Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (618)
- Kennesaw State University (228)
- Selected Works (227)
- Walden University (195)
- New Jersey Institute of Technology (129)
-
- SelectedWorks (122)
- Old Dominion University (98)
- Clark University (70)
- Missouri University of Science and Technology (36)
- University of South Florida (34)
- Air Force Institute of Technology (32)
- Edith Cowan University (26)
- Claremont Colleges (23)
- Institute of Business Administration (23)
- California State University, San Bernardino (21)
- Nova Southeastern University (20)
- University of Dayton (20)
- Zayed University (20)
- University of Texas Rio Grande Valley (18)
- University of Nevada, Las Vegas (16)
- Sacred Heart University (13)
- Purdue University (12)
- University of Nebraska at Omaha (12)
- University of Pittsburgh School of Law (12)
- University of Wisconsin Milwaukee (12)
- Portland State University (11)
- The University of San Francisco (11)
- University of Arkansas, Fayetteville (11)
- Liberty University (10)
- University of Wollongong (10)
- Keyword
-
- Architecture Arts and Humanities Business Education Engineering Law Life Sciences Medicine and Health Sciences Physical Sciences and Mathematics Social and Behavioral Sciences (72)
- Cybersecurity (65)
- Artificial intelligence (61)
- Machine learning (52)
- Information technology (44)
-
- Technology (41)
- Innovation (39)
- Information security (36)
- Management (36)
- MPA (33)
- Privacy (30)
- Blockchain (29)
- Computer science (28)
- Security (28)
- Social media (27)
- Information systems (26)
- Information Technology (24)
- Artificial Intelligence (21)
- Data mining (21)
- Project management (21)
- Cloud computing (19)
- Machine Learning (19)
- Singapore (19)
- Software (19)
- E-commerce (18)
- Education (18)
- Algorithms (17)
- Information Security (17)
- MSIT (17)
- Sustainability (17)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (529)
- Walden Dissertations and Doctoral Studies (192)
- Journal of Cybersecurity Education, Research and Practice (105)
- Dissertations (99)
- KSU Proceedings on Cybersecurity Education, Research and Practice (89)
-
- Philadelphia University, Jordan (78)
- School of Professional Studies (70)
- Theses and Dissertations (48)
- Theses (36)
- Arcot Desai NARASIMHALU (33)
- Research Collection Lee Kong Chian School Of Business (27)
- Professor Katina Michael (25)
- Information Technology & Decision Sciences Faculty Publications (24)
- USF Tampa Graduate Theses and Dissertations (24)
- Dr Deogratias Harorimana (23)
- Business and Information Technology Faculty Research & Creative Works (21)
- International Conference on Information and Communication Technologies (21)
- All Works (20)
- CCE Theses and Dissertations (20)
- CGU Faculty Publications and Research (19)
- MIS/OM/DS Faculty Publications (19)
- Shih-Fen CHENG (18)
- Information Systems Faculty Publications and Presentations (15)
- Jan Kallberg (15)
- Dissertations and Theses Collection (Open Access) (13)
- Faculty Articles (13)
- Engineering Management & Systems Engineering Theses & Dissertations (12)
- The African Journal of Information Systems (12)
- Theses Digitization Project (12)
- Business Analytics and Information Systems (11)
- Publication Type
Articles 331 - 360 of 2385
Full-Text Articles in Business
Machine Infelicity In A Poignant Visitor Setting: Comparing Human And Ai’S Ability To Analyze Discourse, Martin Maccarthy, Hairong Shan
Machine Infelicity In A Poignant Visitor Setting: Comparing Human And Ai’S Ability To Analyze Discourse, Martin Maccarthy, Hairong Shan
Research outputs 2014 to 2021
This study compares the efficacy of computer and human analytics in a commemorative setting. Both deductive and inductive reasoning are compared using the same data across both methods. The data comprises 2490 non-repeated, non-dialogical social media comments from the popular touristic site Tripadvisor. Included in the analysis is participant observation at two Anzac commemorative sites, one in Western Australia and one in Northern France. The data is then processed using both Leximancer V4.51 and Dialectic Thematic Analysis. The findings demonstrate artificial intelligence (AI) was incapable of insight beyond metric-driven content analysis. While fully deduced by human analysis the metamodel was …
Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson
Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson
Walden Dissertations and Doctoral Studies
Business and IT leaders in financial services are concerned with the limited benefits they are reaping from information technology outsourcing (ITO) projects, despite continued heavy investments in ITO. Grounded in the transaction cost, agency, and resource-based view theories, the purpose of this quantitative correlational study was to examine the relationship between vendor/client complementarity, vendor technology maturity, vendor financial stability, and ITO success. Participants were 65 business and IT leaders in financial institutions engaged in ITO projects. The result of the multiple linear regression was significant, F(3, 61) = 4.845, p = .004, R2 = .192. In the final analysis, vendor/client …
