Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 40

Full-Text Articles in Computer Sciences

Using Experiential Learning In Course Curriculum: The Case Of A Core Engineering Graphics Course, Martha Marie Snyder, Manuel Salinas, Molly J. Scanlon Jun 2018

Using Experiential Learning In Course Curriculum: The Case Of A Core Engineering Graphics Course, Martha Marie Snyder, Manuel Salinas, Molly J. Scanlon

CCE Faculty Proceedings, Presentations, Speeches and Lectures

This work-in-progress paper overviews how an experiential education program was established at a private, non-profit university in the southeast, describes the process for certifying experiential courses using a formal course review process and qualification rubric, and details the case of a freshman engineering graphics course.

Grounded in the early works of Dewey, Lewin, and Piaget, experiential learning theory has become increasingly popular in higher education. Experiential learning serves as a foundation for lifelong learning and the development of the whole self as a citizen, family member and human being (Kolb, 2015). Austin and Rust (2015) define experiential learning as “‘hands-on’ …


Database Streaming Compression On Memory-Limited Machines, Damon F. Bruccoleri Jan 2018

Database Streaming Compression On Memory-Limited Machines, Damon F. Bruccoleri

CCE Theses and Dissertations

Dynamic Huffman compression algorithms operate on data-streams with a bounded symbol list. With these algorithms, the complete list of symbols must be contained in main memory or secondary storage. A horizontal format transaction database that is streaming can have a very large item list. Many nodes tax both the processing hardware primary memory size, and the processing time to dynamically maintain the tree. This research investigated Huffman compression of a transaction-streaming database with a very large symbol list, where each item in the transaction database schema’s item list is a symbol to compress. The constraint of a large symbol list …


Using Web Conferencing Technology To Foster Inclusive Course Experiences For Deaf And Hard-Of-Hearing Students, Elissa Weeden Jan 2018

Using Web Conferencing Technology To Foster Inclusive Course Experiences For Deaf And Hard-Of-Hearing Students, Elissa Weeden

CCE Theses and Dissertations

A mainstream course has several components that deaf and hard-of-hearing (DHH) students must reconcile. In class, components can include the instructor, projection display, whiteboard, interpreting, and real-time captioning. Outside the classroom, components can include materials from the instructor, notes generated by a note-taker, and a lecture transcript generated via real-time captioning. Web conferencing software can be harnessed to create inclusive experiences for DHH students. Such software can place all components of a class session on a single screen to create a composite screen solution that can be viewed by students in real-time and recorded for later, self-paced review. A composite …


An Investigation Of The Interaction Between Organizational Culture And Knowledge Sharing Through Socialization: A Multi-Level Perspective, Ali Baker Jan 2018

An Investigation Of The Interaction Between Organizational Culture And Knowledge Sharing Through Socialization: A Multi-Level Perspective, Ali Baker

CCE Theses and Dissertations

Knowledge management (KM) has been determined by many researchers as one of the most important domains within the information systems (IS) field, and knowledge sharing (KS) has been identified as the most vital component of KM. Lack of KS within organizations has been approached from many perspectives. One perspective that has been outlined in recent studies is the organizational culture (OC) perspective, which examines the interaction between OC and KS behaviors. Although research has been conducted on OC and KS, the findings of recent studies have been contradictory. These conflicts were due to the different operationalization of KS. The purpose …


Metrics For Aspect Mining Visualization, Gisle J. Jorgensen Jan 2018

Metrics For Aspect Mining Visualization, Gisle J. Jorgensen

CCE Theses and Dissertations

Aspect oriented programming has over the last decade become the subject of intense research within the domain of software engineering. Aspect mining, which is concerned with identification of cross cutting concerns in legacy software, is an important part of this domain. Aspect refactoring takes the identified cross cutting concerns and converts these into new software constructs called aspects. Software that have been transformed using this process becomes more modularized and easier to comprehend and maintain. The first attempts at mining for aspects were dominated by manual searching and parsing through source code using simple tools. More sophisticated techniques have since …


