Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

2024

Discipline
Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 83

Full-Text Articles in Management Information Systems

How State Universities Are Addressing The Shortage Of Cybersecurity Professionals In The United States, Gary Harris Sep 2024

How State Universities Are Addressing The Shortage Of Cybersecurity Professionals In The United States, Gary Harris

Journal of Cybersecurity Education, Research and Practice

Cybersecurity threats have been a serious and growing problem for decades. In addition, a severe shortage of cybersecurity professionals has been proliferating for nearly as long. These problems exist in the United States and globally and are well documented in literature. This study examined what state universities are doing to help address the shortage of cybersecurity professionals since higher education institutions are a primary source to the workforce pipeline. It is suggested that the number of cybersecurity professionals entering the workforce is related to the number of available programs. Thus increasing the number of programs will increase the number of …


Risk Identification And Mitigation In Agile Software Re-Engineering: A Case Study, Chiara Fasching, Peggy Gregory, Nicholas Mitchell, Charlie Frowd Sep 2024

Risk Identification And Mitigation In Agile Software Re-Engineering: A Case Study, Chiara Fasching, Peggy Gregory, Nicholas Mitchell, Charlie Frowd

Communications of the IIMA

Legacy software is becoming increasingly common, and many companies nowadays are facing the challenges associated with this phenomenon. In certain circumstances, re-engineering is the only logical way to deal with legacy software. Such projects, by their very nature, are subject to a wide variety of risks. The aim of this study was to begin building the basis of a risk framework that will support future re-engineering projects within Agile (Scrum) environments. An interpretive case study approach has been followed, where the case study was the first phase of a re-engineering process, with the method of analysis being inductive and reflexive …


Enhancing Email Spam Detection Through Ensemble Machine Learning: A Comprehensive Evaluation Of Model Integration And Performance, Najah Al-Shanableh, Mazen S. Alzyoud, Eman Nashnush Sep 2024

Enhancing Email Spam Detection Through Ensemble Machine Learning: A Comprehensive Evaluation Of Model Integration And Performance, Najah Al-Shanableh, Mazen S. Alzyoud, Eman Nashnush

Communications of the IIMA

Email spam detection and filtering are crucial security measures in all organizations. It is applied to filter unsolicited messages; most of the time, they comprise a large portion of harmful messages. Machine learning algorithms, specifically classification algorithms, are used to filter and detect if the email is spam or not spam. These algorithms entail training models on labelled data to predict whether an email is spam or not based on its features. In particular, traditional classification machine learning algorithms have been applied for decades but proved ineffective against fast-evolving spam emails. In this research, ensemble techniques by using the meta-learning …


The Use Of Selected Social Media Platforms By South African-Listed Companies For Stakeholder Engagement, Kashmira Hansjee, Zakiyyah Varachia, Dannielle Cerbone Sep 2024

The Use Of Selected Social Media Platforms By South African-Listed Companies For Stakeholder Engagement, Kashmira Hansjee, Zakiyyah Varachia, Dannielle Cerbone

The African Journal of Information Systems

This study aimed to determine whether South African-listed companies use social media to engage with stakeholders. Emerging economies are experiencing rapid growth, which increases the need for transparent communication to build trust with investors to facilitate resource exchange. Social media has changed many aspects of communication by offering instant, interactive channels that can reach numerous stakeholders. However, there is limited research into the utilization of social media for stakeholder communication within emerging economies. This study aimed to address that topic and examined the social media practices of listed entities to determine whether companies use Facebook, Twitter, Instagram, and LinkedIn for …


Leveraging Propagation Delay For Wormhole Detection In Wireless Networks, Harry May, Travis Atkison Sep 2024

Leveraging Propagation Delay For Wormhole Detection In Wireless Networks, Harry May, Travis Atkison

Journal of Cybersecurity Education, Research and Practice

Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity. This paper proposes a novel approach to wormhole detection by leveraging propagation delay analysis between network nodes. Unlike traditional methods that rely on signature-based detection or specialized hardware, our method focuses on analyzing propagation delay timings to identify anomalous behavior indicative of wormhole attacks. The proposed methodology involves collecting propagation delay data in both normal network scenarios and scenarios with inserted malicious wormhole nodes. By comparing these delay timings, our approach aims to differentiate between legitimate network …


Educational Equivalency Of Raspberry Pi Clusters In High-Performance Computing, Robert F. Houghton Sep 2024

Educational Equivalency Of Raspberry Pi Clusters In High-Performance Computing, Robert F. Houghton

