EDSIG

Displaying 1-40 of 50 results

  • White Papers // Oct 2013

    Privacy and Security Challenges of RFID

    In this paper, the authors review the background of Radio Frequency IDentification (RFID) systems as well as the ethical foundations of individual privacy. A number of applications were also explored with the intention of identifying the technology's benefits and possible misuses. The authors offer an overview and discussion of the...

    Provided By EDSIG

  • White Papers // Oct 2013

    Computer Security Primer: Systems Architecture, Special Ontology and Cloud Virtual Machines

    With the increasing proliferation of multitasking and Internet-connected devices, security has reemerged as a fundamental design concern in information systems. The shift of IS curricula toward a largely organizational perspective of security leaves little room for focus on its foundation in systems architecture, the computational underpinnings of processes and protection....

    Provided By EDSIG

  • White Papers // Oct 2013

    A Digital Native is Hacked: A Case Study

    In this paper, the authors examine the life of a digital native who has her online accounts hacked, passwords reset, and is locked out of important online resources including her university email account and Face-book. Part one of the case study examines how the hack was perpetrated and the fallout...

    Provided By EDSIG

  • White Papers // Oct 2013

    The Document Explosion in the World of Big Data - Curriculum Considerations

    Within the context of \"Big data\", there is an increasing focus on the source of the large volumes of data now stored electronically. The greatest portion of this data is unstructured and comes from a variety of sources in a variety of formats, much of which does not conform to...

    Provided By EDSIG

  • White Papers // Oct 2013

    From Database Concepts to Application: Use Problem-Based Learning and Oracle Development Tools to Facilitate Learning

    Database concepts are an important part of the curriculum in both information systems and computer science majors and in business today relational databases is the foundation of most business applications. While relational database concepts are usually presented to students through lectures, textbooks, and online material, it is important to help...

    Provided By EDSIG

  • White Papers // Oct 2013

    The \"Ethics\" of Teaching Ethical Hacking

    The growing importance of information security has caused some schools to teach ethical hacking in academic programs and even more schools are considering the addition of courses that cover offensive exploitation of systems. The argument for teaching ethical hacking focuses on the need for students to understand attacks to better...

    Provided By EDSIG

  • White Papers // Oct 2013

    Online Versus In-Store: Price Differentiation for Multi-Channel Retailers

    Pure-play online retailers have created pressure on traditional bricks-and-mortar retailers forcing many of them to move to a multi-channel business model to provide customers online storefronts in addition to local physical stores. Conventional wisdom suggests that online prices be lower than in-store prices. This paper investigates whether multi-channel retailers follow...

    Provided By EDSIG

  • White Papers // Oct 2012

    Security Engineering Lessons Learned for Migrating Independent LANs to an Enterprise Environment

    Transition from small, independent LANs into larger enterprise managed infrastructures is becoming more prominent in academia, business and government. Consolidation of IT resources into larger, more disciplined, and more professionally managed environments has significant advantages however they do bring their own unique issues to solve in order to make the...

    Provided By EDSIG

  • White Papers // Oct 2012

    Prepping for Cloud - A New Look at an Old Alliance

    Cloud computing is taking off and a study by Sand Hill Group estimates hundreds of thousands of new jobs in the U.S. will be created that support cloud computing technologies. An IDC Whitepaper states that IT departments must develop these new skills now that can allow them to scale at...

    Provided By EDSIG

  • White Papers // Oct 2012

    Common Access Control Terminology Used in Multilevel Security Systems

    Access to computer data can be controlled by many methods ranging from simply ensuring that the data is contained in a secure environment where only approved personnel have access to more complex access methods associated with public cloud infrastructures. Regardless of where a system resides, controlling access to data must...

    Provided By EDSIG

  • White Papers // Oct 2012

    Cloud Computing in Support of Applied Learning: A Baseline Study of Infrastructure Design at Southern Polytechnic State University

    Cloud computing represents an architecture and paradigm of computing designed to deliver infrastructure, platforms, and software as constructible computing resources on demand to networked users. As campuses are challenged to better accommodate academic needs for applications and computing environments, cloud computing can provide an accommodating solution for mobile, campus laboratory,...

    Provided By EDSIG

  • White Papers // Oct 2012

    A Database Management Assessment Instrument

    In this paper, the authors describe an instrument designed for assessing learning outcomes in data management. In addition to assessment of student learning and ABET outcomes, they have also found the instrument to be effective for determining database placement of incoming Information Systems (IS) graduate students. Each of these three...

    Provided By EDSIG

  • White Papers // Oct 2012

    CloudBees: A Resource Guide for Teaching Clouding Computing on a Java Platform

    Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. The projected popularity of the cloud has motivated Information Systems educators to incorporate it in...

    Provided By EDSIG

  • White Papers // Oct 2012

    ETL Evolution for Real-Time Data Warehousing

    Informed decision-making is required for competitive success in the new global marketplace, which is fraught with uncertainty and rapid technology changes. Decision makers must adjust operational processes, corporate strategies and business models at lightning speed and must be able to leverage business intelligence instantly and take immediate action. Sound decisions...

