Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 32

Full-Text Articles in Physical Sciences and Mathematics

An Assessment Of The Influence Of Functional Diversity And Perceived Information Quality On The Intention To Use Collaboration Systems, Eric M. Spriggs Jan 2017

An Assessment Of The Influence Of Functional Diversity And Perceived Information Quality On The Intention To Use Collaboration Systems, Eric M. Spriggs

CCE Theses and Dissertations

The role that perceived information quality has on the intention to use a computer supported collaborative work (CSCW) system in the Federal Highway Administration is the focus of this study. The purpose of this study was to examine the functional diversity of the contributors in a CSCW as a major determinant of perceived information quality. The study relied on the Technology Acceptance Model (TAM), the Theory of Reasoned Action (TRA) and the Theory of Planned Behavior (TPB) to propose a theoretical model which shows that perceived information quality influences perceived risk and trusting belief of the users of these systems. …


Organizational Information Dissemination Within Collaborative Networks Using Digital Communication Tools, Cristelia Hinojosa Jan 2017

Organizational Information Dissemination Within Collaborative Networks Using Digital Communication Tools, Cristelia Hinojosa

CCE Theses and Dissertations

While knowledge is one of an organization’s greatest assets, it remains a challenge to facilitate knowledge transfer between people within an organization. Social influence has been studied in its role of facilitating information diffusion, which is necessary for knowledge transfer to occur. Among this research, tie strength, a quantifiable characteristic of a social network that determines the link between two nodes, has been measured to determine the impact of social influence on knowledge transfer and information dissemination within a social network. Current research that explores the impact of social influence on information diffusion has been conducted within public social networks …


Examining The Effects Of Distractive Multitasking With Peripheral Computing In The Classroom, Jaime Eduardo Puente Jan 2017

Examining The Effects Of Distractive Multitasking With Peripheral Computing In The Classroom, Jaime Eduardo Puente

CCE Theses and Dissertations

The growing use of information and communication technologies (ICTs) in college campuses has dramatically increased the potential for multitasking among students who have to juggle classes, school assignments, work, and recreational activities. These students believe that they have become more efficient by performing two or more tasks simultaneously. The use of technology, however, has changed the student’s ability to focus and attend to what they need to learn. Research has shown that multitasking divides students’ attention, which could have a negative impact on their cognition and learning. The purpose of this study was to examine the effects of distractive multitasking …


Pulsar Search Using Supervised Machine Learning, John M. Ford Jan 2017

Pulsar Search Using Supervised Machine Learning, John M. Ford

CCE Theses and Dissertations

Pulsars are rapidly rotating neutron stars which emit a strong beam of energy through mechanisms that are not entirely clear to physicists. These very dense stars are used by astrophysicists to study many basic physical phenomena, such as the behavior of plasmas in extremely dense environments, behavior of pulsar-black hole pairs, and tests of general relativity. Many of these tasks require information to answer the scientific questions posed by physicists. In order to provide more pulsars to study, there are several large-scale pulsar surveys underway, which are generating a huge backlog of unprocessed data. Searching for pulsars is a very …


Towards A Conceptual Framework For Persistent Use: A Technical Plan To Achieve Semantic Interoperability Within Electronic Health Record Systems, Shellon Blackman-Lees Jan 2017

Towards A Conceptual Framework For Persistent Use: A Technical Plan To Achieve Semantic Interoperability Within Electronic Health Record Systems, Shellon Blackman-Lees

CCE Theses and Dissertations

Semantic interoperability within the health care sector requires that patient data be fully available and shared without ambiguity across participating health facilities. The need for the current research was based on federal stipulations that required health facilities provide complete and optimal care to patients by allowing full access to their health records. The ongoing discussions to achieve interoperability within the health care industry continue to emphasize the need for healthcare facilities to successfully adopt and implement Electronic Health Record (EHR) systems. Reluctance by the healthcare industry to implement these EHRs for the purpose of achieving interoperability has led to the …


