Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Theses/Dissertations

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 656

Full-Text Articles in Business

How Increased Ransomware Attacks Have Impacted Hospitals In The United States, Mackenzie Dotson Jan 2024

How Increased Ransomware Attacks Have Impacted Hospitals In The United States, Mackenzie Dotson

Theses, Dissertations and Capstones

Introduction: The healthcare industry, particularly hospitals, have fallen prey to the alarming rise of ransomware attacks. In recent years, highly sophisticated cybergroups, armed with substantial funds and advanced technology, have intensified their focus on hospitals. Despite the advice against it, most hospitals have paid the ransom in order to regain access to their electronic systems and patient data, underlining the severity of these attacks.

Purpose of the Study: The purpose of this research was to evaluate the effects of ransomware attacks on hospitals in the US to determine if the patients were at risk due to hackers withholding patient information …


The Measure Of Efficiency And Effectiveness When Using Artificial Intelligence (Ai) In Radiology, Jordan Watts Jan 2024

The Measure Of Efficiency And Effectiveness When Using Artificial Intelligence (Ai) In Radiology, Jordan Watts

Theses, Dissertations and Capstones

Introduction: The use of artificial intelligence in radiology has helped radiologists identify patterns and abnormalities in medical images to diagnose and treat patients. Deep learning and machine learning algorithms have been used to assist physicians in detecting features that are not noticeable to the human eye. The FDA has approved almost 400 AI algorithms for radiology and estimated that the market for AI in medical imaging would grow from $21.48 billion in 2018 to $264.85 billion in 2028.

Purpose of the Study: The purpose of this research was to evaluate the use of artificial intelligence in radiology to determine its …


Assessing Performance Optimization Strategies In Cloud-Native Environments Through Containerization And Orchestration Analysis, Daniel E. Ukene Jan 2024

Assessing Performance Optimization Strategies In Cloud-Native Environments Through Containerization And Orchestration Analysis, Daniel E. Ukene

Electronic Theses and Dissertations

This thesis comprises three distinct, yet interconnected studies addressing critical aspects of web infrastructure management. We begin by studying containerization via Docker and its impact on web server performance, focusing on Apache and Nginx hosted on virtualized environments. Through meticulous load testing and analysis, we provide insights into the comparative performance of these servers, adding users of this technology know which webservers to leverage when hosting their webservice along alongside the infrastructure to host it on. Next, we expand our focus to examine the performance of caching systems, namely Redis and Memcached, across traditional VMs and Docker containers. By comparing …


Towards Algorithmic Justice: Human Centered Approaches To Artificial Intelligence Design To Support Fairness And Mitigate Bias In The Financial Services Sector, Jihyun Kim Jan 2024

Towards Algorithmic Justice: Human Centered Approaches To Artificial Intelligence Design To Support Fairness And Mitigate Bias In The Financial Services Sector, Jihyun Kim

CMC Senior Theses

Artificial Intelligence (AI) has positively transformed the Financial services sector but also introduced AI biases against protected groups, amplifying existing prejudices against marginalized communities. The financial decisions made by biased algorithms could cause life-changing ramifications in applications such as lending and credit scoring. Human Centered AI (HCAI) is an emerging concept where AI systems seek to augment, not replace human abilities while preserving human control to ensure transparency, equity and privacy. The evolving field of HCAI shares a common ground with and can be enhanced by the Human Centered Design principles in that they both put humans, the user, at …


Clueless: Revolutionizing Sustainable Fashion And Combating Overconsumption, Tanya Ravichandran Dec 2023

Clueless: Revolutionizing Sustainable Fashion And Combating Overconsumption, Tanya Ravichandran

Graphic Communication

“Clueless” revolutionizes sustainable fashion by combating wardrobe overconsumption and the industry’s carbon footprint, using AI to suggest personalized outfits from existing wardrobes tailored to weather and wear history. It enhances user engagement through features like outfit ‘shuffle’ and provides insights into wardrobe utilization and carbon impact.

It’s more than an app; it’s a step towards a greener wardrobe and a healthier planet.


