About this Collection

The publications archived in this Georgia Southern Commons collection are produced by the faculty of the Department of Information Technology.

Faculty Research in Georgia Southern Commons

Georgia Southern University faculty members are eligible to showcase their research in GS Commons and to join the Expert Gallery hosted by the University Libraries. Their intellectual and creative works are accessible through galleries organized by College, Department, Research Center, and a customized SelectedWorks researcher profile.

We invite and encourage Georgia Southern faculty members to sign up to Join the Expert Gallery!

Publishing Information

GS Commons is an open-access digital repository. Copyright and licensing agreements for works published by GS Commons protect the author's rights while facilitating the sharing of research. The works in this gallery were originally published or presented under agreements with entities external to this repository. Records for each work provide the access permitted by the original copyright and licensing agreement. For additional access or questions about a work, please contact the authors or email the GS Commons team.

Follow


Submissions from 2017

PDF

On the Security of Information Dissemination in the Internet-of-Vehicles, Danda B. Rawat, Moses Garuba, Lei Chen, and Qing Yang

Link

Enhancing Enterprise Security through Cost-Effective and Highly Customizable Network Monitoring, Joshua Regenold, Kai Wang, Gary Smith, Quingzhong Liu, and Lei Chen

Link

Feeling The Stock Market: A Study in the Prediction of Financial Markets Based on News Sentiment, Max Sorto, Cheryl L. Aasheim, and Hayden Wimmer

Link

An efficient algorithm for the determination of force constants and displacements in numerical definitions of a large, general order Taylor series expansion, Russell Thackston and Ryan C. Fortenberry

Link

Toward the laboratory identification of the not-so-simple NS2 neutral and anion isomers, Russell Thackston, Ryan Fortenberry, Joseph S. Francisco, and Timothy J. Lee

PDF

An Advanced Private Social Activity Invitation Framework with Friendship Protection, Weitian Tong, Lei Chen, Scott Buglass, and Weinan Gao

Link

Disentangle Crime Hot Spots and Displacements in Space and Time: An Analysis for Chicago From 2001 to 2016, Kai Wang, Xiaolu Zhou, and Lixin Li

Link

Examining Factors that Influence Intent to Adopt Data Science, Hayden Wimmer and Cheryl L. Aasheim

Link

Improving Course Assessment via Web-Based Homework, Hayden Wimmer, Loreen Marie Powell, Lawrence Kilgus, and Christina Force

Link

Evaluation of Predictive Analytic Techniques in Healthcare Research: A PRISMA Style Review, Hayden Wimmer, Carl M. Rebmann Jr., and Queen E. Booker

Link

Counterfeit Product Detection: Bridging the Gap between Design Science and Behavioral Science in Information Systems Research, Hayden Wimmer and V. Yoon

Submissions from 2016

Link

Detecting Unprotected SIP-Based Voice over IP Traffic, Leonardo Carvajal, Lei Chen, Cihan Varol, and Danda Rawat

Link

Investigating the Security and Digital Forensics of Video Games and Gaming Systems: a Study of PC Games and PS4 Console, Lei Chen, Narasimha Shashidhar, Danda Rawat, Ming Yang, and Christopher A. Kadlec

Link

Designing Hybrid Cloud Computing Framework using OpenStack for Supporting Multimedia with Security and Privacy, Isaac J. Cushman, Lei Chen, Danda Rawat, and Nhien-An Le-Khac

Link

Performance Evaluation of Vehicular Ad Hoc Networks for Rapid Response Traffic Information Delivery, Isaac J. Cushman, Danda B. Rawat, Lei Chen, and Qing Yang

Link

Adaptive Threshold-Based RF Spectrum Scanning Through Joint Energy and Bandwidth Detection with USRPs in Cognitive Sensor Networks for ROAR Architecture, Isaac J. Cushman, Ashraf Younis, Danda Rawat, and Lei Chen

PDF

"Hour of Code”: Can It Change Students’ Attitudes Toward Programming?, Jie Du, Hayden Wimmer, and Roy Rada

Link

The Use of Accounting Screens for Separating Winners From Losers Among the S&P 500 Stocks, Victoria Greyfman, Hayden Wimmer, and Roy Rada

Link

An Exploration of Using Twitter Data to Predict the Results of the U.S. Primary Elections, Jeffrey P. Kaleta and Hayden Wimmer

Link

IPv6 Security and Forensics, Vincent Nicolls, Nhien-An Le-Khac, Lei Chen, and Mark Scanlon

Link

Teaching Real-Time Streaming Analytics with Microsoft Azure and Power BI, Loreen Powell, Hayden Wimmer, and Ekene Micheal Nwobodo

Link

Improving Real-Time Data Streaming Security to Promote Patient and Physician Socialization, Hitesh Sachdev, Hayden Wimmer, and Lei Chen

Link

A Technical Infrastructure to Integrate Dynamics AX ERP and CRM Into University Curriculum, Hayden Wimmer and Kenneth Hall

Link

Principle Component Analysis for Feature Reduction and Data Preprocessing in Data Science, Hayden Wimmer and Loreen Powell

Link

A Comparison of Open Source Tools for Data Science, Hayden Wimmer and Loreen Marie Powell

Link

A Multi-Agent System to Support Evidence Based Medicine and Clinical Decision Making via Data Sharing and Data Privacy, Hayden Wimmer, Victoria Y. Yoon, and Vijayan Sugumaran

Link

A Routing Algorithm with Path Randomization for Enhanced Security and Balanced Energy Consumption, David C. Yuan and Lei Chen

Submissions from 2015

Link

Data Analytics vs. Data Science: A Study of Similarities and Differences in Undergraduate Programs Based on Course Descriptions, Cheryl L. Aasheim, Paige S. Rutner, Susan Williams, and Adrian Gardiner

Link

Optimal cloud use of quartic force fields: The first purely commercial cloud computing based study for rovibrational analysis of SiCH−, Ryan C. Fortenberry and Russell Thackston

Link

Integrating ERP and CRM into the University Curriculum with Microsoft Dynamics AX and CRM, Kenneth D. Hall and Hayden Wimmer

Link

Evaluating the Effects of Content Reinforcement, Lawrence C. Kilgus, Hayden Wimmer, and Loreen Powell

PDF

A Method to Detect AAC Audio Forgery, Qingzhong Liu, Andrew Sung, Lei Chen, Ming Yang, Zhongxue Chen, Yanxin Liu, and Jing Zhang

Link

Analysis of Evidence in Cloud Storage Client Applications on the Windows Platform, Rakesh Malik, Narasimha Shashidhar, and Lei Chen

PDF

Cloud Storage Client Application Analysis, Rakesh Malik, Narasimha Shashidhar, and Lei Chen

Link

Cloud Storage Client Application Evidence Analysis on UNIX/Linux, Rakesh Malik, Narasimha Shashidhar, and Lei Chen

Link

In-Depth Analysis of Computer Memory Acquisition Software for Forensic Purposes, Robert J. McDown, Cihan Varol, Leonardo Carvajal, and Lei Chen

Link

Cross-Culture Management: An Empirical Examination on Task and Relationship Orientations of German and Omani, Lam D. Nguyen, Que T.N. Nguyen, Hayden Wimmer, and Loreen Marie Powell

Link

Scalable Multipartite Subgraph Enumeration for Integrative Analysis of Heterogeneous Experimental Functional Genomics Data, Charles A. Phillips, Kai Wang, Jason Bubier, Erich J. Baker, Elissa J. Chesler, and Michael A. Langston

Link

Evaluating the Effectiveness of Self-Created Student Screencasts as a Tool to Increase Student Learning Outcomes in a Hands-On Computer Programming Course, Loreen Marie Powell and Hayden Wimmer

Link

Evaluating the Effectiveness of Student Group Work for Mobile Application Development Learning, Productivity, Enjoyment and Confidence in Quality, Loreen M. Powell and Hayden Wimmer

PDF

An Indistinguishability Model for Evaluating Diverse Classes of Phishing Attacks and Quantifying Attack Efficacy, Narasimha Shashidhar and Lei Chen

Link

Secure P2P Patch Dissemination in a Race Against Topological Worms, Narasimha Shashidhar and Lei Chen

Link

Transforming a LAN Party into a Classroom, Russell F. Thackston and Christopher A. Kadlec

Link

High Performance Computing: Considerations When Deciding To Rent Or Buy, Russell Thackston and Ryan C. Fortenberry

Link

The Performance of Low-Cost Commercial Cloud Computing as an Alternative in Computational Chemistry, Russell Thackston and Ryan C. Fortenberry

Link

Good Versus Bad Knowledge: Ontology Guided Evolutionary Algorithms, Hayden Wimmer and Roy Rada

Link

Leveraging Technology to Improve Intent to Purchase, Hayden Wimmer and Victoria Yoon

Link

Ranking of Financial Ratios, Aimao Zhang and Scott N. Kersey

Submissions from 2014

Link

Big Data Analytics and Data Science Undergraduate Degree Programs, Cheryl L. Aasheim, Paige Rutner, Susan Williams, and Adrian Gardiner

Submissions from 2012

Link

Knowledge and Skill Requirements for Entry-Level IT Workers: A Longitudinal Survey, Cheryl L. Aasheim, Lixin Li, Jordan D. Shropshire, and Christopher A. Kadlec

Attitudes on Plagiarism in Programming Courses: Results from a Survey on Student Perceptions, Cheryl L. Aasheim, Paige Rutner, and Lixin Li

Link

Plagiarism and Programming: A Survey of Student Attitudes, Cheryl L. Aasheim, Paige S. Rutner, Lixin Li, and Susan R. Williams

Submissions from 2011

Exploring Student Attitudes Towards Plagiarism: Does the Type of Work Matter, Cheryl L. Aasheim, Lixin Li, and Paige Rutner

PDF

IT Program Curriculum Recommendations Based on a Survey of Knowledge and Skill Requirements for Entry-Level IT Workers, Cheryl L. Aasheim, Lixin Li, Jordan D. Shropshire, and Christopher A. Kadlec

Link

Academic Success Factors: An IT Student Perspective, Aimao Zhang and Cheryl L. Aasheim

Submissions from 2010

Link

A Survey of Student Attitudes on Plagiarism in Programming Courses, Cheryl L. Aasheim, Lixin Li, Paige Rutner, and Susan R. Williams

Academic Success Factors for Information Technology Students, Cheryl L. Aasheim, Aimao Zhang, and Susan Rebstock Williams

Submissions from 2009

Link

Act, Don't React: A Case on Operational Risk Management in Banking, Bryan L. Aasheim, Cheryl L. Aasheim, and Susan R. Williams

Link

Knowledge and Skill Requirements for Information Technology Graduates: A Comparison of Industry and Academia, Cheryl L. Aasheim, Lixin Li, and Susan R. Williams

PDF

Knowledge and Skill Requirements for Entry-Level Information Technology Workers: Do Employers in the IT Industry View These Differently than Employers in Other Industries?, Cheryl L. Aasheim and Susan R. Williams

Link

Knowledge and Skill Requirements for IT Graduates, Cheryl L. Aasheim, Susan R. Williams, and Eulous Sonny Butler

Link

Implementing Imaging Technology in Graduate Admissions at Georgia Southern University, Cheryl L. Aasheim, Susan R. Williams, Jody Kemp, Ted Williams, and Lisa Spence

Submissions from 2008

Link

Curriculum Recommendations for Information Technology Related Degrees, Cheryl L. Aasheim and Lixin Li

Submissions from 2007

Link

Establishing an Assessment Process for a Computing Program, Cheryl L. Aasheim, Timothy A. Gowan, and Han Reichgelt

Knowledge and Skill Requirements for IT/IS Graduates, E. Sonny Butler, Cheryl L. Aasheim, and Susan R. Williams

Link

Does Telecommuting Improve Productivity?, Sonny Butler, Cheryl L. Aasheim, and Susan Rebstock Williams

Submissions from 2006

Establishing an Assessment Process for a Computing Program, Cheryl L. Aasheim, J. Art Gowan, and Han Reichgelt

Link

Scanning World Wide Web Documents with the Vector Space Model, Cheryl L. Aasheim and Gary J. Koehler

PDF

An Implementation of the IT Fundamentals Knowledge Area in an Introductory IT Course, Cheryl L. Aasheim, Choong Kwon Lee, and Han Reichgelt

Submissions from 2005

Online Shopping Habits of Consumers in Southeast Georgia, Cheryl L. Aasheim and E. Sonny Butler

Link

Implementing the IT Fundamentals Knowledge Area, Cheryl L. Aasheim, J. Art Gowan, and Han Reichgelt

Link

Measuring the Impact of Global Information Technology Applications, James Whitworth, Susan Rebstock Williams, Prashant C. Palvia, and Cheryl L. Aasheim

Link

Information Technology in the Practice of Law Enforcement, Susan Rebstock Williams and Cheryl L. Aasheim

Submissions from 2004

Link

Mining Message Board Content on the World Wide Web for Organizational Information, Cheryl L. Aasheim and Gary J. Koehler

A Study of Internet Access and Usage by Georgia High School Students, 15th Annual National Youth-at-Risk Conference, E. Sonny Butler, Cheryl L. Aasheim, and Susan Rebstock Williams

Internet Usage for College-Bound GA High School, E. Sonny Butler, Cheryl L. Aasheim, and Susan Rebstock Williams

Link

Using a Trait Approach to Analyze the Impact of Global Information Technology Applications, Prashant C. Palvia, James Whitworth, Susan R. Williams, and Cheryl L. Aasheim

The Impact of the Internet on Business and Consumers in the Retail Industry, Manouchehr Tabatabaei, Sonny Butler, and Cheryl L. Aasheim

Submissions from 2003

Information Technology and Other Factors in Physician Selection, E. Sonny Butler and Cheryl L. Aasheim