Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

3,741 Full-Text Articles 4,319 Authors 1,645,885 Downloads 209 Institutions

All Articles in Technology and Innovation

Faceted Search

3,741 full-text articles. Page 1 of 134.

Teaching Trade Secret Management With Threshold Concepts, Haakon Thue Lie, Leif Martin Hokstad, Donal O'Connell 2021 Norwegian University of Science and Technology

Teaching Trade Secret Management With Threshold Concepts, Haakon Thue Lie, Leif Martin Hokstad, Donal O'Connell

Secrecy and Society

Trade secret management (TSM is an emerging field of research. Teaching trade secret management requires the inclusion of several challenging topics, such as how firms use secrets in open innovation and collaboration. The threshold concepts framework is an educational lens well suited for teaching subjects such as TSM that are transformative and troublesome. We identify four such areas in trade secret management and discuss how threshold concepts can be a useful framework for teaching. We then present an outline of a curriculum suited for master’s programs and training of intellectual property (IP) managers. Our main contribution is to fields ...


Bert For Question Answering On Bioasq, Eric R. Fu, Rikel Djoko, Maysam Mansor, Robert Slater 2021 Southern Methodist University

Bert For Question Answering On Bioasq, Eric R. Fu, Rikel Djoko, Maysam Mansor, Robert Slater

SMU Data Science Review

Machine reading comprehension and question answering are topics of considerable focus in the field of Natural Language Processing (NLP). In recent years, language models like Bidirectional Encoder Representations from Transformers (BERT) [3] have been very successful in language related tasks like question answering. The difficulty of the question answering task lies in developing accurate representations of language and being able to produce answers for questions. In this study, the focus is to investigate how to train and fine tune a BERT model to improve its performance on BioASQ, a challenge on large scale biomedical question answering. Our most accurate BERT ...


Gophish: Implementing A Real-World Phishing Exercise To Teach Social Engineering, Andy Luse, Jim Burkman 2021 Oklahoma State University

Gophish: Implementing A Real-World Phishing Exercise To Teach Social Engineering, Andy Luse, Jim Burkman

Journal of Cybersecurity Education, Research and Practice

Social engineering is a large problem in our modern technological world, but while conceptually understood, it is harder to teach compared to traditional pen testing techniques. This research details a class project where students implemented a phishing exercise against real-world targets. Through cooperation with an external corporate partner, students learned the legal, technical, behavioral, analysis, and reporting aspects of social engineering. The outcome provided both usable data for a real-world corporation as well as valuable educational experience for the students.


Applying High Impact Practices In An Interdisciplinary Cybersecurity Program, Brian K. Payne, Lisa Mayes, Tisha Paredes, Elizabeth Smith, Hongyi Wu, ChunSheng Xin 2021 Old Dominion University

Applying High Impact Practices In An Interdisciplinary Cybersecurity Program, Brian K. Payne, Lisa Mayes, Tisha Paredes, Elizabeth Smith, Hongyi Wu, Chunsheng Xin

Journal of Cybersecurity Education, Research and Practice

The Center for Cybersecurity Education and Research at Old Dominion University has expanded its use of high impact practices in the university’s undergraduate cybersecurity degree program. Strategies developed to promote student learning included learning communities, undergraduate research, a robust internship program, service learning, and electronic portfolios. This paper reviews the literature on these practices, highlights the way that they were implemented in our cybersecurity program, and discusses some of the challenges encountered with each practice. Although the prior literature on high impact practices rarely touches on cybersecurity coursework, the robust evidence of the success of those practices provides a ...


An Assessment Of Internet Use And Cyber-Risk Prevalence Among Students In Selected Nigerian Secondary Schools, Adeola O. Opesade Dr, Abiodun O. Adetona Mr 2021 Africa Regional Centre for Information Science, University of Ibadan, Nigeria

An Assessment Of Internet Use And Cyber-Risk Prevalence Among Students In Selected Nigerian Secondary Schools, Adeola O. Opesade Dr, Abiodun O. Adetona Mr

Journal of Cybersecurity Education, Research and Practice

The use of the Internet has become highly pervasive among adolescents. While these people derive numerous benefits from their use of this technology, they are also faced with a challenge of being exposed to many cyber risks. Nigeria is a developing country with a teeming population of adolescents who are regular users of the Internet, but with inadequate research on adolescent Internet safety. There is therefore, a need to conduct studies on child online risks in Nigeria, to help evaluate the enormity of child online abuses. The present study investigated Internet use and cyber-risk prevalence among four hundred secondary school ...


