Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 28 of 28

Full-Text Articles in Physical Sciences and Mathematics

Organizational Culture And Knowledge Transfer In Enterprise Social Media, Garry Blackstock Jan 2020

Organizational Culture And Knowledge Transfer In Enterprise Social Media, Garry Blackstock

CCE Theses and Dissertations

Enterprise social media (ESM), digital platforms used within organizations to facilitate knowledge sharing and collaboration, are valuable tools that can help organizations gain a competitive advantage. Efficient retention, dissemination, and transfer of knowledge is an industry differentiator, and companies are spending a tremendous amount of resources on ESM to achieve this discriminating advantage. The behavior of transferring knowledge, especially tacit knowledge, can be a challenging task. Discordant organizational culture has been identified as a barrier to efficient knowledge transfer, whether it is explicit or tacit. Despite ESM’s positive track record of promoting communication, it lacks the efficiency to facilitate knowledge …


The Influence Of Cognitive Factors And Personality Traits On Mobile Device User's Information Security Behavior, Nils Lau Jan 2020

The Influence Of Cognitive Factors And Personality Traits On Mobile Device User's Information Security Behavior, Nils Lau

CCE Theses and Dissertations

As individuals have become more dependent on mobile devices to communicate, to seek information, and to conduct business, their susceptibility to various threats to information security has also increased. Research has consistently shown that a user’s intention is a significant antecedent of information security behavior. Although research on user’s intention has expanded in the last few years, not enough is known about how cognitive factors and personality traits impact the adoption and use of mobile device security technologies.

The purpose of this research was to empirically investigate the influence of cognitive factors and personality traits on mobile device user’s intention …


Examining The Creation Of Information Privacy Culture In Healthcare Organizations To Achieve Collective Hipaa Compliance Practice, Osborne Obeng Jan 2020

Examining The Creation Of Information Privacy Culture In Healthcare Organizations To Achieve Collective Hipaa Compliance Practice, Osborne Obeng

CCE Theses and Dissertations

The digitization and transfer of patient records has increased the risk of patient data being improperly handled by healthcare organizations. In light of this growing concern, the United States government and state authorities have implemented various regulations to mitigate the privacy concerns. Beside privacy regulations, healthcare organizations have been forced by other pressures such as organization’s competitive pressures, resources, ethical responsibilities, and legitimacy to implement privacy safeguards. However, surveys show that healthcare organizations fail to achieve information privacy compliance. This study examined the creation of information privacy culture from the different occupational communities in healthcare organizations to help achieve information …


An Approach To Twitter Event Detection Using The Newsworthiness Metric, Jonathan Adkins Jan 2020

An Approach To Twitter Event Detection Using The Newsworthiness Metric, Jonathan Adkins

CCE Theses and Dissertations

No abstract provided.


A Covid-19 Induced Shift: From Introducing High School Females To Computing Careers To An Assessment Of Technological Readiness Among Stem Teachers, Jareau Almeyda Jan 2020

A Covid-19 Induced Shift: From Introducing High School Females To Computing Careers To An Assessment Of Technological Readiness Among Stem Teachers, Jareau Almeyda

CCE Theses and Dissertations

Prior to the global COVID-19 pandemic, this study aimed to explore how exposure to information systems (IS) project management impacts perceptions of computing careers among high school female participants. Given the demand for computing professionals continues to grow, enrollment in some computing disciplines across institutions of higher education have experienced declining enrollments. Studies have shown that one of the reasons high school students do not enroll in computing disciplines is because they perceive computing as difficult, boring, and irrelevant.

As a computing discipline, information systems is focused on developing professionals who are able to integrate technologies into systems that run …


Predictive Accuracy Of Recommender Algorithms, William Blake Noffsinger Jan 2020

Predictive Accuracy Of Recommender Algorithms, William Blake Noffsinger

CCE Theses and Dissertations

Recommender systems present a customized list of items based upon user or item characteristics with the objective of reducing a large number of possible choices to a smaller ranked set most likely to appeal to the user. A variety of algorithms for recommender systems have been developed and refined including applications of deep learning neural networks. Recent research reports point to a need to perform carefully controlled experiments to gain insights about the relative accuracy of different recommender algorithms, because studies evaluating different methods have not used a common set of benchmark data sets, baseline models, and evaluation metrics. The …


An Investigation Of The Factors That Contribute To The Perceived Likelihood Of Compliance With The Hipaa Security Rule Among Healthcare Covered Entities And Business Associates, James Furstenberg Jan 2020