Strategies That Improve Ux (User Experience) Design Through Product Innovation, Jibing Zhao
Strategies That Improve Ux (User Experience) Design Through Product Innovation, Jibing Zhao
Walden Dissertations and Doctoral Studies
User Experience (UX) design improvement can alter business results. Information technology (IT) company leaders are concerned with UX design improvement, as it is the number one indication of product innovation success and user satisfaction. Grounded in Christensen’s disruptive innovation theory, the purpose of the qualitative single case study was to explore strategies IT company leaders and UX designers used to identify critical UX design elements that lead to improved product innovations. The participants were five IT company leaders and a focus group of four UX designers employed by a sizeable telecom organization in Beijing, China. The data were collected from …
Strategies For Adoption Of Innovative Information Technology For Business Performance Improvement, James Melvin Smith
Strategies For Adoption Of Innovative Information Technology For Business Performance Improvement, James Melvin Smith
Walden Dissertations and Doctoral Studies
Business leaders do not often consider investing in informational technology (IT) to increase performance. These business leaders lack knowledge of innovative IT adoption strategies to expand their revenue and reduce costs to sustain a competitive advantage. Grounded in the technology-organization-environment (TOE) theory, the purpose of this qualitative multiple case study was to explore IT innovation adoption strategies business leaders use to increase performance. The participants were four successful business leaders selected from finalists for international entrepreneurial awards presented annually in the Mid-Atlantic region of the United States. The data were collected using semistructured telephone interviews, media releases, and online publications. …
Enterprise Resource Planning Implementation Strategies In Small- And Medium-Sized Manufacturing Enterprises, Tatianna Gilliam
Enterprise Resource Planning Implementation Strategies In Small- And Medium-Sized Manufacturing Enterprises, Tatianna Gilliam
Walden Dissertations and Doctoral Studies
The difficulty SME leaders of manufacturing firms experience in the executing of enterprise resource planning (ERP) systems threatens the longevity of innovative change within firms seeking to adopt ERP systems. Grounded in the diffusion of innovation theory, the purpose of this multiple case study was to examine critical success factors used to successfully implement ERP systems. The participants were four ERP business leaders of small to medium size manufacturing firms based on the east and west coasts of the United States. Data were collected using semistructured online interviews and a review of company documents. Through thematic analysis, five themes were …
Strategies For Small-And Medium-Sized Business Growth And Survival, Abiodun Nestamanuel Ogunmuyiwa
Strategies For Small-And Medium-Sized Business Growth And Survival, Abiodun Nestamanuel Ogunmuyiwa
Walden Dissertations and Doctoral Studies
In the United States, approximately 50% of small businesses fail within the first five years (Small Business Administration, 2018b). Small and medium sized enterprises (SMEs) owners and managers would benefit from strategies to identify and mitigate constraints to sustain their business beyond the first five years of business operation. Grounded in the system theory framework, the purpose of this qualitative multiple case study was to explore strategies leaders of small and medium sized enterprises (SMEs) in Austin, Texas, used to grow and sustain their business’s operations beyond five years. The participants were five small and medium sized businesses owners in …
Strategies For Cryptocurrency Adoption In Contemporary Businesses, Jacqueline Rodriguez
Strategies For Cryptocurrency Adoption In Contemporary Businesses, Jacqueline Rodriguez
Walden Dissertations and Doctoral Studies
Millions of Bitcoin transactions occur daily, worth nearly $2 billion annually. With the proliferation of cryptocurrency markets, the reluctance to adopt the currency as an alternate payment method could cause businesses to forgo growth opportunities within this expanding market. Grounded in the diffusion of innovation theory, the purpose of this qualitative multiple-case study was to explore strategies business leaders use to respond to the alternative payment concerns perpetuated by cryptocurrency markets. The participants comprised 6 business leaders who effectively employed cryptocurrency adoption strategies. Data were collected through semistructured interviews, corporate documents, and other company social media resources. Thematic analysis of …
