Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (7)
- Library and Information Science (6)
- Computer Engineering (5)
- Engineering (5)
- Education (3)
-
- Business (2)
- Communication (2)
- Communication Technology and New Media (2)
- Databases and Information Systems (2)
- Educational Technology (2)
- Business Administration, Management, and Operations (1)
- Communication Sciences and Disorders (1)
- Criminology and Criminal Justice (1)
- Health and Physical Education (1)
- Legal Studies (1)
- Medicine and Health Sciences (1)
- Organizational Behavior and Theory (1)
- Special Education and Teaching (1)
- Speech Pathology and Audiology (1)
- Keyword
-
- Information security (4)
- Information systems (4)
- Cybersecurity (3)
- Machine learning (3)
- Privacy (3)
-
- Social media (3)
- Computer security (2)
- Knowledge sharing (2)
- Protection motivation theory (2)
- Social engineering (2)
- Social pressures (2)
- Usability (2)
- 3D VR anatomy (1)
- AI/RPA integration (1)
- Agile development (1)
- Android (1)
- Ant colony optimization (1)
- Ant system (1)
- Artificial intelligence (AI) (1)
- Augmentative and alternative communication devices (1)
- Autism spectrum disorder (1)
- Clinical decision making (1)
- Compliance (1)
- Computer engineering (1)
- Computer security behavior (1)
- Confidential data (1)
- Convergent mixed method (1)
- Data breach (1)
- Design science research (DSR) methodology (1)
- Distributed teams (1)
Articles 1 - 24 of 24
Full-Text Articles in Physical Sciences and Mathematics
The Influence Of An Individual’S Disposition To Value Privacy In A Non-Contrived Study, John Marsh
The Influence Of An Individual’S Disposition To Value Privacy In A Non-Contrived Study, John Marsh
CCE Theses and Dissertations
Unexpected usage of user data has made headlines as both governments and commercial entities have encountered privacy-related issues. Like other social networking sites, LinkedIn provides users to restrict access to their information or allow for public viewing; information available in the public view was used unexpectedly (i.e., profiling). A non-profit entity called ICWATCH used tools to gather information on government mass surveillance programs by scraping publicly accessible user data from LinkedIn. Previous research has shown that privacy concerns influence behavior intention in contrived scenarios. What remains unclear is whether LinkedIn users, whose data was scraped by ICWATCH (an actual situation), …
Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King
Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King
CCE Theses and Dissertations
It is estimated that over half of all information systems security breaches are due directly or indirectly to the poor security practices of an organization’s employees. Previous research has shown neutralization techniques as having influence on the intent to violate information security policy. In this study, we proposed an expansion of the neutralization model by including the effects of business and ethical orientation of individuals on their tendencies to neutralize and compromise with information security policy. Additionally, constructs from social influences and pressures have been integrated into this model to measure the impact on the intent to violate information security …
The Construction And Internal Validation Of A Model For The Effective Collaboration Of Distributed Agile Teams, Ernesto Custodio
The Construction And Internal Validation Of A Model For The Effective Collaboration Of Distributed Agile Teams, Ernesto Custodio
CCE Theses and Dissertations
Agile approaches to software development have increased steadily over the past decade. Agile processes emphasize iterative and collaborative discovery of requirements and solutions executed by self-organizing, cross-functional teams. Software development using distributed teams, including distributed sub-teams, fully dispersed teams, and partially dispersed teams, has also increased due to benefits such as access to global talent and faster delivery, among others.
However, most Agile approaches, models, and frameworks only address the needs of colocated teams. Distributed teams come with unique challenges when it comes to effective collaboration. The goal was to construct and validate internally a model for the effective collaboration …
Neural Network Variations For Time Series Forecasting, David Ason
Neural Network Variations For Time Series Forecasting, David Ason
CCE Theses and Dissertations
Time series forecasting is an area of research within the discipline of machine learning. The ARIMA model is a well-known approach to this challenge. However, simple models such as ARIMA do not take into consideration complex relationships within the data and quite often fail to produce a satisfactory forecast. Neural networks have been presented in previous works as an alternative. Neural networks are able to capture non-linear relationships within the data and can deliver an improved forecast when compared to ARIMA models.