All Quiet On The Digital Front: The Unseen Psychological Impacts On Cybersecurity First Responders, Tammie R. Hollis Nov 2023

All Quiet On The Digital Front: The Unseen Psychological Impacts On Cybersecurity First Responders, Tammie R. Hollis

USF Tampa Graduate Theses and Dissertations

Driven by the increasing frequency of cyberattacks and the existing talent gap between industry needs and skilled professionals, this research study focused on the crucial human element in the domain of cybersecurity incident response. The objective of this dissertation was to offer a meaningful exploration of the lived experiences encountered by cybersecurity incident responders and an assessment of the subsequent impacts on their well-being. Additionally, this study sought to draw comparisons between the experiences of cybersecurity incident responders and their counterparts in traditional emergency response roles. Semi-structured interviews were conducted with a cohort of 22 individuals with first-hand experience working …


Human Vs Machine: Hyper-Realistic Avatars And Their Efficacy As A Communication Channel, Jill S. Schiefelbein Nov 2023

Human Vs Machine: Hyper-Realistic Avatars And Their Efficacy As A Communication Channel, Jill S. Schiefelbein

USF Tampa Graduate Theses and Dissertations

Hyper-realistic avatars (HRAs), a form of synthetic media, are custom-created digital embodiments of a human, created by capturing and combining that person’s video and vocal likeness. This is the first known study of the efficacy of videos delivered by hyper-realistic avatars as a communication channel in comparison to videos delivered by their human counterparts. An experiment testing how information retention, engagement, and trust vary between viewers of videos delivered by a real human, videos delivered by the HRA representing that same human, and videos delivered by the HRA that discloses to viewers that it is a hyper-realistic avatar is presented. …


Predictive Ai For The S&P 500 Index, Jacqueline Rose Perry Aug 2023

Predictive Ai For The S&P 500 Index, Jacqueline Rose Perry

Computer Science Senior Theses

Artificial intelligence has powerful applications in virtually every field, and the financial world is no exception. Utilizing various elements of artificial intelligence, this research aims to predict the future value of the S&P 500 index using numerous models, and in doing so, identify relevant features. More specifically, models that include combinations of historical data, public sentiment, and technical indicators were employed to predict the stock price one day and three days forward. To account for public opinion, the sentiment of tweets and news headlines from the beginning of 2015 through the end of 2019 was calculated using FinBERT, a pre-trained …


Using Machine Learning Techniques To Model Encoder/Decoder Pair For Non-Invasive Electroencephalographic Wireless Signal Transmission, Ernst Fanfan Jul 2023

Using Machine Learning Techniques To Model Encoder/Decoder Pair For Non-Invasive Electroencephalographic Wireless Signal Transmission, Ernst Fanfan

Master of Science in Computer Science Theses

This study investigated the application and enhancement of Non-Invasive Brain-Computer Interfaces (NI-BCIs), focused on enhancing the efficiency and effectiveness of this technology for individuals with severe physical limitations. The core research goal was to improve current limitations associated with wires, noise, and invasive procedures often associated with BCI technology. The key discussed solution involves developing an optimized Encoder/Decoder (E/D) pair using machine learning techniques, particularly those borrowed from Generative Adversarial Networks (GAN) and other Deep Neural Networks, to minimize data transmission and ensure robustness against data degradation. The study highlighted the crucial role of machine learning in self-adjusting and isolating …


The Power Of (Virtual) Convergence: The Unrealized Potential Of Pair Programming And Remote Work, Mikayla Maki Jun 2023

The Power Of (Virtual) Convergence: The Unrealized Potential Of Pair Programming And Remote Work, Mikayla Maki

University Honors Theses

Remote work is expensive. It can lead to isolation, miscommunications, and ossified organizations. These problems occur because of a synchronicity mismatch between how we need to communicate as humans, and what today's tools are capable of. This mismatch can be solved by the adoption of remote pair programming, as exemplified by the authors work at a startup (Zed). Pair programming provides the organic, synchronous, reciprocal interaction necessary to develop the sorts of relationships that remote firms currently lack.


