Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 32

Full-Text Articles in Physical Sciences and Mathematics

Two Project On Information Systems Capabilities And Organizational Performance, Giridhar Reddy Bojja May 2022

Two Project On Information Systems Capabilities And Organizational Performance, Giridhar Reddy Bojja

Masters Theses & Doctoral Dissertations

Information systems (IS), as a multi-disciplinary research area, emphasizes the complementary relationship between people, organizations, and technology and has evolved dramatically over the years. IS and the underlying Information Technology (IT) application and research play a crucial role in transforming the business world and research within the management domain. Consistent with this evolution and transformation, I develop a two-project dissertation on Information systems capabilities and organizational outcomes.

Project 1 examines the role of hospital operational effectiveness on the link between information systems capabilities and hospital performance. This project examines the cross-lagged effects on a sample of 217 hospitals measured over …


A False Sense Of Security - Organizations Need A Paradigm Shift On Protecting Themselves Against Apts, Srinivasulu R. Vuggumudi Apr 2022

A False Sense Of Security - Organizations Need A Paradigm Shift On Protecting Themselves Against Apts, Srinivasulu R. Vuggumudi

Masters Theses & Doctoral Dissertations

Organizations Advanced persistent threats (APTs) are the most complex cyberattacks and are generally executed by cyber attackers linked to nation-states. The motivation behind APT attacks is political intelligence and cyber espionage. Despite all the awareness, technological advancements, and massive investment, the fight against APTs is a losing battle for organizations. An organization may implement a security strategy to prevent APTs. However, the benefits to the security posture might be negligible if the measurement of the strategy’s effectiveness is not part of the plan. A false sense of security exists when the focus is on implementing a security strategy but not …


Leaderboard Design Principles Influencing User Engagement In An Online Discussion, Brian S. Bovee Apr 2022

Leaderboard Design Principles Influencing User Engagement In An Online Discussion, Brian S. Bovee

Masters Theses & Doctoral Dissertations

Along with the popularity of gamification, there has been increased interest in using leaderboards to promote engagement with online learning systems. The existing literature suggests that when leaderboards are designed well they have the potential to improve learning, but qualitative investigations are required in order to reveal design principles that will improve engagement. In order to address this gap, this qualitative study aims to explore students' overall perceptions of popular leaderboard designs in a gamified, online discussion. Using two leaderboards reflecting performance in an online discussion, this study evaluated multiple leaderboard designs from student interviews and other data sources regarding …


Transfer-Learned Pruned Deep Convolutional Neural Networks For Efficient Plant Classification In Resource-Constrained Environments, Martinson Ofori Nov 2021

Transfer-Learned Pruned Deep Convolutional Neural Networks For Efficient Plant Classification In Resource-Constrained Environments, Martinson Ofori

Masters Theses & Doctoral Dissertations

Traditional means of on-farm weed control mostly rely on manual labor. This process is time-consuming, costly, and contributes to major yield losses. Further, the conventional application of chemical weed control can be economically and environmentally inefficient. Site-specific weed management (SSWM) counteracts this by reducing the amount of chemical application with localized spraying of weed species. To solve this using computer vision, precision agriculture researchers have used remote sensing weed maps, but this has been largely ineffective for early season weed control due to problems such as solar reflectance and cloud cover in satellite imagery. With the current advances in artificial …


Analysis Of Theoretical And Applied Machine Learning Models For Network Intrusion Detection, Jonah Baron May 2021

Analysis Of Theoretical And Applied Machine Learning Models For Network Intrusion Detection, Jonah Baron

Masters Theses & Doctoral Dissertations

Network Intrusion Detection System (IDS) devices play a crucial role in the realm of network security. These systems generate alerts for security analysts by performing signature-based and anomaly-based detection on malicious network traffic. However, there are several challenges when configuring and fine-tuning these IDS devices for high accuracy and precision. Machine learning utilizes a variety of algorithms and unique dataset input to generate models for effective classification. These machine learning techniques can be applied to IDS devices to classify and filter anomalous network traffic. This combination of machine learning and network security provides improved automated network defense by developing highly-optimized …


Non-Hazardous Industrial Solid Waste Tracking System, Justin Tank Apr 2021

Non-Hazardous Industrial Solid Waste Tracking System, Justin Tank

Masters Theses & Doctoral Dissertations

The Olmsted Non-Hazardous Industrial Solid Waste Tracking System allows waste generators of certain materials to electronically have their waste assessments evaluated, approved, and tracked through a simple online process. The current process of manually requesting evaluations, prepopulating tracking forms, and filling them out on triplicate carbonless forms is out of sync with other processes in the department. Complying with audit requirements requires pulling physical copies and providing them physically to fulfill information requests.

