Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

School of Computer & Information Science

2008

Articles 1 - 18 of 18

Full-Text Articles in Computer Sciences

Enterprise Vault And Discovery Accelerator: Email Archiving And Discovery Solution Implementation And The Legal Landscape, David Beebe Dec 2008

Enterprise Vault And Discovery Accelerator: Email Archiving And Discovery Solution Implementation And The Legal Landscape, David Beebe

Regis University Student Publications (comprehensive collection)

One of the most pressing Information Technology challenges organizations are facing today is managing the vast amount of data that exist at their company, especially with regard to email data. Over the last decade many legal regulations have been passed and amended to address these growing data concerns, especially with regard to email, as they contain critical business communications. These regulations require organizations to be able to quickly and accurately search and recover email data related to legal proceedings, which has led to an overwhelming adoption of email archiving and recovery solutions. Email archiving and recovery solutions allow organizations to …


An Investigation Of The Security Designs Of A Structured Query Language (Sql) Database And Its Middleware Application And Their Secure Implementation Within Thinclient Environments, Melissa D. Winner-Leoni Oct 2008

An Investigation Of The Security Designs Of A Structured Query Language (Sql) Database And Its Middleware Application And Their Secure Implementation Within Thinclient Environments, Melissa D. Winner-Leoni

Regis University Student Publications (comprehensive collection)

The Information Portability and Accountability Act (HIPAA) and The SarbanesOxley (SOX) regulations greatly influenced the health care industry regarding the means of securing financial and private data within information and technology. With the introduction of thinclient technologies into medical information systems (IS), data security and regulation compliancy becomes more problematic due to the exposure to the World Wide Web (WWW) and malicious activity. This author explores the best practices of the medical industry and information technology industry for securing electronic data within the thinclient environment at the three levels of architecture: the SQL database, its middleware application, and Web interface. …


Development Of A Physician Profiling Data Mart, Connie Chambers Aug 2008

Development Of A Physician Profiling Data Mart, Connie Chambers

Regis University Student Publications (comprehensive collection)

Hospitals and medical centers participate in a physician profiling process. This process is important to ensure that physicians are providing safe care and to comply with regulations. One medical center was struggling with the ongoing generation of physician performance reports that were an important part of the profiling process. A design research project was undertaken to demonstrate that an Access-based data mart could successfully streamline this report generating process. The research also demonstrated the need to eliminate excessive detail and deliver highly summarized reports. In addition, the research provided thorough documentation of the entire data mart development approach. This documentation …


Implementation Of The Metadata Elements Of The Inspire Directive, Fiona Lawlor Aug 2008

Implementation Of The Metadata Elements Of The Inspire Directive, Fiona Lawlor

Regis University Student Publications (comprehensive collection)

The INSPIRE Directive entered into force in 2007. The INSPIRE (Infrastructure for Spatial Information in Europe) initiative seeks to set in place mechanisms for sharing spatial data across Europe. Metadata is one of these mechanisms: to enable discovery and to act as an information source about spatial data resources. This project examines the implementation of spatial data metadata in Ireland. Using an Irish public service organisation as a case study, the project examines how metadata creation and presentation could be optimised to provide the best value for the end user. This project also examines database tools that can be leveraged …


Enhancing The Development Process With Wikified Widgets, Gary Gotchel Aug 2008

Enhancing The Development Process With Wikified Widgets, Gary Gotchel

Regis University Student Publications (comprehensive collection)

Wikis are now merging with other applications. Structured wikis, also known as application wikis, have evolved in recent years. This second generation has embedded applications into the wiki, which are used to structure access to the wiki repository's otherwise unstructured content. This paper investigates the other possible approach to merging wikis with applications. It researches the utility of embedding wiki functionality into common applications. Utility will be measured by the benefits to the software development process offered by this approach. I introduce a new term, wikified widget, to describe a GUI component that provides structured access to a wiki repository …


Recommendations For Applying Security-Centric Technology Utilizing A Layered Approach In The Era Of Ubiquitous Computing: (A Guide For The Small Business Enterprise)., Yevetta Gibson Aug 2008

Recommendations For Applying Security-Centric Technology Utilizing A Layered Approach In The Era Of Ubiquitous Computing: (A Guide For The Small Business Enterprise)., Yevetta Gibson

Regis University Student Publications (comprehensive collection)

The purpose of this work is to advise and assist Small Business in applying security centric technology to better manage and secure their information assets. Computer Crimes and Incursions are growing exponentially, in complexity, and in their sinister application. In the face of this onslaught small businesses, indeed organizations everywhere, need to accept this as a business constant or reality, identify the threats, acknowledge the vulnerabilities, and make plans to meet these challenges.


