Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (37)
- Walden University (28)
- Kennesaw State University (27)
- Clark University (17)
- Old Dominion University (5)
-
- Selected Works (4)
- Embry-Riddle Aeronautical University (3)
- Portland State University (3)
- University of Texas Rio Grande Valley (3)
- Brigham Young University (2)
- Bryant University (2)
- Dakota State University (2)
- GALILEO, University System of Georgia (2)
- New Jersey Institute of Technology (2)
- Sheridan College (2)
- University of Nebraska - Lincoln (2)
- University of South Florida (2)
- Virginia Commonwealth University (2)
- Western University (2)
- Zayed University (2)
- Air Force Institute of Technology (1)
- Bowling Green State University (1)
- City University of New York (CUNY) (1)
- Florida International University (1)
- La Salle University (1)
- Missouri University of Science and Technology (1)
- Sacred Heart University (1)
- San Jose State University (1)
- Southern Methodist University (1)
- University of Arkansas, Fayetteville (1)
- Keyword
-
- MPA (6)
- MSPC (6)
- Management (6)
- Cryptocurrency (5)
- Leadership (5)
-
- MSIT (5)
- Social media (5)
- Artificial intelligence (4)
- Blockchain (4)
- Cybersecurity (4)
- Machine learning (4)
- Project Management (4)
- Technology (4)
- Analytical modeling (3)
- Computer science (3)
- Information Technology (3)
- Information technology (3)
- Marketing (3)
- Pricing (3)
- Software (3)
- Ageing-in-place (2)
- Air Traffic Control (2)
- Algorithms (2)
- Cloud computing (2)
- Competition (2)
- Compliance (2)
- Digital banking (2)
- Editorial (2)
- Elderly (2)
- Flight Transition Corridor (2)
- Publication
-
- Research Collection School Of Computing and Information Systems (28)
- Walden Dissertations and Doctoral Studies (28)
- KSU Proceedings on Cybersecurity Education, Research and Practice (18)
- School of Professional Studies (17)
- Journal of Cybersecurity Education, Research and Practice (9)
-
- Theses and Dissertations (4)
- Dr. David M Cook (3)
- Information Systems Faculty Publications and Presentations (3)
- MITB Thought Leadership Series (3)
- All Works (2)
- Computer Science and Information Technology Grants Collections (2)
- Dissertations (2)
- Electronic Thesis and Dissertation Repository (2)
- Engineering and Technology Management Student Projects (2)
- Information Technology & Decision Sciences Theses & Dissertations (2)
- Marriott Student Review (2)
- Masters Theses & Doctoral Dissertations (2)
- Publications and Scholarship (2)
- USF Tampa Graduate Theses and Dissertations (2)
- ART 108: Introduction to Games Studies (1)
- All Faculty Scholarship (1)
- Asian Management Insights (1)
- Business Systems and Analytics Faculty Work (1)
- Dissertations and Theses (1)
- Electronic Theses and Dissertations (1)
- Engineering Management & Systems Engineering Faculty Publications (1)
- Engineering Management & Systems Engineering Theses & Dissertations (1)
- Honors Projects (1)
- Honors Scholar Theses (1)
- Honors Theses (1)
Articles 151 - 170 of 170
Full-Text Articles in Business
Management Strategies For Adopting Agile Methods Of Software Development In Distributed Teams, Igor A. Schtein
Management Strategies For Adopting Agile Methods Of Software Development In Distributed Teams, Igor A. Schtein
Walden Dissertations and Doctoral Studies
Between 2003 and 2015, more than 61% of U.S. software development teams failed to satisfy project requirements, budgets, or timelines. Failed projects cost the software industry an estimated 60 billion dollars. Lost opportunities and misused resources are often the result of software development leaders failing to implement appropriate methods for managing software projects. The purpose of this qualitative multiple case study was to explore strategies software development managers use in adopting Agile methodology in the context of distributed teams. The tenets of Agile approach are individual interaction over tools, working software over documentation, and collaboration over a contract. The conceptual …
Organizational Information Security: Strategies To Minimize Workplace Cyberloafing For Increased Productivity, Hawazin Al Abbasi
Organizational Information Security: Strategies To Minimize Workplace Cyberloafing For Increased Productivity, Hawazin Al Abbasi
Walden Dissertations and Doctoral Studies
Productivity loss occurs in organizations that experience high levels of personal Internet use by employees on company time, which includes employees using smartphones to surf without needing the firm's Internet connection. The purpose of this qualitative phenomenological study was to explore reliable ways for organizational leaders to monitor or limit their employees' use of smartphone technology for personal use (cyberloafing) while on the job to minimize wasted work time. Social cognitive theory, which includes an emphasis on human behavioral changes based upon the environment, people, and behavior, served as the conceptual framework. The general research question was as follows: How …
Estimating The Optimal Cutoff Point For Logistic Regression, Zheng Zhang
Estimating The Optimal Cutoff Point For Logistic Regression, Zheng Zhang
Open Access Theses & Dissertations
Binary classification is one of the main themes of supervised learning. This research is concerned about determining the optimal cutoff point for the continuous-scaled outcomes (e.g., predicted probabilities) resulting from a classifier such as logistic regression. We make note of the fact that the cutoff point obtained from various methods is a statistic, which can be unstable with substantial variation. Nevertheless, due partly to complexity involved in estimating the cutpoint, there has been no formal study on the variance or standard error of the estimated cutoff point.