This dissertation takes neural network variations and applies them to a group of time series datasets found in …
An Empirical Examination Of The Impact Of Organizational Injustice And Negative Affect On Attitude And Non-Compliance With Information Security Policy, Celestine Kemah
An Empirical Examination Of The Impact Of Organizational Injustice And Negative Affect On Attitude And Non-Compliance With Information Security Policy, Celestine Kemah
CCE Theses and Dissertations
Employees’ non-compliance with Information Security (IS) policies is an important socio-organizational issue that represents a serious threat to the effective management of information security programs in organizations. Prior studies have demonstrated that information security policy (ISP) violation in the workplace is a common significant problem in organizations. Some of these studies have earmarked the importance of this problem by drawing upon cognitive processes to explain compliance with information security policies, while others have focused solely on factors related to non-compliance behavior, one of which is affect. Despite the findings from these studies, there is a dearth of extant literature that …
Pause For A Cybersecurity Cause: Assessing The Influence Of A Waiting Period On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci
Pause For A Cybersecurity Cause: Assessing The Influence Of A Waiting Period On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci
CCE Theses and Dissertations
Social engineering costs organizations billions of dollars a year. Social engineering exploits the weakest link of information security systems, the people who are using them. Phishing is a form of social engineering in which the perpetrator depends on the victim’s instinctual thinking towards an email designed to create a fear or excitement response. It is well-documented in literature that users continue to click on phishing emails costing them and their employers significant monetary resources and data loss. Training does not appear to mitigate the effects of phishing much; other solutions are necessary to mitigate phishing.
Kahneman introduced the concepts of …
A Framework For Artificial Intelligence Applications In The Healthcare Revenue Management Cycle, Leonard J. Pounds
A Framework For Artificial Intelligence Applications In The Healthcare Revenue Management Cycle, Leonard J. Pounds
CCE Theses and Dissertations
There is a lack of understanding of specific risks and benefits associated with AI/RPA implementations in healthcare revenue cycle settings. Healthcare companies are confronted with stricter regulations and billing requirements, underpayments, and more significant delays in receiving payments. Despite the continued interest of practitioners, revenue cycle management has not received much attention in research. Revenue cycle management is defined as the process of identifying, collecting, and managing the practice’s revenue from payers based on the services provided.This dissertation provided contributions to both areas, as mentioned above. To accomplish this, a semi-structured interview was distributed to healthcare executives. The semi-structured interview …
Investigating The User Experience With A 3d Virtual Anatomy Application, Winnyanne Kunkle
Investigating The User Experience With A 3d Virtual Anatomy Application, Winnyanne Kunkle
CCE Theses and Dissertations
Decreasing hours dedicated to teaching anatomy courses and declining use of human cadavers have spurred the need for innovative solutions in teaching anatomy in medical schools. Advancements in virtual reality (VR), 3D visualizations, computer graphics, and medical graphic images have enabled the development of highly interactive 3D virtual applications. Over recent years, variations of interactive systems on computer-mediated environments have been used as supplementary resource for learners. However, despite the growing sophistication of these resources for learning anatomy, studies show that students predominantly prefer traditional methods of learning and hands-on cadaver-based learning over computer-mediated platforms.
