Browsing College of Engineering and Technology by Author "Technology Systems"
-
A Framework for Evaluation of Risk Management Models for HIPAA Compliance for Electronic Personal Health Information used by Small and Medium Businesses using Cloud Technologies
Luna, Raymond Brett (East Carolina University, 2018-07-18)Our societal quest for collaboration and openness has always been in direct conflict with our desire to maintain our personal privacy. Those conflicting goals are more prominent than ever for healthcare, due to its rapid ... -
Artificial Intelligence based Access Management System
Adenola, Victoria Mojisola (East Carolina University, 2023-04-27)The foundation of cybersecurity is identity and access management (IAM). Its methods, procedures, and guidelines control identity access to digital resources and define the scope of identity permission over the resources. ... -
Baby Boomer Adoption of Healthcare Apps
Patrick, Annie Y (East Carolina University, 2016-05-03)In 2015, approximately 500 million smart phone users were estimated to use some type of health-related app. These apps are developed intending to promote health and wellness behavior in users. However, the simple availability ... -
Comparing Pecha Kucha and Traditional Methods in Occupational Safety Training
Freeman, Stacy (East Carolina University, 2016-07-20)Recently, speculation has begun developing amongst researchers in terms of the effectiveness of training program presentations as well as their ability to educate learners. This is due to a number of reasons given from ... -
Designer's Perception of Safe Design and its Potential for Innovation
McAleenan, Ronan (East Carolina University, 2014)Safe design to influence construction and maintenance worker safety is a concept that has been around for many years in the United Kingdom and Australia. The concept is that designers can influence the safety of the project ... -
Evaluating effectiveness of the application of the new perspective in safety, Safety-II: by Functional Resonance Analysis Method (FRAM) in a manufacturing environment
Shaki, Hamidreza (East Carolina University, 2017-07-25)The risk matrix has been used by safety professionals for many years as a significant tool for hazard management, risk assessment and prioritization, and to aid in offering a proactive approach to prevent negative outcomes. ... -
EVALUATION OF PHISHING ATTACKS AGAINST A HIGHER EDUCATION PUBLIC INSTITUTION
Olson, Craig (East Carolina University, 2022-04-22)While security vendors have documented trends in phishing attacks across numerous industries, there remains a gap in available data for phishing attacks against higher education institutions. This researcher studied ... -
Implementation of a System for Monitoring Overall Equipment Effectiveness (OEE) and Exploring Correlation Between OEE and Process Capability
Zadeh Mohammadi, Mehdi (East Carolina University, 2011)An effective process equipment monitoring tool widely accepted in manufacturing units today is overall equipment effectiveness (OEE). OEE began its debut as a pillar of the total productive maintenance (TPM) system, where ... -
Incidents in Educational and Academic Chemistry Laboratories: A Comparative Case Study Project
Sommer, Stella Julia (East Carolina University, 2019-12-10)For this thesis, eleven published case studies of laboratory incidents that involved hazardous chemicals and occurred at primary educational and academic institutions were compared. The important information on the incident ... -
Knowledge-Based Competencies Necessary for the Frontline Construction Supervisor : Improving Safety through Knowledge
Hardison, Dylan (East Carolina University, 2012)Evaluating supervisor competency levels has been a management challenge since the beginning of supervisory roles in the construction process. Supervisors perform a critical role in the workplace with respect to workplace ... -
MEASURING LEADERSHIP ROUNDING PERFORMANCE IN A HOSPITAL ENVIRONMENT USING REAL TIME LOCATION SYSTEMS
Hopkins, Charles W. (East Carolina University, 2015)Among the major industries, healthcare accounts for over ten percent of jobs today and is continuing to grow per the surges of baby boomers requiring more care, rising costs in medicine and equipment, and current legislative ... -
MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN
Fu, Tian (East Carolina University, 2012)Wireless local area networks (WLAN) are one of the most widely used technologies in our daily lives. Instead of being limited to the range of wired equipment, users can communicate freely. However, since wireless networks ... -
Research of Leadership Qualities Exhibited by Female Leaders'
Isenhour, Leslie (East Carolina University, 2020-12-03)What does it take to be a new leader in technology? The idea that it takes one specific attribute over another begs to question, what attributes are most important? The research within this thesis will argue that some ... -
Small Business Information Security
Vail, John Edwards (East Carolina University, 2012)Small businesses account for over fifty percent of the Gross National Product of the U.S. economy; and the security of their information systems is critical for them to operate, compete, and remain profitable. While many ... -
Students Perception of Safety in Campus VIS A VIS Crime and Violence- A Case Study of ECU
Oluwajana, Temitope (East Carolina University, 2017-04-28)The issue of student's perception of safety on their college campus has been a recurring problem. Students have been concerned about their safety on campuses because of the crime and violence that have been occurring on ... -
A Survey of Retailer's Satisfaction
Nakhostin Maher, Zahra (East Carolina University, 2013)The purpose of this exploratory study is to examine the overall satisfaction of retailers' from manufacturers in a supply-chain system, based on selected "Lean" related factors, such as quality, delivery, cost, and pricing. ... -
SURVEY OF SOCIAL ENGINEERS AND THE VALIDITY OF DEFENSIVE TECHNIQUES
Austin, Adrian D (East Carolina University, 2022-05-12)In the context of information technology, social engineering is a nexus of computers and humans. Defenders need to know how hackers and other deviant actors attempt to interact with users. Social engineers are sometimes ... -
A Sustainability Literacy Assessment of Students at East Carolina University
Wenzel, Kelsey A (2014)Sustainability is achieved when social, environmental, and economic functions are operating in unity at maximum efficiency. This study takes a closer look at the sustainable knowledge of students at East Carolina University. ... -
Technology Attributes, Organizational Learning Attributes, Service Attributes, and Electronic Health Record Implementation Success
RANGARAJAN, ANURADHA (2020-07)Electronic Health Record (EHR) is a technology innovation which has the potential to offer valuable benefits to the healthcare industry such as improved quality of patient care and safety, optimization of healthcare workflow ... -
Uncertainty In Qualitative Risk Analysis And Rating Systems : Modeling Decision Making Determinants
Tebehaevu, Ogaga Jonathan (East Carolina University, 2015)As workplace risk assessment is pivotal to ensure the safety and health of workers, adopting a reliable technique in performing this assessment cannot be overemphasized. The qualitative risk analysis is considered the most ...