Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Physical Sciences and Mathematics

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 100

Full-Text Articles in Library and Information Science

Discourse, Power Dynamics, And Risk Amplification In Disaster Risk Management In Canada, Martins Oluwole Olu-Omotayo Dec 2022

Discourse, Power Dynamics, And Risk Amplification In Disaster Risk Management In Canada, Martins Oluwole Olu-Omotayo

Electronic Thesis and Dissertation Repository

The domain of disaster risk management is rife with discursive contentions, whereby dominant discourses amplify the powers of risk actors to precipitate and reinforce political, economic, and environmental inequalities that predispose different sections of the population to unequal disaster risk vulnerabilities. This thesis identified important actors (government, risk experts, media, and NGOs) that shape the power dynamics in disaster risk management in Canada and explained their roles, influences, and the dimensions in which their powers negotiate each other through risk discourses. The patterns of these power dynamics in the three aspects of power –communication, assessment, and social trust –were also …


Convivial Making: Power In Public Library Creative Places, Shannon Crawford Barniskis Aug 2022

Convivial Making: Power In Public Library Creative Places, Shannon Crawford Barniskis

Theses and Dissertations

In 2011, public libraries began to provide access to collaborative creative places, frequently called “makerspaces.” The professional literature portrays these as beneficial for communities and individuals through their support of creativity, innovation, learning, and access to high-tech tools such as 3D printers. As in longstanding “library faith” narratives, which pin the library’s existence to widely held values, makerspace rhetoric describes access to tools and skills as instrumental for a stronger economy or democracy, social justice, and/or individual happiness. The rhetoric generally frames these places as empowering. Yet the concept of power has been neither well-theorized within the library makerspace literature …


Factors Affecting Customers’ Decision To Share Personal Data With Mobile Operators, Ammar Ali Qaffaf Jan 2022

Factors Affecting Customers’ Decision To Share Personal Data With Mobile Operators, Ammar Ali Qaffaf

CCE Theses and Dissertations

Companies that personalize their services based on users’ specific needs have increased sales and customer satisfaction. Personalization requires analyzing the user’s behavior and correlating the action with other pieces of information. The information available for cellular service providers has grown substantially as connectivity becomes ubiquitous. Customers are unknowingly sharing their locations, habits, activities, and preferences in real-time with their service providers. Although cellular service providers state that they share personal data with external entities in their publicly available privacy policies, users have limited control over who can access their personal information. Users have no, or suboptimal, control to manage their …


Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy Jan 2022

Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy

CCE Theses and Dissertations

The data mining sanitization process involves converting the data by masking the sensitive data and then releasing it to public domain. During the sanitization process, side effects such as hiding failure, missing cost and artificial cost of the data were observed. Privacy Preserving Data Mining (PPDM) algorithms were developed for the sanitization process to overcome information loss and yet maintain data integrity. While these PPDM algorithms did provide benefits for privacy preservation, they also made sure to solve the side effects that occurred during the sanitization process. Many PPDM algorithms were developed to reduce these side effects. There are several …


A Universal Cybersecurity Competency Framework For Organizational Users, Patricia A. Baker Jan 2022

A Universal Cybersecurity Competency Framework For Organizational Users, Patricia A. Baker

CCE Theses and Dissertations

The global reliance on the Internet to facilitate organizational operations necessitates further investments in organizational information security. Such investments hold the potential for protecting information assets from cybercriminals. To assist organizations with their information security, The National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NCWF) was created. The framework referenced the cybersecurity work, knowledge, and skills required to competently complete the tasks that strengthen their information security. Organizational users’ limited cybersecurity competency contributes to the financial and information losses suffered by organizations year after year. While most organizational users may be able to respond positively to a cybersecurity threat, …


Exploring Algorithmic Literacy For College Students: An Educator’S Roadmap, Susan Gardner Archambault Jan 2022

Exploring Algorithmic Literacy For College Students: An Educator’S Roadmap, Susan Gardner Archambault

LMU/LLS Theses and Dissertations

Research shows that college students are largely unaware of the impact of algorithms on their everyday lives. Also, most university students are not being taught about algorithms as part of the regular curriculum. This exploratory, qualitative study aimed to explore subject-matter experts’ insights and perceptions of the knowledge components, coping behaviors, and pedagogical considerations to aid faculty in teaching algorithmic literacy to college students. Eleven individual, semi-structured interviews and one focus group were conducted with scholars and teachers of critical algorithm studies and related fields. Findings suggested three sets of knowledge components that would contribute to students’ algorithmic literacy: general …


Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim Dec 2021

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim

Electronic Theses, Projects, and Dissertations

Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …


Fighting Mass Diffusion Of Fake News On Social Media, Abdallah Musmar Nov 2021

Fighting Mass Diffusion Of Fake News On Social Media, Abdallah Musmar

USF Tampa Graduate Theses and Dissertations

Fake news has been considered one of the most challenging problems in the last few years. The effects of spreading fake news over social media platforms are widely observed across the globe as the depth and velocity of fake news reach far more than real news (Vosoughi et al., 2018). The plan for the following dissertation is to investigate the mass spread of fake news across social media and propose a framework to fight the spread of fake news by mixing preventive methods that could hinder the overall percentage of fake news sharing. We plan to create a study on …


Constructing Frameworks For Task-Optimized Visualizations, Ghulam Jilani Abdul Rahim Quadri Oct 2021

Constructing Frameworks For Task-Optimized Visualizations, Ghulam Jilani Abdul Rahim Quadri

USF Tampa Graduate Theses and Dissertations

Visualization is crucial in today’s data-driven world to augment and enhance human understanding and decision-making. Effective visualizations must support accuracy in visual task performance and expressive data communication. Effective visualization design depends on the visual channels used, chart types, or visual tasks. However, design choices and visual judgment are co-related, and effectiveness is not one-dimensional, leading to a significant need to understand the intersection of these factors to create optimized visualizations. Hence, constructing frameworks that consider both design decisions and the task being performed enables optimizing visualization design to maximize efficacy. This dissertation describes experiments, techniques, and user studies to …


Efficient Heuristic Solutions To Scheduling Online Courses, Rida Zaidi Jul 2021

Efficient Heuristic Solutions To Scheduling Online Courses, Rida Zaidi

Electronic Theses and Dissertations

The demand for efficient algorithms to automate (near-)optimal timetables has motivated many well-studied scheduling problems in operational research. With most of the courses moving online during the recent pandemic, the delivery of quality education has raised many new technical issues, including online course scheduling. This thesis considers the problem of yielding a near-optimal schedule of the real-time courses in an educational institute, taking into account the conflict among courses, the constraint on the simultaneous consumption of the bandwidth at the hosting servers of the courses, and the maximum utilization of the prime time for the lectures. We propose three approaches …


Bridging The Simulation-To-Reality Gap: Adapting Simulation Environment For Object Recognition, Hardik Yogesh Sonetta Jul 2021

Bridging The Simulation-To-Reality Gap: Adapting Simulation Environment For Object Recognition, Hardik Yogesh Sonetta

Electronic Theses and Dissertations

Rapid advancements in object recognition have created a huge demand for labeled datasets for the task of training, testing, and validation of different techniques. Due to the wide range of applications, object models in the datasets need to cover both variations in geometric features and diverse conditions in which sensory inputs are obtained. Also, the need to manually label the object models is cumbersome. As a result, it becomes difficult for researchers to gain access to adequate datasets for the development of new methods or algorithms. In comparison, computer simulation has been considered a cost-effective solution to generate simulated data …


Improving Collection Understanding For Web Archives With Storytelling: Shining Light Into Dark And Stormy Archives, Shawn M. Jones Jul 2021

Improving Collection Understanding For Web Archives With Storytelling: Shining Light Into Dark And Stormy Archives, Shawn M. Jones

Computer Science Theses & Dissertations

Collections are the tools that people use to make sense of an ever-increasing number of archived web pages. As collections themselves grow, we need tools to make sense of them. Tools that work on the general web, like search engines, are not a good fit for these collections because search engines do not currently represent multiple document versions well. Web archive collections are vast, some containing hundreds of thousands of documents. Thousands of collections exist, many of which cover the same topic. Few collections include standardized metadata. Too many documents from too many collections with insufficient metadata makes collection understanding …


