Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Information Technology & Decision Sciences Faculty Publications

Discipline
Keyword
Publication Year

Articles 1 - 30 of 32

Full-Text Articles in Computer Sciences

A Review Of Hybrid Cyber Threats Modelling And Detection Using Artificial Intelligence In Iiot, Yifan Liu, Shancang Li, Xinheng Wang, Li Xu Jan 2024

A Review Of Hybrid Cyber Threats Modelling And Detection Using Artificial Intelligence In Iiot, Yifan Liu, Shancang Li, Xinheng Wang, Li Xu

Information Technology & Decision Sciences Faculty Publications

The Industrial Internet of Things (IIoT) has brought numerous benefits, such as improved efficiency, smart analytics, and increased automation. However, it also exposes connected devices, users, applications, and data generated to cyber security threats that need to be addressed. This work investigates hybrid cyber threats (HCTs), which are now working on an entirely new level with the increasingly adopted IIoT. This work focuses on emerging methods to model, detect, and defend against hybrid cyber attacks using machine learning (ML) techniques. Specifically, a novel ML-based HCT modelling and analysis framework was proposed, in which regularisation and Random Forest …


Sscm: A Secured Approach To Supply Chain Management Using Blowfish Optimization, Shitharth Selvarajan, Hariprasath Manoharan, Alaa O. Khadidos, Achyut Shankar, Adil O. Khadidos, Wattana Viriyasitavat, Li Da Xu Jan 2024

Sscm: A Secured Approach To Supply Chain Management Using Blowfish Optimization, Shitharth Selvarajan, Hariprasath Manoharan, Alaa O. Khadidos, Achyut Shankar, Adil O. Khadidos, Wattana Viriyasitavat, Li Da Xu

Information Technology & Decision Sciences Faculty Publications

This study examines the importance of enterprise information systems that link several corporate organisations to share information about diverse products under high security settings. The primary goal of the proposed strategy is to create a direct link between product demand and production to minimise the impact of rising costs. The research motive to make a connection cannot be resolved without suitable data that shows both quantity and quality in each organisation unit. The suggested method is designed to deliver accurate data to authorised end users while preventing any data exposure to unauthorised users. Security cryptographic keys are utilised to create …


Selecting And Evaluating Key Mds-Updrs Activities Using Wearable Devices For Parkinson's Disease Self-Assessment, Yuting Zhao, Xulong Wang, Xiyang Peng, Ziheng Li, Fengtao Nan, Menghui Zhuo, Jun Qi, Yun Yang, Zhong Zhao, Lida Xu, Po Yang Jan 2024

Selecting And Evaluating Key Mds-Updrs Activities Using Wearable Devices For Parkinson's Disease Self-Assessment, Yuting Zhao, Xulong Wang, Xiyang Peng, Ziheng Li, Fengtao Nan, Menghui Zhuo, Jun Qi, Yun Yang, Zhong Zhao, Lida Xu, Po Yang

Information Technology & Decision Sciences Faculty Publications

Parkinson's disease (PD) is a complex neurodegenerative disease in the elderly. This disease has no cure, but assessing these motor symptoms will help slow down that progression. Inertial sensing-based wearable devices (ISWDs) such as mobile phones and smartwatches have been widely employed to analyse the condition of PD patients. However, most studies purely focused on a single activity or symptom, which may ignore the correlation between activities and complementary characteristics. In this paper, a novel technical pipeline is proposed for fine-grained classification of PD severity grades, which identify the most representative activities. We also propose a multi-activities combination scheme based …


Trading Cloud Computing Stocks Using Sma, Xianrong Zheng, Lingyu Li Jan 2024

Trading Cloud Computing Stocks Using Sma, Xianrong Zheng, Lingyu Li

Information Technology & Decision Sciences Faculty Publications

As cloud computing adoption becomes mainstream, the cloud services market offers vast profits. Moreover, serverless computing, the next stage of cloud computing, comes with huge economic potential. To capitalize on this trend, investors are interested in trading cloud stocks. As high-growth technology stocks, investing in cloud stocks is both rewarding and challenging. The research question here is how a trading strategy will perform on cloud stocks. As a result, this paper employs an effective method—Simple Moving Average (SMA)—to trade cloud stocks. To evaluate its performance, we conducted extensive experiments with real market data that spans over 23 years. Results show …


Data Science In Finance: Challenges And Opportunities, Xianrong Zheng, Elizabeth Gildea, Sheng Chai, Tongxiao Zhang, Shuxi Wang Jan 2024

