Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

3,090 Full-Text Articles 3,173 Authors 1,217,565 Downloads 171 Institutions

All Articles in Technology and Innovation

Faceted Search

3,090 full-text articles. Page 1 of 103.

An Examination Of The Stock Market's Effect On Economic Inequality, Nicholas Golina 2019 The University of Akron

An Examination Of The Stock Market's Effect On Economic Inequality, Nicholas Golina

Honors Research Projects

The economic literature on economic inequality has shown that it can negatively impact aggregate demand because it indicates a higher concentration of wealth in the hands of the top 10% as opposed to the poor and middle class, who are more likely to consume. The literature has identified many factors that can lead to increasing inequality. The stock market could be one of those factors since it can either create an upward redistributive effect towards the top 10% or redistributive effect towards the middle class. This paper tested the effect of the stock market on inequality. This study contributes to ...


Experiential Learning Builds Cybersecurity Self-Efficacy In K-12 Students, Abdullah Konak 2018 Penn State Berks

Experiential Learning Builds Cybersecurity Self-Efficacy In K-12 Students, Abdullah Konak

Journal of Cybersecurity Education, Research and Practice

In recent years, there have been increased efforts to recruit talented K-12 students into cybersecurity fields. These efforts led to many K-12 extracurricular programs organized by higher education institutions. In this paper, we first introduce a weeklong K-12 program focusing on critical thinking, problem-solving, and igniting interest in information security through hands-on activities performed in a state-of-the-art virtual computer laboratory. Then, we present an inquiry-based approach to design hands-on activities to achieve these goals. We claim that hands-on activities designed based on this inquiry-based framework improve K-12 students’ self-efficacy in cybersecurity as well as their problem-solving skills. The evaluation of ...


Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos 2018 San Jose State University

Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos

Journal of Cybersecurity Education, Research and Practice

We conducted an observational study to document student misconceptions about cybersecurity using thematic analysis of 25 think-aloud interviews. By understanding patterns in student misconceptions, we provide a basis for developing rigorous evidence-based recommendations for improving teaching and assessment methods in cybersecurity and inform future research. This study is the first to explore student cognition and reasoning about cybersecurity. We interviewed students from three diverse institutions. During these interviews, students grappled with security scenarios designed to probe their understanding of cybersecurity, especially adversarial thinking. We analyzed student statements using a structured qualitative method, novice-led paired thematic analysis, to document patterns in ...


A Case Study In The Implementation Of A Human-Centric Higher Education Cybersecurity Program, John W. Coffey, Melanie Haveard, Geissler Golding 2018 The University of West Florida

A Case Study In The Implementation Of A Human-Centric Higher Education Cybersecurity Program, John W. Coffey, Melanie Haveard, Geissler Golding

Journal of Cybersecurity Education, Research and Practice

This article contains a description of the implementation of a comprehensive cyber security program at a regional comprehensive university. The program was designed to create an effective cyber security management infrastructure and to train end users and other categories of security management personnel in data protection and cyber security. This work addresses the impetus for the program, the rather extensive planning and development that went into the program, its implementation, and insights gleaned from the experience. The paper concludes with a summary of the strengths and weaknesses of the initiative.


"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Security Awareness Campaign, Rachael L. Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky J. Jenkins 2018 Eastern Michigan University

"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Security Awareness Campaign, Rachael L. Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky J. Jenkins

Journal of Cybersecurity Education, Research and Practice

This article discusses the lessons learned after implementing a successful university-wide cyber security campaign. The Cyber Security Awareness Committee (CyberSAC), a group comprised of diverse units across campus, collaborated together on resources, talent, people, equipment, technology, and assessment practices to meet strategic goals for cyber safety and education. The project involves assessing student learning and behavior changes after participating in a Cyber Security Password Awareness event that was run as a year-long campaign targeting undergraduate students. The results have implications for planning and implementing university-wide initiatives in the field of cyber security, and more broadly, higher education at large.


Voice Hacking: Using Smartphones To Spread Ransomware To Traditional Pcs, Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz 2018 University of North Georgia

Voice Hacking: Using Smartphones To Spread Ransomware To Traditional Pcs, Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz

Journal of Cybersecurity Education, Research and Practice

This paper presents a voice hacking proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue ...


