Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2021

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 116

Full-Text Articles in Business

What Interactive Web Features Are Most Used, Travis Tyler Dec 2021

What Interactive Web Features Are Most Used, Travis Tyler

Experiential Learning Projects

The use of interactive features in websites has become common place on the internet. People use these tools to help navigate and understand the content related to that website. However, due the large variety of websites it can be tricky to understand what features are best to utilize based on the topic of your site. This paper seeks to address this issue by researching how users interact and utilized different features on different websites. Research is gathered via scholarly articles and direct data gathered from volunteers. This data shows users tend to favor more interactive tools to help with navigation, …


Prediction Of Iraqi Stock Exchange Using Optimized Based-Neural Network, Ameer Al-Haq Al-Shamery, Prof. Dr. Eman Salih Al-Shamery Dec 2021

Prediction Of Iraqi Stock Exchange Using Optimized Based-Neural Network, Ameer Al-Haq Al-Shamery, Prof. Dr. Eman Salih Al-Shamery

Karbala International Journal of Modern Science

Stock market prediction is an interesting financial topic that has attracted the attention of researchers for the last years. This paper aims at improving the prediction of the Iraq-Stock-Exchange (ISX) using a developed method of feedforward Neural-Networks based on the Quasi-Newton optimization approach. The proposed method reduces the error factor depending on the Jacobian vector and Lagrange multiplier. This improvement has led to accelerating convergence during the learning process. A sample of companies listed on ISX was selected. This includes twenty-six banks for the years from 2010 to 2020. To evaluate the proposed model, the research findings are compared with …


Functional Signatures: New Definition And Constructions, Qingwen Guo, Qiong Huang, Sha Ma, Meiyan Xiao, Guomin Yang, Willy Susilo Dec 2021

Functional Signatures: New Definition And Constructions, Qingwen Guo, Qiong Huang, Sha Ma, Meiyan Xiao, Guomin Yang, Willy Susilo

Research Collection School Of Computing and Information Systems

Functional signatures (FS) enable a master authority to delegate its signing privilege to an assistant. Concretely, the master authority uses its secret key sk(F) to issue a signing key sk(f) for a designated function f is an element of F-FS and sends both f and sk(f) to the assistant E, which is then able to compute a signature sigma(f) with respect to pk(F) for a message y in the range of f. In this paper, we modify the syntax of FS slightly to support the application scenario where a certificate of authorization is necessary. Compared with the original FS, our …


Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim Dec 2021

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim

Electronic Theses, Projects, and Dissertations

Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …


Modelling Customers Credit Card Behaviour Using Bidirectional Lstm Neural Networks, Maher Ala’Raj, Maysam F. Abbod, Munir Majdalawieh Dec 2021

Modelling Customers Credit Card Behaviour Using Bidirectional Lstm Neural Networks, Maher Ala’Raj, Maysam F. Abbod, Munir Majdalawieh

All Works

With the rapid growth of consumer credit and the huge amount of financial data developing effective credit scoring models is very crucial. Researchers have developed complex credit scoring models using statistical and artificial intelligence (AI) techniques to help banks and financial institutions to support their financial decisions. Neural networks are considered as a mostly wide used technique in finance and business applications. Thus, the main aim of this paper is to help bank management in scoring credit card clients using machine learning by modelling and predicting the consumer behaviour with respect to two aspects: the probability of single and consecutive …


Integration Of Internet Of Things And Health Recommender Systems, Moonkyung Yang Dec 2021

Integration Of Internet Of Things And Health Recommender Systems, Moonkyung Yang

Electronic Theses, Projects, and Dissertations

The Internet of Things (IoT) has become a part of our lives and has provided many enhancements to day-to-day living. In this project, IoT in healthcare is reviewed. IoT-based healthcare is utilized in remote health monitoring, observing chronic diseases, individual fitness programs, helping the elderly, and many other healthcare fields. There are three main architectures of smart IoT healthcare: Three-Layer Architecture, Service-Oriented Based Architecture (SoA), and The Middleware-Based IoT Architecture. Depending on the required services, different IoT architecture are being used. In addition, IoT healthcare services, IoT healthcare service enablers, IoT healthcare applications, and IoT healthcare services focusing on Smartwatch …