There is limited research on …
An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung
An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung
CCE Theses and Dissertations
Computer users’ security compliance behaviors can be better understood by devising an experimental study to examine how fear appeals might impact users’ security behavior. Telecommuter security behavior has become very relevant in information systems (IS) research with the growing number of individuals working from home. The increasing dependence on telecommuting to enhance the viability and convenience has created an urgency with the advent of the COVID-19 pandemic to examine the behavior of users working at home across a corporate network. The home networks are usually not as secure as those in corporate settings. There is seldom a firewall setting and …
An Assessment Of The Impacts Of Social Media Inputs And Court Case Information On Mitigating Insider Threats, Robert Jones
An Assessment Of The Impacts Of Social Media Inputs And Court Case Information On Mitigating Insider Threats, Robert Jones
CCE Theses and Dissertations
The insider threat is a global problem that impacts organizations and produces a gamut of undesired outcomes. Businesses often experience lost revenue and stolen trade secrets, which can leave a tarnished reputation. Insider threats can also cause harm to individuals and national security. Past efforts have not mitigated the problem in its entirety. Documented instances of insider threats are as recent as March 2020. Many researchers have focused on monitoring technologies and relying on human monitoring in a reactive posture. An ideal solution would scrutinize an individual’s character and ascertain whether unique traits associated with actors of insider threats are …
Identifying The Impact Of Perceived Shared Cultural Values On Knowledge Sharing Through A Social Media Application, Mel Anthony Tomeo
Identifying The Impact Of Perceived Shared Cultural Values On Knowledge Sharing Through A Social Media Application, Mel Anthony Tomeo
CCE Theses and Dissertations
Knowledge sharing (KS) has been determined by many researchers as an important tool for problem-solving experiences and achieving success. Recent studies have explained KS as an activity in which knowledge is exchanged through individuals or between organizations. KS can help facilitate decision-making capabilities, stimulate cultural change, and create innovation. Through KS, individuals and organizations can capture explicit and tacit knowledge to save time and money. Previous studies have indicated a lack of research in how perceived shared cultural values impact KS through a social media application.
The purpose of this research was to add new information to the body of …
Examination Of Corporate Investments In Privacy: An Event Study, Joseph Michael Squillace
Examination Of Corporate Investments In Privacy: An Event Study, Joseph Michael Squillace
CCE Theses and Dissertations
The primary objective of any corporate entity is generating as much wealth as possible. Investing financially in technology domains has historically been a successful strategy for generating increased corporate and shareholder wealth. However, investments in Information Technology (IT), Information Systems (IS) and Information Security (InfoSec) to specifically generate increased wealth must be implemented carefully.
Shareholders reacting to corporate investments perceive financial value from individual investments. The investment’s perceived value is then reflected in the corporation’s updated stock market value. IS, IT, and InfoSec investments perceived to possess positive financial value, indicating strong potential for increased wealth, are rewarded by shareholders …
Examining The Influence Of Perceived Risk On The Selection Of Internet Access In The U.S. Intelligence Community, Tyler Michael Pieron
Examining The Influence Of Perceived Risk On The Selection Of Internet Access In The U.S. Intelligence Community, Tyler Michael Pieron
CCE Theses and Dissertations
Information technology security policies are designed explicitly to protect IT systems. However, overly restrictive information security policies may be inadvertently creating an unforeseen information risk by encouraging users to bypass protected systems in favor of personal devices, where the potential loss of organizational intellectual property is greater.