Can The Timeframe Of Reported Uas Sightings Help Regulators?, Spencer Erik Pitcher, Kelly A. Whealan-George 2021 Embry-Riddle Aeronautical University Worldwide

Can The Timeframe Of Reported Uas Sightings Help Regulators?, Spencer Erik Pitcher, Kelly A. Whealan-George

Beyond: Undergraduate Research Journal

Remotely controlled small aircraft, otherwise known as Unmanned Aircraft Systems (UAS) or drones have started to impact the United States National Airspace System by interfering with the safe flight of aircraft. As the UAS industry continues its expected growth into the future, lawmakers, as well as regulators at the Federal Aviation Administration (FAA) and the aviation community must be able to predict when there will be more UAS craft in the air that could cause an interruption to air traffic so that more resources can be allocated optimally to counter the threat of UAS craft. The purpose of this study ...


Technology In Finance, Bryan Herlihy 2021 Bryant University

Technology In Finance, Bryan Herlihy

Research and Innovation Village

As a technology continues to improve rapidly, every company in all sectors must learn how to adapt or otherwise face the consequences of going bankrupt. One industry in particular that is continuously innovating is finance. In finance, technology had developed into artificial intelligence.


Perceive It Or Not: Information Quality And The Investors’ Response To Earning Surprises Of Technologically Advanced Companies, Aliza Rotenstein, David Gelb, Abraham Fried, Shoshana Altschuller 2021 Yeshiva University

Perceive It Or Not: Information Quality And The Investors’ Response To Earning Surprises Of Technologically Advanced Companies, Aliza Rotenstein, David Gelb, Abraham Fried, Shoshana Altschuller

Journal of International Technology and Information Management

One of the primary measures of information systems (IS) success that has been the subject of much investigation in a variety of contexts is information quality (DeLone & McLean, 1992; 2003). This paper hones in on the impact of perceived information quality in the context of the financial markets, where quality of accounting information is particularly important, as it informs investment decisions and impacts stock prices. In particular, seminal accounting research has consistently found that earnings announcements possess informational value (information content) based upon which the market reacts (Beaver, 1968). Market reaction to surprises in earnings announcements has long been used to understand ...


The Future Of Api (Application Programming Interface) Security: The Adoption Of Apis For Digital Communications And The Implications For Cyber Security Vulnerabilities, Alison Munsch PhD, Peter Munsch MBA 2021 Iona College

The Future Of Api (Application Programming Interface) Security: The Adoption Of Apis For Digital Communications And The Implications For Cyber Security Vulnerabilities, Alison Munsch Phd, Peter Munsch Mba

Journal of International Technology and Information Management

Businesses and consumers need to have a robust Application Programming Interface (API) management and security program in place to ensure they are using the most updated policies to certify that these transactions are adequately secure. Technology vendors do provide API Management tools for Customers, and there are established API security standards for securing API transactions. Given the effort to keep APIs open and easy to implement for Business to Business (B2B) and Business to Consumer (B2C) communications, security standards must be part of API management.

This research gathered data to investigate why APIs are vulnerable. The research explored the different ...


Informal Institutions And Comparative Advantage Of South-Based Mnes: Theory And Evidence, Pao-Li CHANG, Yuting CHEN 2021 Singapore Management University

Informal Institutions And Comparative Advantage Of South-Based Mnes: Theory And Evidence, Pao-Li Chang, Yuting Chen

Research Collection School Of Economics

This paper builds a theory based on “informal institutions” to characterize the comparative advantage of South-based MNEs. MNEs headquartered in countries with poorer state institutions are shown to endogenously invest more in firm-specific institutional capital to compensate for the lack of state institutions, and as an optimal response, undertake FDI in countries with weaker institutions. We conduct an extensive test of the theory using worldwide firm-level greenfield FDI flows during 2009–2016, employing (among others) variations in the interaction of prevalence of informal institutions at home and state institutional qualities of host countries, as well as heterogeneity across sectors and ...