The Use Of Mobile Payment Systems In Post-Covid-19 Economic Recovery: Primary Research On An Emerging Market For Experience Goods, Maiya M. Suyunchaliyeva, Raghav Nautiyal, Aijaz A. Shaikh, Ravishankar Sharma Dec 2021

The Use Of Mobile Payment Systems In Post-Covid-19 Economic Recovery: Primary Research On An Emerging Market For Experience Goods, Maiya M. Suyunchaliyeva, Raghav Nautiyal, Aijaz A. Shaikh, Ravishankar Sharma

All Works

This study investigated whether mobile payment services could drive post-COVID-19 pandemic recovery in the ‘experience goods’ sector (e.g., tourism) utilising Bandura’s self-efficacy or social cognitive theory. It explored the factors influencing the intention to continue using mobile payment services and the intention to recommend these to others. An empirical survey was conducted to assess the study variables, and the data obtained therefrom were analysed using the industry-standard Cross-Industry Standard Process for Data Mining method. The study results suggest that personal innovativeness and perceived trust influence consumers’ intention to continue using mobile payment services and that perceived trust, personal innovativeness and …


Regulating New Tech: Problems, Pathways, And People, Cary Coglianese Dec 2021

Regulating New Tech: Problems, Pathways, And People, Cary Coglianese

All Faculty Scholarship

New technologies bring with them many promises, but also a series of new problems. Even though these problems are new, they are not unlike the types of problems that regulators have long addressed in other contexts. The lessons from regulation in the past can thus guide regulatory efforts today. Regulators must focus on understanding the problems they seek to address and the causal pathways that lead to these problems. Then they must undertake efforts to shape the behavior of those in industry so that private sector managers focus on their technologies’ problems and take actions to interrupt the causal pathways. …


Spurring Digital Transformation In Singapore's Legal Industry, Xin Juan Chua, Steven M. Miller Dec 2021

Spurring Digital Transformation In Singapore's Legal Industry, Xin Juan Chua, Steven M. Miller

Research Collection School Of Computing and Information Systems

COVID-19 has transformed the way we live and work. It has caused the processes and operations of businesses and organisations to be restructured, as well as transformed business models. A 2020 McKinsey Global survey reported that companies all over the world claim they have accelerated the digitalisation of their customer and supply-chain interactions, as well as their internal operations, by three to four years. They also said they thought the share of digital or digitally enabled products in their portfolios has advanced by seven years. While technology transformation is not new to the legal profession, COVID-19 has cemented the importance …


Managing Incomplete Data In The Patient Discharge Summary To Support Correct Hospital Reimbursements, Fadi Naser Eddin Nov 2021

Managing Incomplete Data In The Patient Discharge Summary To Support Correct Hospital Reimbursements, Fadi Naser Eddin

USF Tampa Graduate Theses and Dissertations

The patient discharge summary is a document that conveys the patient's story to other healthcare practitioners, external users, and, most importantly from a financial perspective, health insurers. A defect or incompleteness in the patient's discharge summary will result in delays in the collection process through denial of the entire or partial reimbursement claim or, in the best-case scenario, delay until the discharge summary issue is resolved. The purpose of this project is to address the issue of the incompleteness of discharge summary from the perspective of healthcare providers, with the goal of understanding, diagnosing, and intervening in the research problem. …


The Maritime Domain Awareness Center– A Human-Centered Design Approach, Gary Gomez Nov 2021

The Maritime Domain Awareness Center– A Human-Centered Design Approach, Gary Gomez

