Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2018

Institution
Keyword
Publication
Publication Type

Articles 151 - 170 of 170

Full-Text Articles in Business

Management Strategies For Adopting Agile Methods Of Software Development In Distributed Teams, Igor A. Schtein Jan 2018

Management Strategies For Adopting Agile Methods Of Software Development In Distributed Teams, Igor A. Schtein

Walden Dissertations and Doctoral Studies

Between 2003 and 2015, more than 61% of U.S. software development teams failed to satisfy project requirements, budgets, or timelines. Failed projects cost the software industry an estimated 60 billion dollars. Lost opportunities and misused resources are often the result of software development leaders failing to implement appropriate methods for managing software projects. The purpose of this qualitative multiple case study was to explore strategies software development managers use in adopting Agile methodology in the context of distributed teams. The tenets of Agile approach are individual interaction over tools, working software over documentation, and collaboration over a contract. The conceptual …


Organizational Information Security: Strategies To Minimize Workplace Cyberloafing For Increased Productivity, Hawazin Al Abbasi Jan 2018

Organizational Information Security: Strategies To Minimize Workplace Cyberloafing For Increased Productivity, Hawazin Al Abbasi

Walden Dissertations and Doctoral Studies

Productivity loss occurs in organizations that experience high levels of personal Internet use by employees on company time, which includes employees using smartphones to surf without needing the firm's Internet connection. The purpose of this qualitative phenomenological study was to explore reliable ways for organizational leaders to monitor or limit their employees' use of smartphone technology for personal use (cyberloafing) while on the job to minimize wasted work time. Social cognitive theory, which includes an emphasis on human behavioral changes based upon the environment, people, and behavior, served as the conceptual framework. The general research question was as follows: How …


Estimating The Optimal Cutoff Point For Logistic Regression, Zheng Zhang Jan 2018

Estimating The Optimal Cutoff Point For Logistic Regression, Zheng Zhang

Open Access Theses & Dissertations

Binary classification is one of the main themes of supervised learning. This research is concerned about determining the optimal cutoff point for the continuous-scaled outcomes (e.g., predicted probabilities) resulting from a classifier such as logistic regression. We make note of the fact that the cutoff point obtained from various methods is a statistic, which can be unstable with substantial variation. Nevertheless, due partly to complexity involved in estimating the cutpoint, there has been no formal study on the variance or standard error of the estimated cutoff point.

In this Thesis, a bootstrap aggregation method is put forward to estimate the …


Travel To Extraterrestrial Bodies Over Time: Some Exploratory Analyses Of Mission Data, Venkat Kodali, Rohith Kumar Reddy Duggirala, Richard S. Segall, Hyacinthe Aboudja, Daniel Berleant Jan 2018

Travel To Extraterrestrial Bodies Over Time: Some Exploratory Analyses Of Mission Data, Venkat Kodali, Rohith Kumar Reddy Duggirala, Richard S. Segall, Hyacinthe Aboudja, Daniel Berleant

Journal of the Arkansas Academy of Science

This paper discusses data pertaining to space missions to astronomical bodies beyond earth. The analyses provide summarizing facts and graphs obtained by mining data about (1) missions launched by all countries that go to the moon and planets, and (2) Earth satellites obtained from a Union of Concerned Scientists (UCS) dataset and lists of publically available satellite data.


Patient Satisfaction Management In Office Visits And Telehealth In Health Care Technology, Todd Price Jan 2018

Patient Satisfaction Management In Office Visits And Telehealth In Health Care Technology, Todd Price

Walden Dissertations and Doctoral Studies

Telehealth and remote medical treatments have begun to be more commonly used in healthcare systems. Researchers have theorized that providers' abilities to treat patients are not directly tied to the proximity of the patient to the doctor, but by the identification and treatment of the patient's symptoms. Although the treatment and cure rates are being established within individual health systems and professional medical associations, empirical research is lacking regarding patient satisfaction with this remote treatment situation. The purpose of this quantitative study was to address this gap by examining satisfaction ratings of patients between virtual provider visits and face-to-face provider …


