Speaker Prototyping Design,
2020
East Tennessee State University
Speaker Prototyping Design, Andrew Lathe
Undergraduate Honors Theses
Audio design is a pertinent industry in today’s world, with an extremely large market including leaders such as Bose, Harman International, and Sennheiser. This project is designed to explore the processes that are necessary to create a new type of product in this market. The end goal is to have a functioning, high–quality set of speakers to prove various concepts of design and prototyping.
The steps involved in this project go through the entire design process from initial choice of product to a finished prototype. Processes include the selection of outsourced components such as drivers and necessary connectors ...
How To Prepare Young Finance & Accounting Professionals For Digital Revolution,
2020
Singapore Management University
How To Prepare Young Finance & Accounting Professionals For Digital Revolution, Clarence Goh, Gary Pan, Chi Kwan Yuen
Research Collection School Of Accountancy
Automation will alter the work of accountants in the coming years. However, accountants will always have a central role to play in business. In order to continue to thrive, the profession will need to position itself to capitalise on the opportunities that automation will bring. This involves identifying areas of work which computers cannot automate, and to focus on deepening contributions in these areas. This calls for a radical transformation of accounting education in order to equip accounting graduates with relevant work skills that will allow students to navigate a future workplace where computers and technology are the norm.
Analysis Of The Challenges In The Planning And Implementation Of Lean Construction,
2020
Morehead State University
Analysis Of The Challenges In The Planning And Implementation Of Lean Construction, Sultan Alsabi
Morehead State Theses and Dissertations
A thesis presented to the faculty of the College of Science and Technology at Morehead State University in partial fulfillment of the requirements for the degree of Master of Science by Sultan Alsabi on December 1, 2020.
What Has Changed? The Impact Of Covid Pandemic On The Technology And Innovation Management Research Agenda,
2020
Singapore Management University
What Has Changed? The Impact Of Covid Pandemic On The Technology And Innovation Management Research Agenda, Gerard George, Karim R. Lakhani, Phanish Puranam
Research Collection Lee Kong Chian School Of Business
Whereas the pandemic has tested the agility and resilience of organizations, it forces a deeper look at the assumptions underlying theoretical frameworks that guide managerial decisions and organizational practices. In this commentary, we explore the impact of the Covid‐19 pandemic on technology and innovation management research. We identify key assumptions, and then discuss how new areas of investigation emerge based on the changed reality.
Blockchain-Based Public Auditing And Secure Deduplication With Fair Arbitration,
2020
Singapore Management University
Blockchain-Based Public Auditing And Secure Deduplication With Fair Arbitration, Haoran Yuan, Xiaofeng Chen, Jianfeng Wang, Jiaming Yuan, Hongyang Yan, Willy Susilo
Research Collection School Of Computing and Information Systems
Data auditing enables data owners to verify the integrity of their sensitive data stored at an untrusted cloud without retrieving them. This feature has been widely adopted by commercial cloud storage. However, the existing approaches still have some drawbacks. On the one hand, the existing schemes have a defect of fair arbitration, i.e., existing auditing schemes lack an effective method to punish the malicious cloud service provider (CSP) and compensate users whose data integrity is destroyed. On the other hand, a CSP may store redundant and repetitive data. These redundant data inevitably increase management overhead and computational cost during ...
Little Did We Know What We Are Preparing For: Virtual Interviews Before Covid-19,
2020
University of California, Riverside
Little Did We Know What We Are Preparing For: Virtual Interviews Before Covid-19, Alina S. Popa, Scott Kubomoto, Lorra Baldes
HCA Healthcare Journal of Medicine
Current circumstances related to the COVID-19 pandemic require residency programs to conduct virtual interviews. We draw upon our experience with virtual interviews from fall 2019, prior to COVID-19, and propose a potential implementation process for virtual interviewing strategies. We also describe potential pitfalls and strategies to mitigate them.
The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design,
2020
Airlangga University Of Surabaya, Indonesia
The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman
Library Philosophy and Practice (e-journal)
This study explain about E-Health Surabaya is a web-based health service technology application that is used to help people register as patients in hospitals and health centers. Although its function is very useful, there are also people who still do not understand how to use this application, there are also some shortcomings that cause inconvenience in its use. So that research is conducted in which the application uses ITIL V.3 framework with Domain Service Design to conduct an audit of the maturity level of this E-Health Surabaya Web Application. ITIL (Information Technology Infrastructure Technology) is a framework used to ...