Waste generators in Minnesota are required to track their waste disposals for certain types of industrial waste streams. This ensures waste is accounted for at the point …


The Role Of Privacy Within The Realm Of Healthcare Wearables' Acceptance And Use, Thomas Jernejcic Apr 2021

The Role Of Privacy Within The Realm Of Healthcare Wearables' Acceptance And Use, Thomas Jernejcic

Masters Theses & Doctoral Dissertations

The flexibility and vitality of the Internet along with technological innovation have fueled an industry focused on the design of portable devices capable of supporting personal activities and wellbeing. These compute devices, known as wearables, are unique from other computers in that they are portable, specific in function, and worn or carried by the user. While there are definite benefits attributable to wearables, there are also notable risks, especially in the realm of security where personal information and/or activities are often accessible to third parties. In addition, protecting one’s private information is regularly an afterthought and thus lacking in maturity. …


Analysis Of System Performance Metrics Towards The Detection Of Cryptojacking In Iot Devices, Richard Matthews Mar 2021

Analysis Of System Performance Metrics Towards The Detection Of Cryptojacking In Iot Devices, Richard Matthews

Masters Theses & Doctoral Dissertations

This single-case mechanism study examined the effects of cryptojacking on Internet of Things (IoT) device performance metrics. Cryptojacking is a cyber-threat that involves stealing the computational resources of devices belonging to others to generate cryptocurrencies. The resources primarily include the processing cycles of devices and the additional electricity needed to power this additional load. The literature surveyed showed that cryptojacking has been gaining in popularity and is now one of the top cyberthreats. Cryptocurrencies offer anyone more freedom and anonymity than dealing with traditional financial institutions which make them especially attractive to cybercriminals. Other reasons for the increasing popularity of …


A Consent Framework For The Internet Of Things In The Gdpr Era, Gerald Chikukwa Mar 2021

A Consent Framework For The Internet Of Things In The Gdpr Era, Gerald Chikukwa

Masters Theses & Doctoral Dissertations

The Internet of Things (IoT) is an environment of connected physical devices and objects that communicate amongst themselves over the internet. The IoT is based on the notion of always-connected customers, which allows businesses to collect large volumes of customer data to give them a competitive edge. Most of the data collected by these IoT devices include personal information, preferences, and behaviors. However, constant connectivity and sharing of data create security and privacy concerns. Laws and regulations like the General Data Protection Regulation (GDPR) of 2016 ensure that customers are protected by providing privacy and security guidelines to businesses. Data …


Towards Identity Relationship Management For Internet Of Things, Mohammad Muntasir Nur Mar 2021

Towards Identity Relationship Management For Internet Of Things, Mohammad Muntasir Nur

Masters Theses & Doctoral Dissertations

Identity and Access Management (IAM) is in the core of any information systems. Traditional IAM systems manage users, applications, and devices within organizational boundaries, and utilize static intelligence for authentication and access control. Identity federation has helped a lot to deal with boundary limitation, but still limited to static intelligence – users, applications and devices must be under known boundaries. However, today’s IAM requirements are much more complex. Boundaries between enterprise and consumer space, on premises and cloud, personal devices and organization owned devices, and home, work and public places are fading away. These challenges get more complicated for Internet …


Block The Root Takeover: Validating Devices Using Blockchain Protocol, Sharmila Paul Mar 2021

Block The Root Takeover: Validating Devices Using Blockchain Protocol, Sharmila Paul

Masters Theses & Doctoral Dissertations

This study addresses a vulnerability in the trust-based STP protocol that allows malicious users to target an Ethernet LAN with an STP Root-Takeover Attack. This subject is relevant because an STP Root-Takeover attack is a gateway to unauthorized control over the entire network stack of a personal or enterprise network. This study aims to address this problem with a potentially trustless research solution called the STP DApp. The STP DApp is the combination of a kernel /net modification called stpverify and a Hyperledger Fabric blockchain framework in a NodeJS runtime environment in userland. The STP DApp works as an Intrusion …


Jrevealpeg: A Semi-Blind Jpeg Steganalysis Tool Targeting Current Open-Source Embedding Programs, Charles A. Badami Mar 2021

Jrevealpeg: A Semi-Blind Jpeg Steganalysis Tool Targeting Current Open-Source Embedding Programs, Charles A. Badami

