Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 39

Full-Text Articles in Databases and Information Systems

Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali Dec 2018

Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali

Electronic Thesis and Dissertation Repository

The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify, Map, Apply, …


Enhancing The Design Of A Cybersecurity Risk Management Solution For Communities Of Trust, James E. Fulford Jr. Nov 2018

Enhancing The Design Of A Cybersecurity Risk Management Solution For Communities Of Trust, James E. Fulford Jr.

USF Tampa Graduate Theses and Dissertations

Research into cybersecurity risks and various methods of evaluating those threats has become an increasingly important area of academic and practitioner investigations. Of particular interest in this field is enhancing the designs and informing capabilities of cybersecurity risk management solutions for users who desire to understand how organizations are impacted when such risks are exploited. Many of the cybersecurity risk management solutions are extremely technical and require their users to have a commensurate level of technical acumen. In the situation evaluated during this research project, the founders of the company being researched had created a highly technical risk management solution …


Analytics For Novel Consumer Insights (A Three Essay Dissertation), Utkarsh Shrivastava Jul 2018

Analytics For Novel Consumer Insights (A Three Essay Dissertation), Utkarsh Shrivastava

USF Tampa Graduate Theses and Dissertations

Both literature and practice have investigated how the vast amount of ever increasing customer information can inform marketing strategy and decision making. However, the customer data is often susceptible to modeling bias and misleading findings due to various factors including sample selection and unobservable variables. The available analytics toolkit has continued to develop but in the age of nearly perfect information, the customer decision making has also evolved. The dissertation addresses some of the challenges in deriving valid and useful consumer insights from customer data in the digital age. The first study addresses the limitations of traditional customer purchase measures …


Is Information Systems Misuse Always Bad? A New Perspective On Is Misuse In Hospitals Under The Context Of Disasters, Dheyaaldin Alsalman Jul 2018

Is Information Systems Misuse Always Bad? A New Perspective On Is Misuse In Hospitals Under The Context Of Disasters, Dheyaaldin Alsalman

Masters Theses & Doctoral Dissertations

Although the extant literature has investigated how individuals engage in inappropriate behaviors based on the rational choice theory (RCT) (e.g., computer misconduct), the neutralization theory (e.g., IS security policies violation), and workarounds under normal situations, it has given little consideration to how individuals are involved in misuse of information systems with a good intention under the context of disasters. To fill this research gap, we propose a selfless misuse model, which offers a theoretical explanation for the concept of individuals’ selfless misuse intention under uncertainty caused by disasters. In this study, we show why employees make decisions to misuse the …


Hybrid Recommender For Online Petitions With Social Network And Psycholinguistic Features, Ahmed Elnoshokaty Jul 2018

Hybrid Recommender For Online Petitions With Social Network And Psycholinguistic Features, Ahmed Elnoshokaty

Masters Theses & Doctoral Dissertations

The online petition has become one of the most important channels of civic participation. Most of the state-of-the-art online platforms, however, tend to use simple indicators (such as popularity) to rank petitions, hence creating a situation where the most popular petitions dominate the rank and attract most people’s attention. For the petitions which focus on specific issues, they are often in a disadvantageous position on the list. For example, a petition for local environment problem may not be seen by many people who are really concerned with it, simply because it takes multiple pages to reach it. Therefore, the simple …


Virtual Smarts - Optimizing The Coalescing Of People For Collective Action Within Urban Communities, Stephen Thomas Ricken May 2018

Virtual Smarts - Optimizing The Coalescing Of People For Collective Action Within Urban Communities, Stephen Thomas Ricken

Dissertations

Despite the importance of individuals coming together for social group-activities (e.g., pick-up volleyball), the process by which such groups coalesce is poorly understood, and as a consequence is poorly supported by technology. This is despite the emergence of Event-Based Social Network (EBSN) technologies that are specifically designed to assist group coalescing for social activities. Existing theories focus on group development in terms of norms and types, rather than the processes involved in initial group coalescence. This dissertation addresses this gap in the literature through four studies focusing on understanding the coalescing process for interest-based group activities within urban environments and …


Three Essays On Trust Mining In Online Social Networks, Gelareh Towhidi May 2018

Three Essays On Trust Mining In Online Social Networks, Gelareh Towhidi

Theses and Dissertations

This dissertation research consists of three essays on studying trust in online social networks. Trust plays a critical role in online social relationships, because of the high levels of risk and uncertainty involved. Guided by relevant social science and computational graph theories, I develop conceptual and predictive models to gain insights into trusting behaviors in online social relationships.

