Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Physical Sciences and Mathematics

Ascertaining The Relationship Between Security Awareness And The Security Behavior Of Individuals, Gordon J. Grant Jan 2010

Ascertaining The Relationship Between Security Awareness And The Security Behavior Of Individuals, Gordon J. Grant

CCE Theses and Dissertations

Security threats caused by the inappropriate actions of the user continue to be a significant security problem within any organization. The purpose of this study was to continue the efforts of Katz by assessing the security behavior and practices of working professionals. Katz conducted a study that assessed whether the faculty and staff at Armstrong Atlantic State University had been performing the simple everyday practices and behavior necessary to avert insider threats to information security. Critical in understanding human behavior is in knowing how behavior varies across different groups or demographics. Because a user's behavior can be influenced by demographic …


Judges' Awareness, Understanding, And Application Of Digital Evidence, Gary Craig Kessler Jan 2010

Judges' Awareness, Understanding, And Application Of Digital Evidence, Gary Craig Kessler

CCE Theses and Dissertations

As digital evidence grows in both volume and importance in criminal and civil courts, judges need to fairly and justly evaluate the merits of the offered evidence. To do so, judges need a general understanding of the underlying technologies and applications from which digital evidence is derived. Due to the relative newness of the computer forensics field, there have been few studies on the use of digital forensic evidence and none about judges' relationship with digital evidence.

This study addressed judges' awareness, knowledge, and perceptions of digital evidence, using grounded theory methods. The interaction of judges with digital evidence has …


Quantum Algorithm Animator, Lori Eileen Nicholson Jan 2010

Quantum Algorithm Animator, Lori Eileen Nicholson

CCE Theses and Dissertations

The design and development of quantum algorithms present a challenge, especially for inexperienced computer science students. Despite the numerous common concepts with classical computer science, quantum computation is still considered a branch of theoretical physics not commonly used by computer scientists. Experimental research into the development of a quantum computer makes the use of quantum mechanics in organizing computation more attractive, however the physical realization of a working quantum computer may still be decades away.

This study introduces quantum computing to computer science students using a quantum algorithm animator called QuAL. QuAL's design uses features common to classical algorithm animators …


Trust And Trustworthiness: A Framework For Successful Design Of Telemedicine, James Robert Templeton Jan 2010

Trust And Trustworthiness: A Framework For Successful Design Of Telemedicine, James Robert Templeton

CCE Theses and Dissertations

Trust and its antecedents have been demonstrated as a barrier to the successful adoption of numerous fields of technology, most notably e-commerce, and may be a key factor in the lack of adoption or adaptation in the field of telemedicine. In the medical arena, trust is often formed through the relationships cultivated over time via clinician and patient. Trust and interpersonal relationships may also play a significant role in the adoption of telemedicine. The idea of telemedicine has been explored for nearly 30 years in one form or another. Yet, despite grandiose promises of how it will someday significantly improve …


Physician Information Seeking Behaviors: Are Physicians Successful Searchers?, Janice Swiatek-Kelley Jan 2010

Physician Information Seeking Behaviors: Are Physicians Successful Searchers?, Janice Swiatek-Kelley

CCE Theses and Dissertations

In the recent past, physicians found answers to questions by consulting colleagues, textbooks, and professional journals. Now, the availability of medical information through electronic resources has changed physician information-seeking behaviors. Evidence-based medicine is now the accepted decision-making paradigm, and a physician's ability to locate best practice guidelines through electronic information resources has become an essential skill. As physicians struggle to stay current in the wake of an ever-growing volume of medical information, several electronic resources claim to provide one-stop access to the most current information with correct and complete answers to problems encountered in the practice of health care. The …


Early Detection Of Online Auction Opportunistic Sellers Through The Use Of Negative-Positive Feedback, Gregory J. Reinert Jan 2010

Early Detection Of Online Auction Opportunistic Sellers Through The Use Of Negative-Positive Feedback, Gregory J. Reinert

CCE Theses and Dissertations

Apparently fraud is a growth industry. The monetary losses from Internet fraud have increased every year since first officially reported by the Internet Crime Complaint Center (IC3) in 2000. Prior research studies and third-party reports of fraud show rates substantially higher than eBay’s reported negative feedback rate of less than 1%. The conclusion is most buyers are withholding reports of negative feedback.