Data Science In Finance: Challenges And Opportunities, Xianrong Zheng, Elizabeth Gildea, Sheng Chai, Tongxiao Zhang, Shuxi Wang

Information Technology & Decision Sciences Faculty Publications

Data science has become increasingly popular due to emerging technologies, including generative AI, big data, deep learning, etc. It can provide insights from data that are hard to determine from a human perspective. Data science in finance helps to provide more personal and safer experiences for customers and develop cutting-edge solutions for a company. This paper surveys the challenges and opportunities in applying data science to finance. It provides a state-of-the-art review of financial technologies, algorithmic trading, and fraud detection. Also, the paper identifies two research topics. One is how to use generative AI in algorithmic trading. The other is …


Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu Jan 2023

Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu

Information Technology & Decision Sciences Faculty Publications

Detecting cyber security vulnerabilities in the Internet of Things (IoT) devices before they are exploited is increasingly challenging and is one of the key technologies to protect IoT devices from cyber attacks. This work conducts a comprehensive survey to investigate the methods and tools used in vulnerability detection in IoT environments utilizing machine learning techniques on various datasets, i.e., IoT23. During this study, the common potential vulnerabilities of IoT architectures are analyzed on each layer and the machine learning workflow is described for detecting IoT vulnerabilities. A vulnerability detection and mitigation framework was proposed for machine learning-based vulnerability detection in …


Inventions In The Area Of Nanotechnologies And Nanomaterials. Part I, Leonid A. Ivanov, Li Da Xu, Zhanna V. Pisarenko, Svetlana R. Muminova, Nadezda G. Miloradova Jan 2023

Inventions In The Area Of Nanotechnologies And Nanomaterials. Part I, Leonid A. Ivanov, Li Da Xu, Zhanna V. Pisarenko, Svetlana R. Muminova, Nadezda G. Miloradova

Information Technology & Decision Sciences Faculty Publications

Introduction. Advanced technologies inspire people by demonstrating the latest achievements (materials, methods, systems, technologies, devices etc.) that dramatically change the world. This, first of all, concerns nanotechnological inventions designed by scientists, engineers and specialists from different countries. Main part. The article provides an abstract overview of inventions of scientists, engineers and specialists from different countries: Germany, Russia, China, USA et al. The results of the creative activity of scientists, engineers and specialists, including inventions in the field of nanotechnology and nanomaterials allow, when introduced to industry, achieving a significant effect in construction, housing and communal services, and related sectors of …


Assessing Univariate And Multivariate Normality In Pls-Sem, Kathy Qing Ma, Weiyong Zhang Jan 2023

Assessing Univariate And Multivariate Normality In Pls-Sem, Kathy Qing Ma, Weiyong Zhang

Information Technology & Decision Sciences Faculty Publications

Partial least squares structural equation modeling (PLS-SEM) has gained popularity among researchers in part due to its relaxed requirement for multivariate normality. One important step in performing structural equation modeling (SEM) is to test the normality assumption. In this paper, we illustrate how to assess univariate and multivariate normality in PLS-SEM using WarpPLS.


Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon Nov 2022

Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon

Information Technology & Decision Sciences Faculty Publications

Blockchain (BC), as an emerging technology, is revolutionizing Business Process Management (BPM) in multiple ways. The main adoption is to serve as a trusted infrastructure to guarantee the trust of collaborations among multiple partners in trustless environments. Especially, BC enables trust of information by using Distributed Ledger Technology (DLT). With the power of smart contracts, BC enforces the obligations of counterparties that transact in a business process (BP) by programming the contracts as transactions. This paper aims to study the state-of-the-art of BC technologies by (1) exploring its applications in BPM with the focus on how BC provides the trust …


Smart Manufacturing—Theories, Methods, And Applications, Zhuming Bi, Lida Xu, Puren Ouyang Aug 2022

Smart Manufacturing—Theories, Methods, And Applications, Zhuming Bi, Lida Xu, Puren Ouyang

Information Technology & Decision Sciences Faculty Publications

(First paragraph) Smart manufacturing (SM) distinguishes itself from other system paradigms by introducing ‘smartness’ as a measure to a manufacturing system; however, researchers in different domains have different expectations of system smartness from their own perspectives. In this Special Issue (SI), SM refers to a system paradigm where digital technologies are deployed to enhance system smartness by (1) empowering physical resources in production, (2) utilizing virtual and dynamic assets over the internet to expand system capabilities, (3) supporting data-driven decision making at all domains and levels of businesses, or (4) reconfiguring systems to adapt changes and uncertainties in dynamic environments. …