A Runtime Verification And Validation Framework For Self-Adaptive Software, David B. Sayre Jan 2017

A Runtime Verification And Validation Framework For Self-Adaptive Software, David B. Sayre

CCE Theses and Dissertations

The concepts that make self-adaptive software attractive also make it more difficult for users to gain confidence that these systems will consistently meet their goals under uncertain context. To improve user confidence in self-adaptive behavior, machine-readable conceptual models have been developed to instrument the adaption behavior of the target software system and primary feedback loop. By comparing these machine-readable models to the self-adaptive system, runtime verification and validation may be introduced as another method to increase confidence in self-adaptive systems; however, the existing conceptual models do not provide the semantics needed to institute this runtime verification or validation. This research …


Automated Feature Engineering For Deep Neural Networks With Genetic Programming, Jeff T. Heaton Jan 2017

Automated Feature Engineering For Deep Neural Networks With Genetic Programming, Jeff T. Heaton

CCE Theses and Dissertations

Feature engineering is a process that augments the feature vector of a machine learning model with calculated values that are designed to enhance the accuracy of a model’s predictions. Research has shown that the accuracy of models such as deep neural networks, support vector machines, and tree/forest-based algorithms sometimes benefit from feature engineering. Expressions that combine one or more of the original features usually create these engineered features. The choice of the exact structure of an engineered feature is dependent on the type of machine learning model in use. Previous research demonstrated that various model families benefit from different types …


Contextualizing Secure Information System Design: A Socio-Technical Approach, Abdul Rahim Charif Jan 2017

Contextualizing Secure Information System Design: A Socio-Technical Approach, Abdul Rahim Charif

CCE Theses and Dissertations

Secure Information Systems (SIS) design paradigms have evolved in generations to adapt to IS security needs. However, modern IS are still vulnerable and are far from secure. The development of an underlying IS cannot be reduced to “technological fixes” neither is the design of SIS. Technical security cannot ensure IS security. Generations of SIS design paradigms have evolved, all with their own sets of shortcomings. A SIS design paradigm must meet well-defined requirements, yet contemporary paradigms do not meet all these requirements. Current SIS design paradigms are not easily applicable to IS. They lack a comprehensive modeling support and ignore …


An Exploratory Study Of The Approach To Bring Your Own Device (Byod) In Assuring Information Security, Coleen D. Santee Jan 2017

An Exploratory Study Of The Approach To Bring Your Own Device (Byod) In Assuring Information Security, Coleen D. Santee

CCE Theses and Dissertations

The availability of smart device capabilities, easy to use apps, and collaborative capabilities has increased the expectations for the technology experience of employees. In addition, enterprises are adopting SaaS cloud-based systems that employees can access anytime, anywhere using their personal, mobile device. BYOD could drive an IT evolution for powerful device capabilities and easy to use apps, but only if the information security concerns can be addressed. This research proposed to determine the acceptance rate of BYOD in organizations, the decision making approach, and significant factors that led to the successful adoption of BYOD using the expertise of experienced internal …


The Role Of Cognitive Disposition In Re-Examining The Privacy Paradox: A Neuroscience Study, Zareef Mohammed Jan 2017

The Role Of Cognitive Disposition In Re-Examining The Privacy Paradox: A Neuroscience Study, Zareef Mohammed

CCE Theses and Dissertations

The privacy paradox is a phenomenon whereby individuals continue to disclose their personal information, contrary to their claim of concerns for the privacy of their personal information. This study investigated the privacy paradox to better understand individuals' decisions to disclose or withhold their personal information. The study argued that individuals’ decisions are based on a cognitive disposition, which involves both rational and emotional mental processes. While the extended privacy calculus model was used as the theoretical basis for the study, the findings of cognitive neuroscience was applied to it to address its limitation in assuming individuals are purely rational decision-makers. …


