Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cybersecurity (5)
- Artificial intelligence (3)
- Machine learning (3)
- Classification (2)
- Computer science (2)
-
- Data breach (2)
- Deep learning (2)
- Information security (2)
- Information technology (2)
- Sentiment analysis (2)
- Attention (1)
- Automation (1)
- Batch-mode Expected Model Change Maximization (B-EMCM) (1)
- Behavioral sciences (1)
- BitTorrent (1)
- Blended learning (1)
- Business email compromise (1)
- CNN (1)
- COVID-19 (1)
- Circular Hough Transform (CHT) (1)
- Classifier (1)
- Cloud security (1)
- Cognitive biases (1)
- Cognitive heuristics (1)
- Compliance (1)
- Computer engineering (1)
- Concept drift (1)
- Concept matching (1)
- Corporate social responsibility (1)
- Cox (1)
Articles 1 - 27 of 27
Full-Text Articles in Physical Sciences and Mathematics
Organizational Culture And Knowledge Transfer In Enterprise Social Media, Garry Blackstock
Organizational Culture And Knowledge Transfer In Enterprise Social Media, Garry Blackstock
CCE Theses and Dissertations
Enterprise social media (ESM), digital platforms used within organizations to facilitate knowledge sharing and collaboration, are valuable tools that can help organizations gain a competitive advantage. Efficient retention, dissemination, and transfer of knowledge is an industry differentiator, and companies are spending a tremendous amount of resources on ESM to achieve this discriminating advantage. The behavior of transferring knowledge, especially tacit knowledge, can be a challenging task. Discordant organizational culture has been identified as a barrier to efficient knowledge transfer, whether it is explicit or tacit. Despite ESM’s positive track record of promoting communication, it lacks the efficiency to facilitate knowledge …
The Influence Of Cognitive Factors And Personality Traits On Mobile Device User's Information Security Behavior, Nils Lau
CCE Theses and Dissertations
As individuals have become more dependent on mobile devices to communicate, to seek information, and to conduct business, their susceptibility to various threats to information security has also increased. Research has consistently shown that a user’s intention is a significant antecedent of information security behavior. Although research on user’s intention has expanded in the last few years, not enough is known about how cognitive factors and personality traits impact the adoption and use of mobile device security technologies.
The purpose of this research was to empirically investigate the influence of cognitive factors and personality traits on mobile device user’s intention …
Examining The Creation Of Information Privacy Culture In Healthcare Organizations To Achieve Collective Hipaa Compliance Practice, Osborne Obeng
Examining The Creation Of Information Privacy Culture In Healthcare Organizations To Achieve Collective Hipaa Compliance Practice, Osborne Obeng
CCE Theses and Dissertations
The digitization and transfer of patient records has increased the risk of patient data being improperly handled by healthcare organizations. In light of this growing concern, the United States government and state authorities have implemented various regulations to mitigate the privacy concerns. Beside privacy regulations, healthcare organizations have been forced by other pressures such as organization’s competitive pressures, resources, ethical responsibilities, and legitimacy to implement privacy safeguards. However, surveys show that healthcare organizations fail to achieve information privacy compliance. This study examined the creation of information privacy culture from the different occupational communities in healthcare organizations to help achieve information …
An Approach To Twitter Event Detection Using The Newsworthiness Metric, Jonathan Adkins
An Approach To Twitter Event Detection Using The Newsworthiness Metric, Jonathan Adkins
CCE Theses and Dissertations
No abstract provided.
A Covid-19 Induced Shift: From Introducing High School Females To Computing Careers To An Assessment Of Technological Readiness Among Stem Teachers, Jareau Almeyda
CCE Theses and Dissertations
Prior to the global COVID-19 pandemic, this study aimed to explore how exposure to information systems (IS) project management impacts perceptions of computing careers among high school female participants. Given the demand for computing professionals continues to grow, enrollment in some computing disciplines across institutions of higher education have experienced declining enrollments. Studies have shown that one of the reasons high school students do not enroll in computing disciplines is because they perceive computing as difficult, boring, and irrelevant.