Interstice, Shravan Rao Jun 2023

Interstice, Shravan Rao

Masters Theses

When I was about three years old, I distinctly remember being too small to see what was on top of the table. A couple of years later, when I could see those objects, I thought the world around me had grown smaller. In a way, it did, as I experienced, lived, captured, remembered, and shared the space repeatedly. This sense of the world shrinking was exaggerated during the Covid-19 pandemic, allowing new behaviours and modes of interaction to emerge. Continually shaping our modern lives, virtual technologies redefine how we access and share information and stories or even explore new places. …


An Analysis And Examination Of Consensus Attacks In Blockchain Networks, Thomas R. Clark May 2023

An Analysis And Examination Of Consensus Attacks In Blockchain Networks, Thomas R. Clark

Senior Honors Projects, 2020-current

This paper examines consensus attacks as they relate to blockchain networks. Consensus attacks are a significant threat to the security and integrity of blockchain networks, and understanding these attacks is crucial for developers and stakeholders. The primary contribution of the paper is to present blockchain and consensus attacks in a clear and accessible manner, with the aim of making these complex concepts easily understandable for a general audience. Using literature review, the paper identifies various methods to prevent consensus attacks, including multi-chain networks, proof-of-work consensus algorithms, and network auditing and monitoring. An analysis revealed that these methods for preventing consensus …


Rattus Norvegicus As A Biological Detector Of Clandestine Remains And The Use Of Ultrasonic Vocalizations As A Locating Mechanism, Gabrielle M. Johnston May 2023

Rattus Norvegicus As A Biological Detector Of Clandestine Remains And The Use Of Ultrasonic Vocalizations As A Locating Mechanism, Gabrielle M. Johnston

Master's Theses

In investigations, locating missing persons and clandestine remains are imperative. One way that first responder and police agencies can search for the remains is by using cadaver dogs as biological detectors. Cadaver dogs are typically used due to their olfactory sensitivity and ability to detect low concentrations of volatile organic compounds produced by biological remains. Cadaver dogs are typically chosen for their stamina, agility, and olfactory sensitivity. However, what is not taken into account often is the size of the animal and the expense of maintaining and training the animal. Cadaver dogs are typically large breeds that cannot fit in …


Trace Dna Detection Using Diamond Dye: A Recovery Technique To Yield More Dna, Leah Davis May 2023

Trace Dna Detection Using Diamond Dye: A Recovery Technique To Yield More Dna, Leah Davis

Master's Theses

This study aspires to find a new screening approach to trace DNA recovery techniques to yield a higher quantity of trace DNA from larger items of evidence. It takes the path of visualizing trace DNA on items of evidence with potential DNA so analysts can swab a more localized area rather than attempting to recover trace DNA through the general swabbing technique currently used for trace DNA recovery. The first and second parts consisted of observing trace DNA interaction with Diamond Dye on porous and non-porous surfaces.

The third part involved applying the Diamond Dye solution by spraying it onto …


Consumer Reaction To The Use Of Artificial Intelligence Chatbot On Distribution Of General Insurance In Singapore, Lai Hing Tan May 2023

Consumer Reaction To The Use Of Artificial Intelligence Chatbot On Distribution Of General Insurance In Singapore, Lai Hing Tan

Dissertations and Theses Collection (Open Access)

As technology rapidly permeates all aspects of our lives, it is not unusual to question and even challenge the rationale on why certain industries are slower to adapt to the new digital age. Insurance is a business that is under scrutiny given its traditional ways of selling and legacy challenges. Why is technology investment in insurance companies lagging others? One emerging technological disruption is artificial intelligence (AI). It is the science of designing and building intelligent systems that can complete tasks traditionally performed by humans. AI is expected to fundamentally transform today’s marketplace, for businesses and consumers alike. However, because …


A Study Of The Impact Of Data Intelligence On Software Delivery Performance, Yongdong Dong Mar 2023

A Study Of The Impact Of Data Intelligence On Software Delivery Performance, Yongdong Dong

Dissertations and Theses Collection (Open Access)

With the rise of big data and artificial intelligence, data intelligence has gradually become the focus of academia and industry. Data intelligence has two obvious characteristics: big data drive and application scene drive. More and more enterprises extract valuable patterns contained in data with prediction and decision analysis methods and technologies such as large-scale data mining, machine learning and deep learning and use them to improve the management and decision in complex practice, so as to promote changes of new business modes, organizational structures and even business strategies, and improve the operational efficiency of organizations. However, there are few studies …


Finding Forensic Evidence In The Operating System's Graphical User Interface, Edward X. Wilson Mr. Jan 2023

Finding Forensic Evidence In The Operating System's Graphical User Interface, Edward X. Wilson Mr.

