Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 331 - 360 of 2385

Full-Text Articles in Business

Machine Infelicity In A Poignant Visitor Setting: Comparing Human And Ai’S Ability To Analyze Discourse, Martin Maccarthy, Hairong Shan Jan 2022

Machine Infelicity In A Poignant Visitor Setting: Comparing Human And Ai’S Ability To Analyze Discourse, Martin Maccarthy, Hairong Shan

Research outputs 2014 to 2021

This study compares the efficacy of computer and human analytics in a commemorative setting. Both deductive and inductive reasoning are compared using the same data across both methods. The data comprises 2490 non-repeated, non-dialogical social media comments from the popular touristic site Tripadvisor. Included in the analysis is participant observation at two Anzac commemorative sites, one in Western Australia and one in Northern France. The data is then processed using both Leximancer V4.51 and Dialectic Thematic Analysis. The findings demonstrate artificial intelligence (AI) was incapable of insight beyond metric-driven content analysis. While fully deduced by human analysis the metamodel was …


Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson Jan 2022

Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson

Walden Dissertations and Doctoral Studies

Business and IT leaders in financial services are concerned with the limited benefits they are reaping from information technology outsourcing (ITO) projects, despite continued heavy investments in ITO. Grounded in the transaction cost, agency, and resource-based view theories, the purpose of this quantitative correlational study was to examine the relationship between vendor/client complementarity, vendor technology maturity, vendor financial stability, and ITO success. Participants were 65 business and IT leaders in financial institutions engaged in ITO projects. The result of the multiple linear regression was significant, F(3, 61) = 4.845, p = .004, R2 = .192. In the final analysis, vendor/client …


Strategies That Improve Ux (User Experience) Design Through Product Innovation, Jibing Zhao Jan 2022

Strategies That Improve Ux (User Experience) Design Through Product Innovation, Jibing Zhao

Walden Dissertations and Doctoral Studies

User Experience (UX) design improvement can alter business results. Information technology (IT) company leaders are concerned with UX design improvement, as it is the number one indication of product innovation success and user satisfaction. Grounded in Christensen’s disruptive innovation theory, the purpose of the qualitative single case study was to explore strategies IT company leaders and UX designers used to identify critical UX design elements that lead to improved product innovations. The participants were five IT company leaders and a focus group of four UX designers employed by a sizeable telecom organization in Beijing, China. The data were collected from …


Strategies For Adoption Of Innovative Information Technology For Business Performance Improvement, James Melvin Smith Jan 2022

Strategies For Adoption Of Innovative Information Technology For Business Performance Improvement, James Melvin Smith

Walden Dissertations and Doctoral Studies

Business leaders do not often consider investing in informational technology (IT) to increase performance. These business leaders lack knowledge of innovative IT adoption strategies to expand their revenue and reduce costs to sustain a competitive advantage. Grounded in the technology-organization-environment (TOE) theory, the purpose of this qualitative multiple case study was to explore IT innovation adoption strategies business leaders use to increase performance. The participants were four successful business leaders selected from finalists for international entrepreneurial awards presented annually in the Mid-Atlantic region of the United States. The data were collected using semistructured telephone interviews, media releases, and online publications. …


Enterprise Resource Planning Implementation Strategies In Small- And Medium-Sized Manufacturing Enterprises, Tatianna Gilliam Jan 2022

Enterprise Resource Planning Implementation Strategies In Small- And Medium-Sized Manufacturing Enterprises, Tatianna Gilliam

Walden Dissertations and Doctoral Studies

The difficulty SME leaders of manufacturing firms experience in the executing of enterprise resource planning (ERP) systems threatens the longevity of innovative change within firms seeking to adopt ERP systems. Grounded in the diffusion of innovation theory, the purpose of this multiple case study was to examine critical success factors used to successfully implement ERP systems. The participants were four ERP business leaders of small to medium size manufacturing firms based on the east and west coasts of the United States. Data were collected using semistructured online interviews and a review of company documents. Through thematic analysis, five themes were …


Strategies For Small-And Medium-Sized Business Growth And Survival, Abiodun Nestamanuel Ogunmuyiwa Jan 2022

Strategies For Small-And Medium-Sized Business Growth And Survival, Abiodun Nestamanuel Ogunmuyiwa

Walden Dissertations and Doctoral Studies

In the United States, approximately 50% of small businesses fail within the first five years (Small Business Administration, 2018b). Small and medium sized enterprises (SMEs) owners and managers would benefit from strategies to identify and mitigate constraints to sustain their business beyond the first five years of business operation. Grounded in the system theory framework, the purpose of this qualitative multiple case study was to explore strategies leaders of small and medium sized enterprises (SMEs) in Austin, Texas, used to grow and sustain their business’s operations beyond five years. The participants were five small and medium sized businesses owners in …


Strategies For Cryptocurrency Adoption In Contemporary Businesses, Jacqueline Rodriguez Jan 2022

Strategies For Cryptocurrency Adoption In Contemporary Businesses, Jacqueline Rodriguez

Walden Dissertations and Doctoral Studies

Millions of Bitcoin transactions occur daily, worth nearly $2 billion annually. With the proliferation of cryptocurrency markets, the reluctance to adopt the currency as an alternate payment method could cause businesses to forgo growth opportunities within this expanding market. Grounded in the diffusion of innovation theory, the purpose of this qualitative multiple-case study was to explore strategies business leaders use to respond to the alternative payment concerns perpetuated by cryptocurrency markets. The participants comprised 6 business leaders who effectively employed cryptocurrency adoption strategies. Data were collected through semistructured interviews, corporate documents, and other company social media resources. Thematic analysis of …


Increasing Nurse Leader Knowledge And Awareness Of Information And Communication Technologies, Cory Stephens Jan 2022

Increasing Nurse Leader Knowledge And Awareness Of Information And Communication Technologies, Cory Stephens

Walden Dissertations and Doctoral Studies

Due to the recent coronavirus disease (COVID-19) pandemic, rapid technological innovation and nursing practice transformation exposed a deepening divide in the knowledge and awareness of information and communication technologies (ICT) among nurses. This technological skills gap undermines the benefits of ICT to nursing practice such as increased nurse satisfaction, improved care quality, and reduced costs. Nurse leaders are positioned to promote the use of ICT among nurses but may suffer from the same knowledge deficit of ICT as their followers. Guided by Locsin’s technological competencies as caring in nursing theory, Staggers and Parks’ nurse-computer interaction framework, and Covell’s nursing intellectual …


Strategies For Cybercrime Prevention In Information Technology Businesses, Sophfronia G. Tucker Jan 2022

Strategies For Cybercrime Prevention In Information Technology Businesses, Sophfronia G. Tucker

Walden Dissertations and Doctoral Studies

Cybercrime continues to be a devastating phenomenon, impacting individuals and businesses across the globe. Information technology (IT) businesses need solutions to defend and secure their data and networks from cyberattacks. Grounded in general systems theory and transformational leadership theory, the purpose of this qualitative multiple case study was to explore strategies IT business leaders use to protect their systems from a cyberattack. The participants included six IT business leaders with experience in cybersecurity or system security in the Midlands region of South Carolina. Data were collected using semistructured interviews and reviews of government standards documents; data were analyzed using thematic …


Employee Training Strategies For New Technology Implementation In Small Business, Eddy Varela Jan 2022

Employee Training Strategies For New Technology Implementation In Small Business, Eddy Varela

Walden Dissertations and Doctoral Studies

Failure to implement new technology creates a barrier to success for small businesses. Small business owners must create competitive advantages by implementing new technology as there is a need to maintain an advantage when competing in the local market economy. Grounded in the human capital theory, the purpose of this qualitative multiple case study was to explore the employee training strategies small business owners use to implement new technology. The participants were five small business owners in Central Florida who used employee training strategies to implement new technologies Data were collected using (a) semistructured interviews, (b) member checking interviews, (c) …


Strategies For Implementing Critical Success Factors For Improving Information Technology Information Systems’ Performance In Financial Organizations, Sherri L. Williams Jan 2022

Strategies For Implementing Critical Success Factors For Improving Information Technology Information Systems’ Performance In Financial Organizations, Sherri L. Williams

