Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

3,088 Full-Text Articles 3,167 Authors 1,217,565 Downloads 171 Institutions

All Articles in Technology and Innovation

Faceted Search

3,088 full-text articles. Page 7 of 103.

Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim 2017 Yeungnam University

Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim

Journal of International Technology and Information Management

The principal objective of this paper was to propose and verify a digital content valuing model, which is expected to perform a significant role in future research, and provide novel and practical implications. For the efficacy of a model for the evaluation of digital content value, this study reviewed digital content value and categorized it into intrinsic, interaction, and business value. Based on the research model, we attempted to identify and assess the effects of intrinsic digital content value on digital content interaction value, and to characterize the relationship between digital content interaction value and digital content business value. Consequently ...


An Integrative Model Of Managing Software Security During Information Systems Development, Vijay Raghavan, Xiaoni Zhang 2017 Northern Kentucky University

An Integrative Model Of Managing Software Security During Information Systems Development, Vijay Raghavan, Xiaoni Zhang

Journal of International Technology and Information Management

This study investigates the critical relationship between organizational system development policies, procedures and processes and the resulting security quality of the systems developed. We draw from a general software quality model to provide a theoretical foundation for testing this relationship. We used paper-based survey as well as online surveys to collect data from software developers and project managers. Our results revealed a significant relationship between management support and security policies and development process control. We also found significant relationships between development-process control and security quality, attitude and security quality, and the interaction between value congruence and commitment to provide security ...


Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar 2017 NMIMS University

Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar

Journal of International Technology and Information Management

mHealth (Mobile Health) applications (apps) have transformed the doctor-patient relationship. They help users with varied functionalities such as monitoring their health, understanding specific health conditions, consulting doctors online and achieving fitness goals. Whilst these apps provide an option of equitable and convenient access to healthcare, a lot of personal and sensitive data about users is collected, stored and shared to achieve these functionalities. Little is known about the privacy and security concerns these apps address. Based on literature review, this paper identifies the privacy risks and security features for evaluating thirty apps in the Medical category across two app distribution ...


Uncharted Territory: Female Authorship In The Literary And Video Game Marketplaces, Rachel L. Wood 2017 Murray State University

Uncharted Territory: Female Authorship In The Literary And Video Game Marketplaces, Rachel L. Wood

Honors College Theses

Despite the general push against the oversexualization of female characters in video games, female creative directors and writers are still few and far between in the video game industry. Through a case study of one of the industry’s more prolific female writers, Amy Hennig, this paper aims to discuss the challenges of a female creative director negotiating her identity in a male-dominated marketplace by utilizing theories based on the presence of women in the early literary marketplace. This paper explores the ways in which female creators in both the nineteenth- and twenty-first centuries were forced to take control of ...


Exploring Strategies For Teaching Creatively Online, Conny van der Wouw 2017 State University of New York College at Buffalo - Buffalo State College

Exploring Strategies For Teaching Creatively Online, Conny Van Der Wouw

Creative Studies Graduate Student Master's Projects

The way we learn and teach is changing. There is more emphasis on collaboration and personalization of the learning. Teaching online is becoming common. For my Master’s project I have developed a product that will help designing and delivering teaching programs creatively through the use of online learning opportunities. The product discusses the opportunities and challenges of a creative climate when teaching online and provides strategies to develop creativity during the online learning process. It is developed with the use of the Torrance Incubation Model of Teaching and Learning (TIM) and Ekvall’s ten dimensions of a creative climate ...


Coordinating Supply And Demand On An On-Demand Service Platform With Impatient Customers, Jiaru BAI, Kut C. SO, Christopher TANG, Xiqun CHEN, Hai WANG 2017 Binghamton University--SUNY

Coordinating Supply And Demand On An On-Demand Service Platform With Impatient Customers, Jiaru Bai, Kut C. So, Christopher Tang, Xiqun Chen, Hai Wang

Research Collection School Of Information Systems

We consider an on-demand service platform using earning sensitive independent providers with heterogeneous reservation price (for work participation) to serve its time and price sensitive customers with heterogeneous valuation of the service. As such, both the supply and demand are "endogenously'' dependent on the price the platform charges its customers and the wage the platform pays its independent providers. We present an analytical model with endogenous supply (number of participating agents) and endogenous demand (customer request rate) to study this on-demand service platform. To coordinate endogenous demand with endogenous supply, we include the steady-state waiting time performance based on a ...


