Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

2021

Discipline
Institution
Keyword
Publication
Publication Type

Articles 391 - 420 of 438

Full-Text Articles in Databases and Information Systems

Strategies For Implementing Internet Of Things Devices In Manufacturing Environments, Todd Efrain Hernandez Jan 2021

Strategies For Implementing Internet Of Things Devices In Manufacturing Environments, Todd Efrain Hernandez

Walden Dissertations and Doctoral Studies

The Internet of Things (IoT) has been exploited as a threat vector for cyberattacks in manufacturing environments. Manufacturing industry leaders are concerned with cyberattacks because of the associated costs of damages and lost production for their organizations. Grounded in the general systems theory, the purpose of this multiple case study was to explore strategies electrical controls engineers use to implement secure IoT devices in manufacturing environments. The study participants were eight electrical controls engineers working in three separate manufacturing facilities located in the Midwest region of the United States. The data were collected by semistructured interviews and 15 organizational documents. …


Impact Of Information Breaches On Health Care Records, Anton Antony Arockiasamy Jan 2021

Impact Of Information Breaches On Health Care Records, Anton Antony Arockiasamy

Walden Dissertations and Doctoral Studies

Although there were almost 3.5 million reported information breaches of health care data in the first quarter of 2019, health care providers do not know the extent of digital and nondigital breaches of patient medical records. The purpose of this quantitative, comparative study was to identify the difference between the individual patient records affected by digital versus nondigital breaches for three types of health care entities in the United States, health care providers, health care plans, and health care clearinghouses. Allman’s privacy regulation theory, the National Institute of Standards and Technology Privacy Framework, and ecological systems theory comprised the theoretical …


Characteristics Of Authentic Entrepreneurial Leadership Within Information Technology Startups In Kenya, Christine Mukhwana Jan 2021

Characteristics Of Authentic Entrepreneurial Leadership Within Information Technology Startups In Kenya, Christine Mukhwana

Walden Dissertations and Doctoral Studies

In Kenya, over 60% of nascent entrepreneurs start businesses with minimal leadership experience, engendering founder-CEOs who cannot sustain a business beyond its formative years. The problem is the nascent entrepreneurs’ lack of understanding of effective leadership. The purpose of this qualitative, phenomenological study was to develop a more nuanced understanding of authentic leadership behavior from the perspective of nascent entrepreneurs. Authentic leadership theory and the three-factor model were used to conceptualize the study. The research question focused on nascent entrepreneurs’ lived experiences and understanding of authentic leadership. The participants in the study were entrepreneurs from the information technology industry in …


Mobile Network Infrastructure Security In Developing Countries – A Kenya Case Study, James M. Omanwa Jan 2021

Mobile Network Infrastructure Security In Developing Countries – A Kenya Case Study, James M. Omanwa

Walden Dissertations and Doctoral Studies

The usage of mobile network infrastructure to access internet resources for organizations is getting higher year by year in sub-Saharan Africa. However, there was an increase in malicious attacks on mobile networks and devices accessing mobile network infrastructure, targeting organizations’ private information. Grounded in Bandura’s social cognitive theory, the purpose of this multiple case study was to explore strategies security managers used to secure mobile network infrastructures from cyberattacks. Participants comprised four security managers in Kenya in two major cities who successfully implemented strategies to mitigate cyberattacks on the mobile network infrastructures. Data were gathered from video conference, face-to-face, semi-structured …


The Introduction Of Big Data In Cloud Computing, Austin Gruenberg Jan 2021

The Introduction Of Big Data In Cloud Computing, Austin Gruenberg

Student Academic Conference

One of the fastest-growing technologies that many people are unaware of is the world of cloud computing. Having started in 2006, it is a relatively new technological advancement in the computer industry. The major branch of cloud computing that I decided to focus on was big data. I decided to research this topic to better understand what its current uses are, to see what the future holds for Big Data and cloud computing and because it is a growing, significant piece of technology being used in our society today. Big data and cloud computing are very important industries and have …


Successful Strategies For Adopting Open-Source Software, Balla Barro Jan 2021

Successful Strategies For Adopting Open-Source Software, Balla Barro

Walden Dissertations and Doctoral Studies

Middle-level information systems managers (ISMs) in small-scale organizations often have challenges in determining the most appropriate strategy for adopting open-source software (OSS) in their organizations. The ISMs need to determine the right strategy for adopting OSS to protect the organizations’ information technology infrastructure. Grounded in the diffusion of innovation theory, the objective of this multiple case study was to explore strategies middle-level ISMs used to adopt OSS in their small-scale organizations. Six middle-level ISMs from three small-scale organizations with experience of not less than six years in OSS adoption strategy in the city of Frederick, Maryland, shared their strategies during …


