Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Computer science (2)
- Curriculum (2)
- Education (2)
- Information security (2)
- Information technology (2)
-
- Internet (2)
- Access to Information (1)
- Accounting firms (1)
- Assessment (1)
- Bankruptcy Prediction (1)
- Business (1)
- CSI (1)
- Caribs (1)
- Class imbalance (1)
- Cognitive profiles (1)
- Competition (1)
- Compliance (Legal) (1)
- Computer Security (1)
- Computer crimes (1)
- Computer security (1)
- Computer skills (1)
- Computer viruses (1)
- Confidentiality (1)
- Cost-sensitive logistic regression (1)
- Costs (1)
- Courseware (1)
- Credit scoring (1)
- Cultural conservation (1)
- Cultural dimensions (1)
- Cultural metaphors (1)
- Publication Year
Articles 1 - 20 of 20
Full-Text Articles in Business
The Expanded View Of Individualism And Collectivism: One, Two, Or Four Dimensions?, Jennifer L. Priestley, Kamal Fatehi, Gita Taasoobshirazi
The Expanded View Of Individualism And Collectivism: One, Two, Or Four Dimensions?, Jennifer L. Priestley, Kamal Fatehi, Gita Taasoobshirazi
Faculty and Research Publications
Recent research to analyze and discuss cultural differences has employed a combination of five major dimensions of individualism–collectivism, power distance, uncertainty avoidance, femininity– masculinity (gender role differentiation), and long-term orientation. Among these dimensions, individualism–collectivism has received the most attention. Chronologically, this cultural attribute has been regarded as one, then two, and more recently, four dimensions of horizontal and vertical individualism and collectivism. However, research on this issue has not been conclusive and some have argued against this expansion. The current study attempts to explain and clarify this discussion by using a shortened version of the scale developed by Singelis et …
A Descriptive Study Of Variable Discretization And Cost-Sensitive Logistic Regression On Imbalanced Credit Data, Lili Zhang, Jennifer Priestley, Herman Ray, Soon Tan
A Descriptive Study Of Variable Discretization And Cost-Sensitive Logistic Regression On Imbalanced Credit Data, Lili Zhang, Jennifer Priestley, Herman Ray, Soon Tan
Published and Grey Literature from PhD Candidates
Training classification models on imbalanced data tends to result in bias towards the majority class. In this paper, we demonstrate how variable discretization and cost-sensitive logistic regression help mitigate this bias on an imbalanced credit scoring dataset, and further show the application of the variable discretization technique on the data from other domains, demonstrating its potential as a generic technique for classifying imbalanced data beyond credit scoring. The performance measurements include ROC curves, Area under ROC Curve (AUC), Type I Error, Type II Error, accuracy, and F1 score. The results show that proper variable discretization and cost-sensitive logistic regression with …
A Comparison Of Machine Learning Algorithms For Prediction Of Past Due Service In Commercial Credit, Liyuan Liu M.A, M.S., Jennifer Lewis Priestley Ph.D.
A Comparison Of Machine Learning Algorithms For Prediction Of Past Due Service In Commercial Credit, Liyuan Liu M.A, M.S., Jennifer Lewis Priestley Ph.D.
Published and Grey Literature from PhD Candidates
Credit risk modeling has carried a variety of research interest in previous literature, and recent studies have shown that machine learning methods achieved better performance than conventional statistical ones. This study applies decision tree which is a robust advanced credit risk model to predict the commercial non-financial past-due problem with better critical power and accuracy. In addition, we examine the performance with logistic regression analysis, decision trees, and neural networks. The experimenting results confirm that decision trees improve upon other methods. Also, we find some interesting factors that impact the commercials’ non-financial past-due payment.
Influence Of The Event Rate On Discrimination Abilities Of Bankruptcy Prediction Models, Lili Zhang, Jennifer Priestley, Xuelei Ni
Influence Of The Event Rate On Discrimination Abilities Of Bankruptcy Prediction Models, Lili Zhang, Jennifer Priestley, Xuelei Ni
Published and Grey Literature from PhD Candidates
In bankruptcy prediction, the proportion of events is very low, which is often oversampled to eliminate this bias. In this paper, we study the influence of the event rate on discrimination abilities of bankruptcy prediction models. First the statistical association and significance of public records and firmographics indicators with the bankruptcy were explored. Then the event rate was oversampled from 0.12% to 10%, 20%, 30%, 40%, and 50%, respectively. Seven models were developed, including Logistic Regression, Decision Tree, Random Forest, Gradient Boosting, Support Vector Machine, Bayesian Network, and Neural Network. Under different event rates, models were comprehensively evaluated and compared …
Drip - Data Rich, Information Poor: A Concise Synopsis Of Data Mining, Muhammad Obeidat, Max North, Lloyd Burgess, Sarah North
Drip - Data Rich, Information Poor: A Concise Synopsis Of Data Mining, Muhammad Obeidat, Max North, Lloyd Burgess, Sarah North
Faculty and Research Publications
As production of data is exponentially growing with a drastically lower cost, the importance of data mining required to extract and discover valuable information is becoming more paramount. To be functional in any business or industry, data must be capable of supporting sound decision-making and plausible prediction. The purpose of this paper is concisely but broadly to provide a synopsis of the technology and theory of data mining, providing an enhanced comprehension of the methods by which massive data can be transferred into meaningful information.
Rethinking Fs-Isac: An It Security Information Sharing Network Model For The Financial Services Sector, Charles Zhechao Liu, Humayun Zafar, Yoris A. Au
Rethinking Fs-Isac: An It Security Information Sharing Network Model For The Financial Services Sector, Charles Zhechao Liu, Humayun Zafar, Yoris A. Au
Faculty and Research Publications
This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing alliance in the financial services industry). Failure to encourage members to share their IT security-related information has seriously undermined the founding rationale of FS-ISAC. Our analysis shows that many information sharing alliances’ membership policies are plagued with the incentive misalignment issue and may result in a “free-riding” or “no information sharing” equilibrium. To address this issue, we propose a new information sharing membership policy that incorporates an insurance option and show that the proposed policy can align members’ incentives and lead to a socially optimal outcome. Moreover, …
A Comparative Review Of Information Technology Project Management In Private And Public Sector Organization, Muhammad Obeidat, Max North
A Comparative Review Of Information Technology Project Management In Private And Public Sector Organization, Muhammad Obeidat, Max North
Faculty and Research Publications
Both private and public sector organizations tend to recognize the prominence of information technology within project management techniques and practices. The primary objective of this paper is to present a comparative review of information technology within project management in private and public sectors. Moreover, this research provides an extensive review of related topics such as the evolution of information technology, factors contributing to project abandonment, and the tools and techniques of management that effect project success. In conclusion, the authors present a variety of practical and effective guidelines and recommend approaches for the successful deployment of information technology within project …
A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade
A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade
Faculty and Research Publications
Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine …
The Location Decisions Of Foreign Investors In China: Untangling The Effect Of Wages Using A Control Function Approach, Xuepeng Liu, Mary E. Lovely, Jan Ondrich
The Location Decisions Of Foreign Investors In China: Untangling The Effect Of Wages Using A Control Function Approach, Xuepeng Liu, Mary E. Lovely, Jan Ondrich
Faculty and Research Publications
There is almost no support for the proposition that capital is attracted to low wages from firm-level studies. We examine the location choices of 2,884 firms investing in China between 1993 and 1996 to offer two main contributions. First, we find that the location of labor-intensive activities is highly elastic to provincial wage differences. Generally, investors' wage sensitivity declines as the skill intensity of the industry increases. Second, we find that unobserved location-specific attributes exert a downward bias on estimated wage sensitivity. Using a control function approach, we estimate a downward bias of 50% to 90% in wage coefficients estimated …
Analysis Of Xbrl Literature: A Decade Of Progress And Puzzle, Saeed Roohani, Zhao Xianming, Ernest Capozzoli, Barbara Lamberton
Analysis Of Xbrl Literature: A Decade Of Progress And Puzzle, Saeed Roohani, Zhao Xianming, Ernest Capozzoli, Barbara Lamberton
Faculty and Research Publications
XBRL (eXtensible Business Reporting language) was recently, in 2008, in its 10th year. The concept was articulated in 1998 by Charles Hoffman, known as XFRML (eXtensible Financial Reporting Mark Up Language) to facilitate the business reporting process and improve financial reporting. The objective of this paper is to examine a decade (1998-2008) of XBRL articles published in various publications including trade, practitioner and academic journals to identify trends and patterns, milestones, and organizations actively contributed to this development. Another goal is to assess public perceptions of XBRL, its capabilities and its future. We examined published articles where XBRL appeared either …
Database Security: What Students Need To Know, Meg C. Murray
Database Security: What Students Need To Know, Meg C. Murray
Faculty and Research Publications
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data. Students in the computing disciplines must develop an …
Why It Managers Don't Go For Cyber-Insurance Products, Tridib Bandyopadhyay, Vijay S. Mookerjee, Ram C. Rao
Why It Managers Don't Go For Cyber-Insurance Products, Tridib Bandyopadhyay, Vijay S. Mookerjee, Ram C. Rao
Faculty and Research Publications
Despite positive expectations, cyber-insurance products have failed to take center stage in the management of IT security risk. Market inexperience, leading to conservatism in pricing cyber-insurance instruments, is often cited as the primary reason for the limited growth of the cyber-insurance market. In contrast, here we provide a demand-side explanation for why cyber-insurance products have not lived up to their initial expectations. We highlight the presence of information asymmetry between customers and providers, showing how it leads to overpricing cyber-insurance contracts and helps explain why cyber insurance might have failed to deliver its promise as a cornerstone of IT security-management …
Ecotourism In Dominica: Studying The Potential For Economic Development, Environmental Protection And Cultural Conservation, Vanessa Slinger-Friedman
Ecotourism In Dominica: Studying The Potential For Economic Development, Environmental Protection And Cultural Conservation, Vanessa Slinger-Friedman
Faculty and Research Publications
Over the last 20 years, the government of the small Caribbean island nation of Dominica has pursued the development of ecotourism on the island. The hope is that this industry will promote dispersed economic development while providing environmental protection and cultural conservation. However, not enough has been done to determine whether or not the industry is achieving the desired results. To this end, this study explores the growth of the tourism industry on Dominica and shows that, while not perfect, ecotourism is providing some definite benefits to the island in this regard.
Expanding The Database Curriculum, Meg Murray, Mario Guimaraes
Expanding The Database Curriculum, Meg Murray, Mario Guimaraes
Faculty and Research Publications
As database concepts and technologies continue to evolve there exists a need to expand the topics included in database curricula. This is challenging given the restraints on the number of courses that can be included in a typical CS or IS program. While a set of commonly identified core concepts and principles exists, there is little consensus on what supplemental materials should be included in database courses. Through an NSF proof-of-concept grant, we designed and developed courseware incorporating the use of animations to deepen and enrich standard presentations of core database concepts and to complement database teachings as found in …
Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray
Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray
Faculty and Research Publications
Computers, digitalization and the Internet have transformed modern society. Commerce, education, communication and socialization will never be the same. Surprisingly, many universities do not require a computing course in the core curriculum. Critical information technology (IT) competencies are often taken for granted, to the detriment of students who lack computing and Internet skills. This paper describes an initiative undertaken by a computer science and information systems department to assess and remediate IT skills needed by all university students, regardless of major. The project is evolving along several dimensions: identification of discipline-independent IT competencies, assessment of IT skills among current and …
Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade
Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade
Faculty and Research Publications
Information systems students continue to struggle to successfully complete computer programming classes. Learning how to program is difficult, and failure and attrition rates in college level programming classes remain at an unacceptably high rate. Since many IS students take a programming course as part of their program of study, IS educators should better understand why IS students tend to achieve low success rates in programming courses and what can be done to improve success rates. Little research to date has addressed potential reasons for student failure in programming principles courses. Many educators simply assume that high failure rates are acceptable …
Enemy At The Gate: Threats To Information Security, Michael E. Whitman
Enemy At The Gate: Threats To Information Security, Michael E. Whitman
Faculty and Research Publications
A firm can build more effective security strategies by identifying and ranking the severity of potential threats to its IS efforts.
Considerations For An Effective Telecommunications-Use Policy, Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts
Considerations For An Effective Telecommunications-Use Policy, Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts
Faculty and Research Publications
Recent changes in federal telecommunications legislation have underscored the importance of an up-to-date and effective telecommunications-use policy in business organizations. With the proliferation of the Internet, intranets, and email as commonplace business tools, the potential for misuse and subsequent liability has become an increasing concern. Even though the recent Supreme Court decision struck down the obscenity provisions of the Communications Decency Act (CDA), it left intact legislation that effectively mandates development of a sound telecommunications-use policy. In addition to potential liability for systems misuse, organizations have also had to address issues of individual employee privacy within the new systems.
This …
Building Web Sites That Attract Visitors, C. David Shepherd, Daniel Fell
Building Web Sites That Attract Visitors, C. David Shepherd, Daniel Fell
Faculty and Research Publications
The article discusses the use of web sites for health care service marketing. The potential benefits of Internet services for users and care providers are mentioned, but challenges in implementation are also listed. A three generation model of web site design is offered, distinguishing various levels of interactivity, customization, and perceived value. Suggestions are offered applying this model to health care service web sites and their marketing potential.
Linear And Nonlinear Appraisal Models, Billie Ann Brotman
Linear And Nonlinear Appraisal Models, Billie Ann Brotman
Faculty and Research Publications
In this article, the author uses nonlinear models to forecast the value of four important housing characteristics. The article explains, for example, that each additional bedroom does not add a set incremental dollar figure to the value of a house. The results suggest that nonlinear models predict housing values better than linear ones.