Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Library and Information Science

Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi Dec 2016

Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi

UNLV Theses, Dissertations, Professional Papers, and Capstones

Securing IoT (Internet of Things) systems in general, regardless of the communication technology used, has been the concern of many researchers and private companies. As for ZigBee security concerns, much research and many experiments have been conducted to better predict the nature of potential security threats. In this research we are addressing several ZigBee vulnerabilities by performing first hand experiments and attack simulations on ZigBee protocol. This will allow us to better understand the security issues surveyed and find ways to mitigate them. Based on the attack simulations performed and the survey conducted, we have developed a ZigBee IoT framework …


Computational Environment For Modeling And Analysing Network Traffic Behaviour Using The Divide And Recombine Framework, Ashrith Barthur Dec 2016

Computational Environment For Modeling And Analysing Network Traffic Behaviour Using The Divide And Recombine Framework, Ashrith Barthur

Open Access Dissertations

There are two essential goals of this research. The first goal is to design and construct a computational environment that is used for studying large and complex datasets in the cybersecurity domain. The second goal is to analyse the Spamhaus blacklist query dataset which includes uncovering the properties of blacklisted hosts and understanding the nature of blacklisted hosts over time.

The analytical environment enables deep analysis of very large and complex datasets by exploiting the divide and recombine framework. The capability to analyse data in depth enables one to go beyond just summary statistics in research. This deep analysis is …


Using Web Archives To Enrich The Live Web Experience Through Storytelling, Yasmin Alnoamany Jul 2016

Using Web Archives To Enrich The Live Web Experience Through Storytelling, Yasmin Alnoamany

Computer Science Theses & Dissertations

Much of our cultural discourse occurs primarily on the Web. Thus, Web preservation is a fundamental precondition for multiple disciplines. Archiving Web pages into themed collections is a method for ensuring these resources are available for posterity. Services such as Archive-It exists to allow institutions to develop, curate, and preserve collections of Web resources. Understanding the contents and boundaries of these archived collections is a challenge for most people, resulting in the paradox of the larger the collection, the harder it is to understand. Meanwhile, as the sheer volume of data grows on the Web, "storytelling" is becoming a popular …


Scripts In A Frame: A Framework For Archiving Deferred Representations, Justin F. Brunelle Apr 2016

Scripts In A Frame: A Framework For Archiving Deferred Representations, Justin F. Brunelle

Computer Science Theses & Dissertations

Web archives provide a view of the Web as seen by Web crawlers. Because of rapid advancements and adoption of client-side technologies like JavaScript and Ajax, coupled with the inability of crawlers to execute these technologies effectively, Web resources become harder to archive as they become more interactive. At Web scale, we cannot capture client-side representations using the current state-of-the art toolsets because of the migration from Web pages to Web applications. Web applications increasingly rely on JavaScript and other client-side programming languages to load embedded resources and change client-side state. We demonstrate that Web crawlers and other automatic archival …


Novel Machine Learning Methods For Modeling Time-To-Event Data, Bhanukiran Vinzamuri Jan 2016

Novel Machine Learning Methods For Modeling Time-To-Event Data, Bhanukiran Vinzamuri

Wayne State University Dissertations

Predicting time-to-event from longitudinal data where different events occur at different time points is an extremely important problem in several domains such as healthcare, economics, social networks and seismology, to name a few. A unique challenge in this problem involves building predictive models from right censored data (also called as survival data). This is a phenomenon where instances whose event of interest are not yet observed within a given observation time window and are considered to be right censored. Effective models for predicting time-to-event labels from such right censored data with good accuracy can have a significant impact in these …


Exploring Leader-Initiated Change Management For Adopting Cloud Services, Nancy Marie Landreville Jan 2016

Exploring Leader-Initiated Change Management For Adopting Cloud Services, Nancy Marie Landreville

Walden Dissertations and Doctoral Studies

Cloud technology requires a virtualized ubiquitous and scalable environment with shared resources. The general problem in cloud adoption is the absence of standardization across organizations. A standardized approach remained elusive since the inception of the Cloud First mandate. The purpose of this study was to explore leader-initiated change management (LICM) practices in cloud adoption within organizations. The theoretical framework included the classical theories of Kurt Lewin's organization change management, leader-member exchange, intentional change, and appreciative inquiry. A multiple case study design approach facilitated the exploration of LICM-value added practices to identify standardization in cloud adoption practices. Data collection included semistructured …


Adoption Of Electronic Health Record Systems Within Primary Care Practices, Marvin Leon Reid, Jr. Jan 2016

Adoption Of Electronic Health Record Systems Within Primary Care Practices, Marvin Leon Reid, Jr.

Walden Dissertations and Doctoral Studies

Primary care physicians (PCPPs) have been slow to implement electronic health records (EHRs), even though there is a U.S. federal requirement to implement EHRs. The purpose of this phenomenological study was to determine why PCPPs have been slow to adopt electronic health record (EHR) systems despite the potential to increase efficiency and quality of health care. The complex adaptive systems theory (CAS) served as the conceptual framework for this study. Twenty-six PCPPs were interviewed from primary care practices (PCPs) based in southwestern Ohio. The data were collected through a semistructured interview format and analyzed using a modified van Kaam method. …


The Impact Of Technology Acceptance And Openess To Innovaion On Software Implementation, Michael Marin Bertini Jan 2016

The Impact Of Technology Acceptance And Openess To Innovaion On Software Implementation, Michael Marin Bertini

Walden Dissertations and Doctoral Studies

Senior management decisions to foster innovation and adopt new technology solutions have serious implications for the success of their organization change initiatives. This project examined the issue of senior management decision or reasons of their decision to adopt new Enterprise Resource Planning (ERP) systems as a solution to solve their business problems. This project investigated the degree that perceived ease of use and usefulness of the ERP system influenced decisions made by senior managers to innovate. Roger's diffusion of innovations theory and Davis technology acceptance model theory were used to predict when senior managers were open to innovation, and whether …


Social Influence And Organizational Innovation Characteristics On Enterprise Social Computing Adoption, Vincent Di Palermo Jan 2016

Social Influence And Organizational Innovation Characteristics On Enterprise Social Computing Adoption, Vincent Di Palermo

Walden Dissertations and Doctoral Studies

Ample research has been conducted to identify the determinants of information technology (IT) adoption. No previous quantitative researchers have explored IT adoption in the context of enterprise social computing (ESC). The purpose of this study was to test and extend the social influence model of IT adoption. In addition, this study addressed a gap in the research literature and presented a model that relates the independent variables of social action, social consensus, social authority, social cooperation, perceived relative advantage, perceived compatibility, perceived ease of use, perceived usefulness, and organizational commitment to the dependent variables of social embracement and embedment. A …


Innovation Difussion Of Smartphone In Nigeria, Olukunle Ariyo Iyanda Jan 2016

Innovation Difussion Of Smartphone In Nigeria, Olukunle Ariyo Iyanda

Walden Dissertations and Doctoral Studies

Rapid diffusion and use of smartphones in Africa are challenging, given the state of its infrastructural facilities. The problem addressed was a lack of information on the adoption behavior and the sociodevelopmental effect of smartphone acceptance among rural and urban users in Nigeria. The purpose of this study was to examine the adoption behavior and the sociodevelopmental effect of smartphone acceptance among rural and urban residents. Research questions examined the relationship of performance expectancy, social influence, price value, and habit on adopters' intentions to use smartphones, continued use of smartphones, and the sociodevelopmental effect on smartphone users lives and standard …