Reliable Data Collection: A Tool For Data Integrity In Nigeria, Stella Tonye Whyte Jan 2021

Reliable Data Collection: A Tool For Data Integrity In Nigeria, Stella Tonye Whyte

Walden Dissertations and Doctoral Studies

Unreliable and poor-quality data is a significant threat to governmental institutions because of its devastating impact on nations' social and economic well-being. Managers in government organizations require reliable data to inform economic planning and decision-making. Grounded in the theory of total quality management, the purpose of this qualitative multiple case study was to explore strategies information technology (IT) managers in sub-Saharan African countries use to ensure the reliability of data. The participants were 12 IT managers in three government establishments in Port Harcourt, Rivers State, Nigeria, responsible for ensuring the data reliability for economic planning and decision-making. The data collection …


Predictive Modeling Of Critical Temperatures In Superconducting Materials, Markus Hofmann, Natalia Sizochenko Jan 2021

Predictive Modeling Of Critical Temperatures In Superconducting Materials, Markus Hofmann, Natalia Sizochenko

Articles

n this study, we have investigated quantitative relationships between critical temperaturesof superconductive inorganic materials and the basic physicochemical attributes of these materials(also called quantitative structure-property relationships). We demonstrated that one of the mostrecent studies (titled "A data-driven statistical model for predicting the critical temperature of asuperconductor” and published in Computational Materials Science by K. Hamidieh in 2018) reportson models that were based on the dataset that contains 27% of duplicate entries. We aimed todeliver stable models for a properly cleaned dataset using the same modeling techniques (multiplelinear regression, MLR, and gradient boosting decision trees, XGBoost). The predictive ability ofour best …


Information Architecture For A Chemical Modeling Knowledge Graph, Adam R. Luxon Jan 2021

Information Architecture For A Chemical Modeling Knowledge Graph, Adam R. Luxon

Theses and Dissertations

Machine learning models for chemical property predictions are high dimension design challenges spanning multiple disciplines. Free and open-source software libraries have streamlined the model implementation process, but the design complexity remains. In order better navigate and understand the machine learning design space, model information needs to be organized and contextualized. In this work, instances of chemical property models and their associated parameters were stored in a Neo4j property graph database. Machine learning model instances were created with permutations of dataset, learning algorithm, molecular featurization, data scaling, data splitting, hyperparameters, and hyperparameter optimization techniques. The resulting graph contains over 83,000 nodes …


Chronic Customers Or Increased Awareness? The Dynamics Of Social Media Customer Service, Shujing Sun, Yang Gao, Huaxia Rui Jan 2021

Chronic Customers Or Increased Awareness? The Dynamics Of Social Media Customer Service, Shujing Sun, Yang Gao, Huaxia Rui

Research Collection School Of Computing and Information Systems

Despite that social media has become a promising alternative to traditional call centers, managers hesitate to fully harness its power because they worry that active service intervention may encourage excessive use of the channel by disgruntled customers. This paper sheds light on such a concern by examining the dynamics between brand-level customer complaints and service interventions on social media. Using details of customer-brand interactions of 40 airlines on Twitter, we find that more service interventions indeed cause more customer complaints, accounting for the online customer population and service quality. However, the increased complaints are primarily driven by the awareness enhancement …


Novel Techniques In Recovering, Embedding, And Enforcing Policies For Control-Flow Integrity, Yan Lin Jan 2021

Novel Techniques In Recovering, Embedding, And Enforcing Policies For Control-Flow Integrity, Yan Lin

Dissertations and Theses Collection (Open Access)

Control-Flow Integrity (CFI) is an attractive security property with which most injected and code-reuse attacks can be defeated, including advanced attacking techniques like Return-Oriented Programming (ROP). CFI extracts a control-flow graph (CFG) for a given program and instruments the program to respect the CFG. Specifically, checks are inserted before indirect branch instructions. Before these instructions are executed during runtime, the checks consult the CFG to ensure that the indirect branch is allowed to reach the intended target. Hence, any sort of controlflow hijacking would be prevented. There are three fundamental components in CFI enforcement. The first component is accurately recovering …


Proposed Data Governance Framework For Small And Medium Scale Enterprises (Smes), Rejoice Okoro Jan 2021