In this Thesis, a bootstrap aggregation method is put forward to estimate the …
Travel To Extraterrestrial Bodies Over Time: Some Exploratory Analyses Of Mission Data, Venkat Kodali, Rohith Kumar Reddy Duggirala, Richard S. Segall, Hyacinthe Aboudja, Daniel Berleant
Travel To Extraterrestrial Bodies Over Time: Some Exploratory Analyses Of Mission Data, Venkat Kodali, Rohith Kumar Reddy Duggirala, Richard S. Segall, Hyacinthe Aboudja, Daniel Berleant
Journal of the Arkansas Academy of Science
This paper discusses data pertaining to space missions to astronomical bodies beyond earth. The analyses provide summarizing facts and graphs obtained by mining data about (1) missions launched by all countries that go to the moon and planets, and (2) Earth satellites obtained from a Union of Concerned Scientists (UCS) dataset and lists of publically available satellite data.
Patient Satisfaction Management In Office Visits And Telehealth In Health Care Technology, Todd Price
Patient Satisfaction Management In Office Visits And Telehealth In Health Care Technology, Todd Price
Walden Dissertations and Doctoral Studies
Telehealth and remote medical treatments have begun to be more commonly used in healthcare systems. Researchers have theorized that providers' abilities to treat patients are not directly tied to the proximity of the patient to the doctor, but by the identification and treatment of the patient's symptoms. Although the treatment and cure rates are being established within individual health systems and professional medical associations, empirical research is lacking regarding patient satisfaction with this remote treatment situation. The purpose of this quantitative study was to address this gap by examining satisfaction ratings of patients between virtual provider visits and face-to-face provider …
Strategies For Healthcare Payer Information Technology Integration After Mergers And Acquisitions, Kishore Maranganti
Strategies For Healthcare Payer Information Technology Integration After Mergers And Acquisitions, Kishore Maranganti
Walden Dissertations and Doctoral Studies
Despite the high rate of failure in merger and acquisition (M&A) transactions, many organizations continue to rely on M&As as their primary growth strategy and to address market competition. The purpose of this qualitative single case study was to explore strategies managers from a large healthcare payer in the midwestern United States used to achieve operational and strategic synergies during the postacquisition information technology (IT) integration phase. Haspeslagh and Jemison's acquisition integration approaches model was the conceptual framework for the study. Methodological triangulation was established by analyzing the data from the semistructured interviews of 6 senior executives and 6 IT …
Analytic Extensions To The Data Model For Management Analytics And Decision Support In The Big Data Environment, Nsikak Etim Akpakpan
Analytic Extensions To The Data Model For Management Analytics And Decision Support In The Big Data Environment, Nsikak Etim Akpakpan
Walden Dissertations and Doctoral Studies
From 2006 to 2016, an estimated average of 50% of big data analytics and decision support projects failed to deliver acceptable and actionable outputs to business users. The resulting management inefficiency came with high cost, and wasted investments estimated at $2.7 trillion in 2016 for companies in the United States. The purpose of this quantitative descriptive study was to examine the data model of a typical data analytics project in a big data environment for opportunities to improve the information created for management problem-solving. The research questions focused on finding artifacts within enterprise data to model key business scenarios for …
Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii
Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii
Walden Dissertations and Doctoral Studies
The Federal Bureau of Investigation reported that cyber actors will likely increase cyber intrusions against healthcare systems and their concomitant medical devices because of the mandatory transition from paper to electronic health records, lax cyber security standards, and a higher financial payout for medical records in the deep web. The problem addressed in this quantitative correlational study was uncertainty surrounding the benefits of palm vein authentication adoption relative to the growing crime of medical identity theft. The purpose of this quantitative correlational study was to understand healthcare managers' and doctors' perceptions of the effectiveness of palm vein authentication technology. The …
Reducing Internal Theft And Loss In Small Businesses, Eric L. Luster
Reducing Internal Theft And Loss In Small Businesses, Eric L. Luster
Walden Dissertations and Doctoral Studies
Every year, several documented data breaches happen in the United States, resulting in the exposure of millions of electronic records. The purpose of this single-case study was to explore strategies some information technology managers used to monitor employees and reduce internal theft and loss. The population for this study consisted of 5 information technology managers who work within the field of technology in the southwestern region of the United States. Participants were selected using purposeful sampling. The conceptual framework for this study included elements from information and communication boundary theories. Data were collected from semistructured interviews, company standard operating procedures, …
