The publications archived in this Digital Commons@Georgia Southern collection are produced by the faculty of the Department of Information Technology.

Additional Instructions for Screen Reader Users

The Readership Activity Map feature further down the page presents a real time interactive world map with pins indicating where documents from our collection have been downloaded recently. Begin reading after the Zoom buttons to find additional real time statistics.

Follow


Submissions from 2020

Link

An International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records, Faith Aliyu, Hayden Wimmer, Loreen Marie Powell, and Carl Rebman

Link

A Comparative Analysis of Business and Non-business Students Awareness of IoT Devices and Security Practices: An Exploratory Study, Queen Booker, Carl Rebman, and Hayden Wimmer

Link

A Practical Low-Cost Security Solution for Log Management and File Integrity Monitoring, Lei Chen, Ming Yang, Hayden Wimmer, and Brittany Wilbert

Predictive Analytics using Machine Learning for Electronic Health Records, Arjumand Fatima, Hayden Wimmer, and Cheryl L. Aasheim

Link

Artificial Intelligence Facial Expression Recognition for Emotion Detection: Performance and Acceptance, Annu George, Hayden Wimmer, and Carl Rebman

Link

Hands-on Lab on Smart City Vulnerability Exploitation, Andrew Gomez, Hossain Shahriar, Victor Clincy, and Atef Shalan

Link

An Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources, Kyle Herman, Hayden Wimmer, and Carl Rebman

Crosswalking Electronic Thesis Dissertations Metadata Towards an Integrated Library Database, Kyle Herman, Hayden Wimmer, and Carl M. Rebman Jr

Link

PPTP VPN: An Analysis of the Effects of a DDoS Attack, Joshua Jones, Hayden Wimmer, and Rami Haddad

Link

Defense and Analysis of Hijacking User Login Credentials via Remote Code Execution and Raspberry PI, Patel Nishitkumar, Hayden Wimmer, and Loreen Marie Powell

Link

Defense and Analysis of Hijacking User Login Credentials via Remote Code Execution and Raspberry PI, Patel Nishitkumar, Hayden Wimmer, and Loreen Marie Powell

Link

Text Classification of Digital Forensic Data, Chrisitan Sunday Nwankwo, Hayden Wimmer, Lei Chen, and Jongyeop Kim

Link

Penetration Testing of the Amazon Echo Digital Voice Assistant Using a Denial-of-Service Attack, Johnathan Dain Overstreet, Hayden Wimmer, and Rami Haddad

Link

PHPBB3 Bulletin Board Security Testing, Nishitkumar Patel, Hayden Wimmer, and Loreen Marie Powell

Improving the Predictive Performance of the c4.5 Decision Tree Algorithm for Categorical Medical Data, Shaikh Shiam Rahman, Hayden Wimmer, and Carl Rebman

Link

Pandemic Shift: Impact of Covid-19 on IS/Microsoft Office Specialist Excel Certification Exam Classes: Remote Testing and Lessons Learned, Carl Rebman, Gwendolyn White, Hayden Wimmer, Loreen Marie Powell, and Queen Booker

Link

Enhancing Proactive Control Mobile and Web Software Security Education with Hands-on Labware, Hossain Shahriar, Kai Qian, Atef Shalan, and Fan Wu

Link

Barriers and Drivers to Adoption of Cloud Infrastructure Services: A Security, Michael Towsend, Hayden Wimmer, and Jei Du

Submissions from 2019

Link

Effects of Normalization Techniques on Logistic Regression in Data Science, Nureni Adekunle Adeyemo, Hayden Wimmer, and Loreen Powell

Link

Cyber-Security Instructional Technology Design, Billy Carrie, Hayden Wimmer, Loreen Marie Powell, and Carl Rebman

Link

Hour of Code: A Study of Gender Differences in Computing, Jei Du and Hayden Wimmer

Link

Impact of Hour of Code: A Five Year Study, Jei Du and Hayden Wimmer

Link

Examining a Deep Learning Network System for Image Identification and Classification for Preventing Unauthorized Access for a Smart Home Security System, Beloved Egbedion, Hayden Wimmer, Carl Rebman, and Loreen Marie Powell

An Exploratory Study on Variances in Perceptions of Smart Home Technologies, Thomas Mendoza, Hayden Wimmer, and Carl Rebman

Link

Learner Security & Privacy Risks: How Usage of Online Social Media Outside a Learning Management Systems Affects Learners’ Digital Identity, Loreen Powell, Hayden Wimmer, Carl Rebman, and Chaza Abdul al

Link

Knowledge Portals: A Review, Hayden Wimmer, Jie Du, and Roy Rada

Submissions from 2018

Link

Effects of Normalization Techniques on Logistic Regression in Data Science, Nureni Adekunle Adeyemo, Hayden Wimmer, and Loreen Marie Powell

Link

Using Geodesic Acceleration with LevMar to Maximize Smart Home Energy Management, Queen E. Booker, Fred L. Kitchens, Hayden Wimmer, and Carl Rebman

Link

Using Ann with Geodesic Acceleration to Maximize Smart Energy Management, Queen E. Booker, Carl Rebman, Hayden Wimmer, and Fred L. Kitchens

Link

Electronic Emergency Medical Technician Reports –Testing A Perception Of A Prototype, Smiljana Cuk, Hayden Wimmer, and Loreen Powell

Link

Exposing The Tor Failures On Mobile Devices Using Paraben’s E3:Ds Technology, Ton H. Don, Hayden Wimmer, Lei Chen, and Queen E. Booker

Link

Diving Into the Darknet: Using Tableau to Shed Some Light On Data Analysis, Ton H. Don, Hayden Wimmer, C. Rebmann, and S. Scheidt

Link

Hour of Code: A Case Study, Jie Du, Hayden Wimmer, and Roy Rada

Building an Application for Custom Mobile Medication Reminders In Healthcare: An Exploratory Study, Beloved Egbedion, Hayden Wimmer, Carl M. Rebman Jr, and Loreen Marie Powell

Link

Skill Requirements in Big Data: A Content Analysis of Job Advertisements, Adrian Gardiner, Cheryl L. Aasheim, Paige Rutner, and Susan Rebstock Williams

Link

Twitter Sentiment Toward Autism During Autism Awareness Month, Jeffrey P. Kaleta, Jingjing Yin, and Sushmita Khan

Link

Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP, Olajide Ojagbule, Hayden Wimmer, and Rami Haddad

Link

Trends in Gerotechnology: A Literature Review, R. Rada, Jie Du, and Hayden Wimmer

Link

Analyzing Data from an Android Smartphone while Comparing between Two Forensic Tools, Majeed Kayode Raji, Hayden Wimmer, and Rami Haddad

Link

A Nationwide Exploratory Study on Faculty Opinions on Student Preparation, Performance, and Evaluations, Carl Rebman, Hayden Wimmer, and Queen Booker

Link

A Digital Forensic Tool for Mobile Devices: Paraben, Hitesh Sachdev, Hayden Wimmer, and Lei Chen

PDF

A New Framework for Securing, Extracting and Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, and Carl Rebman

Link

Quantum chemical spectral characterization of CH2NH2+ for remote sensing of Titan’s atmosphere, Russell Thackston and Ryan C. Fortenberry

Link

Using Twitter Sentiment Analysis to Analyze Self-Sentiment of the POTUS, Gwen White, Hayden Wimmer, Carl Rebman, and Chrisitan Sunday Nwankwo

PDF

Ontologies and the Semantic Web for Digital Investigation Tool Selection, Hayden Wimmer, Lei Chen, and Tom Narock

Link

Applying Artificial Intelligence to Financial Investing, Hayden Wimmer and Roy Rada

Submissions from 2017

Link

Improving the Efficiency of Big Forensic Data Analysis Using NoSQL, Md Baitul Al Sadi, Hayden Wimmer, Lei Chen, and Kai Wang

Link

Framework and Challenges: H.265/HEVC Rate Control in Real-Time Transmission over 5G Mobile Networks, Lei Chen, Ming Yang, Luguo Hao, and Danda Rawat

Link

Problems Associated with Patient Care Reports and Transferring Data between Ambulance and Hospitals from the Perspective of Emergency Medical Technicians, Smiljana Cuk, Hayden Wimmer, and L. Powell

Link

A Framework and the Design of Secure Mobile Cloud with Smart Load Balancing, Isaac J. Cushman, Md Baitul Al Sadi, Lei Chen, and Rami Haddad

Link

Cooperative Adaptive Cruise Control of Connected and Autonomous Vehicles Subject to Input Saturation, Weinan Gao, Fernando Rios-Gutierrez, Weitian Tong, and Lei Chen

Link

Emotional Intelligence and Communication Levels in Information Technology Professionals, Michalina Hendon, Loreen Powell, and Hayden Wimmer

Link

Enhancing the Security of IoT Enabled Robotics: Protecting TurtleBot File System and Communication, Michael Horton, Lei Chen, and Biswanath Samanta

Link

Email Phishing Susceptibility in a Public School Setting: Identifying at Risk Educators, M. Horton and Hayden Wimmer

Link

Open vs. Close Source Decision Tree Algorithms: Comparing Performance Measures of Accuracy, Sensitivity and Specificity, S. Khan, Hayden Wimmer, and L. Powell

Link

Consumer Perceptions about E-Commerce – The Influence of Public Internet Trust, Lakshman Mahadevan and Jeffrey P. Kaleta

Link

Linked Data Scientometrics in Semantic E-Science, Tom Narock and Hayden Wimmer

Link

Predicting Movie Ratings using Sentiment Analysis of Tweets, Christian Nwankwo, Hayden Wimmer, and Jie Du

Link

The Need for an Emotional Intelligence for Information Technology Course: Framework for Educators and Academic Institutions, L. Powell, M. Hendon, and Hayden Wimmer

Link

Parental Perceptions and Recommendations of Computing Majors: A Technology Acceptance Model Approach, Loreen Marie Powell and Hayden Wimmer

Link

Impact of Online Discussions on Web Based Assessments, Loreen M. Powell, Hayden Wimmer, Lawrence Kilgus, and Christina M. Force

Key Factors Effecting Career Choice Among Business and Information Technology Students, Loreen Powell, Hayden Wimmer, Christina Force, and Lawrence Kilgus

Key Factors Effecting Career Choice Among Business and Information Technology Students, Loreen Powell, Hayden Wimmer, Christina M. Force, and Lawrence C. Kilgus

Learning Precursor Programming Skills from Free Mobile Application Development Tools, Loreen Powell, Hayden Wimmer, Michalina Hendon, and Jongsoo Choi

Learning Precursor Programming Skills from Free Mobile Application Development Tools, Loreen Powell, Hayden Wimmer, Michalina Hendon, and Jongsoo Choi

Link

Decision Trees and Financial Variables, Roy Rada and Hayden Wimmer

PDF

On the Security of Information Dissemination in the Internet-of-Vehicles, Danda B. Rawat, Moses Garuba, Lei Chen, and Qing Yang

Link

Enhancing Enterprise Security through Cost-Effective and Highly Customizable Network Monitoring, Joshua Regenold, Kai Wang, Gary Smith, Quingzhong Liu, and Lei Chen

Link

Feeling The Stock Market: A Study in the Prediction of Financial Markets Based on News Sentiment, Max Sorto, Cheryl L. Aasheim, and Hayden Wimmer

Link

An efficient algorithm for the determination of force constants and displacements in numerical definitions of a large, general order Taylor series expansion, Russell Thackston and Ryan C. Fortenberry

Link

Toward the laboratory identification of the not-so-simple NS2 neutral and anion isomers, Russell Thackston, Ryan Fortenberry, Joseph S. Francisco, and Timothy J. Lee

PDF

An Advanced Private Social Activity Invitation Framework with Friendship Protection, Weitian Tong, Lei Chen, Scott Buglass, and Weinan Gao

Link

Disentangle Crime Hot Spots and Displacements in Space and Time: An Analysis for Chicago From 2001 to 2016, Kai Wang, Xiaolu Zhou, and Lixin Li

Link

Examining Factors that Influence Intent to Adopt Data Science, Hayden Wimmer and Cheryl L. Aasheim

