Applying Game Theory for Improving and Optimizing the US Political Asylum Process (open access)

Applying Game Theory for Improving and Optimizing the US Political Asylum Process

Data management plan for the grant, "Applying Game Theory for Improving and Optimizing the US Political Asylum Process"
Date: 2024-01-01/2024-12-31
Creator: Fathi, Michel
Object Type: Text
System: The UNT Digital Library
Confirmatory Influence of Trust in E-commerce: A Data Collection Bias and Suggestion (open access)

Confirmatory Influence of Trust in E-commerce: A Data Collection Bias and Suggestion

Article explores the importance of investigating the impact of trust on intention to purchase from both successful and unsuccessful purchase cases in order to provide a more balanced view of the critical role of trust in e-commerce transaction decisions.
Date: January 7, 2020
Creator: Kim, Dan J. & Ogbanufe, Obi
Object Type: Article
System: The UNT Digital Library
An empirical Bayes approach to incorporating demand intermittency and irregularity into inventory control (open access)

An empirical Bayes approach to incorporating demand intermittency and irregularity into inventory control

Article asserts that spare parts inventory management is complex due to the combined impact of intermittent and variable demand patterns. This study proposes a novel nonparametric Bayesian forecasting approach with its roots in the empirical Bayes paradigm.
Date: June 8, 2022
Creator: Ye, Yuan; Lu, Yonggang; Robinson, Powell & Narayanan, Arunachalam
Object Type: Article
System: The UNT Digital Library
Enhancing Cybersecurity TKSs (Tasks, Knowledge, and Skills) for Cybersecurity Education and Workforce Development (open access)

Enhancing Cybersecurity TKSs (Tasks, Knowledge, and Skills) for Cybersecurity Education and Workforce Development

Data management plan for the grant, "Enhancing Cybersecurity TKSs (Tasks, Knowledge, and Skills) for Cybersecurity Education and Workforce Development."
Date: 2022-03-01/2023-02-28
Creator: Kim, Dan J.
Object Type: Text
System: The UNT Digital Library
Enhancing Techniques for Ontologies Mapping for the Cybersecurity Workforce Development Applications (open access)

Enhancing Techniques for Ontologies Mapping for the Cybersecurity Workforce Development Applications

Data management plan for the grant, "Enhancing Techniques for Ontologies Mapping for the Cybersecurity Workforce Development Applications."
Date: 2022-03-01/2023-02-28
Creator: Pravin, Dipakkumar
Object Type: Text
System: The UNT Digital Library
Error and optimism bias regularization (open access)

Error and optimism bias regularization

Article describes how in Machine Learning, prediction quality is usually measured using different techniques and evaluation methods. This paper will introduce a simple regularization term to manage the number of over-predicted/under-predicted instances in a regression model.
Date: January 28, 2023
Creator: Sohaee, Nassim
Object Type: Article
System: The UNT Digital Library
Exploiting machine learning for cybersecurity tasks to talent mapping and exploring credentialing ecosystem (open access)

Exploiting machine learning for cybersecurity tasks to talent mapping and exploring credentialing ecosystem

Data management plan for the grant, "Exploiting machine learning for cybersecurity tasks to talent mapping and exploring credentialing ecosystem"
Date: 2024-01-01/2024-12-31
Creator: Pravin, Dipakkumar
Object Type: Text
System: The UNT Digital Library
Exploring the Relative Risk Severity of Phishing Techniques on Individual Phishing Susceptibility: A Mixed Approach (open access)

Exploring the Relative Risk Severity of Phishing Techniques on Individual Phishing Susceptibility: A Mixed Approach

Data management plan for the grant, "Exploring the Relative Risk Severity of Phishing Techniques on Individual Phishing Susceptibility: A Mixed Approach."
Date: 2024-03-01/2025-02-28
Creator: Kim, Dan J.
Object Type: Text
System: The UNT Digital Library
Introduction to the Minitrack on Artificial Intelligence and Big Data Analytics Management, Governance, and Compliance (open access)

Introduction to the Minitrack on Artificial Intelligence and Big Data Analytics Management, Governance, and Compliance

This article is an introduction to the Minitrack on Artificial Intelligence and Big Data Analytics Management, Governance, and Compliance at the 53rd Hawaii International Conference on System Sciences.
Date: January 7, 2020
Creator: Sidorova, Anna; Saltz, Jeffrey & Goul, Michael
Object Type: Article
System: The UNT Digital Library
An Investigation of Predictors of Information Diffusion in Social Media: Evidence from Sentiment Mining of Twitter Messages (open access)

