Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

4,886 Full-Text Articles 6,338 Authors 4,104,209 Downloads 257 Institutions

All Articles in Technology and Innovation

Faceted Search

4,886 full-text articles. Page 192 of 194.

Computational Public Safety In Emergency Management Communications, Cristina Ribeiro, Alexander Ferworn 2010 Sheridan College

Computational Public Safety In Emergency Management Communications, Cristina Ribeiro, Alexander Ferworn

Publications and Scholarship

Communications are very important in any situation but in emergency management it is imperative that the communications be reliable and responsive to the evolving situation. In emergency management there are many different types of networks with different objectives. It is of immense value to have the ability to seamlessly integrate other networks and computing resources into one interconnected heterogeneous network. The entire management team should be able to access any of the individual networks and their resources. In this paper we discuss various wireless network communication options in the context of their viability for use in emergency management. We analyze …


Google Analytics: Analyzing The Latest Wave Of Legal Concerns For Google In The U.S. And The E.U., 7 Buff. Intell. Prop. L.J. 135 (2010), Raizel Liebler, Keidra Chaney 2010 UIC John Marshall Law School

Google Analytics: Analyzing The Latest Wave Of Legal Concerns For Google In The U.S. And The E.U., 7 Buff. Intell. Prop. L.J. 135 (2010), Raizel Liebler, Keidra Chaney

UIC Law Open Access Faculty Scholarship

The next wave of concern regarding Google involves web analytics. Web analytics is the measurement, collection, analysis, and reporting of Internet data for the purposes of understanding and optimizing web usage. The concerns of web analytics use touches on issues of online user privacy, government use of personal information, and information on website user activity. While Google Analytics is not the sole web analytics product on the market, it is widely used by corporate, non-profit, and government organizations. The product has been reported to have a 59% market share among web analytics vendors in a 2008 study.

Web analytics technology …


Hybrid Graduate Education: Assessing Student Comfort With Technology Interventions, Martin Sivula 2010 Johnson & Wales University - Providence

Hybrid Graduate Education: Assessing Student Comfort With Technology Interventions, Martin Sivula

Technology

This pilot study examines a cohort of fourteen, doctoral, graduate students over the last year and one-half of their hybrid (both face-to-face and on-line) program. This study’s purpose was to determine their level of comfort with the new technologies (Web 2.0 software) both before and after intended learning interventions. Several theoretical models concerning technology users’ preferences, attitudes, tasks, Task-Technology Fit (TTF), and student engagement provided frameworks for a conceptual model for the eventual course design, assignments, and learning interventions (Hersey & Blanchard, 1977; Davis, 1986; Davis et al., 1989; Goodhue & Thompson, 1995; Zigurs & Buckland, 1998; Kearsley & Shneiderman, …


Service Innovation In The Non-Profit Sector, Gabriel Boon Siong LIM 2010 Singapore Management University

Service Innovation In The Non-Profit Sector, Gabriel Boon Siong Lim

Dissertations and Theses Collection (Open Access)

Non-profit organisations are valued because they provide services that address unmet needs. Nonprofits who engage in social entrepreneurship augment their contributions through new services, programmes, enterprises and revenue generated. It is not surprising, therefore, for policy makers to encourage social entrepreneurship, service innovations and social enterprises. However, not all nonprofits seek to innovate by creating revenue-generating social enterprises. They may continue to devote themselves to specific fields and existing practices through other forms of service innovations instead. The intent of nonprofits in starting new services is investigated through a two-pronged quantitative and qualitative research approach.

In the quantitative section, a …


The Distinct Roles Of Prior It Use And Habit Strength In Predicting Continued Sporadic Use Of It, E. Vance Wilson, En Mao, Nancy K. Lankton 2010 Marshall University

The Distinct Roles Of Prior It Use And Habit Strength In Predicting Continued Sporadic Use Of It, E. Vance Wilson, En Mao, Nancy K. Lankton

Accounting Faculty Research

This article studies prediction of continued IT use in conditions where individuals use the technology sporadically. Our study augments the unified theory of acceptance and use of technology (UTAUT) model [Venkatesh et al., 2003] with measures of prior IT use frequency and habit strength. We find these two factors provide distinct predictions which explain most of the effects that occur within the model under sporadic use conditions.


Editorial: If You Could Freeze-Frame The Information Flow, What Would You Do?, Connie Foster 2010 Western Kentucky University

Editorial: If You Could Freeze-Frame The Information Flow, What Would You Do?, Connie Foster

DLTS Faculty Publications

No abstract provided.


Licensing And Patent Protection, Aniruddha Bagchi, Arijit Mukherjee 2010 Kennesaw State University

Licensing And Patent Protection, Aniruddha Bagchi, Arijit Mukherjee

Faculty and Research Publications

We show the impact of technology licensing on optimal patent policy. Strong patent protection that eliminates imitation may not be the equilibrium outcome in the presence of licensing. Depending on the cost of innovation, licensing may either increase or reduce the strength of the patent protection.


