David Bourrie

David Bourrie
University of South Alabama | USA · Information Systems and Technology - School of Computing

Ph.D. Business: Information Systems

About

23
Publications
6,719
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
89
Citations
Citations since 2017
14 Research Items
63 Citations
201720182019202020212022202302468101214
201720182019202020212022202302468101214
201720182019202020212022202302468101214
201720182019202020212022202302468101214
Introduction
David Bourrie currently works at the University of South Alabama's School of Computing in the Information Systems and Technology department. David does research in Data Analysis, Data Mining, Databases and Information Systems (Business Informatics).
Additional affiliations
August 2020 - present
University of South Alabama
Position
  • Professor (Associate)
Education
June 2008 - July 2014
Auburn University
Field of study
  • Information Systems
August 1989 - May 1994
Michigan State University
Field of study
  • Hotel, Restaurant, and Institutional Management

Publications

Publications (23)
Article
Full-text available
Although substantial funding has been expended to develop new educational innovations, especially in engineering, few have found widespread acceptance in the classroom. Little is known regarding the interactions among the variables that influence successful dissemination and adoption. This research proposes a framework to show the interactions betw...
Conference Paper
Full-text available
Developments in virtual containers, especially in the cloud infrastructure, have led to diversification of jobs that containers are used to support, particularly in the big data and machine learning spaces. The diversification has been powered by the adoption of orchestration systems that marshal fleets of containers to accomplish complex programmi...
Article
Full-text available
Background Persuasive technology is an umbrella term that encompasses software (eg, mobile apps) or hardware (eg, smartwatches) designed to influence users to perform preferable behavior once or on a long-term basis. Considering the ubiquitous nature of mobile devices across all socioeconomic groups, user behavior modification thrives under the per...
Article
Full-text available
Political polarisation has become an increasingly alarming issue in society, exacerbated by the widespread use of social media and the development of filter bubbles among social media users. This environment has left users susceptible to disinformation, especially those with whom a user is politically aligned. In this research, we integrate truth b...
Preprint
BACKGROUND Persuasive technology is an umbrella term that encompasses any software (e.g., mobile app) or hardware (e.g., smartwatch) designed to influence users to perform a preferable behavior once or on a long-term basis. Considering the ubiquitous nature of mobile devices across all socioeconomic groups, user behavior modification thrives under...
Chapter
Flexible fine-grained weather forecasting is a problem of national importance due to its stark impacts on economic development and human livelihoods. It remains challenging for such forecasting, given the limitation of currently employed statistical models, that usually involve the complex simulation governed by atmosphere physical equations. To ad...
Article
Full-text available
Conducting digital forensic investigations in a big data distributed file system environment presents significant challenges to an investigator given the high volume of physical data storage space. Presented is an approach from which the Hadoop Distributed File System logical file space is mapped to the physical data location. This approach uses me...
Conference Paper
Full-text available
Action rule mining develops rules that describe which attributes should be changed in order to move an object from an undesired state to a desired state, with the understanding that some attributes cannot be changed. While such rules can be very useful for end-users, a limitation in prior work is the underlying assumption that the attributes of a d...
Conference Paper
Full-text available
Association mining is the process of discovering relationships between items in a data set, where a group of items forms an itemset. A problem with the typical association mining approach is a large number of the generated frequent itemsets typically do not contain any items of interest to the user. Targeted association mining solves this by only d...
Conference Paper
Full-text available
Prior work demonstrated that a project management course for information systems and technology majors has a specific curricular role for teaching agile project management concepts and practices. This paper expands on the prior work, describing a course module for delivering agile content. As agile methods were and still are a marked departure from...
Conference Paper
Full-text available
Reports and press releases highlight that security incidents continue to plague organizations. While researchers and practitioners' alike endeavor to identify and implement realistic security solutions to prevent incidents from occurring, the ability to initially identify a security incident is paramount when researching a security incident lifecyc...
Article
Full-text available
Substantial funds are invested in developing educational technologies with the goal that faculty members adopt and routinely use these technologies. This research establishes that there is a gap between the development and widespread adoption/use of these technologies. This paper investigates (1) which critical success factors (CSF) influence facul...
Article
Full-text available
In order for the Open Access (OA) to learning concept to a have wider impact in formal education, it is important that faculty members intent to adopt new educational innovations. However, little is known about which variables influence the intention of faculty members. Therefore, the purposes of this study are to empirically determine: 1) which of...
Conference Paper
Full-text available
Military conflicts, natural disasters, social policies, financial opportunities, and resource scarcity are just a few of the factors that can motivate people to leave their homes and seek a better life in a new location. When large numbers of people decide to migrate, the demand for resources can overwhelm existing infrastructure and leave governme...
Article
Full-text available
Although considerable work has been done to develop new educational innovations, few have found widespread acceptance in the classroom. To improve the likelihood of adoption of educational innovations, researchers need to understand why some innovations are adopted and routinely used, while others are not. An initial aspect of the diffusion of inno...
Thesis
Full-text available
Although a great deal of work has been done to develop new educational innovations, in the field of engineering, few innovations have found widespread acceptance in the classroom. Therefore, frameworks that conceptualize the interactions among the variables that influence successful dissemination are critical. In this dissertation, dissemination is...
Conference Paper
Full-text available
To improve the widespread adoption of educational innovations, we must understand why some are adopted and routinely used, while others are not. This Delphi study included 45 Principal and Co-Principal Investigators who received Course, Curriculum and Laboratory Improvements (CCLI) or Transforming Undergraduate Education in STEM (TUES) grants from...
Article
Full-text available
The acquisition and evaluation of new technologies is critical to the development of a timely IT strategy. We report the find-ings of a four round Delphi study designed to elicit a cohesive set of issues that affect an IT executive's decision to adopt an emerg-ing IT into corporate IT strategy. Based on the results, we present the Emerging Informat...
Article
Full-text available
In this paper, we seek to investigate Ke and Wei's (2008) propositions that ERP implementation success is positively related with top management leadership and organisational culture. This is accomplished by analysing the implementation of the ERP systems at a company, HealthSouth Corporation, longitudinally during two periods (1997 to 2003 and 200...

Network

Cited By

Projects

Projects (2)
Project
Develop techniques to automatically generate rules from data that indicate what actions could be taken that would move an instance from an undesired state to a desired state. This project started in 2011. It went into hiatus from 2013 to 2017. It became active again around 2017 and is currently active.