Mountain Plains Journal of Business and Technology

High-performance computing is a difficult subject to teach in an academic setting, given the exorbitant costs and technical difficulties. Raspberry Pi single-board computers have been used in recent years to create clusters that function as mini high-performance computers. The purpose of this research is to evaluate the educational equivalence of building a Raspberry Pi cluster in comparison to running a high-performance computing environment. For this research, an eight-node cluster was built and tested in comparison to a laptop. Through the process of building the cluster, skills learned were documented to evaluate the educational value. This research concludes that the adequacy …


Cyber Threat Intelligence Sharing In Nigeria, Muhammad Abubakar Nainna, Julian Bass, Lee Speakman Sep 2024

Cyber Threat Intelligence Sharing In Nigeria, Muhammad Abubakar Nainna, Julian Bass, Lee Speakman

Communications of the IIMA

Cybersecurity challenges are common in Nigeria. Sharing cyber threat intelligence is essential in addressing the extensive challenges posed by cyber threats. It also helps in meeting regulatory compliance. There are a range of impediments that prevent cyber threat intelligence sharing. We hypothesise that we want to maximise this cyber threat intelligence sharing to resist malicious attackers. Therefore, this research investigates factors influencing threat intelligence sharing in Nigeria's cyber security practitioners. To achieve this aim, we conducted research interviews with 14 cyber security practitioners using a semi-structured, open-ended interview guide, which was recorded and transcribed. We analysed the data using an …


The Impact Of Managerial Myopia On Cybersecurity: Evidence From Data Breaches, Wen Chen, Xing Li, Haibin Wu, Liandong Zhang Sep 2024

The Impact Of Managerial Myopia On Cybersecurity: Evidence From Data Breaches, Wen Chen, Xing Li, Haibin Wu, Liandong Zhang

Research Collection School Of Accountancy

Using a sample of U.S. firms for the period 2005–2017, we provide evidence that managerial myopic actions contribute to corporate cybersecurity risk. Specifically, we show that abnormal cuts in discretionary expenditures, our proxy for managerial myopia, are positively associated with the likelihood of data breaches. The association is largely driven by firms that appear to cut discretionary expenditures to meet short-term earnings targets. In addition, the association is stronger for firms with greater short-term equity incentives, higher earnings response coefficients, low levels of institutional block ownership, or large market shares. Finally, firms appear to increase discretionary expenditures upon the announcement …


Education Crowdfunding Success: Studies On Information Asymmetry And Information Overload In Online Platforms, Mingyan Xu Sep 2024

Education Crowdfunding Success: Studies On Information Asymmetry And Information Overload In Online Platforms, Mingyan Xu

Dissertations, Theses, and Capstone Projects

Online education crowdfunding attracts public school teachers with its enormous outsourcing opportunities, but its success is constantly challenged by information asymmetry and information overload. To assist the teachers in successfully collecting teaching funds in crowdfunding, three studies are conducted to address the two challenges.

Information asymmetry exists between the fundraising teachers and the potential donors and challenges the education crowdfunding success. Virtual communication setting of online context further exacerbates this issue. Following signaling theory, it is critical for the informed teachers to create and send quality signals to the less-informed donors to enhance communication and establish mutual understanding. To understand …


Privacy Perceptions On Personal Data And Data Breaches In South Africa, Phillip Nyoni, Mthulisi Velempini, Nehemiah Mavetera Aug 2024

Privacy Perceptions On Personal Data And Data Breaches In South Africa, Phillip Nyoni, Mthulisi Velempini, Nehemiah Mavetera

The African Journal of Information Systems

Research shows that data breaches often occur when organizations fail to protect users’ personal data sufficiently well. Many devices are connected to the Internet such as mobile phones, smart cars, wearables and ‘Things’ which increase the number of potential entry points into data stores. This paper discusses the potential data privacy risks that users face online. The study used online content analysis and surveys to establish the privacy perceptions of users and trends of data breaches in South Africa. The findings reveal that users have a positive perception of data managers and view them as knowledgeable in data protection. Nevertheless, …


The Impact Of Algorithmic Control And Algorithmic Management In Online Labor Platforms, Yaping Zhu Aug 2024

The Impact Of Algorithmic Control And Algorithmic Management In Online Labor Platforms, Yaping Zhu