The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He Jan 2022

The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He

Information Technology & Decision Sciences Faculty Publications

This paper identifies opportunities for potential theoretical and practical improvements in employees' awareness of cybersecurity and their motivational behavior to protect themselves and their organizations from cyberattacks using the protection motivation theory. In addition, it contributes to the literature by examining additional variables and mediators besides the core constructs of the Protection Motivation Model (PMT). This article uses empirical data and structural equation modeling to test the antecedents and mediators of employees' cybersecurity motivational behavior. The study offers theoretical and pragmatic guidance for cybersecurity programs. First, the model developed in this study can partially explain how people may change their …


The State Of The Art Of Information Integration In Space Applications, Zhuming Bi, K. L. Yung, Andrew W.H. Ip., Yuk Ming Tang, Chris W.J. Zhang, Li Da Xu Jan 2022

The State Of The Art Of Information Integration In Space Applications, Zhuming Bi, K. L. Yung, Andrew W.H. Ip., Yuk Ming Tang, Chris W.J. Zhang, Li Da Xu

Information Technology & Decision Sciences Faculty Publications

This paper aims to present a comprehensive survey on information integration (II) in space informatics. With an ever-increasing scale and dynamics of complex space systems, II has become essential in dealing with the complexity, changes, dynamics, and uncertainties of space systems. The applications of space II (SII) require addressing some distinctive functional requirements (FRs) of heterogeneity, networking, communication, security, latency, and resilience; while limited works are available to examine recent advances of SII thoroughly. This survey helps to gain the understanding of the state of the art of SII in sense that (1) technical drivers for SII are discussed and …


Estimating Efforts For Various Activities In Agile Software Development: An Empirical Study, Lan Cao Jan 2022

Estimating Efforts For Various Activities In Agile Software Development: An Empirical Study, Lan Cao

Information Technology & Decision Sciences Faculty Publications

Effort estimation is an important practice in agile software development. The agile community believes that developers’ estimates get more accurate over time due to the cumulative effect of learning from short and frequent feedback. However, there is no empirical evidence of an improvement in estimation accuracy over time, nor have prior studies examined effort estimation in different development activities, which are associated with substantial costs. This study fills the knowledge gap in the field of software estimation in agile software development by investigating estimations across time and different development activities based on data collected from a large agile project. This …


Why Do Family Members Reject Ai In Health Care? Competing Effects Of Emotions, Eun Hee Park, Karl Werder, Lan Cao, Balasubramaniam Ramesh Jan 2022

Why Do Family Members Reject Ai In Health Care? Competing Effects Of Emotions, Eun Hee Park, Karl Werder, Lan Cao, Balasubramaniam Ramesh

Information Technology & Decision Sciences Faculty Publications

Artificial intelligence (AI) enables continuous monitoring of patients’ health, thus improving the quality of their health care. However, prior studies suggest that individuals resist such innovative technology. In contrast to prior studies that investigate individuals’ decisions for themselves, we focus on family members’ rejection of AI monitoring, as family members play a significant role in health care decisions. Our research investigates competing effects of emotions toward the rejection of AI monitoring for health care. Based on two scenario-based experiments, our study reveals that emotions play a decisive role in family members’ decision making on behalf of their parents. We find …


Promoting Diversity In Teaching Cybersecurity Through Gicl, Yuming He, Wu He, Xiaohong Yuan, Li Yang, Theo Bastiaens (Ed.) Jan 2021

Promoting Diversity In Teaching Cybersecurity Through Gicl, Yuming He, Wu He, Xiaohong Yuan, Li Yang, Theo Bastiaens (Ed.)

Information Technology & Decision Sciences Faculty Publications

In summary, it is necessary to develop a diverse group of K-12 students’ interest and skills in cybersecurity as cyber threats continue to grow. Evidence shows that educating the next generation of cyber workers is a crucial job that should begin in elementary school. To ensure the effectiveness of cybersecurity education and equity at the K-12 level, teachers must create thoughtful plans for considering communities’ interests and needs, and to continually reconsider what’s working and how to adjust our strategies, approaches, design, and research plan to meet their specific needs, challenges, and strengths, particularly with students from under-served and underrepresented …


Improving Stock Trading Decisions Based On Pattern Recognition Using Machine Learning Technology, Yaohu Lin, Shancun Liu, Haijun Yang, Harris Wu, Bingbing Jiang Jan 2021