Air Traffic Safety Management: The Significance Of Voluntary Reporting And Data Distribution,
2020
Embry-Riddle Aeronautical University
Air Traffic Safety Management: The Significance Of Voluntary Reporting And Data Distribution, Xavier M. Ashley
Beyond: Undergraduate Research Journal
This study primarily investigated inadequacies identified through the utilization of the Air Traffic Safety Action Program (ATSAP), a Voluntary Safety Reporting Program (VSRP) overseen by the U.S. Federal Aviation Administration (FAA). The primary objective of this research was to ascertain whether the FAA was properly managing the ATSAP and if the program was capable of effectively identifying safety hazards present in the national airspace. To assist in this determination, this study communicated the basic characteristics and significance of safety management and voluntary reporting in aviation. This served to clarify the intended function of the ATSAP and to articulate contributions ...
Antitrust And Platform Monopoly,
2020
University of Pennsylvania Carey Law School
Antitrust And Platform Monopoly, Herbert J. Hovenkamp
Faculty Scholarship at Penn Law
Are large digital platforms that deal directly with consumers “winner take all,” or natural monopoly, firms? That question is surprisingly complex and does not produce the same answer for every platform. The closer one looks at digital platforms the less they seem to be winner-take-all. As a result, competition can be made to work in most of them. Further, antitrust enforcement, with its accommodation of firm variety, is generally superior to any form of statutory regulation that generalizes over large numbers.
Assuming that an antitrust violation is found, what should be the remedy? Breaking up large firms subject to extensive ...
Network Effects In Action,
2020
University of Pennsylvania Law School
Network Effects In Action, Christopher S. Yoo
Faculty Scholarship at Penn Law
This Chapter begins by examining and exploring the theoretical and empirical limits of the possible bases of network effects, paying particular attention to the most commonly cited framework known as Metcalfe’s Law. It continues by exploring the concept of network externalities, defined as the positive external consumption benefits that the decision to join a network creates for the other members of the network, which is more ambiguous than commonly realized. It then reviews the structural factors needed for models based on network effects to have anticompetitive effects and identifies other factors that can dissipate those effects. Finally, it identifies ...
An Analysis Of Technological Components In Relation To Privacy In A Smart City,
2020
James Madison University
An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles
James Madison Undergraduate Research Journal (JMURJ)
A smart city is an interconnection of technological components that store, process, and wirelessly transmit information to enhance the efficiency of applications and the individuals who use those applications. Over the course of the 21st century, it is expected that an overwhelming majority of the world’s population will live in urban areas and that the number of wireless devices will increase. The resulting increase in wireless data transmission means that the privacy of data will be increasingly at risk. This paper uses a holistic problem-solving approach to evaluate the security challenges posed by the technological components that make up ...
Introducing Seamlessaccess.Org: Delivering A Simpler, Privacy-Preserving Access Experience,
2020
Coastal Carolina University
Introducing Seamlessaccess.Org: Delivering A Simpler, Privacy-Preserving Access Experience, John W. Felts, Tim Lloyd, Emily Singley
Charleston Library Conference
Managing access to subscribed services in an era of abundance is a major challenge for libraries. Users have come to expect a seamless, personalized experience on their mobile devices, but traditional approaches to access management force librarians to choose between the anonymous ease of onsite IP authentication or the access friction experienced by users authenticating across multiple resources with Single Sign-On. Building on the work of the RA21 initiative, a recent NISO Recommended Practice on Improved Access to Institutionally Provided Information Resources charts a way forward. It will enable libraries to provide seamless, privacy-preserving and one-click access to its subscribed ...
Resource Discovery In A Changing Content World,
2020
The New School
Resource Discovery In A Changing Content World, Allen Jones, Cynthia R. Schwarz, Hannah Mckelvey, Rachelle Mclain, Christine Stohn
Charleston Library Conference
Discovery services have evolved to include not just books and articles, but databases, website content, research guides, digital and audiovisual collections, and unique local collections that are all important for their users to be able to find. Search and ranking remain at the core of discovery, but advanced tools such as recommendation, virtual browse, ‘look inside‘, and the use of artificial intelligence are also becoming more prevalent. This group of panelists discussed how content in their discovery systems can change based on the context of the user, using as examples Primo and Blacklight, and how content is populated, discovered and ...
Competitive Harm From Vertical Mergers,
2020
University of Pennsylvania Carey Law School
Competitive Harm From Vertical Mergers, Herbert J. Hovenkamp
Faculty Scholarship at Penn Law
The antitrust enforcement Agencies' 2020 Vertical Merger Guidelines introduce a nontechnical application of bargaining theory into the assessment of competitive effects from vertical acquisitions. The economics of such bargaining is complex and can produce skepticism among judges, who might regard its mathematics as overly technical, its game theory as excessively theoretical or speculative, or its assumptions as unrealistic.