Proposed Data Governance Framework For Small And Medium Scale Enterprises (Smes), Rejoice Okoro

All Graduate Theses, Dissertations, and Other Capstone Projects

Data governance is not a one size fits all, instead, it should be an evolutionary process that can be started small and measurable along the way. This research aims at proposing a data governance framework by ensuring data management processes, data security and control are compliant with laws and policies. This article also presents the first results of a comparative analysis between three data privacy laws and outlines five components which together form a data governance framework for SMEs. The data governance model documents data quality roles and their type of interaction with data quality management activities exploring how data …


Accelerating Aggregation Efficiency: Using Postgres As A Cache With Mongodb, Mason Q. Porter-Brown Jan 2021

Accelerating Aggregation Efficiency: Using Postgres As A Cache With Mongodb, Mason Q. Porter-Brown

Senior Projects Fall 2021

For decades now relational databases, namely SQL, have been the industry standard. However, recently MongoDB and other NoSQL databases have been growing in popularity due to their flexibility and scalability. SQL still has the upper hand in a variety of areas, including data consistency, advanced and established analytics functions, and efficient “JOIN” functions. This project focuses on MongoDB’s shortcomings when it comes to replicating “JOIN” operations using MongoDB’s aggregate functions. “JOIN” operations refer to the action of comparing data from one or more collections of data and joining similar data together in order to analyze and draw statistics from the …


Introducing A Test Framework For Quality Of Service Mechanisms In The Context Of Software-Defined Networking, Josiah Eleazar T. Regencia, William Emmanuel S. Yu Jan 2021

Introducing A Test Framework For Quality Of Service Mechanisms In The Context Of Software-Defined Networking, Josiah Eleazar T. Regencia, William Emmanuel S. Yu

Department of Information Systems & Computer Science Faculty Publications

In traditional non-distributed networking architecture, supporting Quality of Service (QoS) has been challenging due to its centralized nature. Software-Defined Networking (SDN) provides dynamic, flexible and scalable control and management for networks. This study introduces a test framework for testing QoS mechanisms and network topologies inside an SDN environment. Class-Based Queueing QoS mechanisms are tested as an anchor to test the introduced framework. Using a previous study as a benchmark to test the introduced framework, results show that the test framework works accordingly and is capable of producing accurate results. Moreover, results in this study show that the distributed Leaf-enforced QoS …


Transactional Distances During Emergency Remote Teaching Experiences, Ma. Monica L. Moreno, Ma. Mercedes T. Rodrigo, Johanna Marion R. Torres, Timothy Jireh Gaspar, Jenilyn L. Agapito Jan 2021

Transactional Distances During Emergency Remote Teaching Experiences, Ma. Monica L. Moreno, Ma. Mercedes T. Rodrigo, Johanna Marion R. Torres, Timothy Jireh Gaspar, Jenilyn L. Agapito

Department of Information Systems & Computer Science Faculty Publications

The Transactional Distance Theory posits that successful remote learning occurs when teachers decrease psychological or transactional gaps. Narrowing the transactional distance can be achieved through a balance of appropriate course structure and dialogue, fostering healthy student autonomy in the process. This paper describes the Emergency Remote Teaching experiences of faculty and students of the Ateneo de Manila University in the Philippines. It examines these experiences in the context of the transactional distance framework. Findings show that a sudden shift to remote learning mandates greater student autonomy, which increases transactional distance. Because of this, efforts by faculty to increase student-teacher dialogue …


Comparison Of English Comprehension Among Students From Different Backgrounds Using A Narrative-Centered Digital Game, May Marie P. Talandron-Felipe, Kent Levi A. Bonifacio, Gladys S. Ayunar, Ma. Mercedes T. Rodrigo Jan 2021

Comparison Of English Comprehension Among Students From Different Backgrounds Using A Narrative-Centered Digital Game, May Marie P. Talandron-Felipe, Kent Levi A. Bonifacio, Gladys S. Ayunar, Ma. Mercedes T. Rodrigo

Department of Information Systems & Computer Science Faculty Publications

This paper reports the continuation of the field testing of a narrative-centered digital game for English comprehension called Learning Likha: Rangers to the Rescue (LLRR) with a two-fold goal: first, identify the differences in terms of usage, attitudes towards, and perceptions of the English language between students from southern Philippines and the National Capital Region, and second, to determine how the LLRR in-game performance, post-test comprehension scores, engagement, and motivation of students differ between the groups. The participants who are grade school students from a province in southern Philippines answered questionnaires about their attitude towards and perception of English, played …


