Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

4,511 Full-Text Articles 4,963 Authors 1,167,439 Downloads 161 Institutions

All Articles in Databases and Information Systems

Faceted Search

4,511 full-text articles. Page 1 of 161.

A Strategic Value Appropriation Path For Cloud Computing, Abhishek KATHURIA, Arti MANN, Jiban KHUNTIA, Robert J. KAUFFMAN 2019 University of Hong Kong

A Strategic Value Appropriation Path For Cloud Computing, Abhishek Kathuria, Arti Mann, Jiban Khuntia, Robert J. Kauffman

Arti Mann

Cloud-based information management is one of the leading competitive differentiation strategies for firms. With the increasing criticality of information management in value creation and process support, establishing an integrated capability with cloud computing is vital for organizational success in the changing landscape of business competition. These issues have received scant attention, however. We draw on the resource-based view, dynamic capability hierarchy concepts, and the perspective of operand and operant resources to suggest a cloud value appropriation model for firms. We argue that, to appropriate business value from cloud computing, the firm needs to effectively deploy cloud computing and leverage cloud ...


Amazon Alexa + Linked Open Data: Theorizing Concerning Relationships Between (Surveillant) Smart-Home Voice Assistants And Linked Open Data, Michelle Nitto 2019 CUNY Central

Amazon Alexa + Linked Open Data: Theorizing Concerning Relationships Between (Surveillant) Smart-Home Voice Assistants And Linked Open Data, Michelle Nitto

Publications and Research

No abstract provided.


Creating, Modeling, And Visualizing Metabolic Networks, Julie A. Dickerson, Daniel Berleant, Pan Du, Jing Ding, Carol M. Foster, Ling Li, Eve Syrkin Wurtele 2019 Iowa State University

Creating, Modeling, And Visualizing Metabolic Networks, Julie A. Dickerson, Daniel Berleant, Pan Du, Jing Ding, Carol M. Foster, Ling Li, Eve Syrkin Wurtele

Ling Li

Metabolic networks combine metabolism and regulation. These complex networks are difficult to understand and create due to the diverse types of information that need to be represented. This chapter describes a suite of interlinked tools for developing, displaying, and modeling metabolic networks. The metabolic network interactions database, MetNetDB, contains information on regulatory and metabolic interactions derived from a combination of web databases and input from biologists in their area of expertise. PathBinderA mines the biological “literaturome” by searching for new interactions or supporting evidence for existing interactions in metabolic networks. Sentences from abstracts are ranked in terms of the likelihood ...


Seasonal Warranty Prediction Based On Recurrent Event Data, Qianqian Shan, Yili Hong, William Q. Meeker Jr. 2019 Iowa State University

Seasonal Warranty Prediction Based On Recurrent Event Data, Qianqian Shan, Yili Hong, William Q. Meeker Jr.

William Q Meeker

Warranty return data from repairable systems, such as vehicles, usually result in recurrent event data. The non-homogeneous Poisson process (NHPP) model is used widely to describe such data. Seasonality in the repair frequencies and other variabilities, however, complicate the modeling of recurrent event data. Not much work has been done to address the seasonality, and this paper provides a general approach for the application of NHPP models with dynamic covariates to predict seasonal warranty returns. A hierarchical clustering method is used to stratify the population into groups that are more homogeneous than the than the overall population. The stratification facilitates ...


Social Inclusion In The Digital Era: Rethinking Debates And Narratives In The World Bank Report., Calisto Kondowe, Wallace Chigona 2019 University of Cape Town

Social Inclusion In The Digital Era: Rethinking Debates And Narratives In The World Bank Report., Calisto Kondowe, Wallace Chigona

African Conference on Information Systems and Technology

The 2019 (5th) proceedings of ACIST focuses on how African societies are leveraging and can leverage the smart capabilities in digital technologies to address organizational and societal challenges. Technology-enabled solutions offer solutions to many of these challenges. Digital technologies are increasingly becoming integral to and interdependent with the African society.