Strategies Certified Project Management Professionals Use To Prevent Counterproductive Behavior, Lisa Annika Christin Hansson-Vazquez
Strategies Certified Project Management Professionals Use To Prevent Counterproductive Behavior, Lisa Annika Christin Hansson-Vazquez
Walden Dissertations and Doctoral Studies
Project managers who fail to apply strategies to prevent counterproductive work behavior in information technology projects could negatively affect users, budget costs, timelines, or projects. The purpose of this multiple case study was to explore strategies that project managers used to prevent counterproductive work behavior that put project success at risk. Social learning theory was the conceptual framework for this study. Data were collected through document review of published Project Management Institute (PMI) material as well as semistructured interviews with 10 project managers who were members of a PMI chapter in the southeastern United States, and who held a project …
Leadership Skills To Sustain High-Tech Entrepreneurial Ventures, Zoaib Z. Rangwala
Leadership Skills To Sustain High-Tech Entrepreneurial Ventures, Zoaib Z. Rangwala
Walden Dissertations and Doctoral Studies
High-tech (HT) innovation-oriented entrepreneurs start 35% more ventures and create 10% more jobs in the first 5 years of operation than the rest of the private sector and drive significant economic growth across all industries; however, more than 50% of the entrepreneurial HT ventures fail during the first 5 years of operations. Guided by the conceptual framework of transformational leadership theory, the purpose of this multicase study was to explore skills used by successful entrepreneurial leaders to sustain their HT ventures in Silicon Valley, California. Data collection was from 8 participants in semistructured 1-on-1 interviews and 3 participants in a …
A Comparison Of Information Technology Mediated Customer Services Between The U.S. And China, Suhong Li, Hal Records, Robert Behling
A Comparison Of Information Technology Mediated Customer Services Between The U.S. And China, Suhong Li, Hal Records, Robert Behling
Information Systems and Analytics Department Faculty Journal Articles
Information technology mediated customer service is a reality of the 21st century. More and more companies have moved their customer services from in store and in person to online through computer or mobile devices. Using 442 responses collected from one USA university (234 responses) and two Chinese universities (208 responses), the study investigates customer preferences over two service delivery models (either in store or online) on five types of purchasing (retail, eating-out, banking, travel and entertainment) and their perception difference in customer service quality between those two delivery models in the U.S. and China. The results show that the majority …
A Bi-Level Heuristic Solution For The Nurse Scheduling Problem Based On Shift-Swapping, Ahmed Youssef, Samah Senbel
A Bi-Level Heuristic Solution For The Nurse Scheduling Problem Based On Shift-Swapping, Ahmed Youssef, Samah Senbel
School of Computer Science & Engineering Faculty Publications
This paper presents a new heuristic solution to the well-known Nurse Scheduling Problem (NSP). The NSP has a lot of constraints to satisfy. Some are mandatory and specified by the hospital administration, these are known as hard constraints. Some constraints are put by the nurses themselves to produce a comfortable schedule for themselves, and these are known as soft constraints. Our solution is based on the practice of shift swapping done by nurses after they receive an unsatisfactory schedule. The constraints are arranged in order of importance. Our technique works on two levels, first we generate a schedule that satisfies …
Space Operations In The Suborbital Space Flight Simulator And Mission Control Center: Lessons Learned With Xcor Lynx, Pedro Llanos, Christopher Nguyen, David Williams, Kim O. Chambers Ph.D., Erik Seedhouse, Robert Davidson
Space Operations In The Suborbital Space Flight Simulator And Mission Control Center: Lessons Learned With Xcor Lynx, Pedro Llanos, Christopher Nguyen, David Williams, Kim O. Chambers Ph.D., Erik Seedhouse, Robert Davidson
Journal of Aviation/Aerospace Education & Research
This study was conducted to better understand the performance of the XCOR Lynx vehicle. Because the Lynx development was halted, the best knowledge of vehicle dynamics can only be found through simulator flights. X-Plane 10 was chosen for its robust applications and accurate portrayal of dynamics on a vehicle in flight. The Suborbital Space Flight Simulator (SSFS) and Mission Control Center (MCC) were brought to the Applied Aviation Sciences department in fall 2015 at Embry-Riddle Aeronautical University, Daytona Beach campus. This academic and research tool is a department asset capable of providing multiple fields of data about suborbital simulated flights. …
Real-World Large-Scale Iot Systems For Community Eldercare: A Comparative Study On System Dependability, Hwee-Pink Tan, Austin Zhang
