Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Series

Information technology

Institution
Publication Year
Publication
File Type

Articles 31 - 60 of 60

Full-Text Articles in Physical Sciences and Mathematics

A Sustainability Component For A First-Year Course For Information Technology Students, Stefan Robila Oct 2012

A Sustainability Component For A First-Year Course For Information Technology Students, Stefan Robila

Department of Computer Science Faculty Scholarship and Creative Works

The concept of green computing has become a popular label employed by all major IT corporations when promoting either their hardware as energy efficient or asserting that their software solutions improve work performance and reduce the carbon footprint. Yet, how one addresses sustainability in computing is still a developing area and without clear guidelines or standards. Preparing students on topics of computing sustainability is thus essential for ensuring the future professionals have the skills to tackle such an important challenge. In this paper we propose a sustainability module we developed for an introductory computing course. We start by providing a …


How One Trade Could Change The World: High Frequency Trading And The Flash Crash Of 2010, Sarah Perlman Apr 2012

How One Trade Could Change The World: High Frequency Trading And The Flash Crash Of 2010, Sarah Perlman

Honors Projects in Finance

Financial markets are controlled directly by a small population of people, but have direct effects on almost every aspect of the global community. Financial markets are now flooded with computerized algorithms that have drastically changed the face of trading. As with any advances in technology, there are always unforeseen events that create new challenges, and adjustments that need to be made. In our increasingly global and technological world, one wrong click of the mouse in New York could affect the stock markets in London, Tokyo, and Brazil. On May 6th, 2010, such a situation occurred and caused the Dow Jones …


How Information Management Capability Influences Firm Performance, Sunil Mithas, Narayan Ramasubbu, V. Sambamurthy Mar 2011

How Information Management Capability Influences Firm Performance, Sunil Mithas, Narayan Ramasubbu, V. Sambamurthy

Research Collection School Of Computing and Information Systems

How do information technology capabilities contribute to firm performance? This study develops a conceptual model linking IT-enabled information management capability with three important organizational capabilities (customer management capability, process management capability, and performance management capability). We argue that these three capabilities mediate the relationship between information management capability and firm performance. To test our conceptual model, we use a rare archival data set that contains actual scores from multidimensional and high-quality assessments of firms and intraorganizational units of a conglomerate business group that had adopted a model of performance excellence for organizational transformation based on the Baldrige criteria. This research …


Which Organisational Model Meets Best Practice Criterion For Critical Infrastructure Providers: An Examination Of The Australian Perspective Based On Case Studies, Andrew Woodward, Craig Valli Aug 2010

Which Organisational Model Meets Best Practice Criterion For Critical Infrastructure Providers: An Examination Of The Australian Perspective Based On Case Studies, Andrew Woodward, Craig Valli

International Cyber Resilience conference

While it is recognised that there must be segregation between corporate and process control networks in order to achieve a higher level of security, there is evidence that this is not occurring. Computer and network vulnerability assessments were carried out on three Australian critical infrastructure providers to determine their level of security. The security measures implemented by each organisation have been mapped against best practice recommendations for achieving segregation between process control and corporate networks. One of the organisations used a model which provided a dedicated information security team for provision of security for the process control networks. One of …


A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade Jul 2010

A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade

Faculty and Research Publications

Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine …


Integrating Environmental Science Into Information Technology Content To Generate Student Interest, Rondalynne Mcclintock '13, Yoonmi Lee '12, June Hilton '04, Brian Hilton, Gondy Leroy Jan 2010

Integrating Environmental Science Into Information Technology Content To Generate Student Interest, Rondalynne Mcclintock '13, Yoonmi Lee '12, June Hilton '04, Brian Hilton, Gondy Leroy

CGU Faculty Publications and Research

In an effort to increase female student interest in computing we applied and evaluated an interdisciplinary approach at a suburban high school in eastern Los Angeles County, California. Three classes, an IB Environmental Science class, an AP Environmental Science class, and a Computer Science were surveyed to assess attitude changes toward information technology. Results indicated gender differences between the participating classes, and differences before and after the project. Although the project did not uniformly impact the attitude of female high school students, it impacted teachers who are adjusting their teaching methods, an outcome that has a long-term positive influence.