Controlling Information Technology Costs And Reporting Roi In Large Organizations, Darrell Jones Feb 2008

Controlling Information Technology Costs And Reporting Roi In Large Organizations, Darrell Jones

Regis University Student Publications (comprehensive collection)

Controlling the cost of information technology (IT) and reporting return on investment in such technologies in large organizations has long been problematic because IT is a significant cost center that in most companies does not contribute directly to the generation of revenue. At the same time, the services provided by IT departments directly affect the bottom lines of modern companies and provide valuable efficiencies. Measuring and reporting the effects of those efficiencies has been hampered by two fairly typical shortcomings of IT managers. IT managers whose primary training is in their own discipline tend to view technology issues in terms …


Information Sharing Solutions For Nato Headquarters, Wade Alarie Jan 2008

Information Sharing Solutions For Nato Headquarters, Wade Alarie

Regis University Student Publications (comprehensive collection)

NATO is an Alliance of 26 nations that operates on a consensus basis, not a majority basis. Thorough and timely information exchange between nations is fundamental to the Business Process. Current technology and practices at NATO HQ are inadequate to meet modern-day requirements despite the availability of demonstrated and accredited Cross-Domain technology solutions. This lack of integration between networks is getting more complicated with time, as nations continue to invest in IT and ignore the requirements for inter-networked gateways. This contributes to inefficiencies, fostering an atmosphere where shortcuts are taken in order to get the job done. The author recommends …


Effective Progression Of Temporary Virtual Teams Over Time: A Pragmatic Investigation Towards The Development Of An Internal Structure To Support Knowledge Sharing, Jon F. Davis Jan 2008

Effective Progression Of Temporary Virtual Teams Over Time: A Pragmatic Investigation Towards The Development Of An Internal Structure To Support Knowledge Sharing, Jon F. Davis

Regis University Student Publications (comprehensive collection)

Enabled by communications and information technology, temporary virtual teams are able to utilize talent from anywhere in the globe to service customers, solve business problems, and provide unique educational experiences. Temporary virtual teams, however, face many challenges to their effectiveness. In particular, many challenges to effective communication and knowledge sharing exist. To be effective, methods intended to address the unique challenges presented in the temporary virtual team environment are needed. This paper presents practical methodologies that can be used towards the development of an internal structure to support knowledge sharing between temporary virtual teams.


A Business Continuity Solution For Telecommunications Billing Systems, Andrew Mccormack Jan 2008

A Business Continuity Solution For Telecommunications Billing Systems, Andrew Mccormack

Regis University Student Publications (comprehensive collection)

The billing system is a critical component in a Telecommunications service provider's suite of business support systems - without the billing system the provider cannot invoice their customers for services provided and therefore cannot generate revenue. Typically billing systems are hosted on a single large Unix/Oracle system located in the company's data centre. Modern Unix servers with their redundant components and hot swap parts are highly resilient and can provide levels of availability when correctly installed in properly managed data centre with uninterruptible power supplies, cooling etc. High Availability clustering through the use of HP MC/ServiceGuard, Sun Cluster, IBM HACMP …


Designing And Implementing A Backup And Recovery System For Kentucky's Cooperative Extension Service, Wesley G. Justice Jan 2008

Designing And Implementing A Backup And Recovery System For Kentucky's Cooperative Extension Service, Wesley G. Justice

Regis University Student Publications (comprehensive collection)

This project proposes the development and proof of concept implementation of a comprehensive backup and recovery plan for Kentucky's Cooperative Extension Service. Currently, no standardized backup system is in place. Each CES office location contains between five and forty Windows based workstations and at least one server, and backup methods vary from office to office. Current backup processes are inadequate in several key areas. To ensure the availability and integrity of mission critical data, the goal of this project is the analysis, design, and implementation of a standardized backup and recovery plan. The project will consider multiple hardware and software …


The Value Proposition Of Service-Oriented Architecture, David Norman Jan 2008

The Value Proposition Of Service-Oriented Architecture, David Norman

Regis University Student Publications (comprehensive collection)

The author of this thesis evaluates Service-Oriented Architecture (SOA) design and implementation strategies. The purpose is to provide the reader with the definition of Service-Oriented Architecture. This report discusses: (1) The definition of Service-Oriented Architecture, (2) The problems solved by Service-Oriented Architecture, (3) Application of design principles to achieve Service-Oriented Architecture. As a result of this investigation, Service-Oriented Architecture is a design style that is fundamentally about sharing and reuse of functionality across diverse applications, so that organizations can quickly adapt to changing business requirements while increasing IT asset reuse and minimizing integration and development costs.