Political Science & Geography Faculty Publications

This paper contends that Maritime Domain Awareness Center (MDAC) design should be a holistic approach integrating established knowledge about human factors, decision making, cognitive tasks, complexity science, and human information interaction. The design effort should not be primarily a technology effort that focuses on computer screens, information feeds, display technologies, or user interfaces. The existence of a room with access to vast amounts of information and wall-to-wall video screens of ships, aircraft, weather data, and other regional information does not necessarily correlate to possessing situation awareness. Fundamental principles of human-centered information design should guide MDAC design and technology selection, and …


Fighting Mass Diffusion Of Fake News On Social Media, Abdallah Musmar Nov 2021

Fighting Mass Diffusion Of Fake News On Social Media, Abdallah Musmar

USF Tampa Graduate Theses and Dissertations

Fake news has been considered one of the most challenging problems in the last few years. The effects of spreading fake news over social media platforms are widely observed across the globe as the depth and velocity of fake news reach far more than real news (Vosoughi et al., 2018). The plan for the following dissertation is to investigate the mass spread of fake news across social media and propose a framework to fight the spread of fake news by mixing preventive methods that could hinder the overall percentage of fake news sharing. We plan to create a study on …


Cybersecurity Maturity Model Certification (Cmmc) Compliance For Dod Contractors, Sierra Burnett Nov 2021

Cybersecurity Maturity Model Certification (Cmmc) Compliance For Dod Contractors, Sierra Burnett

Cybersecurity Undergraduate Research Showcase

The DoD is currently taking a supply-chain risk management strategy to foster cybersecurity. This unique strategy is often referred to as CMMC which stands for “Cybersecurity Maturity Model Certification”. The approach requires that all the 300,000 DoD contractors acquire third-party authentication that may attain the requirements for the CMMC maturity level suitable to the work they desire to do for the DoD. CMMC typically examines the organization's capability to safeguard Federal Contract Information as well as CUI. It integrates various cybersecurity standards already in place and plots the best practices alongside processes to five maturity levels that range from the …


Investigating The Effects Of Dimension-Specific Sentiments On Product Sales: The Perspective Of Sentiment Preferences, Cuiqing Jiang, Jianfei Wang, Qian Tang, Xiaozhong Lyu Nov 2021

Investigating The Effects Of Dimension-Specific Sentiments On Product Sales: The Perspective Of Sentiment Preferences, Cuiqing Jiang, Jianfei Wang, Qian Tang, Xiaozhong Lyu

Research Collection School Of Computing and Information Systems

While literature has reached a consensus on the awareness effect of online word-of-mouth (eWOM), this paper studies its persuasive effect, specifically, the dimension-specific sentiment effects on product sales. We allow the sentiment information in eWOM along different product dimensions to have different persuasive effects on consumers’ purchase decisions. This occurs because of consumers’ sentiment preference, which is defined as the relative importance consumers place on various dimension-specific sentiments. We use an aspect-level sentiment analysis to derive the dimension-specific sentiments and PVAR (panel vector auto-regression) models to estimate their effects on product sales using a movie panel dataset. The findings show …


Artificial Intelligence As Augmenting Automation: Implications For Employment, F. Ted Tschang, Esteve Almirall Nov 2021

Artificial Intelligence As Augmenting Automation: Implications For Employment, F. Ted Tschang, Esteve Almirall

Research Collection Lee Kong Chian School Of Business

There has been great concern in recent years that artificial intelligence (AI) may cause widespread unemployment, but proponents say that AI augments existing jobs. Both of these positions have substance, but there is a need is to articulate the mechanisms by which AI may actually do both, and in the process, transform work and business organizations alike. We use economic studies showing past transformations automation wrought on the structure of employment and skills (such as the favouring of nonroutine skills) to articulate a ground for discussion. We then use case evidence of AI and automation to show how AI is …


Transforming Businesses With E-Commerce Intelligence, Yuanto Kusnadi, Gary Pan Nov 2021