Factors Influencing Customers’ Attitude For Using M-Birr Adoption In Ethiopia, Gebremedhin Gebreyohans, Abduraheman Ali 2019 Addis Ababa University

Factors Influencing Customers’ Attitude For Using M-Birr Adoption In Ethiopia, Gebremedhin Gebreyohans, Abduraheman Ali

African Conference on Information Systems and Technology

Diffusion of Innovations (DOI) is a theory to explain how and over time new philosophies and then technology diffuse into different contexts. This research tested the attributes of DOI and other variables empirically,usingM-Birr system as the goal of the innovation. The research was conducted among customers of M-Birr service in Addis Ababa, Ethiopia. The data collection instrument was a closed-ended questionnaire administered to 360 respondents of which 211 were returned giving 58.6% return rate. The demographic make-up of the respondents showed that most of them were between the age of 30 to 50 and degree holders. From the ...


An Electronic Framework To Shepherd The Pastoral Livestock (Resolve Conflicts In Pastoral Communities), Frezewd Lemma, Anteneh Alemu, Desta Zerihun, Endale Aregu 2019 Adama Science and Technology University

An Electronic Framework To Shepherd The Pastoral Livestock (Resolve Conflicts In Pastoral Communities), Frezewd Lemma, Anteneh Alemu, Desta Zerihun, Endale Aregu

African Conference on Information Systems and Technology

This paper proposes a tracking framework based on GPS enabled location sensors, the GSM/WCDMA wireless network, and algorithms running in an edge clouds to resolve deadly conflicts that arise in the Africans pastorals community. The paper also proposes an automatic digital identification mechanism that helps resolve conflicts during animals mixup. This algorithmic based solution would totally relief the community from using the traditional identification mechanisms such as hot branding which are known to be cruel to animals. To communicate with the pastorals, the framework takes into consideration the low level literacy of the community as well as their use ...


The Effect Of Conversational Agent Skill On User Behavior During Deception, Ryan M. Schuetzler, G. Mark Grimes, Justin Scott Giboney 2019 University of Nebraska at Omaha

The Effect Of Conversational Agent Skill On User Behavior During Deception, Ryan M. Schuetzler, G. Mark Grimes, Justin Scott Giboney

Information Systems and Quantitative Analysis Faculty Publications

Conversational agents (CAs) are an integral component of many personal and business interactions. Many recent advancements in CA technology have attempted to make these interactions more natural and human-like. However, it is currently unclear how human-like traits in a CA impact the way users respond to questions from the CA. In some applications where CAs may be used, detecting deception is important. Design elements that make CA interactions more human-like may induce undesired strategic behaviors from human deceivers to mask their deception. To better understand this interaction, this research investigates the effect of conversational skill—that is, the ability of ...


Creating Top Ranking Options In The Continuous Option And Preference Space, Bo TANG, Kyriakos MOURATIDIS, Man Lung YIU, Zhenyu CHEN 2019 Southern University of Science and Technology

Creating Top Ranking Options In The Continuous Option And Preference Space, Bo Tang, Kyriakos Mouratidis, Man Lung Yiu, Zhenyu Chen

Research Collection School Of Information Systems

Top-k queries are extensively used to retrieve the k most relevantoptions (e.g., products, services, accommodation alternatives, etc)based on a weighted scoring function that captures user preferences. In this paper, we take the viewpoint of a business owner whoplans to introduce a new option to the market, with a certain type ofclientele in mind. Given a target region in the consumer spectrum,we determine what attribute values the new option should have,so that it ranks among the top-k for any user in that region. Ourmethodology can also be used to improve an existing option, at theminimum modification cost ...


Adversarial Learning On Heterogeneous Information Networks, Binbin HU, Yuan FANG, Chuan SHI 2019 Singapore Management University

Adversarial Learning On Heterogeneous Information Networks, Binbin Hu, Yuan Fang, Chuan Shi

Research Collection School Of Information Systems

Network embedding, which aims to represent network data in alow-dimensional space, has been commonly adopted for analyzingheterogeneous information networks (HIN). Although exiting HINembedding methods have achieved performance improvement tosome extent, they still face a few major weaknesses. Most importantly, they usually adopt negative sampling to randomly selectnodes from the network, and they do not learn the underlying distribution for more robust embedding. Inspired by generative adversarial networks (GAN), we develop a novel framework HeGAN forHIN embedding, which trains both a discriminator and a generatorin a minimax game. Compared to existing HIN embedding methods,our generator would learn the node distribution ...