A Technological Hug, 2018 Vocational Training Council

A Technological Hug

SIGNED: The Magazine of The Hong Kong Design Institute

Hugus is a new interactive device designed by HKDI students Heung Oi Lam, Fung Lim Chi, Hung Shun Wai, Ho Sin Yi, Tam Kai Fung, Wong Lap Wing and Yu Chi Yin. The device, designed to help connect people to their family when far from home, received multiple accolades at the 1st ACG+Capital Awards......


Feeling Ai, 2018 Vocational Training Council

Feeling Ai

SIGNED: The Magazine of The Hong Kong Design Institute

We all develop emotional connections to the devices we use; the smartphone that is a constant companion or the office printer that is a constant source of frustration. Soon, these machines might be able to respond in kind


Being Human, 2018 Vocational Training Council

Being Human

SIGNED: The Magazine of The Hong Kong Design Institute

To mark the conclusion of SIGNED Magazine's exploration of the intersection of technology and design, we spoke to two leaders in their fields about how technology can make us more human, not less


Me2b, 2018 Vocational Training Council

Me2b

SIGNED: The Magazine of The Hong Kong Design Institute

Fixing the internet's biggest flaw


Home Ex Data, The Natural Of The Artificial, 2018 Vocational Training Council

Home Ex Data, The Natural Of The Artificial

SIGNED: The Magazine of The Hong Kong Design Institute

Technology has become second nature to humankind. The Homo Ex Data exhibition at HKDI Gallery explored how we can no longer survive without it


Virtually Yours, 2018 Vocational Training Council

Virtually Yours

SIGNED: The Magazine of The Hong Kong Design Institute

New and old cultural institutions are building online worlds for the sharing of ideas and culture; 3D scanning is allowing established institutions to renew their online presence and new forms of digital-only museum are springing up. Most excitingly of all, 3D scanning and VR allow for ancient and modern artefacts to be experienced from the comfort of our own homes


From The Editors, Michael E. Whitman, Herbert J. Mattord, Carole L. Hollingsworth 2018 Kennesaw State University

From The Editors, Michael E. Whitman, Herbert J. Mattord, Carole L. Hollingsworth

Journal of Cybersecurity Education, Research and Practice

Welcome to the Spring 2018 issue of the Journal of Cybersecurity Education, Research, and Practice (JCERP). On behalf of the editorial team, we thank you for taking the time to read this issue and strongly encourage you to submit an article for consideration in an upcoming edition.


Lincoln Area Skills Gap Report: Final Report, Eric Thompson 2018 University of Nebraska - Lincoln

Lincoln Area Skills Gap Report: Final Report, Eric Thompson

Bureau of Business Research Publications

In recent months, the Nebraska Departments of Labor and Economic Development have led efforts to conduct two surveys regarding the skills of workers and skill needs of employers in the Lincoln area. The surveys were conducted during late 2017 and early 2018. The Lincoln area includes the two counties of the Lincoln Metropolitan Area (Lancaster and Seward), all or most of five surrounding southeast Nebraska counties (Gage, Jefferson, Saline, Saunders, and York) and a portions of 4 other adjacent counties (Butler, Cass, Fillmore, and Otoe). The two surveys are the Lincoln Area Labor Availability Survey and the Lincoln Area Survey ...


Assessment Of Policy Alternatives For Mitigation Of Barriers To Ev Adoption, Bilgehan Yildiz 2018 Portland State University

Assessment Of Policy Alternatives For Mitigation Of Barriers To Ev Adoption, Bilgehan Yildiz

Dissertations and Theses

Electric Vehicle (EV) has become an increasingly important topic in recent years due to energy and environmental concerns. Governments started to focus on remedies to the upcoming climate change threat and seek solutions through policies and regulations. The negative impact of carbon emissions along with pressure from governmental and social organizations force automotive manufacturers to shift to alternative energy sources. However, EV transition is a complex problem because its stakeholders are very diverse including governments, policy makers, EV manufacturers, and Non-Government Organizations (NGOs). Consequently, the barriers to EV adoption are not only consumer oriented, rather exist under many categories. The ...