In the first essay, I propose a conceptual model of trust formation in online social networks. This is the first study that integrates the existing graph-based view of trust formation in social networks with socio-psychological theories of trust to provide a richer …


Supporting User Evaluation Of Messaging Interactions With Potential Romantic Partners Discovered Online, Douglas Zytko Apr 2018

Supporting User Evaluation Of Messaging Interactions With Potential Romantic Partners Discovered Online, Douglas Zytko

Dissertations

Online dating systems have transformed the way people pursue romance. To arrive at a decision to meet for a face-to-face date, users gather information about each other online pertinent to romantic attraction. Yet sometimes they discover on the date that they made the wrong choice. One aspect of online dating system-use that may be a contributing factor, but is largely overlooked in the literature, is interaction through text-based messaging interfaces. This dissertation explores how messaging interactions inform face-to-face meeting decisions through two qualitative studies, and explores through a mixed methods field study how innovative messaging interfaces that embody theory from …


Black Business Owners Overcoming Barriers In Texas, Henry Williams Jan 2018

Black Business Owners Overcoming Barriers In Texas, Henry Williams

Walden Dissertations and Doctoral Studies

Black entrepreneurs in the state of Texas reported that they did not achieve the same level of success as nonminority enterprises. Many Black entrepreneurs have obtained education from top tier institutions and have the managerial experiences, skills, and working knowledge that facilitate business success, but they are not able to sustain business growth. The purpose of this phenomenological study was to explore the lived experiences of Black Texan entrepreneurs. This research was established using the conceptual framework of human capital. The overarching research question concerned the lived experiences of Black Texas entrepreneurs who were not as successful in business as …


Management Strategies For Adopting Agile Methods Of Software Development In Distributed Teams, Igor A. Schtein Jan 2018

Management Strategies For Adopting Agile Methods Of Software Development In Distributed Teams, Igor A. Schtein

Walden Dissertations and Doctoral Studies

Between 2003 and 2015, more than 61% of U.S. software development teams failed to satisfy project requirements, budgets, or timelines. Failed projects cost the software industry an estimated 60 billion dollars. Lost opportunities and misused resources are often the result of software development leaders failing to implement appropriate methods for managing software projects. The purpose of this qualitative multiple case study was to explore strategies software development managers use in adopting Agile methodology in the context of distributed teams. The tenets of Agile approach are individual interaction over tools, working software over documentation, and collaboration over a contract. The conceptual …


Organizational Information Security: Strategies To Minimize Workplace Cyberloafing For Increased Productivity, Hawazin Al Abbasi Jan 2018

Organizational Information Security: Strategies To Minimize Workplace Cyberloafing For Increased Productivity, Hawazin Al Abbasi

Walden Dissertations and Doctoral Studies

Productivity loss occurs in organizations that experience high levels of personal Internet use by employees on company time, which includes employees using smartphones to surf without needing the firm's Internet connection. The purpose of this qualitative phenomenological study was to explore reliable ways for organizational leaders to monitor or limit their employees' use of smartphone technology for personal use (cyberloafing) while on the job to minimize wasted work time. Social cognitive theory, which includes an emphasis on human behavioral changes based upon the environment, people, and behavior, served as the conceptual framework. The general research question was as follows: How …


Equity Trading Evaluation Strategies In Switzerland After The European Mifid Ii, Linn Kristina Karstadt Jan 2018

Equity Trading Evaluation Strategies In Switzerland After The European Mifid Ii, Linn Kristina Karstadt

Walden Dissertations and Doctoral Studies

Swiss bank traders are affected by technological and regulatory challenges, which may affect their broker voting process and may result in a change of trading and evaluation behavior in 2018. Compounded challenges exist when broker evaluation strategies are not effective or Markets in Financial Instruments Directive (MiFID) II compliant. This qualitative, single case study, built on efficient capital market hypothesis and innovative disruption theory, was focused on effective broker evaluation strategies after MiFID II in Switzerland. The sample consisted of 4 buy-side traders, who shared their unique perspectives. Methodological triangulation was achieved through semistructured interviews, a review of the institution's …


Estimating The Optimal Cutoff Point For Logistic Regression, Zheng Zhang Jan 2018

Estimating The Optimal Cutoff Point For Logistic Regression, Zheng Zhang

Open Access Theses & Dissertations

Binary classification is one of the main themes of supervised learning. This research is concerned about determining the optimal cutoff point for the continuous-scaled outcomes (e.g., predicted probabilities) resulting from a classifier such as logistic regression. We make note of the fact that the cutoff point obtained from various methods is a statistic, which can be unstable with substantial variation. Nevertheless, due partly to complexity involved in estimating the cutpoint, there has been no formal study on the variance or standard error of the estimated cutoff point.