Graduate Theses and Dissertations

Online labor platforms (OLPs) are transforming the way organizations operate and how people work. Platform work has been characterized as promoting autonomy and flexibility. Workers interact with a platform rather than human managers to accomplish tasks and they have the freedom to decide when, where, and how much to work. Yet, platform workers increasingly bemoan working conditions, revealing that the expected autonomy and flexibility benefits of platform work have not materialized. Current IS research sheds light on this phenomenon by explaining that platform organizations use algorithms to manage and control workers (i.e., algorithmic control). Yet, our understanding of how algorithmic …


A Model Of Information Visualization Interpretation, Michael Gene Hilgers Aug 2024

A Model Of Information Visualization Interpretation, Michael Gene Hilgers

Business and Information Technology Faculty Research & Creative Works

Since the groundbreaking work by Cleveland and McGill in 1984, studies have revealed the difficulties humans have extracting quantitative data from visualizations as simple as bar graphs. As a first step toward understanding this situation, this paper proposes a mathematical model of the interpretation effort of a bar graph using concepts drawn from eye tracking. First, three key areas of interest (AOIs) are identified, and fixations are modeled as random point clouds within the AOIs. Stochastic geometry is introduced via random triangles connecting fixations within the adjacent key visual regions. The so-called landmark methodology provides the basis for the probabilistic …


The Moderating Role Of Cost And Convenience On The Relationship In The Utaut Model To Adopt E- Payment Services, Essia Ries Ahmed, Brahim Zirari, Imane Tabet Derraz Aug 2024

The Moderating Role Of Cost And Convenience On The Relationship In The Utaut Model To Adopt E- Payment Services, Essia Ries Ahmed, Brahim Zirari, Imane Tabet Derraz

Journal of International Technology and Information Management

Many emerging economies are on the brink of a major digital revolution as a result of the disruptive and game-changing wave of digitization that aims to create a financial ecosystem that will make the transition from a cash-based economy to a cashless (digital) economy the easiest way by making reliable and secure networks, Seamless payment solutions, ensuring large transactions at lightning speeds are a reality. Most studies using UTAUT are cross-sectional, capturing data at a single point in time. Longitudinal studies are needed to observe changes in behavioural intention and actual adoption of e-payment services over time, particularly in response …


Organizational Control And Technological Capabilities: The Moderating Role Of Family Influence On The Firm, Sean Leahy Jul 2024

Organizational Control And Technological Capabilities: The Moderating Role Of Family Influence On The Firm, Sean Leahy

Dissertations

This dissertation examines the influence of organizational controls on technological capabilities in privately owned U.S. corporations, with a specific focus on family-owned businesses. The primary objective of the study was to investigate how formal controls (process and outcome) and clan controls (informal practices) impact technological innovation and competence. Using a quantitative approach, data were collected from 177 individuals and analyzed through partial least squares structural equation modeling (PLS-SEM) path analysis. The findings indicate a significant relationship between formal controls and technological capabilities. However, the interaction of family influence on this dynamic was not supported. Results also revealed a robust association …


Using Gamification To Enhance Mastery Of Network Security Concepts, Kevin Hilliard, Xiaohong Yuan, Kelvin Bryant, Jinsheng Xu, Jinghua Zhang Jul 2024

Using Gamification To Enhance Mastery Of Network Security Concepts, Kevin Hilliard, Xiaohong Yuan, Kelvin Bryant, Jinsheng Xu, Jinghua Zhang

Journal of Cybersecurity Education, Research and Practice

Gamification has proven to be effective in engaging and encouraging people to work towards and achieve goals. Many students struggle to focus on schoolwork, due to a lack of interest, lack of understanding, or other factors unique to the student. Applying gamification elements to education can help engage these students in learning their course material and help them excel academically. This study examines the effectiveness of using gamification techniques to enhance the learning experience in college Computer Science courses. A video game application is utilized to review and reinforce cybersecurity concepts that students have already been taught in class. Previous …


Digital Transformation And Wise Leadership: Challenges And Opportunities Evidence From Government Institutions In Uae, Mohammad Al Qudah Jul 2024

Digital Transformation And Wise Leadership: Challenges And Opportunities Evidence From Government Institutions In Uae, Mohammad Al Qudah

Journal of Police and Legal Sciences

Purpose: the current study aimed at highlighting challenges and opportunities associated with digital transformation (DT) and the influence of these challenges and opportunities in wise leadership. Aspects taken into perspective included (decision-making, communication and collaboration, innovation, employee empowerment and ethical considerations).

