• Home
  • Search
  • Browse Collections
  • My Account
  • About
  • DC Network Digital Commons Network™
Skip to main content
  • Home
  • About
  • FAQ
  • My Account
Beadle Scholar Dakota State University
  • Collections
  • Publications
  • Student Research

    Content Posted in 2024

    Link

    2021 Academic Hall of Fame Celebrating Ruth Habeger and Honoring Dr. Zeno Van Erdewyk, Ruth Habeger

    PDF

    ABCD: A Risk Management Framework for SCADA Systems, Thuy Lam

    PDF

    Academic Achievement among NCAA Division 2 Student-Athletes and Non-Athletes, Shane D. Scholten, Holden Thomas Daum, and Luke Thomas Daum

    PDF

    Academic Hall of Fame Flyer, Vicki Sterling

    PDF

    Academic Hall of Fame Program, Vicki Sterling

    PDF

    Access Control for IoT: A Survey of Existing Research, Dynamic Policies and Future Directions, Yong Wang, Kaushik Ragothaman, Bhaskar P. Rimal Dr., and Mark Lawrence

    PDF

    A comparative analysis of anti-vax discourse on twitter before and after COVID-19 onset, Tareq Nasralah, Ahmed Elnoshokaty, Omar F. El-Gayar, Mohammad Al-Ramahi, and Abdullah Wahbeh

    PDF

    A Comparative Analysis of the Interpretability of LDA and LLM for Topic Modeling: The Case of Healthcare Apps, Omar El-Gayar, Mohammad Al-Ramahi, Abdullah Wahbeh, Tareq Nasralah, and Ahmed Elnoshokaty

    PDF

    A Comprehensive Evaluation of Electronic Medical Record System Implementation in Saudi Arabia, Jun Liu, Cherie Noteboom, and Hassan Alyami

    PDF

    A Comprehensive Framework Empowering Organizations to Effectively Minimize the Risk of Big Data De-anonymization Attack, Olufemi A. Asabi

    PDF

    A Cross-Architecture Framework for Anti-Debugging Techniques, Austin Norby

    Link

    A Design Theory for Intelligent Clinical Decision Support, Andrew Behrens, Jun Liu, and Cherie Noteboom

    PDF

    Adverse Health Effects of Kratom: An Analysis of Social Media Data, Abdullah Wahbeh, Tareq Nasralah, Omar El-Gayar, Mohammad Al-Ramahi, and Ahmed El Noshokaty

    Link

    A Dynamic Analysis Security Testing Infrastructure for Internet of Things, Yong Wang, Elliot Kjerstad, and Bailey Belisario

    Link

    A framework for developing a domain specific business intelligence maturity model: Application to healthcare, Patti Brooks, Omar F. El-Gayar, and Surendra Sarnikar

    PDF

    A Framework for Examining the Human Side of Anti-Forensic Measures, Yong Wang, Jason Nikolai, and Raj Kumar Nepali

    Link

    A Framework towards an efficient solution for the transportation of University of Bahrain Students, Youssef Harrath Dr.

    PDF

    A GAMIFICATION TECHNIQUE TO INCREASE ENGAGEMENT IN ASYNCHRONOUS ONLINE DISCUSSIONS, Brian Bovee, Thomas Jernejcic, and Omar F. El-Gayar

    Link

    AI Capability and Supply Chain Performance: A Systematic Literature Review, Lordt Becklines and Omar F. El-Gayar

    Link

    A Knowledge Extraction Approach for IT Tech-support Transcripts, Gary Yu Zhao, Omar El-Gayar, and Cindy Zhiling Tu

    Link

    Alert Prioritization and Strengthening: Towards an Industry Standard Priority Scoring System for IDS Analysts Using Open Source Tools and Models of Machine Learning, Austin O'Brien, Bikram Dangi, Jeremy Gamet, Arica Kulm, T.J. Nelson, and Wayne E. Pauli

    PDF

    A Model of Authentication for Augmented and Virtual Realities, Christopher Kreider

    PDF

    An Agent-Based Approach for Sourcing Business Rules in Supply Chain Management, Jun Liu and Sudha Ram

    PDF

    An Algorithm Based on Priority Rules for Solving a Multi-drone Routing Problem in Hazardous Waste Collection, Youssef Harrath Dr. and Jihene Kaabi Dr.

