Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

3,036 Full-Text Articles 3,223 Authors 1,217,565 Downloads 171 Institutions

All Articles in Technology and Innovation

Faceted Search

3,036 full-text articles. Page 1 of 100.

An Examination Of The Stock Market's Effect On Economic Inequality, Nicholas Golina 2019 The University of Akron

An Examination Of The Stock Market's Effect On Economic Inequality, Nicholas Golina

Honors Research Projects

The economic literature on economic inequality has shown that it can negatively impact aggregate demand because it indicates a higher concentration of wealth in the hands of the top 10% as opposed to the poor and middle class, who are more likely to consume. The literature has identified many factors that can lead to increasing inequality. The stock market could be one of those factors since it can either create an upward redistributive effect towards the top 10% or redistributive effect towards the middle class. This paper tested the effect of the stock market on inequality. This study contributes to ...


Understanding The Kenya Open Data Initiative Trajectory Based On Callon’S Moments Of Translation, Paul Wando Mungai Dr, Jean-Paul Van Belle Prof. 2018 University of Cape Town

Understanding The Kenya Open Data Initiative Trajectory Based On Callon’S Moments Of Translation, Paul Wando Mungai Dr, Jean-Paul Van Belle Prof.

The African Journal of Information Systems

This study seeks to understand the existing interactions between actors of the Kenya Open Data Initiative (KODI), and how the actors’ interests are aligning to achieve openness and transparency of government operations. This study is based on the Callon’s moments of translation framework, which helps in describing the interaction between initiators of a network and other involved actors with the aim of aligning their diverse interests in order to achieve a common goal. KODI comprised of a diverse group of stakeholders from government, private sector, inter-governmental organisation, and civil society. KODI has faced various challenges since its inception in ...


Innovation, Firm Size Distribution, And Gains From Trade, Yi-Fan CHEN, Wen-Tai HSU, Shin-Kun PENG 2018 Singapore Management University

Innovation, Firm Size Distribution, And Gains From Trade, Yi-Fan Chen, Wen-Tai Hsu, Shin-Kun Peng

Research Collection School Of Economics

We study a trade model with monopolistic competition a la Melitz (2003) that is standard except that firm heterogeneity is endogenously determined by firms innovating to enhance their productivities. We show that the equilibrium productivity and firm-size distributions exhibit power-law tails under rather general conditions on demand and technology. In particular, the emergence of the power laws is essentially independent of the underlying primitive heterogeneity among firms. We investigate the model’s welfare implications, and conduct a quantitative analysis of welfare gains from trade. We find that, conditional on the same trade elasticity and values of the common parameters, our ...


Reflective Practice Series: Selected Instructional Models Using Synchronous Video Conferencing Software, Martin W. Sivula 2018 Johnson & Wales University - Providence

Reflective Practice Series: Selected Instructional Models Using Synchronous Video Conferencing Software, Martin W. Sivula

MBA Faculty Conference Papers & Journal Articles

With the vast array of resources available to instructors, one would think that instruction and teaching would yield success for all learners. Now, well into the 21st century has much changed in the classroom? Certainly, movable desks and chairs, advanced audio and visual equipment, and a plethora of all types of technologies which might be able to enhance training and education. Over the last several decades research on individualized instruction, cognitive science, educational psychology, and multimedia instruction (to name a few) have permeated the literature on instruction. With all the research and the vast array of studies on improving ...


Yelp’S Review Filtering Algorithm, Yao Yao, Ivelin Angelov, Jack Rasmus-Vorrath, Mooyoung Lee, Daniel W. Engels 2018 Southern Methodist University

Yelp’S Review Filtering Algorithm, Yao Yao, Ivelin Angelov, Jack Rasmus-Vorrath, Mooyoung Lee, Daniel W. Engels

SMU Data Science Review

In this paper, we present an analysis of features influencing Yelp's proprietary review filtering algorithm. Classifying or misclassifying reviews as recommended or non-recommended affects average ratings, consumer decisions, and ultimately, business revenue. Our analysis involves systematically sampling and scraping Yelp restaurant reviews. Features are extracted from review metadata and engineered from metrics and scores generated using text classifiers and sentiment analysis. The coefficients of a multivariate logistic regression model were interpreted as quantifications of the relative importance of features in classifying reviews as recommended or non-recommended. The model classified review recommendations with an accuracy of 78%. We found that ...