Walden Dissertations and Doctoral Studies

Information technology infrastructure library (ITIL) business leaders lack strategies for implementing critical success factors (CSFs) to promote organizational effectiveness and project success. As a result, ITIL leaders may experience less project success if CSF strategies are not effectively implemented. Grounded in the balanced scorecard (BSC) theory, this qualitative multiple case study aimed to explore strategies ITIL business leaders use to implement CSFs successfully to improve organizational efficiency for project success. The participants comprised five ITIL business leaders in the financial industry located in the southwestern region of the United States who successfully implemented strategies to implement CSFs to improve organizational …


Cybersecurity In Fintech Companies, Efstratios Zouros Jan 2022

Cybersecurity In Fintech Companies, Efstratios Zouros

Cybersecurity Undergraduate Research Showcase

Have you recently accessed your bank account online? Have you accessed any financial instrument through your computer or your mobile device? If you are reading this, chances are you have. Every time you utilize those services, you ultimately put your trust in the financial institutions that offer them. You trust that they can securely keep your private information, while also keeping your savings safe. Ultimately, there is a certain dependability and trust in financial institutions that have been present on earth before most of us.


Strategies Business Leaders Use To Mitigate Online Credit Card Fraud, Clarissa Rosario-Tavarez Jan 2022

Strategies Business Leaders Use To Mitigate Online Credit Card Fraud, Clarissa Rosario-Tavarez

Walden Dissertations and Doctoral Studies

Online credit card fraud targeting banks, customers, and businesses costs millions of U.S. dollars annually. Online business leaders face challenges securing and regulating the online payment processing environment. Grounded in the situational crime prevention theory, the purpose of this qualitative multiple case study was to explore strategies online business leaders use to mitigate the loss of revenue caused by online credit card fraud. The participants comprised five online business leaders of an organization in the Southwest of the United States, who implemented strategies that successfully mitigated revenue losses due to online credit card fraud. The data were collected from semistructured …


The Impact Of A Gencyber Camp On In-Service Teachers’ Tpack, Kevin M. Thomas, Jessica Ivy, Kristin Cook, Robert R. Kelley Jan 2022

The Impact Of A Gencyber Camp On In-Service Teachers’ Tpack, Kevin M. Thomas, Jessica Ivy, Kristin Cook, Robert R. Kelley

Journal of Cybersecurity Education, Research and Practice

The purpose of this study was to examine the impact of a GenCyber camp curriculum on teachers’ technology, pedagogy, and content knowledge (TPACK). The camp was designed to engage participants in developing the knowledge and skills to incorporate GenCyber Cybersecurity First Principles and GenCyber Cybersecurity Concepts (GenCyber, 2019) into their curriculums. Participants (37 middle and high school teachers from a variety of disciplines) attended one of two weeklong camps held at a Midwestern liberal arts university. Using the TPACK Self-Reflection and TPACK Self-Assessment Surveys, pre- and post-camp data were collected from participants. Findings indicate that participants demonstrated an increase in …


Successful Strategies For Adopting Electronic Medical Records Systems At Hospitals, Vazi Okhandiar Jan 2022

Successful Strategies For Adopting Electronic Medical Records Systems At Hospitals, Vazi Okhandiar

Walden Dissertations and Doctoral Studies

Some healthcare leaders lack strategies to successfully implement electronic medical record (EMR) systems to improve patient care efficiency and effectiveness. Grounded in the technology acceptance model, the purpose of this qualitative multiple case study was to explore strategies healthcare leaders use to implement EMR systems. The participants comprised five healthcare leaders who implemented EMRs in U.S. hospitals. Data were collected using semistructured interviews, government websites, and relevant documents and analyzed using Yin’s five-step data analysis method. Three themes emerged: (a) adequate training, (b) workflow analysis, and (c) technical support. A key recommendation is for management to provide customized training to …


Realtime Event Detection In Sports Sensor Data With Machine Learning, Mallory Cashman Jan 2022

Realtime Event Detection In Sports Sensor Data With Machine Learning, Mallory Cashman

Honors Theses and Capstones

Machine learning models can be trained to classify time series based sports motion data, without reliance on assumptions about the capabilities of the users or sensors. This can be applied to predict the count of occurrences of an event in a time period. The experiment for this research uses lacrosse data, collected in partnership with SPAITR - a UNH undergraduate startup developing motion tracking devices for lacrosse. Decision Tree and Support Vector Machine (SVM) models are trained and perform with high success rates. These models improve upon previous work in human motion event detection and can be used a reference …


Reconstructability Analysis: Discrete Multivariate Modeling, Martin Zwick Jan 2022

Reconstructability Analysis: Discrete Multivariate Modeling, Martin Zwick

Systems Science Faculty Publications and Presentations

An introduction to Reconstructability Analysis for the Discrete Multivariate Modeling course and for other purposes.