Information Technology Adoption In Latin American Microenterprises, Travis Good, Mehruz Kamal, Sajda Qureshi, Nancy Jimenez Jan 2010

Information Technology Adoption In Latin American Microenterprises, Travis Good, Mehruz Kamal, Sajda Qureshi, Nancy Jimenez

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

The majority of businesses in developing regions across the world are microenterprises. In recent years, this form of business has been particularly resilient to economic downturns. While microenterprises are the least likely to succeed, when they do, their growth increases by a factor of 3.4% when they adopt technology. However, the challenges faced by microenterprises make it very difficult for them to adopt technology successfully. Existing theoretical models of ICT adoption have centered on intent to adopt in large organizations, and thus lack applicability to microenterprises, wherein the intent to adopt is an individual decision. This paper builds on prior …


Electronic-Supply Chain Information Security: A Framework For Information, Alizera Bolhari Dec 2009

Electronic-Supply Chain Information Security: A Framework For Information, Alizera Bolhari

Australian Information Security Management Conference

Over the last few years, the materials and distribution management has developed into a broader strategic approach known as electronic supply chain management by means of information technology. This paper attempts to visibly describe supply chain management information security concepts which are necessary for managers to know about. So, the depth of information presented in this paper is calibrated for managers, not technical security employees or agents. Global supply chains are exposed to diverse types of risks that rise along with increasing globalization. Electronic supply chains will be more vulnerable from information security (IS) aspect among other types of supply …


Open Forum: The Future Of Library Systems, Maria Collins, Andrée J. Rathemacher Jul 2009

Open Forum: The Future Of Library Systems, Maria Collins, Andrée J. Rathemacher

Technical Services Department Faculty Publications

Moderated by Maria Collins of North Carolina State University, discussion at this open forum on the future of library systems touched on open-source library systems, cloud computing, new initiatives by the Open Library Environment (OLE) Project and OCLC, and desired characteristics of future integrated library systems. Most participants had limited experience with next-generation library systems and attended the open forum with the desire to broaden their understanding, although some were exposed to or had worked with the open-source discovery tool VuFind, the OLE Project, WorldCat Local, and the OCLC Web-scale service. A strong desire to customize library systems to meet …


A University-Based Forensics Training Center As A Regional Outreach, Education, And Research Activity, Rayford B. Vaughn, David A. Dampier Mar 2009

A University-Based Forensics Training Center As A Regional Outreach, Education, And Research Activity, Rayford B. Vaughn, David A. Dampier

Computer Sciences and Electrical Engineering Faculty Research

This paper describes a university-based Forensics Training Center (FTC) established by a Department of Justice grant for the purpose of improving the ability of state and local law enforcement in the Southeastern part of the United States to address the rising incidence of computer based crime. The FTC effort is described along with supporting evidence of its need. The program is not only a service activity, but also contributes to the Mississippi State University (MSU) security program pedagogy, and research effort.


Information Technology Adoption By Small Businesses In Minority And Ethnic Communities, Sajda Qureshi, Anne S. York Jan 2008

Information Technology Adoption By Small Businesses In Minority And Ethnic Communities, Sajda Qureshi, Anne S. York

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

Information systems adoption by small businesses often is viewed as a basic building block of economic development. Yet, the components that impact business success and thus economic development are mostly unexplored, especially within the context of minority and ethnic communities, both domestically and internationally. Given that IT adoption in small businesses is very often the domain of the business owner, an investigation of how the attributes of individual business owners and the context in which they are embedded is essential. This paper develops an integrative model of the role that IT adoption plays in business success and the economic development …


Adoption Of Information Technology By Micro-Enterprises: Insights From A Rural Community, Sajda Qureshi, Mehruz Kamal, Travis Good Jan 2008

Adoption Of Information Technology By Micro-Enterprises: Insights From A Rural Community, Sajda Qureshi, Mehruz Kamal, Travis Good

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

It appears that the growth of micro-enterprises is a key driver of economic development in underserved communities. However their growth is limited to only 20% of the economy even though they comprise 87% of businesses in Nebraska. Research has shown that IT adoption can increase their growth by 3.5% but the challenges to IT adoption by microenterprises are many. Current theoretical models on IT adoption focus on the intent to adopt IT in large organizations where employees’ attitudes and perceptions are measured in terms of their objectives within the structures of accountability. Microenterprises are unique in that the intention to …


