Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Databases and Information Systems

Making Sense Of Online Public Health Debates With Visual Analytics Systems, Anton Ninkov Nov 2020

Making Sense Of Online Public Health Debates With Visual Analytics Systems, Anton Ninkov

Electronic Thesis and Dissertation Repository

Online debates occur frequently and on a wide variety of topics. Particularly, online debates about various public health topics (e.g., vaccines, statins, cannabis, dieting plans) are prevalent in today’s society. These debates are important because of the real-world implications they can have on public health. Therefore, it is important for public health stakeholders (i.e., those with a vested interest in public health) and the general public to have the ability to make sense of these debates quickly and effectively. This dissertation investigates ways of enabling sense-making of these debates with the use of visual analytics systems (VASes). VASes are computational …


Digital Identity: A Human-Centered Risk Awareness Study, Toufic N. Chebib Nov 2020

Digital Identity: A Human-Centered Risk Awareness Study, Toufic N. Chebib

USF Tampa Graduate Theses and Dissertations

Cybersecurity threats and compromises have been at the epicenter of media attention; their risk and effect on people’s digital identity is something not to be taken lightly. Though cyber threats have affected a great number of people in all age groups, this study focuses on 55 to 75-year-olds, as this age group is close to retirement or already retired. Therefore, a notable compromise impacting their digital identity can have a major impact on their life.

To help guide this study, the following research question was formulated, “What are the risk perceptions of individuals, between the ages of 55 and 75 …


Assessing Topical Homogeneity With Word Embedding And Distance Matrices, Jeffrey M. Stanton, Yisi Sang Oct 2020

Assessing Topical Homogeneity With Word Embedding And Distance Matrices, Jeffrey M. Stanton, Yisi Sang

School of Information Studies - Faculty Scholarship

Researchers from many fields have used statistical tools to make sense of large bodies of text. Many tools support quantitative analysis of documents within a corpus, but relatively few studies have examined statistical characteristics of whole corpora. Statistical summaries of whole corpora and comparisons between corpora have potential application in the analysis of topically organized applications such social media platforms. In this study, we created matrix representations of several corpora and examined several statistical tests to make comparisons between pairs of corpora with respect to the topical homogeneity of documents within each corpus. Results of three experiments suggested that a …


Information Literacy Skills And The Use Of E-Library Resources Among Undergraduates In South-West Nigeria, Paul Adeoye Omosebi, Fehintoluwa E. Omosebi . Oct 2020

Information Literacy Skills And The Use Of E-Library Resources Among Undergraduates In South-West Nigeria, Paul Adeoye Omosebi, Fehintoluwa E. Omosebi .

Library Philosophy and Practice (e-journal)

This study is a correlational survey study which investigates information literacy skills and the use of E-library resources among business administration undergraduates in south-west Nigeria. A sample size of 900 respondents was used but 800 questionnaires were retrieved. The target population for the study comprised of undergraduate business administration students in private universities in Southwest Nigeria. A simple random sampling technique was adopted for the purpose of this study. The questionnaire was the main instrument used for data collection and was divided into three sections namely demographic characteristics, information literacy and use of e-library among students in the private universities …


Bootstrapping Web Archive Collections From Micro-Collections In Social Media, Alexander C. Nwala Aug 2020

Bootstrapping Web Archive Collections From Micro-Collections In Social Media, Alexander C. Nwala

Computer Science Theses & Dissertations

In a Web plagued by disappearing resources, Web archive collections provide a valuable means of preserving Web resources important to the study of past events. These archived collections start with seed URIs (Uniform Resource Identifiers) hand-selected by curators. Curators produce high quality seeds by removing non-relevant URIs and adding URIs from credible and authoritative sources, but this ability comes at a cost: it is time consuming to collect these seeds. The result of this is a shortage of curators, a lack of Web archive collections for various important news events, and a need for an automatic system for generating seeds. …


Building A Library Search Infrastructure With Elasticsearch, Kim Pham, Fernando Reyes, Jeff Rynhart May 2020

Building A Library Search Infrastructure With Elasticsearch, Kim Pham, Fernando Reyes, Jeff Rynhart

University Libraries: Faculty Scholarship

This article discusses our implementation of an Elastic cluster to address our search, search administration and indexing needs, how it integrates in our technology infrastructure, and finally takes a close look at the way that we built a reusable, dynamic search engine that powers our digital repository search. We cover the lessons learned with our early implementations and how to address them to lay the groundwork for a scalable, networked search environment that can also be applied to alternative search engines such as Solr.