As a computing discipline, information systems is focused on developing professionals who are able to integrate technologies into systems that run …
Predictive Accuracy Of Recommender Algorithms, William Blake Noffsinger
Predictive Accuracy Of Recommender Algorithms, William Blake Noffsinger
CCE Theses and Dissertations
Recommender systems present a customized list of items based upon user or item characteristics with the objective of reducing a large number of possible choices to a smaller ranked set most likely to appeal to the user. A variety of algorithms for recommender systems have been developed and refined including applications of deep learning neural networks. Recent research reports point to a need to perform carefully controlled experiments to gain insights about the relative accuracy of different recommender algorithms, because studies evaluating different methods have not used a common set of benchmark data sets, baseline models, and evaluation metrics. The …
An Investigation Of The Factors That Contribute To The Perceived Likelihood Of Compliance With The Hipaa Security Rule Among Healthcare Covered Entities And Business Associates, James Furstenberg
CCE Theses and Dissertations
The Health Insurance Portability and Accountability Act (HIPAA) Security Rule (SR) mandate provides a national standard for the safeguard of electronically protected health information (ePHI). SR compliance enforcement efforts started in 2005; however, U.S.-based covered entities and business associates (CEs & BAs) remain challenged to comply with the HIPAA SR regulatory strategy. Although there is a significant volume of academic research on HIPAA compliance, research specific to the SR is sparse.
This study addressed the research gap by designing a unique conceptual model that assessed factors affecting CEs & BAs compliance (or non-compliance) with the SR regulatory strategy. The primary …
Sns Use, Risk, And Executive Behavior, Andrew Green
Sns Use, Risk, And Executive Behavior, Andrew Green
CCE Theses and Dissertations
Andrew Green April 2020 Personal social networking sites (SNS) are popular outlets for people to share information about themselves, their family and friends, and their personal and professional lives. On the surface, the information shared may seem to be innocuous or nonthreatening. However, prior studies have shown that cybercriminals can take information shared via personal SNS and use it to conduct attacks against organizations. Organization executives are of particular interest to cybercriminals because they have access to sensitive data, and they also have the ability to command actions from their subordinates. The purpose of this study was to explore what …
Reducing Bittorrent Download Time Via Handshake-Based Switching, Elliotte Kim
Reducing Bittorrent Download Time Via Handshake-Based Switching, Elliotte Kim
CCE Theses and Dissertations
Peer-to-peer networking overcomes the single point of failure and bandwidth limitations inherent to the centralized server model of file-sharing. It is both a popular means of sharing digital content and a major consumer of internet traffic, with BitTorrent being the most-used protocol. As such, significant research has gone into improving peer-to-peer performance in order to reduce both download times and networking costs. One aspect that can affect performance is the client’s selection of peers to download from, as the time spent downloading from even a single poor-performing peer can impact the overall download duration.
A recent peer selection strategy explored …
Prediction Of Sudden Cardiac Death Using Ensemble Classifiers, Ayman Momtaz El-Geneidy
Prediction Of Sudden Cardiac Death Using Ensemble Classifiers, Ayman Momtaz El-Geneidy
CCE Theses and Dissertations
Sudden Cardiac Death (SCD) is a medical problem that is responsible for over 300,000 deaths per year in the United States and millions worldwide. SCD is defined as death occurring from within one hour of the onset of acute symptoms, an unwitnessed death in the absence of pre-existing progressive circulatory failures or other causes of deaths, or death during attempted resuscitation. Sudden death due to cardiac reasons is a leading cause of death among Congestive Heart Failure (CHF) patients. The use of Electronic Medical Records (EMR) systems has made a wealth of medical data available for research and analysis. Supervised …
Deep Neural Networks For Sentiment Analysis In Tweets With Emoticons, Mutharasu Narayanaperumal
Deep Neural Networks For Sentiment Analysis In Tweets With Emoticons, Mutharasu Narayanaperumal
CCE Theses and Dissertations
Businesses glean meaningful feedback in regard to products and services from social media posts in order to improve the quality of products and services, as well as to meet customer expectations. Sentiment analysis is increasingly being used to help businesses by assigning positive or negative polarity to such posts. Although methods currently exist to determine the polarity of sentiments, such methods are unreliable when posts contain terms that are not typically part of a standard dictionary used for sentiment analysis, such as slang and informal language. This dissertation has aimed to empirically investigate alternative methods to improve the classification accuracy …
Smart Privacy For Iot: Privacy Embedded Design For Home Automation Systems, Love James
Smart Privacy For Iot: Privacy Embedded Design For Home Automation Systems, Love James
CCE Theses and Dissertations
The emerging paradigm shift in technology to make everyday devices more intelligent than previously considered also known as internet of things (IoT) has further elevated the importance of privacy not only in theory but also in practice. The intrusive nature of these devices and in particular, the home automation system is also beginning to raise privacy concerns which might impact their usage either by deterring potential users from adopting the technology or discouraging existing users from the continued use of these home automation systems.
