Matching Items (27)

137259-Thumbnail Image.png

Prenatal Care 2.0 - Evolving Delivery Models and the Role of Mobile Technology

Description

Prenatal care is a widely administered preventative care service, and its adequate use has been shown to decrease poor infant and maternal health outcomes. Today however, in the United States,

Prenatal care is a widely administered preventative care service, and its adequate use has been shown to decrease poor infant and maternal health outcomes. Today however, in the United States, preterm birth rates remain among the highest in the industrialized world, with low socioeconomic women having the highest risk of preterm births. This group of women also face the greatest barriers to access adequate prenatal care in the United States. This paper explores the viability of short message service to help bridge gaps in prenatal care for low socioeconomic women in the United States and provides areas for further research.

Contributors

Agent

Created

Date Created
  • 2014-05

136774-Thumbnail Image.png

Clinical Decision Aids: An Investigation of the Necessity of Patient Education Platforms that Incorporate Health Literacy

Description

Considering the overwhelming prevalence of BPH, how can it best be managed in light of the aging population? The purpose of this investigation is to illustrate that BPH and LUTS

Considering the overwhelming prevalence of BPH, how can it best be managed in light of the aging population? The purpose of this investigation is to illustrate that BPH and LUTS are conditions that are highly conducive to health literacy technology interventions. This objective will be met by: a) Providing an overview of the clinically relevant information regarding BPH, including anatomy, physiology, epidemiology, symptoms, and medical treatment for the disease; b) Establishing the necessity for novel health care delivery solutions by identifying past successes and challenges associated with technologic advances in related fields; c) Providing evidence of a lack of a systematic approach to BPH education, especially as it relates to health literacy. The relative successes and failures of previously established clinical decision aids will be discussed, leading to recommendations on how to improve upon these standards. Finally, the procedures and results of a pilot study will be analyzed in an effort to further highlight the necessity of engaging patients in the clinical decision making process.

Contributors

Created

Date Created
  • 2014-12

135962-Thumbnail Image.png

Policy Strategies for Transnational Governance and Armament Control for Cyber-Weapons

Description

Cyber-weapons and the rapid progression of utilizing cyberspace in conflict poses several risks to states and their ability to maintain control of their respective technological infrastructures. Susceptibility to these weapons

Cyber-weapons and the rapid progression of utilizing cyberspace in conflict poses several risks to states and their ability to maintain control of their respective technological infrastructures. Susceptibility to these weapons extend to virtually all existing nations, and indicates a critical need for transnational organizations and their members to establish collective strategies for governing cyber-arms. In this paper, the United Nations, as a prime example of an influential transnational organization, is utilized as a case study for a framework that seeks to define and establish guidelines for arms control policy as it relates to cyber-weapons. Presented is a strategy that seeks to define cyber-warfare and cyber-weapons, distinguish it from other existing forms of weapons and warfare, and outline recommended actions for the United Nations and its affiliates, including the United Nations Office for Disarmament Affairs and United Nations Security Council.

Contributors

Agent

Created

Date Created
  • 2015-12

135218-Thumbnail Image.png

Women in IS (or Lack Thereof)

Description

Research has found there is a lack of women present in the IS industry. In order to combat this problem, this research examines why women are not choosing IS majors

Research has found there is a lack of women present in the IS industry. In order to combat this problem, this research examines why women are not choosing IS majors at the university level. At Arizona State University, the Computer Information Systems undergraduate degree program is only 23 percent female. Many different factors can influence the decision to choose a major, so survey methodology was used to ascertain what factors were the most important to different demographic groups when making this decision. The study found no significant gender difference when making this decision, but rather a difference between specific majors. Genuine interest, interesting work and high career earnings were identified as the most influential reasons for choosing a college major. The results were used to create recommendations for the IS Department at ASU to implement in the next year and encourage more female participation in the CIS undergraduate degree program.

