Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Academic social network (1)
- Acquisition of data (1)
- Asynchronous transfer mode (1)
- Browsers (1)
- Cognitive radio (1)
-
- Computer program language (1)
- Computer programs (1)
- Computer science education (1)
- Computer software (1)
- Course development models (1)
- Crowdsourcing (1)
- Curriculum design and development (1)
- Data mining (1)
- Digital divide (1)
- Digital literacy (1)
- Digital skills (1)
- Distance education (1)
- Distributed algorighms (1)
- E-learning system (1)
- Enrollment (1)
- Extensions (1)
- FPGAs (1)
- Factors of major selection (1)
- Hardware (1)
- ICT (1)
- Information technology (1)
- Javascript (1)
- Low-income countries (1)
- Malware (1)
- Massive data (1)
Articles 1 - 11 of 11
Full-Text Articles in Physical Sciences and Mathematics
Drip - Data Rich, Information Poor: A Concise Synopsis Of Data Mining, Muhammad Obeidat, Max North, Lloyd Burgess, Sarah North
Drip - Data Rich, Information Poor: A Concise Synopsis Of Data Mining, Muhammad Obeidat, Max North, Lloyd Burgess, Sarah North
Faculty and Research Publications
As production of data is exponentially growing with a drastically lower cost, the importance of data mining required to extract and discover valuable information is becoming more paramount. To be functional in any business or industry, data must be capable of supporting sound decision-making and plausible prediction. The purpose of this paper is concisely but broadly to provide a synopsis of the technology and theory of data mining, providing an enhanced comprehension of the methods by which massive data can be transferred into meaningful information.
Developing Health Information Technology (Hit) Programs And Hit Curriculum: The Southern Polytechnic State University Experience, Chi Zhang, Han Reichgelt, Rebecca H. Rutherfoord, Andy Ju An Wang
Developing Health Information Technology (Hit) Programs And Hit Curriculum: The Southern Polytechnic State University Experience, Chi Zhang, Han Reichgelt, Rebecca H. Rutherfoord, Andy Ju An Wang
Faculty and Research Publications
Health Information Technology (HIT) professionals are in increasing demand as healthcare providers need help in the adoption and meaningful use of Electronic Health Record (EHR) systems while the HIT industry needs workforce skilled in HIT and EHR development. To respond to this increasing demand, the School of Computing and Software Engineering at Southern Polytechnic State University designed and implemented a series of HIT educational programs. This paper summarizes our experience in the HIT curriculum development and provides an overview of HIT workforce development initiatives and major HIT and health information management (HIM) educational resources. It also provides instructional implications and …
Promoting Information Systems Major To Undergraduate Students - A Comprehensive Investigation, Lei Li, Chi Zhang, Guangzhi Zheng
Promoting Information Systems Major To Undergraduate Students - A Comprehensive Investigation, Lei Li, Chi Zhang, Guangzhi Zheng
Faculty and Research Publications
Weak enrollment growth has been a concern for many Information Systems (IS) programs in recent years although the IT/IS job market remains strong. Stimulating undergraduate students’ interest to IS programs have been a challenge. In this paper, the researchers took a comprehensive approach to study how to effectively promote a Management Information Systems (MIS) program to undergraduate students at a medium-size public university in the southeastern US. Using a survey-based method, the researchers first investigated the factors that impact students’ selection of majors and identified students’ perceptions on an MIS program. In this paper, an MIS program promotion strategy was …
Distributed And Asynchronous Data Collection In Cognitive Radio Networks With Fairness Consideration, Zhipeng Cai, Shouling Ji, Jing He, Lin Wei
Distributed And Asynchronous Data Collection In Cognitive Radio Networks With Fairness Consideration, Zhipeng Cai, Shouling Ji, Jing He, Lin Wei
Faculty and Research Publications
As a promising communication paradigm, Cognitive Radio Networks (CRNs) have paved a road for Secondary Users (SUs) to opportunistically exploit unused licensed spectrum without causing unacceptable interference to Primary Users (PUs). In this paper, we study the distributed data collection problem for asynchronous CRNs, which has not been addressed before. We study the Proper Carrier-sensing Range (PCR) for SUs. By working with this PCR, an SU can successfully conduct data transmission without disturbing the activities of PUs and other SUs. Subsequently, based on the PCR, we propose an Asynchronous Distributed Data Collection (ADDC) algorithm with fairness consideration for CRNs. ADDC …
Unraveling The Digital Literacy Paradox: How Higher Education Fails At The Fourth Literacy., Meg Coffin Murray, Jorge Perez
Unraveling The Digital Literacy Paradox: How Higher Education Fails At The Fourth Literacy., Meg Coffin Murray, Jorge Perez
Faculty and Research Publications
Governments around the globe are recognizing the economic ramifications of a digitally literate citizenry and implementing systemic strategies to advance digital literacy. Awareness of the growing importance of digital literacy in today’s workplace coexists paradoxically with apparent foot-dragging on the part of many universities in assessment and amplification of these important competencies. This paper makes a case for digital literacy, presents models of the complex construct, and presents the results of a digital literacy assessment administered to students enrolled in a senior seminar course at a regional university in the United States. Reflection on the study results evoked our mantra …