Transforming Businesses With E-Commerce Intelligence, Yuanto Kusnadi, Gary Pan

Research Collection School Of Accountancy

2020 had been an extraordinary year as the Covid-19 pandemic struck almost all countries in the world and created an extraordinary impact on businesses worldwide. Singapore and many other Southeast Asian countries were not spared and had to implement lockdowns swiftly. To cope with physical store closures and the increased volume of online transactions, most businesses tried to revamp their business models and set up online stores to capitalise on the rise of the e-commerce wave. With the growing trend of online transactions, it has become imperative for companies operating in the Fast Moving Consumer Goods (FMCG) industry to track …


Emotional Analysis Of Learning Cybersecurity With Games Using Iot, Maria Valero, Md Jobair Hossain, Shahriar Sobhan Oct 2021

Emotional Analysis Of Learning Cybersecurity With Games Using Iot, Maria Valero, Md Jobair Hossain, Shahriar Sobhan

KSU Proceedings on Cybersecurity Education, Research and Practice

The constant rise of cyber-attacks poses an increasing demand for more qualified people with cybersecurity knowledge. Games have emerged as a well-fitted technology to engage users in learning processes. In this paper, we analyze the emotional parameters of people while learning cybersecurity through computer games. The data are gathered using a non-invasive Brain-Computer Interface (BCI) to study the signals directly from the users’ brains. We analyze six performance metrics (engagement, focus, excitement, stress, relaxation, and interest) of 12 users while playing computer games to measure the effectiveness of the games to attract the attention of the participants. Results show participants …


Resilience Vs. Prevention. Which Is The Better Cybersecurity Practice?, Frank Katz Oct 2021

Resilience Vs. Prevention. Which Is The Better Cybersecurity Practice?, Frank Katz

KSU Proceedings on Cybersecurity Education, Research and Practice

Students in multiple cohorts of our 3000 level Fundamentals of Information Systems Security course were given a discussion question where they had to either agree or disagree with the premise that given all the constant threats to our systems, we should dedicate more of our efforts to quickly repairing the damage of an attack rather than dedicate more of our time and energies to preventing such attacks. They were required to give their reasoning and provide sources to back up their analysis of his comment.

This paper will describe and explain the concept of cyber resiliency. It will then evaluate …


Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne Oct 2021

Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

Everyone knows what package shipping is, but not everyone knows what warshipping is. Corporate mailrooms are rarely considered as part of the cybersecurity attack surface of most organizations, but they offer physical access to millions of uninspected packages daily. UPS shipped 5.5 billion items last year, with their daily average being 21.9 million items and operating through 1,800 locations in 2020. FedEx shipped 6.5 million packages daily and operates 2,150 locations. The United States Postal Service delivered 143 billion pieces of mail in 2019. Increasingly the world’s consumers are relying on e-commerce, and during the recent COVID-19 pandemic, package deliveries …


Towards Assessing Password Workarounds And Perceived Risk To Data Breaches For Organizational Cybersecurity Risk Management Taxonomy, Michael J. Rooney, Yair Levy, Wei Li, Ajoy Kumar Oct 2021

Towards Assessing Password Workarounds And Perceived Risk To Data Breaches For Organizational Cybersecurity Risk Management Taxonomy, Michael J. Rooney, Yair Levy, Wei Li, Ajoy Kumar

KSU Proceedings on Cybersecurity Education, Research and Practice

Cybersecurity involves a broad range of techniques, including cyber-physical, managerial, and technical, while authentication provides a layer of protection for Information Systems (IS) against data breaches. The recent COVID-19 pandemic brought a tsunami of data breach incidents worldwide. Authentication serves as a mechanism for IS against unauthorized access utilizing various defense techniques, with the most popular and frequently used technique being passwords. However, the dramatic increase of user accounts over the past few decades has exposed the realization that technological measures alone cannot ensure high level of IS security; this leaves the end-users holding a critical role in protecting their …