Bankers Perceptions Of Electronic Banking In Pakistan, Ahmad Kaleem, Saima Ahmad 2010 Lahore School of Economics, Lahore, Pakistan

Bankers Perceptions Of Electronic Banking In Pakistan, Ahmad Kaleem, Saima Ahmad

Business Review

Electronic distribution channels provide alternatives for faster delivery of banking services to a wider range of customers. E-channels have gained increasing popularity and have attracted the attention of both academics and practitioners. This paper aims to collect bank employees’ perceptions of the potential benefits and risks associated with electronic banking in Pakistan. The outcomes may help the management of banks develop effective strategic planning for the future of electronic banking in developing countries like Pakistan. Primary sources were used to collect the data and were analyzed via frequency analysis and mean score analysis. The results suggest that bankers in Pakistan …


What Blogging Might Teach About Cybernorms, Jacqueline D. Lipton 2010 University of PIttsburgh School of Law

What Blogging Might Teach About Cybernorms, Jacqueline D. Lipton

Articles

Since the dawn of the information age, scholars have debated the viability of regulating cyberspace. Early on, Professor Lawrence Lessig suggested that “code is law” online. Lessig and others also examined the respective regulatory functions of laws, code, market forces, and social norms. In recent years, with the rise of Web 2.0 interactive technologies, norms have taken center-stage as a regulatory modality online. The advantages of norms are that they can develop quickly by the communities that seek to enforce them, and they are not bound by geography. However, to date there has been scant literature dealing in any detail …


Transitions Within The Ecosystem Of Change, Willie Cheng 2010 Singapore Management University

Transitions Within The Ecosystem Of Change, Willie Cheng

Social Space

The ecosystem paradigm provides a framework to understand and influence the forces of change facing the nonprofit sector. In this extract from the forthcoming book, “The World That Changes The World: How philanthropy, entrepreneurship and innovation are transforming the social ecosystem,” Willie Cheng describes the social ecosystem framework, its change enablers and macro-trends.


Editorial For Dynamics Of Innovation And Competitive Strategy In Transportation Research, Janet K. Tinoco 2010 Embry Riddle Aeronautical University

Editorial For Dynamics Of Innovation And Competitive Strategy In Transportation Research, Janet K. Tinoco

Management, Marketing and Operations - Daytona Beach

No abstract provided.


Eliciting User Requirements Using Appreciative Inquiry, Carol Kernitzki Gonzales 2010 Claremont Graduate University

Eliciting User Requirements Using Appreciative Inquiry, Carol Kernitzki Gonzales

CGU Theses & Dissertations

Many software development projects fail because they do not meet the needs of users, are over-budget, and abandoned. To address this problem, the user requirements elicitation process was modified based on principles of Appreciative Inquiry. Appreciative Inquiry, commonly used in organizational development, aims to build organizations, processes, or systems based on success stories using a hopeful vision for an ideal future. Spanning five studies, Appreciative Inquiry was evaluated for its effectiveness with eliciting user requirements. In the first two cases, it was compared with traditional approaches with end-users and proxy-users. The third study was a quasi-experiment comparing the use of …


Utilizing The Technology Acceptance Model To Assess The Employee Adoption Of Information Systems Security Measures, Cynthia M. Jones, Richard V. McCarthy, Leila Halawi, Bahaudin Mujtaba 2010 Nova Southeastern University

Utilizing The Technology Acceptance Model To Assess The Employee Adoption Of Information Systems Security Measures, Cynthia M. Jones, Richard V. Mccarthy, Leila Halawi, Bahaudin Mujtaba

Publications

In this study, the factors that affect employee acceptance of information systems security measures were examined by extending the Technology Acceptance Model. Partial least squares structural equation modeling was applied to examine these factors. 174 valid responses from employees from companies in various industry segments in the United States and Canada were analyzed. The results of the statistical analysis indicate that subjective norm moderated by management support showed the strongest effect on intention to use information systems security measures.


Towards A Center For Modeling And Simulation: The Case For Jordan, Ghaith Rabadi, Hazem Kaylani, Joseph Barjis (Ed.), Murali Mohan Narasipuram (Ed.), Ghaith Rabadi (Ed.), Jolita Ralyt (Ed.), Pierluigi Plebani (Ed.) 2010 Old Dominion University

Towards A Center For Modeling And Simulation: The Case For Jordan, Ghaith Rabadi, Hazem Kaylani, Joseph Barjis (Ed.), Murali Mohan Narasipuram (Ed.), Ghaith Rabadi (Ed.), Jolita Ralyt (Ed.), Pierluigi Plebani (Ed.)

