Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Library and Information Science

Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy Jan 2022

Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy

CCE Theses and Dissertations

The data mining sanitization process involves converting the data by masking the sensitive data and then releasing it to public domain. During the sanitization process, side effects such as hiding failure, missing cost and artificial cost of the data were observed. Privacy Preserving Data Mining (PPDM) algorithms were developed for the sanitization process to overcome information loss and yet maintain data integrity. While these PPDM algorithms did provide benefits for privacy preservation, they also made sure to solve the side effects that occurred during the sanitization process. Many PPDM algorithms were developed to reduce these side effects. There are several …


An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung Jan 2021

An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung

CCE Theses and Dissertations

Computer users’ security compliance behaviors can be better understood by devising an experimental study to examine how fear appeals might impact users’ security behavior. Telecommuter security behavior has become very relevant in information systems (IS) research with the growing number of individuals working from home. The increasing dependence on telecommuting to enhance the viability and convenience has created an urgency with the advent of the COVID-19 pandemic to examine the behavior of users working at home across a corporate network. The home networks are usually not as secure as those in corporate settings. There is seldom a firewall setting and …


The Walking Dead Genealogy: Unsubstantiated Criticisms Of Qualitative Data Analysis Software (Qdas) And The Failure To Put Them To Rest, Kristi Jackson, Trena Paulus, Nicholas H. Woolf Mar 2018

The Walking Dead Genealogy: Unsubstantiated Criticisms Of Qualitative Data Analysis Software (Qdas) And The Failure To Put Them To Rest, Kristi Jackson, Trena Paulus, Nicholas H. Woolf

The Qualitative Report

The authors conduct an exposé on the deterministic denunciations of Qualitative Data Analysis Software (QDAS) and how citation errors keep these criticisms alive. They use a zombie metaphor to describe more than two decades of battling these seemingly mindless assessments of QDAS that keep coming –despite their decay – and simply will not die. Focusing exclusively on the criticism of separation/distancing, which alleges that the computer and the software interfere with the researcher’s familiarity with the data, the authors trace one current strand of this criticism through a literature genealogy. Three citation errors (half-truth, proxy, and hearsay) are identified to …