Current models regarding the acceptance and use of technology, Technology Acceptance Model Version 3 (TAM3) and the Unified Theory of Acceptance and Use of Technology Version 2 (UTAUT2), address the use of technology in organizations and by consumers, but little research has been done to identify an appropriate model to begin to understand …
Investigation Of Ant Colony Optimization Implementation Strategies For Low-Memory Operating Environments, Douglas Hale
Investigation Of Ant Colony Optimization Implementation Strategies For Low-Memory Operating Environments, Douglas Hale
CCE Theses and Dissertations
In search guided by meta-heuristics, a fundamental tradeoff exists between exploitation of good solutions (intensification) and exploration of the solution space for better solutions (diversification). Over-exploitation can limit the search to suboptimal solutions while over-exploration can reduce the efficiency of the overall search. Ant Colony Optimization (ACO) is a well-known meta-heuristic inspired by biological ants for solving NP-hard combinatorial search problems like the Traveling Salesman Problem (TSP). In nature, biological ant colonies navigate to find efficient paths around complex obstacles by depositing and following simple chemicals called pheromones. ACO algorithms model this behavior by implementing sets of artificial ants which …
Enterprise Social Network Systems Implementation Model For Knowledge Sharing Among Supply Chain It Professionals, Edgardo Luis Velez-Mandes
Enterprise Social Network Systems Implementation Model For Knowledge Sharing Among Supply Chain It Professionals, Edgardo Luis Velez-Mandes
CCE Theses and Dissertations
With the increased use of social network technologies in organizational environments, there is a need to understand how these technologies facilitate organizational knowledge management, particularly knowledge sharing. Prior research has focused on the relationship between knowledge management and enterprise social networking systems (ESNS), but little research has been conducted relating to how organizations implement and use ESNS for knowledge sharing. The goal was to construct and validate internally a model that offers guidance for the successful implementation and use of ESNS for knowledge sharing and building successful virtual communities of practice (vCoPs) among IT supply chain professionals in a healthcare …
Feature Selection On Permissions, Intents And Apis For Android Malware Detection, Fred Guyton
Feature Selection On Permissions, Intents And Apis For Android Malware Detection, Fred Guyton
CCE Theses and Dissertations
Malicious applications pose an enormous security threat to mobile computing devices. Currently 85% of all smartphones run Android, Google’s open-source operating system, making that platform the primary threat vector for malware attacks. Android is a platform that hosts roughly 99% of known malware to date, and is the focus of most research efforts in mobile malware detection due to its open source nature. One of the main tools used in this effort is supervised machine learning. While a decade of work has made a lot of progress in detection accuracy, there is an obstacle that each stream of research is …
Increasing Software Reliability Using Mutation Testing And Machine Learning, Michael Allen Stewart
Increasing Software Reliability Using Mutation Testing And Machine Learning, Michael Allen Stewart
CCE Theses and Dissertations
Mutation testing is a type of software testing proposed in the 1970s where program statements are deliberately changed to introduce simple errors so that test cases can be validated to determine if they can detect the errors. The goal of mutation testing was to reduce complex program errors by preventing the related simple errors. Test cases are executed against the mutant code to determine if one fails, detects the error and ensures the program is correct. One major issue with this type of testing was it became intensive computationally to generate and test all possible mutations for complex programs.
This …
Improving Employees’ Compliance With Password Policies, Enas Albataineh
Improving Employees’ Compliance With Password Policies, Enas Albataineh
CCE Theses and Dissertations
Employees’ lack of compliance with password policies increases password susceptibility, which leads to financial damages to the organizations as a result of information disclosure, fraud, and unauthorized transactions. However, few studies have examined what motivates employees to comply with password policies.
The purpose of this quantitative cross-sectional study was to examine what factors influence employees’ compliance with password policies. A theoretical model was developed based on Protection Motivation Theory (PMT), General Deterrence Theory (GDT), Theory of Reasoned Action (TRA), and Psychological Ownership Theory to explain employees’ compliance with password policies.
A non-probability convenience sample was employed. The sample consisted of …
An Empirical Assessment Of Users' Information Security Protection Behavior Towards Social Engineering Breaches, Nisha Jatin Patel
An Empirical Assessment Of Users' Information Security Protection Behavior Towards Social Engineering Breaches, Nisha Jatin Patel
CCE Theses and Dissertations
User behavior is one of the most significant information security risks. Information Security is all about being aware of who and what to trust and behaving accordingly. Due to technology becoming an integral part of nearly everything in people's daily lives, the organization's need for protection from security threats has continuously increased. Social engineering is the act of tricking a user into revealing information or taking action. One of the riskiest aspects of social engineering is that it depends mainly upon user errors and is not necessarily a technology shortcoming. User behavior should be one of the first apprehensions when …
Interpretable Machine Learning Model For Clinical Decision Making, Ali El-Sharif
Interpretable Machine Learning Model For Clinical Decision Making, Ali El-Sharif
CCE Theses and Dissertations
Despite machine learning models being increasingly used in medical decision-making and meeting classification predictive accuracy standards, they remain untrusted black-boxes due to decision-makers' lack of insight into their complex logic. Therefore, it is necessary to develop interpretable machine learning models that will engender trust in the knowledge they generate and contribute to clinical decision-makers intention to adopt them in the field.
The goal of this dissertation was to systematically investigate the applicability of interpretable model-agnostic methods to explain predictions of black-box machine learning models for medical decision-making. As proof of concept, this study addressed the problem of predicting the risk …
The Empirical Study Of The Factors That Influence Threat Avoidance Behavior In Ransomware Security Incidents, Heriberto Aurelio Acosta Maestre
The Empirical Study Of The Factors That Influence Threat Avoidance Behavior In Ransomware Security Incidents, Heriberto Aurelio Acosta Maestre
CCE Theses and Dissertations
Ransomware security incidents have become one of the biggest threats to general computer users who are oblivious to the ease of infection, severity, and cost of the damage it causes. University networks and their students are susceptible to ransomware security incidents. College students have vast technical skills and knowledge, however they risk ransomware security incidents because of their lack of mitigating actions to the threats and the belief that it would not happen to them. Interaction with peers may play a part in college students’ perception of the threats and behavior to secure their computers. Identifying what influences students’ threat …
Development Of A Social Engineering Exposure Index (Sexi) Using Open-Source Personal Information, William Shawn Wilkerson
Development Of A Social Engineering Exposure Index (Sexi) Using Open-Source Personal Information, William Shawn Wilkerson
CCE Theses and Dissertations
Millions of people willingly expose their lives via Internet technologies every day, and even the very few ones who refrain from the use of the Internet find themselves exposed through data breaches. Billions of private information records are exposed through the Internet. Marketers gather personal preferences to influence shopping behavior. Providers gather personal information to deliver enhanced services, and underground hacker networks contain repositories of immense data sets. Few users of Internet technologies have considered where their information is going or who has access to it. Even fewer are aware of how decisions made in their own lives expose significant …
Human Errors In Data Breaches: An Exploratory Configurational Analysis, Gabriel A. Cornejo
Human Errors In Data Breaches: An Exploratory Configurational Analysis, Gabriel A. Cornejo
CCE Theses and Dissertations
Information Systems (IS) are critical for employee productivity and organizational success. Data breaches are on the rise—with thousands of data breaches accounting for billions of records breached and annual global cybersecurity costs projected to reach $10.5 trillion by 2025. A data breach is the unauthorized disclosure of sensitive information—and can be achieved intentionally or unintentionally. Significant causes of data breaches are hacking and human error; in some estimates, human error accounted for about a quarter of all data breaches in 2018. Furthermore, the significance of human error on data breaches is largely underrepresented, as hackers often capitalize on organizational users’ …
A Study Of Factors That Influence Symbol Selection On Augmentative And Alternative Communication Devices For Individuals With Autism Spectrum Disorder, William Todd Dauterman
A Study Of Factors That Influence Symbol Selection On Augmentative And Alternative Communication Devices For Individuals With Autism Spectrum Disorder, William Todd Dauterman
CCE Theses and Dissertations
According to the American Academy of Pediatrics (AAP), 1 in 59 children are diagnosed with Autism Spectrum Disorder (ASD) each year. Given the complexity of ASD and how it is manifested in individuals, the execution of proper interventions is difficult. One major area of concern is how individuals with ASD who have limited communication skills are taught to communicate using Augmentative and Alternative Communication devices (AAC). AACs are portable electronic devices that facilitate communication by using audibles, signs, gestures, and picture symbols. Traditionally, Speech-Language Pathologists (SLPs) are the primary facilitators of AAC devices and help establish the language individuals with …