Strategies For Healthcare Payer Information Technology Integration After Mergers And Acquisitions, Kishore Maranganti Jan 2018

Strategies For Healthcare Payer Information Technology Integration After Mergers And Acquisitions, Kishore Maranganti

Walden Dissertations and Doctoral Studies

Despite the high rate of failure in merger and acquisition (M&A) transactions, many organizations continue to rely on M&As as their primary growth strategy and to address market competition. The purpose of this qualitative single case study was to explore strategies managers from a large healthcare payer in the midwestern United States used to achieve operational and strategic synergies during the postacquisition information technology (IT) integration phase. Haspeslagh and Jemison's acquisition integration approaches model was the conceptual framework for the study. Methodological triangulation was established by analyzing the data from the semistructured interviews of 6 senior executives and 6 IT …


Analytic Extensions To The Data Model For Management Analytics And Decision Support In The Big Data Environment, Nsikak Etim Akpakpan Jan 2018

Analytic Extensions To The Data Model For Management Analytics And Decision Support In The Big Data Environment, Nsikak Etim Akpakpan

Walden Dissertations and Doctoral Studies

From 2006 to 2016, an estimated average of 50% of big data analytics and decision support projects failed to deliver acceptable and actionable outputs to business users. The resulting management inefficiency came with high cost, and wasted investments estimated at $2.7 trillion in 2016 for companies in the United States. The purpose of this quantitative descriptive study was to examine the data model of a typical data analytics project in a big data environment for opportunities to improve the information created for management problem-solving. The research questions focused on finding artifacts within enterprise data to model key business scenarios for …


Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii Jan 2018

Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii

Walden Dissertations and Doctoral Studies

The Federal Bureau of Investigation reported that cyber actors will likely increase cyber intrusions against healthcare systems and their concomitant medical devices because of the mandatory transition from paper to electronic health records, lax cyber security standards, and a higher financial payout for medical records in the deep web. The problem addressed in this quantitative correlational study was uncertainty surrounding the benefits of palm vein authentication adoption relative to the growing crime of medical identity theft. The purpose of this quantitative correlational study was to understand healthcare managers' and doctors' perceptions of the effectiveness of palm vein authentication technology. The …


Reducing Internal Theft And Loss In Small Businesses, Eric L. Luster Jan 2018

Reducing Internal Theft And Loss In Small Businesses, Eric L. Luster

Walden Dissertations and Doctoral Studies

Every year, several documented data breaches happen in the United States, resulting in the exposure of millions of electronic records. The purpose of this single-case study was to explore strategies some information technology managers used to monitor employees and reduce internal theft and loss. The population for this study consisted of 5 information technology managers who work within the field of technology in the southwestern region of the United States. Participants were selected using purposeful sampling. The conceptual framework for this study included elements from information and communication boundary theories. Data were collected from semistructured interviews, company standard operating procedures, …


Strategies Certified Project Management Professionals Use To Prevent Counterproductive Behavior, Lisa Annika Christin Hansson-Vazquez Jan 2018

Strategies Certified Project Management Professionals Use To Prevent Counterproductive Behavior, Lisa Annika Christin Hansson-Vazquez

Walden Dissertations and Doctoral Studies

Project managers who fail to apply strategies to prevent counterproductive work behavior in information technology projects could negatively affect users, budget costs, timelines, or projects. The purpose of this multiple case study was to explore strategies that project managers used to prevent counterproductive work behavior that put project success at risk. Social learning theory was the conceptual framework for this study. Data were collected through document review of published Project Management Institute (PMI) material as well as semistructured interviews with 10 project managers who were members of a PMI chapter in the southeastern United States, and who held a project …


Leadership Skills To Sustain High-Tech Entrepreneurial Ventures, Zoaib Z. Rangwala Jan 2018

Leadership Skills To Sustain High-Tech Entrepreneurial Ventures, Zoaib Z. Rangwala