In this Thesis, a bootstrap aggregation method is put forward to estimate the …


Patient Satisfaction Management In Office Visits And Telehealth In Health Care Technology, Todd Price Jan 2018

Patient Satisfaction Management In Office Visits And Telehealth In Health Care Technology, Todd Price

Walden Dissertations and Doctoral Studies

Telehealth and remote medical treatments have begun to be more commonly used in healthcare systems. Researchers have theorized that providers' abilities to treat patients are not directly tied to the proximity of the patient to the doctor, but by the identification and treatment of the patient's symptoms. Although the treatment and cure rates are being established within individual health systems and professional medical associations, empirical research is lacking regarding patient satisfaction with this remote treatment situation. The purpose of this quantitative study was to address this gap by examining satisfaction ratings of patients between virtual provider visits and face-to-face provider …


Strategies For Healthcare Payer Information Technology Integration After Mergers And Acquisitions, Kishore Maranganti Jan 2018

Strategies For Healthcare Payer Information Technology Integration After Mergers And Acquisitions, Kishore Maranganti

Walden Dissertations and Doctoral Studies

Despite the high rate of failure in merger and acquisition (M&A) transactions, many organizations continue to rely on M&As as their primary growth strategy and to address market competition. The purpose of this qualitative single case study was to explore strategies managers from a large healthcare payer in the midwestern United States used to achieve operational and strategic synergies during the postacquisition information technology (IT) integration phase. Haspeslagh and Jemison's acquisition integration approaches model was the conceptual framework for the study. Methodological triangulation was established by analyzing the data from the semistructured interviews of 6 senior executives and 6 IT …


Analytic Extensions To The Data Model For Management Analytics And Decision Support In The Big Data Environment, Nsikak Etim Akpakpan Jan 2018

Analytic Extensions To The Data Model For Management Analytics And Decision Support In The Big Data Environment, Nsikak Etim Akpakpan

Walden Dissertations and Doctoral Studies

From 2006 to 2016, an estimated average of 50% of big data analytics and decision support projects failed to deliver acceptable and actionable outputs to business users. The resulting management inefficiency came with high cost, and wasted investments estimated at $2.7 trillion in 2016 for companies in the United States. The purpose of this quantitative descriptive study was to examine the data model of a typical data analytics project in a big data environment for opportunities to improve the information created for management problem-solving. The research questions focused on finding artifacts within enterprise data to model key business scenarios for …


Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii Jan 2018

Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii

Walden Dissertations and Doctoral Studies

The Federal Bureau of Investigation reported that cyber actors will likely increase cyber intrusions against healthcare systems and their concomitant medical devices because of the mandatory transition from paper to electronic health records, lax cyber security standards, and a higher financial payout for medical records in the deep web. The problem addressed in this quantitative correlational study was uncertainty surrounding the benefits of palm vein authentication adoption relative to the growing crime of medical identity theft. The purpose of this quantitative correlational study was to understand healthcare managers' and doctors' perceptions of the effectiveness of palm vein authentication technology. The …


Reducing Internal Theft And Loss In Small Businesses, Eric L. Luster Jan 2018

Reducing Internal Theft And Loss In Small Businesses, Eric L. Luster

Walden Dissertations and Doctoral Studies

Every year, several documented data breaches happen in the United States, resulting in the exposure of millions of electronic records. The purpose of this single-case study was to explore strategies some information technology managers used to monitor employees and reduce internal theft and loss. The population for this study consisted of 5 information technology managers who work within the field of technology in the southwestern region of the United States. Participants were selected using purposeful sampling. The conceptual framework for this study included elements from information and communication boundary theories. Data were collected from semistructured interviews, company standard operating procedures, …


Strategies Certified Project Management Professionals Use To Prevent Counterproductive Behavior, Lisa Annika Christin Hansson-Vazquez Jan 2018

