Open Access. Powered by Scholars. Published by Universities.®
Library and Information Science Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Walden University (37)
- Nova Southeastern University (14)
- Old Dominion University (13)
- University of South Florida (8)
- University of Wisconsin Milwaukee (6)
-
- University of Nevada, Las Vegas (5)
- University at Albany, State University of New York (4)
- Purdue University (3)
- University of Texas at El Paso (3)
- Wayne State University (3)
- University of Windsor (2)
- William & Mary (2)
- California State University, San Bernardino (1)
- Claremont Colleges (1)
- College of the Holy Cross (1)
- Edith Cowan University (1)
- Loyola Marymount University and Loyola Law School (1)
- Northern Illinois University (1)
- University of Denver (1)
- University of Nebraska at Omaha (1)
- University of Vermont (1)
- Western University (1)
- Keyword
-
- Cybersecurity (7)
- Digital libraries (6)
- Information retrieval (6)
- Machine learning (6)
- Web archiving (6)
-
- Information security (5)
- Framework (4)
- Security (4)
- Social media (4)
- Archives (3)
- Data mining (3)
- Management (3)
- Natural Language Processing (3)
- Natural language processing (Computer science) (3)
- Privacy (3)
- Recommender systems (3)
- Small business (3)
- Technology adoption (3)
- AI adoption (2)
- Analytics (2)
- Applied sciences (2)
- Artificial Intelligence (2)
- Big Data (2)
- Big data (2)
- Case study (2)
- Clustering (2)
- Communication and the arts (2)
- Data Visualization (2)
- Digital preservation (2)
- Education (2)
- Publication Year
- Publication
-
- Walden Dissertations and Doctoral Studies (37)
- CCE Theses and Dissertations (14)
- Computer Science Theses & Dissertations (13)
- USF Tampa Graduate Theses and Dissertations (8)
- Theses and Dissertations (6)
-
- UNLV Theses, Dissertations, Professional Papers, and Capstones (5)
- Legacy Theses & Dissertations (2009 - 2024) (4)
- Electronic Theses and Dissertations (3)
- Open Access Theses & Dissertations (3)
- Wayne State University Dissertations (3)
- Dissertations, Theses, and Masters Projects (2)
- Open Access Dissertations (2)
- CGU Theses & Dissertations (1)
- Electronic Theses, Projects, and Dissertations (1)
- Electronic Thesis and Dissertation Repository (1)
- English Honors Theses (1)
- Graduate College Dissertations and Theses (1)
- Graduate Research Theses & Dissertations (1)
- LMU/LLS Theses and Dissertations (1)
- Open Access Theses (1)
- Theses : Honours (1)
- Theses/Capstones/Creative Projects (1)
Articles 61 - 90 of 110
Full-Text Articles in Library and Information Science
Patient Satisfaction Management In Office Visits And Telehealth In Health Care Technology, Todd Price
Patient Satisfaction Management In Office Visits And Telehealth In Health Care Technology, Todd Price
Walden Dissertations and Doctoral Studies
Telehealth and remote medical treatments have begun to be more commonly used in healthcare systems. Researchers have theorized that providers' abilities to treat patients are not directly tied to the proximity of the patient to the doctor, but by the identification and treatment of the patient's symptoms. Although the treatment and cure rates are being established within individual health systems and professional medical associations, empirical research is lacking regarding patient satisfaction with this remote treatment situation. The purpose of this quantitative study was to address this gap by examining satisfaction ratings of patients between virtual provider visits and face-to-face provider …
Analytic Extensions To The Data Model For Management Analytics And Decision Support In The Big Data Environment, Nsikak Etim Akpakpan
Analytic Extensions To The Data Model For Management Analytics And Decision Support In The Big Data Environment, Nsikak Etim Akpakpan
Walden Dissertations and Doctoral Studies
From 2006 to 2016, an estimated average of 50% of big data analytics and decision support projects failed to deliver acceptable and actionable outputs to business users. The resulting management inefficiency came with high cost, and wasted investments estimated at $2.7 trillion in 2016 for companies in the United States. The purpose of this quantitative descriptive study was to examine the data model of a typical data analytics project in a big data environment for opportunities to improve the information created for management problem-solving. The research questions focused on finding artifacts within enterprise data to model key business scenarios for …
Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii
Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii
Walden Dissertations and Doctoral Studies
