Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

3,730 Full-Text Articles 4,267 Authors 1,645,885 Downloads 210 Institutions

All Articles in Technology and Innovation

Faceted Search

3,730 full-text articles. Page 1 of 132.

Public Health Insurance And Pharmaceutical Innovation: Evidence From China, Xuan ZHANG, Huihua NIE 2021 Singapore Management University

Public Health Insurance And Pharmaceutical Innovation: Evidence From China, Xuan Zhang, Huihua Nie

Research Collection School Of Economics

Developing countries are characterized by low levels of pharmaceutical innovation. A likely reason is their small market size, which is not because of the population size but because of low levels of income and lack of health insurance coverage. This study exploits a natural experiment from the implementation of a public health insurance program for rural residents in China (New Cooperative Medical Scheme [NCMS]) to examine whether the pharmaceutical industry increases innovation regarding diseases covered by the NCMS that are prevalent in rural areas. We examine the 1993–2009 patent data to gauge pharmaceutical innovation in China. Diseases with a ...


Speaker Prototyping Design, Andrew Lathe 2020 East Tennessee State University

Speaker Prototyping Design, Andrew Lathe

Undergraduate Honors Theses

Audio design is a pertinent industry in today’s world, with an extremely large market including leaders such as Bose, Harman International, and Sennheiser. This project is designed to explore the processes that are necessary to create a new type of product in this market. The end goal is to have a functioning, high–quality set of speakers to prove various concepts of design and prototyping.

The steps involved in this project go through the entire design process from initial choice of product to a finished prototype. Processes include the selection of outsourced components such as drivers and necessary connectors ...


Blockchain-Based Public Auditing And Secure Deduplication With Fair Arbitration, Haoran YUAN, Xiaofeng CHEN, Jianfeng WANG, Jiaming YUAN, Hongyang YAN, Willy SUSILO 2020 Singapore Management University

Blockchain-Based Public Auditing And Secure Deduplication With Fair Arbitration, Haoran Yuan, Xiaofeng Chen, Jianfeng Wang, Jiaming Yuan, Hongyang Yan, Willy Susilo

Research Collection School Of Information Systems

Data auditing enables data owners to verify the integrity of their sensitive data stored at an untrusted cloud without retrieving them. This feature has been widely adopted by commercial cloud storage. However, the existing approaches still have some drawbacks. On the one hand, the existing schemes have a defect of fair arbitration, i.e., existing auditing schemes lack an effective method to punish the malicious cloud service provider (CSP) and compensate users whose data integrity is destroyed. On the other hand, a CSP may store redundant and repetitive data. These redundant data inevitably increase management overhead and computational cost during ...


Little Did We Know What We Are Preparing For: Virtual Interviews Before Covid-19, Alina S. Popa, Scott Kubomoto, Lorra Baldes 2020 University of California, Riverside

Little Did We Know What We Are Preparing For: Virtual Interviews Before Covid-19, Alina S. Popa, Scott Kubomoto, Lorra Baldes

HCA Healthcare Journal of Medicine

Current circumstances related to the COVID-19 pandemic require residency programs to conduct virtual interviews. We draw upon our experience with virtual interviews from fall 2019, prior to COVID-19, and propose a potential implementation process for virtual interviewing strategies. We also describe potential pitfalls and strategies to mitigate them.


Air Traffic Safety Management: The Significance Of Voluntary Reporting And Data Distribution, Xavier M. Ashley 2020 Embry-Riddle Aeronautical University

Air Traffic Safety Management: The Significance Of Voluntary Reporting And Data Distribution, Xavier M. Ashley

Beyond: Undergraduate Research Journal

This study primarily investigated inadequacies identified through the utilization of the Air Traffic Safety Action Program (ATSAP), a Voluntary Safety Reporting Program (VSRP) overseen by the U.S. Federal Aviation Administration (FAA). The primary objective of this research was to ascertain whether the FAA was properly managing the ATSAP and if the program was capable of effectively identifying safety hazards present in the national airspace. To assist in this determination, this study communicated the basic characteristics and significance of safety management and voluntary reporting in aviation. This served to clarify the intended function of the ATSAP and to articulate contributions ...


