Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

3,738 Full-Text Articles 4,316 Authors 1,645,885 Downloads 209 Institutions

All Articles in Technology and Innovation

Faceted Search

3,738 full-text articles. Page 2 of 134.

Speaker Prototyping Design, Andrew Lathe 2020 East Tennessee State University

Speaker Prototyping Design, Andrew Lathe

Undergraduate Honors Theses

Audio design is a pertinent industry in today’s world, with an extremely large market including leaders such as Bose, Harman International, and Sennheiser. This project is designed to explore the processes that are necessary to create a new type of product in this market. The end goal is to have a functioning, high–quality set of speakers to prove various concepts of design and prototyping.

The steps involved in this project go through the entire design process from initial choice of product to a finished prototype. Processes include the selection of outsourced components such as drivers and necessary connectors ...


How To Prepare Young Finance & Accounting Professionals For Digital Revolution, Clarence GOH, Gary PAN, Chi Kwan YUEN 2020 Singapore Management University

How To Prepare Young Finance & Accounting Professionals For Digital Revolution, Clarence Goh, Gary Pan, Chi Kwan Yuen

Research Collection School Of Accountancy

Automation will alter the work of accountants in the coming years. However, accountants will always have a central role to play in business. In order to continue to thrive, the profession will need to position itself to capitalise on the opportunities that automation will bring. This involves identifying areas of work which computers cannot automate, and to focus on deepening contributions in these areas. This calls for a radical transformation of accounting education in order to equip accounting graduates with relevant work skills that will allow students to navigate a future workplace where computers and technology are the norm.


Analysis Of The Challenges In The Planning And Implementation Of Lean Construction, Sultan Alsabi 2020 Morehead State University

Analysis Of The Challenges In The Planning And Implementation Of Lean Construction, Sultan Alsabi

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Science and Technology at Morehead State University in partial fulfillment of the requirements for the degree of Master of Science by Sultan Alsabi on December 1, 2020.


What Has Changed? The Impact Of Covid Pandemic On The Technology And Innovation Management Research Agenda, Gerard GEORGE, Karim R. LAKHANI, Phanish PURANAM 2020 Singapore Management University

What Has Changed? The Impact Of Covid Pandemic On The Technology And Innovation Management Research Agenda, Gerard George, Karim R. Lakhani, Phanish Puranam

Research Collection Lee Kong Chian School Of Business

Whereas the pandemic has tested the agility and resilience of organizations, it forces a deeper look at the assumptions underlying theoretical frameworks that guide managerial decisions and organizational practices. In this commentary, we explore the impact of the Covid‐19 pandemic on technology and innovation management research. We identify key assumptions, and then discuss how new areas of investigation emerge based on the changed reality.


Blockchain-Based Public Auditing And Secure Deduplication With Fair Arbitration, Haoran YUAN, Xiaofeng CHEN, Jianfeng WANG, Jiaming YUAN, Hongyang YAN, Willy SUSILO 2020 Singapore Management University

Blockchain-Based Public Auditing And Secure Deduplication With Fair Arbitration, Haoran Yuan, Xiaofeng Chen, Jianfeng Wang, Jiaming Yuan, Hongyang Yan, Willy Susilo

Research Collection School Of Computing and Information Systems

Data auditing enables data owners to verify the integrity of their sensitive data stored at an untrusted cloud without retrieving them. This feature has been widely adopted by commercial cloud storage. However, the existing approaches still have some drawbacks. On the one hand, the existing schemes have a defect of fair arbitration, i.e., existing auditing schemes lack an effective method to punish the malicious cloud service provider (CSP) and compensate users whose data integrity is destroyed. On the other hand, a CSP may store redundant and repetitive data. These redundant data inevitably increase management overhead and computational cost during ...


Little Did We Know What We Are Preparing For: Virtual Interviews Before Covid-19, Alina S. Popa, Scott Kubomoto, Lorra Baldes 2020 University of California, Riverside

Little Did We Know What We Are Preparing For: Virtual Interviews Before Covid-19, Alina S. Popa, Scott Kubomoto, Lorra Baldes

HCA Healthcare Journal of Medicine

Current circumstances related to the COVID-19 pandemic require residency programs to conduct virtual interviews. We draw upon our experience with virtual interviews from fall 2019, prior to COVID-19, and propose a potential implementation process for virtual interviewing strategies. We also describe potential pitfalls and strategies to mitigate them.


The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman 2020 Airlangga University Of Surabaya, Indonesia

The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study explain about E-Health Surabaya is a web-based health service technology application that is used to help people register as patients in hospitals and health centers. Although its function is very useful, there are also people who still do not understand how to use this application, there are also some shortcomings that cause inconvenience in its use. So that research is conducted in which the application uses ITIL V.3 framework with Domain Service Design to conduct an audit of the maturity level of this E-Health Surabaya Web Application. ITIL (Information Technology Infrastructure Technology) is a framework used to ...