Analyzing Robotics Software Vulnerabilities, Hossain Shahriar, Md Jobair Hossain Faruk, Shahriar Sobhan, Mohammad Nazim Oct 2021

Analyzing Robotics Software Vulnerabilities, Hossain Shahriar, Md Jobair Hossain Faruk, Shahriar Sobhan, Mohammad Nazim

KSU Proceedings on Cybersecurity Education, Research and Practice

Robots are widely used in our day-to-day life in various domains. For example, eldercare robots, such as CareO-Bots [1]are used to perform household tasks and provide mobility assistance [2]. Amazon uses manufacturing robots to accomplish manufacturing labor activities, such as welding and assembling equipment [2]. According to the International Data Corporation, spending on robotics is expected to reach USD 241.4 billion by the end of 2023 [4].

However, malicious users can exploit security vulnerabilities in hardware and software components of robotics systems to conduct security attacks and cause malfunction, i.e., deviate robots from their expected behaviors. Security attacks on robots …


A Taxonomy Of Cyberattacks Against Critical Infrastructure, Miloslava Plachkinova, Ace Vo Oct 2021

A Taxonomy Of Cyberattacks Against Critical Infrastructure, Miloslava Plachkinova, Ace Vo

KSU Proceedings on Cybersecurity Education, Research and Practice

The current study proposes a taxonomy to organize existing knowledge on cybercrimes against critical infrastructure such as power plants, water treatment facilities, dams, and nuclear facilities. Routine Activity Theory is used to inform a three-dimensional taxonomy with the following dimensions: hacker motivation (likely offender), cyber, physical, and cyber-physical components of any cyber-physical system (suitable target), and security (capable guardian). The focus of the study is to develop and evaluate the classification tool using Design Science Research (DSR) methodology. Publicly available data was used to evaluate the utility and usability of the proposed artifact by exploring three possible scenarios – Stuxnet, …


Informing Complexity: The Business Case For Managing Digital Twins Of Complex Process Facilities As A Valuable Asset, William Randell Mcnair Oct 2021

Informing Complexity: The Business Case For Managing Digital Twins Of Complex Process Facilities As A Valuable Asset, William Randell Mcnair

USF Tampa Graduate Theses and Dissertations

The Digital Twins of complex facilities, specifically 3D models created during their design, is a potentially valuable information asset. This three- article dissertation explores the business case for firms in the petrochemical process industry to manage throughout the facility lifecycle. A maturity model is provided to illustrate the stages of digital twin evolution and serves as a tool to help communicate each of the five levels of digital twin maturity achievable in various use cases. An industry analysis reviews existing literature and proposes a model to assess informing or insight value of digital twins from three perspectives. Next, an empirical …


Residential Curbside Recycle Context Analysis, Ntchanang Mpafe Oct 2021

Residential Curbside Recycle Context Analysis, Ntchanang Mpafe

USF Tampa Graduate Theses and Dissertations

Curbside recycling as a preferred mode of residential and municipal sustainability goals seems to have an overwhelming acceptance and adoption in the US. About 69.8 million out of 97.3 million (72%) single-family households in the United States have access to curbside recycling services (State of Curbside Recycling Report, 2020). Collectively, the programs divert about nine million tons of recyclables from landfill disposal each year (Cottom, 2019).