A Novel Approach To Determining Real-Time Risk Probabilities In Critical Infrastructure Industrial Control Systems, Michael Elrod Jan 2017

A Novel Approach To Determining Real-Time Risk Probabilities In Critical Infrastructure Industrial Control Systems, Michael Elrod

CCE Theses and Dissertations

Critical Infrastructure Industrial Control Systems are substantially different from their more common and ubiquitous information technology system counterparts. Industrial control systems, such as distributed control systems and supervisory control and data acquisition systems that are used for controlling the power grid, were not originally designed with security in mind. Geographically dispersed distribution, an unfortunate reliance on legacy systems and stringent availability requirements raise significant cybersecurity concerns regarding electric reliability while constricting the feasibility of many security controls. Recent North American Electric Reliability Corporation Critical Infrastructure Protection standards heavily emphasize cybersecurity concerns and specifically require entities to categorize and identify their …


Integration Of Simulation Into Healthcare Education Through Applied Constructivism: A Randomized, Switching Replications Experiment, Samuel A. Yoders Jan 2017

Integration Of Simulation Into Healthcare Education Through Applied Constructivism: A Randomized, Switching Replications Experiment, Samuel A. Yoders

CCE Theses and Dissertations

This report describes the development, deployment, and analysis of an experimental instructional unit using applied constructivism instructional design (ID). The ID template was used to integrate a high-fidelity simulator into an undergraduate health care degree curriculum in a private, not-for-profit university. A switching-replications experimental design was used with random assignment of volunteer participants to initial treatment and control groups. Quantitative analysis of learning outcomes using standardized assessments was performed, including correlational analysis for knowledge transfer of simulator skills to clinical skills. Statistically significant positive effects were found for the educational outcomes of participants when measuring both the knowledge and application …


Enhancing The Accuracy Of Synthetic File System Benchmarks, Salam Farhat Jan 2017

Enhancing The Accuracy Of Synthetic File System Benchmarks, Salam Farhat

CCE Theses and Dissertations

File system benchmarking plays an essential part in assessing the file system’s performance. It is especially difficult to measure and study the file system’s performance as it deals with several layers of hardware and software. Furthermore, different systems have different workload characteristics so while a file system may be optimized based on one given workload it might not perform optimally based on other types of workloads. Thus, it is imperative that the file system under study be examined with a workload equivalent to its production workload to ensure that it is optimized according to its usage. The most widely used …


Reducing The Download Time In Stochastic P2p Content Delivery Networks By Improving Peer Selection, Nicholas Hays Jan 2017

Reducing The Download Time In Stochastic P2p Content Delivery Networks By Improving Peer Selection, Nicholas Hays

CCE Theses and Dissertations

Peer-to-peer (P2P) applications have become a popular method for obtaining digital content. Recent research has shown that the amount of time spent downloading from a poor performing peer effects the total download duration. Current peer selection strategies attempt to limit the amount of time spent downloading from a poor performing peer, but they do not use both advanced knowledge and service capacity after the connection has been made to aid in peer selection. Advanced knowledge has traditionally been obtained from methods that add additional overhead to the P2P network, such as polling peers for service capacity information, using round trip …


Improved Detection For Advanced Polymorphic Malware, James B. Fraley Jan 2017

Improved Detection For Advanced Polymorphic Malware, James B. Fraley

CCE Theses and Dissertations

Malicious Software (malware) attacks across the internet are increasing at an alarming rate. Cyber-attacks have become increasingly more sophisticated and targeted. These targeted attacks are aimed at compromising networks, stealing personal financial information and removing sensitive data or disrupting operations. Current malware detection approaches work well for previously known signatures. However, malware developers utilize techniques to mutate and change software properties (signatures) to avoid and evade detection. Polymorphic malware is practically undetectable with signature-based defensive technologies. Today’s effective detection rate for polymorphic malware detection ranges from 68.75% to 81.25%. New techniques are needed to improve malware detection rates. Improved detection …


