Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Computer Sciences

Institution
Keyword
Publication Year
Publication

Articles 61 - 90 of 110

Full-Text Articles in Library and Information Science

Patient Satisfaction Management In Office Visits And Telehealth In Health Care Technology, Todd Price Jan 2018

Patient Satisfaction Management In Office Visits And Telehealth In Health Care Technology, Todd Price

Walden Dissertations and Doctoral Studies

Telehealth and remote medical treatments have begun to be more commonly used in healthcare systems. Researchers have theorized that providers' abilities to treat patients are not directly tied to the proximity of the patient to the doctor, but by the identification and treatment of the patient's symptoms. Although the treatment and cure rates are being established within individual health systems and professional medical associations, empirical research is lacking regarding patient satisfaction with this remote treatment situation. The purpose of this quantitative study was to address this gap by examining satisfaction ratings of patients between virtual provider visits and face-to-face provider …


Analytic Extensions To The Data Model For Management Analytics And Decision Support In The Big Data Environment, Nsikak Etim Akpakpan Jan 2018

Analytic Extensions To The Data Model For Management Analytics And Decision Support In The Big Data Environment, Nsikak Etim Akpakpan

Walden Dissertations and Doctoral Studies

From 2006 to 2016, an estimated average of 50% of big data analytics and decision support projects failed to deliver acceptable and actionable outputs to business users. The resulting management inefficiency came with high cost, and wasted investments estimated at $2.7 trillion in 2016 for companies in the United States. The purpose of this quantitative descriptive study was to examine the data model of a typical data analytics project in a big data environment for opportunities to improve the information created for management problem-solving. The research questions focused on finding artifacts within enterprise data to model key business scenarios for …


Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii Jan 2018

Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii

Walden Dissertations and Doctoral Studies

The Federal Bureau of Investigation reported that cyber actors will likely increase cyber intrusions against healthcare systems and their concomitant medical devices because of the mandatory transition from paper to electronic health records, lax cyber security standards, and a higher financial payout for medical records in the deep web. The problem addressed in this quantitative correlational study was uncertainty surrounding the benefits of palm vein authentication adoption relative to the growing crime of medical identity theft. The purpose of this quantitative correlational study was to understand healthcare managers' and doctors' perceptions of the effectiveness of palm vein authentication technology. The …


Clinical Information Extraction From Unstructured Free-Texts, Mingzhe Tao Jan 2018

Clinical Information Extraction From Unstructured Free-Texts, Mingzhe Tao

Legacy Theses & Dissertations (2009 - 2024)

Information extraction (IE) is a fundamental component of natural language processing (NLP) that provides a deeper understanding of the texts. In the clinical domain, documents prepared by medical experts (e.g., discharge summaries, drug labels, medical history records) contain a significant amount of clinically-relevant information that is crucial to the overall well-being of patients. Unfortunately, in many cases, clinically-relevant information is presented in an unstructured format, predominantly consisting of free-texts, making it inaccessible to computerized methods. Automatic extraction of this information can improve accessibility. However, the presence of synonymous expressions, medical acronyms, misspellings, negated phrases, and ambiguous terminologies make automatic extraction …


Proactive It Incident Prevention: Using Data Analytics To Reduce Service Interruptions, Mark G. Malley Jan 2017

Proactive It Incident Prevention: Using Data Analytics To Reduce Service Interruptions, Mark G. Malley

Walden Dissertations and Doctoral Studies

The cost of resolving user requests for IT assistance rises annually. Researchers have demonstrated that data warehouse analytic techniques can improve service, but they have not established the benefit of using global organizational data to reduce reported IT incidents. The purpose of this quantitative, quasi-experimental study was to examine the extent to which IT staff use of organizational knowledge generated from data warehouse analytical measures reduces the number of IT incidents over a 30-day period, as reported by global users of IT within an international pharmaceutical company headquartered in Germany. Organizational learning theory was used to approach the theorized relationship …


Strategies To Prevent Security Breaches Caused By Mobile Devices, Tony Griffin Jan 2017

Strategies To Prevent Security Breaches Caused By Mobile Devices, Tony Griffin

Walden Dissertations and Doctoral Studies

Data breaches happen almost every day in the United States and, according to research, the majority of these breaches occur due to a lack of security with organizations' mobile devices. Although most of the security policies related to mobile devices currently in place may meet the guidelines required by law, they often fail to prevent a data breach caused by a mobile device. The main purpose of this qualitative single case study was to explore the strategies used by security managers to prevent data breaches caused by mobile devices. The study population consisted of security managers working for a government …


Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi Dec 2016

Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi

UNLV Theses, Dissertations, Professional Papers, and Capstones

Securing IoT (Internet of Things) systems in general, regardless of the communication technology used, has been the concern of many researchers and private companies. As for ZigBee security concerns, much research and many experiments have been conducted to better predict the nature of potential security threats. In this research we are addressing several ZigBee vulnerabilities by performing first hand experiments and attack simulations on ZigBee protocol. This will allow us to better understand the security issues surveyed and find ways to mitigate them. Based on the attack simulations performed and the survey conducted, we have developed a ZigBee IoT framework …


Computational Environment For Modeling And Analysing Network Traffic Behaviour Using The Divide And Recombine Framework, Ashrith Barthur Dec 2016

Computational Environment For Modeling And Analysing Network Traffic Behaviour Using The Divide And Recombine Framework, Ashrith Barthur

Open Access Dissertations

There are two essential goals of this research. The first goal is to design and construct a computational environment that is used for studying large and complex datasets in the cybersecurity domain. The second goal is to analyse the Spamhaus blacklist query dataset which includes uncovering the properties of blacklisted hosts and understanding the nature of blacklisted hosts over time.

The analytical environment enables deep analysis of very large and complex datasets by exploiting the divide and recombine framework. The capability to analyse data in depth enables one to go beyond just summary statistics in research. This deep analysis is …


Using Web Archives To Enrich The Live Web Experience Through Storytelling, Yasmin Alnoamany Jul 2016

Using Web Archives To Enrich The Live Web Experience Through Storytelling, Yasmin Alnoamany

Computer Science Theses & Dissertations

Much of our cultural discourse occurs primarily on the Web. Thus, Web preservation is a fundamental precondition for multiple disciplines. Archiving Web pages into themed collections is a method for ensuring these resources are available for posterity. Services such as Archive-It exists to allow institutions to develop, curate, and preserve collections of Web resources. Understanding the contents and boundaries of these archived collections is a challenge for most people, resulting in the paradox of the larger the collection, the harder it is to understand. Meanwhile, as the sheer volume of data grows on the Web, "storytelling" is becoming a popular …


Scripts In A Frame: A Framework For Archiving Deferred Representations, Justin F. Brunelle Apr 2016

Scripts In A Frame: A Framework For Archiving Deferred Representations, Justin F. Brunelle

Computer Science Theses & Dissertations

Web archives provide a view of the Web as seen by Web crawlers. Because of rapid advancements and adoption of client-side technologies like JavaScript and Ajax, coupled with the inability of crawlers to execute these technologies effectively, Web resources become harder to archive as they become more interactive. At Web scale, we cannot capture client-side representations using the current state-of-the art toolsets because of the migration from Web pages to Web applications. Web applications increasingly rely on JavaScript and other client-side programming languages to load embedded resources and change client-side state. We demonstrate that Web crawlers and other automatic archival …


Social Influence And Organizational Innovation Characteristics On Enterprise Social Computing Adoption, Vincent Di Palermo Jan 2016

Social Influence And Organizational Innovation Characteristics On Enterprise Social Computing Adoption, Vincent Di Palermo

Walden Dissertations and Doctoral Studies

Ample research has been conducted to identify the determinants of information technology (IT) adoption. No previous quantitative researchers have explored IT adoption in the context of enterprise social computing (ESC). The purpose of this study was to test and extend the social influence model of IT adoption. In addition, this study addressed a gap in the research literature and presented a model that relates the independent variables of social action, social consensus, social authority, social cooperation, perceived relative advantage, perceived compatibility, perceived ease of use, perceived usefulness, and organizational commitment to the dependent variables of social embracement and embedment. A …


Adoption Of Electronic Health Record Systems Within Primary Care Practices, Marvin Leon Reid, Jr. Jan 2016

Adoption Of Electronic Health Record Systems Within Primary Care Practices, Marvin Leon Reid, Jr.