Crime Information Extraction From Police And Witness Narrative Reports, Chih Hao Ku '12, Alicia Iriberri '06, Gondy A. Leroy Jan 2008

Crime Information Extraction From Police And Witness Narrative Reports, Chih Hao Ku '12, Alicia Iriberri '06, Gondy A. Leroy

CGU Faculty Publications and Research

To solve crimes, investigators often rely on interviews with witnesses, victims, or criminals themselves. The interviews are transcribed and the pertinent data is contained in narrative form. To solve one crime, investigators may need to interview multiple people and then analyze the narrative reports. There are several difficulties with this process: interviewing people is time consuming, the interviews - sometimes conducted by multiple officers - need to be combined, and the resulting information may still be incomplete. For example, victims or witnesses are often too scared or embarrassed to report or prefer to remain anonymous. We are developing an online …


Making The ‘Most’ Out Of Rfid Technology: A Research Agenda For The Study Of The Adoption, Use And Impact Of Rfid, John Curtin, Robert J. Kauffman, Frederick J. Riggins Jun 2007

Making The ‘Most’ Out Of Rfid Technology: A Research Agenda For The Study Of The Adoption, Use And Impact Of Rfid, John Curtin, Robert J. Kauffman, Frederick J. Riggins

Research Collection School Of Computing and Information Systems

Radio frequency identification (RFID) technology dramatically increases the ability of the organization to acquire a vast array of data about the location and properties of any entity that can be physically tagged and wirelessly scanned within certain technical limitations. RFID can be applied to a variety of tasks, structures, work systems and contexts along the value chain, including business-to-business logistics, internal operations, business-to-consumer marketing, and after-sales service applications. As industry adoption of RFID increases there is an emerging interest by academic researchers to engage in scholarly investigation to understand how RFID relates to mobility, organizational and systems technologies (MOST). In …


Sustainability Of Information Technology Therapy On Micro-Enterprise Development., Sajda Qureshi, Mehruz Kamal, Peter Wolcott Jan 2007

Sustainability Of Information Technology Therapy On Micro-Enterprise Development., Sajda Qureshi, Mehruz Kamal, Peter Wolcott

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

The use of information technology in microenterprises has been shown to bring about improvements in accessing new markets, in achieving administrative efficiencies, increased productivity and competitiveness. To benefit from IT, micro-enterprises require specialized intervention and support. At the same time these micro-enterprises require skill sets that can translate their unique needs to IT solutions. This paper provides an IT Therapy approach to addressing micro-enterprise needs through IT. Following an action research approach to investigating micro-enterprises, this paper provides insights into how IT can bring about sustained improvements in micro-enterprises. The contribution of this paper is in guidelines of how IT …


University Of Rhode Island Neasc Self-Study 2007. Standard Seven: Library And Other Information Resources Jan 2007

University Of Rhode Island Neasc Self-Study 2007. Standard Seven: Library And Other Information Resources

Collection Development Reports and Documents

Self-Study report by the University of Rhode Island, prepared in fall 2006 for the 2006/07 accreditation visit of the New England Association of Schools and Colleges (NEASC). Included here is Standard Seven: Library and Other Information Resources.

This standard was prepared by Standard Seven Committee Chair Karen M. Ramsay, Associate Professor and Chair of the Department of Technical Services in the University Libraries. Also on the Standard Seven Committee were: Lisa DiPippo, Associate Professor, Department of Computer Science & Statistics; Karol Leuzarder, Senior Tech Programmer, TOPS; Mary MacDonald, Associate Professor, University Libraries; David Eifler, Graduate Student; Jim Loy, Professor, Anthropology; …


Best Practices For Implementing Agile Methods: A Guide For Department Of Defense Software Developers, Ann L. Fruhling, Alvin E. Tarrell Jan 2007

Best Practices For Implementing Agile Methods: A Guide For Department Of Defense Software Developers, Ann L. Fruhling, Alvin E. Tarrell

Information Systems and Quantitative Analysis Faculty Publications

Traditional plan-driven software development has been widely used in the government because it's considered to be less risky, more consistent, and structured. But there has been a shift from this approach to Agile methods which are more flexible, resulting in fast releases by working in an incremental fashion to adapt to the reality of the changing or unclear requirements.

