Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Physical Sciences and Mathematics

Drip - Data Rich, Information Poor: A Concise Synopsis Of Data Mining, Muhammad Obeidat, Max North, Lloyd Burgess, Sarah North Dec 2014

Drip - Data Rich, Information Poor: A Concise Synopsis Of Data Mining, Muhammad Obeidat, Max North, Lloyd Burgess, Sarah North

Faculty and Research Publications

As production of data is exponentially growing with a drastically lower cost, the importance of data mining required to extract and discover valuable information is becoming more paramount. To be functional in any business or industry, data must be capable of supporting sound decision-making and plausible prediction. The purpose of this paper is concisely but broadly to provide a synopsis of the technology and theory of data mining, providing an enhanced comprehension of the methods by which massive data can be transferred into meaningful information.


Developing Health Information Technology (Hit) Programs And Hit Curriculum: The Southern Polytechnic State University Experience, Chi Zhang, Han Reichgelt, Rebecca H. Rutherfoord, Andy Ju An Wang Oct 2014

Developing Health Information Technology (Hit) Programs And Hit Curriculum: The Southern Polytechnic State University Experience, Chi Zhang, Han Reichgelt, Rebecca H. Rutherfoord, Andy Ju An Wang

Faculty and Research Publications

Health Information Technology (HIT) professionals are in increasing demand as healthcare providers need help in the adoption and meaningful use of Electronic Health Record (EHR) systems while the HIT industry needs workforce skilled in HIT and EHR development. To respond to this increasing demand, the School of Computing and Software Engineering at Southern Polytechnic State University designed and implemented a series of HIT educational programs. This paper summarizes our experience in the HIT curriculum development and provides an overview of HIT workforce development initiatives and major HIT and health information management (HIM) educational resources. It also provides instructional implications and …


Promoting Information Systems Major To Undergraduate Students - A Comprehensive Investigation, Lei Li, Chi Zhang, Guangzhi Zheng Oct 2014

Promoting Information Systems Major To Undergraduate Students - A Comprehensive Investigation, Lei Li, Chi Zhang, Guangzhi Zheng

Faculty and Research Publications

Weak enrollment growth has been a concern for many Information Systems (IS) programs in recent years although the IT/IS job market remains strong. Stimulating undergraduate students’ interest to IS programs have been a challenge. In this paper, the researchers took a comprehensive approach to study how to effectively promote a Management Information Systems (MIS) program to undergraduate students at a medium-size public university in the southeastern US. Using a survey-based method, the researchers first investigated the factors that impact students’ selection of majors and identified students’ perceptions on an MIS program. In this paper, an MIS program promotion strategy was …


Distributed And Asynchronous Data Collection In Cognitive Radio Networks With Fairness Consideration, Zhipeng Cai, Shouling Ji, Jing He, Lin Wei Aug 2014

Distributed And Asynchronous Data Collection In Cognitive Radio Networks With Fairness Consideration, Zhipeng Cai, Shouling Ji, Jing He, Lin Wei

Faculty and Research Publications

As a promising communication paradigm, Cognitive Radio Networks (CRNs) have paved a road for Secondary Users (SUs) to opportunistically exploit unused licensed spectrum without causing unacceptable interference to Primary Users (PUs). In this paper, we study the distributed data collection problem for asynchronous CRNs, which has not been addressed before. We study the Proper Carrier-sensing Range (PCR) for SUs. By working with this PCR, an SU can successfully conduct data transmission without disturbing the activities of PUs and other SUs. Subsequently, based on the PCR, we propose an Asynchronous Distributed Data Collection (ADDC) algorithm with fairness consideration for CRNs. ADDC …


Unraveling The Digital Literacy Paradox: How Higher Education Fails At The Fourth Literacy., Meg Coffin Murray, Jorge Perez Jul 2014

Unraveling The Digital Literacy Paradox: How Higher Education Fails At The Fourth Literacy., Meg Coffin Murray, Jorge Perez

Faculty and Research Publications

Governments around the globe are recognizing the economic ramifications of a digitally literate citizenry and implementing systemic strategies to advance digital literacy. Awareness of the growing importance of digital literacy in today’s workplace coexists paradoxically with apparent foot-dragging on the part of many universities in assessment and amplification of these important competencies. This paper makes a case for digital literacy, presents models of the complex construct, and presents the results of a digital literacy assessment administered to students enrolled in a senior seminar course at a regional university in the United States. Reflection on the study results evoked our mantra …


Effective Detection Of Vulnerable And Malicious Browser Extensions, Hossain Shahriar, Komminist Weldemariam, Mohammad Zulkernine, Thibaud Lutellier Jun 2014