Improving Stock Trading Decisions Based On Pattern Recognition Using Machine Learning Technology, Yaohu Lin, Shancun Liu, Haijun Yang, Harris Wu, Bingbing Jiang

Information Technology & Decision Sciences Faculty Publications

PRML, a novel candlestick pattern recognition model using machine learning methods, is proposed to improve stock trading decisions. Four popular machine learning methods and 11 different features types are applied to all possible combinations of daily patterns to start the pattern recognition schedule. Different time windows from one to ten days are used to detect the prediction effect at different periods. An investment strategy is constructed according to the identified candlestick patterns and suitable time window. We deploy PRML for the forecast of all Chinese market stocks from Jan 1, 2000 until Oct 30, 2020. Among them, the data from …


Stock Trend Prediction Using Candlestick Charting And Ensemble Machine Learning Techniques With A Novelty Feature Engineering Scheme, Yaohu Lin, Shancun Liu, Haijun Yang, Harris Wu Jan 2021

Stock Trend Prediction Using Candlestick Charting And Ensemble Machine Learning Techniques With A Novelty Feature Engineering Scheme, Yaohu Lin, Shancun Liu, Haijun Yang, Harris Wu

Information Technology & Decision Sciences Faculty Publications

Stock market forecasting is a knotty challenging task due to the highly noisy, nonparametric, complex and chaotic nature of the stock price time series. With a simple eight-trigram feature engineering scheme of the inter-day candlestick patterns, we construct a novel ensemble machine learning framework for daily stock pattern prediction, combining traditional candlestick charting with the latest artificial intelligence methods. Several machine learning techniques, including deep learning methods, are applied to stock data to predict the direction of the closing price. This framework can give a suitable machine learning prediction method for each pattern based on the trained results. The investment …


Generic Design Methodology For Smart Manufacturing Systems From A Practical Perspective, Part I—Digital Triad Concept And Its Application As A System Reference Model, Zhuming Bi, Wen-Jun Zhang, Chong Wu, Chaomin Luo, Lida Xu Jan 2021

Generic Design Methodology For Smart Manufacturing Systems From A Practical Perspective, Part I—Digital Triad Concept And Its Application As A System Reference Model, Zhuming Bi, Wen-Jun Zhang, Chong Wu, Chaomin Luo, Lida Xu

Information Technology & Decision Sciences Faculty Publications

Rapidly developed information technologies (IT) have continuously empowered manufacturing systems and accelerated the evolution of manufacturing system paradigms, and smart manufacturing (SM) has become one of the most promising paradigms. The study of SM has attracted a great deal of attention for researchers in academia and practitioners in industry. However, an obvious fact is that people with different backgrounds have different expectations for SM, and this has led to high diversity, ambiguity, and inconsistency in terms of definitions, reference models, performance matrices, and system design methodologies. It has been found that the state of the art SM research is limited …


Image Source Identification Using Convolutional Neural Networks In Iot Environment, Yan Wang, Qindong Sun, Dongzhu Rong, Shancang Li, Li Da Xu Jan 2021

Image Source Identification Using Convolutional Neural Networks In Iot Environment, Yan Wang, Qindong Sun, Dongzhu Rong, Shancang Li, Li Da Xu

Information Technology & Decision Sciences Faculty Publications

Digital image forensics is a key branch of digital forensics that based on forensic analysis of image authenticity and image content. The advances in new techniques, such as smart devices, Internet of Things (IoT), artificial images, and social networks, make forensic image analysis play an increasing role in a wide range of criminal case investigation. This work focuses on image source identification by analysing both the fingerprints of digital devices and images in IoT environment. A new convolutional neural network (CNN) method is proposed to identify the source devices that token an image in social IoT environment. The experimental results …


Exploring Cybersecurity Education At The K-12 Level, Weiru Chen, Yuming He, Xin Tian, Wu He, E. Langran (Ed.), D. Rutledge (Ed.) Jan 2021

Exploring Cybersecurity Education At The K-12 Level, Weiru Chen, Yuming He, Xin Tian, Wu He, E. Langran (Ed.), D. Rutledge (Ed.)