The Design, Development And Validation Of A Persuasive Content Generator, Sam Khataei, Michael J. Hine, Ali Arya 2021 Carleton University

The Design, Development And Validation Of A Persuasive Content Generator, Sam Khataei, Michael J. Hine, Ali Arya

Journal of International Technology and Information Management

This paper addresses the automatic generation of persuasive content to influence users’ attitude and behaviour. Our research extends current approaches by leveraging individuals’ social media profiles and activity to personalize the persuasive content. Unlike most other implemented persuasive technology, our system is generic and can be adapted to any domain where collections of electronic text are available. Using the Yale Attitude Change approach, we describe: the multi-layered Pyramid of Individualization model; the design, development, and validation of integrated software that can generate individualized persuasive content based on a user’s social media profile and activity. Results indicate the proposed system ...


An Ant-Based Intelligent Design For Future Self-Driving Commercial Car Service Strategy, Jian (Denny) Lin, Naveed Saleem, Vance Allen Etnyre, Gokhan Gercek, Nanfei Sun 2021 University of Houston-Clear Lake

An Ant-Based Intelligent Design For Future Self-Driving Commercial Car Service Strategy, Jian (Denny) Lin, Naveed Saleem, Vance Allen Etnyre, Gokhan Gercek, Nanfei Sun

Journal of International Technology and Information Management

The technology of self-driving cars will inevitably change the industry of taxis and ride-sharing cars that provide important commercial ground transportation services to travelers, tourists and local residents. There is no doubt that new techniques, business models and strategies will be needed to follow the use of self-driving cars. This paper focuses on a forward-looking research topic that route commercial, vacant self-driving vehicles so that the values to both businesses and passengers are improved. Importance of solutions to the new problem is discussed. We also propose a novel design which simulates behaviors of ants in nature to the vehicles. The ...


Current Economics And Management Sciences Research, Nuriye Güreş, Burcu Yilmaz, Eda Rukiye Dönbak, Simge Samanci, Kumru Didem Atalay, Feride Bahar Isin, Hatime Kamilcelebi, Mustafa Yıldırım, Yasemin Kaya, Eda Yılmaz Alarçin, Karahan Kara, Polat Yücekaya 2021 Iskenderun Technical University

Current Economics And Management Sciences Research, Nuriye Güreş, Burcu Yilmaz, Eda Rukiye Dönbak, Simge Samanci, Kumru Didem Atalay, Feride Bahar Isin, Hatime Kamilcelebi, Mustafa Yıldırım, Yasemin Kaya, Eda Yılmaz Alarçin, Karahan Kara, Polat Yücekaya

Social, Humanity and Administrative Sciences

This book, which contains researches related to current Economics and Management Sciences from different sectors, consists of 7 chapters. The cahpers are about on Protectionism Tendencies in International Trade, Eco Tourism Development, Cultural Route Study, Healthcare Managers, banking sector and covid-19, Experiential Marketing and Technological Innovation.


Wireless Mobile Phone Technology, Deregulation Policy, Competition And Economic Welfare In Nigeria’S Telecom Industry: An Analytic Model, Onochie J. Dieli PhD 2021 Prairie View A &M University

Wireless Mobile Phone Technology, Deregulation Policy, Competition And Economic Welfare In Nigeria’S Telecom Industry: An Analytic Model, Onochie J. Dieli Phd

Journal of International Technology and Information Management

This analytic model is about the Nigerian telecom industry’s structural change caused by the arrival of a new wireless mobile phone technology. Nigeria’s telecom industry transformed from natural monopoly to competitive market as a result of deregulation that occurred in 1999. Under the price regulation using underground or above the ground cable telephone lines, it could run only with the help of government subsidies. This study argues that the arrival of a new telecomm technology was the key to success of Nigeria’s deregulation of its telecom industry. An analysis of a simple microeconomic model shows that with ...


Public Health Insurance And Pharmaceutical Innovation: Evidence From China, Xuan ZHANG, Huihua NIE 2021 Singapore Management University

Public Health Insurance And Pharmaceutical Innovation: Evidence From China, Xuan Zhang, Huihua Nie

Research Collection School Of Economics

Developing countries are characterized by low levels of pharmaceutical innovation. A likely reason is their small market size, which is not because of the population size but because of low levels of income and lack of health insurance coverage. This study exploits a natural experiment from the implementation of a public health insurance program for rural residents in China (New Cooperative Medical Scheme [NCMS]) to examine whether the pharmaceutical industry increases innovation regarding diseases covered by the NCMS that are prevalent in rural areas. We examine the 1993–2009 patent data to gauge pharmaceutical innovation in China. Diseases with a ...


