Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

3560 Full-Text Articles 3246 Authors 1217565 Downloads 165 Institutions

All Articles in Technology and Innovation

Faceted Search

3560 full-text articles. Page 1 of 117.

Future-Facing Retail, 2018 Vocational Training Council

Future-Facing Retail

SIGNED: The Magazine of The Hong Kong Design Institute

The data gathered using facial recognition is invaluable to traditional retailers with bricks and mortar stores; it is finally levelling the playing field between the data-gathering-led online retail locations. And as traditional retailers search for a formula that can help them survive in a digital future, a new online/offline hybridity is emerging


The Chain, 2018 Vocational Training Council

The Chain

SIGNED: The Magazine of The Hong Kong Design Institute

Blockchain has begun to revolutionise the world of tech. Surrounded by digital technology, big data and social media, information has never been so readily available to us -- but that information is often disorganised and inaccessible. Blockchain offers the opportunity to design new ways to organise that information and to put it to good use


Are You Working Well?, 2018 Vocational Training Council

Are You Working Well?

SIGNED: The Magazine of The Hong Kong Design Institute

It is nothing new for employers to recognise the importance of a healthy and happy workforce. But now, new technology is changing the way that we approach wellness in the workplace.


Into The Laboratory!, 2018 Vocational Training Council

Into The Laboratory!

SIGNED: The Magazine of The Hong Kong Design Institute

HKDI's new Media Lab is a platform where students can interact with the latest technology; a hub for exploring new ideas and finding new solutions


Shenzhen's Shifting Fortunes, 2018 Vocational Training Council

Shenzhen's Shifting Fortunes

SIGNED: The Magazine of The Hong Kong Design Institute

From sleepy border town to booming manufacturing hub to design city -- Shenzhen is continually transforming itself as it spearheads China's passage to an innovation-based society.


Managing Strategic Intellectual Property Assets In The Fuzzy Front End Of New Product Development Process, Yonghee Cho, Tugrul U. Daim 2018 Portland State University

Managing Strategic Intellectual Property Assets In The Fuzzy Front End Of New Product Development Process, Yonghee Cho, Tugrul U. Daim

Joseph Cho

The strategic use of intellectual property (IP) is crucial for technology-based companies to gain competitive advantage. The recent transformation of the US patent system brings new challenges and opportunities in this arena. In this regard, this study attempts to identify techniques which can help with IP evaluation and selection in the fuzzy front end (FFE) of new product development (NPD) process. This study combines data collection methods such as mining the literature, conducting in-depth interviews, surveying questionnaires, and analyzing cases. This research serves as an analysis of modern literature and identifies a multi-criteria weighted scoring model that can be employed ...


Selected Highlights In American Soil Science History From The 1980s To The Mid-2010s, Eric C. Brevik, Jeffrey A. Homburg, Bradley A. Miller, Thomas E. Fenton, James A. Doolittle, Samuel J. Indorante 2018 Dickinson State University

Selected Highlights In American Soil Science History From The 1980s To The Mid-2010s, Eric C. Brevik, Jeffrey A. Homburg, Bradley A. Miller, Thomas E. Fenton, James A. Doolittle, Samuel J. Indorante

Bradley A. Miller

The beginning of the 20th century through the 1970s were good times for soil science in the USA, with relatively strong funding and overall growth in the profession. However, the soil science discipline in the USA hit hard times in the 1980s and 1990s. Federal funding for soil survey work began to decline as did student numbers in university programs and membership in the Soil Science Society of America (SSSA). Despite this, there were still many positive advances within soil science in the USA during these two decades. There was an increased use of geophysical instrumentation, remote sensing, geographic information ...


Structuring Financial Incentives For Residential Solar Electric Systems, Kevin C. van Blommestein, Yonghee Cho, Tugrul U. Daim, Paul Sklar 2017 Portland State University

Structuring Financial Incentives For Residential Solar Electric Systems, Kevin C. Van Blommestein, Yonghee Cho, Tugrul U. Daim, Paul Sklar

Joseph Cho

This paper introduces a simple methodology to aid in the decision of how to distribute financial incentive funding for residential solar electric systems in order to maximize demand. Incentive funding can be used more effectively if adjusted according to the decrease in price and the increase in demand of solar electric systems. The decision of how to reduce these incentives due to changing annual funds, while increasing or even maintaining the growth of solar electric system demand, is of great interest to policymakers and public benefit funded program administrators. In order to aid in this process, a three step methodology ...


Collective Action And Market Formation: An Integrative Framework, Brandon Lee, Jeroen Struben, Christopher B. Bingham 2017 McGill University

Collective Action And Market Formation: An Integrative Framework, Brandon Lee, Jeroen Struben, Christopher B. Bingham

Brandon Lee


While extant research places collective action at the heart of market formation, it provides little understanding about when and to what extent collective action is important. In this paper, we develop a novel theoretical framework detailing what collective action problems and solutions arise in market formation and under what conditions. Our framework centers on the development of market infrastructure with three key factors that influence the nature and extent of collective action problems: perceived returns to contributions, excludability, and contribution substitutability. We apply our framework to diverse market formation contexts and derive a fresh set of attendant propositions. Finally, we ...


A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland 2017 Plymouth University, U.K.

A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland

Journal of Cybersecurity Education, Research and Practice

In today’s business environment where all operations are enabled by technology, information security has become an established discipline as more and more businesses realize its value. The human component has been recognized to have an important role in information security since the only way to reduce security risks is through making employees more information security aware. Towards this goal the research will appreciate the importance of information security awareness by illustrating the need for more effective user training. Further to that it proposes and develops an information security toolkit as a prototype awareness raising initiative. Apart from the elements ...


Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell 2017 Arkansas Tech University

Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell

Journal of Cybersecurity Education, Research and Practice

Recent publicized security breaches can be used to evaluate information security programs. The processes and procedures that allowed the event to occur can be examined in a case study and then be used to find methods for future mitigation of risk. The Target security breach is used in this study to examine the organization’s information security program using a macro-ergonomic model. This research posits that an information security program should consider the work system design, based in macro-ergonomics, to help mitigate information security risk to the organization and ensure an efficient and effective information security program. Based on a ...


Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi 2017 University of Alabama, Birmingham

Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi

Journal of Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer 2017 Nova Southeastern University

A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer

Journal of Cybersecurity Education, Research and Practice

Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and ...


From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth 2017 Kennesaw State University

From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth

Journal of Cybersecurity Education, Research and Practice

No abstract provided.


What Bitcoin Is, And How It Can Change Commerce, Jeffrey Bukhari 2017 CUNY Graduate School of Journalism

What Bitcoin Is, And How It Can Change Commerce, Jeffrey Bukhari

Capstones

The use of the digital currency Bitcoin has spiked dramatically over the last several years. Spurred by interest from investors and those excited about its commercial and banking potential, the value of the cryptocurrency has seen its value greatly increase since its beginning in 2009.

This project explains the underlying technology behind Bitcoin, how Bitcoin is and will change commerce, and what potential lies ahead for the digital currency.


Applying Agile Project Management To Art Museums: A Proposal For Implementing A Generalist Scrum Master, Vincent Sulit 2017 The University of San Francisco

Applying Agile Project Management To Art Museums: A Proposal For Implementing A Generalist Scrum Master, Vincent Sulit

Master's Projects and Capstones

This capstone project examines organizational change, along with its challenges, through case studies in museums and businesses in the private sector, subsequently providing a possible solution for museums to adapt to the current global market economy through the use of Agile Project Management (Agile). I cite recent case studies of art museums implementing Agile for digital product development. This project proposal aims to introduce Agile outside of digital departments, including Exhibitions and Education, with the goal of developing better visitor-centered offerings from museums. This may be achieved through the proposal of a job description for a new museum position of ...


A Framework Towards Technology Creation In Africa: Focusing On Ghana, Martin Yao Donani, Hannatu Abue Kugblenu, Azindow Bawa Fuseini 2017 Ho Polytechnic, Ghana

A Framework Towards Technology Creation In Africa: Focusing On Ghana, Martin Yao Donani, Hannatu Abue Kugblenu, Azindow Bawa Fuseini

International Journal of African Development

Underdevelopment in Africa has been historical and a global concern coupled with the quest for good governance. Several efforts have been made in academia, national governments, the international community, and other institutional arrangements to reverse the trend. These efforts however are yet to produce a lasting result as Africa is still characterized by low productivity output, poverty and a widening technology gap when compared to other developing regions of the world. Conventional approaches used to address the African problem have consistently been devoid of indigenous technology development. Technology is here seen as paramount to every form of production on which ...


Technology Planning For Aligning Emerging Business Models And Regulatory Structures: The Case Of Electric Vehicle Charging And The Smart Grid, Kelly R. Cowan 2017 Portland State University

Technology Planning For Aligning Emerging Business Models And Regulatory Structures: The Case Of Electric Vehicle Charging And The Smart Grid, Kelly R. Cowan

Dissertations and Theses

Smart grid has been described as the Energy Internet: Where Energy Technology meets Information Technology. The incorporation of such technology into vast existing utility infrastructures offers many advantages, including possibilities for new smart appliances, energy management systems, better integration of renewable energy, value added services, and new business models, both for supply- and demand-side management. Smart grid also replaces aging utility technologies that are becoming increasingly unreliable, as the average ages for many critical components in utility systems now exceed their original design lives. However, while smart grid offers the promise of revolutionizing utility delivery systems, many questions remain about ...


Automated Scientifically Controlled Screening Systems (Ascss), Nathan W. Twyman, Jay F. Nunamaker 2017 Missouri University of Science and Technology

Automated Scientifically Controlled Screening Systems (Ascss), Nathan W. Twyman, Jay F. Nunamaker

Nathan W. Twyman

The ability to detect when a person is hiding important information has high value in many applications. A new class of systems, termed autonomous scientifically controlled screening systems (ASCSS), is designed to detect individuals' purposely hidden information about target topics of interest. ASCSS represents a systematic synthesis of structured interviewing, orienting theory, defensive response theory, non-invasive psychophysiological measurement, and behavioral measurement. To evaluate and enhance the design principles, an automated screening kiosk (ASK) system was constructed. The ASK system has been used in a physical security screening scenario in which participants constructed and attempted to smuggle a fake improvised explosive ...


Automated Human Screening For Detecting Concealed Knowledge, Nathan W. Twyman 2017 Missouri University of Science and Technology

Automated Human Screening For Detecting Concealed Knowledge, Nathan W. Twyman

Nathan W. Twyman

Screening individuals for concealed knowledge has traditionally been the purview of professional interrogators investigating a crime. But the ability to detect when a person is hiding important information would be of high value to many other fields and functions. This dissertation proposes design principles for and reports on an implementation and empirical evaluation of a non-invasive, automated system for human screening. The screening system design (termed an automated screening kiosk or ASK) is patterned after a standard interviewing method called the Concealed Information Test (CIT), which is built on theories explaining psychophysiological and behavioral effects of human orienting and defensive ...


Digital Commons powered by bepress