The following citations represent scholarly publications attributed to Georgia Southern faculty. Visit a faculty's SelectedWorks profileto view a complete list of their works.

Only faculty with SelectedWorks profiles are included in this series. If you are a Georgia Southern faculty and would like to request a SelectedWorks profile, please fill out the SelectedWorks Profile Registration Form.

Follow

Submissions from 2018

Link

Quantum Chemical Spectral Characterization of CH2NH2+ for Remote Sensing of Titan’s Atmosphere, Russell Thackston and Ryan Fortenberry

Submissions from 2017

Link

Improving the Efficiency of Big Forensic Data Analysis Using NoSQL, Md Baitul Al Sadi, Hayden Wimmer, Lei Chen, and Kai Wang

Link

Framework and Challenges: H.265/HEVC Rate Control in Real-time Transmission over 5G Mobile Networks, Lei Chen, Ming Yang, Luguo Hao, and Danda Rawat

Link

A Framework and the Design of Secure Mobile Cloud with Smart Load Balancing, Isaac C. Cushman, Md Baitul Al Sadi, Lei Chen, and Rami Haddad

Link

Cooperative Adaptive Cruise Control of Connected and Autonomous Vehicles Subject to Input Saturation, Weinan Gao, Fernando Rios-Gutierrez, Weitian Tong, and Lei Chen

Link

Emotional Intelligence and Communication Levels in Information Technology Professionals, Michalina Hendon, Loreen Powell, and Hayden Wimmer

Link

Enhancing the Security of IoT Enabled Robotics: Protecting TurtleBot File System and Communication, Michael Horton, Lei Chen, and Biswanath Samanta

Link

Consumer Perceptions about E-Commerce- The Influence of Public Internet Trust, Lakshman Mahadevan and Jeffery Kaleta

Link

Linked Data Scientometrics in Semantic E-Science, Tom Narock and Hayden Wimmer

Link

Predicting Movie Ratings using Sentiment Analysis of Tweets, Christian Nwankwo, Hayden Wimmer, and Jie Du

Link

Parental Perceptions and Recommendations of Computing Majors: A Technology Acceptance Model Approach, Loreen Marie Powell and Hayden Wimmer

Link

Impact of Online Discussions on Web Based Assessments, Loreen M. Powell, Hayden Wimmer, Lawrence Kilgus, and Christina M. Force

Key Factors Effecting Career Choice Among Business and Information Technology Students, L. Powell, Hayden Wimmer, Christina Force, and Lawrence Kilgus

Learning Precursor Programming Skills from Free Mobile Application Development Tools, L. Powell, Hayden Wimmer, M. Hendon, and J. Choi

Link

Decision Trees and Financial Variables, Roy Rada and Hayden Wimmer

PDF

On the Security of Information Dissemination in the Internet-of-Vehicles, Danda B. Rawat, Moses Garuba, Lei Chen, and Qing Yang

Link

Enhancing Enterprise Security through Cost-effective and Highly Customizable Network Monitoring, Joshua Regenold, Kai Wang, Gary Smith, Quingzhong Liu, and Lei CHen

Link

Feeling The Stock Market: A Study In The Prediction Of Financial Markets Based On News Sentiment, Max Sorto, Cheryl L. Aasheim, and Hayden Wimmer

Link

An efficient algorithm for the determination of force constants and displacements in numerical definitions of a large, general order Taylor series expansion, Russell Thackston and Ryan Fortenberry

Link

Toward the laboratory identification of the not-so-simple NS2 neutral and anion isomers, Russell Thackston, Ryan Fortenberry, Joseph Francisco, and Timothy Lee

Link

Smart and Private Social Activity Invitation Framework Based on Historical Data from Smart Devices, Weitian Tong, Scott Buglass, Jeffery Li, Lei Chen, and Chunyu Ai

PDF

An Advanced Private Social Activity Invitation Framework with Friendship Protection, Weitian Tong, Lei Chen, Scott Buglass, and Weinan Gao

Link

Disentangle Crime Hot Spots and Displacements in Space and Time: an Analysis for Chicago From 2001 to 2016, Kai Wang, Xiaolu Zhou, and Lixin Li

Link

Examining Factors That Influence Intent to Adopt Data Science, Hayden Wimmer and Cheryl L. Aasheim

Link

Improving Course Assessment via Web-Based Homework, Hayden Wimmer, Loreen Powell, Lawrence Kilgus, and Christina Force

Submissions from 2016

Link

Detecting Unprotected Voice over IP Traffic, Leonardo Carvajal, Lei Chen, Cihan Varol, and Danda Rawat

Link

Investigating the Security and Digital Forensics of Video Games and Gaming Systems: a Study of PC Games and PS4 Console, Lei Chen, Narasimha Shashidhar, Danda Rawat, Ming Yang, and Christopher A. Kadlec

Link

Designing Hybrid Cloud Computing Framework using OpenStack for Supporting Multimedia with Security and Privacy, Isaac Cushman, Lei Chen, Danda Rawat, and Nhien-An Le-Khac

Link

Performance Evaluation of Vehicular Ad Hoc Networks for Rapid Respond Traffic Information Delivery, Isaac J. Cushman, Danda B. Rawat, and Lei Chen

Link

Adaptive Threshold-based RF Spectrum Scanning Through Joint Energy and Bandwidth Detection with USRPs in Cognitive Sensor Networks for ROAR Architecture, Isaac Cushman, Ashraf Younis, Danda Rawat, and Lei Chen

Link

The Use of Accounting Screens for Separating Winners From Losers Among the S&P 500 Stocks, Victoria Greyfman, Hayden Wimmer, and Roy Rada

Link

An Exploration of Using Twitter Data to Predict the Results of the U.S. Primary Elections, Jeffery Kaleta and Hayden Wimmer

Link

"Hour of Code”: Can It Change Students’ Attitudes Toward Programming?, Jie Liu, Hayden Wimmer, and Roy Rada

Link

IPv6 Security and Forensics, Vincent Nicolls, Nhien-An Le-Khac, Lei Chen, and Mark Scanlon

Link

Teaching Real-Time Streaming Analytics with Microsoft Azure and Power BI, Loreen Powell, Hayden Wimmer, and Ekene Micheal Nwobodo

Link

Improving Real-Time Data Streaming Security to Promote Patient and Physician Socialization, Hitesh Sachdev, Hayden Wimmer, and Lei Chen

Link

A Technical Infrastructure to Integrate Dynamics AX ERP and CRM Into University Curriculum, Hayden Wimmer and Kenneth Hall

Link

Principle Component Analysis for Feature Reduction and Data Preprocessing in Data Science, Hayden Wimmer and Loreen Powell

Link

A Comparison of Open Source Tools for Data Science, Hayden Wimmer and Loreen Marie Powell

Link

A Multi-Agent System to Support Evidence Based Medicine and Clinical Decision Making via Data Sharing and Data Privacy, Hayden Wimmer, Victoria Y. Yoon, and Vijayan Sugumaran

Link

A Routing Algorithm with Path Randomization for Enhanced Security and Balanced Energy Consumption, David C. Yuan and Lei Chen

Submissions from 2015

Integrating ERP and CRM into the University Curriculum with Microsoft Dynamics AX and CRM, K. Hall and Hayden Wimmer

Evaluating the Effects of Content Reinforcement, L. C. Kilgus, Hayden Wimmer, and L. M. Powell

PDF

A Method to Detect AAC Audio Forgery, Qingzhong Liu, Andrew Sung, Lei Chen, Ming Yang, Zhongxue Chen, Yanxin Liu, and Jing Zhang

PDF

Cloud Storage Client Application Analysis, Rakesh Malik, Narasimha Shashidhar, and Lei Chen

Link

Analysis of Evidence in Cloud Storage Client Applications on the Windows Platform, R. Malik, N. Shashidhar, and Lei Chen

Link

Cloud Storage Client Application Evidence Analysis on UNIX/Linux, R. Malik, N. Shashidhar, and Lei Chen

Link

In-Depth Analysis of Computer Memory Acquisition Software for Forensic Purposes, Robert J. McDown, Cihan Varol, Leonardo Carvajal, and Lei Chen