Air Traffic Safety Management: The Significance Of Voluntary Reporting And Data Distribution, Xavier M. Ashley 2020 Embry-Riddle Aeronautical University

Air Traffic Safety Management: The Significance Of Voluntary Reporting And Data Distribution, Xavier M. Ashley

Beyond: Undergraduate Research Journal

This study primarily investigated inadequacies identified through the utilization of the Air Traffic Safety Action Program (ATSAP), a Voluntary Safety Reporting Program (VSRP) overseen by the U.S. Federal Aviation Administration (FAA). The primary objective of this research was to ascertain whether the FAA was properly managing the ATSAP and if the program was capable of effectively identifying safety hazards present in the national airspace. To assist in this determination, this study communicated the basic characteristics and significance of safety management and voluntary reporting in aviation. This served to clarify the intended function of the ATSAP and to articulate contributions ...


Antitrust And Platform Monopoly, Herbert J. Hovenkamp 2020 University of Pennsylvania Carey Law School

Antitrust And Platform Monopoly, Herbert J. Hovenkamp

Faculty Scholarship at Penn Law

Are large digital platforms that deal directly with consumers “winner take all,” or natural monopoly, firms? That question is surprisingly complex and does not produce the same answer for every platform. The closer one looks at digital platforms the less they seem to be winner-take-all. As a result, competition can be made to work in most of them. Further, antitrust enforcement, with its accommodation of firm variety, is generally superior to any form of statutory regulation that generalizes over large numbers.

Assuming that an antitrust violation is found, what should be the remedy? Breaking up large firms subject to extensive ...


Network Effects In Action, Christopher S. Yoo 2020 University of Pennsylvania Law School

Network Effects In Action, Christopher S. Yoo

Faculty Scholarship at Penn Law

This Chapter begins by examining and exploring the theoretical and empirical limits of the possible bases of network effects, paying particular attention to the most commonly cited framework known as Metcalfe’s Law. It continues by exploring the concept of network externalities, defined as the positive external consumption benefits that the decision to join a network creates for the other members of the network, which is more ambiguous than commonly realized. It then reviews the structural factors needed for models based on network effects to have anticompetitive effects and identifies other factors that can dissipate those effects. Finally, it identifies ...


An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles 2020 James Madison University

An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles

James Madison Undergraduate Research Journal (JMURJ)

A smart city is an interconnection of technological components that store, process, and wirelessly transmit information to enhance the efficiency of applications and the individuals who use those applications. Over the course of the 21st century, it is expected that an overwhelming majority of the world’s population will live in urban areas and that the number of wireless devices will increase. The resulting increase in wireless data transmission means that the privacy of data will be increasingly at risk. This paper uses a holistic problem-solving approach to evaluate the security challenges posed by the technological components that make up ...


Introducing Seamlessaccess.Org: Delivering A Simpler, Privacy-Preserving Access Experience, John W. Felts, Tim Lloyd, Emily Singley 2020 Coastal Carolina University

Introducing Seamlessaccess.Org: Delivering A Simpler, Privacy-Preserving Access Experience, John W. Felts, Tim Lloyd, Emily Singley

Charleston Library Conference

Managing access to subscribed services in an era of abundance is a major challenge for libraries. Users have come to expect a seamless, personalized experience on their mobile devices, but traditional approaches to access management force librarians to choose between the anonymous ease of onsite IP authentication or the access friction experienced by users authenticating across multiple resources with Single Sign-On. Building on the work of the RA21 initiative, a recent NISO Recommended Practice on Improved Access to Institutionally Provided Information Resources charts a way forward. It will enable libraries to provide seamless, privacy-preserving and one-click access to its subscribed ...


Resource Discovery In A Changing Content World, Allen Jones, Cynthia R. Schwarz, Hannah McKelvey, Rachelle McLain, Christine Stohn 2020 The New School

Resource Discovery In A Changing Content World, Allen Jones, Cynthia R. Schwarz, Hannah Mckelvey, Rachelle Mclain, Christine Stohn

Charleston Library Conference

Discovery services have evolved to include not just books and articles, but databases, website content, research guides, digital and audiovisual collections, and unique local collections that are all important for their users to be able to find. Search and ranking remain at the core of discovery, but advanced tools such as recommendation, virtual browse, ‘look inside‘, and the use of artificial intelligence are also becoming more prevalent. This group of panelists discussed how content in their discovery systems can change based on the context of the user, using as examples Primo and Blacklight, and how content is populated, discovered and ...