Cura Personalis: Institutionalizing Compassion During Emergency Remote Teaching, Ma. Monica L. Moreno, Ma. Mercedes T. Rodrigo, Johanna Marion R. Torres, Timothy Jireh Gaspar, Jenilyn L. Agapito Jan 2021

Cura Personalis: Institutionalizing Compassion During Emergency Remote Teaching, Ma. Monica L. Moreno, Ma. Mercedes T. Rodrigo, Johanna Marion R. Torres, Timothy Jireh Gaspar, Jenilyn L. Agapito

Department of Information Systems & Computer Science Faculty Publications

Faced with the fears and anxieties brought on by the COVID-19 crisis, educational institutions had to devise new compassion-based teaching and learning policies and approaches that recognized and provided for the pandemic’s psychological and emotional toll. This paper describes how the Ateneo de Manila University in the Philippines enacted its core value of cura personalis, care for the entire person, in the context of emergency remote teaching. We describe the circumstances that prompted the greater emphasis on compassion and the adjustments to classroom management, course content, class interactions, and assessment. Finally we describe the tradeoffs or costs of this …


Xiphias: Using A Multidimensional Approach Towards Creating Meaningful Gamification-Based Badge Mechanics, Jonathan D.L Casano, Jenilyn L. Agapito, Nicole Ann F. Tolosa Jan 2021

Xiphias: Using A Multidimensional Approach Towards Creating Meaningful Gamification-Based Badge Mechanics, Jonathan D.L Casano, Jenilyn L. Agapito, Nicole Ann F. Tolosa

Department of Information Systems & Computer Science Faculty Publications

This paper shows the design and initial testing of three new Xiphias Badges --Presence; Mastery; and Antifragility – based on the merging of the salient features from James Clear’s Behavior Change model (2016); Johann Hari’s Lost Connections model (2018); and Jordan Peterson’s recent interpretation of the Big Five model of Personality Traits (2007). This multidimensional approach is an attempt to cater to the multidimensionality of a user and aims to be a more universal gamification approach that taps into internal motivations. The badge mechanics were tested on 69 undergraduate students using a Low-Fidelity Gamified Tracker. The results of a survey …


Activity Based Traffic Indicator System For Monitoring The Covid-19 Pandemic, Justin Junsay, Aaron Joaquin Lebumfacil, Ivan George Tarun, William Emmanuel S. Yu Jan 2021

Activity Based Traffic Indicator System For Monitoring The Covid-19 Pandemic, Justin Junsay, Aaron Joaquin Lebumfacil, Ivan George Tarun, William Emmanuel S. Yu

Department of Information Systems & Computer Science Faculty Publications

This study describes an activity based traffic indicator system to provide information for COVID-19 pandemic management. The activity based traffic indicator system does this by utilizing a social probability model based on the birthday paradox to determine the exposure risk, the probability of meeting someone infected (PoMSI). COVID-19 data, particularly the 7-day moving average of the daily growth rate of cases (7-DMA of DGR) and cumulative confirmed cases of next week covering a period from April to September 2020, were then used to test PoMSI using Pearson correlation to verify whether it can be used as a factor for the …


Single And Differential Morph Attack Detection, Baaria Chaudhary Jan 2021

Single And Differential Morph Attack Detection, Baaria Chaudhary

Graduate Theses, Dissertations, and Problem Reports

Face recognition systems operate on the assumption that a person's face serves as the unique link to their identity. In this thesis, we explore the problem of morph attacks, which have become a viable threat to face verification scenarios precisely because of their inherent ability to break this unique link. A morph attack occurs when two people who share similar facial features morph their faces together such that the resulting face image is recognized as either of two contributing individuals. Morphs inherit enough visual features from both individuals that both humans and automatic algorithms confuse them. The contributions of this …


Football’S Future: An Analytical Interpretation Of The Premier League, Hunter Witeof Jan 2021

Football’S Future: An Analytical Interpretation Of The Premier League, Hunter Witeof

Williams Honors College, Honors Research Projects

This project looks to take the statistics of soccer players and run them through an algorithm to determine how well a player is performing. The system that will be designed in the project will look to accomplish 3 main goals: allow the user to enter new statistics, store the data for all 38 game weeks for all 20 teams, and compute a score for each player’s performance for each game as well as the average of all of the player's scores.