Crowdfunding Digital Platforms: Backer Networks And Their Impact On Project Outcomes, Yee Heng TAN, Srinivas K. REDDY 2021 Tokyo International University

Crowdfunding Digital Platforms: Backer Networks And Their Impact On Project Outcomes, Yee Heng Tan, Srinivas K. Reddy

Research Collection Lee Kong Chian School Of Business

Crowdfunding platforms serve to connect project creators and backers. Previous research has explored several project and platform determinants that impact crowdfunding outcomes. However, there has been limited research on these determinants at an individual level. Our paper addresses how backers may influence the outcomes of projects in crowdfunding platforms. We explore several methods commonly used in the industry to identify influence and show that centrality measures through a backer affiliation network best exemplifies influence. Using data from Kickstarter, we construct a weighted backer network based on 52,678 common projects backed by 11,134 backers. Controlling for digital media mentions ...


Ransomware - A Strategic Threat To Organizations, James Frost, Alan R. Hamlin 2020 Idaho State University

Ransomware - A Strategic Threat To Organizations, James Frost, Alan R. Hamlin

Mountain Plains Journal of Business and Technology

Ransomware is a strategic threat to government, business, and academic organizations. It has both short term and long term consequences, requiring strategic planning to create defenses, assess options, and create policies.

The purpose of the study is to answer three questions: What is the strategic risk of cyberattack to organizations? What are the current attitudes and practices of executives who are vulnerable to such threats? What are specific options that organizations should consider to prevent and deal with possible incidents in the future? The article is thus comprised of the following components: A) a history of the development and complexity ...


Monetary Impact Of National Exchange Carrier Association Tariffs On Internet Access Cost In Rural Areas, Tim Obermier, Angela K. Hollman 2020 University of Nebraska at Kearney

Monetary Impact Of National Exchange Carrier Association Tariffs On Internet Access Cost In Rural Areas, Tim Obermier, Angela K. Hollman

Mountain Plains Journal of Business and Technology

This study examines the monetary impact of tariffs on consumer internet access via a digital subscriber line (DSL). Historically, the Communications Act of 1934 mandated that telephony services be provided to everyone, without exclusion. With the rapid emergence of the internet, the Connect America Fund was recently implemented to ensure equal access to both voice and broadband services. Since many telephony companies have emerged as internet service providers, DSL internet service is often bundled together with a landline telephone, especially in rural areas. This study examines the total cost of such bundled DSL internet service across the classes of cities ...


Improving Clinical Communication And Collaboration Through Technology, Michelle Machon 2020 The University of San Francisco

Improving Clinical Communication And Collaboration Through Technology, Michelle Machon

Doctor of Nursing Practice (DNP) Projects

Problem: Over the last 30 years, clinical communication methodologies in healthcare have evolved to become such disparate systems that they lead to confusion, wasted time, and clinician dissatisfaction. The Joint Commission (2016) reports up to 78% of sentinel events in hospitals are linked to communication failures, which have obvious implications for hospital systems in the quality and safety of their current communication systems.

Context: The purpose of this project was to determine the effectiveness of implementing a unified clinical communication technology platform in an acute care hospital setting and to make recommendations from that implementation to the organization’s larger ...


Students, Innovation Studio Team Up To Help Whiteclay Makerspace, Deann Gayman 2020 University of Nebraska-Lincoln

Students, Innovation Studio Team Up To Help Whiteclay Makerspace, Deann Gayman

Nebraska Innovation Campus Materials

First two paragraphs:

Through a partnership with Rotary International District 5610 out of southern South Dakota, staff from Nebraska Innovation Studio and students from the College of Engineering learning community, Engineering to Change the World, made 30 individual toolboxes for Native American artists who are utilizing the new and developing Whiteclay Makerspace.

Whiteclay Makerspace took shape in 2018, when a nonprofit was formed to purchase a former liquor store and make something good out of it. The tiny, unincorporated town of Whiteclay — population, nine — had gained infamy for its four liquor stores that sold 3.5 million cans of beer ...


Digital Commons powered by bepress