An Investigation Of The Factors That Contribute To The Perceived Likelihood Of Compliance With The Hipaa Security Rule Among Healthcare Covered Entities And Business Associates, James Furstenberg

CCE Theses and Dissertations

The Health Insurance Portability and Accountability Act (HIPAA) Security Rule (SR) mandate provides a national standard for the safeguard of electronically protected health information (ePHI). SR compliance enforcement efforts started in 2005; however, U.S.-based covered entities and business associates (CEs & BAs) remain challenged to comply with the HIPAA SR regulatory strategy. Although there is a significant volume of academic research on HIPAA compliance, research specific to the SR is sparse.

This study addressed the research gap by designing a unique conceptual model that assessed factors affecting CEs & BAs compliance (or non-compliance) with the SR regulatory strategy. The primary …


Sns Use, Risk, And Executive Behavior, Andrew Green Jan 2020

Sns Use, Risk, And Executive Behavior, Andrew Green

CCE Theses and Dissertations

Andrew Green April 2020 Personal social networking sites (SNS) are popular outlets for people to share information about themselves, their family and friends, and their personal and professional lives. On the surface, the information shared may seem to be innocuous or nonthreatening. However, prior studies have shown that cybercriminals can take information shared via personal SNS and use it to conduct attacks against organizations. Organization executives are of particular interest to cybercriminals because they have access to sensitive data, and they also have the ability to command actions from their subordinates. The purpose of this study was to explore what …


Reducing Bittorrent Download Time Via Handshake-Based Switching, Elliotte Kim Jan 2020

Reducing Bittorrent Download Time Via Handshake-Based Switching, Elliotte Kim

CCE Theses and Dissertations

Peer-to-peer networking overcomes the single point of failure and bandwidth limitations inherent to the centralized server model of file-sharing. It is both a popular means of sharing digital content and a major consumer of internet traffic, with BitTorrent being the most-used protocol. As such, significant research has gone into improving peer-to-peer performance in order to reduce both download times and networking costs. One aspect that can affect performance is the client’s selection of peers to download from, as the time spent downloading from even a single poor-performing peer can impact the overall download duration.

A recent peer selection strategy explored …


Prediction Of Sudden Cardiac Death Using Ensemble Classifiers, Ayman Momtaz El-Geneidy Jan 2020

Prediction Of Sudden Cardiac Death Using Ensemble Classifiers, Ayman Momtaz El-Geneidy

CCE Theses and Dissertations

Sudden Cardiac Death (SCD) is a medical problem that is responsible for over 300,000 deaths per year in the United States and millions worldwide. SCD is defined as death occurring from within one hour of the onset of acute symptoms, an unwitnessed death in the absence of pre-existing progressive circulatory failures or other causes of deaths, or death during attempted resuscitation. Sudden death due to cardiac reasons is a leading cause of death among Congestive Heart Failure (CHF) patients. The use of Electronic Medical Records (EMR) systems has made a wealth of medical data available for research and analysis. Supervised …


Deep Neural Networks For Sentiment Analysis In Tweets With Emoticons, Mutharasu Narayanaperumal Jan 2020

Deep Neural Networks For Sentiment Analysis In Tweets With Emoticons, Mutharasu Narayanaperumal

CCE Theses and Dissertations

Businesses glean meaningful feedback in regard to products and services from social media posts in order to improve the quality of products and services, as well as to meet customer expectations. Sentiment analysis is increasingly being used to help businesses by assigning positive or negative polarity to such posts. Although methods currently exist to determine the polarity of sentiments, such methods are unreliable when posts contain terms that are not typically part of a standard dictionary used for sentiment analysis, such as slang and informal language. This dissertation has aimed to empirically investigate alternative methods to improve the classification accuracy …


Smart Privacy For Iot: Privacy Embedded Design For Home Automation Systems, Love James Jan 2020

Smart Privacy For Iot: Privacy Embedded Design For Home Automation Systems, Love James

CCE Theses and Dissertations

The emerging paradigm shift in technology to make everyday devices more intelligent than previously considered also known as internet of things (IoT) has further elevated the importance of privacy not only in theory but also in practice. The intrusive nature of these devices and in particular, the home automation system is also beginning to raise privacy concerns which might impact their usage either by deterring potential users from adopting the technology or discouraging existing users from the continued use of these home automation systems.