Antitrust And Platform Monopoly, Herbert J. Hovenkamp 2020 University of Pennsylvania Carey Law School

Antitrust And Platform Monopoly, Herbert J. Hovenkamp

Faculty Scholarship at Penn Law

Are large digital platforms that deal directly with consumers “winner take all,” or natural monopoly, firms? That question is surprisingly complex and does not produce the same answer for every platform. The closer one looks at digital platforms the less they seem to be winner-take-all. As a result, competition can be made to work in most of them. Further, antitrust enforcement, with its accommodation of firm variety, is generally superior to any form of statutory regulation that generalizes over large numbers.

Assuming that an antitrust violation is found, what should be the remedy? Breaking up large firms subject to extensive ...


An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles 2020 James Madison University

An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles

James Madison Undergraduate Research Journal (JMURJ)

A smart city is an interconnection of technological components that store, process, and wirelessly transmit information to enhance the efficiency of applications and the individuals who use those applications. Over the course of the 21st century, it is expected that an overwhelming majority of the world’s population will live in urban areas and that the number of wireless devices will increase. The resulting increase in wireless data transmission means that the privacy of data will be increasingly at risk. This paper uses a holistic problem-solving approach to evaluate the security challenges posed by the technological components that make up ...


Introducing Seamlessaccess.Org: Delivering A Simpler, Privacy-Preserving Access Experience, John W. Felts, Tim Lloyd, Emily Singley 2020 Coastal Carolina University

Introducing Seamlessaccess.Org: Delivering A Simpler, Privacy-Preserving Access Experience, John W. Felts, Tim Lloyd, Emily Singley

Charleston Library Conference

Managing access to subscribed services in an era of abundance is a major challenge for libraries. Users have come to expect a seamless, personalized experience on their mobile devices, but traditional approaches to access management force librarians to choose between the anonymous ease of onsite IP authentication or the access friction experienced by users authenticating across multiple resources with Single Sign-On. Building on the work of the RA21 initiative, a recent NISO Recommended Practice on Improved Access to Institutionally Provided Information Resources charts a way forward. It will enable libraries to provide seamless, privacy-preserving and one-click access to its subscribed ...


Resource Discovery In A Changing Content World, Allen Jones, Cynthia R. Schwarz, Hannah McKelvey, Rachelle McLain, Christine Stohn 2020 The New School

Resource Discovery In A Changing Content World, Allen Jones, Cynthia R. Schwarz, Hannah Mckelvey, Rachelle Mclain, Christine Stohn

Charleston Library Conference

Discovery services have evolved to include not just books and articles, but databases, website content, research guides, digital and audiovisual collections, and unique local collections that are all important for their users to be able to find. Search and ranking remain at the core of discovery, but advanced tools such as recommendation, virtual browse, ‘look inside‘, and the use of artificial intelligence are also becoming more prevalent. This group of panelists discussed how content in their discovery systems can change based on the context of the user, using as examples Primo and Blacklight, and how content is populated, discovered and ...


Competitive Harm From Vertical Mergers, Herbert J. Hovenkamp 2020 University of Pennsylvania Carey Law School

Competitive Harm From Vertical Mergers, Herbert J. Hovenkamp

Faculty Scholarship at Penn Law

The antitrust enforcement Agencies' 2020 Vertical Merger Guidelines introduce a nontechnical application of bargaining theory into the assessment of competitive effects from vertical acquisitions. The economics of such bargaining is complex and can produce skepticism among judges, who might regard its mathematics as overly technical, its game theory as excessively theoretical or speculative, or its assumptions as unrealistic.