A Blockchain-Enabled Model To Enhance Disaster Aids Network Resilience, Farinaz Sabz Ali Pour, Paul Niculescu-Mizil Gheorghe Jan 2021

A Blockchain-Enabled Model To Enhance Disaster Aids Network Resilience, Farinaz Sabz Ali Pour, Paul Niculescu-Mizil Gheorghe

Engineering Management & Systems Engineering Faculty Publications

The disaster area is a true dynamic environment. Lack of accurate information from the affected area create several challenges in distributing the supplies. The success of a disaster response network is based on collaboration, coordination, sovereignty, and equality in relief distribution. Therefore, a trust-based dynamic communication system is required to facilitate the interactions, enhance the knowledge for the relief operation, prioritize, and coordinate the goods distribution. One of the promising innovative technologies is blockchain technology which enables transparent, secure, and real-time information exchange and automation through smart contracts in a distributed technological ecosystem. This study aims to analyze the application …


Generic Design Methodology For Smart Manufacturing Systems From A Practical Perspective, Part I—Digital Triad Concept And Its Application As A System Reference Model, Zhuming Bi, Wen-Jun Zhang, Chong Wu, Chaomin Luo, Lida Xu Jan 2021

Generic Design Methodology For Smart Manufacturing Systems From A Practical Perspective, Part I—Digital Triad Concept And Its Application As A System Reference Model, Zhuming Bi, Wen-Jun Zhang, Chong Wu, Chaomin Luo, Lida Xu

Information Technology & Decision Sciences Faculty Publications

Rapidly developed information technologies (IT) have continuously empowered manufacturing systems and accelerated the evolution of manufacturing system paradigms, and smart manufacturing (SM) has become one of the most promising paradigms. The study of SM has attracted a great deal of attention for researchers in academia and practitioners in industry. However, an obvious fact is that people with different backgrounds have different expectations for SM, and this has led to high diversity, ambiguity, and inconsistency in terms of definitions, reference models, performance matrices, and system design methodologies. It has been found that the state of the art SM research is limited …


See-Trend: Secure Traffic-Related Event Detection In Smart Communities, Stephan Olariu, Dimitrie C. Popescu Jan 2021

See-Trend: Secure Traffic-Related Event Detection In Smart Communities, Stephan Olariu, Dimitrie C. Popescu

Computer Science Faculty Publications

It has been widely recognized that one of the critical services provided by Smart Cities and Smart Communities is Smart Mobility. This paper lays the theoretical foundations of SEE-TREND, a system for Secure Early Traffic-Related EveNt Detection in Smart Cities and Smart Communities. SEE-TREND promotes Smart Mobility by implementing an anonymous, probabilistic collection of traffic-related data from passing vehicles. The collected data are then aggregated and used by its inference engine to build beliefs about the state of the traffic, to detect traffic trends, and to disseminate relevant traffic-related information along the roadway to help the driving public make informed …


Adversarial Specification Mining, Hong Jin Kang, David Lo Jan 2021

Adversarial Specification Mining, Hong Jin Kang, David Lo

Research Collection School Of Computing and Information Systems

There have been numerous studies on mining temporal specifications from execution traces. These approaches learn finite-state automata (FSA) from execution traces when running tests. To learn accurate specifications of a software system, many tests are required. Existing approaches generalize from a limited number of traces or use simple test generation strategies. Unfortunately, these strategies may not exercise uncommon usage patterns of a software system. To address this problem, we propose a new approach, adversarial specification mining, and develop a prototype, DICE (Diversity through Counter-Examples). DICE has two components: DICE-Tester and DICE-Miner. After mining Linear Temporal Logic specifications from an input …


Context-Aware Retrieval-Based Deep Commit Message Generation, Haoye Wang, Xin Xia, David Lo, Qiang He, Xinyu Wang, John Grundy Jan 2021

Context-Aware Retrieval-Based Deep Commit Message Generation, Haoye Wang, Xin Xia, David Lo, Qiang He, Xinyu Wang, John Grundy

Research Collection School Of Computing and Information Systems

Commit messages recorded in version control systems contain valuable information for software development, maintenance, and comprehension. Unfortunately, developers often commit code with empty or poor quality commit messages. To address this issue, several studies have proposed approaches to generate commit messages from commit diffs. Recent studies make use of neural machine translation algorithms to try and translate git diffs into commit messages and have achieved some promising results. However, these learning-based methods tend to generate high-frequency words but ignore low-frequency ones. In addition, they suffer from exposure bias issues, which leads to a gap between training phase and testing phase. …