Information Technology & Decision Sciences Faculty Publications

K-12 cybersecurity education is receiving growing attention with the growing number of cyberattacks and a shortage of cybersecurity professionals. However, there are many barriers for teachers to implement effective cybersecurity education in formal classroom environments. This study conducts a systematic literature review to examine the current state-of-the-art on K-12 cybersecurity education. Through the systematic literature review, we identified 20 closely relevant papers and recognized that a well-designed curriculum in cybersecurity education at the K-12 level is strongly needed to motivate students to pursue cybersecurity pathways and careers. The challenge and suggestions of curriculum design, teaching strategy, and learning assessment are …


A Literature Review Of Quantum Education In K-12 Level, Yuming He, Shenghua Zha, Wu He, Theo Bastiaens (Ed.) Jan 2021

A Literature Review Of Quantum Education In K-12 Level, Yuming He, Shenghua Zha, Wu He, Theo Bastiaens (Ed.)

Information Technology & Decision Sciences Faculty Publications

Quantum computing is an emerging technology paradigm of computing and has the potential to solve computational problems intractable using today’s classical computers or digital technology. Quantum computing is expected to be disruptive for many industries. The power of quantum computing technologies is based on the fundamentals of quantum mechanics, such as quantum superposition, quantum entanglement, or the no-cloning theorem. To build a highly trained and skilled quantum workforce that meets future industry needs, there is a need to introduce quantum concepts early on in K-12 schools since the learning of quantum is a lengthy process. As fundamental quantum concepts derive …


Effect Of User Involvement In Supply Chain Cloud Innovation: A Game Theoretical Model And Analysis, Yun Chen, Lian Duan, Weiyong Zhang Jan 2020

Effect Of User Involvement In Supply Chain Cloud Innovation: A Game Theoretical Model And Analysis, Yun Chen, Lian Duan, Weiyong Zhang

Information Technology & Decision Sciences Faculty Publications

Cloud innovation has become increasingly important to supply chain innovation and performance. User involvement is a crucial part of cloud innovation. However, the effect of user involvement in supply chain cloud innovation has not been thoroughly studied, particularly its effect on product cost and optimal price. In this paper, the authors attempted to bridge this major gap in the literature. The authors reviewed the relevant literature to define cloud innovation and user involvement in supply chain cloud innovation. Then the authors developed a game model based on the Bertrand model. Analysis of the model showed that user involvement affects product …


Experimental Investigation On The Effects Of Website Aesthetics On User Performance In Different Virtual Tasks, Meinald T. Thielsch, Russell Haines, Leonie Flacke Jan 2019

Experimental Investigation On The Effects Of Website Aesthetics On User Performance In Different Virtual Tasks, Meinald T. Thielsch, Russell Haines, Leonie Flacke

Information Technology & Decision Sciences Faculty Publications

In Human-Computer Interaction research, the positive effect of aesthetics on users' subjective impressions and reactions is well-accepted. However, results regarding the influence of interface aesthetics on a user's individual performance as an objective outcome are very mixed, yet of urgent interest due to the proceeding of digitalization. In this web-based experiment (N = 331), the effect of interface aesthetics on individual performance considering three different types of tasks (search, creative, and transfer tasks) is investigated. The tasks were presented on an either aesthetic or unaesthetic website, which differed significantly in subjective aesthetics. Goal orientation (learning versus performance goals) was included …


Automated Trading Systems Statistical And Machine Learning Methods And Hardware Implementation: A Survey, Boming Huang, Yuziang Huan, Li Da Xu, Lirong Zheng, Zhuo Zou Jan 2019

Automated Trading Systems Statistical And Machine Learning Methods And Hardware Implementation: A Survey, Boming Huang, Yuziang Huan, Li Da Xu, Lirong Zheng, Zhuo Zou

Information Technology & Decision Sciences Faculty Publications

Automated trading, which is also known as algorithmic trading, is a method of using a predesigned computer program to submit a large number of trading orders to an exchange. It is substantially a real-time decision-making system which is under the scope of Enterprise Information System (EIS). With the rapid development of telecommunication and computer technology, the mechanisms underlying automated trading systems have become increasingly diversified. Considerable effort has been exerted by both academia and trading firms towards mining potential factors that may generate significantly higher profits. In this paper, we review studies on trading systems built using various methods and …


Advances In Processing, Mining, And Learning Complex Data: From Foundations To Real-World Applications, Jia Wu, Shirui Pan, Chuan Zhou, Gang Li, Wu He, Chengqi Zhang Jan 2018

Advances In Processing, Mining, And Learning Complex Data: From Foundations To Real-World Applications, Jia Wu, Shirui Pan, Chuan Zhou, Gang Li, Wu He, Chengqi Zhang