Increasing Nurse Leader Knowledge And Awareness Of Information And Communication Technologies, Cory Stephens
Increasing Nurse Leader Knowledge And Awareness Of Information And Communication Technologies, Cory Stephens
Walden Dissertations and Doctoral Studies
Due to the recent coronavirus disease (COVID-19) pandemic, rapid technological innovation and nursing practice transformation exposed a deepening divide in the knowledge and awareness of information and communication technologies (ICT) among nurses. This technological skills gap undermines the benefits of ICT to nursing practice such as increased nurse satisfaction, improved care quality, and reduced costs. Nurse leaders are positioned to promote the use of ICT among nurses but may suffer from the same knowledge deficit of ICT as their followers. Guided by Locsin’s technological competencies as caring in nursing theory, Staggers and Parks’ nurse-computer interaction framework, and Covell’s nursing intellectual …
Strategies For Cybercrime Prevention In Information Technology Businesses, Sophfronia G. Tucker
Strategies For Cybercrime Prevention In Information Technology Businesses, Sophfronia G. Tucker
Walden Dissertations and Doctoral Studies
Cybercrime continues to be a devastating phenomenon, impacting individuals and businesses across the globe. Information technology (IT) businesses need solutions to defend and secure their data and networks from cyberattacks. Grounded in general systems theory and transformational leadership theory, the purpose of this qualitative multiple case study was to explore strategies IT business leaders use to protect their systems from a cyberattack. The participants included six IT business leaders with experience in cybersecurity or system security in the Midlands region of South Carolina. Data were collected using semistructured interviews and reviews of government standards documents; data were analyzed using thematic …
Employee Training Strategies For New Technology Implementation In Small Business, Eddy Varela
Employee Training Strategies For New Technology Implementation In Small Business, Eddy Varela
Walden Dissertations and Doctoral Studies
Failure to implement new technology creates a barrier to success for small businesses. Small business owners must create competitive advantages by implementing new technology as there is a need to maintain an advantage when competing in the local market economy. Grounded in the human capital theory, the purpose of this qualitative multiple case study was to explore the employee training strategies small business owners use to implement new technology. The participants were five small business owners in Central Florida who used employee training strategies to implement new technologies Data were collected using (a) semistructured interviews, (b) member checking interviews, (c) …
Strategies For Implementing Critical Success Factors For Improving Information Technology Information Systems’ Performance In Financial Organizations, Sherri L. Williams
Strategies For Implementing Critical Success Factors For Improving Information Technology Information Systems’ Performance In Financial Organizations, Sherri L. Williams
Walden Dissertations and Doctoral Studies
Information technology infrastructure library (ITIL) business leaders lack strategies for implementing critical success factors (CSFs) to promote organizational effectiveness and project success. As a result, ITIL leaders may experience less project success if CSF strategies are not effectively implemented. Grounded in the balanced scorecard (BSC) theory, this qualitative multiple case study aimed to explore strategies ITIL business leaders use to implement CSFs successfully to improve organizational efficiency for project success. The participants comprised five ITIL business leaders in the financial industry located in the southwestern region of the United States who successfully implemented strategies to implement CSFs to improve organizational …
Cybersecurity In Fintech Companies, Efstratios Zouros
Cybersecurity In Fintech Companies, Efstratios Zouros
Cybersecurity Undergraduate Research Showcase
Have you recently accessed your bank account online? Have you accessed any financial instrument through your computer or your mobile device? If you are reading this, chances are you have. Every time you utilize those services, you ultimately put your trust in the financial institutions that offer them. You trust that they can securely keep your private information, while also keeping your savings safe. Ultimately, there is a certain dependability and trust in financial institutions that have been present on earth before most of us.
