Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

3,088 Full-Text Articles 3,167 Authors 1,217,565 Downloads 171 Institutions

All Articles in Technology and Innovation

Faceted Search

3,088 full-text articles. Page 6 of 103.

Alternative Energy: An Examination Of Costs, Safety, And Potential, Evan Searles 2018 University of New Hampshire, Durham

Alternative Energy: An Examination Of Costs, Safety, And Potential, Evan Searles

Honors Theses and Capstones

No abstract provided.


Structuring Financial Incentives For Residential Solar Electric Systems, Kevin C. van Blommestein, Yonghee Cho, Tugrul U. Daim, Paul Sklar 2017 Portland State University

Structuring Financial Incentives For Residential Solar Electric Systems, Kevin C. Van Blommestein, Yonghee Cho, Tugrul U. Daim, Paul Sklar

Joseph Cho

This paper introduces a simple methodology to aid in the decision of how to distribute financial incentive funding for residential solar electric systems in order to maximize demand. Incentive funding can be used more effectively if adjusted according to the decrease in price and the increase in demand of solar electric systems. The decision of how to reduce these incentives due to changing annual funds, while increasing or even maintaining the growth of solar electric system demand, is of great interest to policymakers and public benefit funded program administrators. In order to aid in this process, a three step methodology ...


Collective Action And Market Formation: An Integrative Framework, Brandon Lee, Jeroen Struben, Christopher B. Bingham 2017 McGill University

Collective Action And Market Formation: An Integrative Framework, Brandon Lee, Jeroen Struben, Christopher B. Bingham

Brandon Lee


While extant research places collective action at the heart of market formation, it provides little understanding about when and to what extent collective action is important. In this paper, we develop a novel theoretical framework detailing what collective action problems and solutions arise in market formation and under what conditions. Our framework centers on the development of market infrastructure with three key factors that influence the nature and extent of collective action problems: perceived returns to contributions, excludability, and contribution substitutability. We apply our framework to diverse market formation contexts and derive a fresh set of attendant propositions. Finally, we ...


A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland 2017 Plymouth University, U.K.

A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland

Journal of Cybersecurity Education, Research and Practice

In today’s business environment where all operations are enabled by technology, information security has become an established discipline as more and more businesses realize its value. The human component has been recognized to have an important role in information security since the only way to reduce security risks is through making employees more information security aware. Towards this goal the research will appreciate the importance of information security awareness by illustrating the need for more effective user training. Further to that it proposes and develops an information security toolkit as a prototype awareness raising initiative. Apart from the elements ...


Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell 2017 Arkansas Tech University

Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell

Journal of Cybersecurity Education, Research and Practice

Recent publicized security breaches can be used to evaluate information security programs. The processes and procedures that allowed the event to occur can be examined in a case study and then be used to find methods for future mitigation of risk. The Target security breach is used in this study to examine the organization’s information security program using a macro-ergonomic model. This research posits that an information security program should consider the work system design, based in macro-ergonomics, to help mitigate information security risk to the organization and ensure an efficient and effective information security program. Based on a ...


Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi 2017 University of Alabama, Birmingham

Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi

Journal of Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer 2017 Nova Southeastern University

A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer

Journal of Cybersecurity Education, Research and Practice

Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and ...


From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth 2017 Kennesaw State University

From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth

Journal of Cybersecurity Education, Research and Practice

No abstract provided.


What Bitcoin Is, And How It Can Change Commerce, Jeffrey Bukhari 2017 CUNY Graduate School of Journalism

What Bitcoin Is, And How It Can Change Commerce, Jeffrey Bukhari

Capstones

The use of the digital currency Bitcoin has spiked dramatically over the last several years. Spurred by interest from investors and those excited about its commercial and banking potential, the value of the cryptocurrency has seen its value greatly increase since its beginning in 2009.

This project explains the underlying technology behind Bitcoin, how Bitcoin is and will change commerce, and what potential lies ahead for the digital currency.