Individualized Instruction As A Faculty Training Strategy For Technology Integration, Jennifer Merritt Jan 2017

Individualized Instruction As A Faculty Training Strategy For Technology Integration, Jennifer Merritt

CCE Theses and Dissertations

It is inevitable that campus-based higher education will adopt some form of a hybrid learning approach. For schools and their faculty members, this means the acknowledgment and acceptance of these changes are required. Campus-based higher education faculty members wish to change how they teach courses due to societal demands to better suit the next generation of students. Initially, schools began offering new technology to faculty that wished to use the technology; however, over the years, due to the demands of competition with other schools and next generation, tech-savvy students entering academia, schools are starting to require the use of technology …


Defining Usability Heuristics For Adoption And Efficiency Of An Electronic Workflow Document Management System, Steven Fuentes Jan 2017

Defining Usability Heuristics For Adoption And Efficiency Of An Electronic Workflow Document Management System, Steven Fuentes

CCE Theses and Dissertations

Usability heuristics have been established for different uses and applications as general guidelines for user interfaces. These can affect the implementation of industry solutions and play a significant role regarding cost reduction and process efficiency. The area of electronic workflow document management (EWDM) solutions, also known as workflow, lacks a formal definition of usability heuristics. With the advent of new technologies such as mobile devices, defining a set of usability heuristics contributes to the adoption and efficiency of an EWDM system. Workflow usability has been evaluated for various industries. Most significantly research has been done for electronic healthcare records (EHR). …


Supporting Education For Students With Children Through Mobile Technology, Brenda C. Varner Jan 2017

Supporting Education For Students With Children Through Mobile Technology, Brenda C. Varner

CCE Theses and Dissertations

The original goal of this project was to build a peer e-mentoring program for parents and measure the effect of the program on persistence. In spite of strong mentor participation, two terms of focused recruiting did not attract mentees. This sparked the question of why those who had successfully navigated the higher education system thought a peer e-mentoring program was needed but those in the process did not. A focused ethnography was designed to try to understand why students with children were resistant to peer e-mentoring. Students with children used technology to integrate the various roles of life. They used …


A Study Of How Young Adults Leverage Multiple Profile Management Functionality In Managing Their Online Reputation On Social Networking Sites, T. John Mccune Jan 2017

A Study Of How Young Adults Leverage Multiple Profile Management Functionality In Managing Their Online Reputation On Social Networking Sites, T. John Mccune

CCE Theses and Dissertations

With privacy settings on social networking sites (SNS) perceived as complex and difficult to use and maintain, young adults can be left vulnerable to others accessing and using their personal information. Consequences of not regulating the boundaries their information on SNS include the ability for current and future employers to make career-impacting decisions based upon their online reputation that may include disqualifying them as job candidates. On SNS, such as Facebook, LinkedIn, and Twitter, young adults must decide on how to manage their online reputation by regulating boundaries to their own personal and professional information and identities. One known practice …


Data Masking, Encryption, And Their Effect On Classification Performance: Trade-Offs Between Data Security And Utility, Juan C. Asenjo Jan 2017

Data Masking, Encryption, And Their Effect On Classification Performance: Trade-Offs Between Data Security And Utility, Juan C. Asenjo

CCE Theses and Dissertations

As data mining increasingly shapes organizational decision-making, the quality of its results must be questioned to ensure trust in the technology. Inaccuracies can mislead decision-makers and cause costly mistakes. With more data collected for analytical purposes, privacy is also a major concern. Data security policies and regulations are increasingly put in place to manage risks, but these policies and regulations often employ technologies that substitute and/or suppress sensitive details contained in the data sets being mined. Data masking and substitution and/or data encryption and suppression of sensitive attributes from data sets can limit access to important details. It is believed …


A Heuristic Approach To Creating Technological Fair Use Guidelines In Higher Education, Jerry L. Roper Jan 2017

A Heuristic Approach To Creating Technological Fair Use Guidelines In Higher Education, Jerry L. Roper