Competitive Harm From Vertical Mergers, Herbert J. Hovenkamp 2020 University of Pennsylvania Carey Law School

Competitive Harm From Vertical Mergers, Herbert J. Hovenkamp

Faculty Scholarship at Penn Law

The antitrust enforcement Agencies' 2020 Vertical Merger Guidelines introduce a nontechnical application of bargaining theory into the assessment of competitive effects from vertical acquisitions. The economics of such bargaining is complex and can produce skepticism among judges, who might regard its mathematics as overly technical, its game theory as excessively theoretical or speculative, or its assumptions as unrealistic.

However, we have been there before. The introduction of concentration indexes, particularly the HHI, in the Merger Guidelines was initially met with skepticism but gradually they were accepted as judges became more comfortable with them. The same thing very largely happened again ...


Contingency Planning Amidst A Pandemic, Natalie C. Belford 2020 University of West Florida

Contingency Planning Amidst A Pandemic, Natalie C. Belford

KSU Proceedings on Cybersecurity Education, Research and Practice

Proper prior planning prevents pitifully poor performance: The purpose of this research is to address mitigation approaches - disaster recovery, contingency planning, and continuity planning - and their benefits as they relate to university operations during a worldwide pandemic predicated by the Novel Coronavirus (COVID-19). The most relevant approach pertaining to the University’s needs and its response to the Coronavirus pandemic will be determined and evaluated in detail.


Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, Chunsheng Xin 2020 Princess Anne High School

Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, Chunsheng Xin

KSU Proceedings on Cybersecurity Education, Research and Practice

Throughout the Internet, many chatbots have been deployed by various organizations to answer questions asked by customers. In recent years, we have been running cybersecurity summer camps for youth. Due to COVID-19, our in-person camp has been changed to virtual camps. As a result, we decided to develop a chatbot to reduce the number of emails, phone calls, as well as the human burden for answering the same or similar questions again and again based on questions we received from previous camps. This paper introduces our practical experience to implement an AI-powered chatbot for middle and high school cybersecurity camps ...


A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad 2020 North Carolina Agricultural and Technical State University

A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad

KSU Proceedings on Cybersecurity Education, Research and Practice

Serious games can challenge users in competitive and entertaining ways. Educators have used serious games to increase student engagement in cybersecurity education. Serious games have been developed to teach students various cybersecurity topics such as safe online behavior, threats and attacks, malware, and more. They have been used in cybersecurity training and education at different levels. Serious games have targeted different audiences such as K-12 students, undergraduate and graduate students in academic institutions, and professionals in the cybersecurity workforce. In this paper, we provide a survey of serious games used in cybersecurity education and training. We categorize these games into ...


Factors That Influence Hipaa Secure Compliance In Small And Medium-Size Health Care Facilities, Wlad Pierre-Francois, Indira Guzman 2020 Trident

Factors That Influence Hipaa Secure Compliance In Small And Medium-Size Health Care Facilities, Wlad Pierre-Francois, Indira Guzman

KSU Proceedings on Cybersecurity Education, Research and Practice

This study extends the body of literature concerning security compliance by investigating the antecedents of HIPPA security compliance. A conceptual model, specifying a set of hypothesized relationships between management support, security awareness, security culture; security behavior, and risk of sanctions to address their effect on HIPAA security compliance is presented. This model was developed based on the review of the literature, Protection Motivation Theory, and General Deterrence Theory. Specifically, the aim of the study is to examine the mediating role of risk of sanctions on HIPAA security compliance.


Towards An Assessment Of Pause Periods On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci, Yair Levy, Martha Snyder, Laurie Dringus 2020 Nova Southeastern University

Towards An Assessment Of Pause Periods On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci, Yair Levy, Martha Snyder, Laurie Dringus

KSU Proceedings on Cybersecurity Education, Research and Practice

Social engineering is the technique in which the attacker sends messages to build a relationship with the victim and convinces the victim to take some actions that lead to significant damages and losses. Industry and law enforcement reports indicate that social engineering incidents costs organizations billions of dollars. Phishing is the most pervasive social engineering attack. While email filtering and warning messages have been implemented for over three decades, organizations are constantly falling for phishing attacks. Prior research indicated that attackers use phishing emails to create an urgency and fear response in their victims causing them to use quick heuristics ...


Engaging Stakeholder Networks To Support Global Oa Monograph Usage Analytics, Christina Drummond 2020 Educopia Institute

Engaging Stakeholder Networks To Support Global Oa Monograph Usage Analytics, Christina Drummond

Collaborative Librarianship

Just as COVID-19 brought in-person meetings to a halt, the Open Access eBook Usage (OAeBU) Data Trust transitioned from a two-year stakeholder planning project to a two-year global pilot tasked with developing infrastructure use-cases, software code, sustainability models, and governance mechanisms to better enable the usage and impact analyses of OA monographs. This report introduces the array of stakeholders involved in OA book analytics and summarizes how this data trust effort worked to engage them during the first third of the project. Virtual network building and engagement strategies such as online stakeholder-oriented communities and collaboration tools are discussed alongside traditional ...


Digital Commons powered by bepress