Gjxdm Documents And Small Law Enforcement Agencies, Darin Dillard Jan 2008

Gjxdm Documents And Small Law Enforcement Agencies, Darin Dillard

Regis University Student Publications (comprehensive collection)

The purpose of this paper is to demonstrate that while the Global Justice XML Data Model (GJXDM) is a complete and effective solution for criminal justice agencies it is complex to implement and difficult for smaller law enforcement agencies to put into practice. The paper presents the current implementation steps for a new GJXDM document and describes the process of implementing an existing GJXDM document. The paper also presents a tool for agencies to start using and processing GJXDM documents. Also offered within the paper is a design for a central repository for increasing GJXDM information sharing and dissemination of …


Managing The Cost Of Usable Data Centers, Sisomphone. Khantaphixay Jan 2008

Managing The Cost Of Usable Data Centers, Sisomphone. Khantaphixay

Regis University Student Publications (comprehensive collection)

The main topic of this paper is to identify problems and present an overview of Data Center environments. To identify problems and present the overviews of business data environments and the cost of usable data center for small-midsize business organization based type of requirements on the design is one of the most important concepts of managing cost. To maximized data center efficiency administrators implement Blade Server, Virtualization, SOA, and other recent technologies. The project process will focus on most leased data centers with provided space rather than specific applications that trend the way of design, and eliminating the significant impact …


Investment Technology For Trading Business: Delineating Requirements, Processes, And Design Decisions For Order-Management Systems, Daniel L. Mark Jan 2008

Investment Technology For Trading Business: Delineating Requirements, Processes, And Design Decisions For Order-Management Systems, Daniel L. Mark

Regis University Student Publications (comprehensive collection)

The requirements and processes for building a robust order management system (OMS) for trading of investments within financial services firms are investigated and enumerated. Requirements and process documentation are not readily available to members of the general public because they are considered a source of competitive advantage in a highly profitable industry. This paper provides single source documentation of those requirements and processes in the context of the Vested OMS application, which was constructed specifically to meet industry needs in this area. This paper describes in detail the core functionality investment businesses currently demand and the software development techniques used …


Developing A Proactive Framework For E-Discovery Compliance, Gerald L. Wallner Jan 2008

Developing A Proactive Framework For E-Discovery Compliance, Gerald L. Wallner

Regis University Student Publications (comprehensive collection)

The purpose of this document is to provide Information Systems Management an awareness of a compliance risk associated with the management of electronic data. The changes to the Federal Rules of Civil Procedure in 2006 make electronic data discoverable as evidence for civil court cases introducing the need for proactive management of end user data beyond the data that a particular form of legislation may require. Leveraging existing forensic data collection processes and raising the awareness of the problem and risk to the organization will provide a level of assurance for compliance should the data be requested in a civil …


Wireless Handheld Solution For The Gaming Industry, Mo T. Hyder Jan 2008

Wireless Handheld Solution For The Gaming Industry, Mo T. Hyder

Regis University Student Publications (comprehensive collection)

of the essential elements of success in the gaming industry is the requirement of providing exceptional customer service. Technology plays a significant role in bringing state of the art solutions that enhance the overall customer experience. Currently a guest must go through multiple steps and a variety of departments to simply resolve issues with their player accounts (loyalty programs), update customer profiles, book hotel and restaurant reservations, sign up for promotions, etc. In order to effectively take care of these customers in both a timely and efficient manner, a wireless handheld device is needed that employees can carry with them …


Home Owner Associations (Hoas) Should Use Centralization And Modern Knowledge Management Practices To Effectively Distribute Their Covenants, Conditions And Restrictions (Cc&Rs) And To Improve Relations With Residents, Robert A. Ochoa Jan 2008

Home Owner Associations (Hoas) Should Use Centralization And Modern Knowledge Management Practices To Effectively Distribute Their Covenants, Conditions And Restrictions (Cc&Rs) And To Improve Relations With Residents, Robert A. Ochoa

Regis University Student Publications (comprehensive collection)

This thesis will introduce the history of knowledge management, knowledge management of today, and the benefits of knowledge management practices. As an example of the need for knowledge management practices, the many problems being experienced by Home Owner Association's (HOA's) will be discussed, and the many creative ways that knowledge management practices are used today will be shared. There are many organizations that could benefit from knowledge management practices, and there are many solutions that could be used. The characteristics of an organization in trouble and in need of knowledge management practices will begin to surface in the form of …