    Provided By EDSIG

  • White Papers // Oct 2012

    Adding Social Features to E-commerce

    With the introduction of social media, e-commerce is being transformed from product-centered to a customer-centered social environment. Such changes strengthen customer relationships, increase traffic to e-commerce websites, generate new business opportunities and support product and brand development. Although a variety of social media tools have been used on current e-commerce...

    Provided By EDSIG

  • White Papers // Sep 2012

    Privacy and Ethics in the Age of the Smartphone

    Smartphone's are fundamentally transforming almost all aspects of modern life. This case study examines moral and ethical issues surrounding the use of powerful Smartphone's that can be used to discreetly capture the activities of unsuspecting people. This case shows how a standard iPhone, coupled with widely available apps, can be...

    Provided By EDSIG

  • White Papers // Sep 2012

    LINUX, Virtualization, and the Cloud: A Hands-On Student Introductory Lab

    Many students are entering computer science education with limited exposure to operating systems and applications other than those produced by Apple or Microsoft. This gap in familiarity with the Open Source community can quickly be bridged with a simple exercise that can also be used to strengthen two other important...

    Provided By EDSIG

  • White Papers // Oct 2011

    The Importance of Written Security Policy for Any Network Connection\"

    In this paper, the authors explain about the network security policy in an organization, the need for writing up a viable policy, and the effects it has on the flow of information in an organization. Policies often look into the relationship between organizations, and the flow of information within an...

    Provided By EDSIG

  • White Papers // Oct 2011

    Open Source Software in the Vertical Market: An Open Niche?

    Much of the universe of open-source software is categorized; abundant open-source software is found for most categories. However, relatively few dual-licensed open-source software programs are found, and very little open-source software is found for vertical markets. Explanations are explored. The phrase open source has been in common use since it...

    Provided By EDSIG

  • White Papers // Oct 2011

    The Impact of Organizational Culture in Managing the Change to the Use of Foss at a South African University

    A recent change in the software landscape involves the introduction of the Free and Open Source Software (FOSS). FOSS offers freedom to access and enhance software source code at low or free cost, thereby demonstrating high potential to enhance the impact of ICT in the society. However, the Tshwane University...

    Provided By EDSIG

  • White Papers // Oct 2011

    Analysis of the Effectiveness of Traditional Versus Hybrid Student Performance for an Introductory Computing Course

    This paper investigates the performance of students enrolled in traditional versus hybrid Introductory Computing course at Georgia Gwinnett College (GGC). For this paper, the authors collected and analyzed student performance data for the course goals over two semesters (Fall 2010 and Spring 2011). GGC is unique as it is an...

    Provided By EDSIG

  • White Papers // Oct 2011

    Using the Cloud: Keeping Enterprise Data Private

    Cloud computing has overcome the computing industry within the past few years. Exciting prospects such as sharing resources, reducing costs, and increasing efficiency have made the cloud computing model highly attractive. In this paper, the authors will focus briefly on the privacy and security concerns of outsourcing the hosting of...

    Provided By EDSIG

  • White Papers // Oct 2011

    The Silver Lining: A Teaching Case Using Google Docs to Illustrate Cloud Computing Concepts

    As cloud computing becomes an increasingly important technology strategy and solution for businesses, it is important for today's students to be aware of the various services that the cloud offers. While many first-year college students have heard of the term cloud computing and used Google Docs, a popular web-based office...

    Provided By EDSIG

  • White Papers // Oct 2011

    Survey of Data Mining Methods in Emergency Evacuation Planning

    Evacuating large numbers of people during a natural disaster or terrorist attack is a vital challenge for emergency management professionals. This is even a continuous pressure on the management in the hurricane zones. Hurricanes Katrina and Rita vividly illustrated this problem. Miles-long traffic jams on the highways during any evacuation...

    Provided By EDSIG

  • White Papers // Oct 2011

    Plan to Throw One Away: Lessons Learned Developing an Economic Simulator

    This paper presents, the authors' experience designing and building an economic simulator for use in a Public Finance course. The project was a joint venture between the Information Systems & Computer Science Department and the Economics Department. Faculty and Students collaborated to create the simulation system. The second version of...

    Provided By EDSIG

  • White Papers // Oct 2011

    Determinants of an Effective Cloud Computing Strategy

    The cloud continues to be an area of information systems that is being adopted cautiously by business firms. The authors of this paper analyze factors that can determine the effectiveness of a cloud strategy as firms invest in this computing method. The authors examine cloud computing strategy from a best...

    Provided By EDSIG

  • White Papers // Oct 2011

    Cloud Computing as a Core Discipline in a Technology Entrepreneurship Program

    Education in entrepreneurship continues to be a developing area of curricula for computer science and information systems students. Entrepreneurship is enabled frequently by cloud computing methods that furnish benefits to especially medium and small-sized firms. Expanding upon an earlier foundation paper, the authors of this paper present an enhanced model...