Masters Theses & Doctoral Dissertations

Steganography in computer science refers to the hiding of messages or data within other messages or data; the detection of these hidden messages is called steganalysis. Digital steganography can be used to hide any type of file or data, including text, images, audio, and video inside other text, image, audio, or video data. While steganography can be used to legitimately hide data for non-malicious purposes, it is also frequently used in a malicious manner. This paper proposes JRevealPEG, a software tool written in Python that will aid in the detection of steganography in JPEG images with respect to identifying a …


A Framework For Identifying Host-Based Artifacts In Dark Web Investigations, Arica Kulm Nov 2020

A Framework For Identifying Host-Based Artifacts In Dark Web Investigations, Arica Kulm

Masters Theses & Doctoral Dissertations

The dark web is the hidden part of the internet that is not indexed by search engines and is only accessible with a specific browser like The Onion Router (Tor). Tor was originally developed as a means of secure communications and is still used worldwide for individuals seeking privacy or those wanting to circumvent restrictive regimes. The dark web has become synonymous with nefarious and illicit content which manifests itself in underground marketplaces containing illegal goods such as drugs, stolen credit cards, stolen user credentials, child pornography, and more (Kohen, 2017). Dark web marketplaces contribute both to illegal drug usage …


Colleague To Banner Migration: Data Conversion Guide For Institutional Research, Laura Osborn Aug 2020

Colleague To Banner Migration: Data Conversion Guide For Institutional Research, Laura Osborn

Masters Theses & Doctoral Dissertations

When the SDBOR decided to migrate their current student information system into a shared system with HR and Finance, adjustments needed to be made to accommodate for current Banner settings and work around tables that were already populated with HRFIS data. The change in data type of the student identifier from that of a 7-digit numeric field to a 9- digit alpha-numeric field poses problems for running aggregate data calculations. Additional complications include having some information such as first-generation status that was not migrated between the systems, and cases such as college coding where tables that were designed for student …


Vzwam Web-Based Lookup, Ruben Claudio May 2020

Vzwam Web-Based Lookup, Ruben Claudio

Masters Theses & Doctoral Dissertations

This web-based lookup will allow V employees to find territory sales rep much faster. It will simplify the process and eliminate manual processes.

At the moment, a combination of multiple manual processes is needed to find territory sales reps. The company’s CRM does not allow to find rep sales quickly. When an in-house sales representative is talking to a prospect, this sales rep has to go through a few series of steps to find an outside or territory sales rep --which is usually needed to schedule in-person meetings, that results in delays while doing transactions with the prospects. Besides, because …


Network Traffic Analysis Framework For Cyber Threat Detection, Meshesha K. Cherie Mar 2020

Network Traffic Analysis Framework For Cyber Threat Detection, Meshesha K. Cherie

Masters Theses & Doctoral Dissertations

The growing sophistication of attacks and newly emerging cyber threats requires advanced cyber threat detection systems. Although there are several cyber threat detection tools in use, cyber threats and data breaches continue to rise. This research is intended to improve the cyber threat detection approach by developing a cyber threat detection framework using two complementary technologies, search engine and machine learning, combining artificial intelligence and classical technologies.

In this design science research, several artifacts such as a custom search engine library, a machine learning-based engine and different algorithms have been developed to build a new cyber threat detection framework based …


Social Media Text Mining Framework For Drug Abuse: An Opioid Crisis Case Analysis, Tareq Nasralah Jul 2019

Social Media Text Mining Framework For Drug Abuse: An Opioid Crisis Case Analysis, Tareq Nasralah

Masters Theses & Doctoral Dissertations

Social media is considered as a promising and viable source of data for gaining insights into various disease conditions, patients’ attitudes and behaviors, and medications. The daily use of social media provides new opportunities for analyzing several aspects of communication. Social media as a big data source can be used to recognize communication and behavioral themes of problematic use of prescription drugs. Mining and analyzing such media have challenges and limitations with respect to topic deduction and data quality. There is a need for a structured approach to efficiently and effectively analyze social media content related to drug abuse in …


Mirai Bot Scanner Summation Prototype, Charles V. Frank Jr. Mar 2019

Mirai Bot Scanner Summation Prototype, Charles V. Frank Jr.

