Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (2)
- Bentley University (1)
- California Polytechnic State University, San Luis Obispo (1)
- Chulalongkorn University (1)
- Clark University (1)
-
- Embry-Riddle Aeronautical University (1)
- Georgia Southern University (1)
- Harrisburg University of Science and Technology (1)
- New Jersey Institute of Technology (1)
- The University of Akron (1)
- UMass Global (1)
- University of New Hampshire (1)
- University of North Florida (1)
- University of Tennessee, Knoxville (1)
- Western University (1)
- World Maritime University (1)
- Keyword
-
- Agile (2)
- Academic -- UNF -- Computing; Workflow; Unknown exceptions; BPEL4PEOPLE; Web Services; Human Task; SWIMs (1)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (1)
- Algorithms (1)
- Applied sciences (1)
-
- Artificial Intelligence/Machine Learning (1)
- Blockchain (1)
- Business (1)
- Business Analytics (1)
- Business Intelligence and Data Warehouse (1)
- Change Control (1)
- Change Management (1)
- Cloud Firewalls (1)
- Cloud Networks (1)
- Cloud Security (1)
- Communication and the arts (1)
- Complexity theory (1)
- Compute platform (1)
- Computer Networking (1)
- Crowdsourcing (1)
- Cybersecurity (1)
- Data Masking (1)
- Data Security and Anonymization (1)
- Data analytics (1)
- Data science (1)
- Defense in Depth (1)
- Distributed (1)
- Doctor (1)
- E-Healthcare (1)
- ETD (1)
- Publication
-
- Dissertations (2)
- Electronic Theses, Projects, and Dissertations (2)
- 2013 (1)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (1)
- Computer Science and Software Engineering (1)
-
- Dissertations and Theses (1)
- Doctoral Dissertations and Master's Theses (1)
- Electronic Theses and Dissertations (1)
- Electronic Thesis and Dissertation Repository (1)
- Honors Theses and Capstones (1)
- Masters Theses (1)
- School of Professional Studies (1)
- UNF Graduate Theses and Dissertations (1)
- Williams Honors College, Honors Research Projects (1)
- World Maritime University Dissertations (1)
Articles 1 - 17 of 17
Full-Text Articles in Management Information Systems
Towards Agile Academia: An Approach To Scientific Paper Writing Inspired By Software Engineering, Tyler Procko
Towards Agile Academia: An Approach To Scientific Paper Writing Inspired By Software Engineering, Tyler Procko
Doctoral Dissertations and Master's Theses
The construction of scientific papers is performed in service of the greater scientific community. This iterative process is, in effect, an academic economy, where all members benefit from well-written papers. However, many published scientific papers are poorly written; they often lack sufficient detail to allow replication, there is improper usage of citations or a lack of regard to relevant work, reporting is vague or without linked empirical data to allow verification, figures do not correspond to text or are non-sensical, literary elements, e.g., bulleted lists, are used ineffectively, formatting renders certain sections unreadable, and grammatical errors abound. The issues of …
Small Business Office Network, Michael Gerome
Small Business Office Network, Michael Gerome
Williams Honors College, Honors Research Projects
This project will emulate a small office network environment. The project will demonstrate the process of building and configuring the network to meet the requirements laid out in the project plan. This network includes four subnets with Windows 10 end devices and a Kali Linux device, it also includes five Cisco layer 2 switches and three Cisco routers. There are also three subnets connecting the routers to each other to enable routing between the subnets. After the network environment is set up, various penetration tests are performed from the Kali Linux device to gather information. The Nmap reconnaissance tool is …
Integration Of Internet Of Things And Health Recommender Systems, Moonkyung Yang
Integration Of Internet Of Things And Health Recommender Systems, Moonkyung Yang
Electronic Theses, Projects, and Dissertations
The Internet of Things (IoT) has become a part of our lives and has provided many enhancements to day-to-day living. In this project, IoT in healthcare is reviewed. IoT-based healthcare is utilized in remote health monitoring, observing chronic diseases, individual fitness programs, helping the elderly, and many other healthcare fields. There are three main architectures of smart IoT healthcare: Three-Layer Architecture, Service-Oriented Based Architecture (SoA), and The Middleware-Based IoT Architecture. Depending on the required services, different IoT architecture are being used. In addition, IoT healthcare services, IoT healthcare service enablers, IoT healthcare applications, and IoT healthcare services focusing on Smartwatch …
Neural Network With Nlp, Harshita Sharma, Tinkle Jain
Neural Network With Nlp, Harshita Sharma, Tinkle Jain
School of Professional Studies
This thesis is about neural networks and how their algorithmic systems work. Neural networks are well-suited to aiding people with complex challenges in real-world situations. Thesis topics include nonlinear and complicated interactions between inputs and outputs, as well as making inferences, discovering hidden links, patterns, and predictions, and modeling highly volatile data and variations to forecast uncommon events. Neural networks have the potential to help people make better decisions. NLP is a technique for analyzing, interpreting, and comprehending large amounts of text. We can no longer evaluate the text using traditional approaches due to the massive volumes of text data …
Docs_On_Blocks – A Defense In Depth Strategy For E-Healthcare, Saad Mohammed
Docs_On_Blocks – A Defense In Depth Strategy For E-Healthcare, Saad Mohammed
Electronic Theses, Projects, and Dissertations
With the increase in the data breaches and cyber hacks, organizations have come to realize that cyber security alone would not help as the attacks are becoming more sophisticated and complex than ever. E-Healthcare industry has shown a promising improvement in terms of security over the past, but the threat remains. Thus, the E-Healthcare industries are aiming towards a Defense in Depth Strategy approach.