The Federal Bureau of Investigation reported that cyber actors will likely increase cyber intrusions against healthcare systems and their concomitant medical devices because of the mandatory transition from paper to electronic health records, lax cyber security standards, and a higher financial payout for medical records in the deep web. The problem addressed in this quantitative correlational study was uncertainty surrounding the benefits of palm vein authentication adoption relative to the growing crime of medical identity theft. The purpose of this quantitative correlational study was to understand healthcare managers' and doctors' perceptions of the effectiveness of palm vein authentication technology. The …
Clinical Information Extraction From Unstructured Free-Texts, Mingzhe Tao
Clinical Information Extraction From Unstructured Free-Texts, Mingzhe Tao
Legacy Theses & Dissertations (2009 - 2024)
Information extraction (IE) is a fundamental component of natural language processing (NLP) that provides a deeper understanding of the texts. In the clinical domain, documents prepared by medical experts (e.g., discharge summaries, drug labels, medical history records) contain a significant amount of clinically-relevant information that is crucial to the overall well-being of patients. Unfortunately, in many cases, clinically-relevant information is presented in an unstructured format, predominantly consisting of free-texts, making it inaccessible to computerized methods. Automatic extraction of this information can improve accessibility. However, the presence of synonymous expressions, medical acronyms, misspellings, negated phrases, and ambiguous terminologies make automatic extraction …
Proactive It Incident Prevention: Using Data Analytics To Reduce Service Interruptions, Mark G. Malley
Proactive It Incident Prevention: Using Data Analytics To Reduce Service Interruptions, Mark G. Malley
Walden Dissertations and Doctoral Studies
The cost of resolving user requests for IT assistance rises annually. Researchers have demonstrated that data warehouse analytic techniques can improve service, but they have not established the benefit of using global organizational data to reduce reported IT incidents. The purpose of this quantitative, quasi-experimental study was to examine the extent to which IT staff use of organizational knowledge generated from data warehouse analytical measures reduces the number of IT incidents over a 30-day period, as reported by global users of IT within an international pharmaceutical company headquartered in Germany. Organizational learning theory was used to approach the theorized relationship …
Strategies To Prevent Security Breaches Caused By Mobile Devices, Tony Griffin
Strategies To Prevent Security Breaches Caused By Mobile Devices, Tony Griffin
Walden Dissertations and Doctoral Studies
Data breaches happen almost every day in the United States and, according to research, the majority of these breaches occur due to a lack of security with organizations' mobile devices. Although most of the security policies related to mobile devices currently in place may meet the guidelines required by law, they often fail to prevent a data breach caused by a mobile device. The main purpose of this qualitative single case study was to explore the strategies used by security managers to prevent data breaches caused by mobile devices. The study population consisted of security managers working for a government …
Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi
Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi
UNLV Theses, Dissertations, Professional Papers, and Capstones
Securing IoT (Internet of Things) systems in general, regardless of the communication technology used, has been the concern of many researchers and private companies. As for ZigBee security concerns, much research and many experiments have been conducted to better predict the nature of potential security threats. In this research we are addressing several ZigBee vulnerabilities by performing first hand experiments and attack simulations on ZigBee protocol. This will allow us to better understand the security issues surveyed and find ways to mitigate them. Based on the attack simulations performed and the survey conducted, we have developed a ZigBee IoT framework …
Computational Environment For Modeling And Analysing Network Traffic Behaviour Using The Divide And Recombine Framework, Ashrith Barthur
Computational Environment For Modeling And Analysing Network Traffic Behaviour Using The Divide And Recombine Framework, Ashrith Barthur
Open Access Dissertations
There are two essential goals of this research. The first goal is to design and construct a computational environment that is used for studying large and complex datasets in the cybersecurity domain. The second goal is to analyse the Spamhaus blacklist query dataset which includes uncovering the properties of blacklisted hosts and understanding the nature of blacklisted hosts over time.