    PDF

    An Automated Virtual Security Testing Platform for Android Mobile Apps, Yong Wang

    Link

    A Neuropsychological Approach for Investigating Behavioral Beliefs Using Facial Expression Emoticons, Insu Park, Tamandia Matofam, and Jun Liu

    PDF

    A New Perspective on Semantics of Data Provenance, Sudha Ram and Jun Liu

    PDF

    An Inventory of Privacy Curricula Offerings in Higher Education, Dustin Steinhagen, Chase Lucas, Mary Francis, Mark Lawrence, and Kevin Streff

    PDF

    An LSTM Based Approach for the Classification of Customer Reviews: An Exploratory Study, Jun Liu, Akhilesh Chauhan, and Piyush Vyas

    PDF

    An NLP-Based Knowledge Extraction Approach for IT Tech-Support/Helpdesk Transcripts, Gary Yu Zhao

    Link

    An Overview of Identity Relationship Management in the Internet of Things, Yong Wang and Mohammad Muntasir Nur

    PDF

    Ant Colony-based Approach for solving an Unmanned Aerial Vehicle Routing Problem, Youssef Harrath Dr. and Jihene Kaabi Dr.

    PDF

    Artificial Intelligence Usage and Data Privacy Discoveries within mHealth, Jennifer Schulte

    PDF

    A Semantic Foundation for Provenance Management, Sudha Ram and Jun Liu

    PDF

    A Semiotics Framework for Analyzing Data Provenance Research, Jun Liu and Sudha Ram

    PDF

    Assessing Security Flaws in Modern Precision Farming Systems, Joseph Boyd and Robert Richardson

    PDF

    Assessing Security Vulnerabilities in Wireless IoT Devices, John Brumels

    PDF

    Assessing Varied Instructional Approaches in the Instruction of Online Graduate Students, Mary Francis

    PDF

    Assessment of Wax Worms (Galleria mellonella) as a Suitable Alternative Host to Study the Virulence of the Marine Pathogen Vibrio coralliilyticus, Vaille Swenson, Darrell Artz, Alexy Jakowicz, Timothy Cramer, Trever Listman, Michael Gaylor, Blake Ushijima, and Patrick Videau

    Link

    A Streaming Intrusion Monitoring and Classification System for IaaS Cloud, Yong Wang and Jason Nikolai

    Link

    A Study of IT Security Policies, Hassan Alyami, James Boit, and Omar F. El-Gayar

    Link

    A Systematic Mapping Study of Access Control in the Internet of Things, Yong Wang and Kaushik Ragothaman

    PDF

    Automated Dynamic Policy Generation for Access Control in the Internet of Things, Kaushik Nagarajan Muthusamy Ragothaman

    Link

    Automated Post-Breach Penetration Testing through Reinforcement Learning, Austin O'Brien, Sujita Chaudhary, and Shengjie Xu

    Link

    Beyond party: ideological convictions and foreign policy conflicts in the US congress, William Bendix and Gyung-Ho Jeong

    Link

    Bring Your Own Device Security Issues and Challenges, Yong Wang, Karthik Vangury, and Jinpeng Wei

    PDF

    BYOD security issues: a systematic literature review, Melva Ratchford, Yong Wang, Cherie Noteboom, and Omar F. El-Gayar

    Link

    CARVE: A Scientific Method-Based Threat Hunting Hypothesis Development Model, Yong Wang and Kevin Wafula

    Link

    CEO’s Communication Styles and their Effect on Organizational Performance, Ronghua Shan, Yong Wang, Jun Liu, and Giridhar Reddy Bojja

    PDF

    CHDA CERTIFICATION EXAM SUCCESS FACTORS, Renae Spohn, William Schweinle III, Patti Berg-Poppe, Carole South-Winter, and David DeJong

    PDF

    Classifying facts and opinions in Twitter messages: a deep learning-basedapproach, Ronghua Shan, Swayambhu P. Chatterjee, Shuyuan Deng, Jun Liu, and Wu Jiao

    Link

    Comprehensive Framework for the Design of Diabetes Registries, Hassan Alyami and Omar F. El-Gayar

    PDF

    Credibility Analysis of Customer Reviews on Amazon: A Design Science Approach, Jun Liu and Piyush Vyas