Methodology: the study adopted the quantitative methodology through utilizing a questionnaire. The questionnaire was self-administered by (223) individuals from UAE governmental institutions. Statistical package for social sciences (SPSS) was employed in order to answer the study main questions and realize the hypotheses.

Results: Study indicated that adopting DT through the UAE governmental institutions is basically exposed to many challenges …


A Reviews Of Women's Outfit E-Commerce Models Using Feature Selection Techniques, Hadeer Mohamed Bekhet, Mona Nasr, Rasha Elnaggar Jul 2024

A Reviews Of Women's Outfit E-Commerce Models Using Feature Selection Techniques, Hadeer Mohamed Bekhet, Mona Nasr, Rasha Elnaggar

Future Computing and Informatics Journal

The rapid growth of e-commerce has transformed how consumers shop for fashion, including women's outfits. This study presents a comprehensive evaluation of women's outfit e-commerce models through the lens of feature selection technique. understanding customer sentiments is critical in today's marketing landscape, it provides firms with insights into how customers perceive their products and/or services and offers suggestions on how to enhance their offerings. This study aims to decipher the relationship between various characteristics in customer reviews on a women's clothing e-commerce site. Additionally, it classifies each review to determine whether it recommends the reviewed product or not, and whether …


Unleashing The Power Of Cloud Adoption And Artificial Intelligence In Optimizing Resilience And Sustainable Manufacturing Supply Chain In The Usa, Aamir Rashid, Rizwana Rasheed, Abdul Hafaz Ngah, Noor Aina Amirah Jul 2024

Unleashing The Power Of Cloud Adoption And Artificial Intelligence In Optimizing Resilience And Sustainable Manufacturing Supply Chain In The Usa, Aamir Rashid, Rizwana Rasheed, Abdul Hafaz Ngah, Noor Aina Amirah

Publications and Research

Purpose – Recent disruptions have sparked concern about building a resilient and sustainable manufacturing supply chain.While artificial intelligence (AI) strengthens resilience, research is needed to understand how cloud adoption can foster integration, collaboration, adaptation and sustainable manufacturing. Therefore, this study aimed to unleash the power of cloud adoption and AI in optimizing resilience and sustainable performance through collaboration and adaptive capabilities at manufacturing firms. Design/methodology/approach – This research followed a deductive approach and employed a quantitative method with a survey technique to collect data from its target population. The study used stratified random sampling with a sample size of 1,279 …


Development Of Cyber Security Platform For Experiential Learning, Abhishek Vaish, Ravindra Kumar, Samo Bobek, Simona Sternad Jun 2024

Development Of Cyber Security Platform For Experiential Learning, Abhishek Vaish, Ravindra Kumar, Samo Bobek, Simona Sternad

Journal of Cybersecurity Education, Research and Practice

The cyber security education market has grown-up exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Fo- rum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour. Cybersecurity as a field has evolved as a multi-discipline, multi-stakeholder and multi-role discipline. Therefore, the need to address formal education with an outcome-based philosophy is imperative to address for a wider audience with varied past training in their formal education. With the Internet …


Sustaining Digital Assets Through Mobile Estate Planning, Norliza Katuk, Asvinitha Muniandy, Norazlina Abd. Wahab, Ijaz Ahmad Jun 2024

Sustaining Digital Assets Through Mobile Estate Planning, Norliza Katuk, Asvinitha Muniandy, Norazlina Abd. Wahab, Ijaz Ahmad

An-Najah University Journal for Research - B (Humanities)

Many people own online accounts, with some having financial values like Internet banking, e-wallet and cryptocurrency. In the case of sudden death, their heirs are unaware of the digital assets possessed by the deceased person, which causes the assets to be lost forever, and the heirs might not receive the assets. If an estate plan did not account for digital assets properly, the beneficiaries would not be able to access them. Therefore, this paper addresses this issue by implementing a software development approach in designing a suitable model for sustaining digital assets through smartphones to allow the inheritance of digital …


Sensing With Integrity: Responsible Sensor Systems In An Era Of Ai, David Eisenberg May 2024

Sensing With Integrity: Responsible Sensor Systems In An Era Of Ai, David Eisenberg

Dissertations

Deep and machine learning now offer immense benefits for consumer choice, decision-making, medicine, mental health and education, smart cities, and intelligent transportation and driver safety. However, as communication and Internet technology further advances, these benefits have the potential to be outweighed by compromises to privacy, personal freedom, consumer trust, and discrimination. While ethical consequences for personal freedom and equity rise from these technological advances, the issue may not be the technology itself but a lack of regulation and policy that allow abuses to occur. A first study examines how emerging sensor-based technologies, limited to only accelerometer and gyroscope data from …