This report describes the Agile software development philosophy, methods, and best practices in launching software design projects using the Agile approach. It is targeted to Defense Department software developers because they face broad challenges in creating enterprise-wide information systems, where Agile …


Natural Language Processing And E-Government: Extracting Reusable Crime Report Information, Gondy A. Leroy, Alicia Iriberri '06 Jan 2007

Natural Language Processing And E-Government: Extracting Reusable Crime Report Information, Gondy A. Leroy, Alicia Iriberri '06

CGU Faculty Publications and Research

Crime reporting needs to be possible 24/7. Although 911 and tip-lines are the most publicized reporting mechanisms, several other options exist, ranging from in-person reporting to online submissions. Internet-based crime reporting systems allow victims and witnesses of crime to report incidents to police 24/7 from any location. However, these existing e-mail and text-based systems provide little support for witnesses' memory recall leading to reports with less information and lower accuracy. These systems also do not facilitate reuse and integration of the reported information with other information systems. We are developing an anonymous Online Crime Reporting System that is designed to …


A Classifier To Evaluate Language Specificity In Medical Documents, Trudi Miller '08, Gondy A. Leroy, Samir Chatterjee, Jie Fan, Brian Thoms '09 Jan 2007

A Classifier To Evaluate Language Specificity In Medical Documents, Trudi Miller '08, Gondy A. Leroy, Samir Chatterjee, Jie Fan, Brian Thoms '09

CGU Faculty Publications and Research

Consumer health information written by health care professionals is often inaccessible to the consumers it is written for. Traditional readability formulas examine syntactic features like sentence length and number of syllables, ignoring the target audience's grasp of the words themselves. The use of specialized vocabulary disrupts the understanding of patients with low reading skills, causing a decrease in comprehension. A naive Bayes classifier for three levels of increasing medical terminology specificity (consumer/patient, novice health learner, medical professional) was created with a lexicon generated from a representative medical corpus. Ninety-six percent accuracy in classification was attained. The classifier was then applied …


California State Information Technology Strategic Plan 2006, Office Of The State Chief Information Officer Nov 2006

California State Information Technology Strategic Plan 2006, Office Of The State Chief Information Officer

California Agencies

No abstract provided.


Reporting On-Campus Crime Online: User Intention To Use, Gondy A. Leroy, Alicia Iriberri '06, Nathan Garrett Jan 2006

Reporting On-Campus Crime Online: User Intention To Use, Gondy A. Leroy, Alicia Iriberri '06, Nathan Garrett

CGU Faculty Publications and Research

National surveys demonstrate that millions of crimes go unreported in the United States. Several reasons may contribute to this lack of reporting and we are investigating these potential reasons and how they may be addressed. We are developing an online system that provides an anonymous and secure mechanism for both victims and witnesses to report crimes to police. The system is being implemented and tested on a university campus. Potential users (i.e., students, staff) were surveyed to determine their intent to use the system. Respondents claimed to report crimes already, which is in contrast with the findings from the national …


Data Mining Techniques To Study Therapy Success With Autistic Children, Gondy A. Leroy, Annika Irmscher, Marjorie H. Charlop Jan 2006

Data Mining Techniques To Study Therapy Success With Autistic Children, Gondy A. Leroy, Annika Irmscher, Marjorie H. Charlop

CGU Faculty Publications and Research

Autism spectrum disorder has become one of the most prevalent developmental disorders, characterized by a wide variety of symptoms. Many children need extensive therapy for years to improve their behavior and facilitate integration in society. However, few systematic evaluations are done on a large scale that can provide insights into how, where, and how therapy has an impact. We describe how data mining techniques can be used to provide insights into behavioral therapy as well as its effect on participants. To this end, we are developing a digital library of coded video segments that contains data on appropriate and inappropriate …


California State Information Technology Strategic Plan 2005, Office Of The State Chief Information Officer Nov 2005

California State Information Technology Strategic Plan 2005, Office Of The State Chief Information Officer

California Agencies

No abstract provided.