For a design that started in the 1980s in the US, its rapid universal adoption seems to have precluded a concerted effort in examining the coproduced nature (Households: service receptors and Municipalities: service providers) …


Using Role Play To Develop An Empathetic Mindset In Executive Education, Siu Loon Hoe, Tamsin Greulich-Smith Oct 2021

Using Role Play To Develop An Empathetic Mindset In Executive Education, Siu Loon Hoe, Tamsin Greulich-Smith

Research Collection School Of Computing and Information Systems

The purpose of this article is to discuss the importance of a role play activity as part of an experiential instructional strategy to develop an empathetic mindset among professionals, managers, and executives (PMEs) attending an executive education program in change management. This article provides an approach and process for management educators and facilitators of executive education programs to introduce and teach role play for the busy executives to learn about empathy. Role play is a useful teaching method that helps adult learners understand the importance of seeing things from another person’s point of view especially within a short period of …


Smart Contract Development: Challenges And Opportunities, Weiqin Zou, David Lo, Pavneet Singh Kochhar, Xuan-Bach D. Le, Xin Xia, Yang Feng, Zhenyu Chen, Baowen Xu Oct 2021

Smart Contract Development: Challenges And Opportunities, Weiqin Zou, David Lo, Pavneet Singh Kochhar, Xuan-Bach D. Le, Xin Xia, Yang Feng, Zhenyu Chen, Baowen Xu

Research Collection School Of Computing and Information Systems

Smart contract, a term which was originally coined to refer to the automation of legal contracts in general, has recently seen much interest due to the advent of blockchain technology. Recently, the term is popularly used to refer to low-level code scripts running on a blockchain platform. Our study focuses exclusively on this subset of smart contracts. Such smart contracts have increasingly been gaining ground, finding numerous important applications (e.g., crowdfunding) in the real world. Despite the increasing popularity, smart contract development still remains somewhat a mystery to many developers largely due to its special design and applications. Are there …


How ‘Human’ Should Robots Be?, Singapore Management University Sep 2021

How ‘Human’ Should Robots Be?, Singapore Management University

Perspectives@SMU

Hotel guests like interaction with devices that look and sound like them, but they can spark displeasure after service failures, new CUHK study shows


Enterprise Environment Modeling For Penetration Testing On The Openstack Virtualization Platform, Vincent Karovic Jr., Jakub Bartalos, Vincent Karovic, Michal Gregus Sep 2021

Enterprise Environment Modeling For Penetration Testing On The Openstack Virtualization Platform, Vincent Karovic Jr., Jakub Bartalos, Vincent Karovic, Michal Gregus

Journal of Global Business Insights

The article presents the design of a model environment for penetration testing of an organization using virtualization. The need for this model was based on the constantly increasing requirements for the security of information systems, both in legal terms and in accordance with international security standards. The model was created based on a specific team from the unnamed company. The virtual working environment offered the same functions as the physical environment. The virtual working environment was created in OpenStack and tested with a Linux distribution Kali Linux. We demonstrated that the virtual environment is functional and its security testable. Virtualizing …


Robust And Ethical Data Governance Critical To Growth In Digital Age, Themin Suwardy, Melvin Yong Sep 2021

Robust And Ethical Data Governance Critical To Growth In Digital Age, Themin Suwardy, Melvin Yong

Research Collection School Of Accountancy

With increasing digitalisation, and companies collecting an ever-increasing amount of their customer and business data, organisations have to become more accountable to stakeholders such as regulators, customers and investors on the issue of data. Observers say expectations are also increasing, with incidents of data breaches capturing much media attention. Just as corporate governance encompasses more than just compliance, experts say data governance is more than just data protection and security but also about creating value.


Artificial Intelligence And Work: Two Perspectives, Steven Miller, Thomas H. Davenport Sep 2021

Artificial Intelligence And Work: Two Perspectives, Steven Miller, Thomas H. Davenport

Research Collection School Of Computing and Information Systems

One of the most important issues in contemporary societies is the impact of intelligent technologies on human work. For an empirical perspective on the issue, we recently completed 30 case studies of people collaborating with AI-enabled smart machines. Twenty-four were from North America, mostly in the US. Six were from Southeast Asia, mostly in Singapore. We compare some of our observations to one of the broadest academic examinations of the issue. In particular, we focus on our case study observations with regard to key findings from the MIT Task Force on the Work of the Future report.