Coherence And Identity Learning For Arbitrary-Length Face Video Generation, Shuquan Ye, Chu Han, Jiaying Lin, Guoqiang Han, Shengfeng He Jan 2021

Coherence And Identity Learning For Arbitrary-Length Face Video Generation, Shuquan Ye, Chu Han, Jiaying Lin, Guoqiang Han, Shengfeng He

Research Collection School Of Computing and Information Systems

Face synthesis is an interesting yet challenging task in computer vision. It is even much harder to generate a portrait video than a single image. In this paper, we propose a novel video generation framework for synthesizing arbitrary-length face videos without any face exemplar or landmark. To overcome the synthesis ambiguity of face video, we propose a divide-and-conquer strategy to separately address the video face synthesis problem from two aspects, face identity synthesis and rearrangement. To this end, we design a cascaded network which contains three components, Identity-aware GAN (IA-GAN), Face Coherence Network, and Interpolation Network. IA-GAN is proposed to …


"Who Can Help Me?'': Knowledge Infused Matching Of Support Seekers And Support Providers During Covid-19 On Reddit, Manas Gaur, Kaushik Roy, Aditya Sharma, Biplav Srivastava, Amit Sheth Jan 2021

"Who Can Help Me?'': Knowledge Infused Matching Of Support Seekers And Support Providers During Covid-19 On Reddit, Manas Gaur, Kaushik Roy, Aditya Sharma, Biplav Srivastava, Amit Sheth

Publications

During the ongoing COVID-19 crisis, subreddits on Reddit, such as r/Coronavirus saw a rapid growth in user's requests for help (support seekers - SSs) including individuals with varying professions and experiences with diverse perspectives on care (support providers - SPs). Currently, knowledgeable human moderators match an SS with a user with relevant experience, i.e, an SP on these subreddits. This unscalable process defers timely care. We present a medical knowledge-infused approach to efficient matching of SS and SPs validated by experts for the users affected by anxiety and depression, in the context of with COVID-19. After matching, each SP to …


For People And Planet: Teachers’ Evaluation Of An Educational Mobile Game And Resource Pack, Ma. Mercedes T. Rodrigo, Johanna Marion R. Torres, Janina Carla M. Castro, Abigail Marie T. Favis, Ingrid Yvonne Herras, Francesco U. Amante, Hakeem Jimenez, Juan Carlo F. Mallari, Kevin Arnel C. Mora, Walfrido David A. Diy, Jaclyn Ting Ting M. Lim, Ma. Assunta C. Cuyegkeng Jan 2021

For People And Planet: Teachers’ Evaluation Of An Educational Mobile Game And Resource Pack, Ma. Mercedes T. Rodrigo, Johanna Marion R. Torres, Janina Carla M. Castro, Abigail Marie T. Favis, Ingrid Yvonne Herras, Francesco U. Amante, Hakeem Jimenez, Juan Carlo F. Mallari, Kevin Arnel C. Mora, Walfrido David A. Diy, Jaclyn Ting Ting M. Lim, Ma. Assunta C. Cuyegkeng

Department of Information Systems & Computer Science Faculty Publications

For People and Planet: An SDG Adventure refers to a freely available Android-based narrative adventure game and teacher resource pack that helps learners see the United Nations Sustainable Development Goals (SDGs) in their day-to-day lives. In this paper, we describe the results of an evaluation of both the game and the resource pack by eight (8) middle school teachers. After playing the game and reading the resource pack, teachers gave their feedback about what they liked best and least about the materials, how they could use these resources for their classes, and how these resources could be improved further. Overall, …


Enterprise Social Network Systems Implementation Model For Knowledge Sharing Among Supply Chain It Professionals, Edgardo Luis Velez-Mandes Jan 2021

Enterprise Social Network Systems Implementation Model For Knowledge Sharing Among Supply Chain It Professionals, Edgardo Luis Velez-Mandes

CCE Theses and Dissertations

With the increased use of social network technologies in organizational environments, there is a need to understand how these technologies facilitate organizational knowledge management, particularly knowledge sharing. Prior research has focused on the relationship between knowledge management and enterprise social networking systems (ESNS), but little research has been conducted relating to how organizations implement and use ESNS for knowledge sharing. The goal was to construct and validate internally a model that offers guidance for the successful implementation and use of ESNS for knowledge sharing and building successful virtual communities of practice (vCoPs) among IT supply chain professionals in a healthcare …