Engineering Management & Systems Engineering Faculty Publications

Modeling and Simulation (M&S) has recently become an important area that is pursued by many researchers and practitioners due to the role it plays in understanding complex systems and problems. We have therefore witnessed the establishment of many M&S organizations in the last two decades especially in the more developed world. Less developed countries are starting to recognize the need for such capability especially that the problems they face are not less complex. In this paper, we present a preliminary study towards a business plan for establishing a scientific center for Modeling, Analysis, Simulation and Animation in Jordan (JoSAMA) and …


The Google Book Settlement And The Fair Use Counterfactual, Matthew Sag 2010 Emory University School of Law

The Google Book Settlement And The Fair Use Counterfactual, Matthew Sag

Faculty Articles

The sprawling Google Book Search litigation began as a dispute between the search engine colossus and a variety of authors and publishers over the legality of Google’s book digitization effort, the Google Book Search project (“GBS” or “Google Book Search”), for the purpose of indexing paper collections and making them searchable on the Internet. However, through the metamorphic power of class action litigation, a dispute over mere indexing and searching has been transformed into a comprehensive agreement over the future of the book as a digital commodity. Understanding this transformation and its implications is the central ambition of this article. …


Information Technology Diffusion With Influentials, Imitators, And Opponents: Model And Preliminary Evidence, Hasan Cavusoglu, Nan HU, Yingjiu LI, Dan MA 2010 Singapore Management University

Information Technology Diffusion With Influentials, Imitators, And Opponents: Model And Preliminary Evidence, Hasan Cavusoglu, Nan Hu, Yingjiu Li, Dan Ma

Research Collection School Of Computing and Information Systems

Information technology (IT) innovations follow a diverse set of diffusion patterns. Early diffusion models explaining technology diffusion patterns assumed that there is a single homogeneous segment of potential adopters. It was later shown that a two-segment model considering two groups of adopters explains variations in diffusion patterns better than the existing one-segment models. While the two-segment model considers a group of adopters promoting adoption by exerting a positive influence on prospective adopters, it does not consider the members of society who aim to inhibit the adoption process by exerting a negative influence on prospective adopters. In fact, most IT innovations …


Systemic Risk Assessment Using A Non-Stationary Fractional Dynamic Stochastic Model For The Analysis Of Economic Signals, Jonathan Blackledge 2010 Technological University Dublin

Systemic Risk Assessment Using A Non-Stationary Fractional Dynamic Stochastic Model For The Analysis Of Economic Signals, Jonathan Blackledge

Articles

This paper considers the Fractal Market Hypothesis (FMH) for assessing the risk(s) in developing a financial portfolio based on data that is available through the Internet from an increasing number of sources. Most financial risk management systems are still based on the Efficient Market Hypothesis which often fails due to the inaccuracies of the statistical models that underpin the hypothesis, in particular, that financial data are based on stationary Gaussian processes. The FMH considered in this paper assumes that financial data are non-stationary and statistically self-affine so that a risk analysis can, in principal, be applied at any time scale …


Electric Vehicles: Market Opportunities In China, Shanna Hoversten 2010 Claremont McKenna College

Electric Vehicles: Market Opportunities In China, Shanna Hoversten

CMC Senior Theses

Electric vehicles (EVs) offer an exciting opportunity in China both in terms of the potential to build a domestic manufacturing base and the potential to create a strong domestic market for the product. The Chinese nation stands to benefit from both supply-side and demand-side promotion due to the economic stimulus from EV manufacturing and export, the environmental benefits of reduced air pollution and reduced greenhouse gas emissions, and the energy security benefits of transitioning away from foreign oil dependence. The Chinese have several advantages when it comes to stimulating EV industry development and EV deployment, including: leadership in battery technology, …


Revelations Of Adaptive Technology Hiding In Your Operating System, Kathleen P. King 2010 University of South Florida

Revelations Of Adaptive Technology Hiding In Your Operating System, Kathleen P. King

Leadership, Counseling, Adult, Career and Higher Education Faculty Publications

Pre-publication version of a chapter about the assistive technology tools and resources available for free in Windows OS and Mac OS. Introducing higher education faculty to free resources, features and programs which they can recommend to their students or perhaps use for themselves (for instance for fading eyesight or hearing). In addition, the chapter briefly shares strategies and examples of how they might be used.

The book will have an entire chapter dedicated to assistive technology as well. This is a popularized assistive technology chapter for generalist, NON special education, faculty to become acquainted with readily available and free resources. …


Annual Report 2010, Eastern Illinois University 2010 Eastern Illinois University

Annual Report 2010, Eastern Illinois University

Lumpkin College Annual Reports

This 2010 Annual Report records the achievements, outreach activities, and student honors work of the Eastern Illinois University's Lumpkin College of Business and Applied Sciences. It also includes reports from the School of Business, the School of Family and Consumer Science, the School of Technology, and the department of Military Science.


Digital Commons powered by bepress