    PDF

    Critical Success Factors for BI Systems Implementation and Delivery: A Systematic Literature Review, Badr Harfoush, Omar F. El-Gayar, and Noura Mansoura

    Link

    Dark Side of GenAI: A Blackbox Analysis of X, Ahmed Elnoshokaty, Tareq Nasralah, Omar F. El-Gayar, Mohammad Al-Ramahi, and Abdullah Wahbeh

    PDF

    Data integration with diverse data: aerospace industry insights from a systematic literature review, Cherie Noteboom and Olga Perera

    PDF

    Deconstructing Compulsory Realpolitik in Cultural Studies: An Interview with Alexa Alice Joubin, David Kenley and William Sewell

    Link

    Deep Neural Network at Edge: An Exploration of Hyper Parameter Tuning on Plant Seedling Dataset, Ali Y. Shaheen and Omar El-Gayar

    PDF

    Defending the security of the mind: A mail survey of thought-reform literacy in South Dakota, Dustin Rozario Steinhagen

    Link

    Design of an Intelligent Patient Decision aid Based on Individual Decision-Making Styles and Information Need Preferences, Cherie Noteboom, Sergey Motorny, and Surendra Sarnikar

    PDF

    Design of a Virtual Cybersecurity Escape Room, Tania Williams and Omar F. El-Gayar

    PDF

    Detecting malicious short URLs on Twitter, Raj Kumar Nepali, Yong Wang, and Yazan Alshboul

    PDF

    Detection of Prostate Cancer Using Machine Learning Techniques: An Exploratory Study, Laxmi Manasa Gorugantu, Omar El-Gayar, and Nevine Nawar

    PDF

    Developing A Privacy Research Lab: Activities And Impact Of Prilab, Mary Francis and Dustin Steinhagen

    PDF

    Digital Divide in Rural Native American Homes: A Student Perspective, Chad R. Fenner, Cherie Noteboom, and Omar El-Gayar

    Link

    Disaster Experience and Hospital Information Systems: An Examination of Perceived Information Assurance, Risk, Resilience, and HIS Usefulness, Insu Park, Raj Sharman, and H.Raghav Rao

    Link

    Disentangling the effects of efficacy-facilitating informational support on health resilience in online health communities based on phrase-level text analysis, Insu Park, Surendra Sarnikar, and Jeewon Cho

    PDF

    Divergent Detection: A Comprehensive Study of DGAS Using FNNS for Original, Noise-Modified, and Linear Recursive Sequences(LRS), Anthony Rizi

    PDF

    Do AI-Generated Political Advertisements Create Positive or Negative Responses from Voters?, Grace Schofield

    Link

    Does Information Systems Support forCreativity Enhance Effective Information Systems Use andJob Satisfaction inVirtual Work?, Insu Park and Jeewon Cho

    PDF

    Do online test proctoring services abide by standard data protections?, Tristan Stapert and Andrew Kramer

    PDF

    Early public outlook on the coronavirus disease (COVID-19): A social media study, Jun Liu, Giridhar Reddy Bojja, Martinson Ofori, and Loknath Sai Ambati

    PDF

    Effectiveness of Transfer Learning with Light-weight Architecture for Covid-19 Imaging, Rajesh Godasu

    Link

    Enhancing Real-Time Streaming Content Security: An Adaptive QIM Watermarking Approach for Dynamic Tampering Detection, Harsha Sammangi, Giridhar Reddy Bojja, Loknath Sai Ambati, Md Jabir Rahman, and Jun Liu

    PDF

    Enhancing Smart Home Security Through Risk-Based Access Control (RBAC): “Closing the Gap”, Ahmad Abusini

    Link

    Exploratory Study on the Impact of Blockchain Adoption on Inventory Accuracy and Supply Chain Efficiency, Deb Tech and Aravindh Sekar

    PDF

    Exploring large language models for ontology learning, Olga Perera and Jun Liu

    Link

    Exploring the Activeness of Professional Online Community Members, Jun Liu, Yanyan Shang, and Jie Xiong

    PDF

    Exploring the Antimicrobial Potential of Honey from Alfalfa (Medicago sativa) Against Both Human and Plant Pathogens, Denyce Bravo and Andrew Santhoff