The analytical environment enables deep analysis of very large and complex datasets by exploiting the divide and recombine framework. The capability to analyse data in depth enables one to go beyond just summary statistics in research. This deep analysis is …
Using Web Archives To Enrich The Live Web Experience Through Storytelling, Yasmin Alnoamany
Using Web Archives To Enrich The Live Web Experience Through Storytelling, Yasmin Alnoamany
Computer Science Theses & Dissertations
Much of our cultural discourse occurs primarily on the Web. Thus, Web preservation is a fundamental precondition for multiple disciplines. Archiving Web pages into themed collections is a method for ensuring these resources are available for posterity. Services such as Archive-It exists to allow institutions to develop, curate, and preserve collections of Web resources. Understanding the contents and boundaries of these archived collections is a challenge for most people, resulting in the paradox of the larger the collection, the harder it is to understand. Meanwhile, as the sheer volume of data grows on the Web, "storytelling" is becoming a popular …
Scripts In A Frame: A Framework For Archiving Deferred Representations, Justin F. Brunelle
Scripts In A Frame: A Framework For Archiving Deferred Representations, Justin F. Brunelle
Computer Science Theses & Dissertations
Web archives provide a view of the Web as seen by Web crawlers. Because of rapid advancements and adoption of client-side technologies like JavaScript and Ajax, coupled with the inability of crawlers to execute these technologies effectively, Web resources become harder to archive as they become more interactive. At Web scale, we cannot capture client-side representations using the current state-of-the art toolsets because of the migration from Web pages to Web applications. Web applications increasingly rely on JavaScript and other client-side programming languages to load embedded resources and change client-side state. We demonstrate that Web crawlers and other automatic archival …
Social Influence And Organizational Innovation Characteristics On Enterprise Social Computing Adoption, Vincent Di Palermo
Social Influence And Organizational Innovation Characteristics On Enterprise Social Computing Adoption, Vincent Di Palermo
Walden Dissertations and Doctoral Studies
Ample research has been conducted to identify the determinants of information technology (IT) adoption. No previous quantitative researchers have explored IT adoption in the context of enterprise social computing (ESC). The purpose of this study was to test and extend the social influence model of IT adoption. In addition, this study addressed a gap in the research literature and presented a model that relates the independent variables of social action, social consensus, social authority, social cooperation, perceived relative advantage, perceived compatibility, perceived ease of use, perceived usefulness, and organizational commitment to the dependent variables of social embracement and embedment. A …
Adoption Of Electronic Health Record Systems Within Primary Care Practices, Marvin Leon Reid, Jr.
Adoption Of Electronic Health Record Systems Within Primary Care Practices, Marvin Leon Reid, Jr.
Walden Dissertations and Doctoral Studies
Primary care physicians (PCPPs) have been slow to implement electronic health records (EHRs), even though there is a U.S. federal requirement to implement EHRs. The purpose of this phenomenological study was to determine why PCPPs have been slow to adopt electronic health record (EHR) systems despite the potential to increase efficiency and quality of health care. The complex adaptive systems theory (CAS) served as the conceptual framework for this study. Twenty-six PCPPs were interviewed from primary care practices (PCPs) based in southwestern Ohio. The data were collected through a semistructured interview format and analyzed using a modified van Kaam method. …
Exploring Leader-Initiated Change Management For Adopting Cloud Services, Nancy Marie Landreville
Exploring Leader-Initiated Change Management For Adopting Cloud Services, Nancy Marie Landreville
Walden Dissertations and Doctoral Studies
Cloud technology requires a virtualized ubiquitous and scalable environment with shared resources. The general problem in cloud adoption is the absence of standardization across organizations. A standardized approach remained elusive since the inception of the Cloud First mandate. The purpose of this study was to explore leader-initiated change management (LICM) practices in cloud adoption within organizations. The theoretical framework included the classical theories of Kurt Lewin's organization change management, leader-member exchange, intentional change, and appreciative inquiry. A multiple case study design approach facilitated the exploration of LICM-value added practices to identify standardization in cloud adoption practices. Data collection included semistructured …
Innovation Difussion Of Smartphone In Nigeria, Olukunle Ariyo Iyanda
Innovation Difussion Of Smartphone In Nigeria, Olukunle Ariyo Iyanda
Walden Dissertations and Doctoral Studies
Rapid diffusion and use of smartphones in Africa are challenging, given the state of its infrastructural facilities. The problem addressed was a lack of information on the adoption behavior and the sociodevelopmental effect of smartphone acceptance among rural and urban users in Nigeria. The purpose of this study was to examine the adoption behavior and the sociodevelopmental effect of smartphone acceptance among rural and urban residents. Research questions examined the relationship of performance expectancy, social influence, price value, and habit on adopters' intentions to use smartphones, continued use of smartphones, and the sociodevelopmental effect on smartphone users lives and standard …
The Impact Of Technology Acceptance And Openess To Innovaion On Software Implementation, Michael Marin Bertini
The Impact Of Technology Acceptance And Openess To Innovaion On Software Implementation, Michael Marin Bertini
Walden Dissertations and Doctoral Studies
Senior management decisions to foster innovation and adopt new technology solutions have serious implications for the success of their organization change initiatives. This project examined the issue of senior management decision or reasons of their decision to adopt new Enterprise Resource Planning (ERP) systems as a solution to solve their business problems. This project investigated the degree that perceived ease of use and usefulness of the ERP system influenced decisions made by senior managers to innovate. Roger's diffusion of innovations theory and Davis technology acceptance model theory were used to predict when senior managers were open to innovation, and whether …
Novel Machine Learning Methods For Modeling Time-To-Event Data, Bhanukiran Vinzamuri
Novel Machine Learning Methods For Modeling Time-To-Event Data, Bhanukiran Vinzamuri
Wayne State University Dissertations
Predicting time-to-event from longitudinal data where different events occur at different time points is an extremely important problem in several domains such as healthcare, economics, social networks and seismology, to name a few. A unique challenge in this problem involves building predictive models from right censored data (also called as survival data). This is a phenomenon where instances whose event of interest are not yet observed within a given observation time window and are considered to be right censored. Effective models for predicting time-to-event labels from such right censored data with good accuracy can have a significant impact in these …
Informational Power On Twitter: A Mixed-Methods Exploration Of User Knowledge And Technological Discourse About Information Flows, Nicholas John Proferes
Informational Power On Twitter: A Mixed-Methods Exploration Of User Knowledge And Technological Discourse About Information Flows, Nicholas John Proferes
Theses and Dissertations
Following a number of recent examples where social media users have been confronted by information flows that did not match their understandings of the platforms, there is a pressing need to examine public knowledge of information flows on these systems, to map how this knowledge lines up against the extant flows of these systems, and to explore the factors that contribute to the construction of knowledge about these systems. There is an immediacy to this issue because as social media sites become further entrenched as dominant vehicles for communication, knowledge about these technologies will play an ever increasing role in …
Password Strength Analysis: User Coping Mechanisms In Password Selection, Brian Thomas Curnett
Password Strength Analysis: User Coping Mechanisms In Password Selection, Brian Thomas Curnett
Open Access Theses
The security that passwords provide could be seriously flawed due to the way people cope with having to memorize and recall their passwords. The National Institute of Standards and Technology (NIST) standard that is used to measure the password strength, known as entropy, is designed for a single use and does not consider that users may choose to keep parts of their password across password changes. This study shows that a portion of users keep some information from previous passwords across changes. These habits which will be called coping mechanisms that over time serve to erode the protection provided by …
Evaluating Success Factors In Implementing E-Maintenance In Maintenance, Repair, And Overhaul (Mro) Organizations, Peter Rocky Toves
Evaluating Success Factors In Implementing E-Maintenance In Maintenance, Repair, And Overhaul (Mro) Organizations, Peter Rocky Toves
Walden Dissertations and Doctoral Studies
Despite more than a decade-long process to transition aircraft maintenance practices from paper-to electronic-based systems, some organizations remain unable to complete this transition. Researchers have indicated that while organizations have invested resources in technology improvements, there remains a limited understanding of the factors that contribute to effectively managing technology-enabled change. The purpose of this case study was to identify and explore socio-technical (ST) factors that inhibit an effective transition from a paper-based system to an electronic-based system for aircraft maintenance. A conceptual model applying theories of change management, technology acceptance, systems thinking, and ST theory informed the research. Thirteen participants …