Designing Targeted Mobile Advertising Campaigns, Kimia Keshanian Jun 2021

Designing Targeted Mobile Advertising Campaigns, Kimia Keshanian

USF Tampa Graduate Theses and Dissertations

With the proliferation of smart, handheld devices, there has been a multifold increase in the ability of firms to target and engage with customers through mobile advertising. Therefore, not surprisingly, mobile advertising campaigns have become an integral aspect of firms’ brand building activities, such as improving the awareness and overall visibility of firms' brands. In addition, retailers are increasingly using mobile advertising for targeted promotional activities that increase in-store visits and eventual sales conversions. However, in recent years, mobile or in general online advertising campaigns have been facing one major challenge and one major threat that can negatively impact the …


An Assessment Of The Impacts Of Social Media Inputs And Court Case Information On Mitigating Insider Threats, Robert Jones Jan 2021

An Assessment Of The Impacts Of Social Media Inputs And Court Case Information On Mitigating Insider Threats, Robert Jones

CCE Theses and Dissertations

The insider threat is a global problem that impacts organizations and produces a gamut of undesired outcomes. Businesses often experience lost revenue and stolen trade secrets, which can leave a tarnished reputation. Insider threats can also cause harm to individuals and national security. Past efforts have not mitigated the problem in its entirety. Documented instances of insider threats are as recent as March 2020. Many researchers have focused on monitoring technologies and relying on human monitoring in a reactive posture. An ideal solution would scrutinize an individual’s character and ascertain whether unique traits associated with actors of insider threats are …


Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King Jan 2021

Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King

CCE Theses and Dissertations

It is estimated that over half of all information systems security breaches are due directly or indirectly to the poor security practices of an organization’s employees. Previous research has shown neutralization techniques as having influence on the intent to violate information security policy. In this study, we proposed an expansion of the neutralization model by including the effects of business and ethical orientation of individuals on their tendencies to neutralize and compromise with information security policy. Additionally, constructs from social influences and pressures have been integrated into this model to measure the impact on the intent to violate information security …


Improving Employees’ Compliance With Password Policies, Enas Albataineh Jan 2021

Improving Employees’ Compliance With Password Policies, Enas Albataineh

CCE Theses and Dissertations

Employees’ lack of compliance with password policies increases password susceptibility, which leads to financial damages to the organizations as a result of information disclosure, fraud, and unauthorized transactions. However, few studies have examined what motivates employees to comply with password policies.

The purpose of this quantitative cross-sectional study was to examine what factors influence employees’ compliance with password policies. A theoretical model was developed based on Protection Motivation Theory (PMT), General Deterrence Theory (GDT), Theory of Reasoned Action (TRA), and Psychological Ownership Theory to explain employees’ compliance with password policies.

A non-probability convenience sample was employed. The sample consisted of …


Enterprise Social Network Systems Implementation Model For Knowledge Sharing Among Supply Chain It Professionals, Edgardo Luis Velez-Mandes Jan 2021

Enterprise Social Network Systems Implementation Model For Knowledge Sharing Among Supply Chain It Professionals, Edgardo Luis Velez-Mandes

CCE Theses and Dissertations

With the increased use of social network technologies in organizational environments, there is a need to understand how these technologies facilitate organizational knowledge management, particularly knowledge sharing. Prior research has focused on the relationship between knowledge management and enterprise social networking systems (ESNS), but little research has been conducted relating to how organizations implement and use ESNS for knowledge sharing. The goal was to construct and validate internally a model that offers guidance for the successful implementation and use of ESNS for knowledge sharing and building successful virtual communities of practice (vCoPs) among IT supply chain professionals in a healthcare …


Human Errors In Data Breaches: An Exploratory Configurational Analysis, Gabriel A. Cornejo Jan 2021

Human Errors In Data Breaches: An Exploratory Configurational Analysis, Gabriel A. Cornejo

CCE Theses and Dissertations

Information Systems (IS) are critical for employee productivity and organizational success. Data breaches are on the rise—with thousands of data breaches accounting for billions of records breached and annual global cybersecurity costs projected to reach $10.5 trillion by 2025. A data breach is the unauthorized disclosure of sensitive information—and can be achieved intentionally or unintentionally. Significant causes of data breaches are hacking and human error; in some estimates, human error accounted for about a quarter of all data breaches in 2018. Furthermore, the significance of human error on data breaches is largely underrepresented, as hackers often capitalize on organizational users’ …