This study was an empirical and quantitative study that evaluates the impact of users’ behavior when …
Improvements To Iterated Local Search For Microaggregation, Tracy Bierman
Improvements To Iterated Local Search For Microaggregation, Tracy Bierman
CCE Theses and Dissertations
Microaggregation is a disclosure control method that uses k-anonymity to protect confidentiality in microdata while seeking minimal information loss. The problem is NP-hard. Iterated local search for microaggregation (ILSM) is an effective metaheuristic algorithm that consistently identifies better quality solutions than extant microaggregation methods. The present work presents improvements to local search, the perturbation operations and acceptance criterion within ILSM.
The first, ILSMC, targets changed clusters within local search (LS) to avoid vast numbers of comparison tests, significantly reducing execution times. Second, a new probability distribution yields a better perturbation operator for most cases, significantly reducing the number of iterations …
Adaptive Batch Size Selection In Active Learning For Regression, Anthony L. Faulds
Adaptive Batch Size Selection In Active Learning For Regression, Anthony L. Faulds
CCE Theses and Dissertations
Training supervised machine learning models requires labeled examples. A judicious choice of examples is helpful when there is a significant cost associated with assigning labels. This dissertation aims to improve upon a promising extant method - Batch-mode Expected Model Change Maximization (B-EMCM) method - for selecting examples to be labeled for regression problems. Specifically, it aims to develop and evaluate alternate strategies for adaptively selecting batch size in B-EMCM, named adaptive B-EMCM (AB-EMCM).
By determining the cumulative error that occurs from the estimation of the stochastic gradient descent, a stop criteria for each iteration of the batch can be specified …
Identifying Physicians’ User Experience (Ux) Pain Points In Using Electronic Health Record (Ehr) Systems, Elizabeth Janelle Arceneaux
Identifying Physicians’ User Experience (Ux) Pain Points In Using Electronic Health Record (Ehr) Systems, Elizabeth Janelle Arceneaux
CCE Theses and Dissertations
Healthcare institutions have migrated to online electronic documentation through the means of Electronic Health Record (EHR) systems. Physicians rely on these systems to support their various clinical work processes, such as entering clinical orders, reviewing essential clinical data, and making important medical decisions using reporting analytics. Although EHR systems appear to be useful and have known advantages over paper records, studies suggest there are persistent user interface design problems that may hinder physician productivity. The study focused on the research problem that EHR system designs create productivity problems for physician users who frequently report that system workflows are inefficient and …
An Empirical Assessment Of Audio/Visual/Haptic Alerts And Warnings To Mitigate Risk Of Phishing Susceptibility In Emails On Mobile Devices, Molly Marie Cooper
An Empirical Assessment Of Audio/Visual/Haptic Alerts And Warnings To Mitigate Risk Of Phishing Susceptibility In Emails On Mobile Devices, Molly Marie Cooper
CCE Theses and Dissertations
Phishing emails present a threat to both personal and organizational data. Phishing is a cyber-attack using social engineering. About 94% of cybersecurity incidents are due to phishing and/or social engineering. A significant volume of prior literature documented that users are continuing to click on phishing links in emails, even after phishing awareness training. It appears there is a strong need for creative ways to alert and warn users to signs of phishing in emails.