An Investigation of Predictors of Information Diffusion in Social Media: Evidence from Sentiment Mining of Twitter Messages

Article is a study examining how emotional arousal influences information diffusion in social media using a sentiment mining approach. The authors propose a research model and test it using data collected from Twitter.
Date: January 7, 2020
Creator: Kim, Dan J. & Salehan, Mohammad
Object Type: Article
System: The UNT Digital Library
Mechanisms of Social Interaction and Virtual Connections as Strong Predictors of Wellbeing of Older Adults (open access)

Mechanisms of Social Interaction and Virtual Connections as Strong Predictors of Wellbeing of Older Adults

Article examining the domains of social determinants of health, specifically the social and community context per Healthy People 2030 objectives. These mechanisms of social interaction, in the form of group activities, community engagement, and virtual interactions via email or text message, were assessed using hierarchical regression analysis to find out their association with wellbeing, depression symptoms, and cognition of older adults.
Date: February 27, 2022
Creator: Sen, Keya; Prybutok, Victor R.; Prybutok, Gayle & Senn, William
Object Type: Article
System: The UNT Digital Library
Predicting Criminal Activities in Darknet Markets: Advancing Knowledge and Tools for Activities Monitoring (open access)

Predicting Criminal Activities in Darknet Markets: Advancing Knowledge and Tools for Activities Monitoring

Data management plan for the grant, "Predicting Criminal Activities in Darknet Markets: Advancing Knowledge and Tools for Activities Monitoring."
Date: 2022-03-01/2023-02-28
Creator: Ogbanufe, Obi
Object Type: Text
System: The UNT Digital Library
Role of Electronic Healthcare Record Adoption in Enhancing the Relationship between Quality Measures and Hospital Financial Performance (open access)

Role of Electronic Healthcare Record Adoption in Enhancing the Relationship between Quality Measures and Hospital Financial Performance

Article asserts that the most significant government-mandated technology is the implementation of Electronic Health Records (EHRs). The present research examines EHR through the lens of Resource Advantage Theory –– to empirically assess how partial and comprehensive implementation levels of EHR adoption influence quality management and financial performance of hospitals.
Date: November 16, 2022
Creator: Malhan, Amit; Pavur, Robert J.; Pelton, Lou E. & Manuj, Ila
Object Type: Article
System: The UNT Digital Library
Trust in Google - A Textual Analysis of News Articles About Cyberbullying (open access)

Trust in Google - A Textual Analysis of News Articles About Cyberbullying

Article presents a textual analysis of news articles about cyberbullying to provide input for prevention and training efforts to combat the issue.
Date: 2022
Creator: Stegmair, Juergen G. & Prybutok, Victor R.
Object Type: Article
System: The UNT Digital Library
Vice or Virtue? Exploring the Dichotomy of an Offensive Security Engineer and Government “Hack Back” Policies (open access)

Vice or Virtue? Exploring the Dichotomy of an Offensive Security Engineer and Government “Hack Back” Policies

This article uses the virtue (ethics) theory and cyber attribution to argue that there exists a dichotomy among offensive security engineers, one that appreciates organizational security practices, but at the same time violates ethics in how to retaliate against a malicious attacker.
Date: January 7, 2020
Creator: Parrish, James L.; Withers, Kim L.; Smith, James N. & Ellis, Timothy J.
Object Type: Article
System: The UNT Digital Library
When expectation fails and motivation prevails: the mediating role of awareness in bridging the expectancy-capability gap in mobile identity protection (open access)

When expectation fails and motivation prevails: the mediating role of awareness in bridging the expectancy-capability gap in mobile identity protection

Article describes how identity theft poses a significant threat to mobile users, yet mobile identity protection is often overlooked in cybersecurity literature. This study adopts a mixed-methods approach and draws on expectancy-value theory to address these gaps and explore the impact of expectations, capabilities, motivational values, technical measures, and awareness on individuals' intentions to achieve mobile identity protection.
Date: September 19, 2023
Creator: Alhelaly, Yasser; Dhillon, Gurpreet & Oliveira, Tiago
Object Type: Article
System: The UNT Digital Library