However, we have been there before. The introduction of concentration indexes, particularly the HHI, in the Merger Guidelines was initially met with skepticism but gradually they were accepted as judges became more comfortable with them. The same thing very largely happened again ...


Contingency Planning Amidst A Pandemic, Natalie C. Belford 2020 University of West Florida

Contingency Planning Amidst A Pandemic, Natalie C. Belford

KSU Proceedings on Cybersecurity Education, Research and Practice

Proper prior planning prevents pitifully poor performance: The purpose of this research is to address mitigation approaches - disaster recovery, contingency planning, and continuity planning - and their benefits as they relate to university operations during a worldwide pandemic predicated by the Novel Coronavirus (COVID-19). The most relevant approach pertaining to the University’s needs and its response to the Coronavirus pandemic will be determined and evaluated in detail.


Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, Chunsheng Xin 2020 Princess Anne High School

Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, Chunsheng Xin

KSU Proceedings on Cybersecurity Education, Research and Practice

Throughout the Internet, many chatbots have been deployed by various organizations to answer questions asked by customers. In recent years, we have been running cybersecurity summer camps for youth. Due to COVID-19, our in-person camp has been changed to virtual camps. As a result, we decided to develop a chatbot to reduce the number of emails, phone calls, as well as the human burden for answering the same or similar questions again and again based on questions we received from previous camps. This paper introduces our practical experience to implement an AI-powered chatbot for middle and high school cybersecurity camps ...


A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad 2020 North Carolina Agricultural and Technical State University

A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad

KSU Proceedings on Cybersecurity Education, Research and Practice

Serious games can challenge users in competitive and entertaining ways. Educators have used serious games to increase student engagement in cybersecurity education. Serious games have been developed to teach students various cybersecurity topics such as safe online behavior, threats and attacks, malware, and more. They have been used in cybersecurity training and education at different levels. Serious games have targeted different audiences such as K-12 students, undergraduate and graduate students in academic institutions, and professionals in the cybersecurity workforce. In this paper, we provide a survey of serious games used in cybersecurity education and training. We categorize these games into ...


Factors That Influence Hipaa Secure Compliance In Small And Medium-Size Health Care Facilities, Wlad Pierre-Francois, Indira Guzman 2020 Trident

Factors That Influence Hipaa Secure Compliance In Small And Medium-Size Health Care Facilities, Wlad Pierre-Francois, Indira Guzman

KSU Proceedings on Cybersecurity Education, Research and Practice

This study extends the body of literature concerning security compliance by investigating the antecedents of HIPPA security compliance. A conceptual model, specifying a set of hypothesized relationships between management support, security awareness, security culture; security behavior, and risk of sanctions to address their effect on HIPAA security compliance is presented. This model was developed based on the review of the literature, Protection Motivation Theory, and General Deterrence Theory. Specifically, the aim of the study is to examine the mediating role of risk of sanctions on HIPAA security compliance.


Towards An Assessment Of Pause Periods On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci, Yair Levy, Martha Snyder, Laurie Dringus 2020 Nova Southeastern University

Towards An Assessment Of Pause Periods On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci, Yair Levy, Martha Snyder, Laurie Dringus

KSU Proceedings on Cybersecurity Education, Research and Practice

Social engineering is the technique in which the attacker sends messages to build a relationship with the victim and convinces the victim to take some actions that lead to significant damages and losses. Industry and law enforcement reports indicate that social engineering incidents costs organizations billions of dollars. Phishing is the most pervasive social engineering attack. While email filtering and warning messages have been implemented for over three decades, organizations are constantly falling for phishing attacks. Prior research indicated that attackers use phishing emails to create an urgency and fear response in their victims causing them to use quick heuristics ...