Real-World Large-Scale Iot Systems For Community Eldercare: A Comparative Study On System Dependability, Hwee-Pink Tan, Austin Zhang
Research Collection School Of Computing and Information Systems
The paradigm of aging-in-place — where the elderly live and age in their own homes, independently and safely, with care provided by the community — is compelling, especially in societies that face both shortages in institutionalized eldercare resources, and rapidly-aging populations. Internet-of-Things (IoT) technologies, particularly in-home monitoring solutions, are commercially available, and can be a fundamental enabler of smart community eldercare, if they are dependable. In this paper, we present our findings on system performance of solutions from two vendors, which we have deployed at scale for technology-enabled community care. In particular, we highlight the importance of quantifying actual system …
Classification Of Eeg Signals Of User States In Gaming Using Machine Learning, Chandana Mallapragada
Classification Of Eeg Signals Of User States In Gaming Using Machine Learning, Chandana Mallapragada
Masters Theses
"In this research, brain activity of user states was analyzed using machine learning algorithms. When a user interacts with a computer-based system including playing computer games like Tetris, he or she may experience user states such as boredom, flow, and anxiety. The purpose of this research is to apply machine learning models to Electroencephalogram (EEG) signals of three user states -- boredom, flow and anxiety -- to identify and classify the EEG correlates for these user states. We focus on three research questions: (i) How well do machine learning models like support vector machine, random forests, multinomial logistic regression, and …
Human-Intelligence And Machine-Intelligence Decision Governance Formal Ontology, Faisal Mahmud
Human-Intelligence And Machine-Intelligence Decision Governance Formal Ontology, Faisal Mahmud
Engineering Management & Systems Engineering Theses & Dissertations
Since the beginning of the human race, decision making and rational thinking played a pivotal role for mankind to either exist and succeed or fail and become extinct. Self-awareness, cognitive thinking, creativity, and emotional magnitude allowed us to advance civilization and to take further steps toward achieving previously unreachable goals. From the invention of wheels to rockets and telegraph to satellite, all technological ventures went through many upgrades and updates. Recently, increasing computer CPU power and memory capacity contributed to smarter and faster computing appliances that, in turn, have accelerated the integration into and use of artificial intelligence (AI) in …
Consuming Digital Debris In The Plasticene, Stephen R. Parks
Consuming Digital Debris In The Plasticene, Stephen R. Parks
Theses and Dissertations
Claims of customization and control by socio-technical industries are altering the role of consumer and producer. These narratives are often misleading attempts to engage consumers with new forms of technology. By addressing capitalist intent, material, and the reproduction limits of 3-D printed objects’, I observe the aspirational promise of becoming a producer of my own belongings through new networks of production. I am interested in gaining a better understanding of the data consumed that perpetuates hyper-consumptive tendencies for new technological apparatuses. My role as a designer focuses on the resolution of not only the surface of the object through 3-D …
Developing A Cyberterrorism Policy: Incorporating Individual Values, Osama Bassam J. Rabie
Developing A Cyberterrorism Policy: Incorporating Individual Values, Osama Bassam J. Rabie
Theses and Dissertations
Preventing cyberterrorism is becoming a necessity for individuals, organizations, and governments. However, current policies focus on technical and managerial aspects without asking for experts and non-experts values and preferences for preventing cyberterrorism. This study employs value focused thinking and public value forum to bare strategic measures and alternatives for complex policy decisions for preventing cyberterrorism. The strategic measures and alternatives are per socio-technical process.
Economics-Based Risk Management Of Distributed Denial Of Service Attacks: A Distance Learning Case Study, Omer Keskin, Unal Tatar, Omer Poyraz, Ariel Pinto, Adrian Gheorghe
Economics-Based Risk Management Of Distributed Denial Of Service Attacks: A Distance Learning Case Study, Omer Keskin, Unal Tatar, Omer Poyraz, Ariel Pinto, Adrian Gheorghe
Engineering Management & Systems Engineering Faculty Publications
Managing risk of cyber systems is still on the top of the agendas of Chief Information Security Officers (CISO). Investment in cybersecurity is continuously rising. Efficiency and effectiveness of cybersecurity investments are under scrutiny by boards of the companies. The primary method of decision making on cybersecurity adopts a risk-informed approach. Qualitative methods bring a notion of risk. However, particularly for strategic level decisions, more quantitative methods that can calculate the risk and impact in monetary values are required. In this study, a model is built to calculate the economic value of business interruption during a Distributed Denial-of-Service (DDoS) attack …