    Link

    Exploring the Impact of Blockchain Integration on Inventory Accuracy and Supply Chain Efficiency – A Literature Review, Aravindh Sekar, Deb Tech, and Cherie Noteboom

    PDF

    Factors Affecting Users’ Satisfaction with Telehealth Apps: Analysis of User Reviews using BERT, Abdullah Wahbeh, Tyler Howes, Omar F. El-Gayar, Raed Seetan, and Mohammad Al-Ramahi

    PDF

    FACTORS FOR SUCCESSFULLY PASSING CERTIFICATION EXAMS: A SYSTEMATIC REVIEW, Renae Spohn, William Schweinle III, Patti Berg-Poppe, Carole South-Winter, and David DeJong

    PDF

    Factors influencing blockchain implementation in supply chain management: An exploratory pilot study, Aravindh Sekar, Deb Tech, Patti Brooks, and Cherie Noteboom

    PDF

    Fine-Grained Address Space Layout Randomization Through Non-Contiguous Per-Function Memory Segment Assignment, Andrew Kramer

    PDF

    Forensic Iconography for Image Forgery Detection, Chad R. Johnson

    Link

    Formative Validity of A Novel Authentication Artifact for Augmented and Virtual Realities, Christopher Kreider and Omar El-Gayar

    PDF

    Fox in the Henhouse: The Delegation of Regulatory and Privacy Enforcement to Big Tech, William Bendix and Jon McKay

    PDF

    Fulfillment of a Higher Order: Placing Information Literacy within Maslow’s Hierarchy of Needs, Mary Francis

    Link

    Gamifying Online Discussions: A Model for Improving Engagement Using Leaderboards, Brian Bovee, Cherie Noteboom, Kevin Smith, and Omar F. El-Gayar

    Link

    Gender Differentials in School Computer Technology Support Roles: An Analysis, Mark Hawkes and Brad Brockmueller

    Link

    Generative Adversarial Networks in Fraud Detection: A Systematic Literature Review, Man Wang and Omar F. El-Gayar

    Link

    GENERATIVE ADVERSARIAL NETWORKS IN TUMOR-RELATED RESEARCH: A REVIEW AND AGENDA FOR MOVING FORWARD, Andrew Behrens and Cherie Noteboom

    Link

    Geographic Variations and The Utilization of Health Care Resources, Tareq Nasralah, Cherie Noteboom, Abdullah Wahbeh, and Yong Wang

    PDF

    Getting the Best Out of Joint Warfighter Development, Charls Davis, Jeffrey Turner, and Mary Bell

    PDF

    Health Benefits and Adverse Effects of Kratom: A Social Media Text-Mining Approach, Abdullah Wahbeh, Mohammad Al-Ramahi, Omar F. El-Gayar, Tareq Nasralah, and Ahmed El Noshokaty

    PDF

    Health Literacy: Exploring Health Knowledge Transfer in Online Healthcare Communities, Yanyan Shang and Jun Liu

    Link

    HLA-G gene polymorphisms as predictors of survival in colorectal cancer: A unified machine learning approach for cancer detection, Youssef Harrath, Marwa Hasni, Sabrine Dhouioui, Nadia Boujelbene, Abdel Halim Harrath, Mohamed Ayadi, Ines Zemni, Safa Bhar Layeb, and Ines Zidi

    PDF

    How Attractive is Artificial Intelligence? An Empirical Study of User Adoption of AI- Enabled Applications, Gary Yu Zhao, Omar F. El-Gayar, and Cindy Zhiling Tu

    Link

    Hybrid Quantum Artificial Intelligence Electromagnetic Spectrum Analysis Framework for Transportation System Security, Varghese Vaidyan

    Link

    Hypervisor-based cloud intrusion detection system, Yong Wang and Jason Nikolai

    Link

    ICT: Attendance and Contact Tracing During a Pandemic, Shawn Zwach and Michael J. Ham

    PDF

    Identifying Critical Factors That Impact Learning Analytics Adoption by Higher Education Faculty, Michael Knupp

    Link

    Identity Sharing and Adaptive Personalization Influencing Online Repurchases, Insu Park, Son Bui, and William J. Kettinger

    Link

    Impact of IT Investment on Hospital Performance: A Longitudinal Data Analysis, Jun Liu and Giridhar Reddy Bojja

    Link

    Impacts of Mobile Computing on Student Learning in the University: A Comparison of Course Assessment Data, Mark Hawkes and Claver P. Hategekimana