LSU Master's Theses

A branch of cyber security known as memory forensics focuses on extracting meaningful evidence from system memory. This analysis is often referred to as volatile memory analysis, and is generally performed on memory captures acquired from target systems. Inside of a memory capture is the complete state of a system under investigation, including the contents of currently running as well as previously executed applications. Analysis of this data can reveal a significant amount of activity that occurred on a system since the last reboot. For this research, the Windows operating system is targeted. In particular, the graphical user interface component …


Digital Nudges: An Investigation Of Both Consumer And Designer Perspectives, Ja-Naé Duane Jan 2023

Digital Nudges: An Investigation Of Both Consumer And Designer Perspectives, Ja-Naé Duane

2023

This dissertation explores how knowledge of digital nudges impacts consumer decisions, and how consumer preferences based on that knowledge impacts design decisions. Paper 1 presents a systematic narrative literature review on the evolution of digital nudge literature. This investigation uncovers several themes and provides a basis for a revised definition of digital nudges and a taxonomy wheel of digital nudges. Paper 2 (co-authored with Jeffrey Livingston, Jonathan Ericson, and Patrick McHugh) investigates how knowledge about digital nudges impacts consumer preferences to have them within the digital experiences they use. This paper highlights how knowledge of digital nudges impact consumer online …


Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo Jan 2023

Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo

Walden Dissertations and Doctoral Studies

Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …


Relationship Between Strategic Dexterity, Absorptive Capacity, And Competitive Advantage, Ifechide Monyei Jan 2023

Relationship Between Strategic Dexterity, Absorptive Capacity, And Competitive Advantage, Ifechide Monyei

Walden Dissertations and Doctoral Studies

Small- and medium-sized enterprise (SME) manufacturing executives and managers are concerned with the rapid technological changes involving artificial intelligence (AI), machine learning, and big data. To compete in the global landscape, effectively managing digital and artificial intelligence changes among SME manufacturing executives and managers is critical for leaders to compete in 2023 and beyond. Grounded in the dynamic capabilities view theory, the purpose of this quantitative correlation study was to examine the relationship between strategic dexterity, absorptive capacity, and competitive advantage. The participants were 66 executives and managers of SME manufacturing organizations who use big data and analytics daily and …


How It Professionals Acquire Soft Skills, Paul Majett Jan 2023

How It Professionals Acquire Soft Skills, Paul Majett

Walden Dissertations and Doctoral Studies

AbstractIn this study, I investigated how information technology (IT) professionals learn/acquire soft skills. Little is understood about how IT professionals describe and apply the soft skills that they consider necessary for their own employability. Exploring how IT professionals describe and apply soft skills is important to their future work and career advancement. The purpose of this basic qualitative study was to better understand how IT professionals learn/acquire soft skills. Bandura’s 1986, social learning theory served as the organizational conceptual framework of this study and guided the research question, which asked how IT professionals acquire learn/acquire soft skills. This research question …


Strategies To Increase Competitive Advantage In The Automotive Manufacturing Supply Chain, Amber Willis Jan 2023

Strategies To Increase Competitive Advantage In The Automotive Manufacturing Supply Chain, Amber Willis

Walden Dissertations and Doctoral Studies

Some automotive manufacturing supply chain leaders lack strategies that are needed to implement information technology (IT) systems. Business leaders are concerned with implementing IT systems to achieve and maintain a competitive advantage. Grounded in the resource-based view theory (RBV), the purpose of this qualitative single case study was to explore information system strategies used by leaders in the automotive manufacturing supply chain to achieve competitive advantage. Participants were five leaders of an automotive manufacturing supply chain organization who implemented IT systems. Data were collected through semistructured interviews and a review of organization project documents. Through thematic analysis, five themes were …


The Relationship Between Organizational Knowledge Management Constructs And Organizational Flexibility, Marcus B. Williams Jan 2023

The Relationship Between Organizational Knowledge Management Constructs And Organizational Flexibility, Marcus B. Williams

