• Home
  • Search
  • Browse Collections
  • My Account
  • About
  • DC Network Digital Commons Network™
Skip to main content
  • Home
  • About
  • FAQ
  • My Account
Beadle Scholar Dakota State University
  • Collections
  • Publications
  • Faculty Research
  • Student Research

    Content Posted in 2023

    PDF

    Academic Hall of Fame, Eric Johnson

    PDF

    Academic Hall of Fame, Risë Smith

    PDF

    ADA / Section 508's effect on a website for higher education; a study comparing students reaction to ADA/Bobby compliant website against a non compliant website., C. Robert Schmid

     

    A Decade in Review: Aligning Information Systems Security (ISS) with the NICE framework, Christopher Kreider and Omar El-Gayar

    PDF

    Aligning IT Assets to Maximize Healthcare Organizational Performance, Paul Weist

    PDF

    Alumni Perceptions of Cybersecurity Employment Preparation Using the NICE Framework, Tobi West

    PDF

    Analyzing Key Database And Network Issues Of An Institution: A Case Study Of The Proposed MSIS Lab In Dakota State University, Anup Pokhrel

    PDF

    A Novel Approach To A Second Channel Authentication Method Utilizing Alphanumerical Data Transfer Through Audio Waves, Mark Lawrence

    PDF

    A Performance-Explainability-Fairness Framework For Benchmarking ML Models, Shuvro Chakrobartty

    PDF

    A Self-Regulated Learning Approach to Educational Recommender Design, Alicia McNett

    PDF

    A Service Oriented Architecture Using Web Services, Sonny Anousone Phrommany

    PDF

    A Small-scale Internet Portal For Online Electronic Commerce e-Mika.net, Mika Kamiya

    PDF

    A Study of Stem and Non-Stem College Students’ Smart TV Attitudes (The Trade-Off Between Functionality and Security/Privacy), Nadia Halabi

    PDF

    BAMBI: Bluetooth Access Management & Beacon Identification, Anthony Jairam

    PDF

    Bypassing Modern CPU Protections With Function-Oriented Programming, Logan Stratton

    PDF

    Centralized AP Routing Solution, Teena Coad

     

    Conversational Agents for Mental Health and Well-being: Discovering Design Recommendations Using Text Mining, Abdullah Wahbeh, Mohammad Al-Ramahi, Omar El-Gayar, Ahmed Elnoshokaty, and Tareq Nasralah

    PDF

    CyberEducation-By-Design™: Developing A Framework for Cybersecurity Education at Secondary Education Institutions in Arizona, Paul Wagner

    PDF

    Data Extraction: An XML Parser Written in C for an Online Auto Insurance Product, Robert D. Trzynka

    PDF

    Defining A Cyber Operations Performance Framework Via Computational Modeling, Briant Becote

    PDF

    Delivering a Shopping Website Using Apache Web Server on UNIX, Norman Dean Harrod

    PDF

    Design Principles For App-Based Healthcare Interventions: A Mixed Method Approach, Loknath Sai Ambati

    PDF

    Detection Of VulnerabilitIies in 5G Femtocell Firmware Using Static Analysis Tools, Charles H. Begian

    PDF

    Development of Computer Inventory for the Sioux Falls Catholic School System, Janet Liesinger

    PDF

    Discourse and Presence as they Relate to Online Interaction, Andy Conrad

     

    Drivers and Challenges of Wearable Devices Use: Content Analysis of Online Users Reviews, Ahmed Elnoshokaty, Omar El-Gayar, Abdullah Wahbeh, Mohammad A. Al-Ramahi, and Tareq Nasralah

    PDF

    E-Democratic Government Success Framework for United States’ Municipalities, Glenn Papp Jr

    PDF

    Ednem: A Malware Detection Framework Based on Static and Dynamic Analysis, Jumani Blango

    PDF

    E-Government Security in Municipal Government: A Case Study of Municipalities in Orange County, California, Timothy J. Perez

    PDF

    Endpoint Defense as Code (EDAC): Configurable Contextual Analysis of Process Behaviors From Kernel/User Event Tracing, Trevor M. Lewis

    PDF

    Exploring the Interoperability for Information Exchange Between Acute and Post-Acute Care Settings, Madhu Gottumukkala

    PDF

    Extracting Implicit Knowledge and Inter-relationships from Initial Public Offering (IPO) Prospectus for Pricing Prediction, Jie Tao