Walden Dissertations and Doctoral Studies

Primary care physicians (PCPPs) have been slow to implement electronic health records (EHRs), even though there is a U.S. federal requirement to implement EHRs. The purpose of this phenomenological study was to determine why PCPPs have been slow to adopt electronic health record (EHR) systems despite the potential to increase efficiency and quality of health care. The complex adaptive systems theory (CAS) served as the conceptual framework for this study. Twenty-six PCPPs were interviewed from primary care practices (PCPs) based in southwestern Ohio. The data were collected through a semistructured interview format and analyzed using a modified van Kaam method. …


Exploring Leader-Initiated Change Management For Adopting Cloud Services, Nancy Marie Landreville Jan 2016

Exploring Leader-Initiated Change Management For Adopting Cloud Services, Nancy Marie Landreville

Walden Dissertations and Doctoral Studies

Cloud technology requires a virtualized ubiquitous and scalable environment with shared resources. The general problem in cloud adoption is the absence of standardization across organizations. A standardized approach remained elusive since the inception of the Cloud First mandate. The purpose of this study was to explore leader-initiated change management (LICM) practices in cloud adoption within organizations. The theoretical framework included the classical theories of Kurt Lewin's organization change management, leader-member exchange, intentional change, and appreciative inquiry. A multiple case study design approach facilitated the exploration of LICM-value added practices to identify standardization in cloud adoption practices. Data collection included semistructured …


Innovation Difussion Of Smartphone In Nigeria, Olukunle Ariyo Iyanda Jan 2016

Innovation Difussion Of Smartphone In Nigeria, Olukunle Ariyo Iyanda

Walden Dissertations and Doctoral Studies

Rapid diffusion and use of smartphones in Africa are challenging, given the state of its infrastructural facilities. The problem addressed was a lack of information on the adoption behavior and the sociodevelopmental effect of smartphone acceptance among rural and urban users in Nigeria. The purpose of this study was to examine the adoption behavior and the sociodevelopmental effect of smartphone acceptance among rural and urban residents. Research questions examined the relationship of performance expectancy, social influence, price value, and habit on adopters' intentions to use smartphones, continued use of smartphones, and the sociodevelopmental effect on smartphone users lives and standard …


The Impact Of Technology Acceptance And Openess To Innovaion On Software Implementation, Michael Marin Bertini Jan 2016

The Impact Of Technology Acceptance And Openess To Innovaion On Software Implementation, Michael Marin Bertini

Walden Dissertations and Doctoral Studies

Senior management decisions to foster innovation and adopt new technology solutions have serious implications for the success of their organization change initiatives. This project examined the issue of senior management decision or reasons of their decision to adopt new Enterprise Resource Planning (ERP) systems as a solution to solve their business problems. This project investigated the degree that perceived ease of use and usefulness of the ERP system influenced decisions made by senior managers to innovate. Roger's diffusion of innovations theory and Davis technology acceptance model theory were used to predict when senior managers were open to innovation, and whether …


Novel Machine Learning Methods For Modeling Time-To-Event Data, Bhanukiran Vinzamuri Jan 2016

Novel Machine Learning Methods For Modeling Time-To-Event Data, Bhanukiran Vinzamuri

Wayne State University Dissertations

Predicting time-to-event from longitudinal data where different events occur at different time points is an extremely important problem in several domains such as healthcare, economics, social networks and seismology, to name a few. A unique challenge in this problem involves building predictive models from right censored data (also called as survival data). This is a phenomenon where instances whose event of interest are not yet observed within a given observation time window and are considered to be right censored. Effective models for predicting time-to-event labels from such right censored data with good accuracy can have a significant impact in these …


Informational Power On Twitter: A Mixed-Methods Exploration Of User Knowledge And Technological Discourse About Information Flows, Nicholas John Proferes May 2015

Informational Power On Twitter: A Mixed-Methods Exploration Of User Knowledge And Technological Discourse About Information Flows, Nicholas John Proferes

Theses and Dissertations

Following a number of recent examples where social media users have been confronted by information flows that did not match their understandings of the platforms, there is a pressing need to examine public knowledge of information flows on these systems, to map how this knowledge lines up against the extant flows of these systems, and to explore the factors that contribute to the construction of knowledge about these systems. There is an immediacy to this issue because as social media sites become further entrenched as dominant vehicles for communication, knowledge about these technologies will play an ever increasing role in …


Password Strength Analysis: User Coping Mechanisms In Password Selection, Brian Thomas Curnett Apr 2015

Password Strength Analysis: User Coping Mechanisms In Password Selection, Brian Thomas Curnett

Open Access Theses

The security that passwords provide could be seriously flawed due to the way people cope with having to memorize and recall their passwords. The National Institute of Standards and Technology (NIST) standard that is used to measure the password strength, known as entropy, is designed for a single use and does not consider that users may choose to keep parts of their password across password changes. This study shows that a portion of users keep some information from previous passwords across changes. These habits which will be called coping mechanisms that over time serve to erode the protection provided by …


Evaluating Success Factors In Implementing E-Maintenance In Maintenance, Repair, And Overhaul (Mro) Organizations, Peter Rocky Toves Jan 2015

Evaluating Success Factors In Implementing E-Maintenance In Maintenance, Repair, And Overhaul (Mro) Organizations, Peter Rocky Toves

Walden Dissertations and Doctoral Studies

Despite more than a decade-long process to transition aircraft maintenance practices from paper-to electronic-based systems, some organizations remain unable to complete this transition. Researchers have indicated that while organizations have invested resources in technology improvements, there remains a limited understanding of the factors that contribute to effectively managing technology-enabled change. The purpose of this case study was to identify and explore socio-technical (ST) factors that inhibit an effective transition from a paper-based system to an electronic-based system for aircraft maintenance. A conceptual model applying theories of change management, technology acceptance, systems thinking, and ST theory informed the research. Thirteen participants …


A Prediction Modeling Framework For Noisy Welding Quality Data, Junheung Park Jan 2015

A Prediction Modeling Framework For Noisy Welding Quality Data, Junheung Park

Wayne State University Dissertations

Numerous and various research projects have been conducted to utilize historical manufacturing process data in product design. These manufacturing process data often contain data inconsistencies, and it causes challenges in extracting useful information from the data. In resistance spot welding (RSW), data inconsistency is a well-known issue. In general, such inconsistent data are treated as noise data and removed from the original dataset before conducting analyses or constructing prediction models. This may not be desirable for every design and manufacturing applications since every data can contain important information to further explain the process. In this research, we propose a prediction …


Assessing Clinical Software User Needs For Improved Clinical Decision Support Tools, Kimberly B. Denney Jan 2015

Assessing Clinical Software User Needs For Improved Clinical Decision Support Tools, Kimberly B. Denney

Walden Dissertations and Doctoral Studies

Consolidating patient and clinical data to support better-informed clinical decisions remains a primary function of electronic health records (EHRs). In the United States, nearly 6 million patients receive care from an accountable care organization (ACO). Knowledge of clinical decision support (CDS) tool design for use by physicians participating in ACOs remains limited. The purpose of this quantitative study was to examine whether a significant correlation exists between characteristics of alert content and alert timing (the independent variables) and physician perceptions of improved ACO quality measure adherence during electronic ordering (the dependent variable). Sociotechnical theory supported the theoretical framework for this …


Three Essays On Global Ict Phenomenon: Productivity Paradox, Organizational Ict Use, And Privacy In Social Networks, Faruk Arslan Jan 2015

Three Essays On Global Ict Phenomenon: Productivity Paradox, Organizational Ict Use, And Privacy In Social Networks, Faruk Arslan

Open Access Theses & Dissertations

This Dissertation aims to investigate the global diversity in information systems by studying three distinctive phenomena. The first essay investigates the existence of "IT Productivity Paradox" within firms operating in developing countries using an empirical approach. IT Productivity Paradox has been a widely investigated topic within the context of developed countries and primarily studied within the context of developing countries using a single country. Our research addresses a gap in the literature, which is the study of IT Productivity Paradox across several developing countries with diverse characteristics. The second essay studies the contextual factors (firm characteristics and perception of external …


#Mplp: A Comparison Of Domain Novice And Expert User-Generated Tags In A Minimally Processed Digital Archive, Edward A. Benoit Iii Aug 2014

#Mplp: A Comparison Of Domain Novice And Expert User-Generated Tags In A Minimally Processed Digital Archive, Edward A. Benoit Iii

Theses and Dissertations

The high costs of creating and maintaining digital archives precluded many archives from providing users with digital content or increasing the amount of digitized materials. Studies have shown users increasingly demand immediate online access to archival materials with detailed descriptions (access points). The adoption of minimal processing to digital archives limits the access points at the folder or series level rather than the item-level description users' desire. User-generated content such as tags, could supplement the minimally processed metadata, though users are reluctant to trust or use unmediated tags. This dissertation project explores the potential for controlling/mediating the supplemental metadata from …


Using The Web 1t 5-Gram Database For Attribute Selection In Formal Concept Analysis To Correct Overstemmed Clusters, Guymon Hall May 2014

Using The Web 1t 5-Gram Database For Attribute Selection In Formal Concept Analysis To Correct Overstemmed Clusters, Guymon Hall

UNLV Theses, Dissertations, Professional Papers, and Capstones

Information retrieval is the process of finding information from an unstructured collection of data. The process of information retrieval involves building an index, commonly called an inverted file. As part of the inverted file, information retrieval algorithms often stem words to a common root. Stemming involves reducing a document term to its root. There are many ways to stem a word: affix removal and successor variety are two common categories of stemmers. The Porter Stemming Algorithm is a suffix removal stemmer that operates as a rule-based process on English words. We can think of stemming as a way to cluster …