Effective Detection Of Vulnerable And Malicious Browser Extensions, Hossain Shahriar, Komminist Weldemariam, Mohammad Zulkernine, Thibaud Lutellier
Effective Detection Of Vulnerable And Malicious Browser Extensions, Hossain Shahriar, Komminist Weldemariam, Mohammad Zulkernine, Thibaud Lutellier
Faculty and Research Publications
Unsafely coded browser extensions can compromise the security of a browser, making them attractive targets for attackers as a primary vehicle for conducting cyber-attacks. Among others, the three factors making vulnerable extensions a high-risk security threat for browsers include: i) the wide popularity of browser extensions, ii) the similarity of browser extensions with web applications, and iii) the high privilege of browser extension scripts. Furthermore, mechanisms that specifically target to mitigate browser extension-related attacks have received less attention as opposed to solutions that have been deployed for common web security problems (such as SQL injection, XSS, logic flaws, client-side vulnerabilities, …
Analysis Of A Scholarly Social Networking Site: The Case Of The Dormant User, Meg Murray
Analysis Of A Scholarly Social Networking Site: The Case Of The Dormant User, Meg Murray
Faculty and Research Publications
Many scholarly social networking sites targeting an audience of academicians and researchers have appeared on the Internet in recent years. Their vision is to change the way researchers connect, share and collaborate to solve real world problems. Despite the hype, however, their impact on higher education is unclear. Studies exist that address the benefits of these sites, but studies that investigate the implications of how scholarly social networking systems vet information, including data related to user profiles and uploaded content, is nonexistent. This paper chronicles the system management of user information for an inactive user of a scholarly social networking …
The Adoption Of E-Learning Systems In Low Income Countries: The Case Of Ethiopia, Yonas Hagos, Solomon Negash
The Adoption Of E-Learning Systems In Low Income Countries: The Case Of Ethiopia, Yonas Hagos, Solomon Negash
Faculty and Research Publications
This paper presents the Technology Acceptance Model (TAM) to examine the adoption of e-learning system in low-income countries, the case of Ethiopia. The research uses a quantitative research approach to examine Ethiopian tertiary level distance students’ determinant factors for the acceptance of e-learning systems. A questionnaire-based survey was conducted to collect data from 255 undergraduate distance learners in a higher education institute in Ethiopia. The data were analyzed using the Structural Equation Modeling (SEM) (Hair et al, 2005) technique to examine the causal model. The results indicated that perceived usefulness and perceived ease of use significantly affected distance learners’ behavioral …
Rethinking Fs-Isac: An It Security Information Sharing Network Model For The Financial Services Sector, Charles Zhechao Liu, Humayun Zafar, Yoris A. Au
Rethinking Fs-Isac: An It Security Information Sharing Network Model For The Financial Services Sector, Charles Zhechao Liu, Humayun Zafar, Yoris A. Au
Faculty and Research Publications
This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing alliance in the financial services industry). Failure to encourage members to share their IT security-related information has seriously undermined the founding rationale of FS-ISAC. Our analysis shows that many information sharing alliances’ membership policies are plagued with the incentive misalignment issue and may result in a “free-riding” or “no information sharing” equilibrium. To address this issue, we propose a new information sharing membership policy that incorporates an insurance option and show that the proposed policy can align members’ incentives and lead to a socially optimal outcome. Moreover, …
Hardware Components In Cybersecurity Education, Dan Chia-Tien Lo, Max North, Sarah North
Hardware Components In Cybersecurity Education, Dan Chia-Tien Lo, Max North, Sarah North
Faculty and Research Publications
Hardware components have been designated as required academic content for colleges to be recognized as a center of academic excellence in cyber operations by the National Security Agency (NSA). To meet the hardware requirement, computer science and information technology programs must cover hardware concepts and design skills, topics which are less emphasized in existing programs. This paper describes a new pedagogical model for hardware based on network intrusion detection taught at college and graduate levels in a National Center of Academic Excellence in Information Assurance Education Program (CAE/IAE). The curriculum focuses on the fundamental concepts of network intrusion detection mechanisms, …
A Comparative Review Of Information Technology Project Management In Private And Public Sector Organization, Muhammad Obeidat, Max North
A Comparative Review Of Information Technology Project Management In Private And Public Sector Organization, Muhammad Obeidat, Max North
Faculty and Research Publications
Both private and public sector organizations tend to recognize the prominence of information technology within project management techniques and practices. The primary objective of this paper is to present a comparative review of information technology within project management in private and public sectors. Moreover, this research provides an extensive review of related topics such as the evolution of information technology, factors contributing to project abandonment, and the tools and techniques of management that effect project success. In conclusion, the authors present a variety of practical and effective guidelines and recommend approaches for the successful deployment of information technology within project …