Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Databases and Information Systems

Hybrid Methods For Feature Selection, Iunniang Cheng May 2013

Hybrid Methods For Feature Selection, Iunniang Cheng

Masters Theses & Specialist Projects

Feature selection is one of the important data preprocessing steps in data mining. The feature selection problem involves finding a feature subset such that a classification model built only with this subset would have better predictive accuracy than model built with a complete set of features. In this study, we propose two hybrid methods for feature selection. The best features are selected through either the hybrid methods or existing feature selection methods. Next, the reduced dataset is used to build classification models using five classifiers. The classification accuracy was evaluated in terms of the area under the Receiver Operating Characteristic …


Ikriya: Simulating Software Quality Enhancement With Selected Replacement Policies, Sindhu Dharani Murthy May 2013

Ikriya: Simulating Software Quality Enhancement With Selected Replacement Policies, Sindhu Dharani Murthy

Masters Theses & Specialist Projects

The quality of information systems in any organization helps to determine the
efficiency of the organization. Many organizations maintain a custom software portfolio, whose quality is important to the organization. Management would like to optimize the portfolio’s quality. Decisions about software replacement or enhancement are made based on organizational needs and priorities. The development resources allocated help in determining the quality of new software, and should be put to optimal use. Enhancing existing software might sound cheap and easy but it is not always efficient. This thesis proposes a simulation model - iKriya - for this problem. It explores the …


Database Security: What Students Need To Know, Meg C. Murray Jan 2010

Database Security: What Students Need To Know, Meg C. Murray

Faculty and Research Publications

Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data. Students in the computing disciplines must develop an …


An Information Technology Therapy Approach To Micro-Enterprise Adoption Of Icts, Peter Wolcott, Sajda Qureshi, Mehruz Kamal Aug 2007

An Information Technology Therapy Approach To Micro-Enterprise Adoption Of Icts, Peter Wolcott, Sajda Qureshi, Mehruz Kamal

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

The advent of Information and Communication Technologies (ICTs) has opened up new opportunities for micro-enterprises to improve their businesses. However the challenges to using ICTs are impeding these businesses from growing into the drivers for development that they can be. This suggests that a potentially important driver of development needs to be supported. This paper investigates the adoption of ICTs in eight micro-enterprises in an underserved community of Omaha, Nebraska. Following an action research study, this research provides insight into the key challenges and opportunities facing micro-enterprises in their use of ICTs to create value for their businesses. Its contribution …


Electronic Commerce Application Development: A Comparison Of User And It Professional Perspectives, Douglas Havelka, Deepak Khazanchi Aug 2001

Electronic Commerce Application Development: A Comparison Of User And It Professional Perspectives, Douglas Havelka, Deepak Khazanchi

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

Based on the theory of reasoned action and previous research identifying differences in beliefs between IS specialists and IS users, this paper outlines a proposed study to investigate differences/similarities in beliefs of users and developers in the context of electronic commerce application development projects. The authors are currently in the process of collecting data to address research question posed in this proposal.