This study was an empirical and quantitative study that evaluates the impact of users’ behavior when …


Improvements To Iterated Local Search For Microaggregation, Tracy Bierman Jan 2020

Improvements To Iterated Local Search For Microaggregation, Tracy Bierman

CCE Theses and Dissertations

Microaggregation is a disclosure control method that uses k-anonymity to protect confidentiality in microdata while seeking minimal information loss. The problem is NP-hard. Iterated local search for microaggregation (ILSM) is an effective metaheuristic algorithm that consistently identifies better quality solutions than extant microaggregation methods. The present work presents improvements to local search, the perturbation operations and acceptance criterion within ILSM.

The first, ILSMC, targets changed clusters within local search (LS) to avoid vast numbers of comparison tests, significantly reducing execution times. Second, a new probability distribution yields a better perturbation operator for most cases, significantly reducing the number of iterations …


Adaptive Batch Size Selection In Active Learning For Regression, Anthony L. Faulds Jan 2020

Adaptive Batch Size Selection In Active Learning For Regression, Anthony L. Faulds

CCE Theses and Dissertations

Training supervised machine learning models requires labeled examples. A judicious choice of examples is helpful when there is a significant cost associated with assigning labels. This dissertation aims to improve upon a promising extant method - Batch-mode Expected Model Change Maximization (B-EMCM) method - for selecting examples to be labeled for regression problems. Specifically, it aims to develop and evaluate alternate strategies for adaptively selecting batch size in B-EMCM, named adaptive B-EMCM (AB-EMCM).

By determining the cumulative error that occurs from the estimation of the stochastic gradient descent, a stop criteria for each iteration of the batch can be specified …


Identifying Physicians’ User Experience (Ux) Pain Points In Using Electronic Health Record (Ehr) Systems, Elizabeth Janelle Arceneaux Jan 2020

Identifying Physicians’ User Experience (Ux) Pain Points In Using Electronic Health Record (Ehr) Systems, Elizabeth Janelle Arceneaux

CCE Theses and Dissertations

Healthcare institutions have migrated to online electronic documentation through the means of Electronic Health Record (EHR) systems. Physicians rely on these systems to support their various clinical work processes, such as entering clinical orders, reviewing essential clinical data, and making important medical decisions using reporting analytics. Although EHR systems appear to be useful and have known advantages over paper records, studies suggest there are persistent user interface design problems that may hinder physician productivity. The study focused on the research problem that EHR system designs create productivity problems for physician users who frequently report that system workflows are inefficient and …


An Empirical Assessment Of Audio/Visual/Haptic Alerts And Warnings To Mitigate Risk Of Phishing Susceptibility In Emails On Mobile Devices, Molly Marie Cooper Jan 2020

An Empirical Assessment Of Audio/Visual/Haptic Alerts And Warnings To Mitigate Risk Of Phishing Susceptibility In Emails On Mobile Devices, Molly Marie Cooper

CCE Theses and Dissertations

Phishing emails present a threat to both personal and organizational data. Phishing is a cyber-attack using social engineering. About 94% of cybersecurity incidents are due to phishing and/or social engineering. A significant volume of prior literature documented that users are continuing to click on phishing links in emails, even after phishing awareness training. It appears there is a strong need for creative ways to alert and warn users to signs of phishing in emails.

The main goal of the experiments in this study was to measure participants’ time for recognizing signs of phishing in emails, thus, reducing susceptibility to phishing …


Sns As An Educational Tool: Effect On Academic Performance And Learners’ Perceptions, Nawwaf Mohssen Altalhi Jan 2020

Sns As An Educational Tool: Effect On Academic Performance And Learners’ Perceptions, Nawwaf Mohssen Altalhi

CCE Theses and Dissertations

With Social Networking Sites (SNSs) being extensively used by students, there has been extensive research in relation to their ability to enhance students’ academic performance in various learning environments, although the advent of research on online learning is a recent development.