    Provided By EDSIG

  • White Papers // Oct 2010

    Implementing a Dynamic Database-Driven Course Using LAMP

    In this paper, the authors explain about the documents and formulation of a database driven open source architecture web development course. The design of a web-based curriculum faces many challenges: relative emphasis of client and server-side technologies, choice of a server-side language, and the cost and efficient delivery of a...

    Provided By EDSIG

  • White Papers // Oct 2010

    Solving Relational Database Problems with ORDBMS in an Advanced Database Course

    In this paper, the authors introduce how to use the Object-Relational DataBase Management System (ORDBMS) to overcome the Relational DataBase (RDB) existing problems and to improve database performance in the database development. The purpose of the paper is to provide a guideline for database instructors who desire to incorporate the...

    Provided By EDSIG

  • White Papers // Oct 2010

    An Improved Database System for Program Assessment

    In this paper, the authors present a database management system for tracking course assessment data and reporting related outcomes for program assessment. It improves on a database system previously presented by the authors and in use for two years. The database system presented is specific to assessment for ABET (Accreditation...

    Provided By EDSIG

  • White Papers // Oct 2010

    Are Password Management Applications Viable? an Analysis of User Training and Reactions

    Passwords have the distinction of being the most widely-used form of authentication - and the most vulnerable. With the dramatic increase today in the number of accounts that require passwords, overwhelmed users usually resort to creating weak passwords or reusing the same password for multiple accounts, thus making passwords the...

    Provided By EDSIG

  • White Papers // Oct 2010

    Cloud Computing in the Curricula of Schools of Computer Science and Information Systems

    The cloud continues to be a developing area of information systems. Evangelistic literature in the practitioner field indicates benefit for business firms but disruption for technology departments of the firms. Though the cloud currently is immature in methodology, this study defines a model pro-gram by which computer science and information...

    Provided By EDSIG

  • White Papers // Nov 2009

    Establishing the Suitability of Dynamic Web Applications Development Platforms for Teaching Remote Database Processing

    The availability of many platforms for developing dynamic web applications suggests the existence of the problem of choosing the most suitable platform for teaching the concepts of web applications development to undergraduate students in tertiary institutions. Students will not perform at their best capacity level if the platform chosen by...

    Provided By EDSIG

  • White Papers // Nov 2009

    A Tools-Based Approach to Teaching Data Mining Methods

    In this paper, the authors describe how they used Microsoft Excel's data mining add-ins and cloud computing components to teach their senior data mining class. The tools were part of a larger set of tools that they used as part of SQL server business intelligence development studio. They also demonstrate...

    Provided By EDSIG

  • White Papers // Nov 2009

    A New Look at Security Education: YouTube as YouTool

    Teaching a computer security course which includes network administration and protection software is especially challenging because textbook tools are out of date by the time the text is published. In an effort to use lab activities that work effectively, the authors turned to the internet. This paper describes several resources...

    Provided By EDSIG

  • White Papers // Nov 2009

    An Exploration of the Legal and Regulatory Environment of Privacy and Security Through Active Research, Guided Study, Blog Creation, and Discussion

    One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of...

    Provided By EDSIG

  • White Papers // Jun 2009

    Improving the Global Supply Chain Through Tightening Information Technology Security

    Automotive Global Supply Chain (GSC) trade and transport is very complex. It involves multiple players and a gigantic number of complex transactions. Consequently, there is a constant need to obtain, analyze, and exchange data securely and compliantly. The rapid changes in Information Technologies coupled with political and socio-economic factors are...

    Provided By EDSIG

  • White Papers // May 2009

    Developing the Cyber Defenders of Tomorrow with Regional Collegiate Cyber Defense Competitions (CCDC)

    With the projected higher demand for Network Systems Analysts and increasing computer crime, network security specialists are an organization's first line of defense. The principle function of this paper is to provide the evolution of Collegiate Cyber Defense Competitions (CCDC), event planning required, soliciting sponsors, and recruiting personnel for the...

    Provided By EDSIG

  • White Papers // May 2009

    Teaching Relational Database Concepts to Computer Literacy Students: The Spreadsheet Metaphor

    A challenge facing computer literacy classes is the proper course content level. The challenge is to take the students to a higher level academically but without driving them away because they feel an \"Easy\" course has become \"Hard.\" Accepting this challenge, the authors have moved the database portion of the...

    Provided By EDSIG

  • White Papers // May 2009

    Merging Object-Oriented Programming, Database Design, Requirements Analysis, and Web Technologies in an Active Learning Environment

    Information technology is an extremely dynamic field and continues to evolve at a rapid rate. This speedy evolution of the discipline has a tremendous effect on Information Technology education, affecting both course content and pedagogy. This paper details a project appropriate for use in an upper level course requiring the...

    Provided By EDSIG