The Ensemble Mesh-Term Query Expansion Models Using Multiple Lda Topic Models And Ann Classifiers In Health Information Retrieval, Sukjin You May 2020

The Ensemble Mesh-Term Query Expansion Models Using Multiple Lda Topic Models And Ann Classifiers In Health Information Retrieval, Sukjin You

Theses and Dissertations

Information retrieval in the health field has several challenges. Health information terminology is difficult for consumers (laypeople) to understand. Formulating a query with professional terms is not easy for consumers because health-related terms are more familiar to health professionals. If health terms related to a query are automatically added, it would help consumers to find relevant information. The proposed query expansion (QE) models show how to expand a query using MeSH (Medical Subject Headings) terms. The documents were represented by MeSH terms (i.e. Bag-of-MeSH), which were included in the full-text articles. And then the MeSH terms were used to generate …


Need For Adoption Of Koha Integrated Library Management Software In Nigerian Academic Libraries, Isaac Echezonam Anyira Apr 2020

Need For Adoption Of Koha Integrated Library Management Software In Nigerian Academic Libraries, Isaac Echezonam Anyira

Library Philosophy and Practice (e-journal)

The main objective of this paper is to justify the need for Nigerian libraries which have not automated their functions to adopt of Koha ILMS as their automation software. The paper therefore examined the need for automation, the reasons for the choice of Koha ILMS and potential benefits accruable to the libraries, and functions that Koha can facilitate their perform in their libraries. The paper identified the need for automation to include need to handle information explosion, for effective management of library operations, to improve operation speed, resource sharing etc; the choice of Koha was informed by its features and …


Scraping Bepress: Downloading Dissertations For Preservation, Stephen Zweibel Feb 2020

Scraping Bepress: Downloading Dissertations For Preservation, Stephen Zweibel

Copyright, Fair Use, Scholarly Communication, etc.

This article will describe our process developing a script to automate downloading of documents and secondary materials from our library’s BePress repository. Our objective was to collect the full archive of dissertations and associated files from our repository into a local disk for potential future applications and to build out a preservation system.

Unlike at some institutions, our students submit directly into BePress, so we did not have a separate repository of the files; and the backup of BePress content that we had access to was not in an ideal format (for example, it included “withdrawn” items and did not …


Exploring Strategies For Recruiting And Retaining Diverse Cybersecurity Professionals, Vivian Lyon Jan 2020

Exploring Strategies For Recruiting And Retaining Diverse Cybersecurity Professionals, Vivian Lyon

Walden Dissertations and Doctoral Studies

The cyber threat landscape has led some cybersecurity leaders to focus on a holistic approach encompassing people, processes, and technology to make their government agencies and organizations more responsive to a more diverse and inclusive cyber workforce to protect critical infrastructure from hackers or cybercriminals intent on causing harm. This qualitative multiple case study used Schein’s organizational culture theory to explore strategies used by cybersecurity leaders to attract, recruit, and retain diverse cybersecurity professionals to effectively and efficiently protect sensitive systems from rising cyber threats. The study's population consisted of cybersecurity leaders from 3 government agencies and 9 organizations in …


Information Technology Infrastructure Library: Postimplementation Experiences Of Small Business It Support Employees., Imoovberame Darren Obazu Jan 2020

Information Technology Infrastructure Library: Postimplementation Experiences Of Small Business It Support Employees., Imoovberame Darren Obazu

Walden Dissertations and Doctoral Studies

Information technology (IT) employees of small business organizations have been the driving force for the implementation of innovative standardized IT service management and process improvement initiatives. Competitiveness amongst small business IT organizations in the market for quality IT service delivery led small business IT leaders toward the implementation of an information technology infrastructure library (ITIL) as an IT service management framework. The problem addressed in this research encompassed the needs of small business IT leaders and ITIL designers to understand the perceptions of IT operation employees following ITIL implementation. The purpose of this qualitative multiple case study was to explore …


Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove Jan 2020

Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove

Walden Dissertations and Doctoral Studies

Cybercriminal activity performed widely through social engineering attacks is estimated to be one of the substantial challenges the world will face over the next 20 years. Cybercriminal activity is important to chief information security officers (CISOs) because these attacks represent the largest transfer of economic wealth in history and pose risks to the incentives for organizational innovation and investment and eventually become more profitable than the global trade of all major illegal drugs combined. Grounded in the balanced control theory, the purpose of this multiple case study was to explore strategies CISOs use to mitigate social engineering attacks within their …


Ethics Of Collection And Use Of Consumer Information On The Internet, Thanh M. Pham Jan 2020

Ethics Of Collection And Use Of Consumer Information On The Internet, Thanh M. Pham

Walden Dissertations and Doctoral Studies

Consumer online activities can generate massive volumes of data that private companies may collect and use for business purposes. Consumer personal data need to be protected from unauthorized access and misuse. The specific problem is that consumers have little control regarding their data being collected and used by private companies. The purpose of this qualitative archival research was to explore business practices involving collection and use of consumer data without an individual’s consent. This study used the big data ethical conceptual framework to focus on various privacy issues, including those related to ownership, transparency, ethics, and consumer privacy laws. Archival …