Walden Dissertations and Doctoral Studies

The role that the information technology (IT) department serves is governed by the corporate culture and how it values the use of knowledge, including IT, to achieve a strategic competitive advantage. The purpose of this quantitative study was to examine the potential relationships between information acquisition, knowledge dissemination, shared interpretation, organizational memory, and organizational flexibility. Two theories served as the theoretical foundation for this study: contingency theory and the resource-based view of the firm. To answer the question of possible correlation between organizational flexibility and components of knowledge management, a randomly selected sample of 193 IT professionals employed at small- …


Technology Manufacturing Leaders’ Innovation Strategies To Improve Users’ Choice Capabilities In A Fast-Changing Markets, Magnus Ekwunife Jan 2023

Technology Manufacturing Leaders’ Innovation Strategies To Improve Users’ Choice Capabilities In A Fast-Changing Markets, Magnus Ekwunife

Walden Dissertations and Doctoral Studies

Some leaders of technology manufacturing organizations lack strategies to educate their users on how to make the optimal cloud technology selection decisions for their organizations during rapidly evolving innovation, resulting in significant risk of wrong choices and loss of customer loyalty. Grounded in resource-based view theory, the purpose of this qualitative single case study was to explore strategies technology manufacturing leaders use to educate users on how to make optimal cloud technology selection decisions for their organizations. The participants were six executive-level leaders of the strategic sales division of a multinational technology organization based in the western United States who …


Relationship Between Strategic Dexterity, Absorptive Capacity, And Competitive Advantage, Ifechide Monyei Jan 2023

Relationship Between Strategic Dexterity, Absorptive Capacity, And Competitive Advantage, Ifechide Monyei

Walden Dissertations and Doctoral Studies

Small- and medium-sized enterprise (SME) manufacturing executives and managers are concerned with the rapid technological changes involving artificial intelligence (AI), machine learning, and big data. To compete in the global landscape, effectively managing digital and artificial intelligence changes among SME manufacturing executives and managers is critical for leaders to compete in 2023 and beyond. Grounded in the dynamic capabilities view theory, the purpose of this quantitative correlation study was to examine the relationship between strategic dexterity, absorptive capacity, and competitive advantage. The participants were 66 executives and managers of SME manufacturing organizations who use big data and analytics daily and …


Effective Strategies For Using Telecommuting By Owners Of Small Businesses, Thomas Law Jan 2023

Effective Strategies For Using Telecommuting By Owners Of Small Businesses, Thomas Law

Walden Dissertations and Doctoral Studies

Small business owners who lack effective strategies to incorporate telecommuting may be unable to retain teleworking employees, create a flexible working environment, or improve workforce morale, negatively impacting company productivity and profitability. Grounded in transformational leadership theory and sociotechnical systems theory, the purpose of this qualitative multiple case study was to explore strategies small business owners use to incorporate telecommuting to retain teleworking employees. Data were collected from five small business owners in Texas with at least 1 year of management experience and created and maintained remote working strategies. Data collection included semistructured interviews and company documents. Three themes emerged …


Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda Jan 2023

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda

Walden Dissertations and Doctoral Studies

All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …


Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda Jan 2023

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda

Walden Dissertations and Doctoral Studies

All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …


Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo Jan 2023

Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo

Walden Dissertations and Doctoral Studies

Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …


Artificial Intelligence-Based Medical Device Technologies Implementation Strategies In The Nigerian Health Care Industry, Oliver Chikaodinaka Iheme Jan 2023

Artificial Intelligence-Based Medical Device Technologies Implementation Strategies In The Nigerian Health Care Industry, Oliver Chikaodinaka Iheme

Walden Dissertations and Doctoral Studies

Artificial intelligence (AI)-based medical device technologies can aid medical professionals in delivering faster and more accurate treatment, but health care leaders are concerned with eliminating challenges that impede implementation. Grounded in the technology-organization-environment and technology acceptance models, the purpose of this qualitative multi-case study was to explore strategies health care leaders in Nigeria use to obtain, adopt, and implement AI-based medical device technologies. The participants were 11 health care leaders in Nigeria who successfully implemented AI-based medical device technologies in their hospitals. Data were collected using semi-structured interviews and the review of organizational documents. Through thematic analysis, five themes were …