Researchers Nikitov and Stone in a forensic case study of a single opportunistic eBay seller found buyers sometimes embedded negative comments in positive feedback as a means of avoiding retaliation from sellers and damage to their reputation. This …


Assistive Technology Attrition: Identifying Why Teachers Abandon Assistive Technologies, Michael Edward Sharpe Jan 2010

Assistive Technology Attrition: Identifying Why Teachers Abandon Assistive Technologies, Michael Edward Sharpe

CCE Theses and Dissertations

The study surveyed a sample of K-12 teachers who had used assistive technology (AT) in the classroom to determine answers to five research questions. These were, (1) why the teachers adopted AT, (2) their attitudes and perceptions about its value, (3) challenges they have experienced in adopting AT, (4) whether they have discontinued or decreased use of AT, and, if so, (5) the factors that led to this result.

The study used both quantitative and qualitative methods. For the quantitative aspect, an online survey instrument was developed to answer five research questions. Participants were teachers who had used AT in …


An Analysis Of The Radio Frequency Identification (Rfid) Technology Implementation Within An Independent Public Library System: A Case Study Of The North Canton, Ohio Public Library, Keith P. Lyons Jan 2010

An Analysis Of The Radio Frequency Identification (Rfid) Technology Implementation Within An Independent Public Library System: A Case Study Of The North Canton, Ohio Public Library, Keith P. Lyons

CCE Theses and Dissertations

An Analysis of the Radio Frequency Identification (RFID) Technology Implementation within an Independent Public Library System:

A Case Study of the North Canton, Ohio Public Library

by

Keith P. Lyons

June 2010

Public libraries require efficient control systems to maintain accurate inventories, statistics, and records of patron borrowing. Generally, public libraries use barcode technology to accomplish these tasks. Radio frequency identification (RFID) has gained the attention of public library personnel in recent years as a replacement for barcodes. RFID implementation contributes to improved staff productivity, increased operational efficiency, and improved item security as well. While potential benefits are significant, issues …


Developing A Framework For Evaluation Of Corporate Non-Transactional Business-To-Consumer Web Sites: A Descriptive Study, Karen Denise Pate Jan 2010

Developing A Framework For Evaluation Of Corporate Non-Transactional Business-To-Consumer Web Sites: A Descriptive Study, Karen Denise Pate

CCE Theses and Dissertations

During the soaring information economy of the last decade, organizations spent large sums of money on the development of Web sites without much knowledge of their performance value. In time, organizations realized that measuring Web site performance to determine value was fundamental. For transactional, e-commerce Business-to-Consumer (B2C) Web sites, this effort is straightforward because value is attached to sales. Measuring performance to determine the value of non-transactional B2C Web sites (i.e., sites that provide information, not sales) is more complex.

This study examined the underexplored subject of evaluating non-transactional Web sites. Performance was defined as outcomes ranging from site visitor …


An Investigation Of Factors That Affect Hipaa Security Compliance In Academic Medical Centers, James William Brady Jan 2010

An Investigation Of Factors That Affect Hipaa Security Compliance In Academic Medical Centers, James William Brady

CCE Theses and Dissertations

HIPAA security compliance in academic medical centers is a central concern of researchers, academicians, and practitioners. Increased numbers of data security breaches and information technology implementations have caused concern over the confidentiality, integrity, and availability of electronic personal health information. The federal government has implemented stringent HIPAA security compliance reviews and significantly extended the scope and enforcement of the HIPAA Security Rule. However, academic medical centers have shown limited compliance with the HIPAA Security Rule. Therefore, the goal of this study was to investigate the factors that may affect HIPAA security compliance in academic medical centers. Based on a review …


A Species-Conserving Genetic Algorithm For Multimodal Optimization, Michael Scott Brown Jan 2010

A Species-Conserving Genetic Algorithm For Multimodal Optimization, Michael Scott Brown

CCE Theses and Dissertations

The problem of multimodal functional optimization has been addressed by much research producing many different search techniques. Niche Genetic Algorithms is one area that has attempted to solve this problem. Many Niche Genetic Algorithms use some type of radius. When multiple optima occur within the radius, these algorithms have a difficult time locating them. Problems that have arbitrarily close optima create a greater problem. This paper presents a new Niche Genetic Algorithm framework called Dynamic-radius Species-conserving Genetic Algorithm. This new framework extends existing Genetic Algorithm research.

This new framework enhances an existing Niche Genetic Algorithm in two ways. As the …