Contributors

Created

Date Created
  • 2016-05

133409-Thumbnail Image.png

Darknet Markets Analysis & Business Intelligence

Description

In the era of big data, the impact of information technologies in improving organizational performance is growing as unstructured data is increasingly important to business intelligence. Daily data gives businesses

In the era of big data, the impact of information technologies in improving organizational performance is growing as unstructured data is increasingly important to business intelligence. Daily data gives businesses opportunities to respond to changing markets. As a result, many companies invest lots of money in big data in order to obtain adverse outcomes. In particular, analysis of commercial websites may reveal relations of different parties in digital markets that pose great value to businesses. However, complex e­commercial sites present significant challenges for primary web analysts. While some resources and tutorials of web analysis are available for studying, some learners especially entry­level analysts still struggle with getting satisfying results. Thus, I am interested in developing a computer program in the Python programming language for investigating the relation between sellers’ listings and their seller levels in a darknet market. To investigate the relation, I couple web data retrieval techniques with doc2vec, a machine learning algorithm. This approach does not allow me to analyze the potential relation between sellers’ listings and reputations in the context of darknet markets, but assist other users of business intelligence with similar analysis of online markets. I present several conclusions found through the analysis. Key findings suggest that no relation exists between similarities of different sellers’ listings and their seller levels in rsClub Market. This study can become a great and unique example of web analysis and create potential values for modern enterprises.

Contributors

Agent

Created

Date Created
  • 2018-05

129469-Thumbnail Image.png

Determinants of Mobile Apps' Success: Evidence From the App Store Market

Description

Mobile applications markets with app stores have introduced a new approach to define and sell software applications with access to a large body of heterogeneous consumer population. This research examines

Mobile applications markets with app stores have introduced a new approach to define and sell software applications with access to a large body of heterogeneous consumer population. This research examines key seller- and app-level characteristics that impact success in an app store market. We tracked individual apps and their presence in the top-grossing 300 chart in Apple's App Store and examined how factors at different levels affect the apps' survival in the top 300 chart. We used a generalized hierarchical modeling approach to measure sales performance, and confirmed the results with the use of a hazard model and a count regression model. We find that broadening app offerings across multiple categories is a key determinant that contributes to a higher probability of survival in the top charts. App-level attributes such as free app offers, high initial ranks, investment in less-popular (less-competitive) categories, continuous quality updates, and high-volume and high-user review scores have positive effects on apps' sustainability. In general, each diversification decision across a category results in an approximately 15 percent increase in the presence of an app in the top charts. Survival rates for free apps are up to two times more than that for paid apps. Quality (feature) updates to apps can contribute up to a threefold improvement in survival rate as well. A key implication of the results of this study is that sellers must utilize the natural segmentation in consumer tastes offered by the different categories to improve sales performance.

Contributors

Agent

Created

Date Created
  • 2013-11-30

129660-Thumbnail Image.png

Event Sequence Modeling of IT Adoption in Healthcare

Description

Information systems research is replete with examples of the importance of business processes defining IT adoption. Business processes are influenced by both organizational and operational concerns. We evaluate the comparative

Information systems research is replete with examples of the importance of business processes defining IT adoption. Business processes are influenced by both organizational and operational concerns. We evaluate the comparative importance of operational and organizational influences for complementary IT systems. In the context of acute-care hospitals the analysis shows that an organizational approach to automating a process is related to different financial outcomes than an operational approach. Six complementary systems supporting a three-stage medication management process are studied: prescribing, dispensing, and administration. The analysis uses firm-level, panel data extracted from the HIMSS Analytics database spanning ten years of IT adoption for 140 hospitals. We have augmented the HIMSS dataset with matching demographic and financial details from the American Hospital Association and the Centers for Medicare and Medicaid Services. Using event sequence analysis we explore whether organizations are more likely to adopt organization boundary spanning systems and if the sequence of adoption follows the temporal ordering of the business process steps. The research also investigates if there is a relationship between the paths to IT adoption and financial performance. Comparison of the two measures suggests that the organizational model of adoption is observed more often in the data. Following the organizational model of adoption is associated with approximately $155 dollar increase in net income per patient day; whereas the operational model of adoption is associated with approximately $225 dollars decrease in net income per patient day. However, this effect diminishes with the adoption of each additional system thus demonstrating that the adoption path effects may only be relevant in the short-term.

Contributors

Agent

Created

Date Created
  • 2013-09-05

149668-Thumbnail Image.png

Privacy preserving service discovery and ranking for multiple user QoS requirements in service-based software systems

Description

Service based software (SBS) systems are software systems consisting of services based on the service oriented architecture (SOA). Each service in SBS systems provides partial functionalities and collaborates with other

Service based software (SBS) systems are software systems consisting of services based on the service oriented architecture (SOA). Each service in SBS systems provides partial functionalities and collaborates with other services as workflows to provide the functionalities required by the systems. These services may be developed and/or owned by different entities and physically distributed across the Internet. Compared with traditional software system components which are usually specifically designed for the target systems and bound tightly, the interfaces of services and their communication protocols are standardized, which allow SBS systems to support late binding, provide better interoperability, better flexibility in dynamic business logics, and higher fault tolerance. The development process of SBS systems can be divided to three major phases: 1) SBS specification, 2) service discovery and matching, and 3) service composition and workflow execution. This dissertation focuses on the second phase, and presents a privacy preserving service discovery and ranking approach for multiple user QoS requirements. This approach helps service providers to register services and service users to search services through public, but untrusted service directories with the protection of their privacy against the service directories. The service directories can match the registered services with service requests, but do not learn any information about them. Our approach also enforces access control on services during the matching process, which prevents unauthorized users from discovering services. After the service directories match a set of services that satisfy the service users' functionality requirements, the service discovery approach presented in this dissertation further considers service users' QoS requirements in two steps. First, this approach optimizes services' QoS by making tradeoff among various QoS aspects with users' QoS requirements and preferences. Second, this approach ranks services based on how well they satisfy users' QoS requirements to help service users select the most suitable service to develop their SBSs.

Contributors

Agent

Created

Date Created
  • 2011

149803-Thumbnail Image.png

Systematic policy analysis and management

Description

With the advent of technologies such as web services, service oriented architecture and cloud computing, modern organizations have to deal with policies such as Firewall policies to secure the networks,

With the advent of technologies such as web services, service oriented architecture and cloud computing, modern organizations have to deal with policies such as Firewall policies to secure the networks, XACML (eXtensible Access Control Markup Language) policies for controlling the access to critical information as well as resources. Management of these policies is an extremely important task in order to avoid unintended security leakages via illegal accesses, while maintaining proper access to services for legitimate users. Managing and maintaining access control policies manually over long period of time is an error prone task due to their inherent complex nature. Existing tools and mechanisms for policy management use different approaches for different types of policies. This research thesis represents a generic framework to provide an unified approach for policy analysis and management of different types of policies. Generic approach captures the common semantics and structure of different access control policies with the notion of policy ontology. Policy ontology representation is then utilized for effectively analyzing and managing the policies. This thesis also discusses a proof-of-concept implementation of the proposed generic framework and demonstrates how efficiently this unified approach can be used for analysis and management of different types of access control policies.

Contributors

Agent

Created

Date Created
  • 2011

150148-Thumbnail Image.png

Collaborative digital forensics: architecture, mechanisms, and case study

Description

In order to catch the smartest criminals in the world, digital forensics examiners need a means of collaborating and sharing information with each other and outside experts that is not

In order to catch the smartest criminals in the world, digital forensics examiners need a means of collaborating and sharing information with each other and outside experts that is not prohibitively difficult. However, standard operating procedures and the rules of evidence generally disallow the use of the collaboration software and techniques that are currently available because they do not fully adhere to the dictated procedures for the handling, analysis, and disclosure of items relating to cases. The aim of this work is to conceive and design a framework that provides a completely new architecture that 1) can perform fundamental functions that are common and necessary to forensic analyses, and 2) is structured such that it is possible to include collaboration-facilitating components without changing the way users interact with the system sans collaboration. This framework is called the Collaborative Forensic Framework (CUFF). CUFF is constructed from four main components: Cuff Link, Storage, Web Interface, and Analysis Block. With the Cuff Link acting as a mediator between components, CUFF is flexible in both the method of deployment and the technologies used in implementation. The details of a realization of CUFF are given, which uses a combination of Java, the Google Web Toolkit, Django with Apache for a RESTful web service, and an Ubuntu Enterprise Cloud using Eucalyptus. The functionality of CUFF's components is demonstrated by the integration of an acquisition script designed for Android OS-based mobile devices that use the YAFFS2 file system. While this work has obvious application to examination labs which work under the mandate of judicial or investigative bodies, security officers at any organization would benefit from the improved ability to cooperate in electronic discovery efforts and internal investigations.

Contributors

Agent

Created

Date Created
  • 2011