Information Technology & Decision Sciences Faculty Publications

Processing, mining, and learning complex data refer to an advanced study area of data mining and knowledge discovery concerning the development and analysis of approaches for discovering patterns and learning models from data with a complex structure (e.g., multirelational data, XML data, text data, image data, time series, sequences, graphs, streaming data, and trees) [15]. These kinds of data are commonly encountered in many social, economic, scientific, and engineering applications. Complex data pose new challenges for current research in data mining and knowledge discovery as they require new methods for processing, mining, and learning them. Traditional …


Industrial Wireless Sensor Networks 2016, Qindong Sun, Schancang Li, Shanshan Zhao, Hongjian Sun, Li Xu, Arumugam Nallamathan Jan 2017

Industrial Wireless Sensor Networks 2016, Qindong Sun, Schancang Li, Shanshan Zhao, Hongjian Sun, Li Xu, Arumugam Nallamathan

Information Technology & Decision Sciences Faculty Publications

The industrial wireless sensor network (IWSN) is the next frontier in the Industrial Internet of Things (IIoT), which is able to help industrial organizations to gain competitive advantages in industrial manufacturing markets by increasing productivity, reducing the costs, developing new products and services, and deploying new business models.


Semantic Inference On Clinical Documents: Combining Machine Learning Algorithms With An Inference Engine For Effective Clinical Diagnosis And Treatment, Shuo Yang, Ran Wei, Jingzhi Guo, Lida Xu Jan 2017

Semantic Inference On Clinical Documents: Combining Machine Learning Algorithms With An Inference Engine For Effective Clinical Diagnosis And Treatment, Shuo Yang, Ran Wei, Jingzhi Guo, Lida Xu

Information Technology & Decision Sciences Faculty Publications

Clinical practice calls for reliable diagnosis and optimized treatment. However, human errors in health care remain a severe issue even in industrialized countries. The application of clinical decision support systems (CDSS) casts light on this problem. However, given the great improvement in CDSS over the past several years, challenges to their wide-scale application are still present, including: 1) decision making of CDSS is complicated by the complexity of the data regarding human physiology and pathology, which could render the whole process more time-consuming by loading big data related to patients; and 2) information incompatibility among different health information systems (HIS) …


Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai Jan 2017

Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai

Information Technology & Decision Sciences Faculty Publications

As cloud computing becomes increasingly popular, cloud providers compete to offer the same or similar services over the Internet. Quality of service (QoS), which describes how well a service is performed, is an important differentiator among functionally equivalent services. It can help a firm to satisfy and win its customers. As a result, how to assist cloud providers to promote their services and cloud consumers to identify services that meet their QoS requirements becomes an important problem. In this paper, we argue for QoS-based cloud service recommendation, and propose a collaborative filtering approach using the Spearman coefficient to recommend cloud …


Gender Difference And Employees' Cybersecurity Behaviors, Mohd Anwar, Wu He, Ivan Ash, Xiaohong Yuan, Ling Li, Li Xu Jan 2017

Gender Difference And Employees' Cybersecurity Behaviors, Mohd Anwar, Wu He, Ivan Ash, Xiaohong Yuan, Ling Li, Li Xu

Information Technology & Decision Sciences Faculty Publications

Security breaches are prevalent in organizations and many of the breaches are attributed to human errors. As a result, the organizations need to increase their employees' security awareness and their capabilities to engage in safe cybersecurity behaviors. Many different psychological and social factors affect employees' cybersecurity behaviors. An important research question to explore is to what extent gender plays a role in mediating the factors that affect cybersecurity beliefs and behaviors of employees. In this vein, we conducted a cross-sectional survey study among employees of diverse organizations. We used structural equation modelling to assess the effect of gender as a …


Industrial Wireless Sensor Networks, Shancang Li, Hongjian Sun, Arumugam Nallanathan, Li Xu, Shanshan Zhao, Qindong Sun Jan 2014

Industrial Wireless Sensor Networks, Shancang Li, Hongjian Sun, Arumugam Nallanathan, Li Xu, Shanshan Zhao, Qindong Sun

Information Technology & Decision Sciences Faculty Publications

(First Paragraph) Industrial wireless sensor networks (IWSNs) incorporate wireless sensor networks with intelligent industrial systems providing many advantages over existing industrial applications, such as wireless communication, low cost, rapid deployment, self-organization, intelligent controlling, and processing capability. With the proliferation of wireless sensor networks in industrial applications, IWSNs technologies promise to play a significant role in developing more reliable, efficient, stable, flexible, and application-centric industrial systems.