CCE Theses and Dissertations

Higher education has experienced challenges defining and implementing copyright compliance. Confusion among faculty and staff appears to be common regarding copyright and fair use. The original copyright doctrine was drafted over 200 years ago, which predates practically all technological advances that have and will continue to occur. Change is slow and onerous with most legislation; there is not much possibility the small amendments made to the law will be able to keep pace with the continual technological evolution. Further, judges are citing precedents in court rulings of copyright disputes that were made using the best interpretation of the law, even …


The Effect Of Domain And Technical Expertise On The Training Outcomes For Case Management Systems In High Domain Expertise Fields, Steven L. Epstein Jan 2017

The Effect Of Domain And Technical Expertise On The Training Outcomes For Case Management Systems In High Domain Expertise Fields, Steven L. Epstein

CCE Theses and Dissertations

The successful implementation of an enterprise system requires training and end users in the new systems and procedures. There has been no research reporting a relationship between Domain Expertise (DE) and the successful implementation of an enterprise system. This study sought to begin filling this knowledge gap by exploring the relationship between DE, technical proficiency, training outcomes, and perceived training effectiveness for a new enterprise system, specifically a Case Management System (CMS) in a small and medium enterprise (SME). The research examines different subjects of technical expertise including skills, abilities, and knowledge to increase professional acceptance in the high domain …


An Empirical Assessment Of Energy Management Information System Success Using Structural Equation Modeling, Gwendolyn D. Stripling Jan 2017

An Empirical Assessment Of Energy Management Information System Success Using Structural Equation Modeling, Gwendolyn D. Stripling

CCE Theses and Dissertations

The Energy Industry utilizes Energy Management Information Systems (EMIS) smart meters to monitor utility consumers’ energy consumption, communicate energy consumption information to consumers, and to collect a plethora of energy consumption data about consumer usage. The EMIS energy consumption information is typically presented to utility consumers via a smart meter web portal. The hope is that EMIS web portal use will aid utility consumers in managing their energy consumption by helping them make effective decisions regarding their energy usage. However, little research exists that evaluates the effectiveness or success of an EMIS smart meter web portal from a utility consumer …


Measuring Cybersecurity Competency: An Exploratory Investigation Of The Cybersecurity Knowledge, Skills, And Abilities Necessary For Organizational Network Access Privileges, Richard Nilsen Jan 2017

Measuring Cybersecurity Competency: An Exploratory Investigation Of The Cybersecurity Knowledge, Skills, And Abilities Necessary For Organizational Network Access Privileges, Richard Nilsen

CCE Theses and Dissertations

Organizational information system users (OISU) that are victimized by cyber threats are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, it has been argued that cybersecurity competency is critical for advancing economic prosperity and maintaining national security. The fact remains that technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. All OISUs, from accountants to cybersecurity forensics experts, can place organizational assets at risk. However, that risk is increased when OISUs do not have the cybersecurity competency necessary for operating an information system (IS). The main goal of …


Performance Envelopes Of Adaptive Ensemble Data Stream Classifiers, Stefan Joe-Yen Jan 2017

Performance Envelopes Of Adaptive Ensemble Data Stream Classifiers, Stefan Joe-Yen

CCE Theses and Dissertations

This dissertation documents a study of the performance characteristics of algorithms designed to mitigate the effects of concept drift on online machine learning. Several supervised binary classifiers were evaluated on their performance when applied to an input data stream with a non-stationary class distribution. The selected classifiers included ensembles that combine the contributions of their member algorithms to improve overall performance. These ensembles adapt to changing class definitions, known as “concept drift,” often present in real-world situations, by adjusting the relative contributions of their members. Three stream classification algorithms and three adaptive ensemble algorithms were compared to determine the capabilities …


Enhanced Prediction Of Network Attacks Using Incomplete Data, Jacob D. Arthur Jan 2017

Enhanced Prediction Of Network Attacks Using Incomplete Data, Jacob D. Arthur

CCE Theses and Dissertations

For years, intrusion detection has been considered a key component of many organizations’ network defense capabilities. Although a number of approaches to intrusion detection have been tried, few have been capable of providing security personnel responsible for the protection of a network with sufficient information to make adjustments and respond to attacks in real-time. Because intrusion detection systems rarely have complete information, false negatives and false positives are extremely common, and thus valuable resources are wasted responding to irrelevant events. In order to provide better actionable information for security personnel, a mechanism for quantifying the confidence level in predictions is …


The Efficacy Of Perceived Big Data Security, Trust, Perceived Leadership Competency, Information Sensitivity, Privacy Concern And Job Reward On Disclosing Personal Security Information Online, Iqbal Amiri Jan 2017

The Efficacy Of Perceived Big Data Security, Trust, Perceived Leadership Competency, Information Sensitivity, Privacy Concern And Job Reward On Disclosing Personal Security Information Online, Iqbal Amiri

CCE Theses and Dissertations

Individuals’ reluctance to provide sensitive personal information online could affect the US Governments’ ability to hire and retain qualified personnel for sensitive cleared positions. The aim of this research study was to show how perceived big data security, trust, perceived leadership competency, information sensitivity, privacy concern and reward of a job play a significant role in limiting an individuals’ willingness of disclosing sensitive personal information online. While a significant volume of research has examined information disclosure in the health care field, there has not been any published studies on the willingness of online disclosure in order to attain a US …


A Study Of Human-Machine Interface (Hmi) Learnability For Unmanned Aircraft Systems Command And Control, Tom Haritos Jan 2017

A Study Of Human-Machine Interface (Hmi) Learnability For Unmanned Aircraft Systems Command And Control, Tom Haritos

CCE Theses and Dissertations

The operation of sophisticated unmanned aircraft systems (UAS) involves complex interactions between human and machine. Unlike other areas of aviation where technological advancement has flourished to accommodate the modernization of the National Airspace System (NAS), the scientific paradigm of UAS and UAS user interface design has received little research attention and minimal effort has been made to aggregate accurate data to assess the effectiveness of current UAS human-machine interface (HMI) representations for command and control. UAS HMI usability is a primary human factors concern as the Federal Aviation Administration (FAA) moves forward with the full-scale integration of UAS in the …


Behavioral Intention And Use Behavior Of Social Networking Websites Among Senior Adults, Andrew M. Berry Jan 2017

Behavioral Intention And Use Behavior Of Social Networking Websites Among Senior Adults, Andrew M. Berry

CCE Theses and Dissertations

Use of social networking websites has rapidly increased over the last decade. Online social environments are quickly changing to meet the demands of younger users however the needs of senior adults are often ignored on most websites today and underrepresented in many Unified Theory of Acceptance and Use of Technology (UTAUT) studies. The study sought to close the gap in research by providing greater knowledge about the behavioral intention and use behavior of social networking websites among senior adults. Senior adults from several locations and organizations were asked to complete an online self-administered survey answering questions that tie directly into …


Investigating The Perceived Influence Of Data Warehousing And Business Intelligence Maturity On Organizational Performance: A Mixed Methods Study, Charles F. Perkins Jan 2017

Investigating The Perceived Influence Of Data Warehousing And Business Intelligence Maturity On Organizational Performance: A Mixed Methods Study, Charles F. Perkins

CCE Theses and Dissertations

Over the past two decades organizations have made considerable investment in implementing data warehousing and business intelligence to improve business performance through facts-based decision-making. Although many of these organizations reap the rewards of their investments, others find that realizing the full value proposition is elusive. While the literature is rich with studies regarding data warehousing and business intelligence, much of the existing research focused on the initial experiences of adoption and implementation, and few yielded empirical data that reflected post-implementation conditions that lead to mature capabilities and improved business performance. Sited at the Defense Intelligence Agency where data warehousing and …