Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

3366 Full-Text Articles 3048 Authors 1103338 Downloads 161 Institutions

All Articles in Technology and Innovation

Faceted Search

3366 full-text articles. Page 1 of 110.

Collective Action And Market Formation: An Integrative Framework, Brandon Lee, Jeroen Struben, Christopher B. Bingham 2018 McGill University

Collective Action And Market Formation: An Integrative Framework, Brandon Lee, Jeroen Struben, Christopher B. Bingham

Brandon Lee


While extant research places collective action at the heart of market formation, it provides little understanding about when and to what extent collective action is important. In this paper, we develop a novel theoretical framework detailing what collective action problems and solutions arise in market formation and under what conditions. Our framework centers on the development of market infrastructure with three key factors that influence the nature and extent of collective action problems: perceived returns to contributions, excludability, and contribution substitutability. We apply our framework to diverse market formation contexts and derive a fresh set of attendant propositions. Finally, we ...


Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder 2017 College of Engineering and Computing, Nova Southeastern University

Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder

KSU Proceedings on Cybersecurity Education, Research and Practice

Millions of people willingly expose their lives via Internet technologies every day, and even those who stay off the Internet find themselves exposed through data breaches. Trillions of private information records flow through the Internet. Marketers gather personal preferences to coerce shopping behavior, while providers gather personal information to provide enhanced services. Few users have considered where their information is going or who has access to it. Even fewer are aware of how decisions made in their own lives expose significant pieces of information, which can be used to harm the very organizations they are affiliated with by cyber attackers ...


A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi 2017 University of Alabama, Birmingham

A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi

KSU Proceedings on Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


Experiments With Applying Artificial Immune System In Network Attack Detection, Alexis Cooper 2017 North Carolina A & T State University

Experiments With Applying Artificial Immune System In Network Attack Detection, Alexis Cooper

KSU Proceedings on Cybersecurity Education, Research and Practice

The assurance of security within a network is difficult due to the variations of attacks. This research conducts various experiments to implement an Artificial Immune System based Intrusion Detection System to identify intrusions using the Negative Selection Algorithm. This research explores the implementation of an Artificial Immune System opposed to the industry standard of machine learning. Various experiments were conducted to identify a method to separate data to avoid false-positive results. The use of an Artificial Immune System requires a self and nonself classification to determine if an intrusion is present within the network. The results of an Artificial Immune ...


A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard Nilsen, Yair Levy, Steven Terrell, Dawn Beyer 2017 Nova Southeastern University

A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard Nilsen, Yair Levy, Steven Terrell, Dawn Beyer

KSU Proceedings on Cybersecurity Education, Research and Practice

Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and ...


Voice Hacking Proof Of Concept: Using Smartphones To Spread Ransomware To Traditional Pcs, Leonardo I. Mazuran, Bryson R. Payne, Tamirat T. Abegaz 2017 University of North Georgia

Voice Hacking Proof Of Concept: Using Smartphones To Spread Ransomware To Traditional Pcs, Leonardo I. Mazuran, Bryson R. Payne, Tamirat T. Abegaz

KSU Proceedings on Cybersecurity Education, Research and Practice

This paper presents a working proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue exploit ...


Security Device Roles, Vabrice Wilder 2017 Kennesaw State University

Security Device Roles, Vabrice Wilder

KSU Proceedings on Cybersecurity Education, Research and Practice

“An abstract of this article was published in the proceedings of the Conference on Cybersecurity Education, Research & Practice, 2017”. Communication has evolved since the beginning of mankind from smoke signals to drones to now the internet. In a world filled with technology the security of one’s device is not to be taken for granted. A series of research was done in order to gather details about network devices that can aid in the protection of one’s information while being transferred through the internet. The findings included but not limited to, switches, the seven layers of OSI, routers, firewalls ...


"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Secuity Awareness Campaign, Rachael Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky Jenkins 2017 Eastern Michigan University

"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Secuity Awareness Campaign, Rachael Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky Jenkins

KSU Proceedings on Cybersecurity Education, Research and Practice

This article discusses the lessons learned after implementing a successful university-wide cyber security campaign. The Cyber Security Awareness Committee (CyberSAC), a group comprised of diverse units across campus, collaborated together on resources, talent, people, equipment, technology, and assessment practices to meet strategic goals for cyber safety and education. The project involves assessing student learning and behavior changes after participating in a Cyber Security Password Awareness event that was run as a year-long campaign targeting undergraduate students. The results have implications for planning and implementing university-wide initiatives in the field of cyber security, and more broadly, higher education at large.


Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang 2017 University of Tennessee at Chattanooga

Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang

KSU Proceedings on Cybersecurity Education, Research and Practice

Since web browsers have become essential to accomplishing everyday tasks, developing secure web applications has become a priority in order to protect user data, corporate databases and critical infrastructure against cyber-crimes . This research presents a game-like (gamification) approach to teach key concepts and skills on how to develop secure web applications. Gamification draws on motivational models, one of psychological theories. Gamification design has great potential over traditional education where we often find students demotivated and lecturers failing to engage them in learning activities. This research created game-like learning modules to teach top vulnerabilities and countermeasures for these top vulnerabilities in ...


Five Cities Where 'Tesign' Is Creating Happiness, 2017 Vocational Training Council

Five Cities Where 'Tesign' Is Creating Happiness

SIGNED: The Magazine of The Hong Kong Design Institute

Around the world, cities are implementing policies that create happiness through the application of good "tesign"


Happiness: A 'Tesign' For Life, 2017 Vocational Training Council

Happiness: A 'Tesign' For Life

SIGNED: The Magazine of The Hong Kong Design Institute

Happiness can be hard to come by. Since Aristotle walked the streets of ancient Athens preaching the good life, the search for happiness has fed the imagination and driven innovation. Can our contemporary world of high-tech connectivity provide the satisfaction we have always sought? "Tesign" -- the combination of technology and design -- is here to help.


Performance Analysis Of Security Aspects In Uml Models, Dorin Bogdan Petriu, Dorina C. Petriu, C Murray Woodside, Jing Xiu, Toqeer A. Israr, Geri Georg, Robert B. France, James M. Bieman, Siv Holde Houmb, Jan Jurjens 2017 Carleton University

Performance Analysis Of Security Aspects In Uml Models, Dorin Bogdan Petriu, Dorina C. Petriu, C Murray Woodside, Jing Xiu, Toqeer A. Israr, Geri Georg, Robert B. France, James M. Bieman, Siv Holde Houmb, Jan Jurjens

Toqeer A Israr

The focus of the paper is on the analysis of performance effects of different security solutions modeled as aspects in UML. Aspect oriented modeling (AOM) allows software designers to isolate and separately address solutions for crosscutting concerns, which are defined as distinct UML aspect models, then are composed with the primary UML model of the system under development. For performance analysis we use techniques developed previously in the PUMA project, which take as input UML models annotated with the standard UML Profile for Schedulability, Performance and Time (SPT), and transform them first into Core Scenario Model (CSM) and then into ...


Performance Modeling Of Distributed Collaboration Services, Toqeer A. Israr, Gregor V. Bochmann 2017 Eastern Illinois University

Performance Modeling Of Distributed Collaboration Services, Toqeer A. Israr, Gregor V. Bochmann

Toqeer A Israr

This paper deals with performance modeling of distributed applications, service compositions and workflow systems. From the functional perspective, the distributed application is modeled as a collaboration involving several roles, and its behavior is defined in terms of a composition from several sub-collaborations using the standard sequencing operators found in UML Activity Diagrams and similar formalisms. For the performance perspective, each collaboration is characterized by a certain number of independent input events and dependent output events, and the performance of the collaboration is defined by the minimum delays that apply for a given output event in respect to each input event ...


Performance By Unified Model Analysis (Puma), Murray Woodside, Dorina C. Petriu, Dorin B. Petriu, Hui Shen, Toqeer A. Israr, Jose Merseguer 2017 Carleton University

Performance By Unified Model Analysis (Puma), Murray Woodside, Dorina C. Petriu, Dorin B. Petriu, Hui Shen, Toqeer A. Israr, Jose Merseguer

Toqeer A Israr

Evaluation of non-functional properties of a design (such as performance, dependability, security, etc.) can be enabled by design annotations specific to the property to be evaluated. Performance properties, for instance, can be annotated on UML designs by using the "UML Profile for Schedulability, Performance and Time (SPT)". However the communication between the design description in UML and the tools used for non-functional properties evaluation requires support, particularly for performance where there are many alternative performance analysis tools that might be applied. This paper describes a tool architecture called PUMA, which provides a unified interface between different kinds of design information ...


Stochastic Performance Analysis Of Distributed Activities, Toqeer A. Israr 2017 Eastern Illinois University

Stochastic Performance Analysis Of Distributed Activities, Toqeer A. Israr

Toqeer A Israr

This paper analyzes stochastic performance of a distributed global activity, composed of sub-activities sequenced serially, probabilistically, or concurrently. We provide general formulas with which we calculate the per-formance of a composite activity based on the performance of the constituent sub-activities and the control structure. To do this, we model each sub-activity as a Partially Ordered Specification (POS), where each sub-activity is character-ized by independent input events, dependent output events and the stochastic minimum delays between these events. This technique allows two or more sub-activities to be combined hierarchically. Proofs of correctness for these formu-las are given and a simple example ...