Effective Detection Of Vulnerable And Malicious Browser Extensions, Hossain Shahriar, Komminist Weldemariam, Mohammad Zulkernine, Thibaud Lutellier

Faculty and Research Publications

Unsafely coded browser extensions can compromise the security of a browser, making them attractive targets for attackers as a primary vehicle for conducting cyber-attacks. Among others, the three factors making vulnerable extensions a high-risk security threat for browsers include: i) the wide popularity of browser extensions, ii) the similarity of browser extensions with web applications, and iii) the high privilege of browser extension scripts. Furthermore, mechanisms that specifically target to mitigate browser extension-related attacks have received less attention as opposed to solutions that have been deployed for common web security problems (such as SQL injection, XSS, logic flaws, client-side vulnerabilities, …


Analysis Of A Scholarly Social Networking Site: The Case Of The Dormant User, Meg Murray Mar 2014

Analysis Of A Scholarly Social Networking Site: The Case Of The Dormant User, Meg Murray

Faculty and Research Publications

Many scholarly social networking sites targeting an audience of academicians and researchers have appeared on the Internet in recent years. Their vision is to change the way researchers connect, share and collaborate to solve real world problems. Despite the hype, however, their impact on higher education is unclear. Studies exist that address the benefits of these sites, but studies that investigate the implications of how scholarly social networking systems vet information, including data related to user profiles and uploaded content, is nonexistent. This paper chronicles the system management of user information for an inactive user of a scholarly social networking …


The Adoption Of E-Learning Systems In Low Income Countries: The Case Of Ethiopia, Yonas Hagos, Solomon Negash Feb 2014

The Adoption Of E-Learning Systems In Low Income Countries: The Case Of Ethiopia, Yonas Hagos, Solomon Negash

Faculty and Research Publications

This paper presents the Technology Acceptance Model (TAM) to examine the adoption of e-learning system in low-income countries, the case of Ethiopia. The research uses a quantitative research approach to examine Ethiopian tertiary level distance students’ determinant factors for the acceptance of e-learning systems. A questionnaire-based survey was conducted to collect data from 255 undergraduate distance learners in a higher education institute in Ethiopia. The data were analyzed using the Structural Equation Modeling (SEM) (Hair et al, 2005) technique to examine the causal model. The results indicated that perceived usefulness and perceived ease of use significantly affected distance learners’ behavioral …


Rethinking Fs-Isac: An It Security Information Sharing Network Model For The Financial Services Sector, Charles Zhechao Liu, Humayun Zafar, Yoris A. Au Jan 2014

Rethinking Fs-Isac: An It Security Information Sharing Network Model For The Financial Services Sector, Charles Zhechao Liu, Humayun Zafar, Yoris A. Au

Faculty and Research Publications

This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing alliance in the financial services industry). Failure to encourage members to share their IT security-related information has seriously undermined the founding rationale of FS-ISAC. Our analysis shows that many information sharing alliances’ membership policies are plagued with the incentive misalignment issue and may result in a “free-riding” or “no information sharing” equilibrium. To address this issue, we propose a new information sharing membership policy that incorporates an insurance option and show that the proposed policy can align members’ incentives and lead to a socially optimal outcome. Moreover, …


Hardware Components In Cybersecurity Education, Dan Chia-Tien Lo, Max North, Sarah North Jan 2014

Hardware Components In Cybersecurity Education, Dan Chia-Tien Lo, Max North, Sarah North

Faculty and Research Publications

Hardware components have been designated as required academic content for colleges to be recognized as a center of academic excellence in cyber operations by the National Security Agency (NSA). To meet the hardware requirement, computer science and information technology programs must cover hardware concepts and design skills, topics which are less emphasized in existing programs. This paper describes a new pedagogical model for hardware based on network intrusion detection taught at college and graduate levels in a National Center of Academic Excellence in Information Assurance Education Program (CAE/IAE). The curriculum focuses on the fundamental concepts of network intrusion detection mechanisms, …


A Comparative Review Of Information Technology Project Management In Private And Public Sector Organization, Muhammad Obeidat, Max North Jan 2014

A Comparative Review Of Information Technology Project Management In Private And Public Sector Organization, Muhammad Obeidat, Max North

Faculty and Research Publications

Both private and public sector organizations tend to recognize the prominence of information technology within project management techniques and practices. The primary objective of this paper is to present a comparative review of information technology within project management in private and public sectors. Moreover, this research provides an extensive review of related topics such as the evolution of information technology, factors contributing to project abandonment, and the tools and techniques of management that effect project success. In conclusion, the authors present a variety of practical and effective guidelines and recommend approaches for the successful deployment of information technology within project …