Strategies Business Leaders Use To Mitigate Online Credit Card Fraud, Clarissa Rosario-Tavarez
Strategies Business Leaders Use To Mitigate Online Credit Card Fraud, Clarissa Rosario-Tavarez
Walden Dissertations and Doctoral Studies
Online credit card fraud targeting banks, customers, and businesses costs millions of U.S. dollars annually. Online business leaders face challenges securing and regulating the online payment processing environment. Grounded in the situational crime prevention theory, the purpose of this qualitative multiple case study was to explore strategies online business leaders use to mitigate the loss of revenue caused by online credit card fraud. The participants comprised five online business leaders of an organization in the Southwest of the United States, who implemented strategies that successfully mitigated revenue losses due to online credit card fraud. The data were collected from semistructured …
The Impact Of A Gencyber Camp On In-Service Teachers’ Tpack, Kevin M. Thomas, Jessica Ivy, Kristin Cook, Robert R. Kelley
The Impact Of A Gencyber Camp On In-Service Teachers’ Tpack, Kevin M. Thomas, Jessica Ivy, Kristin Cook, Robert R. Kelley
Journal of Cybersecurity Education, Research and Practice
The purpose of this study was to examine the impact of a GenCyber camp curriculum on teachers’ technology, pedagogy, and content knowledge (TPACK). The camp was designed to engage participants in developing the knowledge and skills to incorporate GenCyber Cybersecurity First Principles and GenCyber Cybersecurity Concepts (GenCyber, 2019) into their curriculums. Participants (37 middle and high school teachers from a variety of disciplines) attended one of two weeklong camps held at a Midwestern liberal arts university. Using the TPACK Self-Reflection and TPACK Self-Assessment Surveys, pre- and post-camp data were collected from participants. Findings indicate that participants demonstrated an increase in …
Successful Strategies For Adopting Electronic Medical Records Systems At Hospitals, Vazi Okhandiar
Successful Strategies For Adopting Electronic Medical Records Systems At Hospitals, Vazi Okhandiar
Walden Dissertations and Doctoral Studies
Some healthcare leaders lack strategies to successfully implement electronic medical record (EMR) systems to improve patient care efficiency and effectiveness. Grounded in the technology acceptance model, the purpose of this qualitative multiple case study was to explore strategies healthcare leaders use to implement EMR systems. The participants comprised five healthcare leaders who implemented EMRs in U.S. hospitals. Data were collected using semistructured interviews, government websites, and relevant documents and analyzed using Yin’s five-step data analysis method. Three themes emerged: (a) adequate training, (b) workflow analysis, and (c) technical support. A key recommendation is for management to provide customized training to …
Realtime Event Detection In Sports Sensor Data With Machine Learning, Mallory Cashman
Realtime Event Detection In Sports Sensor Data With Machine Learning, Mallory Cashman
Honors Theses and Capstones
Machine learning models can be trained to classify time series based sports motion data, without reliance on assumptions about the capabilities of the users or sensors. This can be applied to predict the count of occurrences of an event in a time period. The experiment for this research uses lacrosse data, collected in partnership with SPAITR - a UNH undergraduate startup developing motion tracking devices for lacrosse. Decision Tree and Support Vector Machine (SVM) models are trained and perform with high success rates. These models improve upon previous work in human motion event detection and can be used a reference …
Reconstructability Analysis: Discrete Multivariate Modeling, Martin Zwick
Reconstructability Analysis: Discrete Multivariate Modeling, Martin Zwick
Systems Science Faculty Publications and Presentations
An introduction to Reconstructability Analysis for the Discrete Multivariate Modeling course and for other purposes.
