Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Physical Sciences and Mathematics

A Comparison Of The Rule And Case-Based Reasoning Approaches For The Automation Of Help-Desk Operations At The Tier-Two Level, Michael Forrester Bryant Jan 2009

A Comparison Of The Rule And Case-Based Reasoning Approaches For The Automation Of Help-Desk Operations At The Tier-Two Level, Michael Forrester Bryant

CCE Theses and Dissertations

This exploratory study investigates the hypothesis that case-based reasoning (CBR) systems have advantages over rule-based reasoning (RBR) systems in providing automated support for Tier-2 help desk operations. The literature suggests that rule-based systems are best suited for problem solving when the system being analyzed is a single-purpose, specialized system and the rules for solving the problems are clear and do not change with high frequency. Case-based systems, because of their ability to offer alternative solutions for a given problem, give help-desk technicians more flexibility. Specifically, this dissertation aims to answer the following questions:

1. Which paradigm, rule-based or case-based reasoning, …


An Analysis Of The Impact Of Information Security Policies On Computer Security Breach Incidents In Law Firms, Faith M. Heikkila Jan 2009

An Analysis Of The Impact Of Information Security Policies On Computer Security Breach Incidents In Law Firms, Faith M. Heikkila

CCE Theses and Dissertations

Law firms maintain and store voluminous amounts of highly confidential and proprietary data, such as attorney-client privileged information, intellectual properties, financials, trade secrets, personal, and other sensitive information. There is an ethical obligation to protect law firm client data from unauthorized access. Security breaches jeopardize the reputation of the law firm and could have a substantial financial impact if these confidential data are compromised. Information security policies describe the security goals of a law firm and the acceptable actions and uses of law firm information resources.

In this dissertation investigation, the author examined the problem of whether information security policies …


A Study Of First- And Continuing-Generation College Students' Use Of Internet Communication Technologies In Social Capital And Its Contribution To Their Persistence In College, Gail Dianne (Hodge) Hayes Jan 2009

A Study Of First- And Continuing-Generation College Students' Use Of Internet Communication Technologies In Social Capital And Its Contribution To Their Persistence In College, Gail Dianne (Hodge) Hayes

CCE Theses and Dissertations

Prior studies have shown that students who are the first in their families to attend college fail to persist in college more so than their continuing-generation (CG) counterparts do. Prior research on this phenomenon has helped to identify various factors that contribute to the lower college persistence of first-generation (FG) students. For example, social capital has been identified as a factor that improves student persistence in college. Prior studies have shown that FG students tend to enter college with lower social capital than their CG student counterparts do. Additionally, while in school, FG students tend not to engage in behaviors …


An Online Community For Computer Technology Support And Training For College Office Support Staff, Mava F. Wilson Jan 2009

An Online Community For Computer Technology Support And Training For College Office Support Staff, Mava F. Wilson

CCE Theses and Dissertations

Educational institutions strive to stay on the edge of technological advances in response to stakeholders' desire to receive value for their investment. Rapid changes in computer technology present a dilemma to colleges and universities in the support and training arena. An important segment of the institutional population, office support staff are vital to the everyday running of departments with extremely diverse responsibilities critical to the institutional mission. Office support staff seem to be left out when support and training programs for new technology are being planned. With technology changing so quickly it is vital that organizations have support and training …


Section 508 Adherence By Industry Professionals: Improving Universal Design Through Training, Antonio Rincon Jan 2009

Section 508 Adherence By Industry Professionals: Improving Universal Design Through Training, Antonio Rincon

CCE Theses and Dissertations

Section 508 of the Rehabilitation Act Amendments of 1998 took effect in 2001 and provides encouragement for universal design and compliance requirements to the federal sector for purchases that are accessible by people with disabilities. A division of General Dynamics Advanced Information Systems (GDAIS) is located in Pittsfield, Massachusetts and provides electronic and information technology solutions to federal customers in the defense, intelligence, and homeland security communities.

The general lack of training is a major factor for low compliance to Section 508. Improving awareness is important at GDAIS in order to increase its federal sales market share, develop new products …


A Model For Using Managed Services In Designing And Supporting A Wireless Local Area Network For The Navy Marine Corps Intranet, Joseph L. Roth Jan 2009

A Model For Using Managed Services In Designing And Supporting A Wireless Local Area Network For The Navy Marine Corps Intranet, Joseph L. Roth

CCE Theses and Dissertations

The purpose and content of this work are to explore the proper strategy on how to deploy multi-service mobile net centric warfare, or FORCEnet, the Navy's concept for Net Centric Warfare. In this research, the author examined where the Navy Marine Corps Intranet (NMCI) fits into this vision and how it is mobile and multi-service compatible. It also explored how low-cost commercial approaches such as IEEE 802.11 wireless local area network technologies can be implemented as a joint notion of Net Centric Warfare in terms of a Service Oriented Architecture (SOA). The problem investigated in this study was to evaluate …


A Formal Concept Analysis Approach To Association Rule Mining: The Quicl Algorithms, David T. Smith Jan 2009

A Formal Concept Analysis Approach To Association Rule Mining: The Quicl Algorithms, David T. Smith

CCE Theses and Dissertations

Association rule mining (ARM) is the task of identifying meaningful implication rules exhibited in a data set. Most research has focused on extracting frequent item (FI) sets and thus fallen short of the overall ARM objective. The FI miners fail to identify the upper covers that are needed to generate a set of association rules whose size can be exploited by an end user. An alternative to FI mining can be found in formal concept analysis (FCA), a branch of applied mathematics. FCA derives a concept lattice whose concepts identify closed FI sets and connections identify the upper covers. However, …


A Model For The Evaluation Of Is/It Investments, Paul M. Tuten Jan 2009

A Model For The Evaluation Of Is/It Investments, Paul M. Tuten

CCE Theses and Dissertations

Evaluation is a vital--yet challenging--part of IS/IT management and governance. The benefits (or lack therefore) associated with IS/IT investments have been widely debated within academic and industrial communities alike. Investments in information technology may or may not result in desirable outcomes. Yet, organizations must rely on information systems to remain competitive. Effective evaluation serves as one pathway to ensuring success. However, despite a growing multitude of measures and methods, practitioners continue to struggle with this intractable problem.