A Prediction Modeling Framework For Noisy Welding Quality Data, Junheung Park
A Prediction Modeling Framework For Noisy Welding Quality Data, Junheung Park
Wayne State University Dissertations
Numerous and various research projects have been conducted to utilize historical manufacturing process data in product design. These manufacturing process data often contain data inconsistencies, and it causes challenges in extracting useful information from the data. In resistance spot welding (RSW), data inconsistency is a well-known issue. In general, such inconsistent data are treated as noise data and removed from the original dataset before conducting analyses or constructing prediction models. This may not be desirable for every design and manufacturing applications since every data can contain important information to further explain the process. In this research, we propose a prediction …
Assessing Clinical Software User Needs For Improved Clinical Decision Support Tools, Kimberly B. Denney
Assessing Clinical Software User Needs For Improved Clinical Decision Support Tools, Kimberly B. Denney
Walden Dissertations and Doctoral Studies
Consolidating patient and clinical data to support better-informed clinical decisions remains a primary function of electronic health records (EHRs). In the United States, nearly 6 million patients receive care from an accountable care organization (ACO). Knowledge of clinical decision support (CDS) tool design for use by physicians participating in ACOs remains limited. The purpose of this quantitative study was to examine whether a significant correlation exists between characteristics of alert content and alert timing (the independent variables) and physician perceptions of improved ACO quality measure adherence during electronic ordering (the dependent variable). Sociotechnical theory supported the theoretical framework for this …
Three Essays On Global Ict Phenomenon: Productivity Paradox, Organizational Ict Use, And Privacy In Social Networks, Faruk Arslan
Three Essays On Global Ict Phenomenon: Productivity Paradox, Organizational Ict Use, And Privacy In Social Networks, Faruk Arslan
Open Access Theses & Dissertations
This Dissertation aims to investigate the global diversity in information systems by studying three distinctive phenomena. The first essay investigates the existence of "IT Productivity Paradox" within firms operating in developing countries using an empirical approach. IT Productivity Paradox has been a widely investigated topic within the context of developed countries and primarily studied within the context of developing countries using a single country. Our research addresses a gap in the literature, which is the study of IT Productivity Paradox across several developing countries with diverse characteristics. The second essay studies the contextual factors (firm characteristics and perception of external …
#Mplp: A Comparison Of Domain Novice And Expert User-Generated Tags In A Minimally Processed Digital Archive, Edward A. Benoit Iii
#Mplp: A Comparison Of Domain Novice And Expert User-Generated Tags In A Minimally Processed Digital Archive, Edward A. Benoit Iii
Theses and Dissertations
The high costs of creating and maintaining digital archives precluded many archives from providing users with digital content or increasing the amount of digitized materials. Studies have shown users increasingly demand immediate online access to archival materials with detailed descriptions (access points). The adoption of minimal processing to digital archives limits the access points at the folder or series level rather than the item-level description users' desire. User-generated content such as tags, could supplement the minimally processed metadata, though users are reluctant to trust or use unmediated tags. This dissertation project explores the potential for controlling/mediating the supplemental metadata from …
Using The Web 1t 5-Gram Database For Attribute Selection In Formal Concept Analysis To Correct Overstemmed Clusters, Guymon Hall
Using The Web 1t 5-Gram Database For Attribute Selection In Formal Concept Analysis To Correct Overstemmed Clusters, Guymon Hall
UNLV Theses, Dissertations, Professional Papers, and Capstones
Information retrieval is the process of finding information from an unstructured collection of data. The process of information retrieval involves building an index, commonly called an inverted file. As part of the inverted file, information retrieval algorithms often stem words to a common root. Stemming involves reducing a document term to its root. There are many ways to stem a word: affix removal and successor variety are two common categories of stemmers. The Porter Stemming Algorithm is a suffix removal stemmer that operates as a rule-based process on English words. We can think of stemming as a way to cluster …