Development Of A Framework To Support Informed Shipbuilding Based On Supply Chain Disruptions, Katherine Smith, Rafael Diaz, Yuzhong Shen
Development Of A Framework To Support Informed Shipbuilding Based On Supply Chain Disruptions, Katherine Smith, Rafael Diaz, Yuzhong Shen
VMASC Publications
In addition to stresses induced by the Covid-19 pandemic, supply chains worldwide have been growing more complex while facing a continuous onslaught of disruptions. This paper presents an analysis and extension of a graph based model for modeling and simulating the effects of such disruptions. The graph based model combines a Bayesian network approach for simulating risks with a network dependency analysis approach for simulating the propagation of disruptions through the network over time. The initial analysis provides evidence supporting extension to for using a multi-layered approach allowing for the inclusion of cyclic features in supply chain models. Initial results …
Editorial, Michael E. Whitman, Herbert J. Mattord, Hossain Shahriar
Editorial, Michael E. Whitman, Herbert J. Mattord, Hossain Shahriar
Journal of Cybersecurity Education, Research and Practice
Since 2016, it has been the mission of the Journal of Cybersecurity Education, Research, and Practice (JCERP) to be a premier outlet for high-quality information security and cybersecurity-related articles of interest to teaching faculty and students. This is the 13th edition of the (JCERP) and, as ever, we are seeking authors who produce high-quality research and practice-oriented articles focused on the development and delivery of information security and cybersecurity curriculum, innovation in applied scholarship, and industry best practices in information security and cybersecurity in the enterprise for double-blind review and publication. The journal invites submissions on Information Security, Cybersecurity, …
The Effects Of Recommender System On Sales Promotion Of High-Value Products: Evidence From A Field Experiment In The Real Estate Industry, Lian Liu
Dissertations and Theses Collection (Open Access)
Real estate sales industry in China has long suffered the problem of inefficient matching of customers to projects. Inspired by the design of recommender systems, which have been widely used in the online retail industry, and are shown to facility customer-product matching and improve sales, we apply this system to the real estate sales industry using a novel approach. Instead of recommending products to customers, we suggest the best potential customers to salespeople with whom they will conduct sales with. Using city-wide sales data from the largest real estate sales company in China, we first develop a recommend system based …
The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He
The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He
Information Technology & Decision Sciences Faculty Publications
This paper identifies opportunities for potential theoretical and practical improvements in employees' awareness of cybersecurity and their motivational behavior to protect themselves and their organizations from cyberattacks using the protection motivation theory. In addition, it contributes to the literature by examining additional variables and mediators besides the core constructs of the Protection Motivation Model (PMT). This article uses empirical data and structural equation modeling to test the antecedents and mediators of employees' cybersecurity motivational behavior. The study offers theoretical and pragmatic guidance for cybersecurity programs. First, the model developed in this study can partially explain how people may change their …
The State Of The Art Of Information Integration In Space Applications, Zhuming Bi, K. L. Yung, Andrew W.H. Ip., Yuk Ming Tang, Chris W.J. Zhang, Li Da Xu
The State Of The Art Of Information Integration In Space Applications, Zhuming Bi, K. L. Yung, Andrew W.H. Ip., Yuk Ming Tang, Chris W.J. Zhang, Li Da Xu
Information Technology & Decision Sciences Faculty Publications
This paper aims to present a comprehensive survey on information integration (II) in space informatics. With an ever-increasing scale and dynamics of complex space systems, II has become essential in dealing with the complexity, changes, dynamics, and uncertainties of space systems. The applications of space II (SII) require addressing some distinctive functional requirements (FRs) of heterogeneity, networking, communication, security, latency, and resilience; while limited works are available to examine recent advances of SII thoroughly. This survey helps to gain the understanding of the state of the art of SII in sense that (1) technical drivers for SII are discussed and …
Impact Of Knowledge Management Processes Upon Job Satisfaction And Job Performance, George Reid Cooper
Impact Of Knowledge Management Processes Upon Job Satisfaction And Job Performance, George Reid Cooper
CCE Theses and Dissertations
While we might know anecdotally that the implementation of knowledge management in an organization improves job satisfaction and job performance, there are limited empirical studies that assess this assumption. There have been studies done in this area but the results vary in terms of which knowledge management processes have an impact upon job satisfaction and which do not. Similarly, many studies make assumptions that job satisfaction leads to improved job performance without testing for that variable. The goal of this dissertation is to assess whether the knowledge management processes have a positive impact upon job satisfaction and job performance and …
Fake Review Detection, Michael Husk, Faryaneh Poursardar (Mentor)
Fake Review Detection, Michael Husk, Faryaneh Poursardar (Mentor)
Computer & Information Science: Research Experiences for Undergraduates in Disinformation Detection and Analytics
No abstract provided.