Responding to the limited success of existing methods, scholars have argued that academicians should first develop a better understanding of the process of …


An Investigation Of The Contributions Of Gender, Shopping Orientation, Online Experience, And Website's Interactive Features To Consumers' Intentions To Engage In Apparel E-Commerce Shopping, Amanda Wynn Jan 2009

An Investigation Of The Contributions Of Gender, Shopping Orientation, Online Experience, And Website's Interactive Features To Consumers' Intentions To Engage In Apparel E-Commerce Shopping, Amanda Wynn

CCE Theses and Dissertations

E-commerce has experienced exponential growth within the last few years. The rapid growth of e-commerce has created a need to improve consumer acceptance and the consumer's intention to engage in e-commerce. Female consumers have yet to embrace e-commerce as readily as male consumers. Differences between male and female consumer shopping behavior were examined.

This study developed and empirically tested a model to predict the consumer's intention to engage in apparel e-commerce shopping based on the constructs of gender, shopping orientation, online experience, and Website's interactive features. Male and female U.S. consumers age 18 and older were surveyed to determine their …


Responsibility Factors Of Reducing Inefficiencies In Information System Processes And Their Role On Intention To Acquire Six Sigma Certification, Sara Hejazi Jan 2009

Responsibility Factors Of Reducing Inefficiencies In Information System Processes And Their Role On Intention To Acquire Six Sigma Certification, Sara Hejazi

CCE Theses and Dissertations

Organizations worldwide have been turning to Six Sigma program (SSP) to eliminate the defects in their products or drive out the variability in their processes to attain a competitive advantage in their marketplace. An effective certification program has been touted as a major contributor to successful implementation of SSP. An effective certification program provides the professionals involved with SSP projects a clear understanding of what their responsibilities should be in reducing the variability in their processes. Despite the benefits, a significant number of professionals who attend certification training fail to become certified.

This study aimed to develop a predictive model …


Parallel Mining Of Association Rules Using A Lattice Based Approach, Wessel Morant Thomas Jan 2009

Parallel Mining Of Association Rules Using A Lattice Based Approach, Wessel Morant Thomas

CCE Theses and Dissertations

The discovery of interesting patterns from database transactions is one of the major problems in knowledge discovery in database. One such interesting pattern is the association rules extracted from these transactions. Parallel algorithms are required for the mining of association rules due to the very large databases used to store the transactions. In this paper we present a parallel algorithm for the mining of association rules. We implemented a parallel algorithm that used a lattice approach for mining association rules. The Dynamic Distributed Rule Mining (DDRM) is a lattice-based algorithm that partitions the lattice into sublattices to be assigned to …


Design, Development, And Implementation Of A Wireless Local Area Network (Wlan): The Hartford Job Corps Academy Case Study, Tracey Kershner Cooley Jan 2009

Design, Development, And Implementation Of A Wireless Local Area Network (Wlan): The Hartford Job Corps Academy Case Study, Tracey Kershner Cooley

CCE Theses and Dissertations

Wireless Local Area Networks (WLANs) offer flexibility, mobility, and scalability to educational institutions. Students are increasingly expecting anywhere, anytime access to online resources. Secondary school administrators, who serve a similar population as the National Job Corps Program (NJCP), realize that student success in the 21st century workplace depends upon the student's ability to use new and emerging technologies, including wireless technology. Computer access anytime and anywhere is crucial to the success of students today.

Wireless technology has been broadly deployed at educational institutions, such as the Hartford Job Corps Academy (HJCA), but little is known about how these networks are …


An Investigation Of Training In Creative Problem Solving And Its Relationship To Affective And Effective Idea Generation Of Entrepreneurial Learners, Charles Edward Leach Jan 2009

An Investigation Of Training In Creative Problem Solving And Its Relationship To Affective And Effective Idea Generation Of Entrepreneurial Learners, Charles Edward Leach

CCE Theses and Dissertations

A significant proportion of the population engages in entrepreneurial behavior but many ventures do not survive beyond startup thus decreasing the pool of entrepreneurs available to contribute to the economy. Opportunity recognition is central to entrepreneurial success and the improper delineation of opportunities is cited as a leading cause of venture failure. There is a logical link between creativity, innovation and entrepreneurship. The goal of the researcher in this study was to explore the relationships between CPS training and the generation of entrepreneurial ideas.

The investigation studied the relationship of training in creative problem solving (CPS) to the opportunity identification …


Administrative Support For Online Teaching Faculty, John David Meyer Jan 2009

Administrative Support For Online Teaching Faculty, John David Meyer

CCE Theses and Dissertations

When administrators make decisions about the infrastructure support needs of a current or planned online teaching program, these decisions are often based on external expert advice rather than on the advice of experienced ground level faculty who are living with the dynamic nature of the technology and support needed to develop and maintain an effective online teaching program. Online teaching faculty are the best source of advice and information on what works and what does not.

Faculty at the Medical College of Georgia (MCG) were surveyed to find out what elements are important to the development of an effective online …