Open Access. Powered by Scholars. Published by Universities.®
Library and Information Science Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- ATLAS.ti (1)
- Artificial cost new rules ghost rules (1)
- CAQDAS (1)
- Citation Error (1)
- Computer security behavior (1)
-
- Confidential data (1)
- Data dissimilarity (1)
- Distancing (1)
- Fear appeals model (1)
- Hiding failure hidden rules (1)
- Information security (1)
- Literature Genealogy (1)
- Missing cost lost rules (1)
- NVivo (1)
- Privacy preserving data mining algorithms (1)
- Protection motivation theory (1)
- QDAS (1)
- Qualitative Data Analysis Software (1)
- Separation (1)
- Spring boot angular JS full stack development hibernate PostgreSQL (1)
- Telecommuters (1)
- Zombie (1)
- Publication Type
Articles 1 - 3 of 3
Full-Text Articles in Library and Information Science
Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy
Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy
CCE Theses and Dissertations
The data mining sanitization process involves converting the data by masking the sensitive data and then releasing it to public domain. During the sanitization process, side effects such as hiding failure, missing cost and artificial cost of the data were observed. Privacy Preserving Data Mining (PPDM) algorithms were developed for the sanitization process to overcome information loss and yet maintain data integrity. While these PPDM algorithms did provide benefits for privacy preservation, they also made sure to solve the side effects that occurred during the sanitization process. Many PPDM algorithms were developed to reduce these side effects. There are several …
An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung
An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung
CCE Theses and Dissertations
Computer users’ security compliance behaviors can be better understood by devising an experimental study to examine how fear appeals might impact users’ security behavior. Telecommuter security behavior has become very relevant in information systems (IS) research with the growing number of individuals working from home. The increasing dependence on telecommuting to enhance the viability and convenience has created an urgency with the advent of the COVID-19 pandemic to examine the behavior of users working at home across a corporate network. The home networks are usually not as secure as those in corporate settings. There is seldom a firewall setting and …
The Walking Dead Genealogy: Unsubstantiated Criticisms Of Qualitative Data Analysis Software (Qdas) And The Failure To Put Them To Rest, Kristi Jackson, Trena Paulus, Nicholas H. Woolf
The Walking Dead Genealogy: Unsubstantiated Criticisms Of Qualitative Data Analysis Software (Qdas) And The Failure To Put Them To Rest, Kristi Jackson, Trena Paulus, Nicholas H. Woolf
The Qualitative Report
The authors conduct an exposé on the deterministic denunciations of Qualitative Data Analysis Software (QDAS) and how citation errors keep these criticisms alive. They use a zombie metaphor to describe more than two decades of battling these seemingly mindless assessments of QDAS that keep coming –despite their decay – and simply will not die. Focusing exclusively on the criticism of separation/distancing, which alleges that the computer and the software interfere with the researcher’s familiarity with the data, the authors trace one current strand of this criticism through a literature genealogy. Three citation errors (half-truth, proxy, and hearsay) are identified to …