Achieving Organizational Ambidexterity: An Exploratory Model, Using Fuzzy Cognitive Maps, Yasser Alizadeh 2018 Portland State University

Achieving Organizational Ambidexterity: An Exploratory Model, Using Fuzzy Cognitive Maps, Yasser Alizadeh

Dissertations and Theses

Over the course of three to four decades, most well-established companies lose their dominating position in the market or fail entirely. Their failure occurs even though they have resources for sensing shifting market trends, skills and assets to develop next-generation technologies, and the financial means to fill skill gaps and afford risky investments. Nevertheless, incumbents obviously find it very difficult to invest in innovation that takes attention and resources away from a highly successful core business. A solution to this "innovator's dilemma" is the concept of "organizational ambidexterity," which has garnered considerable attention among researchers in organization and innovation ...


Delegation Application, Erik Matthew Phillips 2018 California Polytechnic State University, San Luis Obispo

Delegation Application, Erik Matthew Phillips

Computer Science

Delegation is a cross-platform application to provide smart task distribution to users. In a team environment, the assignment of tasks can be tedious and difficult for management or for users needing to discover a starting place for where to begin with accomplishing tasks. Within a specific team, members possess individual skills within different areas of the team’s responsibilities and specialties, and certain members will be better suited to tackle specific tasks. This project provides a solution, consisting of a smart cross-platform application that allows for teams and individuals to quickly coordinate and delegate tasks assigned to them.


Novel Wine Pouring Machine, Jacob N. Rardin, Erin Clark, Berkeley Davis, Julia Trenkle, Brett Wittmuss 2018 California Polytechnic State University, San Luis Obispo

Novel Wine Pouring Machine, Jacob N. Rardin, Erin Clark, Berkeley Davis, Julia Trenkle, Brett Wittmuss

Mechanical Engineering

This Final Design Report outlines the “Novel Wine Opener” senior design project completed by a team of mechanical engineering students at California Polytechnic State University, San Luis Obispo. The project was sponsored by Bill Swanson, owner of the Center of Effort vineyard and winery in Edna Valley, CA. The goal of the project was to produce a novel wine pouring machine for the Center of Effort. This device should be able to remove the foil cap from a wine bottle, uncork the bottle, and pour a glass of wine at the winery and at public events. The finished product should ...


Regulation And The Marginalist Revolution, Herbert J. Hovenkamp 2018 University of Pennsylvania Law School

Regulation And The Marginalist Revolution, Herbert J. Hovenkamp

Faculty Scholarship

The marginalist revolution in economics became the foundation for the modern regulatory State with its “mixed” economy. Marginalism, whose development defines the boundary between classical political economy and neoclassical economics, completely overturned economists’ theory of value. It developed in the late nineteenth century in England, the Continent and the United States. For the classical political economists, value was a function of past averages. One good example is the wage-fund theory, which saw the optimal rate of wages as a function of the firm’s ability to save from previous profits. Another is the theory of corporate finance, which assessed a ...


An Investigation Of The Benefits And Barriers Of E‐Business Adoption Activities In Yemeni Smes, Ahmed Abdullah, Brychan Thomas, Lyndon Murphy, Eoin Plant 2018 University of South Wales

An Investigation Of The Benefits And Barriers Of E‐Business Adoption Activities In Yemeni Smes, Ahmed Abdullah, Brychan Thomas, Lyndon Murphy, Eoin Plant

Articles

Yemeni small‐ and medium‐sized enterprises (SMEs) are at the early stages of e‐business adoption and their owners and managers need to be supported to gain an understanding of the benefits that their business can achieve from adopting e‐business. Yemeni SMEs are at the early stages of e‐business adoption. The delay in adopting more advanced e‐business solutions are due to factors including the comparatively low level of technology usage within the organization, lack of qualified staff available to develop, implement and support firms’ websites, and limited financial resources. A lack of computer software and hardware resources ...


Digital Commons powered by bepress