Open Access. Powered by Scholars. Published by Universities.®
Databases and Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Business (2)
- Social and Behavioral Sciences (2)
- Applied Mathematics (1)
- Civic and Community Engagement (1)
- Cognition and Perception (1)
-
- Control Theory (1)
- Criminology (1)
- Defense and Security Studies (1)
- Engineering (1)
- Human Resources Management (1)
- Information Security (1)
- Infrastructure (1)
- International Relations (1)
- Library and Information Science (1)
- Medicine and Health Sciences (1)
- Numerical Analysis and Scientific Computing (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Peace and Conflict Studies (1)
- Political Science (1)
- Psychology (1)
- Public Administration (1)
- Public Affairs, Public Policy and Public Administration (1)
- Risk Analysis (1)
- Science and Technology Policy (1)
- Social Statistics (1)
- Sociology (1)
- Strategic Management Policy (1)
- Institution
- Keyword
-
- Data Mining (2)
- Text Mining (2)
- Analytical Hierarchy Process (1)
- Clustering (1)
- Corpus Exploration (1)
-
- Cyberterrorism (1)
- Data Visualization (1)
- Dynamic sequential data extraction and integration (1)
- Health-related lifestyle behavior (1)
- Information Systems Security (1)
- Location-based information disclosure (1)
- Meta-anlaysis (1)
- NoSQL (1)
- Online Trust (1)
- Online social networks (1)
- Policy Decision Making (1)
- Public Value Forum (1)
- Relational Databases (1)
- Reproducibility (1)
- Social Network (1)
- Social influence (1)
- Term Correlation (1)
- Topic Modeling (1)
- Value-Focused Thinking (1)
Articles 1 - 6 of 6
Full-Text Articles in Databases and Information Systems
A Methodology For Evaluating Relational And Nosql Databases For Small-Scale Storage And Retrieval, Ryan D. Engle
A Methodology For Evaluating Relational And Nosql Databases For Small-Scale Storage And Retrieval, Ryan D. Engle
Theses and Dissertations
Modern systems record large quantities of electronic data capturing time-ordered events, system state information, and behavior. Subsequent analysis enables historic and current system status reporting, supports fault investigations, and may provide insight for emerging system trends. Unfortunately, the management of log data requires ever more efficient and complex storage tools to access, manipulate, and retrieve these records. Truly effective solutions also require a well-planned architecture supporting the needs of multiple stakeholders. Historically, database requirements were well-served by relational data models, however modern, non-relational databases, i.e. NoSQL, solutions, initially intended for “big data” distributed system may also provide value for smaller-scale …
Online Social Networks’ Investigations Of Individuals’ Healthy And Unhealthy Lifestyle Behaviors And Social Factors Influencing Them —Three Essays, Mahyar Sharif Vaghefi
Online Social Networks’ Investigations Of Individuals’ Healthy And Unhealthy Lifestyle Behaviors And Social Factors Influencing Them —Three Essays, Mahyar Sharif Vaghefi
Theses and Dissertations
More than half of U.S. adults suffer from one or more chronic diseases, which account for 86% of total U.S. healthcare costs. Major contributors to chronic diseases are unhealthy lifestyle behaviors, which include lack of physical activity, poor nutrition, tobacco use, and drinking too much alcohol. A reduction in the prevalence of health-risk behaviors could improve individuals’ longevity and quality of life and may halt the exponential growth of healthcare costs. Prior studies in the field have acknowledged that a comprehensive understanding of health behaviors requires the examination of individual’ behaviors in supra-dyadic social networks. In recent years, the growth …
Three Essays On Trust Mining In Online Social Networks, Gelareh Towhidi
Three Essays On Trust Mining In Online Social Networks, Gelareh Towhidi
Theses and Dissertations
This dissertation research consists of three essays on studying trust in online social networks. Trust plays a critical role in online social relationships, because of the high levels of risk and uncertainty involved. Guided by relevant social science and computational graph theories, I develop conceptual and predictive models to gain insights into trusting behaviors in online social relationships.
In the first essay, I propose a conceptual model of trust formation in online social networks. This is the first study that integrates the existing graph-based view of trust formation in social networks with socio-psychological theories of trust to provide a richer …
Quantitative Phenotype Analysis To Identify, Validate And Compare Rat Disease Models, Yiqing Zhao
Quantitative Phenotype Analysis To Identify, Validate And Compare Rat Disease Models, Yiqing Zhao
Theses and Dissertations
Introduction
The laboratory rat has been widely used as an animal model in biomedical research. There are many strains exhibiting a wide variety of phenotypes. Capturing these phenotypes in a centralized database provides researchers with an easy method for choosing the appropriate strains for their studies. Current resources such as NBRP and PhysGen provided some preliminary work in rat phenotype databases. However, there are drawbacks in both projects: (1) small number of animals (6 rats) used by NBRP; (2) NBRP project is a one-time effort for each strain; (3) PhysGen web interface only enables queries within a single study – …
The Application Of Text Mining And Data Visualization Techniques To Textual Corpus Exploration, Jeffrey R. Smith Jr.
The Application Of Text Mining And Data Visualization Techniques To Textual Corpus Exploration, Jeffrey R. Smith Jr.
Theses and Dissertations
Unstructured data in the digital universe is growing rapidly and shows no evidence of slowing anytime soon. With the acceleration of growth in digital data being generated and stored on the World Wide Web, the prospect of information overload is much more prevalent now than it has been in the past. As a preemptive analytic measure, organizations across many industries have begun implementing text mining techniques to analyze such large sources of unstructured data. Utilizing various text mining techniques such as n -gram analysis, document and term frequency analysis, correlation analysis, and topic modeling methodologies, this research seeks to develop …
Developing A Cyberterrorism Policy: Incorporating Individual Values, Osama Bassam J. Rabie
Developing A Cyberterrorism Policy: Incorporating Individual Values, Osama Bassam J. Rabie
Theses and Dissertations
Preventing cyberterrorism is becoming a necessity for individuals, organizations, and governments. However, current policies focus on technical and managerial aspects without asking for experts and non-experts values and preferences for preventing cyberterrorism. This study employs value focused thinking and public value forum to bare strategic measures and alternatives for complex policy decisions for preventing cyberterrorism. The strategic measures and alternatives are per socio-technical process.