The project here describes how a Defense in Depth Strategy for E-Healthcare system can provide an environment for better security of the data and peer-to-peer interaction with stakeholders. The legacy systems have at some point failed …
Challenges To Adopting Hybrid Methodology: Addressing Organizational Culture And Change Control Problems In Enterprise It Infrastructure Projects, Harishankar Krishnakumar
Challenges To Adopting Hybrid Methodology: Addressing Organizational Culture And Change Control Problems In Enterprise It Infrastructure Projects, Harishankar Krishnakumar
Dissertations and Theses
IT infrastructure projects have long been an overlooked field superseded by the more popular software development silos and cross-functional project teams when it comes to enterprise Agile transformations. This paper presents a systematic literature review by leveraging a qualitative research methodology based on empirical evidence provided in contemporary scholarly research articles to explore how certain variables such as organizational culture- including team structure, leadership hierarchy, geolocation, etc. along with an organization’s change management processes affect the adoption of a Hybrid/Agile project management methodology, focusing on reported challenges and critical success factors that define such large-scale enterprise transformations. The salient features …
Changing The Focus: Worker-Centric Optimization In Human-In-The-Loop Computations, Mohammadreza Esfandiari
Changing The Focus: Worker-Centric Optimization In Human-In-The-Loop Computations, Mohammadreza Esfandiari
Dissertations
A myriad of emerging applications from simple to complex ones involve human cognizance in the computation loop. Using the wisdom of human workers, researchers have solved a variety of problems, termed as “micro-tasks” such as, captcha recognition, sentiment analysis, image categorization, query processing, as well as “complex tasks” that are often collaborative, such as, classifying craters on planetary surfaces, discovering new galaxies (Galaxyzoo), performing text translation. The current view of “humans-in-the-loop” tends to see humans as machines, robots, or low-level agents used or exploited in the service of broader computation goals. This dissertation is developed to shift the focus back …
Digital Platform Development For Performance Monitoring System In Oil And Gas Exploration And Production, Tanthai Poopaiboon
Digital Platform Development For Performance Monitoring System In Oil And Gas Exploration And Production, Tanthai Poopaiboon
Chulalongkorn University Theses and Dissertations (Chula ETD)
The paper provides a case study to enhance the Performance Management System for Oil and Gas Exploration and Production industry. Although the system was designed for the Oil and Gas Exploration and Production industry, the paper could be applied effectively for other industries because the modern organisation mainly utilised the Key Performance Indicator (KPI) to reflect its performance. So, the paper could be applied to most organisations with minor modifications. The Advanced Performance Management System was developed systematically powered by digital transformation according to research methodology framework, including research, analysis, project development, and result measurement. The research stage is studying …
Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali
Electronic Thesis and Dissertation Repository
The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify, Map, Apply, …
Delegation Application, Erik Matthew Phillips
Delegation Application, Erik Matthew Phillips
Computer Science and Software Engineering
Delegation is a cross-platform application to provide smart task distribution to users. In a team environment, the assignment of tasks can be tedious and difficult for management or for users needing to discover a starting place for where to begin with accomplishing tasks. Within a specific team, members possess individual skills within different areas of the team’s responsibilities and specialties, and certain members will be better suited to tackle specific tasks. This project provides a solution, consisting of a smart cross-platform application that allows for teams and individuals to quickly coordinate and delegate tasks assigned to them.