Development Of A Framework To Support Informed Shipbuilding Based On Supply Chain Disruptions, Katherine Smith, Rafael Diaz, Yuzhong Shen Jan 2022

Development Of A Framework To Support Informed Shipbuilding Based On Supply Chain Disruptions, Katherine Smith, Rafael Diaz, Yuzhong Shen

VMASC Publications

In addition to stresses induced by the Covid-19 pandemic, supply chains worldwide have been growing more complex while facing a continuous onslaught of disruptions. This paper presents an analysis and extension of a graph based model for modeling and simulating the effects of such disruptions. The graph based model combines a Bayesian network approach for simulating risks with a network dependency analysis approach for simulating the propagation of disruptions through the network over time. The initial analysis provides evidence supporting extension to for using a multi-layered approach allowing for the inclusion of cyclic features in supply chain models. Initial results …


Editorial, Michael E. Whitman, Herbert J. Mattord, Hossain Shahriar Jan 2022

Editorial, Michael E. Whitman, Herbert J. Mattord, Hossain Shahriar

Journal of Cybersecurity Education, Research and Practice

Since 2016, it has been the mission of the Journal of Cybersecurity Education, Research, and Practice (JCERP) to be a premier outlet for high-quality information security and cybersecurity-related articles of interest to teaching faculty and students. This is the 13th edition of the (JCERP) and, as ever, we are seeking authors who produce high-quality research and practice-oriented articles focused on the development and delivery of information security and cybersecurity curriculum, innovation in applied scholarship, and industry best practices in information security and cybersecurity in the enterprise for double-blind review and publication. The journal invites submissions on Information Security, Cybersecurity, …


The Effects Of Recommender System On Sales Promotion Of High-Value Products: Evidence From A Field Experiment In The Real Estate Industry, Lian Liu Jan 2022

The Effects Of Recommender System On Sales Promotion Of High-Value Products: Evidence From A Field Experiment In The Real Estate Industry, Lian Liu

Dissertations and Theses Collection (Open Access)

Real estate sales industry in China has long suffered the problem of inefficient matching of customers to projects. Inspired by the design of recommender systems, which have been widely used in the online retail industry, and are shown to facility customer-product matching and improve sales, we apply this system to the real estate sales industry using a novel approach. Instead of recommending products to customers, we suggest the best potential customers to salespeople with whom they will conduct sales with. Using city-wide sales data from the largest real estate sales company in China, we first develop a recommend system based …


The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He Jan 2022

The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He

Information Technology & Decision Sciences Faculty Publications

This paper identifies opportunities for potential theoretical and practical improvements in employees' awareness of cybersecurity and their motivational behavior to protect themselves and their organizations from cyberattacks using the protection motivation theory. In addition, it contributes to the literature by examining additional variables and mediators besides the core constructs of the Protection Motivation Model (PMT). This article uses empirical data and structural equation modeling to test the antecedents and mediators of employees' cybersecurity motivational behavior. The study offers theoretical and pragmatic guidance for cybersecurity programs. First, the model developed in this study can partially explain how people may change their …


The State Of The Art Of Information Integration In Space Applications, Zhuming Bi, K. L. Yung, Andrew W.H. Ip., Yuk Ming Tang, Chris W.J. Zhang, Li Da Xu Jan 2022

The State Of The Art Of Information Integration In Space Applications, Zhuming Bi, K. L. Yung, Andrew W.H. Ip., Yuk Ming Tang, Chris W.J. Zhang, Li Da Xu

Information Technology & Decision Sciences Faculty Publications

This paper aims to present a comprehensive survey on information integration (II) in space informatics. With an ever-increasing scale and dynamics of complex space systems, II has become essential in dealing with the complexity, changes, dynamics, and uncertainties of space systems. The applications of space II (SII) require addressing some distinctive functional requirements (FRs) of heterogeneity, networking, communication, security, latency, and resilience; while limited works are available to examine recent advances of SII thoroughly. This survey helps to gain the understanding of the state of the art of SII in sense that (1) technical drivers for SII are discussed and …