Blockchain Technology: An Analysis Of Potential Applications And Uses, Jeffrey Kogon 2017 Honors College, Pace University

Blockchain Technology: An Analysis Of Potential Applications And Uses, Jeffrey Kogon

Honors College Theses

This paper will focus on explaining what blockchain technology is, the fundamentals of how it works, and applications of it. By utilizing sophisticated cryptography, a distributed network, a specified order of events the technology is able to create a ledger that cannot be altered due to its existence on many computers that able to detect if the data has been changed or tampered with. To help illustrate the uses of blockchain technology the technical explanation is complemented with real and hypothetical ways that the technology it being used. The use of blockchain technology originated with financial application and has expanded ...


Ai And Jobs: The Role Of Demand, James Bessen 2017 Boston University School of Law

Ai And Jobs: The Role Of Demand, James Bessen

Faculty Scholarship

In manufacturing, technology has sharply reduced jobs in recent decades. But before that, for over a century, employment grew, even in industries experiencing rapid technological change. What changed? Demand was highly elastic at first and then became inelastic. The effect of artificial intelligence (AI) on jobs will similarly depend critically on the nature of demand. This paper presents a simple model of demand that accurately predicts the rise and fall of employment in the textile, steel, and automotive industries. This model provides a useful framework for exploring how AI is likely to affect jobs over the next 10 or 20 ...


The Big, Gig Picture: We Can't Assume The Same Constructs Matter, Alice M. Brawley 2017 Gettysburg College

The Big, Gig Picture: We Can't Assume The Same Constructs Matter, Alice M. Brawley

Management Faculty Publications

I am concerned about industrial and organizational (I-O) psychology's relevance to the gig economy, defined here as the broad trends toward technology-based platform work. This sort of work happens on apps like Uber (where the app connects drivers and riders) and sites like MTurk (where human intelligence tasks, or HITs, are advertised to workers on behalf of requesters). We carry on with I-O research and practice as if technology comprises only things (e.g., phones, websites, platforms) that we use to assess applicants and complete work. However, technology has much more radically restructured work as we know it, to ...


High Tech And High Touch: Headhunting, Technology, And Economic Transformation, James E. Coverdill, William Finlay 2017 University of Georgia

High Tech And High Touch: Headhunting, Technology, And Economic Transformation, James E. Coverdill, William Finlay

Book Samples

[Excerpt] In High Tech and High Touch, James E. Coverdill and William Finlay invite readers into the dynamic world of headhunters, personnel professionals who acquire talent for businesses and other organizations on a contingent-fee basis. In a high-tech world where social media platforms have simplified direct contact between employers and job seekers, Coverdill and Finlay acknowledge, it is relatively easy to find large numbers of apparently qualified candidates. However, the authors demonstrate that headhunters serve a valuable purpose in bringing high-touch search into the labor market: they help parties on both sides of the transaction to define their needs and ...


The Development Of Organizational Training: Identifying Generational Differences And Perceptions In Computerized Learning Systems In Government Organizations, Gregory Negron 2017 Brandman University

The Development Of Organizational Training: Identifying Generational Differences And Perceptions In Computerized Learning Systems In Government Organizations, Gregory Negron

Dissertations

Purpose: The purpose of this quantitative study was to determine the degree of effectiveness and preferences as it related to various computer-based training (CBT) and instructor-based training (IBT) types as perceived by baby boomer, Generation X, and millennial generational Space and Naval Warfare Systems Center Pacific (SSC Pacific) employees based in San Diego, California, as measured by the Northern Virginia Community College (NVCC) Extended Learning Institute Survey.

Methodology: The study used a descriptive, causal-comparative research design. A survey was administered to collect demographic data and responses that described and determined the degree of difference and effectiveness for various CBT types ...


Electronic Flight Bag Policies At Collegiate Aviation Programs, Tyler A. Babb 2017 Middle Tennessee State University

Electronic Flight Bag Policies At Collegiate Aviation Programs, Tyler A. Babb

International Journal of Aviation, Aeronautics, and Aerospace

Electronic Flight Bags (EFBs) are now standard in the commercial aviation industry. Air carriers must implement and maintain EFB training and policies according to FAA regulations. Pilots are also using EFBs at collegiate aviation programs.This study investigated EFB practices at collegiate aviation programs, and how well these practices complied with FAA recommendations. Specifically, the research investigated whether or not the presence of an official EFB policy at a flight program had any relation to the quality of the EFB program. Results indicated that most programs somewhat conform to FAA policies, and in some cases, programs without policies had more ...