Design And Development Of Simulation-Based Instruction On Meaningful Use And Interprofessionalism Core Competencies In A Healthcare Team-Based Learning Environment, Elizabeth Oviawe Jan 2018

Design And Development Of Simulation-Based Instruction On Meaningful Use And Interprofessionalism Core Competencies In A Healthcare Team-Based Learning Environment, Elizabeth Oviawe

CCE Theses and Dissertations

Policymakers and electronic health records (EHR) experts agree that healthcare professionals lack proficiency in meaningful use of EHRs. This competency gap can result in increased medical errors. It is essential for health professions graduates to acquire skill sets that are adaptable to any electronic health information technologies including the EHRs to facilitate work process and information access. Simulation as an instructional method to create transformative learning experiences has shown promise in the medical profession. In simulations, learners are able to engage in real-life scenarios and practice their cognitive, affective, and psychomotor skills in a safe environment.

The goal was to …


A Novel Cooperative Intrusion Detection System For Mobile Ad Hoc Networks, Adam Solomon Jan 2018

A Novel Cooperative Intrusion Detection System For Mobile Ad Hoc Networks, Adam Solomon

CCE Theses and Dissertations

Mobile ad hoc networks (MANETs) have experienced rapid growth in their use for various military, medical, and commercial scenarios. This is due to their dynamic nature that enables the deployment of such networks, in any target environment, without the need for a pre-existing infrastructure. On the other hand, the unique characteristics of MANETs, such as the lack of central networking points, limited wireless range, and constrained resources, have made the quest for securing such networks a challenging task. A large number of studies have focused on intrusion detection systems (IDSs) as a solid line of defense against various attacks targeting …


Assistive Technology Guidelines For Higher Education Disability Support Staff, Brenda Delee Jan 2018

Assistive Technology Guidelines For Higher Education Disability Support Staff, Brenda Delee

CCE Theses and Dissertations

With the changing laws and effective integration of assistive technology into the classroom environment, students can have the provision of multiple means to complete their work with greater independence. In post secondary education, any student who discloses a sensory, cognitive, or physical disability is eligible to request and receive assistive technology and other services. When used correctly, assistive technology can help students with reading, writing, math, and communication skills. With a possible influx of students, disability support staff must be prepared and willing to meet the needs and address issues relating to students with disabilities. If their needs are not …


The Effects Of Student Activity Dashboards On Student Participation, Performance, And Persistence, Edwin Hill Jan 2018

The Effects Of Student Activity Dashboards On Student Participation, Performance, And Persistence, Edwin Hill

CCE Theses and Dissertations

Researchers have turned their attention to the use of learning analytics and dashboard systems in education. Schools are using knowledge gained in this area to address the issue of persistence to increase graduation rates. While dashboard systems have been developed and are starting to be implemented, it is not yet clear how activity and performance data from dashboards influences student behavior. In addition, much of the research has been focused on instructor-facing dashboards rather than student-facing dashboards. The current study implemented a student-facing dashboard in the learning management system and measured how information on the dashboard may have influenced participation …


Identifying Factors Contributing Towards Information Security Maturity In An Organization, Madhuri M. Edwards Jan 2018

Identifying Factors Contributing Towards Information Security Maturity In An Organization, Madhuri M. Edwards

CCE Theses and Dissertations

Information security capability maturity (ISCM) is a journey towards accurate alignment of business and security objectives, security systems, processes, and tasks integrated with business-enabled IT systems, security enabled organizational culture and decision making, and measurements and continuous improvements of controls and governance comprising security policies, processes, operating procedures, tasks, monitoring, and reporting. Information security capability maturity may be achieved in five levels: performing but ad-hoc, managed, defined, quantitatively governed, and optimized. These five levels need to be achieved in the capability areas of information integrity, information systems assurance, business enablement, security processes, security program management, competency of security team, security …


Conservation Of Limited Resources: Design Principles For Security And Usability On Mobile Devices, Ann-Marie Horcher Jan 2018