Applying Agile Project Management To Art Museums: A Proposal For Implementing A Generalist Scrum Master, Vincent Sulit 2017 The University of San Francisco

Applying Agile Project Management To Art Museums: A Proposal For Implementing A Generalist Scrum Master, Vincent Sulit

Master's Projects and Capstones

This capstone project examines organizational change, along with its challenges, through case studies in museums and businesses in the private sector, subsequently providing a possible solution for museums to adapt to the current global market economy through the use of Agile Project Management (Agile). I cite recent case studies of art museums implementing Agile for digital product development. This project proposal aims to introduce Agile outside of digital departments, including Exhibitions and Education, with the goal of developing better visitor-centered offerings from museums. This may be achieved through the proposal of a job description for a new museum position of ...


A Framework Towards Technology Creation In Africa: Focusing On Ghana, Martin Yao Donani, Hannatu Abue Kugblenu, Azindow Bawa Fuseini 2017 Ho Polytechnic, Ghana

A Framework Towards Technology Creation In Africa: Focusing On Ghana, Martin Yao Donani, Hannatu Abue Kugblenu, Azindow Bawa Fuseini

International Journal of African Development

Underdevelopment in Africa has been historical and a global concern coupled with the quest for good governance. Several efforts have been made in academia, national governments, the international community, and other institutional arrangements to reverse the trend. These efforts however are yet to produce a lasting result as Africa is still characterized by low productivity output, poverty and a widening technology gap when compared to other developing regions of the world. Conventional approaches used to address the African problem have consistently been devoid of indigenous technology development. Technology is here seen as paramount to every form of production on which ...


Technology Planning For Aligning Emerging Business Models And Regulatory Structures: The Case Of Electric Vehicle Charging And The Smart Grid, Kelly R. Cowan 2017 Portland State University

Technology Planning For Aligning Emerging Business Models And Regulatory Structures: The Case Of Electric Vehicle Charging And The Smart Grid, Kelly R. Cowan

Dissertations and Theses

Smart grid has been described as the Energy Internet: Where Energy Technology meets Information Technology. The incorporation of such technology into vast existing utility infrastructures offers many advantages, including possibilities for new smart appliances, energy management systems, better integration of renewable energy, value added services, and new business models, both for supply- and demand-side management. Smart grid also replaces aging utility technologies that are becoming increasingly unreliable, as the average ages for many critical components in utility systems now exceed their original design lives. However, while smart grid offers the promise of revolutionizing utility delivery systems, many questions remain about ...


Automated Scientifically Controlled Screening Systems (Ascss), Nathan W. Twyman, Jay F. Nunamaker 2017 Missouri University of Science and Technology

Automated Scientifically Controlled Screening Systems (Ascss), Nathan W. Twyman, Jay F. Nunamaker

Nathan W. Twyman

The ability to detect when a person is hiding important information has high value in many applications. A new class of systems, termed autonomous scientifically controlled screening systems (ASCSS), is designed to detect individuals' purposely hidden information about target topics of interest. ASCSS represents a systematic synthesis of structured interviewing, orienting theory, defensive response theory, non-invasive psychophysiological measurement, and behavioral measurement. To evaluate and enhance the design principles, an automated screening kiosk (ASK) system was constructed. The ASK system has been used in a physical security screening scenario in which participants constructed and attempted to smuggle a fake improvised explosive ...


Automated Human Screening For Detecting Concealed Knowledge, Nathan W. Twyman 2017 Missouri University of Science and Technology

Automated Human Screening For Detecting Concealed Knowledge, Nathan W. Twyman

Nathan W. Twyman

Screening individuals for concealed knowledge has traditionally been the purview of professional interrogators investigating a crime. But the ability to detect when a person is hiding important information would be of high value to many other fields and functions. This dissertation proposes design principles for and reports on an implementation and empirical evaluation of a non-invasive, automated system for human screening. The screening system design (termed an automated screening kiosk or ASK) is patterned after a standard interviewing method called the Concealed Information Test (CIT), which is built on theories explaining psychophysiological and behavioral effects of human orienting and defensive ...