Studies regarding the use of SNSs indicated that there was a negative relationship between students’ use of SNSs and students’ academic performance. However, it is unknown whether the implementation of an instructional training course utilizing SNSs as an educational tool might lead to improvements in students’ academic performance. Many students have admitted to not knowing how to properly use …


A Hierarchical Temporal Memory Sequence Classifier For Streaming Data, Jeffrey Barnett Jan 2020

A Hierarchical Temporal Memory Sequence Classifier For Streaming Data, Jeffrey Barnett

CCE Theses and Dissertations

Real-world data streams often contain concept drift and noise. Additionally, it is often the case that due to their very nature, these real-world data streams also include temporal dependencies between data. Classifying data streams with one or more of these characteristics is exceptionally challenging. Classification of data within data streams is currently the primary focus of research efforts in many fields (i.e., intrusion detection, data mining, machine learning). Hierarchical Temporal Memory (HTM) is a type of sequence memory that exhibits some of the predictive and anomaly detection properties of the neocortex. HTM algorithms conduct training through exposure to a stream …


Usability Of Portable Eeg For Monitoring Students’ Attention In Online Learning, Arisaphat Suttidee Jan 2020

Usability Of Portable Eeg For Monitoring Students’ Attention In Online Learning, Arisaphat Suttidee

CCE Theses and Dissertations

Current research demonstrates that distractions while participating in online courses affect students’ performance in online tasks. Electroencephalography (EEG) devices are currently being used in education to help students maintain attention when engaged in online classes. Previous studies have focused predominantly on comparing EEG devices, EEG signal quality, and EEG effectiveness. However, there is no comprehensive study examining the usability of the portable EEG headset to monitor students' attention in online courses.

This study aimed to examine the usability of EEG devices while monitoring student attention levels during online educational tasks. Specifically, twenty (20) participants who intend to enroll in online …


Detecting Rogue Manipulation Of Smart Home Device Settings, David Zeichick Jan 2020

Detecting Rogue Manipulation Of Smart Home Device Settings, David Zeichick

CCE Theses and Dissertations

Smart home devices control a home’s environmental and security settings. This includes devices that control home thermostats, sprinkler systems, light bulbs, and home appliances. Malicious manipulation of the settings of these devices by an outside adversary has caused emotional distress and could even cause physical harm. For example, researchers have reported that there is a rise in domestic abuse perpetrated via smart home devices; victims have reported their thermostat settings being unwittingly manipulated and being locked out of their house due to their smart lock code being changed. Rapid adoption of smart home devices by consumers has led to an …


Development Of Criteria For Mobile Device Cybersecurity Threat Classification And Communication Standards (Ctc&Cs), Emmanuel Jigo Jan 2020

Development Of Criteria For Mobile Device Cybersecurity Threat Classification And Communication Standards (Ctc&Cs), Emmanuel Jigo

CCE Theses and Dissertations

The increasing use of mobile devices and the unfettered access to cyberspace has introduced new threats to users. Mobile device users are continually being targeted for cybersecurity threats via vectors such as public information sharing on social media, user surveillance (geolocation, camera, etc.), phishing, malware, spyware, trojans, and keyloggers. Users are often uninformed about the cybersecurity threats posed by mobile devices. Users are held responsible for the security of their device that includes taking precautions against cybersecurity threats. In recent years, financial institutions are passing the costs associated with fraud to the users because of the lack of security.

The …


Classifying Relations Using Recurrent Neural Network With Ontological-Concept Embedding, Mario J. Lorenzo Jan 2020

Classifying Relations Using Recurrent Neural Network With Ontological-Concept Embedding, Mario J. Lorenzo

CCE Theses and Dissertations

Relation extraction and classification represents a fundamental and challenging aspect of Natural Language Processing (NLP) research which depends on other tasks such as entity detection and word sense disambiguation. Traditional relation extraction methods based on pattern-matching using regular expressions grammars and lexico-syntactic pattern rules suffer from several drawbacks including the labor involved in handcrafting and maintaining large number of rules that are difficult to reuse. Current research has focused on using Neural Networks to help improve the accuracy of relation extraction tasks using a specific type of Recurrent Neural Network (RNN). A promising approach for relation classification uses an RNN …


A Pcnn Framework For Blood Cell Image Segmentation, Carol D. Lenihan Jan 2020

A Pcnn Framework For Blood Cell Image Segmentation, Carol D. Lenihan

CCE Theses and Dissertations

This research presents novel methods for segmenting digital blood cell images under a Pulse Coupled Neural Network (PCNN) framework. A blood cell image contains different types of blood cells found in the peripheral blood stream such as red blood cells (RBCs), white blood cells (WBCs), and platelets. WBCs can be classified into five normal types – neutrophil, monocyte, lymphocyte, eosinophil, and basophil – as well as abnormal types such as lymphoblasts and others. The focus of this research is on identifying and counting RBCs, normal types of WBCs, and lymphoblasts. The total number of RBCs and WBCs, along with classification …