Automated Knowledge Extraction From Archival Documents, Khalil Malki 2019 Atlanta University Center

Automated Knowledge Extraction From Archival Documents, Khalil Malki

Electronic Theses & Dissertations Collection for Atlanta University & Clark Atlanta University

Traditional archival media such as paper, film, photographs, etc. contain a vast storage of knowledge. Much of this knowledge is applicable to current business and scientific problems, and offers solutions; consequently, there is value in extracting this information. While it is possible to manually extract the content, this technique is not feasible for large knowledge repositories due to cost and time. In this thesis, we develop a system that can extract such knowledge automatically from large repositories. A Graphical User Interface that permits users to indicate the location of the knowledge components (indexes) is developed, and software features that permit ...


The Rise Of Citizen Science In Health And Biomedical Research, Andrea Wiggins, John Wilbanks 2019 University of Nebraska at Omaha

The Rise Of Citizen Science In Health And Biomedical Research, Andrea Wiggins, John Wilbanks

Information Systems and Quantitative Analysis Faculty Publications

Citizen science models of public participation in scientific research represent a growing area of opportunity for health and biomedical research, as well as new impetus for more collaborative forms of engagement in large-scale research. However, this also surfaces a variety of ethical issues that both fall outside of and build upon the standard human subjects concerns in bioethics. This article provides background on citizen science, examples of current projects in the field, and discussion of established and emerging ethical issues for citizen science in health and biomedical research.


Inferring Behavioral Specifications From Large-Scale Repositories By Leveraging Collective Intelligence, Hridesh Rajan, Tien N. Nguyen, Gary T. Leavens, Robert Dyer 2019 Iowa State University

Inferring Behavioral Specifications From Large-Scale Repositories By Leveraging Collective Intelligence, Hridesh Rajan, Tien N. Nguyen, Gary T. Leavens, Robert Dyer

Hridesh Rajan

Despite their proven benefits, useful, comprehensible, and efficiently checkable specifications are not widely available. This is primarily because writing useful, non-trivial specifications from scratch is too hard, time consuming, and requires expertise that is not broadly available. Furthermore, the lack of specifications for widely-used libraries and frameworks, caused by the high cost of writing specifications, tends to have a snowball effect. Core libraries lack specifications, which makes specifying applications that use them expensive. To contain the skyrocketing development and maintenance costs of high assurance systems, this self-perpetuating cycle must be broken. The labor cost of specifying programs can be significantly ...


Declarative Visitors To Ease Fine-Grained Source Code Mining With Full History On Billions Of Ast Nodes, Robert Dyer, Tien N. Nguyen, Hridesh Rajan 2019 Iowa State University

Declarative Visitors To Ease Fine-Grained Source Code Mining With Full History On Billions Of Ast Nodes, Robert Dyer, Tien N. Nguyen, Hridesh Rajan

Hridesh Rajan

Software repositories contain a vast wealth of information about software development. Mining these repositories has proven useful for detecting patterns in software development, testing hypotheses for new software engineering approaches, etc. Specifically, mining source code has yielded significant insights into software development artifacts and processes. Unfortunately, mining source code at a large-scale remains a difficult task. Previous approaches had to either limit the scope of the projects studied, limit the scope of the mining task to be more coarse-grained, or sacrifice studying the history of the code due to both human and computational scalability issues. In this paper we address ...


An Architecture For Blockchain-Based Collaborative Signature-Based Intrusion Detection System, Daniel Laufenberg 2019 Kennesaw State University

An Architecture For Blockchain-Based Collaborative Signature-Based Intrusion Detection System, Daniel Laufenberg

Master of Science in Information Technology Theses

Collaborative intrusion detection system (CIDS), where IDS hosts work with each other and share resources, have been proposed to cope with the increasingly sophisticated cyberattacks. Despite the promising benefits such as expanded signature databases and alert data from multiple sites, trust management and consensus building remain as challenges for a CIDS to work effectively. The blockchain technology with built-in immutability and consensus building capability provides a viable solution to the issues of CIDS. In this paper, we introduce an architecture for a blockchain-enabled signature-based collaborative IDS, discuss the implementation strategy of the proposed architecture and developed a prototype using Hyperledger ...