Conservation Of Limited Resources: Design Principles For Security And Usability On Mobile Devices, Ann-Marie Horcher

CCE Theses and Dissertations

Mobile devices have evolved from an accessory to the primary computing device for an increasing portion of the general population. Not only is mobile the primary device, consumers on average have multiple Internet-connected devices. The trend towards mobile has resulted in a shift to “mobile-first” strategies for delivering information and services in business organizations, universities, and government agencies. Though principles for good security design exist, those principles were formulated based upon the traditional workstation configuration instead of the mobile platform. Security design needs to follow the shift to a “mobile-first” emphasis to ensure the usability of the security interface. The …


Assessing The Impact Of A Geospatial Information System For Improving Campus Emergency Decision-Making Of Novice Crisis Managers, Adam R. Albina Jan 2018

Assessing The Impact Of A Geospatial Information System For Improving Campus Emergency Decision-Making Of Novice Crisis Managers, Adam R. Albina

CCE Theses and Dissertations

A significant increase in campus-based emergencies warrants the investigation into emergency management information systems that serve a novice crisis decision-maker. Institutions of higher education that are not large enough to have dedicated emergency management offices generally press novice decision-makers into emergency management roles. An investigation was conducted to assess the impact of an emergency management geospatial information system on the decision performance of novice crisis managers through the use of a scenario-based simulation. A mixed method sequential explanatory method was used to collect quasi-experimental data on decision time, decision accuracy and situational awareness. Qualitative analysis was conducted through interviews with …


Beyond Automated Assessment: Building Metacognitive Awareness In Novice Programmers In Cs1, James Prather Jan 2018

Beyond Automated Assessment: Building Metacognitive Awareness In Novice Programmers In Cs1, James Prather

CCE Theses and Dissertations

The primary task of learning to program in introductory computer science courses (CS1) cognitively overloads novices and must be better supported. Several recent studies have attempted to address this problem by understanding the role of metacognitive awareness in novices learning programming. These studies have focused on teaching metacognitive awareness to students by helping them understand the six stages of learning so students can know where they are in the problem-solving process, but these approaches are not scalable. One way to address scalability is to implement features in an automated assessment tool (AAT) that build metacognitive awareness in novice programmers. Currently, …


A Knowledge Management System (Kms) Using A Storytelling-Based Approach To Collect Tacit Knowledge, Nicholas Shaw Jan 2018

A Knowledge Management System (Kms) Using A Storytelling-Based Approach To Collect Tacit Knowledge, Nicholas Shaw

CCE Theses and Dissertations

Since the 1990s, Knowledge Management Systems (KMS) have been largely unsuccessful in the collection of tacit knowledge. The process, whether through direct input by the holder of the tacit knowledge or through an intermediary such as the collection of tacit knowledge through interviews and videos, has not succeeded. Reasons encompass the organizational (such as culture of the organization), the technological (example: poor tools), and the individual (example: knowledge is power, i.e. where experts with rare knowledge results in knowledge hoarding instead of transfer). The purpose of this study was to demonstrate that tacit knowledge could be successfully and consistently collected …


Multidimensional Knowledge Flow Dynamics In Context, Lina Lo Jan 2018

Multidimensional Knowledge Flow Dynamics In Context, Lina Lo

CCE Theses and Dissertations

Knowledge is a sustainable advantage and knowledge assets can increase value with use. A snowball effect of knowledge advantage advocates effective knowledge management and fosters its continual growth as it flows. Knowledge, however, flows unevenly throughout an organization and the problem is that the fundamental dynamics of these flows are still not well characterized in theoretical and computational models. This study built on existing work—knowledge-flow theory, need knowledge generation, and the critical success factors for enterprise resource planning implementation—to examine the multidimensional knowledge-flow phenomenon in context, and used the case study methodology for knowledge-flow theory building. The research question was …


Factors That Contribute To The Resistance To Cloud Computing Adoption By Tech Companies Vs. Non-Tech Companies, Zadok Hakim Jan 2018