The main goal of the experiments in this study was to measure participants’ time for recognizing signs of phishing in emails, thus, reducing susceptibility to phishing …
Sns As An Educational Tool: Effect On Academic Performance And Learners’ Perceptions, Nawwaf Mohssen Altalhi
Sns As An Educational Tool: Effect On Academic Performance And Learners’ Perceptions, Nawwaf Mohssen Altalhi
CCE Theses and Dissertations
With Social Networking Sites (SNSs) being extensively used by students, there has been extensive research in relation to their ability to enhance students’ academic performance in various learning environments, although the advent of research on online learning is a recent development.
Studies regarding the use of SNSs indicated that there was a negative relationship between students’ use of SNSs and students’ academic performance. However, it is unknown whether the implementation of an instructional training course utilizing SNSs as an educational tool might lead to improvements in students’ academic performance. Many students have admitted to not knowing how to properly use …
A Hierarchical Temporal Memory Sequence Classifier For Streaming Data, Jeffrey Barnett
A Hierarchical Temporal Memory Sequence Classifier For Streaming Data, Jeffrey Barnett
CCE Theses and Dissertations
Real-world data streams often contain concept drift and noise. Additionally, it is often the case that due to their very nature, these real-world data streams also include temporal dependencies between data. Classifying data streams with one or more of these characteristics is exceptionally challenging. Classification of data within data streams is currently the primary focus of research efforts in many fields (i.e., intrusion detection, data mining, machine learning). Hierarchical Temporal Memory (HTM) is a type of sequence memory that exhibits some of the predictive and anomaly detection properties of the neocortex. HTM algorithms conduct training through exposure to a stream …
Usability Of Portable Eeg For Monitoring Students’ Attention In Online Learning, Arisaphat Suttidee
Usability Of Portable Eeg For Monitoring Students’ Attention In Online Learning, Arisaphat Suttidee
CCE Theses and Dissertations
Current research demonstrates that distractions while participating in online courses affect students’ performance in online tasks. Electroencephalography (EEG) devices are currently being used in education to help students maintain attention when engaged in online classes. Previous studies have focused predominantly on comparing EEG devices, EEG signal quality, and EEG effectiveness. However, there is no comprehensive study examining the usability of the portable EEG headset to monitor students' attention in online courses.
This study aimed to examine the usability of EEG devices while monitoring student attention levels during online educational tasks. Specifically, twenty (20) participants who intend to enroll in online …
Detecting Rogue Manipulation Of Smart Home Device Settings, David Zeichick
Detecting Rogue Manipulation Of Smart Home Device Settings, David Zeichick
CCE Theses and Dissertations
Smart home devices control a home’s environmental and security settings. This includes devices that control home thermostats, sprinkler systems, light bulbs, and home appliances. Malicious manipulation of the settings of these devices by an outside adversary has caused emotional distress and could even cause physical harm. For example, researchers have reported that there is a rise in domestic abuse perpetrated via smart home devices; victims have reported their thermostat settings being unwittingly manipulated and being locked out of their house due to their smart lock code being changed. Rapid adoption of smart home devices by consumers has led to an …
Development Of Criteria For Mobile Device Cybersecurity Threat Classification And Communication Standards (Ctc&Cs), Emmanuel Jigo
Development Of Criteria For Mobile Device Cybersecurity Threat Classification And Communication Standards (Ctc&Cs), Emmanuel Jigo
CCE Theses and Dissertations
The increasing use of mobile devices and the unfettered access to cyberspace has introduced new threats to users. Mobile device users are continually being targeted for cybersecurity threats via vectors such as public information sharing on social media, user surveillance (geolocation, camera, etc.), phishing, malware, spyware, trojans, and keyloggers. Users are often uninformed about the cybersecurity threats posed by mobile devices. Users are held responsible for the security of their device that includes taking precautions against cybersecurity threats. In recent years, financial institutions are passing the costs associated with fraud to the users because of the lack of security.
