gathering, Classification, And Ranking Based On Clery-Act Reports, Walaa F. Abo Elenin Jan 2023

Campus Safety Data Gathering, Classification, And Ranking Based On Clery-Act Reports, Walaa F. Abo Elenin

Electronic Theses and Dissertations

Most existing campus safety rankings are based on criminal incident history with minimal or no consideration of campus security conditions and standard safety measures. Campus safety information published by universities/colleges is usually conceptual/qualitative and not quantitative and are based-on criminal records of these campuses. Thus, no explicit and trusted ranking method for these campuses considers the level of compliance with the standard safety measures. A quantitative safety measure is important to compare different campuses easily and to learn about specific campus safety conditions.

In this thesis, we utilize Clery-Act reports of campuses to automatically analyze their safety conditions and generate …


Ai Usage In Development, Security, And Operations, Maurice Ayidiya Jan 2023

Ai Usage In Development, Security, And Operations, Maurice Ayidiya

Walden Dissertations and Doctoral Studies

Artificial intelligence (AI) has become a growing field in information technology (IT). Cybersecurity managers are concerned that the lack of strategies to incorporate AI technologies in developing secure software for IT operations may inhibit the effectiveness of security risk mitigation. Grounded in the technology acceptance model, the purpose of this qualitative exploratory multiple case study was to explore strategies cybersecurity professionals use to incorporate AI technologies in developing secure software for IT operations. The participants were 10 IT professionals in the United States with at least 5 years of professional experience working in DevSecOps and managing teams of at least …


Sequence Checking And Deduplication For Existing Fingerprint Databases, Tahsin Islam Sakif Jan 2023

Sequence Checking And Deduplication For Existing Fingerprint Databases, Tahsin Islam Sakif

Graduate Theses, Dissertations, and Problem Reports

Biometric technology is a rapidly evolving field with applications that range from access to devices to border crossing and entry/exit processes. Large-scale applications to collect biometric data, such as border crossings result in multimodal biometric databases containing thousands of identities. However, due to human operator error, these databases often contain many instances of image labeling and classification; this is due to the lack of training and throughput pressure that comes with human error. Multiple entries from the same individual may be assigned to a different identity. Rolled fingerprints may be labeled as flat images, a face image entered into a …