Cybersecurity Risk-Responsibility Taxonomy: The Role Of Cybersecurity Social Responsibility In Small Enterprises On Risk Of Data Breach, Keiona Davis Jan 2020

Cybersecurity Risk-Responsibility Taxonomy: The Role Of Cybersecurity Social Responsibility In Small Enterprises On Risk Of Data Breach, Keiona Davis

CCE Theses and Dissertations

With much effort being placed on the physical, procedural, and technological solutions for Information Systems (IS) cybersecurity, research studies tend to focus their efforts on large organizations while overlooking very smaller organizations (below 50 employees). This study addressed the failure to prevent data breaches in Very Small Enterprises (VSEs). VSEs contribute significantly to the economy, however, are more prone to cyber-attacks due to the limited risk mitigations on their systems and low cybersecurity skills of their employees. VSEs utilize Point-of-Sale (POS) systems that are exposed to cyberspace, however, they are often not equipped to prevent complex cybersecurity issues that can …


The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, Zulma Valedon Westney Jan 2020

The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, Zulma Valedon Westney

CCE Theses and Dissertations

Social media networking sites (SMNS) have become a popular communications medium where users share information, knowledge, and persuasion. In less than two decades, social media's (SM) dominance as a communication medium can't be disputed, for good or evil. Combined with the newly found immediacy and pervasiveness, these SM applications' persuasive power are useful weapons for organizations, angry customers, employees, actors, and activists bent on attacking or hacking other individuals, institutions, or systems. Consequently, SM has become the preferred default mechanism of news sources; however, users are unsure if the information gathered is true or false. According to the literature, SMNS …


Protecting The Protector: Mapping The Key Terrain That Supports The Continuous Monitoring Mission Of A Cloud Cybersecurity Service Provider, Chris Bush Jan 2020

Protecting The Protector: Mapping The Key Terrain That Supports The Continuous Monitoring Mission Of A Cloud Cybersecurity Service Provider, Chris Bush

CCE Theses and Dissertations

Key terrain is a concept that is relevant to warfare, military strategy, and tactics. A good general maps out terrain to identify key areas to protect in support of a mission (i.e., a bridge allowing for mobility of supplies and reinforcements). Effective ways to map terrain in Cyberspace (KT-C) has been an area of interest for researchers in Cybersecurity ever since the Department of Defense designated Cyberspace as a warfighting domain. The mapping of KT-C for a mission is accomplished by putting forth efforts to understand and document a mission's dependence on Cyberspace and cyber assets. A cloud Cybersecurity Service …


Factors That Influence The Perception Of Higher Education Leaders In The Adoption Process Of Instructional Technology And Distance Education, Diego Tibaquirá Jan 2020

Factors That Influence The Perception Of Higher Education Leaders In The Adoption Process Of Instructional Technology And Distance Education, Diego Tibaquirá

Theses and Dissertations

The problem addressed by this study was that many administrators at institutions of higher learning are faced with the task of finding ways to provide the latest technologies while being extremely constricted by budgets and the rising cost of education. The purpose of this study was to determine the factors that influence the perceptions of higher education leaders in the adoption process of Instructional Technology and Distance Education. This included an examination of the decision-making process and what determined if Instructional Technology and Distance Education were either implemented or upgraded at various higher learning institutions.

The researcher implemented a mixed-methods …


Unix Administrator Information Security Policy Compliance: The Influence Of A Focused Seta Workshop And Interactive Security Challenges On Heuristics And Biases, John Palmer Mcconnell Jan 2020

Unix Administrator Information Security Policy Compliance: The Influence Of A Focused Seta Workshop And Interactive Security Challenges On Heuristics And Biases, John Palmer Mcconnell

CCE Theses and Dissertations

Information Security Policy (ISP) compliance is crucial to the success of healthcare organizations due to security threats and the potential for security breaches. UNIX Administrators (UXAs) in healthcare Information Technology (IT) maintain critical servers that house Protected Health Information (PHI). Their compliance with ISP is crucial to the confidentiality, integrity, and availability of PHI data housed or accessed by their servers. The use of cognitive heuristics and biases may negatively influence threat appraisal, coping appraisal, and ultimately ISP compliance behavior. These failures may result in insufficiently protected servers and put organizations at greater risk of data breaches and financial loss. …