Link

Improving Course Assessment via Web-Based Homework, Hayden Wimmer, Loreen Powell, Lawrence Kilgus, and Christina Force

Link

Evaluation of Predictive Analytic Techniques in Healthcare Research: A PRISMA Style Review, Hayden Wimmer, Carl M. Rebmann Jr., and Queen E. Booker

Link

Counterfeit Product Detection: Bridging the Gap between Design Science and Behavioral Science in Information Systems Research, Hayden Wimmer and V. Yoon

Submissions from 2016

Link

Detecting Unprotected SIP-Based Voice over IP Traffic, Leonardo Carvajal, Lei Chen, Cihan Varol, and Danda Rawat

Link

Investigating the Security and Digital Forensics of Video Games and Gaming Systems: a Study of PC Games and PS4 Console, Lei Chen, Narasimha Shashidhar, Danda Rawat, Ming Yang, and Christopher A. Kadlec

Link

Designing Hybrid Cloud Computing Framework using OpenStack for Supporting Multimedia with Security and Privacy, Isaac J. Cushman, Lei Chen, Danda Rawat, and Nhien-An Le-Khac

Link

Performance Evaluation of Vehicular Ad Hoc Networks for Rapid Response Traffic Information Delivery, Isaac J. Cushman, Danda B. Rawat, Lei Chen, and Qing Yang

Link

Adaptive Threshold-Based RF Spectrum Scanning Through Joint Energy and Bandwidth Detection with USRPs in Cognitive Sensor Networks for ROAR Architecture, Isaac J. Cushman, Ashraf Younis, Danda Rawat, and Lei Chen

PDF

"Hour of Code”: Can It Change Students’ Attitudes Toward Programming?, Jie Du, Hayden Wimmer, and Roy Rada

Link

The Use of Accounting Screens for Separating Winners From Losers Among the S&P 500 Stocks, Victoria Greyfman, Hayden Wimmer, and Roy Rada

Link

An Exploration of Using Twitter Data to Predict the Results of the U.S. Primary Elections, Jeffrey P. Kaleta and Hayden Wimmer

Link

IPv6 Security and Forensics, Vincent Nicolls, Nhien-An Le-Khac, Lei Chen, and Mark Scanlon

Link

Teaching Real-Time Streaming Analytics with Microsoft Azure and Power BI, Loreen Powell, Hayden Wimmer, and Ekene Micheal Nwobodo

Link

Improving Real-Time Data Streaming Security to Promote Patient and Physician Socialization, Hitesh Sachdev, Hayden Wimmer, and Lei Chen

Link

A Technical Infrastructure to Integrate Dynamics AX ERP and CRM Into University Curriculum, Hayden Wimmer and Kenneth Hall

Link

Principle Component Analysis for Feature Reduction and Data Preprocessing in Data Science, Hayden Wimmer and Loreen Powell

Link

A Comparison of Open Source Tools for Data Science, Hayden Wimmer and Loreen Marie Powell

Link

A Multi-Agent System to Support Evidence Based Medicine and Clinical Decision Making via Data Sharing and Data Privacy, Hayden Wimmer, Victoria Y. Yoon, and Vijayan Sugumaran

Link

A Routing Algorithm with Path Randomization for Enhanced Security and Balanced Energy Consumption, David C. Yuan and Lei Chen

Submissions from 2015

Link

Data Analytics vs. Data Science: A Study of Similarities and Differences in Undergraduate Programs Based on Course Descriptions, Cheryl L. Aasheim, Paige S. Rutner, Susan Williams, and Adrian Gardiner

Link

Optimal cloud use of quartic force fields: The first purely commercial cloud computing based study for rovibrational analysis of SiCH−, Ryan C. Fortenberry and Russell Thackston

Link

Integrating ERP and CRM into the University Curriculum with Microsoft Dynamics AX and CRM, Kenneth D. Hall and Hayden Wimmer

Link

Evaluating the Effects of Content Reinforcement, Lawrence C. Kilgus, Hayden Wimmer, and Loreen Powell

PDF

A Method to Detect AAC Audio Forgery, Qingzhong Liu, Andrew Sung, Lei Chen, Ming Yang, Zhongxue Chen, Yanxin Liu, and Jing Zhang