However, we have been there before. The introduction of concentration indexes, particularly the HHI, in the Merger Guidelines was initially met with skepticism but gradually they were accepted as judges became more comfortable with them. The same thing very largely happened again ...
Contingency Planning Amidst A Pandemic,
2020
University of West Florida
Contingency Planning Amidst A Pandemic, Natalie C. Belford
KSU Proceedings on Cybersecurity Education, Research and Practice
Proper prior planning prevents pitifully poor performance: The purpose of this research is to address mitigation approaches - disaster recovery, contingency planning, and continuity planning - and their benefits as they relate to university operations during a worldwide pandemic predicated by the Novel Coronavirus (COVID-19). The most relevant approach pertaining to the University’s needs and its response to the Coronavirus pandemic will be determined and evaluated in detail.
Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps,
2020
Princess Anne High School
Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, Chunsheng Xin
KSU Proceedings on Cybersecurity Education, Research and Practice
Throughout the Internet, many chatbots have been deployed by various organizations to answer questions asked by customers. In recent years, we have been running cybersecurity summer camps for youth. Due to COVID-19, our in-person camp has been changed to virtual camps. As a result, we decided to develop a chatbot to reduce the number of emails, phone calls, as well as the human burden for answering the same or similar questions again and again based on questions we received from previous camps. This paper introduces our practical experience to implement an AI-powered chatbot for middle and high school cybersecurity camps ...
A Survey Of Serious Games For Cybersecurity Education And Training,
2020
North Carolina Agricultural and Technical State University
A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad
KSU Proceedings on Cybersecurity Education, Research and Practice
Serious games can challenge users in competitive and entertaining ways. Educators have used serious games to increase student engagement in cybersecurity education. Serious games have been developed to teach students various cybersecurity topics such as safe online behavior, threats and attacks, malware, and more. They have been used in cybersecurity training and education at different levels. Serious games have targeted different audiences such as K-12 students, undergraduate and graduate students in academic institutions, and professionals in the cybersecurity workforce. In this paper, we provide a survey of serious games used in cybersecurity education and training. We categorize these games into ...
Factors That Influence Hipaa Secure Compliance In Small And Medium-Size Health Care Facilities,
2020
Trident
Factors That Influence Hipaa Secure Compliance In Small And Medium-Size Health Care Facilities, Wlad Pierre-Francois, Indira Guzman
KSU Proceedings on Cybersecurity Education, Research and Practice
This study extends the body of literature concerning security compliance by investigating the antecedents of HIPPA security compliance. A conceptual model, specifying a set of hypothesized relationships between management support, security awareness, security culture; security behavior, and risk of sanctions to address their effect on HIPAA security compliance is presented. This model was developed based on the review of the literature, Protection Motivation Theory, and General Deterrence Theory. Specifically, the aim of the study is to examine the mediating role of risk of sanctions on HIPAA security compliance.
Towards An Assessment Of Pause Periods On User Habituation In Mitigation Of Phishing Attacks,
2020
Nova Southeastern University
Towards An Assessment Of Pause Periods On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci, Yair Levy, Martha Snyder, Laurie Dringus
KSU Proceedings on Cybersecurity Education, Research and Practice
Social engineering is the technique in which the attacker sends messages to build a relationship with the victim and convinces the victim to take some actions that lead to significant damages and losses. Industry and law enforcement reports indicate that social engineering incidents costs organizations billions of dollars. Phishing is the most pervasive social engineering attack. While email filtering and warning messages have been implemented for over three decades, organizations are constantly falling for phishing attacks. Prior research indicated that attackers use phishing emails to create an urgency and fear response in their victims causing them to use quick heuristics ...
Engaging Stakeholder Networks To Support Global Oa Monograph Usage Analytics,
2020
Educopia Institute
Engaging Stakeholder Networks To Support Global Oa Monograph Usage Analytics, Christina Drummond
Collaborative Librarianship
Just as COVID-19 brought in-person meetings to a halt, the Open Access eBook Usage (OAeBU) Data Trust transitioned from a two-year stakeholder planning project to a two-year global pilot tasked with developing infrastructure use-cases, software code, sustainability models, and governance mechanisms to better enable the usage and impact analyses of OA monographs. This report introduces the array of stakeholders involved in OA book analytics and summarizes how this data trust effort worked to engage them during the first third of the project. Virtual network building and engagement strategies such as online stakeholder-oriented communities and collaboration tools are discussed alongside traditional ...