Factors That Contribute To The Resistance To Cloud Computing Adoption By Tech Companies Vs. Non-Tech Companies, Zadok Hakim

CCE Theses and Dissertations

Cloud computing (CC) may be the most significant development in recent history for businesses seeking to utilize technology. However, the adoption of CC hinges on many factors, and can have a greater positive impact on organizational performance. This study examined the different factors that contribute to the resistance to CC adoption. Anchored in The Theory of Technology-Organization-Environment (TOE), the study used a qualitative, grounded theory approach to develop a theoretical model for the acceptance of CC across firms. CC can have significant effects on efficiency and productivity for firms, but these effects will only be realized if IT usage becomes …


Semi-Informed Multi-Agent Patrol Strategies, Chad E. Hardin Jan 2018

Semi-Informed Multi-Agent Patrol Strategies, Chad E. Hardin

CCE Theses and Dissertations

The adversarial multi-agent patrol problem is an active research topic with many real-world applications such as physical robots guarding an area and software agents protecting a computer network. In it, agents patrol a graph looking for so-called critical vertices that are subject to attack by adversaries. The agents are unaware of which vertices are subject to attack by adversaries and when they encounter such a vertex they attempt to protect it from being compromised (an adversary must occupy the vertex it targets a certain amount of time for the attack to succeed). Even though the terms adversary and attack are …


An Operational Management Competency Model For Online Education Administrators, Fanniel Demarks Jan 2018

An Operational Management Competency Model For Online Education Administrators, Fanniel Demarks

CCE Theses and Dissertations

Despite the steady rise in online education and increasingly empirical studies on related learning technologies and technology support, there is considerable evidence that the field has not kept the pace with studies related to online education administrators (OEAs). Further investigation was needed into OEAs’ practice of day-to-day administration of their programs. Therefore, this study examined OEAs’ perceptions of their areas of responsibility, tasks to be accomplished and skills and knowledge needed for them to get the job done. A three-round Delphi research technique was employed as a structured group communication method between five participants to answer three research questions. The …


Standardizing Instructional Definition And Content Supporting Information Security Compliance Requirements, Theresa Curran Jan 2018

Standardizing Instructional Definition And Content Supporting Information Security Compliance Requirements, Theresa Curran

CCE Theses and Dissertations

Information security (IS)-related risks affect global public and private organizations on a daily basis. These risks may be introduced through technical or human-based activities, and can include fraud, hacking, malware, insider abuse, physical loss, mobile device misconfiguration or unintended disclosure. Numerous and diverse regulatory and contractual compliance requirements have been mandated to assist organizations proactively prevent these types of risks. Two constants are noted in these requirements. The first constant is requiring organizations to disseminate security policies addressing risk management through secure behavior. The second constant is communicating policies through IS awareness, training and education (ISATE) programs. Compliance requirements direct …


A Developmental Research Of A Taxonomy For Employees’ Mobile Device Cyberslacking And Commitment To The Organization In The Context Of Productivity, Saleh Alharthi Jan 2018

A Developmental Research Of A Taxonomy For Employees’ Mobile Device Cyberslacking And Commitment To The Organization In The Context Of Productivity, Saleh Alharthi

CCE Theses and Dissertations

While the introduction of the Internet facilitated the communication channels at the workplace to improve employees’ productivity, it also raised new challenges, such as Internet use for personal activities. Organizations face productivity losses due to employees’ involvement in counterproductive behaviors, such as cyberslacking. The frequency of mobile device cyberslacking is anticipated to increase due to continuous developments in online connectivity, applications, and the significant growth of mobile device usage worldwide. In addition, research has shown that employees’ commitment to their organization can encourage behaviors that positively influence productivity. Employee’s commitment is a crucial factor because it can benefit an organization …


Development, Implementation, And Assessment Of An Online Doctoral Student Orientation, Russell J. Garner Jan 2018

Development, Implementation, And Assessment Of An Online Doctoral Student Orientation, Russell J. Garner

CCE Theses and Dissertations

An examination of the recent literature revealed there are no established standards for orienting online doctoral students. To address this problem, the relevant literature was examined and suggested that doctoral students can be effectively oriented to their academic environment when provided with the requisite programmatic and institutional information, and factors that support socialization and self-efficacy.

