Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Social and Behavioral Sciences

Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy Jan 2022

Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy

CCE Theses and Dissertations

The data mining sanitization process involves converting the data by masking the sensitive data and then releasing it to public domain. During the sanitization process, side effects such as hiding failure, missing cost and artificial cost of the data were observed. Privacy Preserving Data Mining (PPDM) algorithms were developed for the sanitization process to overcome information loss and yet maintain data integrity. While these PPDM algorithms did provide benefits for privacy preservation, they also made sure to solve the side effects that occurred during the sanitization process. Many PPDM algorithms were developed to reduce these side effects. There are several …


Investigating The User Experience With A 3d Virtual Anatomy Application, Winnyanne Kunkle Jan 2021

Investigating The User Experience With A 3d Virtual Anatomy Application, Winnyanne Kunkle

CCE Theses and Dissertations

Decreasing hours dedicated to teaching anatomy courses and declining use of human cadavers have spurred the need for innovative solutions in teaching anatomy in medical schools. Advancements in virtual reality (VR), 3D visualizations, computer graphics, and medical graphic images have enabled the development of highly interactive 3D virtual applications. Over recent years, variations of interactive systems on computer-mediated environments have been used as supplementary resource for learners. However, despite the growing sophistication of these resources for learning anatomy, studies show that students predominantly prefer traditional methods of learning and hands-on cadaver-based learning over computer-mediated platforms.

There is limited research on …


An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung Jan 2021

An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung

CCE Theses and Dissertations

Computer users’ security compliance behaviors can be better understood by devising an experimental study to examine how fear appeals might impact users’ security behavior. Telecommuter security behavior has become very relevant in information systems (IS) research with the growing number of individuals working from home. The increasing dependence on telecommuting to enhance the viability and convenience has created an urgency with the advent of the COVID-19 pandemic to examine the behavior of users working at home across a corporate network. The home networks are usually not as secure as those in corporate settings. There is seldom a firewall setting and …


Unix Administrator Information Security Policy Compliance: The Influence Of A Focused Seta Workshop And Interactive Security Challenges On Heuristics And Biases, John Palmer Mcconnell Jan 2020

Unix Administrator Information Security Policy Compliance: The Influence Of A Focused Seta Workshop And Interactive Security Challenges On Heuristics And Biases, John Palmer Mcconnell

CCE Theses and Dissertations

Information Security Policy (ISP) compliance is crucial to the success of healthcare organizations due to security threats and the potential for security breaches. UNIX Administrators (UXAs) in healthcare Information Technology (IT) maintain critical servers that house Protected Health Information (PHI). Their compliance with ISP is crucial to the confidentiality, integrity, and availability of PHI data housed or accessed by their servers. The use of cognitive heuristics and biases may negatively influence threat appraisal, coping appraisal, and ultimately ISP compliance behavior. These failures may result in insufficiently protected servers and put organizations at greater risk of data breaches and financial loss. …


An Instructional Designer Competency Framework For Complex Learning Designs, David Alan Schubert Jan 2019

An Instructional Designer Competency Framework For Complex Learning Designs, David Alan Schubert

CCE Theses and Dissertations

Learning design competency frameworks published by professional organizations, exist for typical instructional design efforts. However, a review of literature revealed a lack of frameworks available for the creation of complex learning designs (CLDs). The goal of this research was to develop a competency framework for the creation of CLDs. Quantitative and qualitative methods were employed in the four phases of the design and development research approach In phase one, a survey based on the Educational Technology Multimedia Competency Survey (ETMCS) was sent to instructional designers who self-reported as having experience creating CLDs. The purpose of phase one was to identify …


Examining Shared Understanding And Team Performance In Global Virtual Teams, Alva Bullard Jan 2019

Examining Shared Understanding And Team Performance In Global Virtual Teams, Alva Bullard

CCE Theses and Dissertations

Modern organizations face many significant challenges because of turbulent environments and a competitive global economy. These competitive demands have forced many organizations to increase levels of flexibility and adaptability through the use of virtual environments, and global teams are prevalent in business organizations. Although significant research has been conducted on virtual teams, the development of shared understanding among the members of these teams has not been studied adequately. Time/space barriers, communication complexities, and team diversity hinder the development of shared understanding in these teams.

Based on the Media Synchronicity Theory (MST), a new theoretical model was created that used the …


A Comprehensive Cybersecurity Defense Framework For Large Organizations, Willarvis Smith Jan 2019

A Comprehensive Cybersecurity Defense Framework For Large Organizations, Willarvis Smith

CCE Theses and Dissertations

There is a growing need to understand and identify overarching organizational requirements for cybersecurity defense in large organizations. Applying proper cybersecurity defense will ensure that the right capabilities are fielded at the right locations to safeguard critical assets while minimizing duplication of effort and taking advantage of efficiencies. Exercising cybersecurity defense without an understanding of comprehensive foundational requirements instills an ad hoc and in many cases conservative approach to network security. Organizations must be synchronized across federal and civil agencies to achieve adequate cybersecurity defense. Understanding what constitutes comprehensive cybersecurity defense will ensure organizations are better protected and more efficient. …


Exploring Generational Differences In Text Messaging Usage And Habits, Daniel Wayne Long Jan 2018

Exploring Generational Differences In Text Messaging Usage And Habits, Daniel Wayne Long