Strategies Certified Project Management Professionals Use To Prevent Counterproductive Behavior, Lisa Annika Christin Hansson-Vazquez

Walden Dissertations and Doctoral Studies

Project managers who fail to apply strategies to prevent counterproductive work behavior in information technology projects could negatively affect users, budget costs, timelines, or projects. The purpose of this multiple case study was to explore strategies that project managers used to prevent counterproductive work behavior that put project success at risk. Social learning theory was the conceptual framework for this study. Data were collected through document review of published Project Management Institute (PMI) material as well as semistructured interviews with 10 project managers who were members of a PMI chapter in the southeastern United States, and who held a project …


Leadership Skills To Sustain High-Tech Entrepreneurial Ventures, Zoaib Z. Rangwala Jan 2018

Leadership Skills To Sustain High-Tech Entrepreneurial Ventures, Zoaib Z. Rangwala

Walden Dissertations and Doctoral Studies

High-tech (HT) innovation-oriented entrepreneurs start 35% more ventures and create 10% more jobs in the first 5 years of operation than the rest of the private sector and drive significant economic growth across all industries; however, more than 50% of the entrepreneurial HT ventures fail during the first 5 years of operations. Guided by the conceptual framework of transformational leadership theory, the purpose of this multicase study was to explore skills used by successful entrepreneurial leaders to sustain their HT ventures in Silicon Valley, California. Data collection was from 8 participants in semistructured 1-on-1 interviews and 3 participants in a …


Educational Manager Perceptions Towards Integrated Management Information System Implementation In Yemen, Mahfood Hussain Alkaabi Jan 2018

Educational Manager Perceptions Towards Integrated Management Information System Implementation In Yemen, Mahfood Hussain Alkaabi

Walden Dissertations and Doctoral Studies

The government of Yemen has been developing government offered services designed to improve the quality of education management. Yemen's managers of education and managers of higher education in the Ministry of Education (MOE) and the Ministry of Higher Education (MOHE) have sought to improve quality of education, reduce costs, and provide timely information for decision-making processes by implementing an integrated management information system (IMIS). The problem was the lack of understanding the barriers that hinder successful IMIS implementation by the MOE and MOHE, and the role that lack of collaboration has played in prior unsuccessful attempts. The purpose of this …


Effective Strategies For Managing The Outsourcing Of Information Technology, Marsha N. Hopwood Jan 2018

Effective Strategies For Managing The Outsourcing Of Information Technology, Marsha N. Hopwood

Walden Dissertations and Doctoral Studies

More than half of information technology (IT) outsourced projects fail, primarily due to a lack of effective management practices surrounding the outsourcing end-to-end process. Ineffective management of the IT outsourcing (ITO) process affects organizations in the form of higher than expected project costs, including greater vendor switching or reintegration costs, poor quality, and loss of profits. These effects indicate that some business leaders lack the strategies to effectively manage the ITO process. The purpose of this single-case study was to apply the transaction cost economics (TCE) theory to explore strategies 5 business professionals use to manage an ITO project in …


Strategies For Achieving Profitability In The Music Streaming Service Business Model, James Bennett Jan 2018

Strategies For Achieving Profitability In The Music Streaming Service Business Model, James Bennett

Walden Dissertations and Doctoral Studies

Although the rapid growth of the music streaming industry has led to record levels of global music consumption, many leaders in the music streaming industry have not developed a financially sustainable business model for music streaming. This descriptive single case study focused on strategies that some global music streaming service leaders used to generate sustainable profits through their business models. Christensen's theory of disruptive innovation served as the conceptual framework for this study. Semistructured interviews with the chief executive officer and 4 senior managers of a leading music streaming service in southeastern Asia were analyzed to identify themes. Secondary data …


Risk Management Strategies To Prevent And Mitigate Emerging Operational Security Threats, Nancy Page Larrimore Jan 2018

Risk Management Strategies To Prevent And Mitigate Emerging Operational Security Threats, Nancy Page Larrimore

Walden Dissertations and Doctoral Studies

Dependence on technology brings security compromises that have become a global threat that costs businesses millions of dollars. More than 7.6 million South Carolinians incurred effects from the 162 security breaches reported in 2011-2015. The purpose of this multiple case study was to explore the risk management strategies small business leaders use to prevent and mitigate operational security threats that produce financial losses. The population for this study consisted of 6 business leaders in South Carolina who have demonstrated successful experience in preventing and mitigating operational security threats. Transformational leadership theory provided the conceptual framework for exploring the overreaching research …