Relationship Between Specific Security Concerns And Cio Intention To Adopt Cloud, Johnathan Francis Van Houten Jan 2020

Relationship Between Specific Security Concerns And Cio Intention To Adopt Cloud, Johnathan Francis Van Houten

Walden Dissertations and Doctoral Studies

Cloud computing adoption rates have not grown commensurate with several well-known and substantially tangible benefits such as horizontal distribution and reduced cost, the latter both in terms of infrastructure and specialized personnel. The lack of adoption presents a challenge to both service providers from a sales perspective and service consumers from a usability focus. The purpose of this quantitative correlational study utilizing the technological, organizational, and environmental framework was to examine the relationship between shared technology (ST), malicious insiders (MI), account hijacking, data leakage, data protection, service partner trust (SP), regulatory concerns and the key decision-makers intention to adopt cloud …


Tailored Information Security Strategies For Financial Services Companies In Nigeria, Kayode Alawonde Jan 2020

Tailored Information Security Strategies For Financial Services Companies In Nigeria, Kayode Alawonde

Walden Dissertations and Doctoral Studies

Some financial institutions in Nigeria have not deployed strategies that mitigate cyber exploitation risks in the financial services industry. Financial institution leaders are concerned because cyber exploitation contributed to the reduction in the adult banking population to a low 38%. Grounded in the integrated systems theory of information security management, the purpose of this multiple case study was to explore strategies some financial institution leaders in Nigeria use to prevent cyber exploitations. The participants included 6 chief information security officers of 6 financial institutions. Data were collected from semistructured interviews and company and public documents. A thematic analysis identified themes …


Exploring Mid-Market Strategies For Big Data Governance, Kenneth Stanley Knapton Iii Jan 2020

Exploring Mid-Market Strategies For Big Data Governance, Kenneth Stanley Knapton Iii

Walden Dissertations and Doctoral Studies

Many data scientists are struggling to adopt effective data governance practices as they transition from traditional data analysis to big data analytics. Data governance of big data requires new strategies to deal with the volume, variety, and velocity attributes of big data. The purpose of this qualitative multiple case study was to explore big data governance strategies employed by data scientists to provide a holistic perspective of those data for making decisions. The participants were 10 data scientists employed in multiple mid-market companies in the greater Salt Lake City, Utah area who have strategies to govern big data. This study’s …


The Trust Principles For Digital Repositories, Dawei Lin, Jonathan Crabtree, Ingrid Dillo, Robert R. Downs, Rorie Edmunds, David Giaretta, Marisa De Giusti, Hervé L'Hours, Wim Hugo, Reyna Jenkyns, Varsha Khodiyar, Maryann E. Martone, Mustapha Mokrane, Vivek Navale, Jonathan Petters, Barbara Sierman, Dina V. Sokolova, Martina Stockhause, John Westbrook Jan 2020

The Trust Principles For Digital Repositories, Dawei Lin, Jonathan Crabtree, Ingrid Dillo, Robert R. Downs, Rorie Edmunds, David Giaretta, Marisa De Giusti, Hervé L'Hours, Wim Hugo, Reyna Jenkyns, Varsha Khodiyar, Maryann E. Martone, Mustapha Mokrane, Vivek Navale, Jonathan Petters, Barbara Sierman, Dina V. Sokolova, Martina Stockhause, John Westbrook

Copyright, Fair Use, Scholarly Communication, etc.

As information and communication technology has become pervasive in our society, we are increasingly dependent on both digital data and repositories that provide access to and enable the use of such resources. Repositories must earn the trust of the communities they intend to serve and demonstrate that they are reliable and capable of appropriately managing the data they hold.

Following a year-long public discussion and building on existing community consensus , several stakeholders, representing various segments of the digital repository community, have collaboratively developed and endorsed a set of guiding principles to demonstrate digital repository trustworthiness. Transparency, Responsibility, User focus, …


Opening Books And The National Corpus Of Graduate Research, William A. Ingram, Edward A. Fox, Jian Wu Jan 2020

Opening Books And The National Corpus Of Graduate Research, William A. Ingram, Edward A. Fox, Jian Wu

Computer Science Faculty Publications

Virginia Tech University Libraries, in collaboration with Virginia Tech Department of Computer Science and Old Dominion University Department of Computer Science, request $505,214 in grant funding for a 3-year project, the goal of which is to bring computational access to book-length documents, demonstrating that with Electronic Theses and Dissertations (ETDs). The project is motivated by the following library and community needs. (1) Despite huge volumes of book-length documents in digital libraries, there is a lack of models offering effective and efficient computational access to these long documents. (2) Nationwide open access services for ETDs generally function at the metadata level. …