Google Books As Infrastructure Of In/Justice: Towards A Sociotechnical Account Of Rawlsian Justice, Information, And Technology, Anna Lauren Hoffmann May 2014

Google Books As Infrastructure Of In/Justice: Towards A Sociotechnical Account Of Rawlsian Justice, Information, And Technology, Anna Lauren Hoffmann

Theses and Dissertations

The Google Books project is germane for examining underappreciated dimensions of social justice and access to information from a Rawlsian perspective. To date, however, the standard account of Rawls as applied to information and technology has focused almost exclusively on rights to access and information as a primary good (Drahos 1996; van den Hoven and Rooksby 2008; Duff 2011). In this dissertation, the author develops an alternative to the standard account--the sociotechnical account--that draws on underappreciated resources available within discussions of Rawls' work. Specifically, the author focuses on the importance of Rawls' basic structure argument and the value of self-respect--two …


Essays On The Digital Divide, Belal Abdelfattah Jan 2014

Essays On The Digital Divide, Belal Abdelfattah

Open Access Theses & Dissertations

The digital divide is a phenomenon that is globally persistent, despite rapidly decreasing costs in technology. While much of the variance in the adoption and use of information communication technology (ICT) that defines the digital divide can be explained by socioeconomic and demographic variables, there is still significant unaccounted variance that needs to be explained if the world's population is expected to be brought more fully into the digital age. The present research addresses this need with three cross-country studies. Study 1 primarily investigates the time individuals spend with traditional media sources as a likely explanation for their frequency of …


Time Will Tell : Temporal Reasoning In Clinical Narratives And Beyond, Weiyi Sun Jan 2014

Time Will Tell : Temporal Reasoning In Clinical Narratives And Beyond, Weiyi Sun

Legacy Theses & Dissertations (2009 - 2024)

Temporal reasoning in natural language refers to the extraction and understanding of time-related information conveyed in free text. A clinical narrative temporal reasoning component can enable a spectrum of medical natural language processing (NLP) applications that directly improve patient care documentation efficiency, accessibility and accountability. This dissertation contributes in three subtasks under temporal reasoning: temporal annotation, temporal expression extraction and temporal relation inferences. The temporal annotation work described in the dissertation produced one of the first publicly available clinical narratives. We published one of the first sets of temporal


Exploratory Study Of Student Instructional Choice In Online Learning, Andrew Hurd Jan 2014

Exploratory Study Of Student Instructional Choice In Online Learning, Andrew Hurd

Legacy Theses & Dissertations (2009 - 2024)

This exploratory study considers choice theory, decision theory, and the constructivist theory of education to explore college-level computer science learners' behavior when presented with multiple instructional modes (instructional methods for the presentation of course content, such as video, text, audio, animation, etc.) in an online learning environment.


Mispronunciation Detection For Language Learning And Speech Recognition Adaptation, Zhenhao Ge Oct 2013

Mispronunciation Detection For Language Learning And Speech Recognition Adaptation, Zhenhao Ge

Open Access Dissertations

The areas of "mispronunciation detection" (or "accent detection" more specifically) within the speech recognition community are receiving increased attention now. Two application areas, namely language learning and speech recognition adaptation, are largely driving this research interest and are the focal points of this work.

There are a number of Computer Aided Language Learning (CALL) systems with Computer Aided Pronunciation Training (CAPT) techniques that have been developed. In this thesis, a new HMM-based text-dependent mispronunciation system is introduced using text Adaptive Frequency Cepstral Coefficients (AFCCs). It is shown that this system outperforms the conventional HMM method based on Mel Frequency Cepstral …


Applications Of Agent Based Approaches In Business: A Three Essay Dissertation, Shankar Prawesh Jan 2013

Applications Of Agent Based Approaches In Business: A Three Essay Dissertation, Shankar Prawesh

USF Tampa Graduate Theses and Dissertations

The goal of this dissertation is to investigate the enabling role that agent based simulation plays in business and policy. The aforementioned issue has been addressed in this dissertation through three distinct, but related essays. The first essay is a literature review of different research applications of agent based simulation in various business disciplines, such as finance, economics, information systems, management, marketing and accounting. Various agent based simulation tools to develop computational models are discussed. The second essay uses an agent-based simulation approach to study important properties of the widely used most popular news recommender systems (NRS). This essay highlights …