Google Books As Infrastructure Of In/Justice: Towards A Sociotechnical Account Of Rawlsian Justice, Information, And Technology, Anna Lauren Hoffmann
Google Books As Infrastructure Of In/Justice: Towards A Sociotechnical Account Of Rawlsian Justice, Information, And Technology, Anna Lauren Hoffmann
Theses and Dissertations
The Google Books project is germane for examining underappreciated dimensions of social justice and access to information from a Rawlsian perspective. To date, however, the standard account of Rawls as applied to information and technology has focused almost exclusively on rights to access and information as a primary good (Drahos 1996; van den Hoven and Rooksby 2008; Duff 2011). In this dissertation, the author develops an alternative to the standard account--the sociotechnical account--that draws on underappreciated resources available within discussions of Rawls' work. Specifically, the author focuses on the importance of Rawls' basic structure argument and the value of self-respect--two …
Essays On The Digital Divide, Belal Abdelfattah
Essays On The Digital Divide, Belal Abdelfattah
Open Access Theses & Dissertations
The digital divide is a phenomenon that is globally persistent, despite rapidly decreasing costs in technology. While much of the variance in the adoption and use of information communication technology (ICT) that defines the digital divide can be explained by socioeconomic and demographic variables, there is still significant unaccounted variance that needs to be explained if the world's population is expected to be brought more fully into the digital age. The present research addresses this need with three cross-country studies. Study 1 primarily investigates the time individuals spend with traditional media sources as a likely explanation for their frequency of …
Time Will Tell : Temporal Reasoning In Clinical Narratives And Beyond, Weiyi Sun
Time Will Tell : Temporal Reasoning In Clinical Narratives And Beyond, Weiyi Sun
Legacy Theses & Dissertations (2009 - 2024)
Temporal reasoning in natural language refers to the extraction and understanding of time-related information conveyed in free text. A clinical narrative temporal reasoning component can enable a spectrum of medical natural language processing (NLP) applications that directly improve patient care documentation efficiency, accessibility and accountability. This dissertation contributes in three subtasks under temporal reasoning: temporal annotation, temporal expression extraction and temporal relation inferences. The temporal annotation work described in the dissertation produced one of the first publicly available clinical narratives. We published one of the first sets of temporal
Exploratory Study Of Student Instructional Choice In Online Learning, Andrew Hurd
Exploratory Study Of Student Instructional Choice In Online Learning, Andrew Hurd
Legacy Theses & Dissertations (2009 - 2024)
This exploratory study considers choice theory, decision theory, and the constructivist theory of education to explore college-level computer science learners' behavior when presented with multiple instructional modes (instructional methods for the presentation of course content, such as video, text, audio, animation, etc.) in an online learning environment.
Mispronunciation Detection For Language Learning And Speech Recognition Adaptation, Zhenhao Ge
Mispronunciation Detection For Language Learning And Speech Recognition Adaptation, Zhenhao Ge
Open Access Dissertations
The areas of "mispronunciation detection" (or "accent detection" more specifically) within the speech recognition community are receiving increased attention now. Two application areas, namely language learning and speech recognition adaptation, are largely driving this research interest and are the focal points of this work.
There are a number of Computer Aided Language Learning (CALL) systems with Computer Aided Pronunciation Training (CAPT) techniques that have been developed. In this thesis, a new HMM-based text-dependent mispronunciation system is introduced using text Adaptive Frequency Cepstral Coefficients (AFCCs). It is shown that this system outperforms the conventional HMM method based on Mel Frequency Cepstral …
Applications Of Agent Based Approaches In Business: A Three Essay Dissertation, Shankar Prawesh
Applications Of Agent Based Approaches In Business: A Three Essay Dissertation, Shankar Prawesh
USF Tampa Graduate Theses and Dissertations
The goal of this dissertation is to investigate the enabling role that agent based simulation plays in business and policy. The aforementioned issue has been addressed in this dissertation through three distinct, but related essays. The first essay is a literature review of different research applications of agent based simulation in various business disciplines, such as finance, economics, information systems, management, marketing and accounting. Various agent based simulation tools to develop computational models are discussed. The second essay uses an agent-based simulation approach to study important properties of the widely used most popular news recommender systems (NRS). This essay highlights …