Module 1: Introduction To Technology Foresight, Risk Management, And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar
Module 1: Introduction To Technology Foresight, Risk Management, And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar
Developing Technology Foresight: Case Study of AI in InsurTech
Instructional Module 1 for course, Developing Technology Foresight: Case Study of AI in InsurTech.
Module 2: Case Studies Of Ai And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar
Module 2: Case Studies Of Ai And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar
Developing Technology Foresight: Case Study of AI in InsurTech
Instructional Module 2 for course, Developing Technology Foresight: Case Study of AI in InsurTech.
Module 3: Technology Foresight And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar
Module 3: Technology Foresight And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar
Developing Technology Foresight: Case Study of AI in InsurTech
Instructional Module 3 for course, Developing Technology Foresight: Case Study of AI in InsurTech.
Partnering For Value Perfection And Business Sustainability In The Cloud Services Brokerage Market, Richard Shang, Robert John Kauffman
Partnering For Value Perfection And Business Sustainability In The Cloud Services Brokerage Market, Richard Shang, Robert John Kauffman
Research Collection School Of Computing and Information Systems
The cloud computing and services market has advanced in the past ten years. They now include most IT services from fundamental computing to cutting-edge AI capabilities. With the widespread adoption of cloud services, clients are facing the fact that they are utilizing cloud resources at a sub-optimal level. Cloud services brokers (CSBs) grew from the market to fill the needs for cloud resource management and risk mitigation. Based on analysis of the cloud market and the case of cloud services brokerage and related activities in North America, we offer theoretical analysis for how value creation works, its impacts on the …
Defining Smart Contract Defects On Ethereum, Jiachi Chen, Xin Xia, David Lo, John Grundy, Xiapu Luo, Ting Chen
Defining Smart Contract Defects On Ethereum, Jiachi Chen, Xin Xia, David Lo, John Grundy, Xiapu Luo, Ting Chen
Research Collection School Of Computing and Information Systems
Smart contracts are programs running on a blockchain. They are immutable to change, and hence can not be patched for bugs once deployed. Thus it is critical to ensure they are bug-free and well-designed before deployment. A Contract defect is an error, flaw or fault in a smart contract that causes it to produce an incorrect or unexpected result, or to behave in unintended ways. The detection of contract defects is a method to avoid potential bugs and improve the design of existing code. Since smart contracts contain numerous distinctive features, such as the gas system. decentralized, it is important …
Estimating Efforts For Various Activities In Agile Software Development: An Empirical Study, Lan Cao
Estimating Efforts For Various Activities In Agile Software Development: An Empirical Study, Lan Cao
Information Technology & Decision Sciences Faculty Publications
Effort estimation is an important practice in agile software development. The agile community believes that developers’ estimates get more accurate over time due to the cumulative effect of learning from short and frequent feedback. However, there is no empirical evidence of an improvement in estimation accuracy over time, nor have prior studies examined effort estimation in different development activities, which are associated with substantial costs. This study fills the knowledge gap in the field of software estimation in agile software development by investigating estimations across time and different development activities based on data collected from a large agile project. This …