    PDF

    Implementing a Zero Trust Architecture For ICS/SCADA Systems, Raven Sims

    Link

    Improved PSOR algorithm for minimum power multicast tree problem in wireless ad hoc networks, Austin O'Brien, Manki Min, and Sung Y. Shin

    Link

    Internal Bonding, External Bridging and Functional Diversity: Impact of Social Capital on the Quality of Wikipedia Articles, Jun Liu and Sudha Ram

    PDF

    Investigating Conversion of Anthracene to Anthraquinone in the Presence of Montmorillonite Clay Under Temperature Regimes Relevant to Prebiotic Environments, Hope Juntunen, Briann Pitts, Vaille Swenson, Patrick Videau, and Michael Gaylor

    Link

    IoT Device Identification Using Supervised Machine Learning, Yong Wang, Bhaskar P. Rimal Dr., Mark Elder, Sofía I. Crespo Maldonado, Helen Chen, Carson Koball, and Kaushik Ragothaman

    PDF

    Is Artificial Intelligence Attractive? An Empirical Study on User’s Intention to Use AI-Enabled Applications, Omar F. El-Gayar, Tu Cindy Zhiling, and Zhao Gary Yu

    PDF

    Leveraging the Zigbee Pattern of Life to Identify Devices, Kurt Jarvis

    Link

    Linguistic Discourse Variables as Indicators of Reflective Online Interaction, Mark Hawkes

    Link

    Lookahead Expansion Algorithm for Minimum Power Multicasting in Wireless Ad Hoc Networks, Austin O'Brien and Manki Min

    PDF

    MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITERATURE REVIEW, T.J. Nelson, Austin O'Brien, and Cherie Noteboom

    PDF

    MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITERATURE REVIEW, Cherie Noteboom, Austin O'Brien, and T.J. Nelson

    Link

    Making Embedded Librarians a Part of an Online Community of Learners, Mary Francis

    PDF

    May Fourth at 100 in Singapore and Hong Kong: memorialization, localization, and negotiation, David Kenley and Els van Dongen

    Link

    Medical Device Security Regulations and Assessment Case Studies, Yong Wang, Kai Taylor, Alexandra Smith, Adam Zimmel, and Korina Alcantara

    PDF

    Micromouse - Maze Solving Robot, Aiden Schramm, David Medin, and Andrew Kramer

    PDF

    Mining mobile application reviews to inform the design of anonymous live counseling applications, Cherie Noteboom, Kalee Crandall, Kodey S. Crandall, and Matt North

    PDF

    MobileGuardian: A Security Policy Enforcement Framework for Mobile Devices, Yong Wang, Karthik Vangury, and Jason Nikolai

    PDF

    Mobile Malware Security Challenges and Cloud-Based Detection, Yong Wang, Michael Hoffman, Nicholas Penning, and Jason Nikolai

    PDF

    Mobile Payment Security, Threats, and Challenges, Yong Wang, Christen Hahn, and Kruttika Sutrave

    PDF

    Mobile Security Testing Approaches and Challenges, Yong Wang and Yazan Alshboul

    PDF

    Moving data down the road: a systematic review of information privacy concerns in Internet-of-Vehicles (IoV) literature, Brad Fowler and Omar El-Gayar

    Link

    Native American Rural Community Digital Divide: Student Insights, Chad R. Fenner, Cherie Noteboom, and Omar El-Gayar

    PDF

    Natural Language Processing: Understanding Slang and Colloquial Speech, Beau Miller

    Link

    New Culture Turns One Hundred: A Centennial Reflection on the May Fourth and New Culture Movement in Singapore, David Kenley

    Link

    NLP in Electronic Health Records: A Decade Perspective, James Boit, Hassan Alyami, and Omar F. El-Gayar

    Link

    OABIS: An ontology-based approach to business rules sourcing in supply chain management systems, Jun Liu and Sudha Ram

    Link

    Open Educational Resources, Mary Francis

    Link

    Open Source Capture and Analysis of 802.11 Management Frames, Michael J. Ham and Kyle Cronin

    Link

    Partitioning-Based SOR for Minimum Energy Multicast Tree Problem in Wireless Ad Hoc Networks, Austin O'Brien, Manki Min, and Sung Y. Shin

    PDF

    Peer Reviewers of Academic Journals: Who is Responsible for Our Professional Literature, Mary Francis

    Link

    PEOPLE, PROCESS, AND TECHNOLOGY IN CLINICAL DECISION SUPPORT SYSTEMS: A META-ANALYSIS, Andrew Behrens, Cherie Noteboom, Kalee Crandall, and David Zeng

    PDF

    Perception of Bias in ChatGPT: Analysis of Social Media Data, Abdullah Wahbeh, Mohammad Al-Ramahi, Omar F. El-Gayar, Ahmed El Noshokaty, and Tareq Nasralah

    PDF

    Perceptions of Preservice Teachers about Adaptive Learning Programs in K-8 Mathematics Education, Kevin Smith

    Link

    Planning a secure and reliable IoT-enabled FOG-assisted computing infrastructure for healthcare, Jun Liu, Hafiz Munsab Ali, Syed Ahmad Chan Bukhari, and Hafiz Tayyab Rauf

    PDF

    Power-Aware Fog Supported IoT Network for Healthcare Infrastructure Using Swarm Intelligence-Based Algorithms, Hafiz Munsab Ali, Syed Ahmad Chan Bukhari, Tahir Hameed, Jun Liu, and Alain Bertrand Bomgni

    PDF

    Prediction of Patient Willingness to Recommend Hospital: A Machine Learning-Based Exploratory Study, Jun Liu, Loknath Sai Ambati, Piyush Vyas, Giridhar Reddy Bojja, and Martinson Ofori

    PDF

    Privacy and Online Social Networks: A Systematic Literature Review of Concerns, Preservation, and Policies, Damion Mitchell and Omar F. El-Gayar

    Link

    Privacy impact assessment for online social networks, Yong Wang and Raj Kumar Nepali

    Link

    Privacy Measurement for Social Network Actor Model, Yong Wang and Raj Kumar Nepali

    Link

    Privacy threat modeling framework for online social networks, Yong Wang and Raj Kumar Nepali

    PDF

    Proliferation of health misinformation on social media platforms: a systematic literature review, Jun Liu, Gitika Vyas, and Piyush Vyas

    Link

    Prospects of Deep Learning and Edge Intelligence in Agriculture: A Review, Ali Shaheen and Omar F. El-Gayar

    Link

    Provenance Management in BioSciences, Jun Liu and Sudha Ram

    Link

    Public Discourse Against Masks in the COVID-19 Era: Infodemiology Study of Twitter Data, Mohammad Al-Ramahi, Ahmed Elnoshokaty, Omar F. El-Gayar, Tareq Nasralah, and Abdullah Wahbeh

    Link

    Real-Time Fake News Detection on the X (Twitter): An Online Machine Learning Approach, Jun Liu, Piyush Vyas, and Shengjie Xu

    Link

    Remote Mobile Screen (RMS): An Approach for Secure BYOD Environments, Yong Wang, Santiago Gimenez Ocano, and Byrav Ramamurthy

    PDF

    Resonant Landscapes, Tate Carson and Cater Gordon

    Link

    Risk preferences, responsibility, and self-monitoring in a Stag Hunt, Robert Girtz, Joshua Hill, and Mark Owens

    PDF

    Science at Dakota State University, Vaille Swenson, Michael Gaylor, Blake Ushijima, and Patrick Videau

    PDF

    Security Analytics, Tania Williams, Omar F. El-Gayar, and Thomas H. Morris

    PDF

    Security Policy Compliance: User Acceptance Perspective, Ahmad Al-Omari, Omar F. El-Gayar, and Amit Deokar

    PDF

    Smart Electric Vehicle Charging in the Era of Internet of Vehicles, Emerging Trends, and Open Issues, Yong Wang, Bhaskar P. Rimal Dr., Cuiyu Kong, Bikrant Poudel, and Pratima Shahi

    Link

    Smartphone Security Challenges, Yong Wang, Kevin Streff, and Sonell Raman

    PDF

    SocBridge: Bridging the gap between Online Social Networks, Yong Wang and Raj Kumar Nepali

    Link

    Social Media Analysis of Modifiable Lifestyle Factors in Multiple Sclerosis, Laxmi Manasa Gorugantu, Omar El-Gayar, and Nevine Nawar

    Link

    Social Media Text Mining Framework for Drug Abuse: Development and Validation Study With an Opioid Crisis Case Analysis, Tareq Nasralah, Omar F. El-Gayar, and Yong Wang

    Link

    Social network privacy measurement and simulation, Yong Wang, Raj Kumar Nepali, and Jason Nikolai

    PDF

    Software Project Management: The Role of Modeling, Omar F. El-Gayar and Sreedhar Thota

    PDF

    Something for Every Kind of Learner: Students’ Perceptions of an Educational Recommender Study Tool, Cherie Noteboom and Alicia McNett

    Link

    SONET: A SOcial NETwork Model for Privacy Monitoring and Ranking, Yong Wang and Raj Kumar Nepali

    Link

    SOR Revisited: Partitioning and Recovering after Shrinking, Austin O'Brien, Manki Min, and Sung Y. Shin

    PDF

    Sterling named to DSU Academic Hall of Fame, Vicki Sterling

    PDF

    Student Privacy and Learning Analytics: Investigating the Application of Privacy within A Student Success Information System in Higher Education, Mary Francis, Mejai Avoseh, Karen Card, Lisa Newland, and Kevin Streff

    Link

    Studying the Relationship Between Timely and Effective Care, Preventive Care, and Patient Hospital Recommendation, Piyush Vyas, Martinson Ofori, Insu Park, Prathamesh Muzumdar, and Ganga Prasad Basyal

    PDF

    Surveying for Ophidiomyces ophidiicola, the causal agent of Snake Fungal Disease in South Dakota., Adam Peak, Brandon Daniels, and Andrew E. Sathoff

    Link

    Teaching About Asia in a Time of Pandemic, David Kenley

    PDF

    Technology Facilitation in the Rural School: An Analysis of Options, Mark Hawkes, Brad Brockmueller, and Pamela Halverson

    PDF

    Test Suite Optimization Using Machine Learning Techniques: A Comprehensive Study, Abid Mehmood, Qazi Mudassir Ilyas, Muneer Ahmad, and Zhongliang Shi

    PDF

    The Applications of Artificial Intelligence in Managing Project Processes and Targets: A Systematic Analysis, Cherie Noteboom, Martinson Ofori, and Zixing Shen

    PDF

    The Determinant of Selfless Misuse Intention and the Role of System Resilience under the Context of Disasters, Insu Park and Dheyaaldin Alsalman

    Link

    The Dynamics of Pre- and Post-purchase Service and Consumer Evaluation of Online Retailers: A Comparative Analysis of Dissonance and Disconfirmation Models*, Insu Park, Jeewon Cho, and H.Raghav Rao

    Link

    The Effect of Enterprise Crowdsourcing Systems on Employees’ Innovative Behavior and Job Performance, Vetrivadivel Vel, Insu Park, and Jun Liu

    PDF

    The Effect of Perceived IS Support for Creativity on Job Satisfaction: The Role of Effective IS Use in Virtual Workplaces, Insu Park, Jeewon Cho, and Mohammad Al-Ramahi

    Link

    The Fun of Motivation: Crossing the Threshold Concepts, Mary Francis

    PDF

    The Impact of Family Business Ownership and Involvement on Entrepreneurial Self-Identification, Ephrata Yared Feyissa and Robert Girtz

    Link

    The impact of information privacy concerns on information systems use behaviors in non-volitional surveillance contexts: A moderated mediation approach, Jeewon Cho and Insu Park

    Link

    The Impact of Organizational Culture on AI adoption and Organizational Performance: A Mixed Methods Approach, Wilfred Mutale and Omar F. El-Gayar

    PDF

    The Issues Facing Librarians and Physicians: Facilitating Quality Research in the Internet Age, Mary Francis

    Link

    The Mediation Effect of Self-Esteem on Weight and Earnings, Robert Girtz and Ronald DeBeaumont

    Link

    The Role of Enterprise Crowdsourcing Systems on Knowledge Application, Insu Park, Vetrivadivel Vel, and Jun Liu

    Link

    The role of leadership styles, organizational culture, and knowledge management in higher education institutions (HEI), Armel Djangone and Omar El-Gayar

    Link

    The Role of the Privacy Calculus and the Privacy Paradox in the Acceptance of Wearables for Health and Wellbeing, Thomas Jernejcic and Omar F. El-Gayar