Mainframe Relevance In Modern It: How A 50+ Year Old Computing Platform Can Still Play A Key Role In Today’S Businesses, Ian Thomas Newcombe
Mainframe Relevance In Modern It: How A 50+ Year Old Computing Platform Can Still Play A Key Role In Today’S Businesses, Ian Thomas Newcombe
Honors Theses and Capstones
No abstract provided.
Identification Of Employee Engagement Practices Viewed As Critical To Retention: A Cross-Generational Comparison, Sharon R. Floyd
Identification Of Employee Engagement Practices Viewed As Critical To Retention: A Cross-Generational Comparison, Sharon R. Floyd
Dissertations
Purpose. The purpose of this study was to identify the employee engagement practices that millennial IT workers perceive as important to retention. The secondary purpose of the study was to determine whether a difference exists between the engagement practices that appeal to millennial IT workers and the engagement practices that appeal to remaining IT working groups, which include the baby boomers and generation X.
Methodology. A quantitative, descriptive, survey-based research method was chosen for this study. The population included information technology workers representing three generations of working adults, including baby boomers, generation Xers, and millennials. The sample included technology workers …
Unknown Exception Handling Tool Using Humans As Agents, Mwaka Mahanga
Unknown Exception Handling Tool Using Humans As Agents, Mwaka Mahanga
UNF Graduate Theses and Dissertations
In a typical workflow process, exceptions are the norm. Exceptions are defined as deviations from the normal sequence of activities and events. Exceptions can be divided into two broad categories: known exceptions (i.e., expected and predefined deviations) and unknown exceptions (i.e., unexpected and undefined deviations). Business Process Execution Language (BPEL) has become the de facto standard for executing business workflows with the use of web services. BPEL includes exception handling methods that are sufficient for known exception scenarios. Depending on the exception and the specifics of the exception handling tools, processes may either halt or move to completion. Instances of …
A Lean Information Management Model For Efficient Operations Of An Educational Entity At The University Of Tennessee, Harshitha Muppaneni
A Lean Information Management Model For Efficient Operations Of An Educational Entity At The University Of Tennessee, Harshitha Muppaneni
Masters Theses
A software based Management Information System (MIS) is designed and implemented in the Department of Industrial and Systems Engineering at University of Tennessee to handle different types of data requests that are currently processed through multiple steps. This thesis addresses the current resource intensive data management model in educational institutions and proposes a decentralized and customized solution. The proposed software based data management system provides information to authorized sources in the requested format with minimal or no time consumption. The quantification of the new systems’ impact is done by comparing it with current data management process using Graph Theoretic Approach …
A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr
A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr
Electronic Theses and Dissertations
The rapid expansion in networking has provided tremendous opportunities to access an unparalleled amount of information. Everyone connects to a network to gain access and to share this information. However when someone connects to a public network, his private network and information becomes vulnerable to hackers and all kinds of security threats. Today, all networks needs to be secured, and one of the best security policies is firewall implementation.
Firewalls can be hardware or cloud based. Hardware based firewalls offer the advantage of faster response time, whereas cloud based firewalls are more flexible. In reality the best form of firewall …
The Use Of Complexity Theory And Strange Attractors To Understand And Explain Information System Development, Arthur P. Tomasino
The Use Of Complexity Theory And Strange Attractors To Understand And Explain Information System Development, Arthur P. Tomasino
2013
In spite of the best efforts of researchers and practitioners, Information Systems (IS) developers are having problems "getting it right". IS developments are challenged by the emergence of unanticipated IS characteristics undermining managers ability to predict and manage IS change. Because IS are complex, development formulas, best practices or development guides simply will not work. The difficulties in these system developments stem from the complexity of IS arising from the inter-relationship, interaction, and interconnectivity of the elements in the system and its environment. This research uses complexity concepts to help solve the problem with IS development and explain why so …
Analysis And Design Of Earthquake Relief Virtual Logistic Information System, Chi Chen
Analysis And Design Of Earthquake Relief Virtual Logistic Information System, Chi Chen
World Maritime University Dissertations
No abstract provided.