Social Media Text Mining Framework For Drug Abuse: An Opioid Crisis Case Analysis, Tareq Nasralah 2019 Dakota State University

Social Media Text Mining Framework For Drug Abuse: An Opioid Crisis Case Analysis, Tareq Nasralah

Masters Theses & Doctoral Dissertations

Social media is considered as a promising and viable source of data for gaining insights into various disease conditions, patients’ attitudes and behaviors, and medications. The daily use of social media provides new opportunities for analyzing several aspects of communication. Social media as a big data source can be used to recognize communication and behavioral themes of problematic use of prescription drugs. Mining and analyzing such media have challenges and limitations with respect to topic deduction and data quality. There is a need for a structured approach to efficiently and effectively analyze social media content related to drug abuse in ...


One-Class Order Embedding For Dependency Relation Prediction, Meng-Fen CHIANG, Ee-peng LIM, Wang-Chien LEE, Xavier Jayaraj Siddarth ASHOK, Philips Kokoh PRASETYO 2019 Singapore Management University

One-Class Order Embedding For Dependency Relation Prediction, Meng-Fen Chiang, Ee-Peng Lim, Wang-Chien Lee, Xavier Jayaraj Siddarth Ashok, Philips Kokoh Prasetyo

Research Collection School Of Information Systems

Learning the dependency relations among entities and the hierarchy formed by these relations by mapping entities into some order embedding space can effectively enable several important applications, including knowledge base completion and prerequisite relations prediction. Nevertheless, it is very challenging to learn a good order embedding due to the existence of partial ordering and missing relations in the observed data. Moreover, most application scenarios do not provide non-trivial negative dependency relation instances. We therefore propose a framework that performs dependency relation prediction by exploring both rich semantic and hierarchical structure information in the data. In particular, we propose several negative ...


Securing Messaging Services Through Efficient Signcryption With Designated Equality Test, Yujue WANG, Hwee Hwa PANG, Robert H. DENG, Yong DING, Qianhong WU, Bo QIN 2019 Guilin University of Electronic Technology

Securing Messaging Services Through Efficient Signcryption With Designated Equality Test, Yujue Wang, Hwee Hwa Pang, Robert H. Deng, Yong Ding, Qianhong Wu, Bo Qin

Research Collection School Of Information Systems

To address security and privacy issues in messaging services, we present a public key signcryption scheme with designated equality test on ciphertexts (PKS-DET) in this paper. The scheme enables a sender to simultaneously encrypt and sign (signcrypt) messages, and to designate a tester to perform equality test on ciphertexts, i.e., to determine whether two ciphertexts signcrypt the same underlying plaintext message. We introduce the PKS-DET framework, present a concrete construction and formally prove its security against three types of adversaries, representing two security requirements on message confidentiality against outsiders and the designated tester, respectively, and a requirement on message ...


A Hidden Markov Model For Matching Spatial Networks, Benoit Costes, Julien Perret 2019 The University of Maine

A Hidden Markov Model For Matching Spatial Networks, Benoit Costes, Julien Perret

Journal of Spatial Information Science

Datasets of the same geographic space at different scales and temporalities are increasingly abundant, paving the way for new scientific research. These datasets require data integration, which implies linking homologous entities in a process called data matching that remains a challenging task, despite a quite substantial literature, because of data imperfections and heterogeneities. In this paper, we present an approach for matching spatial networks based on a hidden Markov model (HMM) that takes full benefit of the underlying topology of networks. The approach is assessed using four heterogeneous datasets (streets, roads, railway, and hydrographic networks), showing that the HMM algorithm ...


Evaluating Existing Manually Constructed Natural Landscape Classification With A Machine Learning-Based Approach, Rok Ciglic, Erik Strumbelj, Rok Cesnovar, Mauro Hrvatin, Drago Perko 2019 University of Ljubljana

Evaluating Existing Manually Constructed Natural Landscape Classification With A Machine Learning-Based Approach, Rok Ciglic, Erik Strumbelj, Rok Cesnovar, Mauro Hrvatin, Drago Perko

Journal of Spatial Information Science

Some landscape classifications officially determine financial obligations; thus, they must be objective and precise. We presume it is possible to quantitatively evaluate existing manually constructed classifications and correct them if necessary. One option for achieving this goal is a machine learning method. With (re)modeling of the landscape classification and an explanation of its structure, we can add quantitative proof to its original (qualitative) description. The main objectives of the paper are to evaluate the consistency of the existing manually constructed natural landscape classification with a machine learning-based approach and to test the newly developed general black-box explanation method in ...


Digital Commons powered by bepress