Masters Theses & Doctoral Dissertations

The Mirai botnet deploys a distributed mechanism with each Bot continually scanning for a potential new Bot Victim. A Bot continually generates a random IP address to scan the network for discovering a potential new Bot Victim. The Bot establishes a connection with the potential new Bot Victim with a Transmission Control Protocol (TCP) handshake. The Mirai botnet has recruited hundreds of thousands of Bots. With 100,000 Bots, Mirai Distributed Denial of Service (DDoS) attacks on service provider Dyn in October 2016 triggered the inaccessibility to hundreds of websites in Europe and North America (Sinanović & Mrdovic, 2017). A month …


Flashlight In A Dark Room: A Grounded Theory Study On Information Security Management At Small Healthcare Provider Organizations, Gerald Auger Mar 2019

Flashlight In A Dark Room: A Grounded Theory Study On Information Security Management At Small Healthcare Provider Organizations, Gerald Auger

Masters Theses & Doctoral Dissertations

Healthcare providers have a responsibility to protect patient’s privacy and a business motivation to properly secure their assets. These providers encounter barriers to achieving these objectives and limited academic research has been conducted to examine the causes and strategies to overcome them. A subset of this demographic, businesses with less than 10 providers, compose a majority 57% of provider organizations in the United States. This grounded theory study provides exploratory findings, discovering these small healthcare provider organizations (SHPO) have limited knowledge on information technology (IT) and information security that results in assumptions and misappropriations of information security implementation, who is …


Advanced Code-Reuse Attacks: A Novel Framework For Jop, Bramwell J. Brizendine Mar 2019

Advanced Code-Reuse Attacks: A Novel Framework For Jop, Bramwell J. Brizendine

Masters Theses & Doctoral Dissertations

Return-oriented programming is the predominant code-reuse attack, where short gadgets or borrowed chunks of code ending in a RET instruction can be discovered in binaries. A chain of ROP gadgets placed on the stack can permit control flow to be subverted, allowing for arbitrary computation. Jump-oriented programming is a class of code-reuse attack where instead of using RET instructions, indirect jumps and indirect calls are utilized to subvert the control flow. JOP is important because can allow for important mitigations and protections against ROP to be bypassed, and some protections against JOP are imperfect. This dissertation presents a design science …


Is Information Systems Misuse Always Bad? A New Perspective On Is Misuse In Hospitals Under The Context Of Disasters, Dheyaaldin Alsalman Jul 2018

Is Information Systems Misuse Always Bad? A New Perspective On Is Misuse In Hospitals Under The Context Of Disasters, Dheyaaldin Alsalman

Masters Theses & Doctoral Dissertations

Although the extant literature has investigated how individuals engage in inappropriate behaviors based on the rational choice theory (RCT) (e.g., computer misconduct), the neutralization theory (e.g., IS security policies violation), and workarounds under normal situations, it has given little consideration to how individuals are involved in misuse of information systems with a good intention under the context of disasters. To fill this research gap, we propose a selfless misuse model, which offers a theoretical explanation for the concept of individuals’ selfless misuse intention under uncertainty caused by disasters. In this study, we show why employees make decisions to misuse the …


Hybrid Recommender For Online Petitions With Social Network And Psycholinguistic Features, Ahmed Elnoshokaty Jul 2018

Hybrid Recommender For Online Petitions With Social Network And Psycholinguistic Features, Ahmed Elnoshokaty

Masters Theses & Doctoral Dissertations

The online petition has become one of the most important channels of civic participation. Most of the state-of-the-art online platforms, however, tend to use simple indicators (such as popularity) to rank petitions, hence creating a situation where the most popular petitions dominate the rank and attract most people’s attention. For the petitions which focus on specific issues, they are often in a disadvantageous position on the list. For example, a petition for local environment problem may not be seen by many people who are really concerned with it, simply because it takes multiple pages to reach it. Therefore, the simple …


The Cybher Program Supported By Cisse Framework To Engage And Anchor Middle-School Girls In Cybersecurity, Pamela Rowland Mar 2018

The Cybher Program Supported By Cisse Framework To Engage And Anchor Middle-School Girls In Cybersecurity, Pamela Rowland

Masters Theses & Doctoral Dissertations

There is a piercing shortage of personnel in the cybersecurity field that will take several decades to accommodate. Despite being 50 percent of the workforce, females only account for 11 percent of the cybersecurity personnel. While efforts have been made to encourage more females into the field, more needs to be done. Reality shows that a change in the statistics is not taking place. Women remain seriously under-represented in cybersecurity degree programs and the workforce.