Information Technology (It) Appropriateness: The Contingency Theory Of “Fit” And It Implementation In Small And Medium Enterprises, Deepak Khazanchi Apr 2005

Information Technology (It) Appropriateness: The Contingency Theory Of “Fit” And It Implementation In Small And Medium Enterprises, Deepak Khazanchi

Information Systems and Quantitative Analysis Faculty Publications

There is little doubt that advanced information and communication technologies (IT) arc changing the way businesses operate and conduct commerce. As the advent of a more secure Internet and new transmission standards makes it easier and cheaper for businesses to conduct inter-organizational commerce, it is incumbent upon SME managers to assess whether implementing new technologies such as Electronic Data Interchange (EDI) over the Internet, XML or web-based e-commerce is the "right thing to do" for their organizations. The key question implicit in this decision is addressed in this paper: "Under what conditions should businesses consider themselves likely candidates for (new) …


Non-Verbal Communication With Autistic Children Using Digital Libraries, Gondy A. Leroy, John Huang '05, Serena Chuang '05, Marjorie H. Charlop Jan 2005

Non-Verbal Communication With Autistic Children Using Digital Libraries, Gondy A. Leroy, John Huang '05, Serena Chuang '05, Marjorie H. Charlop

CGU Faculty Publications and Research

Autism spectrum disorder (ASD) has become one of the most prevalent mental disorders over the last few years and its prevalence is still growing. The disorder is characterized by a wide variety of symptoms such as lack of social behavior, extreme withdrawal, and problems communicating. Because of the diversity in symptoms and the wide variety in severity for those, each autistic child has different needs and requires individualized therapy. This leads to long waiting lists for therapy.


California State Information Technology Strategic Plan 2004, Office Of The State Chief Information Officer Nov 2004

California State Information Technology Strategic Plan 2004, Office Of The State Chief Information Officer

California Agencies

No abstract provided.


The Evolution Of Research On Information Systems: A Fiftieth Year Survey Of The Literature In Management Science, Rajiv D. Banker, Robert J. Kauffman Mar 2004

The Evolution Of Research On Information Systems: A Fiftieth Year Survey Of The Literature In Management Science, Rajiv D. Banker, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

The development of the information systems (IS) literature in Management Science during the past 50 years reflects the inception, growth, and maturation of several different research streams. The five research streams we identify incorporate different definitions of the managerial problems that relate to IS, the alternate theoretical perspectives and different methodological paradigms to study them, and the levels of the organization at which their primary results impact managerial practice. The decision support and design science research stream studies the application of computers in decision support, control, and managerial decision making. The value of information research stream reflects relationships established based …


Meeting Medical Terminology Needs: The Ontology-Enhanced Medical Concept Mapper, Gondy Leroy, Hsinchun Chen Dec 2001

Meeting Medical Terminology Needs: The Ontology-Enhanced Medical Concept Mapper, Gondy Leroy, Hsinchun Chen

CGU Faculty Publications and Research

This paper describes the development and testing of the Medical Concept Mapper, a tool designed to facilitate access to online medical information sources by providing users with appropriate medical search terms for their personal queries. Our system is valuable for patients whose knowledge of medical vocabularies is inadequate to find the desired information, and for medical experts who search for information outside their field of expertise. The Medical Concept Mapper maps synonyms and semantically related concepts to a user's query. The system is unique because it integrates our natural language processing tool, i.e., the Arizona (AZ) Noun Phraser, with human-created …


Infosphere Project: An Overview, Calton Pu, Jonathan Walpole Mar 2001

Infosphere Project: An Overview, Calton Pu, Jonathan Walpole

Computer Science Faculty Publications and Presentations

We describe the Infosphere project, which is building the systems software support for information-driven applications such as digital libraries and electronic commerce. The main technical contribution is the Infopipe abstraction to support information flow with quality of service. Using building blocks such as program specialization, software feedback, domain-specific languages, and personalized information filtering, the Infopipe software generates code and manage resources to provide the specified quality of service with support for composition and restructuring.


Export Database Derivation Approach For Supporting Object-Oriented Wrapper Queries, Ee Peng Lim, Hon-Kuan Lee Dec 1996

Export Database Derivation Approach For Supporting Object-Oriented Wrapper Queries, Ee Peng Lim, Hon-Kuan Lee

Research Collection School Of Computing and Information Systems

Wrappers export the schema and data of existing heterogeneous databases and support queries on them. In the context of cooperative information systems, we present a flexible approach to specify the derivation of object-oriented (OO) export databases from local relational databases. Our export database derivation consists of a set of extent derivation structures (EDS) which defines the extent and deep extent of export classes. Having well-defined semantics, the EDS can be readily used in transforming wrapper queries to local queries. Based on the EDS, we developed a wrapper query evaluation strategy which handles OO queries on the export databases. The strategy …