A literature-based orientation was developed to examine its impact on students’ first semester success in terms of rates of retention and grade point averages (GPA). This was accomplished using a developmental study approach that included three primary phases: 1) development of a literature-based orientation; 2) …


Wireless Sensor Network Clustering With Machine Learning, Larry Townsend Jan 2018

Wireless Sensor Network Clustering With Machine Learning, Larry Townsend

CCE Theses and Dissertations

Wireless sensor networks (WSNs) are useful in situations where a low-cost network needs to be set up quickly and no fixed network infrastructure exists. Typical applications are for military exercises and emergency rescue operations. Due to the nature of a wireless network, there is no fixed routing or intrusion detection and these tasks must be done by the individual network nodes. The nodes of a WSN are mobile devices and rely on battery power to function. Due the limited power resources available to the devices and the tasks each node must perform, methods to decrease the overall power consumption of …


Comparing Training Methodologies On Employee’S Cybersecurity Countermeasures Awareness And Skills In Traditional Vs. Socio-Technical Programs, Jodi Goode Jan 2018

Comparing Training Methodologies On Employee’S Cybersecurity Countermeasures Awareness And Skills In Traditional Vs. Socio-Technical Programs, Jodi Goode

CCE Theses and Dissertations

Organizations, which have established an effective technical layer of security, continue to experience difficulties triggered by cyber threats. Ultimately, the cybersecurity posture of an organization depends on appropriate actions taken by employees whose naive cybersecurity practices have been found to represent 72% to 95% of cybersecurity threats and vulnerabilities to organizations. However, employees cannot be held responsible for cybersecurity practices if they are not provided the education and training to acquire skills, which allow for identification of security threats along with the proper course of action to mitigate such threats. In addition, awareness of the importance of cybersecurity, the responsibility …


Probabilistic Clustering Ensemble Evaluation For Intrusion Detection, Steven M. Mcelwee Jan 2018

Probabilistic Clustering Ensemble Evaluation For Intrusion Detection, Steven M. Mcelwee

CCE Theses and Dissertations

Intrusion detection is the practice of examining information from computers and networks to identify cyberattacks. It is an important topic in practice, since the frequency and consequences of cyberattacks continues to increase and affect organizations. It is important for research, since many problems exist for intrusion detection systems. Intrusion detection systems monitor large volumes of data and frequently generate false positives. This results in additional effort for security analysts to review and interpret alerts. After long hours spent reviewing alerts, security analysts become fatigued and make bad decisions. There is currently no approach to intrusion detection that reduces the workload …


An Empirical Assessment Of Senior Citizens’ Cybersecurity Awareness, Computer Self-Efficacy, Perceived Risk Of Identity Theft, Attitude, And Motivation To Acquire Cybersecurity Skills, Carlene G. Blackwood-Brown Jan 2018

An Empirical Assessment Of Senior Citizens’ Cybersecurity Awareness, Computer Self-Efficacy, Perceived Risk Of Identity Theft, Attitude, And Motivation To Acquire Cybersecurity Skills, Carlene G. Blackwood-Brown

CCE Theses and Dissertations

Cyber-attacks on Internet users have caused billions of dollars in losses annually. Cybercriminals launch attacks via threat vectors such as unsecured wireless networks and phishing attacks on Internet users who are usually not aware of such attacks. Senior citizens are one of the most vulnerable groups who are prone to cyber-attacks, and this is largely due to their limited cybersecurity awareness and skills. Within the last decade, there has been a significant increase in Internet usage among senior citizens. It was documented that senior citizens had the greatest rate of increase in Internet usage over all the other age groups …