Prior research shows that elementary girls are equally as interested in the cyber path as boys. It is in middle school that this interest shifts, …


Database Management System For Byuh Jonathan Napela Center, Olivia K. F. Moleni Aug 2017

Database Management System For Byuh Jonathan Napela Center, Olivia K. F. Moleni

Masters Theses & Doctoral Dissertations

The purpose of this project is to build a database management system (DBMS) for the Jonathan Napela Center department. The Napela Center is a department for students who are majoring or minoring in Hawaiian Studies and/or Pacific Island Studies. Currently the Napela Center uses Microsoft Excel as their DBMS to store and track both current and past student information. Unfortunately, this system hasn’t been working well for them due to unreliable information, limited user access and sometime can get too complex with too much data. So the director of the department decided to seek for another system.

This paper will …


Ged: Moving Into The Electronic Age, Kateri Montileaux Aug 2017

Ged: Moving Into The Electronic Age, Kateri Montileaux

Masters Theses & Doctoral Dissertations

The purpose of this study is to find a direction as the Community Continuing Education/General Education Diploma (CCE/GED) department goes into the electronic age. Not only has the General Education Diploma test become computer based, the process of studying, preparing and communicating has also required one to use desktop computers, laptops, tablets, smart phones, email, and webinars daily. The goal is to promote the department and its services to the younger generation (18-25 years old) who are completely comfortable using electronic devices, and to the older generation (40+years) who may know a little bit of electronic communicating but who are …


Eduform, Olaf Broms Jul 2017

Eduform, Olaf Broms

Masters Theses & Doctoral Dissertations

EduForum is a project that has been constructed to fulfil a niche in the learning management system market. The current learning management system market is comprised of mainly large, well-funded, and highly entrenched offerings. The trend in the market has been shifting recently away from some of these legacy offerings towards some of their newer competitors. This trend holds true in the for-profit marker, but no true competitor has emerged to challenge the market’s largest open-source offering, Moodle.

EduForum hopes to be the offering to fill this role by using a number of new methodologies and technologies to create a …


The Development Of An Automated Testing Framework For Data-Driven Testing Utilizing The Uml Testing Profile, James Edward Hearn Dec 2016

The Development Of An Automated Testing Framework For Data-Driven Testing Utilizing The Uml Testing Profile, James Edward Hearn

Masters Theses & Doctoral Dissertations

The development of increasingly-complex Web 2.0 applications, along with a rise in end-user expectations, have not only made the testing and quality assurance processes of web application development an increasingly-important part of the SDLC, but have also made these processes more complex and resource-intensive. One way to effectively test these applications is by implementing an automated testing solution along with manual testing, as automation solutions have been shown to increase the total amount of testing that can be performed, and help testing team achieve consistency in their testing efforts. The difficulty, though, lies in how to best go about developing …


Information Technology Services (Its) Program Database, Lora Ersland Nov 2015

Information Technology Services (Its) Program Database, Lora Ersland

Masters Theses & Doctoral Dissertations

The South Dakota Board of Regents (SDBOR) system, comprised of the six public universities, has undertaken a project to migrate the Colleague Student Information System from a proprietary Unidata database to an Oracle database. The conversion to the Oracle database will allow the ITS Administrative Computing staff more options to create programs that access the Colleague Student Information System.

During the conversion of the existing Unidata programs, it was discovered that the migration was causing us to lose our ability to keep track of programs that were developed to access the Colleague system. In addition, while we are gaining the …


Check Exception Automation (Cea) System, Aashima Arora Apr 2015

Check Exception Automation (Cea) System, Aashima Arora

Masters Theses & Doctoral Dissertations

Check Exception Automation (CEA) System is a web application which provides the facility to create and resolve the check exception that occurs after the check is successfully deposited to the American Bank. Checks can be deposited via different channels such as ATM, Cash Vault (which is a kind of check dropping box) and via mobile. There are a number of exceptions that may occur after depositing the check such as missing signature, wrong amount, altered check, duplicate check and missing amount. The older check exception resolution process was manual process. The goal of this project is to automate the check …


Yar Consulting Marketing Website And Extranet Site, John Suarez Jul 2014

Yar Consulting Marketing Website And Extranet Site, John Suarez

Masters Theses & Doctoral Dissertations

This is a hybrid project. As a new Information Systems consultancy the need for a website to market to potential clients was evident. The decision to add an extranet site was made after specific needs for Ace Hardware were made evident to Yar’s founders. Ace Hardware Corporation is a cooperative with over 4,400 members in over 100 nations worldwide. Ace corporate rolled out a B2B pilot program in the fall of 2013 to help Ace independently owned retail stores learn how to sell to other businesses. One of YAR’s founders is currently working with Ace corporate as a program consultant …