An Inaugural Forum On Epidemiological Modeling For Public Health Stakeholders In Arizona, Joseph R. Mihalijevic, Carmenlita Chief, Mehreen Malik, Kayode Oshinubi, Eck Doerry, Esma Gel, Crystal Hepp, Tim Lant, Sanjay Mehrotra, Samantha Sabo May 2024

An Inaugural Forum On Epidemiological Modeling For Public Health Stakeholders In Arizona, Joseph R. Mihalijevic, Carmenlita Chief, Mehreen Malik, Kayode Oshinubi, Eck Doerry, Esma Gel, Crystal Hepp, Tim Lant, Sanjay Mehrotra, Samantha Sabo

Department of Supply Chain Management and Analytics: Faculty and Staff Publications

Epidemiological models—which help us understand and forecast the spread of infectious disease—can be valuable tools for public health. However, barriers exist that can make it difficult to employ epidemiological models routinely within the repertoire of public health planning. These barriers include technical challenges associated with constructing the models, challenges in obtaining appropriate data for model parameterization, and problems with clear communication of modeling outputs and uncertainty. To learn about the unique barriers and opportunities within the state of Arizona, we gathered a diverse set of 48 public health stakeholders for a day-and-a-half forum. Our research group was motivated specifically by …


Chatgpt: What Is It? How Does It Work? Can It Be A Teaching Tool For An Introductory Programming Course In Higher Education?, Dale Fontenot, Feroz Ahmed, Kaniz S. Chy May 2024

Chatgpt: What Is It? How Does It Work? Can It Be A Teaching Tool For An Introductory Programming Course In Higher Education?, Dale Fontenot, Feroz Ahmed, Kaniz S. Chy

Southwestern Business Administration Journal

Abstract:

ChatGPT is an interactive chatbot that uses natural language processing (NLP) to understand user input and generate responses. (Ruby, 2023) OpenAI.com released it in November of 2022, creating a buzz in many areas, including higher education. The focus of higher education on this new tool has primarily been academic dishonesty. Although this is a significant concern with ChatGPT, this paper focuses on its usage as a learning tool to help teach programming to management information systems students.

The paper’s brief literature review focuses on ChatGPT’s background and history. A study of how ChatGPT works at a high level is …


Sea Turtle Conservation At Tortuguero: A Case On How To Turn An Ecological Challenge Into A Collaborative Opportunity For Research, Education Outreach, And Business Development, Minh Q. Huynh, Jose Noguera, Roldán A. Valverde May 2024

Sea Turtle Conservation At Tortuguero: A Case On How To Turn An Ecological Challenge Into A Collaborative Opportunity For Research, Education Outreach, And Business Development, Minh Q. Huynh, Jose Noguera, Roldán A. Valverde

Southwestern Business Administration Journal

This paper provides an overview of sea turtle research and conservation at Tortuguero. The conservation work began in 1950 and is still active. How did this effort to conserve sea turtles get started and how did this process help turn an ecological challenge into a global collaborative initiative? This case is not just about sea turtle conservation, but more importantly it is about approaching a complex problem from multiple perspectives and finding innovative ways to mitigate the problem. Though the focus is on sea turtles, the process, approach, and experience learned from this case can be adapted for guidance in …


Digital Technology Affordances Reshaping Entrepreneurship Development Process: A Systematic Review, Emmanuel Okoro Ajah May 2024

Digital Technology Affordances Reshaping Entrepreneurship Development Process: A Systematic Review, Emmanuel Okoro Ajah

The African Journal of Information Systems

Digital technology has brought about the emergence of digital entrepreneurship, which has significantly disrupted existing products and services and the way that they are marketed. This new wave of entrepreneurship has piqued the interest of scholars from various disciplines, including Information Systems. However, in the literature, there are insufficient theoretical explanations of digital technology's role in the processes involved in digital entrepreneurship development. To address this, a systematic review was conducted to comprehensively explore digital technology affordances in digital entrepreneurship development. Such affordances are the factors that cause the digitalization of the events that characterize digital entrepreneurship development. The outcome …


Crisis Management: Unveiling Information And Communication Technologies’ Revamped Role Through The Lens Of Sub-Saharan African Countries During Covid-19, Ruthbetha Kateule, Egidius Kamanyi, Mahadia Tunga May 2024