CCE Theses and Dissertations

Members of society today embrace multiple communication media for various purposes and intents. Text messaging has been identified as the medium of choice for continual relationship maintenance and text messaging from mobile devices overshadows all other media forms for the support of social connections. Text messaging is changing everything from how operators market their plans to how advertisers and service providers reach consumers. But just as technology usage of social media and internet access are different across generational boundaries, text messaging usage and habits may also be different for various generational groups. The majority of peer-reviewed research regarding text messaging …


Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson Jan 2016

Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson

CCE Theses and Dissertations

The overall security posture of information systems (IS) depends on the behaviors of the IS users. Several studies have shown that users are the greatest vulnerability to IS security. The proliferation of smartphones is introducing an entirely new set of risks, threats, and vulnerabilities. Smartphone devices amplify this data exposure problem by enabling instantaneous transmission and storage of personally identifiable information (PII) by smartphone users, which is becoming a major security risk. Moreover, companies are also capitalizing on the availability and powerful computing capabilities of these smartphone devices and developing a bring-your-own-device (BYOD) program, which makes companies susceptible to divulgence …


A Study Of The Success Of Group Formation In Virtual Teams Using Computer-Mediated Communications, Eliel Melón-Ramos Jan 2016

A Study Of The Success Of Group Formation In Virtual Teams Using Computer-Mediated Communications, Eliel Melón-Ramos

CCE Theses and Dissertations

In the digital domain, virtual teams within organizations and corporations are becoming common. Restructuring an organization or corporation is vital because competition and globalization are increasing. In this era of globalization, distributed working groups need to develop a competitive advantage in these ever-changing environments. Historically, teams had experienced problems stemming from geographical and temporal limitations. With the increase of technology in telecommunications, organizations are increasingly forming virtual teams, which have become critical to the survival of nearly any corporate entity.

Virtual teams have some of the same problems that regular teams have. One of the key challenges is the method …


An Investigation Of Socio-Technical Components Of Knowledge Management System (Kms) Usage, Noel Wint Jr. Jan 2016

An Investigation Of Socio-Technical Components Of Knowledge Management System (Kms) Usage, Noel Wint Jr.

CCE Theses and Dissertations

Existing literature indicates that although both academics and practitioners recognize knowledge management (KM) as a source of competitive advantage, users are not always willing to use a knowledge management system (KMS). Because of the social nature of knowledge transfer, a KMS can be considered a socio-technical system. Many explanations have been presented for this failure to utilize the KMS. These explanations include a number of the socio-technical factors relating to people, processes, and technologies. While these factors may have significant explanatory power when examined independently, existing studies have not sufficiently addressed the interactions among all three socio-technical factors or their …


Use Of Student Created Video Podcasts To Promote Foreign Language Grammar Acquisition In Middle School, Sergio Parra Jan 2016

Use Of Student Created Video Podcasts To Promote Foreign Language Grammar Acquisition In Middle School, Sergio Parra

CCE Theses and Dissertations

The use of video podcasts in education has emerged as a phenomenon that has gained a considerable amount of attention over the last few years. Although video podcasting is becoming a well-established technology in higher education, new multimedia instructional strategies such as student-created video podcasts in grades K-12 are under-researched.

The study investigated the effects of video podcasts created by students to promote foreign language grammar acquisition at the middle school level and find how students described such experience. The current investigation was conducted by using the explanatory sequential design, which is a mixed methods research design that occurs in …


Investigating Categorization Preferences For Online Dating Sites, Scott Morrissette May 2015

Investigating Categorization Preferences For Online Dating Sites, Scott Morrissette

CCE Theses and Dissertations

The purpose of the study was to determine whether a three-category (3C) system for classifying profiles on online dating sites provides advantages over a two-category (2C) system as decision makers evaluate a long list of profiles. Two groups of single heterosexual or bisexual women ages 20 to 30 reviewed a list of 60 male profiles on simulated online dating sites to choose which profiled man they would most like to learn more about. One group (n = 53) evaluated the profiles using a 2C system; the other group (n = 56) used a 3C system. After making their choice, women …


An Interpretive Phenomenological Analysis Inquiry Into Facebook Newcomer Motivations For Participatory Activities, Kristin Raub Mar 2015

An Interpretive Phenomenological Analysis Inquiry Into Facebook Newcomer Motivations For Participatory Activities, Kristin Raub

CCE Theses and Dissertations

This qualitative study provided insight into the phenomenon of newcomers in social networking, in particular, to understand what role specific Facebook features play in motivating content sharing and contribution among newcomers. Research indicated that the first several months or years of social networking site (SNS) membership are the most crucial in terms of indicating long-term participation and commitment to the SNS. Long-term participation is specifically manifested through interactions with peers who are members of the same website and through interactivity such as content sharing and contribution. A number of quantitative studies have focused on motivations for user contribution in social …


Examining Social Network Site Usage By Older Adults: A Phenomenological Approach, Betsy Baugess Mar 2015

Examining Social Network Site Usage By Older Adults: A Phenomenological Approach, Betsy Baugess

CCE Theses and Dissertations

The Internet has infiltrated our daily lives in many ways. Social networking on the Internet is a great example of how the Internet has expanded interpersonal communication. Many individuals have made social networking sites, like FaceBook and Twitter, an essential part of their lives and use these platforms to communicate daily. Until recently, young people have been the primary participants in this fast-growing phenomenon, and older adults' participation in the Internet, specifically social networking sites, has lagged far behind. However, in recent years, there has been a noteworthy increase in the number of older adult participants. The increase in older …