Is It Time For New Accounting Of R&D Costs?, Anne M. Clem, Cynthia G. Jeffrey 2017 Iowa State University

Is It Time For New Accounting Of R&D Costs?, Anne M. Clem, Cynthia G. Jeffrey

Cynthia Jeffrey

The mismatch between today's "high-tech economy" and the double-entry accounting system has raised serious questions about the quality of earnings. The Securities and Exchange Commission (SEC) has targeted overly aggressive earnings management, focusing on acquired in-process research and development (IPR&D). Some people are concerned that the SEC crackdown on IPR&D valuations has the potential to slow the pace of mergers and acquisitions significantly, hamper the formation of new companies, and decrease the value of a company's stock. Financial managers on either side of the debate will need a clear understanding of the issues when evaluating potential ...


Recognizing Linguistic Cues To Align Financial Coaching Strategies With The Transtheoretical Model Of Change, Lucy M. Delgadillo 2017 Utah State University

Recognizing Linguistic Cues To Align Financial Coaching Strategies With The Transtheoretical Model Of Change, Lucy M. Delgadillo

Applied Sciences, Technology and Education Faculty Publications

Financial coaching is more effective if a finance professional understands where a client is in the process of change. This article presents five mini scenarios exemplifying the stages of change as they apply to clients receiving financial coaching as well as a sampling of coaching strategies useful for helping clients move through those stages. In particular, the focus of each mini scenario is language used by clients that can provide clues about the stage of change the client is in. Financial management Extension professionals can use the information presented to recognize linguistic cues related to stages of change and align ...


Awakening The Potential Of Positive Computing: A Transversal, Heliotropic Design Paradigm For Human Flourishing, Ryan Wynia 2017 University of Pennsylvania

Awakening The Potential Of Positive Computing: A Transversal, Heliotropic Design Paradigm For Human Flourishing, Ryan Wynia

Master of Applied Positive Psychology (MAPP) Capstone Projects

Positive Computing literature does not consider the complex implications stemming from the evidence of computing technologies’ harmful effects. Moreover, present approaches to integrating well-being science into the design of interactive systems are built on deficit-oriented models. In response, a transversal, social constructionist paradigm of Positive Computing sensitive to the social complex and views technology as a part ofcivilization as a living, human construction is explored as a means of advancing the Positive Computing domain. The work argues the well-being of civilization needs to be routinely re-secured through the development of a metacognitive, affirmative competency that recognizessocial systems as capable of ...


Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele 2017 Adeleke University, Ede

Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele

Journal of International Technology and Information Management

This paper provides an overview of the current state of privacy and data protection policies and regulations in Nigeria. The paper contends that the extant legal regime in Nigeria is patently inadequate to effectively protect individuals against abuse resulting from the processing of their personal data. The view is based on the critical analysis of the current legal regime in Nigeria vis-à-vis the review of some vital data privacy issues. The paper makes some recommendations for the reform of the law.


Table Of Contents Jitim Vol 26 Issue 4, 2017, 2017 California State University, San Bernardino

Table Of Contents Jitim Vol 26 Issue 4, 2017

Journal of International Technology and Information Management

Table of Contents


Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr 2017 University of East London

Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr

Journal of International Technology and Information Management

The discovery of useful or worthwhile process models must be performed with due regards to the transformation that needs to be achieved. The blend of the data representations (i.e data mining) and process modelling methods, often allied to the field of Process Mining (PM), has proven to be effective in the process analysis of the event logs readily available in many organisations information systems. Moreover, the Process Discovery has been lately seen as the most important and most visible intellectual challenge related to the process mining. The method involves automatic construction of process models from event logs about any ...


Digital Commons powered by bepress