The …
Classifying Relations Using Recurrent Neural Network With Ontological-Concept Embedding, Mario J. Lorenzo
Classifying Relations Using Recurrent Neural Network With Ontological-Concept Embedding, Mario J. Lorenzo
CCE Theses and Dissertations
Relation extraction and classification represents a fundamental and challenging aspect of Natural Language Processing (NLP) research which depends on other tasks such as entity detection and word sense disambiguation. Traditional relation extraction methods based on pattern-matching using regular expressions grammars and lexico-syntactic pattern rules suffer from several drawbacks including the labor involved in handcrafting and maintaining large number of rules that are difficult to reuse. Current research has focused on using Neural Networks to help improve the accuracy of relation extraction tasks using a specific type of Recurrent Neural Network (RNN). A promising approach for relation classification uses an RNN …
A Pcnn Framework For Blood Cell Image Segmentation, Carol D. Lenihan
A Pcnn Framework For Blood Cell Image Segmentation, Carol D. Lenihan
CCE Theses and Dissertations
This research presents novel methods for segmenting digital blood cell images under a Pulse Coupled Neural Network (PCNN) framework. A blood cell image contains different types of blood cells found in the peripheral blood stream such as red blood cells (RBCs), white blood cells (WBCs), and platelets. WBCs can be classified into five normal types – neutrophil, monocyte, lymphocyte, eosinophil, and basophil – as well as abnormal types such as lymphoblasts and others. The focus of this research is on identifying and counting RBCs, normal types of WBCs, and lymphoblasts. The total number of RBCs and WBCs, along with classification …
Cybersecurity Risk-Responsibility Taxonomy: The Role Of Cybersecurity Social Responsibility In Small Enterprises On Risk Of Data Breach, Keiona Davis
CCE Theses and Dissertations
With much effort being placed on the physical, procedural, and technological solutions for Information Systems (IS) cybersecurity, research studies tend to focus their efforts on large organizations while overlooking very smaller organizations (below 50 employees). This study addressed the failure to prevent data breaches in Very Small Enterprises (VSEs). VSEs contribute significantly to the economy, however, are more prone to cyber-attacks due to the limited risk mitigations on their systems and low cybersecurity skills of their employees. VSEs utilize Point-of-Sale (POS) systems that are exposed to cyberspace, however, they are often not equipped to prevent complex cybersecurity issues that can …
The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, Zulma Valedon Westney
The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, Zulma Valedon Westney
CCE Theses and Dissertations
Social media networking sites (SMNS) have become a popular communications medium where users share information, knowledge, and persuasion. In less than two decades, social media's (SM) dominance as a communication medium can't be disputed, for good or evil. Combined with the newly found immediacy and pervasiveness, these SM applications' persuasive power are useful weapons for organizations, angry customers, employees, actors, and activists bent on attacking or hacking other individuals, institutions, or systems. Consequently, SM has become the preferred default mechanism of news sources; however, users are unsure if the information gathered is true or false. According to the literature, SMNS …
Protecting The Protector: Mapping The Key Terrain That Supports The Continuous Monitoring Mission Of A Cloud Cybersecurity Service Provider, Chris Bush
CCE Theses and Dissertations
Key terrain is a concept that is relevant to warfare, military strategy, and tactics. A good general maps out terrain to identify key areas to protect in support of a mission (i.e., a bridge allowing for mobility of supplies and reinforcements). Effective ways to map terrain in Cyberspace (KT-C) has been an area of interest for researchers in Cybersecurity ever since the Department of Defense designated Cyberspace as a warfighting domain. The mapping of KT-C for a mission is accomplished by putting forth efforts to understand and document a mission's dependence on Cyberspace and cyber assets. A cloud Cybersecurity Service …
Unix Administrator Information Security Policy Compliance: The Influence Of A Focused Seta Workshop And Interactive Security Challenges On Heuristics And Biases, John Palmer Mcconnell
Unix Administrator Information Security Policy Compliance: The Influence Of A Focused Seta Workshop And Interactive Security Challenges On Heuristics And Biases, John Palmer Mcconnell
CCE Theses and Dissertations
Information Security Policy (ISP) compliance is crucial to the success of healthcare organizations due to security threats and the potential for security breaches. UNIX Administrators (UXAs) in healthcare Information Technology (IT) maintain critical servers that house Protected Health Information (PHI). Their compliance with ISP is crucial to the confidentiality, integrity, and availability of PHI data housed or accessed by their servers. The use of cognitive heuristics and biases may negatively influence threat appraisal, coping appraisal, and ultimately ISP compliance behavior. These failures may result in insufficiently protected servers and put organizations at greater risk of data breaches and financial loss. …