Walden Dissertations and Doctoral Studies

High-tech (HT) innovation-oriented entrepreneurs start 35% more ventures and create 10% more jobs in the first 5 years of operation than the rest of the private sector and drive significant economic growth across all industries; however, more than 50% of the entrepreneurial HT ventures fail during the first 5 years of operations. Guided by the conceptual framework of transformational leadership theory, the purpose of this multicase study was to explore skills used by successful entrepreneurial leaders to sustain their HT ventures in Silicon Valley, California. Data collection was from 8 participants in semistructured 1-on-1 interviews and 3 participants in a …


A Comparison Of Information Technology Mediated Customer Services Between The U.S. And China, Suhong Li, Hal Records, Robert Behling Jan 2018

A Comparison Of Information Technology Mediated Customer Services Between The U.S. And China, Suhong Li, Hal Records, Robert Behling

Information Systems and Analytics Department Faculty Journal Articles

Information technology mediated customer service is a reality of the 21st century. More and more companies have moved their customer services from in store and in person to online through computer or mobile devices. Using 442 responses collected from one USA university (234 responses) and two Chinese universities (208 responses), the study investigates customer preferences over two service delivery models (either in store or online) on five types of purchasing (retail, eating-out, banking, travel and entertainment) and their perception difference in customer service quality between those two delivery models in the U.S. and China. The results show that the majority …


A Bi-Level Heuristic Solution For The Nurse Scheduling Problem Based On Shift-Swapping, Ahmed Youssef, Samah Senbel Jan 2018

A Bi-Level Heuristic Solution For The Nurse Scheduling Problem Based On Shift-Swapping, Ahmed Youssef, Samah Senbel

School of Computer Science & Engineering Faculty Publications

This paper presents a new heuristic solution to the well-known Nurse Scheduling Problem (NSP). The NSP has a lot of constraints to satisfy. Some are mandatory and specified by the hospital administration, these are known as hard constraints. Some constraints are put by the nurses themselves to produce a comfortable schedule for themselves, and these are known as soft constraints. Our solution is based on the practice of shift swapping done by nurses after they receive an unsatisfactory schedule. The constraints are arranged in order of importance. Our technique works on two levels, first we generate a schedule that satisfies …


Space Operations In The Suborbital Space Flight Simulator And Mission Control Center: Lessons Learned With Xcor Lynx, Pedro Llanos, Christopher Nguyen, David Williams, Kim O. Chambers Ph.D., Erik Seedhouse, Robert Davidson Jan 2018

Space Operations In The Suborbital Space Flight Simulator And Mission Control Center: Lessons Learned With Xcor Lynx, Pedro Llanos, Christopher Nguyen, David Williams, Kim O. Chambers Ph.D., Erik Seedhouse, Robert Davidson

Journal of Aviation/Aerospace Education & Research

This study was conducted to better understand the performance of the XCOR Lynx vehicle. Because the Lynx development was halted, the best knowledge of vehicle dynamics can only be found through simulator flights. X-Plane 10 was chosen for its robust applications and accurate portrayal of dynamics on a vehicle in flight. The Suborbital Space Flight Simulator (SSFS) and Mission Control Center (MCC) were brought to the Applied Aviation Sciences department in fall 2015 at Embry-Riddle Aeronautical University, Daytona Beach campus. This academic and research tool is a department asset capable of providing multiple fields of data about suborbital simulated flights. …


Real-World Large-Scale Iot Systems For Community Eldercare: A Comparative Study On System Dependability, Hwee-Pink Tan, Austin Zhang Jan 2018

Real-World Large-Scale Iot Systems For Community Eldercare: A Comparative Study On System Dependability, Hwee-Pink Tan, Austin Zhang

Research Collection School Of Computing and Information Systems

The paradigm of aging-in-place — where the elderly live and age in their own homes, independently and safely, with care provided by the community — is compelling, especially in societies that face both shortages in institutionalized eldercare resources, and rapidly-aging populations. Internet-of-Things (IoT) technologies, particularly in-home monitoring solutions, are commercially available, and can be a fundamental enabler of smart community eldercare, if they are dependable. In this paper, we present our findings on system performance of solutions from two vendors, which we have deployed at scale for technology-enabled community care. In particular, we highlight the importance of quantifying actual system …