Engaging Stakeholder Networks To Support Global Oa Monograph Usage Analytics, Christina Drummond 2020 Educopia Institute

Engaging Stakeholder Networks To Support Global Oa Monograph Usage Analytics, Christina Drummond

Collaborative Librarianship

Just as COVID-19 brought in-person meetings to a halt, the Open Access eBook Usage (OAeBU) Data Trust transitioned from a two-year stakeholder planning project to a two-year global pilot tasked with developing infrastructure use-cases, software code, sustainability models, and governance mechanisms to better enable the usage and impact analyses of OA monographs. This report introduces the array of stakeholders involved in OA book analytics and summarizes how this data trust effort worked to engage them during the first third of the project. Virtual network building and engagement strategies such as online stakeholder-oriented communities and collaboration tools are discussed alongside traditional ...


Challenges To Adopting Hybrid Methodology: Addressing Organizational Culture And Change Control Problems In Enterprise It Infrastructure Projects, Harishankar Krishnakumar 2020 Harrisburg University of Science and Technology

Challenges To Adopting Hybrid Methodology: Addressing Organizational Culture And Change Control Problems In Enterprise It Infrastructure Projects, Harishankar Krishnakumar

Dissertations and Theses

IT infrastructure projects have long been an overlooked field superseded by the more popular software development silos and cross-functional project teams when it comes to enterprise Agile transformations. This paper presents a systematic literature review by leveraging a qualitative research methodology based on empirical evidence provided in contemporary scholarly research articles to explore how certain variables such as organizational culture- including team structure, leadership hierarchy, geolocation, etc. along with an organization’s change management processes affect the adoption of a Hybrid/Agile project management methodology, focusing on reported challenges and critical success factors that define such large-scale enterprise transformations. The ...


The Difficulty With Introducing Project Management Techniques In Digital Startups, Isabela Mantilla 2020 Harrisburg University of Science and Technology

The Difficulty With Introducing Project Management Techniques In Digital Startups, Isabela Mantilla

Dissertations and Theses

Digital startups face complex issues when it comes to accurately using project management techniques because of the startup’s scarcity of resources and the governance of projects , such as having different stages of growth and development. Since project management is needed in almost all businesses, dealing with this problem is important to improve the growth of startups and their organizational issues. Because of the correlation between startups using traditional project management techniques and their problems with implementing project management, this traditional model might not be relevant for startups. Startups seem to require more flexible and quick solutions to project management ...


إدارة التقانة بين النظرية والتطبيق: كيف نجحت تلك الدول في نهضتها؟, Bashar Alhaj Ahmad 2020 Siirt University

إدارة التقانة بين النظرية والتطبيق: كيف نجحت تلك الدول في نهضتها؟, Bashar Alhaj Ahmad

Al Jinan الجنان

This research presented one of the modern concepts in administration area called “Technology Management”. This concept refers to the mechanism by which we can transfer one technology from one place to another and gives the ability of applying it following scientific and methodological manner. As a result, this will give the chance for the received country to absorb and assimilate the new technology and to produce similar technologies in advanced phases. In the other side, the research presents many succeed experiments in this field like the Korean, Chinese, and the Malaysian experience. This countries in a very short period could ...


The Influence Of Information Technology Governance Audit Using Cobit 5 For The Development Public Library : (Case Study : Public Library In East Java ), Ilham M, Anis Eliyana, Indrianawati Usman 2020 UIN Sunan Ampel Of Surabaya, Indonesia

The Influence Of Information Technology Governance Audit Using Cobit 5 For The Development Public Library : (Case Study : Public Library In East Java ), Ilham M, Anis Eliyana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study current technological developments have entered almost into the lines of people's lives. Currently, many public library have grown even bigger. And this development does not escape the good management of information technology governance. To maximize management to a better level, public library need information technology governance audits. The information technology audit used in this study uses the COBIT 5 framework which focuses on the APO04 and DSS01 domains. This study aims to improve the quality of services owned and to increase its competitiveness. The results of this study refer to the vision and mission of the public ...


Digital Commons powered by bepress