An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung Jan 2021

An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung

CCE Theses and Dissertations

Computer users’ security compliance behaviors can be better understood by devising an experimental study to examine how fear appeals might impact users’ security behavior. Telecommuter security behavior has become very relevant in information systems (IS) research with the growing number of individuals working from home. The increasing dependence on telecommuting to enhance the viability and convenience has created an urgency with the advent of the COVID-19 pandemic to examine the behavior of users working at home across a corporate network. The home networks are usually not as secure as those in corporate settings. There is seldom a firewall setting and …


Strategies To Monitor And Deter Cyberloafing In Small Businesses: A Case Study, Veronica Pugh Dooly Jan 2021

Strategies To Monitor And Deter Cyberloafing In Small Businesses: A Case Study, Veronica Pugh Dooly

Walden Dissertations and Doctoral Studies

Some information technology (IT) managers working for small businesses are struggling to monitor and deter cyberloafing. Strategies are needed to help IT practitioners to discourage cyberloafing and improve productivity while maintaining employee satisfaction. Grounded in adaptive structuration theory, the purpose of this qualitative multiple-case study was to explore strategies some small business IT managers use to monitor and deter cyberloafing. The participants were nine IT managers who successfully implemented cyberloafing monitoring and deterrence strategies in the United States. Data were collected via semistructured interviews and organization employee policy handbooks (n = 4) provided by the participants. Data were analyzed using …


Quantifying Language Changes Surrounding Mental Health On Twitter, Anne Marie Stupinski Jan 2021

Quantifying Language Changes Surrounding Mental Health On Twitter, Anne Marie Stupinski

Graduate College Dissertations and Theses

Mental health challenges are thought to afflict around 10% of the global population each year, with many going untreated due to stigma and limited access to services. Here, we explore trends in words and phrases related to mental health through a collection of 1- , 2-, and 3-grams parsed from a data stream of roughly 10% of all English tweets since 2012. We examine temporal dynamics of mental health language, finding that the popularity of the phrase ‘mental health’ increased by nearly two orders of magnitude between 2012 and 2018. We observe that mentions of ‘mental health’ spike annually and …


Making Sense Of Online Public Health Debates With Visual Analytics Systems, Anton Ninkov Nov 2020

Making Sense Of Online Public Health Debates With Visual Analytics Systems, Anton Ninkov

Electronic Thesis and Dissertation Repository

Online debates occur frequently and on a wide variety of topics. Particularly, online debates about various public health topics (e.g., vaccines, statins, cannabis, dieting plans) are prevalent in today’s society. These debates are important because of the real-world implications they can have on public health. Therefore, it is important for public health stakeholders (i.e., those with a vested interest in public health) and the general public to have the ability to make sense of these debates quickly and effectively. This dissertation investigates ways of enabling sense-making of these debates with the use of visual analytics systems (VASes). VASes are computational …


Multimodal Data Fusion And Attack Detection In Recommender Systems, Mehmet Aktukmak Nov 2020

Multimodal Data Fusion And Attack Detection In Recommender Systems, Mehmet Aktukmak

USF Tampa Graduate Theses and Dissertations

The commercial platforms that use recommender systems can collect relevant information to produce useful recommendations to the platform users. However, these sources usually contain missing values, imbalanced and heterogeneous data, and noisy observations. Such characteristics render the process of exploiting the information nontrivial, as one should carefully address them during the data fusion process. In addition to the degenerative characteristics, some entries can be fake, i.e., they can be the outcomes of malicious intents to manipulate the system. These entries should be eliminated before incorporation to any recommendation task. Detecting such malicious attacks quickly and accurately and then mitigating them …


Digital Identity: A Human-Centered Risk Awareness Study, Toufic N. Chebib Nov 2020

Digital Identity: A Human-Centered Risk Awareness Study, Toufic N. Chebib

USF Tampa Graduate Theses and Dissertations

Cybersecurity threats and compromises have been at the epicenter of media attention; their risk and effect on people’s digital identity is something not to be taken lightly. Though cyber threats have affected a great number of people in all age groups, this study focuses on 55 to 75-year-olds, as this age group is close to retirement or already retired. Therefore, a notable compromise impacting their digital identity can have a major impact on their life.