Impact Of Knowledge Management Processes Upon Job Satisfaction And Job Performance, George Reid Cooper Jan 2022

Impact Of Knowledge Management Processes Upon Job Satisfaction And Job Performance, George Reid Cooper

CCE Theses and Dissertations

While we might know anecdotally that the implementation of knowledge management in an organization improves job satisfaction and job performance, there are limited empirical studies that assess this assumption. There have been studies done in this area but the results vary in terms of which knowledge management processes have an impact upon job satisfaction and which do not. Similarly, many studies make assumptions that job satisfaction leads to improved job performance without testing for that variable. The goal of this dissertation is to assess whether the knowledge management processes have a positive impact upon job satisfaction and job performance and …


Fake Review Detection, Michael Husk, Faryaneh Poursardar (Mentor) Jan 2022

Fake Review Detection, Michael Husk, Faryaneh Poursardar (Mentor)

Computer & Information Science: Research Experiences for Undergraduates in Disinformation Detection and Analytics

No abstract provided.


Module 1: Introduction To Technology Foresight, Risk Management, And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar Jan 2022

Module 1: Introduction To Technology Foresight, Risk Management, And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar

Developing Technology Foresight: Case Study of AI in InsurTech

Instructional Module 1 for course, Developing Technology Foresight: Case Study of AI in InsurTech.


Module 2: Case Studies Of Ai And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar Jan 2022

Module 2: Case Studies Of Ai And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar

Developing Technology Foresight: Case Study of AI in InsurTech

Instructional Module 2 for course, Developing Technology Foresight: Case Study of AI in InsurTech.


Module 3: Technology Foresight And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar Jan 2022

Module 3: Technology Foresight And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar

Developing Technology Foresight: Case Study of AI in InsurTech

Instructional Module 3 for course, Developing Technology Foresight: Case Study of AI in InsurTech.


Partnering For Value Perfection And Business Sustainability In The Cloud Services Brokerage Market, Richard Shang, Robert John Kauffman Jan 2022

Partnering For Value Perfection And Business Sustainability In The Cloud Services Brokerage Market, Richard Shang, Robert John Kauffman

Research Collection School Of Computing and Information Systems

The cloud computing and services market has advanced in the past ten years. They now include most IT services from fundamental computing to cutting-edge AI capabilities. With the widespread adoption of cloud services, clients are facing the fact that they are utilizing cloud resources at a sub-optimal level. Cloud services brokers (CSBs) grew from the market to fill the needs for cloud resource management and risk mitigation. Based on analysis of the cloud market and the case of cloud services brokerage and related activities in North America, we offer theoretical analysis for how value creation works, its impacts on the …


Defining Smart Contract Defects On Ethereum, Jiachi Chen, Xin Xia, David Lo, John Grundy, Xiapu Luo, Ting Chen Jan 2022

Defining Smart Contract Defects On Ethereum, Jiachi Chen, Xin Xia, David Lo, John Grundy, Xiapu Luo, Ting Chen

Research Collection School Of Computing and Information Systems

Smart contracts are programs running on a blockchain. They are immutable to change, and hence can not be patched for bugs once deployed. Thus it is critical to ensure they are bug-free and well-designed before deployment. A Contract defect is an error, flaw or fault in a smart contract that causes it to produce an incorrect or unexpected result, or to behave in unintended ways. The detection of contract defects is a method to avoid potential bugs and improve the design of existing code. Since smart contracts contain numerous distinctive features, such as the gas system. decentralized, it is important …


Estimating Efforts For Various Activities In Agile Software Development: An Empirical Study, Lan Cao Jan 2022

Estimating Efforts For Various Activities In Agile Software Development: An Empirical Study, Lan Cao

Information Technology & Decision Sciences Faculty Publications

Effort estimation is an important practice in agile software development. The agile community believes that developers’ estimates get more accurate over time due to the cumulative effect of learning from short and frequent feedback. However, there is no empirical evidence of an improvement in estimation accuracy over time, nor have prior studies examined effort estimation in different development activities, which are associated with substantial costs. This study fills the knowledge gap in the field of software estimation in agile software development by investigating estimations across time and different development activities based on data collected from a large agile project. This …