Performance Modeling Of Distributed Collaboration Services With Independent Inputs/Outputs, Toqeer A. Israr, Gregor V. Bochmann 2017 Eastern Illinois University

Performance Modeling Of Distributed Collaboration Services With Independent Inputs/Outputs, Toqeer A. Israr, Gregor V. Bochmann

Toqeer A Israr

This paper deals with modeling and performance analysis of dis-tributed applications, service compositions and workflow systems. From the functional perspective, the distributed application is modeled as an activity in-volving several roles, where behavior is defined in terms of compositions from several sub-activities using the standard sequencing operators found in UML Activity Diagrams. Each activity is characterized by a certain number of input and output events, and the performance of the activity is defined by the mini-mum delays that apply for a given output event in respect to each input event. We use a partial order to model these events, whose ...


Sboqq.Io Domino 99, Agen Bandarq, Domino Qiu Qiu, Capsa Online.Docx, Luna Maya 2017 informasi online

Sboqq.Io Domino 99, Agen Bandarq, Domino Qiu Qiu, Capsa Online.Docx, Luna Maya

Luna Maya

Menentukan poker deposit SBOQQ.IO domino 99, agen bandarq,domino qiu qiu, capsa online tidak bisa gegabah. Bettor mesti mengesahkan kalau poker online dengan jackpot terbesar teritori kita permainan dengan online yaitu wakil yang bisa dipercaya.

Info Sboqq lebih lengkap :
http://zayiflama-yontemleri.tk/sboqq-io-domino-99-agen-bandarq-domino-qiu-qiu-capsa-online/
http://neotipsfacebooko.blogspot.co.id/2017/09/sboqqio-domino-99-agen-bandarq-domino.html
https://sampantua.wordpress.com/2017/09/03/sboqq-io-domino-99-agen-bandarq-domino-qiu-qiu-capsa-online/
http://agendominoq.weebly.com/home/sboqqio-domino-99-agen-bandarq-domino-qiu-qiu-capsa-online
https://pokerdominoblog.tumblr.com/post/164929726243/sboqqio-domino-99-agen-bandarq-domino-qiu-qiu
http://aduqq.hatenablog.com/entry/sboqq-io-domino-99
http://pokerdominoseo.blogdetik.com/2017/09/03/sboqqio-domino-99-agen-bandarq-domino-qiu-qiu-capsa-online
https://aduqqseo.joomla.com/2-uncategorised/30-sboqq-io-domino-99-agen-bandarq-domino-qiu-qiu-capsa-online
http://situsgameonline.pe.hu/sboqq-io-domino-99-agen-bandarq-domino-qiu-qiu-capsa-online/


Virtual Reality As A Promotional Tool: Insights From A Consumer Travel Fair, Mary O'Rawe, Alex Gibson 2017 Dublin Institute of Technology

Virtual Reality As A Promotional Tool: Insights From A Consumer Travel Fair, Mary O'Rawe, Alex Gibson

Books / Book chapters

Although the potential of virtual reality (VR) as a technology in tourism has been recognised for more than twenty years, (Horan, 1996; Williams and Hobson, 1995), we have witnessed a renewed interest in both academic and business circles recently (Jung, tom Dieck, Lee, & Chung, 2016). From a marketing perspective, VR offers the potential to build a sensory experience of a tourism destination or attraction, and can be used in sales contexts to complement, or indeed, supplant traditional promotional tools such as brochures. The immersive nature of the experience offers a deeper and more emotional assessment of the tourist offering from ...


Regulating Robo Advice Across The Financial Services Industry, Tom Baker, Benedict G. C. Dellaert 2017 University of Pennsylvania Law School

Regulating Robo Advice Across The Financial Services Industry, Tom Baker, Benedict G. C. Dellaert

Faculty Scholarship

Automated financial product advisors – “robo advisors” – are emerging across the financial services industry, helping consumers choose investments, banking products, and insurance policies. Robo advisors have the potential to lower the cost and increase the quality and transparency of financial advice for consumers. But they also pose significant new challenges for regulators who are accustomed to assessing human intermediaries. A well-designed robo advisor will be honest and competent, and it will recommend only suitable products. Because humans design and implement robo advisors, however, honesty, competence, and suitability cannot simply be assumed. Moreover, robo advisors pose new scale risks that are different ...


Antitrust And The Design Of Production, Herbert J. Hovenkamp 2017 University of Pennsylvania Law School

Antitrust And The Design Of Production, Herbert J. Hovenkamp

Faculty Scholarship

Both economics and antitrust policy have traditionally distinguished “production” from “distribution.” The former is concerned with how products are designed and built, the latter with how they are placed into the hands of consumers. Nothing in the language of the antitrust laws suggests much concern with production as such. Although courts do not view it that way, even per se unlawful naked price fixing among rivals is a restraint on distribution rather than production. Naked price fixing assumes a product that has already been designed and built, and the important cartel decision is what should be each firm’s output ...


Digital Commons powered by bepress