The Resource Allocation Optimization Problem For Cloud Computing Environments, Victor Yim, Colin Fernandes 2018 Southern Methodist University

The Resource Allocation Optimization Problem For Cloud Computing Environments, Victor Yim, Colin Fernandes

SMU Data Science Review

In this paper, we present the use of optimization models to evaluate how to best allocate cloud computing resources to minimize cost and time to generate analysis. We look at cloud platform providers Amazon Web Services, Google Cloud and Microsoft Azure on their product offering. We selected 18 machine configuration instances among these providers and analyze the pricing structure of the different configuration. Using a support vector machine analysis written in python, performance data was gathered on these instances to compare time and cost on various data sizes. Using this result, we build models that allow us to select the ...


Techno-Optimism And Farmers’ Attitudes Toward Climate Change Adaptation, Maaz Gardezi, J. Gordon Arbuckle 2018 South Dakota State University

Techno-Optimism And Farmers’ Attitudes Toward Climate Change Adaptation, Maaz Gardezi, J. Gordon Arbuckle

Sociology Publications

In industrialized societies, techno-optimism is a belief that human ingenuity, through improved science and technology, will ultimately provide remedies to most current and future threats to human well-being, such as diseases, climate change, and poverty. Here we examine: (1) whether techno-optimism is found among Midwestern corn and soybean farmers and (2) how this confidence in human ingenuity influences their support for climate change adaptation. By examining data from a survey of nearly 5000 grain farmers in the Midwestern U.S., we found that greater techno-optimism can reduce farmers’ support for climate change adaptation and increase their propensity to express a ...


Developing A Mixed-Methods Method To Model Elderly Health Technology Adoption With Fuzzy Cognitive Map, And Its Application In Adoption Of Remote Health Monitoring Technologies By Elderly Women, Noshad Rahimi 2018 Portland State University

Developing A Mixed-Methods Method To Model Elderly Health Technology Adoption With Fuzzy Cognitive Map, And Its Application In Adoption Of Remote Health Monitoring Technologies By Elderly Women, Noshad Rahimi

Dissertations and Theses

Providing healthcare to the ever-rising elderly population has become a severe challenge and a top priority. Emerging innovations in healthcare, such as remote health monitoring technologies, promise to provide a better quality of care and reduce the cost of healthcare. However, many elderly people reject healthcare innovations. This lack of adoption constitutes a big practical problem because it keeps the elderly from benefiting from technology advances. The phenomenon is even more pronounced among elderly women, who represent the majority of the elderly population.

A plethora of studies in the field of technology adoption resulted in sound, but highly generalized theories ...


The Influence Of An Electronic Attendance Monitoring System On Undergraduate Academic Success, Charles Childress 2018 The University of Southern Mississippi

The Influence Of An Electronic Attendance Monitoring System On Undergraduate Academic Success, Charles Childress

Dissertations

Investing in human capital development increases education levels, workplace skills, and boost individual abilities. Undergraduate students who attend class and perform well are more likely to get jobs, due to their development of workplace skills. State governments, as the funding bodies for public universities, are finding it beneficial to increase the number of college graduates because a citizenry that is prepared for the job market is ultimately good for the state. States recognize that an increase in education can produce job opportunities for citizens. University administrators can employ tactics to increase graduation rates, one of which is monitoring students’ class ...


Disrupting The Medical Industry With An App, Singapore Management University 2018 Singapore Management University

Disrupting The Medical Industry With An App, Singapore Management University

Perspectives@SMU

GetDoc’s prescription for patient health: a standard consultation fee and cost transparency


Technology That Enables, Services That Empower, Yuyun Wirawati ISHAK 2018 Singapore Management University

Technology That Enables, Services That Empower, Yuyun Wirawati Ishak

Research Collection Library

Before 2016, the Library offered two different information desks: one for general/circulation enquiry and one for reference enquiry. The problem at that time was quite glaring: we were to open a new library branch, and if we replicated the information desks, we would have ended up with 4 different information desks, causing constraints in human resources and logistics.The solution seemed obvious: to merge the information desks into a single desk, hence cutting down the needs for staffing. The implementation, however, was not that straightforward. Staff who used to manage circulation enquiry were not comfortable with reference enquiry, and ...


Problems And Promises Of Using Lms Learner Analytics For Assessment, Valerie Beech, Eric A. Kowalik 2018 Marquette University

Problems And Promises Of Using Lms Learner Analytics For Assessment, Valerie Beech, Eric A. Kowalik

Eric A. Kowalik

Learning management systems (LMS) are widely used in education. They offer the potential for assessing student learning, but the reality of using them for this is problematic. This case study chronicles efforts by librarians at Marquette University to use LMS data to assess students’ information literacy knowledge in Marquette’s first-year English program.