Initiating Factors Affecting Information Systems Project Success, Jonathan Olubunmi Afolabi Jan 2018

Initiating Factors Affecting Information Systems Project Success, Jonathan Olubunmi Afolabi

Walden Dissertations and Doctoral Studies

Information systems (IS) projects are complex and costly, but only a 3rd of IS projects are successful; the Standish Group reported that 32% of IS projects were successful in 2012. Although investments in research have led to improvements in practice, there is a general perception that management failures are responsible for the low rate of IS project success. The effects of initiating factors on project outcome had not been sufficiently explored; few IS researchers have explored the initiation phase. The purpose of this grounded theory study was to explore project initiation factors, including relational, as well as decision-making aspects, and …


Exploring Management Practices Of The Health Care System For Contractors, Gary L. Williams Jan 2018

Exploring Management Practices Of The Health Care System For Contractors, Gary L. Williams

Walden Dissertations and Doctoral Studies

Researchers have found that military members serving in war experienced changes in physical and mental health. Military members' healthcare is managed by the Department of Defense. The problem was that management practices of the system for providing long-term healthcare for employees of a contracting company working in foreign combat zones is either minimal or nonexistent. The purpose of this case study was to explore ways that contractor managers and government managers can work together to provide healthcare for those contract employees who will be deployed with the U.S. military. The primary research question was to determine what managers of contractors …


Effect Of Early Exposure To Technology On Student Satisfaction With Online Education, Mohamed Boudalia Jan 2018

Effect Of Early Exposure To Technology On Student Satisfaction With Online Education, Mohamed Boudalia

Walden Dissertations and Doctoral Studies

U.S. student enrollment in online classes in the higher education sector has grown rapidly since 2001. Researchers have found that student satisfaction often leads to higher student retention, yet more research was needed to understand reasons for student satisfaction with online education. The purpose of this nonexperimental study was to examine the relationship between students' early exposure to technology (i.e., before college) and their satisfaction with online education in college. The unified theory of acceptance and use of technology were the theoretical framework. A convenience sample of 103 participants from the population of online students at colleges and universities in …


Strategies For Applying Electronic Health Records To Achieve Cost Saving Benefits, Daniel Kanyi Ngunyu Jan 2018

Strategies For Applying Electronic Health Records To Achieve Cost Saving Benefits, Daniel Kanyi Ngunyu

Walden Dissertations and Doctoral Studies

The American Recovery and Reinvestment Act (ARRA) of 2009 authorized the distribution of about $30 billion incentive funds to accelerate electronic health record (EHR) applications to improve the quality of care, safety, privacy, care coordination, and patients' involvement in healthcare. EHR use has the potential of saving $731 in costs for hospitals per patient admission; however, most hospitals are not applying EHR to reach the level at which cost savings are possible. The purpose of this single case study was to explore strategies that IT leaders in hospitals can use to apply EHR to achieve the cost saving benefits. The …


A Study Of Groupthink In Project Teams, John Reaves Jan 2018

A Study Of Groupthink In Project Teams, John Reaves

Walden Dissertations and Doctoral Studies

Project teams advance a common goal by working together on projects that require a diverse set of skills and are difficult for 1 person to complete. In this study, there was an exploration of the antecedents to groupthink in project teams from the perspectives of project managers. Many companies use project managers to complete critical objectives; avoiding groupthink is crucial to their success. The purpose of this research was to understand why project teams are susceptible to groupthink and what precautions managers can take to avoid it. The conceptual framework utilized in this study was Janis' concept of groupthink, which …


Effective Strategies For Managing Continuous Consultant Turnover In It Project Teams, Nicholas K. Jury Jan 2018

Effective Strategies For Managing Continuous Consultant Turnover In It Project Teams, Nicholas K. Jury

Walden Dissertations and Doctoral Studies

Information Technology project managers have found that collective turnover of consultants lowers code quality, increases knowledge loss and negatively impacts team performance. Within the last decade, companies have begun to see that offshore consultants have a turnover rate greater than 26%, more than double the rates for the rest of the IT consulting industry. Collective turnover also puts additional pressure on the project team, causing work exhaustion and thus additional turnover. The purpose of this single case study was to explore strategies that 6 successful project managers utilized to limit and reduce the impact of collective turnover of their hybrid …