Link

Cross-Culture Management: An Empirical Examination on Task and Relationship Orientations of German and Omani, Lam D. Nguyen, Que T.N. Nguyen, Hayden Wimmer, and Loreen Powell

Link

Scalable Multipartite Subgraph Enumeration for Integrative Analysis of Heterogeneous Experimental Functional Genomics Data, Charles A. Phillips, Kai Wang, Jason Bubier, Erich J. Baker, Elissa J. Chesler, and Michael A. Langston

Link

Evaluating the Effectiveness of Self-Created Student Screencasts as a Tool to Increase Student Learning Outcomes in a Hands-On Computer Programming Course, Loreen Marie Powell and Hayden Wimmer

Link

Evaluating the Effectiveness of Student Group Work for Mobile Application Development Learning, Productivity, Enjoyment and Confidence in Quality, Loreen M. Powell and Hayden Wimmer

PDF

An Indistinguishability Model for Evaluating Diverse Classes of Phishing Attacks and Quantifying Attack Efficacy, Narasimha Shashidhar and Lei Chen

Link

Secure P2P Patch Dissemination in a Race Against Topological Worms, Narasimha Shashidhar and Lei Chen

Link

Good Versus Bad Knowledge: Ontology Guided Evolutionary Algorithms, Hayden Wimmer and Roy Rada

Link

Leveraging Technology to Improve Intent to Purchase, Hayden Wimmer and Victoria Yoon

Link

Ranking of Financial Ratios, Aimao Zhang and Scott N. Kersey

Submissions from 2013

Big Data and Data Science: An Academic Program Proposal, Cheryl L. Aasheim

Curriculum Recommendations for Information Technology Related Degrees, Cheryl L. Aasheim and Lixin Li

PDF

Development and Testing of a Survey Instrument to Assess Ethical Perceptions of IT and IS Students, Omosalewa Aderonmu, Cheryl L. Aasheim, and Paige Rutner

Submissions from 2012

Link

Knowledge and Skill Requirements for Entry-Level IT Workers: A Longitudinal Survey, Cheryl L. Aasheim, Lixin Li, Jordan D. Shropshire, and Christopher A. Kadlec

PDF

Attitudes on Plagiarism in Programming Courses: Results from a Survey on Student Perceptions, Cheryl L. Aasheim, Paige Rutner, and Lixin Li

Link

Plagiarism and Programming: A Survey of Student Attitudes, Cheryl L. Aasheim, Paige S. Rutner, Lixin Li, and Susan R. Williams

Submissions from 2011

Exploring Student Attitudes Towards Plagiarism: Does the Type of Work Matter, Cheryl L. Aasheim, Lixin Li, and Paige Rutner

PDF

IT Program Curriculum Recommendations Based on a Survey of Knowledge and Skill Requirements for Entry-Level IT Workers, Cheryl L. Aasheim, Lixin Li, Jordan D. Shropshire, and Christopher A. Kadlec

Link

Academic Success Factors: An IT Student Perspective, Aimao Zhang and Cheryl L. Aasheim

Submissions from 2010

A Survey of Student Attitudes on Plagiarism in Programming Courses, Cheryl L. Aasheim, Lixin Li, Paige Rutner, and Susan R. Williams

Academic Success Factors for Information Technology Students, Cheryl L. Aasheim, Aimao Zhang, and Susan R. Williams

Submissions from 2009

Act, Don't React: A Case on Operational Risk Management in Banking, B. L. Aasheim, Cheryl L. Aasheim, and Susan R. Williams

Link

Knowledge and Skill Requirements for Information Technology Graduates: A Comparison of Industry and Academia, Cheryl L. Aasheim, Lixin Li, and Susan R. Williams

PDF

Knowledge and Skill Requirements for Entry-Level Information Technology Workers: Do Employers in the IT Industry View These Differently than Employers in Other Industries?, Cheryl L. Aasheim and Susan R. Williams

Link

Knowledge and Skill Requirements for IT Graduates, Cheryl L. Aasheim, Susan R. Williams, and Eulous Sonny Butler

Implementing Imaging Technology in Graduate Admissions at Georgia Southern University, Cheryl L. Aasheim, Susan R. Williams, J. Kemp, T. Williams, and L. Spence