To help guide this study, the following research question was formulated, “What are the risk perceptions of individuals, between the ages of 55 and 75 …


Bootstrapping Web Archive Collections From Micro-Collections In Social Media, Alexander C. Nwala Aug 2020

Bootstrapping Web Archive Collections From Micro-Collections In Social Media, Alexander C. Nwala

Computer Science Theses & Dissertations

In a Web plagued by disappearing resources, Web archive collections provide a valuable means of preserving Web resources important to the study of past events. These archived collections start with seed URIs (Uniform Resource Identifiers) hand-selected by curators. Curators produce high quality seeds by removing non-relevant URIs and adding URIs from credible and authoritative sources, but this ability comes at a cost: it is time consuming to collect these seeds. The result of this is a shortage of curators, a lack of Web archive collections for various important news events, and a need for an automatic system for generating seeds. …


A Framework For Verifying The Fixity Of Archived Web Resources, Mohamed Aturban Aug 2020

A Framework For Verifying The Fixity Of Archived Web Resources, Mohamed Aturban

Computer Science Theses & Dissertations

The number of public and private web archives has increased, and we implicitly trust content delivered by these archives. Fixity is checked to ensure that an archived resource has remained unaltered (i.e., fixed) since the time it was captured. Currently, end users do not have the ability to easily verify the fixity of content preserved in web archives. For instance, if a web page is archived in 1999 and replayed in 2019, how do we know that it has not been tampered with during those 20 years? In order for the users of web archives to verify that archived web …


User Experience As A Rhetorical Medium: User At The Intersection Of Audience, Reader And Actor, Áine Doyle May 2020

User Experience As A Rhetorical Medium: User At The Intersection Of Audience, Reader And Actor, Áine Doyle

English Honors Theses

The goal of this project is to demonstrate how digital interfaces are bodies of visual language that can be “close-read” and interpreted critically, just like any other traditional text; digital user interfaces, like poetry and novels, have form and content that complement and shape the meaning and interpretation of the other. It is meant to encourage academic discussions about digital interfaces to go beyond whether social media is “good” or “bad” to how digital interfaces are structured, why they are structured the way they are, and what effects these structures have on the way they communicate information and content to …


The Ensemble Mesh-Term Query Expansion Models Using Multiple Lda Topic Models And Ann Classifiers In Health Information Retrieval, Sukjin You May 2020

The Ensemble Mesh-Term Query Expansion Models Using Multiple Lda Topic Models And Ann Classifiers In Health Information Retrieval, Sukjin You

Theses and Dissertations

Information retrieval in the health field has several challenges. Health information terminology is difficult for consumers (laypeople) to understand. Formulating a query with professional terms is not easy for consumers because health-related terms are more familiar to health professionals. If health terms related to a query are automatically added, it would help consumers to find relevant information. The proposed query expansion (QE) models show how to expand a query using MeSH (Medical Subject Headings) terms. The documents were represented by MeSH terms (i.e. Bag-of-MeSH), which were included in the full-text articles. And then the MeSH terms were used to generate …


Complexity And Entanglement In Quantum Gravity, Arjun Kar Jan 2020

Complexity And Entanglement In Quantum Gravity, Arjun Kar

Publicly Accessible Penn Dissertations

We present a collection of recent results concerning quantum information theory applied to quantum gravity. We first study the entanglement structure of Euclidean path integral states in SU(2) Chern-Simons theory, where we elucidate a connection between topological entanglement and quantum mechanical entanglement. We prove that the topology of certain three-manifolds controls the entanglement structure of the resulting quantum state, and conjecture a more general relationship for arbitrary three-manifolds. We then analyze the quantum circuit complexity of the time evolution operator in the Sachdev-Ye-Kitaev model, a theory of near-extremal black hole microstates. We find that this complexity grows linearly for a …


Information Technology Infrastructure Library: Postimplementation Experiences Of Small Business It Support Employees., Imoovberame Darren Obazu Jan 2020

Information Technology Infrastructure Library: Postimplementation Experiences Of Small Business It Support Employees., Imoovberame Darren Obazu

Walden Dissertations and Doctoral Studies

Information technology (IT) employees of small business organizations have been the driving force for the implementation of innovative standardized IT service management and process improvement initiatives. Competitiveness amongst small business IT organizations in the market for quality IT service delivery led small business IT leaders toward the implementation of an information technology infrastructure library (ITIL) as an IT service management framework. The problem addressed in this research encompassed the needs of small business IT leaders and ITIL designers to understand the perceptions of IT operation employees following ITIL implementation. The purpose of this qualitative multiple case study was to explore …