Open Access. Powered by Scholars. Published by Universities.®
Databases and Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Information Security (41)
- Graphics and Human Computer Interfaces (29)
- Social and Behavioral Sciences (27)
- Software Engineering (21)
- Theory and Algorithms (21)
-
- Engineering (20)
- Artificial Intelligence and Robotics (18)
- Computer Engineering (17)
- Library and Information Science (16)
- Other Computer Sciences (16)
- OS and Networks (13)
- Cataloging and Metadata (10)
- Systems Architecture (10)
- Digital Communications and Networking (9)
- Data Storage Systems (8)
- Scholarly Communication (8)
- Archival Science (7)
- Arts and Humanities (7)
- Education (7)
- Business (6)
- Collection Development and Management (6)
- Environmental Sciences (6)
- Public Affairs, Public Policy and Public Administration (6)
- Technology and Innovation (6)
- Data Science (5)
- Mathematics (5)
- Numerical Analysis and Scientific Computing (5)
- Institution
-
- Institute of Business Administration (36)
- University for Business and Technology in Kosovo (23)
- Kennesaw State University (13)
- University of Dayton (12)
- Purdue University (10)
-
- Southern Adventist University (8)
- University of Nebraska at Omaha (6)
- University of Nevada, Las Vegas (6)
- Old Dominion University (5)
- San Jose State University (5)
- Arkansas Tech University (3)
- Minnesota State University Moorhead (3)
- Embry-Riddle Aeronautical University (2)
- Georgia State University (2)
- Portland State University (2)
- University of Central Florida (2)
- University of San Diego (2)
- Arcadia University (1)
- Georgia College (1)
- Illinois Math and Science Academy (1)
- Illinois State University (1)
- Stephen F. Austin State University (1)
- The University of San Francisco (1)
- University of South Florida (1)
- University of Vermont (1)
- Western University (1)
- Western Washington University (1)
- World Maritime University (1)
- Keyword
-
- Information security (6)
- Information technology (5)
- Application software (4)
- Computer networks (4)
- Data mining (4)
-
- Information systems (4)
- Collaboration (3)
- Data security (3)
- Databases (3)
- Mathematics (3)
- Programming (3)
- Project management (3)
- Resource management (3)
- Routing protocols (3)
- Software engineering (3)
- Technology (3)
- Algorithm design and analysis (2)
- Asynchronous transfer mode (2)
- Capability maturity model (2)
- Communication system security (2)
- Computer architecture (2)
- Computer errors (2)
- Computer industry (2)
- Computer science (2)
- Computer security (2)
- Computer simulation (2)
- Cryptography (2)
- Data Analysis (2)
- Database (2)
- Disaster management (2)
- Publication Year
- Publication
-
- International Conference on Information and Communication Technologies (36)
- UBT International Conference (23)
- MAICS: The Modern Artificial Intelligence and Cognitive Science Conference (12)
- Campus Research Day (8)
- African Conference on Information Systems and Technology (6)
-
- The Summer Undergraduate Research Fellowship (SURF) Symposium (6)
- UNO Student Research and Creative Activity Fair (6)
- Cybersecurity Undergraduate Research Showcase (5)
- Inaugural CSU IR Conference, 2015 (5)
- Symposium of Student Scholars (4)
- ATU Research Symposium (3)
- College of Engineering: Graduate Celebration Programs (3)
- Student Academic Conference (3)
- Digital Initiatives Symposium (2)
- Georgia State Undergraduate Research Conference (2)
- Giving Undergraduate Research a Worldwide Voice: Institutional Repositories as Publishers (2)
- I-GUIDE Forum (2)
- Student Research Symposium (2)
- 2010 Annual Nevada NSF EPSCoR Climate Change Conference (1)
- All Things Open (1)
- Annual Symposium on Biomathematics and Ecology Education and Research (1)
- Capstone Showcase (1)
- Charleston Library Conference (1)
- Creative Activity and Research Day - CARD (1)
- Electronic Literature Organization Conference 2020 (1)
- Engagement & Service-Learning Summit (1)
- Festival of Communities: UG Symposium (Posters) (1)