Virtual Commissioning For Industrial Automation, Saihiranmitra Mudiki 2017 Morehead State University

Virtual Commissioning For Industrial Automation, Saihiranmitra Mudiki

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Business and Technology at Morehead State University in partial fulfillment of the requirements for the Degree Master of Science by Saihiranmitra Mudiki on November 7, 2017.


Imsa: Innovating Stem Education, Britta W. McKenna 2017 Illinois Mathematics and Science Academy

Imsa: Innovating Stem Education, Britta W. Mckenna

Publications & Research

The mission of IMSA, the world’s leading teaching and learning laboratory for imagination and inquiry, is to ignite and nurture creative, ethical, scientific minds that advance the human condition.


The Actavis Inference: Theory And Practice, Aaron S. Edlin, C. Scott Hemphill, Herbert J. Hovenkamp, Carl Shapiro 2017 University of California - Berkeley

The Actavis Inference: Theory And Practice, Aaron S. Edlin, C. Scott Hemphill, Herbert J. Hovenkamp, Carl Shapiro

Aaron Edlin

In FTC v. Actavis, Inc., the Supreme Court considered "reverse payment" settlements of patent infringement litigation. In such a settlement, a patentee pays the alleged infringer to settle, and the alleged infringer agrees not to enter the market for a period of time. The Court held that a reverse payment settlement violates antitrust law if the patentee is paying to avoid competition. The core insight of Actavis is the Actavis Inference: a large and otherwise unexplained payment, combined with delayed entry, supports a reasonable inference of harm to consumers from lessened competition.This paper is an effort to assist courts ...


Actavis And Error Costs: A Reply To Critics, Aaron S. Edlin, C. Scott Hemphill, Herbert J. Hovenkamp, Carl Shapiro 2017 University of California - Berkeley

Actavis And Error Costs: A Reply To Critics, Aaron S. Edlin, C. Scott Hemphill, Herbert J. Hovenkamp, Carl Shapiro

Aaron Edlin

The Supreme Court’s opinion in Federal Trade Commission v. Actavis, Inc. provided fundamental guidance about how courts should handle antitrust challenges to reverse payment patent settlements. In our previous article, Activating Actavis, we identified and operationalized the essential features of the Court’s analysis. Our analysis has been challenged by four economists, who argue that our approach might condemn procompetitive settlements.As we explain in this reply, such settlements are feasible, however, only under special circumstances. Moreover, even where feasible, the parties would not actually choose such a settlement in equilibrium. These considerations, and others discussed in the reply ...


Activating Actavis, Aaron Edlin, C. Scott Hemphill, Herbert J. Hovenkamp, Carl Shapiro 2017 University of California - Berkeley

Activating Actavis, Aaron Edlin, C. Scott Hemphill, Herbert J. Hovenkamp, Carl Shapiro

Aaron Edlin

In Federal Trade Commission v. Actavis, Inc., the Supreme Court provided fundamental guidance about how courts should handle antitrust challenges to reverse payment patent settlements. The Court came down strongly in favor of an antitrust solution to the problem, concluding that “an antitrust action is likely to prove more feasible administratively than the Eleventh Circuit believed.” At the same time, Justice Breyer’s majority opinion acknowledged that the Court did not answer every relevant question. The opinion closed by “leav[ing] to the lower courts the structuring of the present rule-of-reason antitrust litigation.”This article is an effort to help ...


Let's Talk Turkey Patents Coloring Book, Paulina Borrego 2017 University of Massachusetts - Amherst

Let's Talk Turkey Patents Coloring Book, Paulina Borrego

Paulina Borrego

Coloring book containing a selected page from ten different U.S. patents or patent applications pertaining to the theme of Thanksgiving.


Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder 2017 College of Engineering and Computing, Nova Southeastern University

Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder

KSU Proceedings on Cybersecurity Education, Research and Practice

Millions of people willingly expose their lives via Internet technologies every day, and even those who stay off the Internet find themselves exposed through data breaches. Trillions of private information records flow through the Internet. Marketers gather personal preferences to coerce shopping behavior, while providers gather personal information to provide enhanced services. Few users have considered where their information is going or who has access to it. Even fewer are aware of how decisions made in their own lives expose significant pieces of information, which can be used to harm the very organizations they are affiliated with by cyber attackers ...


A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi 2017 University of Alabama, Birmingham

A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi

KSU Proceedings on Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


Digital Commons powered by bepress