Open Access. Powered by Scholars. Published by Universities.®
Library and Information Science Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Network Security (2)
- Academic -- UNF -- Computing; Search ranking (1)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (1)
- Agile (1)
- Automated Quality Rating (1)
-
- Cloud Computing (1)
- Cloud Firewalls (1)
- Cloud Networks (1)
- Cloud Security (1)
- Commnication (1)
- Computation Offloading (1)
- Computational linguistics; English language — Data processing; English language — Roots; Natural language processing (Computer science) (1)
- Computer Security (1)
- Computer engineering (1)
- Computer programs (1)
- Computer security (1)
- Container terminals--Automation (1)
- Container terminals--Vietnam (1)
- Database security (1)
- Digital libraries (1)
- Digital preservation (1)
- ETD (1)
- Edge Computing (1)
- Electronic information resources (1)
- Employees (1)
- English language -- Data processing (1)
- Evidence-based Health care information (1)
- Framework (1)
- GitHub (1)
- Government Agent Security (1)
- Publication Year
Articles 1 - 16 of 16
Full-Text Articles in Library and Information Science
Towards Agile Academia: An Approach To Scientific Paper Writing Inspired By Software Engineering, Tyler Procko
Towards Agile Academia: An Approach To Scientific Paper Writing Inspired By Software Engineering, Tyler Procko
Doctoral Dissertations and Master's Theses
The construction of scientific papers is performed in service of the greater scientific community. This iterative process is, in effect, an academic economy, where all members benefit from well-written papers. However, many published scientific papers are poorly written; they often lack sufficient detail to allow replication, there is improper usage of citations or a lack of regard to relevant work, reporting is vague or without linked empirical data to allow verification, figures do not correspond to text or are non-sensical, literary elements, e.g., bulleted lists, are used ineffectively, formatting renders certain sections unreadable, and grammatical errors abound. The issues of …
Assessing The Prevalence And Archival Rate Of Uris To Git Hosting Platforms In Scholarly Publications, Emily Escamilla
Assessing The Prevalence And Archival Rate Of Uris To Git Hosting Platforms In Scholarly Publications, Emily Escamilla
Computer Science Theses & Dissertations
The definition of scholarly content has expanded to include the data and source code that contribute to a publication. While major archiving efforts to preserve conventional scholarly content, typically in PDFs (e.g., LOCKSS, CLOCKSS, Portico), are underway, no analogous effort has yet emerged to preserve the data and code referenced in those PDFs, particularly the scholarly code hosted online on Git Hosting Platforms (GHPs). Similarly, Software Heritage is working to archive public source code, but there is value in archiving the surrounding ephemera that provide important context to the code while maintaining their original URIs. In current implementations, source code …
The Impact Of The Digital Maturity Level On Port Operations In Africa, Joyce Wanjiru Kaburu
The Impact Of The Digital Maturity Level On Port Operations In Africa, Joyce Wanjiru Kaburu
World Maritime University Dissertations
No abstract provided.
Digital Readiness Of Container Terminals For Digital Technology Adoption: A Case Study Of Vietnam, Anh Tuấn Vu
Digital Readiness Of Container Terminals For Digital Technology Adoption: A Case Study Of Vietnam, Anh Tuấn Vu
World Maritime University Dissertations
No abstract provided.
The Determination Of Port Automation Levels Using An Analytic Hierarchical Process : A Case Study For The Port Of Colombo, Waruna Lasantha De Silva Amarathunga
The Determination Of Port Automation Levels Using An Analytic Hierarchical Process : A Case Study For The Port Of Colombo, Waruna Lasantha De Silva Amarathunga
World Maritime University Dissertations
No abstract provided.
Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King
Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King
CCE Theses and Dissertations
It is estimated that over half of all information systems security breaches are due directly or indirectly to the poor security practices of an organization’s employees. Previous research has shown neutralization techniques as having influence on the intent to violate information security policy. In this study, we proposed an expansion of the neutralization model by including the effects of business and ethical orientation of individuals on their tendencies to neutralize and compromise with information security policy. Additionally, constructs from social influences and pressures have been integrated into this model to measure the impact on the intent to violate information security …
Improving Employees’ Compliance With Password Policies, Enas Albataineh
Improving Employees’ Compliance With Password Policies, Enas Albataineh
CCE Theses and Dissertations
Employees’ lack of compliance with password policies increases password susceptibility, which leads to financial damages to the organizations as a result of information disclosure, fraud, and unauthorized transactions. However, few studies have examined what motivates employees to comply with password policies.
The purpose of this quantitative cross-sectional study was to examine what factors influence employees’ compliance with password policies. A theoretical model was developed based on Protection Motivation Theory (PMT), General Deterrence Theory (GDT), Theory of Reasoned Action (TRA), and Psychological Ownership Theory to explain employees’ compliance with password policies.
A non-probability convenience sample was employed. The sample consisted of …
The Effect Of Data Marshalling On Computation Offloading Decisions, Julio Alberto Reyes Muñoz
The Effect Of Data Marshalling On Computation Offloading Decisions, Julio Alberto Reyes Muñoz
Open Access Theses & Dissertations
Computation offloading consists in allowing resource constrained computers, such as smartphones and other mobile devices, to use the network for the remote execution of resource intensive computing tasks in powerful computers. However, deciding whether to offload or not is not a trivial problem, and it depends in several variables related to the environment conditions, the computing devices involved in the process, and the nature of the task to be remotely executed. Furthermore, it comprises the optimal solution to some questions, like how to partition the application and where to execute the tasks.