    Link

    The Trajectory of Romance Scams in the U.S, LD Herrera and John Hastings

    PDF

    The Trajectory of Romance Scams in the U.S., LD Herrera and John Hastings

    PDF

    The Treatment of Privacy in Professional Codes of Ethics: An International Survey, Mary Francis

    Link

    The use of a multimedia lesson to increase novice programmers' understanding of programming array concepts, Jim McKeown

    PDF

    Toward Automated Knowledge Discovery in Case-Based Reasoning, Sherri Weitl-Harms, John Hastings, and Jay H. Powell

    PDF

    Toward Developing a Provenance Ontology for Biological Images, Jun Liu and Sudha Ram

    Link

    Toward extracting the scattering phase shift from integrated correlation functions, Peng Guo and Vladimir Gasparian

    Link

    Toward extracting the scattering phase shift from integrated correlation functions. II. A relativistic lattice field theory model, Peng Guo

    Link

    Towards Automated Policy Generation for Dynamic Access Control in the Internet of Things Control in the Internet of Thing, Yong Wang, Kaushik Ragothaman, and Srinivasulu R. Vuggumudi

    Link

    Towards improving the security of mobile systems using virtualization and isolation, Yong Wang and Jeremias Eppler

    PDF

    Towards Robust IoT Security: A Blockchain Design with Attribute-based Encryption, Bryan Ikei, Hanna Thiry, and Shengjie Xu

    Link

    Tunneling time in coupled-channel systems, Peng Guo, Vladimir Gasparian, Antonio Pérez-Garrido, and Esther Jódar

    Link

    Turning a One Campus Book Event Into a Web 2.0 Experience: The First Two Years, Mary Francis

    PDF

    Two decades of design research on lessons-learned systems: a systematic review and future research agenda, Benjamin X. Hou and Omar F. El-Gayar

    PDF

    UAV Drone Security of Control for Increased Safety-of-flight, Daniel R. Nash

    PDF

    Understanding Provider Perspectives: Catalysts and Challenges of Intelligent Clinical Decision Support Systems, Andrew Behrens

    Link

    Understanding the Semantics of Data Provenance to Support Active Conceptual Modeling, Jun Liu and Sudha Ram

    Link

    Users’ Continuance Participation in the Online Peer-to-peer Healthcare Community: A Text Mining Approach, Jun Liu and Yanyan Shang

    Link

    Using big data and network analysis to understand Wikipedia article quality, Jun Liu and Sudha Ram

    PDF

    Using Fun to Teach Rigorous Content, Mary Francis

    PDF

    Using Online Social Support to Predict Cancer Stage, Jun Liu and Sudha Ram

    Link

    Variables of Interest in Exploring the Reflective Outcomes of Network-Based Communication, Mark Hawkes

    Link

    Verifying X.509 Certificate Extensions, Michael J. Ham, Cody Welu, and Kyle Cronin

    Link

    Virtually in the Classroom, Kevin Smith and Dan Klumper

    Link

    Web Injection and Banking Trojan Malware -A Systematic Literature Review, Cherie Noteboom, Tjada Nelson, and Cory A. Nance

    Link

    Web Injection and Banking Trojan Malware -A Systematic Literature Review, Cherie Noteboom, Tjada Nelson, and Cory A. Nance

    PDF

    Weed Detection Using Lightweight Deep Learning Models with Transfer Learning and Hyperparameter Optimization, Ali Shaheen

    Link

    Weed Detection using Lightweight DL models with Transfer Learning & Hyperparameter Optimization, Ali Shaheen and Omar F. El-Gayar

    Link

    Weeding the Reference Collection: A Case Study of Collection Management, Mary Francis

    PDF

    Who Does What: Collaboration Patterns in the Wikipedia and Their Impact on Article Quality, Jun Liu and Sudha Ram

    Link

    You Look Suspicious!!: Leveraging Visible Attributes to Classify Malicious Short URLs on Twitter, Raj Kumar Nepali and Yong Wang

 
 
 

Browse

  • Collections
  • Disciplines
  • Authors

Search

Advanced Search

  • Notify me via email or RSS

Author Corner

  • Author FAQ
  • Policies & Submission Guidelines
  • Submit Research
 
Elsevier - Digital Commons

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright