About this Collection
The publications archived in this Georgia Southern Commons collection are produced by the faculty of the Department of Information Technology.
Faculty Research in Georgia Southern Commons
Georgia Southern University faculty members are eligible to showcase their research in GS Commons and to join the Expert Gallery hosted by the University Libraries. Their intellectual and creative works are accessible through galleries organized by College, Department, Research Center, and a customized SelectedWorks researcher profile.
We invite and encourage Georgia Southern faculty members to sign up to Join the Expert Gallery!
Publishing Information
GS Commons is an open-access digital repository. Copyright and licensing agreements for works published by GS Commons protect the author's rights while facilitating the sharing of research. The works in this gallery were originally published or presented under agreements with entities external to this repository. Records for each work provide the access permitted by the original copyright and licensing agreement. For additional access or questions about a work, please contact the authors or email the GS Commons team.
Submissions from 2017
On the Security of Information Dissemination in the Internet-of-Vehicles, Danda B. Rawat, Moses Garuba, Lei Chen, and Qing Yang
Enhancing Enterprise Security through Cost-Effective and Highly Customizable Network Monitoring, Joshua Regenold, Kai Wang, Gary Smith, Quingzhong Liu, and Lei Chen
Feeling The Stock Market: A Study in the Prediction of Financial Markets Based on News Sentiment, Max Sorto, Cheryl L. Aasheim, and Hayden Wimmer
An efficient algorithm for the determination of force constants and displacements in numerical definitions of a large, general order Taylor series expansion, Russell Thackston and Ryan C. Fortenberry
Toward the laboratory identification of the not-so-simple NS2 neutral and anion isomers, Russell Thackston, Ryan Fortenberry, Joseph S. Francisco, and Timothy J. Lee
An Advanced Private Social Activity Invitation Framework with Friendship Protection, Weitian Tong, Lei Chen, Scott Buglass, and Weinan Gao
Disentangle Crime Hot Spots and Displacements in Space and Time: An Analysis for Chicago From 2001 to 2016, Kai Wang, Xiaolu Zhou, and Lixin Li
Examining Factors that Influence Intent to Adopt Data Science, Hayden Wimmer and Cheryl L. Aasheim
Improving Course Assessment via Web-Based Homework, Hayden Wimmer, Loreen Marie Powell, Lawrence Kilgus, and Christina Force
Evaluation of Predictive Analytic Techniques in Healthcare Research: A PRISMA Style Review, Hayden Wimmer, Carl M. Rebmann Jr., and Queen E. Booker
Counterfeit Product Detection: Bridging the Gap between Design Science and Behavioral Science in Information Systems Research, Hayden Wimmer and V. Yoon
Submissions from 2016
Detecting Unprotected SIP-Based Voice over IP Traffic, Leonardo Carvajal, Lei Chen, Cihan Varol, and Danda Rawat
Investigating the Security and Digital Forensics of Video Games and Gaming Systems: a Study of PC Games and PS4 Console, Lei Chen, Narasimha Shashidhar, Danda Rawat, Ming Yang, and Christopher A. Kadlec
Designing Hybrid Cloud Computing Framework using OpenStack for Supporting Multimedia with Security and Privacy, Isaac J. Cushman, Lei Chen, Danda Rawat, and Nhien-An Le-Khac
Performance Evaluation of Vehicular Ad Hoc Networks for Rapid Response Traffic Information Delivery, Isaac J. Cushman, Danda B. Rawat, Lei Chen, and Qing Yang
Adaptive Threshold-Based RF Spectrum Scanning Through Joint Energy and Bandwidth Detection with USRPs in Cognitive Sensor Networks for ROAR Architecture, Isaac J. Cushman, Ashraf Younis, Danda Rawat, and Lei Chen
"Hour of Code”: Can It Change Students’ Attitudes Toward Programming?, Jie Du, Hayden Wimmer, and Roy Rada
The Use of Accounting Screens for Separating Winners From Losers Among the S&P 500 Stocks, Victoria Greyfman, Hayden Wimmer, and Roy Rada
An Exploration of Using Twitter Data to Predict the Results of the U.S. Primary Elections, Jeffrey P. Kaleta and Hayden Wimmer
IPv6 Security and Forensics, Vincent Nicolls, Nhien-An Le-Khac, Lei Chen, and Mark Scanlon