The computation offloading decision problem has been widely …
Improving Search Ranking Using A Composite Scoring Approach, Larry D. Snedden
Improving Search Ranking Using A Composite Scoring Approach, Larry D. Snedden
UNF Graduate Theses and Dissertations
In this thesis, the improvement to relevance in computerized search results is studied. Information search tools return ranked lists of documents ordered by the relevance of the documents to the user supplied search. Using a small number of words and phrases to represent complex ideas and concepts causes user search queries to be information sparse. This sparsity challenges search tools to locate relevant documents for users. A review of the challenges to information searches helps to identify the problems and offer suggestions in improving current information search tools. Using the suggestions put forth by the Strategic Workshop on Information Retrieval …
Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi
Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi
UNLV Theses, Dissertations, Professional Papers, and Capstones
Securing IoT (Internet of Things) systems in general, regardless of the communication technology used, has been the concern of many researchers and private companies. As for ZigBee security concerns, much research and many experiments have been conducted to better predict the nature of potential security threats. In this research we are addressing several ZigBee vulnerabilities by performing first hand experiments and attack simulations on ZigBee protocol. This will allow us to better understand the security issues surveyed and find ways to mitigate them. Based on the attack simulations performed and the survey conducted, we have developed a ZigBee IoT framework …
A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr
A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr
Electronic Theses and Dissertations
The rapid expansion in networking has provided tremendous opportunities to access an unparalleled amount of information. Everyone connects to a network to gain access and to share this information. However when someone connects to a public network, his private network and information becomes vulnerable to hackers and all kinds of security threats. Today, all networks needs to be secured, and one of the best security policies is firewall implementation.
Firewalls can be hardware or cloud based. Hardware based firewalls offer the advantage of faster response time, whereas cloud based firewalls are more flexible. In reality the best form of firewall …
Semantics-Based Automated Quality Assessment Of Depression Treatment Web Documents, Yanjun Zhang
Semantics-Based Automated Quality Assessment Of Depression Treatment Web Documents, Yanjun Zhang
Electronic Thesis and Dissertation Repository
The past decade has witnessed a dramatic expansion in the amount of publicly available health care information on the Web. The health care information on the web, however, is of extremely variable quality. The evaluation of content quality is a big challenge because non-automated methods for information content rating can be easily overwhelmed by the huge data volume. This study proposes an automated approach for assessing the quality of web health care information through comparing the text content with evidence-based health care recommendations. This method relies on semantic analysis and text classification to identify the presentation of evidence-based recommendations in …
Ensuring The Effectiveness Of Information Security Policy : The Development And Validation Of An Information Security Policy Model, Vivid Vicki Chen
Ensuring The Effectiveness Of Information Security Policy : The Development And Validation Of An Information Security Policy Model, Vivid Vicki Chen
Legacy Theses & Dissertations (2009 - 2024)
The purpose of this dissertation is to develop and test a conceptual model of an Information Security Policy (ISP) and to measure the benefits that accrue to organizations that implement and deploy such policies. As a result of rapid changes in technology, the importance of computer Information Security Policy (ISP) has increased dramatically. In recent decades, governments and private enterprises have increasingly come to store ever greater amounts of information on computers and on networks. Unfortunately, storing information in this manner not only makes firms engaged in cutting-edge technology vulnerable to hackers, but may also jeopardize customer / employee relations, …
Study Of Stemming Algorithms, Savitha Kodimala
Study Of Stemming Algorithms, Savitha Kodimala
UNLV Theses, Dissertations, Professional Papers, and Capstones
Automated stemming is the process of reducing words to their roots. The stemmed words are typically used to overcome the mismatch problems associated with text searching.
In this thesis, we report on the various methods developed for stemming. In particular, we show the effectiveness of n-gram stemming methods on a collection of documents.
Architectural Optimization Of Digital Libraries, Aileen O. Biser
Architectural Optimization Of Digital Libraries, Aileen O. Biser
Computer Science Theses & Dissertations
This work investigates performance and scaling issues relevant to large scale distributed digital libraries. Presently, performance and scaling studies focus on specific implementations of production or prototype digital libraries. Although useful information is gained to aid these designers and other researchers with insights to performance and scaling issues, the broader issues relevant to very large scale distributed libraries are not addressed. Specifically, no current studies look at the extreme or worst case possibilities in digital library implementations. A survey of digital library research issues is presented. Scaling and performance issues are mentioned frequently in the digital library literature but are …
Entropy Reduction Of English Text Using Variable Length Grouping, Vincent Norman Ast Jr.
Entropy Reduction Of English Text Using Variable Length Grouping, Vincent Norman Ast Jr.
Dissertations and Theses
It is known that the entropy of English text can be reduced by arranging the text into groups of two or more letters each. The higher the order of the grouping the greater is the entropy reduction. Using this principle in a computer text compressing system brings about difficulties, however, because the number of entries required in the translation table increases exponentially with group size. This experiment examined the possibility of using a translation table containing only selected entries of all group sizes with the expectation of obtaining a substantial entropy reduction with a relatively small table.
An expression was …