Classification Of Eeg Signals Of User States In Gaming Using Machine Learning, Chandana Mallapragada Jan 2018

Classification Of Eeg Signals Of User States In Gaming Using Machine Learning, Chandana Mallapragada

Masters Theses

"In this research, brain activity of user states was analyzed using machine learning algorithms. When a user interacts with a computer-based system including playing computer games like Tetris, he or she may experience user states such as boredom, flow, and anxiety. The purpose of this research is to apply machine learning models to Electroencephalogram (EEG) signals of three user states -- boredom, flow and anxiety -- to identify and classify the EEG correlates for these user states. We focus on three research questions: (i) How well do machine learning models like support vector machine, random forests, multinomial logistic regression, and …


Human-Intelligence And Machine-Intelligence Decision Governance Formal Ontology, Faisal Mahmud Jan 2018

Human-Intelligence And Machine-Intelligence Decision Governance Formal Ontology, Faisal Mahmud

Engineering Management & Systems Engineering Theses & Dissertations

Since the beginning of the human race, decision making and rational thinking played a pivotal role for mankind to either exist and succeed or fail and become extinct. Self-awareness, cognitive thinking, creativity, and emotional magnitude allowed us to advance civilization and to take further steps toward achieving previously unreachable goals. From the invention of wheels to rockets and telegraph to satellite, all technological ventures went through many upgrades and updates. Recently, increasing computer CPU power and memory capacity contributed to smarter and faster computing appliances that, in turn, have accelerated the integration into and use of artificial intelligence (AI) in …


Consuming Digital Debris In The Plasticene, Stephen R. Parks Jan 2018

Consuming Digital Debris In The Plasticene, Stephen R. Parks

Theses and Dissertations

Claims of customization and control by socio-technical industries are altering the role of consumer and producer. These narratives are often misleading attempts to engage consumers with new forms of technology. By addressing capitalist intent, material, and the reproduction limits of 3-D printed objects’, I observe the aspirational promise of becoming a producer of my own belongings through new networks of production. I am interested in gaining a better understanding of the data consumed that perpetuates hyper-consumptive tendencies for new technological apparatuses. My role as a designer focuses on the resolution of not only the surface of the object through 3-D …


Developing A Cyberterrorism Policy: Incorporating Individual Values, Osama Bassam J. Rabie Jan 2018

Developing A Cyberterrorism Policy: Incorporating Individual Values, Osama Bassam J. Rabie

Theses and Dissertations

Preventing cyberterrorism is becoming a necessity for individuals, organizations, and governments. However, current policies focus on technical and managerial aspects without asking for experts and non-experts values and preferences for preventing cyberterrorism. This study employs value focused thinking and public value forum to bare strategic measures and alternatives for complex policy decisions for preventing cyberterrorism. The strategic measures and alternatives are per socio-technical process.


Economics-Based Risk Management Of Distributed Denial Of Service Attacks: A Distance Learning Case Study, Omer Keskin, Unal Tatar, Omer Poyraz, Ariel Pinto, Adrian Gheorghe Jan 2018

Economics-Based Risk Management Of Distributed Denial Of Service Attacks: A Distance Learning Case Study, Omer Keskin, Unal Tatar, Omer Poyraz, Ariel Pinto, Adrian Gheorghe

Engineering Management & Systems Engineering Faculty Publications

Managing risk of cyber systems is still on the top of the agendas of Chief Information Security Officers (CISO). Investment in cybersecurity is continuously rising. Efficiency and effectiveness of cybersecurity investments are under scrutiny by boards of the companies. The primary method of decision making on cybersecurity adopts a risk-informed approach. Qualitative methods bring a notion of risk. However, particularly for strategic level decisions, more quantitative methods that can calculate the risk and impact in monetary values are required. In this study, a model is built to calculate the economic value of business interruption during a Distributed Denial-of-Service (DDoS) attack …