Teaching Real-Time Streaming Analytics with Microsoft Azure and Power BI, Loreen Powell, Hayden Wimmer, and Ekene Micheal Nwobodo
Improving Real-Time Data Streaming Security to Promote Patient and Physician Socialization, Hitesh Sachdev, Hayden Wimmer, and Lei Chen
A Technical Infrastructure to Integrate Dynamics AX ERP and CRM Into University Curriculum, Hayden Wimmer and Kenneth Hall
Principle Component Analysis for Feature Reduction and Data Preprocessing in Data Science, Hayden Wimmer and Loreen Powell
A Comparison of Open Source Tools for Data Science, Hayden Wimmer and Loreen Marie Powell
A Multi-Agent System to Support Evidence Based Medicine and Clinical Decision Making via Data Sharing and Data Privacy, Hayden Wimmer, Victoria Y. Yoon, and Vijayan Sugumaran
A Routing Algorithm with Path Randomization for Enhanced Security and Balanced Energy Consumption, David C. Yuan and Lei Chen
Submissions from 2015
Data Analytics vs. Data Science: A Study of Similarities and Differences in Undergraduate Programs Based on Course Descriptions, Cheryl L. Aasheim, Paige S. Rutner, Susan Williams, and Adrian Gardiner
Optimal cloud use of quartic force fields: The first purely commercial cloud computing based study for rovibrational analysis of SiCH−, Ryan C. Fortenberry and Russell Thackston
Integrating ERP and CRM into the University Curriculum with Microsoft Dynamics AX and CRM, Kenneth D. Hall and Hayden Wimmer
Evaluating the Effects of Content Reinforcement, Lawrence C. Kilgus, Hayden Wimmer, and Loreen Powell
A Method to Detect AAC Audio Forgery, Qingzhong Liu, Andrew Sung, Lei Chen, Ming Yang, Zhongxue Chen, Yanxin Liu, and Jing Zhang
Analysis of Evidence in Cloud Storage Client Applications on the Windows Platform, Rakesh Malik, Narasimha Shashidhar, and Lei Chen
Cloud Storage Client Application Analysis, Rakesh Malik, Narasimha Shashidhar, and Lei Chen
Cloud Storage Client Application Evidence Analysis on UNIX/Linux, Rakesh Malik, Narasimha Shashidhar, and Lei Chen
In-Depth Analysis of Computer Memory Acquisition Software for Forensic Purposes, Robert J. McDown, Cihan Varol, Leonardo Carvajal, and Lei Chen
Cross-Culture Management: An Empirical Examination on Task and Relationship Orientations of German and Omani, Lam D. Nguyen, Que T.N. Nguyen, Hayden Wimmer, and Loreen Marie Powell
Scalable Multipartite Subgraph Enumeration for Integrative Analysis of Heterogeneous Experimental Functional Genomics Data, Charles A. Phillips, Kai Wang, Jason Bubier, Erich J. Baker, Elissa J. Chesler, and Michael A. Langston
Evaluating the Effectiveness of Self-Created Student Screencasts as a Tool to Increase Student Learning Outcomes in a Hands-On Computer Programming Course, Loreen Marie Powell and Hayden Wimmer
Evaluating the Effectiveness of Student Group Work for Mobile Application Development Learning, Productivity, Enjoyment and Confidence in Quality, Loreen M. Powell and Hayden Wimmer
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Attacks and Quantifying Attack Efficacy, Narasimha Shashidhar and Lei Chen
Secure P2P Patch Dissemination in a Race Against Topological Worms, Narasimha Shashidhar and Lei Chen
Transforming a LAN Party into a Classroom, Russell F. Thackston and Christopher A. Kadlec
High Performance Computing: Considerations When Deciding To Rent Or Buy, Russell Thackston and Ryan C. Fortenberry
The Performance of Low-Cost Commercial Cloud Computing as an Alternative in Computational Chemistry, Russell Thackston and Ryan C. Fortenberry
Good Versus Bad Knowledge: Ontology Guided Evolutionary Algorithms, Hayden Wimmer and Roy Rada
Leveraging Technology to Improve Intent to Purchase, Hayden Wimmer and Victoria Yoon
Ranking of Financial Ratios, Aimao Zhang and Scott N. Kersey
Submissions from 2014
Big Data Analytics and Data Science Undergraduate Degree Programs, Cheryl L. Aasheim, Paige Rutner, Susan Williams, and Adrian Gardiner
Submissions from 2013
Big Data and Data Science: An Academic Program Proposal, Cheryl L. Aasheim
Teaching an Introductory Database Course: A Comparison of Performance for Group Vs. Individual Projects and in-class Versus Online Quizzes, Cheryl L. Aasheim
Development and Testing of a Survey Instrument to Assess Ethical Perceptions of IT and IS Students, Omosalewa Aderonmu, Cheryl L. Aasheim, and Paige Rutner
Submissions from 2012
Knowledge and Skill Requirements for Entry-Level IT Workers: A Longitudinal Survey, Cheryl L. Aasheim, Lixin Li, Jordan D. Shropshire, and Christopher A. Kadlec
Attitudes on Plagiarism in Programming Courses: Results from a Survey on Student Perceptions, Cheryl L. Aasheim, Paige Rutner, and Lixin Li
Plagiarism and Programming: A Survey of Student Attitudes, Cheryl L. Aasheim, Paige S. Rutner, Lixin Li, and Susan R. Williams
Submissions from 2011
Exploring Student Attitudes Towards Plagiarism: Does the Type of Work Matter, Cheryl L. Aasheim, Lixin Li, and Paige Rutner
IT Program Curriculum Recommendations Based on a Survey of Knowledge and Skill Requirements for Entry-Level IT Workers, Cheryl L. Aasheim, Lixin Li, Jordan D. Shropshire, and Christopher A. Kadlec
Academic Success Factors: An IT Student Perspective, Aimao Zhang and Cheryl L. Aasheim
Submissions from 2010
A Survey of Student Attitudes on Plagiarism in Programming Courses, Cheryl L. Aasheim, Lixin Li, Paige Rutner, and Susan R. Williams
Academic Success Factors for Information Technology Students, Cheryl L. Aasheim, Aimao Zhang, and Susan Rebstock Williams
Submissions from 2009
Act, Don't React: A Case on Operational Risk Management in Banking, Bryan L. Aasheim, Cheryl L. Aasheim, and Susan R. Williams
Knowledge and Skill Requirements for Information Technology Graduates: A Comparison of Industry and Academia, Cheryl L. Aasheim, Lixin Li, and Susan R. Williams
Knowledge and Skill Requirements for Entry-Level Information Technology Workers: Do Employers in the IT Industry View These Differently than Employers in Other Industries?, Cheryl L. Aasheim and Susan R. Williams
Knowledge and Skill Requirements for IT Graduates, Cheryl L. Aasheim, Susan R. Williams, and Eulous Sonny Butler
Implementing Imaging Technology in Graduate Admissions at Georgia Southern University, Cheryl L. Aasheim, Susan R. Williams, Jody Kemp, Ted Williams, and Lisa Spence
Submissions from 2008
Curriculum Recommendations for Information Technology Related Degrees, Cheryl L. Aasheim and Lixin Li
Submissions from 2007
Establishing an Assessment Process for a Computing Program, Cheryl L. Aasheim, Timothy A. Gowan, and Han Reichgelt
Knowledge and Skill Requirements for IT/IS Graduates, E. Sonny Butler, Cheryl L. Aasheim, and Susan R. Williams
Does Telecommuting Improve Productivity?, Sonny Butler, Cheryl L. Aasheim, and Susan Rebstock Williams
Submissions from 2006
Establishing an Assessment Process for a Computing Program, Cheryl L. Aasheim, J. Art Gowan, and Han Reichgelt
Scanning World Wide Web Documents with the Vector Space Model, Cheryl L. Aasheim and Gary J. Koehler
An Implementation of the IT Fundamentals Knowledge Area in an Introductory IT Course, Cheryl L. Aasheim, Choong Kwon Lee, and Han Reichgelt
Submissions from 2005
Online Shopping Habits of Consumers in Southeast Georgia, Cheryl L. Aasheim and E. Sonny Butler
Implementing the IT Fundamentals Knowledge Area, Cheryl L. Aasheim, J. Art Gowan, and Han Reichgelt
Measuring the Impact of Global Information Technology Applications, James Whitworth, Susan Rebstock Williams, Prashant C. Palvia, and Cheryl L. Aasheim
Information Technology in the Practice of Law Enforcement, Susan Rebstock Williams and Cheryl L. Aasheim
Submissions from 2004
Mining Message Board Content on the World Wide Web for Organizational Information, Cheryl L. Aasheim and Gary J. Koehler
A Study of Internet Access and Usage by Georgia High School Students, 15th Annual National Youth-at-Risk Conference, E. Sonny Butler, Cheryl L. Aasheim, and Susan Rebstock Williams
Internet Usage for College-Bound GA High School, E. Sonny Butler, Cheryl L. Aasheim, and Susan Rebstock Williams
Using a Trait Approach to Analyze the Impact of Global Information Technology Applications, Prashant C. Palvia, James Whitworth, Susan R. Williams, and Cheryl L. Aasheim
The Impact of the Internet on Business and Consumers in the Retail Industry, Manouchehr Tabatabaei, Sonny Butler, and Cheryl L. Aasheim
Submissions from 2003
Information Technology and Other Factors in Physician Selection, E. Sonny Butler and Cheryl L. Aasheim