Machine Learning Methods For Septic Shock Prediction, Aiman A. Darwiche Jan 2018

Machine Learning Methods For Septic Shock Prediction, Aiman A. Darwiche

CCE Theses and Dissertations

Sepsis is an organ dysfunction life-threatening disease that is caused by a dysregulated body response to infection. Sepsis is difficult to detect at an early stage, and when not detected early, is difficult to treat and results in high mortality rates. Developing improved methods for identifying patients in high risk of suffering septic shock has been the focus of much research in recent years. Building on this body of literature, this dissertation develops an improved method for septic shock prediction. Using the data from the MMIC-III database, an ensemble classifier is trained to identify high-risk patients. A robust prediction model …


Novel Alert Visualization: The Development Of A Visual Analytics Prototype For Mitigation Of Malicious Insider Cyber Threats, Karla A. Clarke Jan 2018

Novel Alert Visualization: The Development Of A Visual Analytics Prototype For Mitigation Of Malicious Insider Cyber Threats, Karla A. Clarke

CCE Theses and Dissertations

Cyber insider threat is one of the most difficult risks to mitigate in organizations. However, innovative validated visualizations for cyber analysts to better decipher and react to detected anomalies has not been reported in literature or in industry. Attacks caused by malicious insiders can cause millions of dollars in losses to an organization. Though there have been advances in Intrusion Detection Systems (IDSs) over the last three decades, traditional IDSs do not specialize in anomaly identification caused by insiders. There is also a profuse amount of data being presented to cyber analysts when deciphering big data and reacting to data …


Machine Learning For Exploring State Space Structure In Genetic Regulatory Networks, Rodney H. Thomas Jan 2018

Machine Learning For Exploring State Space Structure In Genetic Regulatory Networks, Rodney H. Thomas

CCE Theses and Dissertations

Genetic regulatory networks (GRN) offer a useful model for clinical biology. Specifically, such networks capture interactions among genes, proteins, and other metabolic factors. Unfortunately, it is difficult to understand and predict the behavior of networks that are of realistic size and complexity. In this dissertation, behavior refers to the trajectory of a state, through a series of state transitions over time, to an attractor in the network. This project assumes asynchronous Boolean networks, implying that a state may transition to more than one attractor. The goal of this project is to efficiently identify a network's set of attractors and to …


Assessment Of Factors Influencing Intent-To-Use Big Data Analytics In An Organization: A Survey Study, Wayne Madhlangobe Jan 2018

Assessment Of Factors Influencing Intent-To-Use Big Data Analytics In An Organization: A Survey Study, Wayne Madhlangobe

CCE Theses and Dissertations

The central question was how the relationship between trust-in-technology and intent-to-use Big Data Analytics in an organization is mediated by both Perceived Risk and Perceived Usefulness. Big Data Analytics is quickly becoming a critically important driver for business success. Many organizations are increasing their Information Technology budgets on Big Data Analytics capabilities. Technology Acceptance Model stands out as a critical theoretical lens primarily due to its assessment approach and predictive explanatory capacity to explain individual behaviors in the adoption of technology. Big Data Analytics use in this study was considered a voluntary act, therefore, well aligned with the Theory of …


Knowledge Sharing Among Academics In Higher Education Institutions In Saudi Arabia, Fahad M. Alsaadi Jan 2018

Knowledge Sharing Among Academics In Higher Education Institutions In Saudi Arabia, Fahad M. Alsaadi

CCE Theses and Dissertations

The Ministry of Higher Education (MOHE) in Saudi Arabia aims to move toward a knowledge-based economy and many knowledge management (KM) and knowledge sharing (KS) initiatives have been taken to accelerate the achievement of this goal. Despite the substantial body of research into KS in the business environment, research that investigates factors that promote KS practices among academics in higher education institutions (HEIs) is generally limited, but particularly in Saudi Arabia. To bridge this gap, the goal was to explore what individual and organizational factors contribute to a person’s willingness to share knowledge and develop a profile of the current …