- Georgia College Student Research Events (1)
- Graduate Student Symposium (1)
- International Crisis and Risk Communication Conference (1)
- File Type
Articles 31 - 60 of 151
Full-Text Articles in Databases and Information Systems
Exploring Ai And Multiplayer In Java, Ronni Kurtzhals
Exploring Ai And Multiplayer In Java, Ronni Kurtzhals
Student Academic Conference
I conducted research into three topics: artificial intelligence, package deployment, and multiplayer servers in Java. This research came together to form my project presentation on the implementation of these topics, which I felt accurately demonstrated the various things I have learned from my courses at Moorhead State University. Several resources were consulted throughout the project, including the work of W3Schools and StackOverflow as well as relevant assignments and textbooks from previous classes. I found this project relevant to computer science and information systems for several reasons, such as the AI component and use of SQL data tables; but it was …
Sql Injection & Web Application Security: A Python-Based Network Traffic Detection Model, Nyki Anderson
Sql Injection & Web Application Security: A Python-Based Network Traffic Detection Model, Nyki Anderson
Cybersecurity Undergraduate Research Showcase
The Internet of Things (IoT) presents a great many challenges in cybersecurity as the world grows more and more digitally dependent. Personally identifiable information (PII) (i,e., names, addresses, emails, credit card numbers) is stored in databases across websites the world over. The greatest threat to privacy, according to the Open Worldwide Application Security Project (OWASP) is SQL injection attacks (SQLIA) [1]. In these sorts of attacks, hackers use malicious statements entered into forms, search bars, and other browser input mediums to trick the web application server into divulging database assets. A proposed technique against such exploitation is convolution neural network …
The Introduction Of Big Data In Cloud Computing, Austin Gruenberg
The Introduction Of Big Data In Cloud Computing, Austin Gruenberg
Student Academic Conference
One of the fastest-growing technologies that many people are unaware of is the world of cloud computing. Having started in 2006, it is a relatively new technological advancement in the computer industry. The major branch of cloud computing that I decided to focus on was big data. I decided to research this topic to better understand what its current uses are, to see what the future holds for Big Data and cloud computing and because it is a growing, significant piece of technology being used in our society today. Big data and cloud computing are very important industries and have …
Lulling Waters: A Poetry Reading For Real-Time Music Generation Through Emotion Mapping, Ashley Muniz, Toshihisa Tsuruoka
Lulling Waters: A Poetry Reading For Real-Time Music Generation Through Emotion Mapping, Ashley Muniz, Toshihisa Tsuruoka
Electronic Literature Organization Conference 2020
Through a poetic narrative, “Lulling Waters” tells the story of a whale overcoming the loss of his mother, who passed away from ingesting plastic, as he attempts to escape from the polluted oceanic world. The live performance of this poem utilizes a software system called Soundwriter, which was developed with the goal of enriching the oral storytelling experience through music. This video demonstrates how Soundwriter’s real-time hybrid system was able to analyze “Lulling Waters” through its lexical and auditory features. Emotionally salient words were given ratings based on arousal, valence, and dominance while the emotionally charged prosodic features of the …
Server Score, Zachary Buresh
Server Score, Zachary Buresh
Student Academic Conference
This presentation is in regards to the Android mobile application that I developed in the Kotlin programming language named "Server Score". The app helps waiters/waitresses calculate, track, and predict performance related statistics on the job.
Mind The Gap: Understanding Stakeholder Reactions To Different Types Of Data Security, Audra Diers-Lawson, Amelia Symons
Mind The Gap: Understanding Stakeholder Reactions To Different Types Of Data Security, Audra Diers-Lawson, Amelia Symons
International Crisis and Risk Communication Conference
Data security breaches are an increasingly common problem for organizations, yet there are critical gaps in our understanding of how different stakeholders understand and evaluate organizations that have experienced these kinds of security breaches. While organizations have developed relatively standard approaches to responding to security breaches that: (1) acknowledge the situation; (2) highlight how much they value their stakeholders’ privacy and private information; and (3) focus on correcting and preventing the problem in the future, the effectiveness of this response strategy and factors influencing it have not been adequately explored. This experiment focuses on a 2 (type of organization) x …
Transfer Equivalency Site For The Registrar, Janelle N. Rohrbach, Alissa C. Cielecki, Jules A. Turner
Transfer Equivalency Site For The Registrar, Janelle N. Rohrbach, Alissa C. Cielecki, Jules A. Turner
Capstone Showcase
The website, arcadia-transfer-equiv.com, was drafted and created for Bill Enick, Registrar at Arcadia University. This was an expansion of a preliminary version of the website created by Caleigh Diefenthaler, Christian Charney, and Dylan Power. The site includes two transfer equivalency tools which can be used to search for course equivalencies by academic institution or by a given Arcadia course. The tools, which pull from a database maintained by the Registrar, will display courses that have transferred to the University successfully. The website also hosts two interactive forms. These forms allow Arcadia students to request approval for courses that have or …
Data Curation Workshop: Tips And Tools For Today, Matthew M. Benzing
Data Curation Workshop: Tips And Tools For Today, Matthew M. Benzing
Charleston Library Conference
The current state of research data is like a disorganized photo collection: a mix of formats scattered across different media without a lot of authority control. That is changing as the need to make data available to researchers across the world is becoming recognized. Researchers know that their data needs to be maintained and made accessible, but often they do not have the time or the inclination to get involved in all of the details. This provides an excellent opportunity for librarians. Data curation is the process of preparing data to be made available in a repository with the goal …
Social Inclusion In The Digital Era: Rethinking Debates And Narratives In The World Bank Report., Calisto Kondowe, Wallace Chigona
Social Inclusion In The Digital Era: Rethinking Debates And Narratives In The World Bank Report., Calisto Kondowe, Wallace Chigona
African Conference on Information Systems and Technology
The 2019 (5th) proceedings of ACIST focuses on how African societies are leveraging and can leverage the smart capabilities in digital technologies to address organizational and societal challenges. Technology-enabled solutions offer solutions to many of these challenges. Digital technologies are increasingly becoming integral to and interdependent with the African society.
An Electronic Framework To Shepherd The Pastoral Livestock (Resolve Conflicts In Pastoral Communities), Frezewd Lemma, Anteneh Alemu, Desta Zerihun, Endale Aregu
An Electronic Framework To Shepherd The Pastoral Livestock (Resolve Conflicts In Pastoral Communities), Frezewd Lemma, Anteneh Alemu, Desta Zerihun, Endale Aregu
African Conference on Information Systems and Technology
This paper proposes a tracking framework based on GPS enabled location sensors, the GSM/WCDMA wireless network, and algorithms running in an edge clouds to resolve deadly conflicts that arise in the Africans pastorals community. The paper also proposes an automatic digital identification mechanism that helps resolve conflicts during animals mixup. This algorithmic based solution would totally relief the community from using the traditional identification mechanisms such as hot branding which are known to be cruel to animals. To communicate with the pastorals, the framework takes into consideration the low level literacy of the community as well as their use of …
Factors Influencing Customers’ Attitude For Using M-Birr Adoption In Ethiopia, Gebremedhin Gebreyohans, Abdurehman Ali
Factors Influencing Customers’ Attitude For Using M-Birr Adoption In Ethiopia, Gebremedhin Gebreyohans, Abdurehman Ali
African Conference on Information Systems and Technology
Diffusion of Innovations (DOI) is a theory to explain how and over time new philosophies and then technology diffuse into different contexts. This research tested the attributes of DOI and other variables empirically,usingM-Birr system as the goal of the innovation. The research was conducted among customers of M-Birr service in Addis Ababa, Ethiopia. The data collection instrument was a closed-ended questionnaire administered to 360 respondents of which 211 were returned giving 58.6% return rate. The demographic make-up of the respondents showed that most of them were between the age of 30 to 50 and degree holders. From the factor analysis …
Yelp Improved : Aggregating Restaurant Reviews, Kunal Sonar
Yelp Improved : Aggregating Restaurant Reviews, Kunal Sonar
Creative Activity and Research Day - CARD
In the near future, online food delivery service companies would occupy a big market share in the food industry. This project aims to provide factual information from customer reviews as part of the numerous innovations in place to drive business and demands. Natural Language Processing is used to provide a comprehensive view of individual restaurants using technologies like NLTK, SpaCy, Gensim and Sklearn. Data of one million Las Vegas restaurant customer reviews is curated from the Yelp Dataset Challenge. Reviews are pre-processed, split into chunks of phrases and mapped to attributes like food, budget, service etc. These attributes are derived …
Evaluating An Electronic Protocol In A Pediatric Intensive Care Unit, Jeanette Rose
Evaluating An Electronic Protocol In A Pediatric Intensive Care Unit, Jeanette Rose
UNO Student Research and Creative Activity Fair
A team of clinicians at Children’s Hospital and Medical Center (CHMC) developed a standardized protocol in 2018 for the care of patients needing sedation. This protocol is ordered through the EPIC electronic health record system for patients in the pediatric intensive care unit (PICU). When used, electronic protocols reduce the variation in clinical decision making which can ultimately improve patient outcomes. The goal of this project is to evaluate this technology, how the protocol is being used, and how it may be improved. Actual users of the EPIC sedation protocol were the subjects of this study, including PICU physicians, physician …
Forensics Analysis For Bone Pair Matching Using Bipartite Graphs In Commingled Remains, Ryan Ernst
Forensics Analysis For Bone Pair Matching Using Bipartite Graphs In Commingled Remains, Ryan Ernst
UNO Student Research and Creative Activity Fair
Identification of missing prisoners of war is a complex and time consuming task. There are many missing soldiers whose remains have yet to be returned to their families and loved ones. This nation has a solemn obligation to its soldiers and their families who have made the ultimate sacrifice for their country. There are currently over 82,000 unidentified prisoners of war which are identified at a rate of 100+ per year. At this rate it would take 300+ years to complete the identification process. Previously, anthropologists used excel spreadsheets to sort through skeletal data. This project aims to streamline the …
Astria Ontology: Open, Standards-Based, Data-Aggregated Representation Of Space Objects, Jennie Wolfgang, Kathleen Krysher, Michael Slovenski, Unmil P. Karadkar, Shiva Iyer, Moriba K. Jah
Astria Ontology: Open, Standards-Based, Data-Aggregated Representation Of Space Objects, Jennie Wolfgang, Kathleen Krysher, Michael Slovenski, Unmil P. Karadkar, Shiva Iyer, Moriba K. Jah
Space Traffic Management Conference
The necessity for standards-based ontologies for long-term sustainability of space operations and safety of increasing space flights has been well-established [6, 7]. Current ontologies, such as DARPA’s OrbitOutlook [5], are not publicly available, complicating efforts for their broad adoption. Most sensor data is siloed in proprietary databases [2] and provided only to authorized users, further complicating efforts to create a holistic view of resident space objects (RSOs) in order to enhance space situational awareness (SSA).
The ASTRIA project is developing an open data model with the goal of aggregating data about RSOs, parts, space weather, and governing policies in order …
Vulnerability Assessment & Penetration Testing: Case Study On Web Application Security, Gazmend Krasniqi, Veton Bejtullahu
Vulnerability Assessment & Penetration Testing: Case Study On Web Application Security, Gazmend Krasniqi, Veton Bejtullahu
UBT International Conference
Complexity of information systems are increasing day by day. The security of information systems that are connected to public networks can be compromised by unauthorized, and usually anonymous, attempts to access them. By using public networks businesses and other institutions are exposed to numerous risks. This leads to more and more vulnerabilities in Information Systems. This situation calls for test methods that are devised from the attacker’s perspective to ensure that test conditions are as realistic as possible. In this paper we will describe complete stages of Vulnerability Assessment and Penetration Testing on some systems in UBT and proactive action …
Predict The Failure Of Hydraulic Pumps By Different Machine Learning Algorithms, Yifei Zhou, Monika Ivantysynova, Nathan Keller
Predict The Failure Of Hydraulic Pumps By Different Machine Learning Algorithms, Yifei Zhou, Monika Ivantysynova, Nathan Keller
The Summer Undergraduate Research Fellowship (SURF) Symposium
Pump failure is a general concerned problem in the hydraulic field. Once happening, it will cause a huge property loss and even the life loss. The common methods to prevent the occurrence of pump failure is by preventative maintenance and breakdown maintenance, however, both of them have significant drawbacks. This research focuses on the axial piston pump and provides a new solution by the prognostic of pump failure using the classification of machine learning. Different kinds of sensors (temperature, acceleration and etc.) were installed into a good condition pump and three different kinds of damaged pumps to measure 10 of …
Sort Vs. Hash Join On Knights Landing Architecture, Victor L. Pan, Felix Lin
Sort Vs. Hash Join On Knights Landing Architecture, Victor L. Pan, Felix Lin
The Summer Undergraduate Research Fellowship (SURF) Symposium
With the increasing amount of information stored, there is a need for efficient database algorithms. One of the most important database operations is “join”. This involves combining columns from two tables and grouping common values in the same row in order to minimize redundant data. The two main algorithms used are hash join and sort merge join. Hash join builds a hash table to allow for faster searching. Sort merge join first sorts the two tables to make it more efficient when comparing values. There has been a lot of debate over which approach is superior. At first, hash join …
Expected Length Of The Longest Chain In Linear Hashing, Pongthip Srivarangkul, Hemanta K. Maji
Expected Length Of The Longest Chain In Linear Hashing, Pongthip Srivarangkul, Hemanta K. Maji
The Summer Undergraduate Research Fellowship (SURF) Symposium
Hash table with chaining is a data structure that chains objects with identical hash values together with an entry or a memory address. It works by calculating a hash value from an input then placing the input in the hash table entry. When we place two inputs in the same entry, they chain together in a linear linked list. We are interested in the expected length of the longest chain in linear hashing and methods to reduce the length because the worst-case look-up time is directly proportional to it.
The linear hash function used to calculate hash value is defined …
Creating A Reproducible Metadata Transformation Pipeline Using Technology Best Practices, Cara Key, Mike Waugh
Creating A Reproducible Metadata Transformation Pipeline Using Technology Best Practices, Cara Key, Mike Waugh
Digital Initiatives Symposium
Over the course of two years, a team of librarians and programmers from LSU Libraries migrated the 186 collections of the Louisiana Digital Library from OCLC's CONTENTdm platform over to the open-source Islandora platform.
Early in the process, the team understood the value of creating a reproducible metadata transformation pipeline, because there were so many unknowns at the beginning of the process along with the certainty that mistakes would be made. This presentation will describe how the team used innovative and collaborative tools, such as Trello, Ansible, Vagrant, VirtualBox, git and GitHub to accomplish the task.
Text Mining In Chinese Ancient Attires, Lu Wang
Text Mining In Chinese Ancient Attires, Lu Wang
Western Research Forum
Starting from the Shang Dynasty (1600-1046 BCE) when writing system appeared in China, clothing was recorded as symbols to denote social statuses. The hierarchical signification of clothing remained in the following dynasties until the end of imperial China in 1911. The imperial period produced twenty-five official dynastic histories with rich corpuses on the subject of attire, documenting regulations and prohibitions of detailed dress code, a subject being scarcely studied and treated with assumptions today. This research will use text mining tools to identify descriptive words of clothing that reflect Chinese hierarchal ideology from the twenty-five histories. The method is to …
Keep It Simple, Keep It Safe - Research On The Impacts Of Increasing Complexity Of Modern Enterprise Applications, Shawn Ware, David Phillips
Keep It Simple, Keep It Safe - Research On The Impacts Of Increasing Complexity Of Modern Enterprise Applications, Shawn Ware, David Phillips
UNO Student Research and Creative Activity Fair
As the Cybersecurity program within UNO continues to adapt to the ever-changing world of information systems and information security, the Cybersecurity Capstone has recently become an active, community-involvement project, where real-world organizations can receive valuable, useful research and information from students on their way towards a degree. This presentation encompasses two such projects from the Cybersecurity Capstone, looking at how modern, more complex systems can often increase system vulnerability.
Collecting And Organizing Far-Left Extremist Data From Unstructured Internet Sources, Eric Perez
Collecting And Organizing Far-Left Extremist Data From Unstructured Internet Sources, Eric Perez
UNO Student Research and Creative Activity Fair
Far-left extremism refers to a network of groups who adhere to and take direct action in accordance with one or more of the following ideas: Support for bio-centric diversity, the belief that the earth and animals are in immediate danger, and the view that the government and other parts of society are responsible for this danger and incapable/unwilling to fix the crisis and preserve the American wilderness (Chermak, Freilich, Duran, & Parkin). Far-left extremism groups self-report activities using publicly accessible, online communiqués. These activities include arson, property damage, harassment, sabotage, and theft (Loadenthal). The communiqués are structured like blog posts …
Cora: Commingled Remains And Analytics – An Open Community Ecosystem, Nicole Mcelroy, Ryan Ernst
Cora: Commingled Remains And Analytics – An Open Community Ecosystem, Nicole Mcelroy, Ryan Ernst
UNO Student Research and Creative Activity Fair
Anthropologists at organizations such as the DPAA (Defense POW/MIA Accounting Agency) have the tough job of sorting through commingled remains of fallen soldiers. Under the direction of Professor Pawaskar at the College of IS&T, Ryan Ernst and I are currently developing a web application for the DPAA that will help them inventory the bones and record all the appropriate associations. After the inventory web application is built we will begin the analysis process using graph theory and other mathematical algorithms. This will ultimately help organizations like the DPAA get closer to the end goal of identifying fallen soldiers from commingled …
Self Service Business Intelligence: An Analysis Of Tourists Preferences In Kosovo, Ardian Hyseni
Self Service Business Intelligence: An Analysis Of Tourists Preferences In Kosovo, Ardian Hyseni
UBT International Conference
The purpose of this paper is to analyze the preferences of tourists in Kosovo through the data from TripAdvisor.com. Top things to do in Kosovo, will be analyzed through the comments of tourists in TripAdvisor.com. By analyzing the data with PowerBI, will be analyzed what are the most preferred things to do and what the tourists like the most in Kosovo. This paper will contribute on defining the preferences of tourists in Kosovo, it also can help tourism to invest and attract more tourists in specific areas or improve and invest in places less preferred by tourists.
Security Assessment Of Web Applications, Renelada Kushe
Security Assessment Of Web Applications, Renelada Kushe
UBT International Conference
A web application is an application that is accessed by users over a network such as the internet or intranet. The term also refers an application that is coded in a browser-supported programming language and reliant on a common web browser to render the application executable. Web applications are vulnerable to varies exploits from those which manipulate the application via its graphical web interface (HTTP exploits), to tampering the Uniform Resource Identifier (URI) or tampering HTTPS elements not contained in the URI. Getting started from the accessibility and the variety of exploits, the security assessment is a necessity for providing …
Implications Of Eu-Gdpr In Low-Grade Social, Activist And Ngo Settings, Lars Magnusson, Sarfraz Iqbal
Implications Of Eu-Gdpr In Low-Grade Social, Activist And Ngo Settings, Lars Magnusson, Sarfraz Iqbal
UBT International Conference
Social support services are becoming popular among the citizens of every country and every age. Though, social support services easily accessible on mobile phones are used in different contexts, ranging from extending your presence and connectivity to friends, family and colleagues to using social media services for being a social activist seeking to help individuals confined in miserable situations such as homeless community, drug addicts or even revolutionists fighting against dictatorships etc. However, a very recent development in the European Parliament’s law (2016/679) on the processing and free movement of personal data in terms of EU-GDPR (General data protection rules) …
Learning Management Systems In Higher Education, Romina Agaçi
Learning Management Systems In Higher Education, Romina Agaçi
UBT International Conference
Learning Management Systems (LMSs) are improving learning processes and are widely used in higher education institutions. There are available various types of LMSs used by pedagogues to manage eLearning and to deliver course materials to students. Nowadays, LMSs have become essential tools that affect the quality of learning and teaching in higher education. In this article, we introduce LMSs and we choose Moodle as a tool to presentaninformation system that is used in our university. Moodle is an online learning environment that supports classroom teaching. We will focus on the advantages of LMSs and why we choose Moodle as the …
Web Scrapping And Self Service Business Intelligence: Analysis Of Preferences Of Tourists In Albania, Ardian Hyseni
Web Scrapping And Self Service Business Intelligence: Analysis Of Preferences Of Tourists In Albania, Ardian Hyseni
UBT International Conference
The purpose of this paper is to analyze the preferences of tourists in Albania through the data web scrapped from TripAdvisor.com. Top things to do in Albania, will be analyzed through the comments of tourists in TripAdvisor.com. By using tools for web scrapping and analyzing of data with nVivo and PowerBI, will be analyzed what are the most preferred things to do and what the tourists like doing the most in Albania. This paper will contribute on defining the preferences of tourists in Albania, also can help tourism to invest and attract more tourists in specific areas or improve and …
An Approach To Information Security For Smes Based On The Resource-Based View Theory, Blerton Abazi
An Approach To Information Security For Smes Based On The Resource-Based View Theory, Blerton Abazi
UBT International Conference
The main focus of this proposal is to analyze implementation challenges, benefits and requirements in implementation of Information Systems and managing information security in small and medium size companies in Western Balkans countries. In relation to the study, the proposal will focus in the following questions to investigate: What are the benefits that companies mostly find after the implementation of Information Systems has been implemented, efficiency, how to they manage security of the information’s, competitive advantage, return of investments etc. The study should give a clear approach to Information Systems implementation, information security, maintenance, measurable benefits, challenges companies have gone …