Behavioral Finance, Decumulation And The Regulatory Strategy For Robo-Advice, Tom Baker, Benedict Dellaert 2018 University of Pennsylvania Law School

Behavioral Finance, Decumulation And The Regulatory Strategy For Robo-Advice, Tom Baker, Benedict Dellaert

Faculty Scholarship

This working paper surveys the decumulation services offered by investment robo-advisors as a case study with which to examine regulatory and market structure issues raised by automated financial advice. We provide a short introduction to decumulation, describing some of the uncertainties involved in identifying optimal decumulation strategies and sketching a few of the ‘rules of thumb’ that financial advisors have developed in this area in the face of this uncertainty. Next we describe behavioral effects that could inhibit consumers from following an optimal decumulation strategy, concluding that, left to their own devices, consumers are likely to make sub-optimal decumulation decisions ...


Experiential Learning Builds Cybersecurity Self-Efficacy In K-12 Students, Abdullah Konak 2018 Penn State Berks

Experiential Learning Builds Cybersecurity Self-Efficacy In K-12 Students, Abdullah Konak

Journal of Cybersecurity Education, Research and Practice

In recent years, there have been increased efforts to recruit talented K-12 students into cybersecurity fields. These efforts led to many K-12 extracurricular programs organized by higher education institutions. In this paper, we first introduce a weeklong K-12 program focusing on critical thinking, problem-solving, and igniting interest in information security through hands-on activities performed in a state-of-the-art virtual computer laboratory. Then, we present an inquiry-based approach to design hands-on activities to achieve these goals. We claim that hands-on activities designed based on this inquiry-based framework improve K-12 students’ self-efficacy in cybersecurity as well as their problem-solving skills. The evaluation of ...


Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos 2018 San Jose State University

Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos

Journal of Cybersecurity Education, Research and Practice

We conducted an observational study to document student misconceptions about cybersecurity using thematic analysis of 25 think-aloud interviews. By understanding patterns in student misconceptions, we provide a basis for developing rigorous evidence-based recommendations for improving teaching and assessment methods in cybersecurity and inform future research. This study is the first to explore student cognition and reasoning about cybersecurity. We interviewed students from three diverse institutions. During these interviews, students grappled with security scenarios designed to probe their understanding of cybersecurity, especially adversarial thinking. We analyzed student statements using a structured qualitative method, novice-led paired thematic analysis, to document patterns in ...


A Case Study In The Implementation Of A Human-Centric Higher Education Cybersecurity Program, John W. Coffey, Melanie Haveard, Geissler Golding 2018 The University of West Florida

A Case Study In The Implementation Of A Human-Centric Higher Education Cybersecurity Program, John W. Coffey, Melanie Haveard, Geissler Golding

Journal of Cybersecurity Education, Research and Practice

This article contains a description of the implementation of a comprehensive cyber security program at a regional comprehensive university. The program was designed to create an effective cyber security management infrastructure and to train end users and other categories of security management personnel in data protection and cyber security. This work addresses the impetus for the program, the rather extensive planning and development that went into the program, its implementation, and insights gleaned from the experience. The paper concludes with a summary of the strengths and weaknesses of the initiative.


"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Security Awareness Campaign, Rachael L. Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky J. Jenkins 2018 Eastern Michigan University

"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Security Awareness Campaign, Rachael L. Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky J. Jenkins

Journal of Cybersecurity Education, Research and Practice

This article discusses the lessons learned after implementing a successful university-wide cyber security campaign. The Cyber Security Awareness Committee (CyberSAC), a group comprised of diverse units across campus, collaborated together on resources, talent, people, equipment, technology, and assessment practices to meet strategic goals for cyber safety and education. The project involves assessing student learning and behavior changes after participating in a Cyber Security Password Awareness event that was run as a year-long campaign targeting undergraduate students. The results have implications for planning and implementing university-wide initiatives in the field of cyber security, and more broadly, higher education at large.


Voice Hacking: Using Smartphones To Spread Ransomware To Traditional Pcs, Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz 2018 University of North Georgia

Voice Hacking: Using Smartphones To Spread Ransomware To Traditional Pcs, Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz

Journal of Cybersecurity Education, Research and Practice

This paper presents a voice hacking proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue ...


A Technological Hug, 2018 Vocational Training Council

A Technological Hug

SIGNED: The Magazine of The Hong Kong Design Institute

Hugus is a new interactive device designed by HKDI students Heung Oi Lam, Fung Lim Chi, Hung Shun Wai, Ho Sin Yi, Tam Kai Fung, Wong Lap Wing and Yu Chi Yin. The device, designed to help connect people to their family when far from home, received multiple accolades at the 1st ACG+Capital Awards......


Feeling Ai, 2018 Vocational Training Council

Feeling Ai

SIGNED: The Magazine of The Hong Kong Design Institute

We all develop emotional connections to the devices we use; the smartphone that is a constant companion or the office printer that is a constant source of frustration. Soon, these machines might be able to respond in kind


Digital Commons powered by bepress