Crisis Management: Unveiling Information And Communication Technologies’ Revamped Role Through The Lens Of Sub-Saharan African Countries During Covid-19, Ruthbetha Kateule, Egidius Kamanyi, Mahadia Tunga

The African Journal of Information Systems

The management of COVID-19 pandemic has revealed inefficiencies in coordinating global response, particularly in African countries. Therefore, creating an urgent need to examine the literature on Information and Communication Technologies (ICT) in crisis management to appreciate its contextual role. Employing a systematic review, using the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA), this paper critically assessed the extent of the use of ICT in crisis management in Africa’s response to COVID-19 to reconstruct its resilience against future crises. Findings indicate that while countries with limited ICT infrastructure faced considerable challenges in utilizing ICT solutions in COVID-19 management, countries …


Sentinel Surveillance Of Sars-Cov-2 Rates And Equity Impacts Using Labor And Delivery Patients In Phoenix, Arizona, Caitlyn J. Linehan, Trisalyn Nelson, Celeste V. Bailey, Esma Gel, Dean V. Coonrod, Cheryl K. Roth May 2024

Sentinel Surveillance Of Sars-Cov-2 Rates And Equity Impacts Using Labor And Delivery Patients In Phoenix, Arizona, Caitlyn J. Linehan, Trisalyn Nelson, Celeste V. Bailey, Esma Gel, Dean V. Coonrod, Cheryl K. Roth

Department of Supply Chain Management and Analytics: Faculty and Staff Publications

Proactive management of SARS-CoV-2 requires timely and complete population data to track the evolution of the virus and identify at risk populations. However, many cases are asymptomatic and are not easily discovered through traditional testing efforts. Sentinel surveillance can be used to estimate the prevalence of infections for geographical areas but requires identification of sentinels who are representative of the larger population. Our goal is to evaluate applicability of a population of labor and delivery patients for sentinel surveillance system for monitoring the prevalence of SARS-CoV-2 infection. We tested 5307 labor and delivery patients from two hospitals in Phoenix, Arizona, …


Mediation Of Integrations In Supply Chain Information Management And Supply Chain Performance: An Empirical Study From A Developing Economy, Aamir Rashid, Rizwana Rasheed, Umair Tanveer, Shamaila Ishaq, Noor Aina Amirah May 2024

Mediation Of Integrations In Supply Chain Information Management And Supply Chain Performance: An Empirical Study From A Developing Economy, Aamir Rashid, Rizwana Rasheed, Umair Tanveer, Shamaila Ishaq, Noor Aina Amirah

Publications and Research

Purpose – This study aims to investigate how the management of supply chain information impacts the performance of the supply chain. This relationship is explored by considering the mediating influence of internal and external integration, which is underpinned by the principles of resource-based theory. Design/methodology/approach – Data was collected from 144 supply chain professionals across different manufacturing companies. The proposed hypotheses were subjected to quantitative analysis using partial least squares structural equation modeling, and the validity of the measurement model was assessed with the assistance of SmartPLS software. Findings – This study identified that information management (IM) significantly and positively …


Using Hybrid Machine Learning Models For Stock Price Forecasting And Trading., Ahmed Khalil May 2024

Using Hybrid Machine Learning Models For Stock Price Forecasting And Trading., Ahmed Khalil

Theses and Dissertations

Trading stocks of publicly traded companies in stock markets is a challenging topic since investors are researching what tools can be used to maximize their profits while minimizing risks, which encouraged all researchers to research and test different methods to reach such a goal. As a result, the use of both fundamental analysis and technical analysis started to evolve to support traders in buying and selling stocks. Recently, the focus increased on using Machine learning models to predict stock prices and algorithmic trading as currently there is a huge amount of data that can be processed and used to forecast …


Impacts Of Energy Price Cap System On Electricity And Gas Prices In The Era Of Energy Crisis, Jyothi Swaroop Chava May 2024

Impacts Of Energy Price Cap System On Electricity And Gas Prices In The Era Of Energy Crisis, Jyothi Swaroop Chava

Electronic Theses, Projects, and Dissertations

29 million households in the United Kingdom (UK) use Energy Price Cap and the UK government spend about 43 billion dollars a year which is 1.7 percent of the GDP in subsidizing the energy price cap subsidies to the households and businesses. The energy prices in the UK have seen a significant rise in the past few years for distinct reasons. This culminating experience project explains the mechanism of the energy price cap used for the household energy supply in the UK and how it has been affected between the years 2022 to 2024. The research questions are: (Q1) How …