    Link

    Factors and Design Features Influencing the Continued Use of Wearable Devices, Omar El-Gayar and Ahmed Elnoshokaty

     

    Fairness Challenges in Artificial Intelligence, Shuvro Chakrobartty and Omar El-Gayar

    PDF

    Fake News Detection on the Web: A Deep Learning Based Approach, Piyush Vyas

    PDF

    Hagan Benefits, Inc. Intranet, Dana M. Hagen

    PDF

    Implementation of Claims Processing Workflow at DAKOTACARE, Nelson Holter

    PDF

    Improving Opinion Mining by Classifying Facts and Opinions in Twitter - A Deep Learning Approach, Swayambhu P. Chatterjee

    PDF

    Information Security Awareness Programs in Congolese Organizations: Cultural Influence and Effective Use., Arnold Nzailu

     

    Is Artificial Intelligence Attractive? An Empirical Study on User’s Intention to Use AI-Enabled Applications, Gary Yu Zhao, Omar El-Gayar, and Cindy Zhiling Tu

    PDF

    Knowledge Management in Higher Education: Effectiveness, Success factors, and Organisational Performance, Armel Djangone

    PDF

    Malware Pattern of Life Analysis, Mar Castro

    PDF

    Mathimatics & Natural Sciences Website, Nader Green

    PDF

    Measuring the Performance Cost of Manual System Call Detections Via Process Instrumentation Callback (PIC), Jacob Williams

    PDF

    Mobile Workforce -- Amway, Suman Kumar Mittapally

    PDF

    Native American Community Digital Divide: Student Insights, Chad R. Fenner

    PDF

    Newsletter Fall 2022, College of Business &. Information Systems

    PDF

    Online Tracking System, Dale Henning

    PDF

    Privacy and Security Concerns Associated with MHealth Technologies: A Social Media Mining Perspective, Damion Mitchell

     

    Social Media for Exploring Adverse Drug Events Associated with Multiple Sclerosis, Nevine Nawar, Omar El-Gayar, Ambati LoknathSai, and Bojja Giridhar

    PDF

    Static Binary Rewriting for ROP Gadget Removal, Hans Verhoeven

    PDF

    Strategic IS/IT Analysis and IS/IT Plan for Trinity Lutheran Church, Jill Morin Schneider

    PDF

    SUTMS - Unified Threat Management Framework for Home Networks, Asif Siddiqui

    PDF

    Talent Analytics: How Data Mining Can Improve Talent Assessment, Karen Vizecky

    PDF

    Technology in Support of Performance Assessment, Hongxia Fu

    PDF

    The Restructuring of a Network Architecture, Pat Engebretson

     

    The role of age in organizational knowledge sharing: A systematic literature review, Kalee Crandall, Kodey Crandall, and Omar El-Gayar

    PDF

    Token Based Authentication and Authorization with Zero-Knowledge Proofs for Enhancing Web API Security and Privacy, Michael Lodder

    PDF

    Towards an Efficient Multi-Cloud Observability Framework of Containerized Microservices in Kubernetes Platform, Haytham Mohamed

    PDF

    Towards Long-Term Impact of Deep Learning Systems in Medical Imaging, Kruttika Sutrave

    PDF

    Training Center -A Virtual Trainer Information System, Jason Schmidt

    PDF

    Tunneling time and Faraday/Kerr effects in PT-symmetric systems, Peng Guo, Vladimir Gasparian, Antonio Antonio Perez-Garrido, and Ester Jodar Ferrandez

    PDF

    Understanding the Perspectives of Physicians and Healthcare Providers on I.T. Project Communications in a Critical Access Hospital, Andy Behrens

    PDF

    Using Academic Analytics to Predict Dropout Risk in E-Learning Courses, Rajeev Bukralia

    PDF

    Viability of Time-Memory Trade-Offs in Large Data Sets, Kyle Harper

    PDF

    Web and Database Connection --Updating a Travel Website to Take Advantage of Oracle and ASP, Baixiang Liu

 
 
 

Browse

  • Collections
  • Disciplines
  • Authors

Search

Advanced Search

  • Notify me via email or RSS

Author Corner

  • Author FAQ
  • Policies & Submission Guidelines
  • Submit Research
 
Elsevier - Digital Commons

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright