Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

4,895 Full-Text Articles 6,348 Authors 4,104,209 Downloads 257 Institutions

All Articles in Technology and Innovation

Faceted Search

4,895 full-text articles. Page 98 of 194.

Jeff Ramsdell.Jpg, Jeff Ramsdell 2017 Appalachian State University

Jeff Ramsdell.Jpg, Jeff Ramsdell

Dr. Jeff Ramsdell

No abstract provided.


From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth 2017 Kennesaw State University

From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth

Journal of Cybersecurity Education, Research and Practice

No abstract provided.


A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer 2017 Nova Southeastern University

A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer

Journal of Cybersecurity Education, Research and Practice

Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and …


Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi 2017 University of Alabama, Birmingham

Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi

Journal of Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell 2017 Arkansas Tech University

Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell

Journal of Cybersecurity Education, Research and Practice

Recent publicized security breaches can be used to evaluate information security programs. The processes and procedures that allowed the event to occur can be examined in a case study and then be used to find methods for future mitigation of risk. The Target security breach is used in this study to examine the organization’s information security program using a macro-ergonomic model. This research posits that an information security program should consider the work system design, based in macro-ergonomics, to help mitigate information security risk to the organization and ensure an efficient and effective information security program. Based on a seminal …


A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland 2017 Plymouth University, U.K.

A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland

Journal of Cybersecurity Education, Research and Practice

In today’s business environment where all operations are enabled by technology, information security has become an established discipline as more and more businesses realize its value. The human component has been recognized to have an important role in information security since the only way to reduce security risks is through making employees more information security aware. Towards this goal the research will appreciate the importance of information security awareness by illustrating the need for more effective user training. Further to that it proposes and develops an information security toolkit as a prototype awareness raising initiative. Apart from the elements of …


What Bitcoin Is, And How It Can Change Commerce, Jeffrey Bukhari 2017 CUNY Graduate School of Journalism

What Bitcoin Is, And How It Can Change Commerce, Jeffrey Bukhari

Capstones

The use of the digital currency Bitcoin has spiked dramatically over the last several years. Spurred by interest from investors and those excited about its commercial and banking potential, the value of the cryptocurrency has seen its value greatly increase since its beginning in 2009.

This project explains the underlying technology behind Bitcoin, how Bitcoin is and will change commerce, and what potential lies ahead for the digital currency.


An Integrated Behavioural Model Towards Evaluating And Influencing Energy Behaviour—The Role Of Motivation In Behaviour Demand Response, Julia Blanke, Christian Beder, Martin Klepal 2017 People Behaviour & Technology Integration Group, Nimbus Research Centre, Cork Institute of Technology, Cork T12P928, Ireland

An Integrated Behavioural Model Towards Evaluating And Influencing Energy Behaviour—The Role Of Motivation In Behaviour Demand Response, Julia Blanke, Christian Beder, Martin Klepal

NIMBUS Articles

The change in the actual use of buildings by its occupants is receiving more and more attention. Over the lifecycle of a building the occupants and therefore the demands towards the buildings often change a lot. To match these altering conditions, particularly in the context of the demand for energy efficiency, purely technical approaches usually cannot solve the problem on their own or are not financially viable. It is therefore essential to take the behaviour of the end user into account and ask the fundamental question: “How is it possible to influence people’s behaviour towards a more pro-environmental outcome, and …


Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj 2017 City University of New York (CUNY)

Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj

Capstones

Breadcrumbs: Privacy as a Privilege Abstract

By: Prachi Bhardwaj

In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.

That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …


Applying Agile Project Management To Art Museums: A Proposal For Implementing A Generalist Scrum Master, Vincent Sulit 2017 The University of San Francisco

Applying Agile Project Management To Art Museums: A Proposal For Implementing A Generalist Scrum Master, Vincent Sulit

Master's Projects and Capstones

This capstone project examines organizational change, along with its challenges, through case studies in museums and businesses in the private sector, subsequently providing a possible solution for museums to adapt to the current global market economy through the use of Agile Project Management (Agile). I cite recent case studies of art museums implementing Agile for digital product development. This project proposal aims to introduce Agile outside of digital departments, including Exhibitions and Education, with the goal of developing better visitor-centered offerings from museums. This may be achieved through the proposal of a job description for a new museum position of …


Nebraska Unwrapped: Innovation Studio Provides 'Makers' Tools Of Their Dreams, Deann Gayman 2017 University of Nebraska-Lincoln

Nebraska Unwrapped: Innovation Studio Provides 'Makers' Tools Of Their Dreams, Deann Gayman

Nebraska Innovation Studio

Nebraska Unwrapped: Innovation Studio provides 'makers' tools of their dreams, December 12, 2017.

It has been another successful year for the University of Nebraska-Lincoln. In the spirit of the holiday season, we’re unwrapping the impact of the state’s flagship institution and taking a closer look at some highlights. Today, "Nebraska Unwrapped" is focusing on innovation. Other topics in the series include student experience, outreach, and research.

Nebraska Innovation Studio makes sought-after tools and work space available to University of Nebraska-Lincoln students and members of the public. For a small monthly fee, ranging from $15 to $55 (https://innovationstudio.unl.edu/fee-breakdown) , …


A Framework Towards Technology Creation In Africa: Focusing On Ghana, Martin Yao Donani, Hannatu Abue Kugblenu, Azindow Bawa Fuseini 2017 Ho Polytechnic, Ghana

A Framework Towards Technology Creation In Africa: Focusing On Ghana, Martin Yao Donani, Hannatu Abue Kugblenu, Azindow Bawa Fuseini

International Journal of African Development

Underdevelopment in Africa has been historical and a global concern coupled with the quest for good governance. Several efforts have been made in academia, national governments, the international community, and other institutional arrangements to reverse the trend. These efforts however are yet to produce a lasting result as Africa is still characterized by low productivity output, poverty and a widening technology gap when compared to other developing regions of the world. Conventional approaches used to address the African problem have consistently been devoid of indigenous technology development. Technology is here seen as paramount to every form of production on which …


Technology Planning For Aligning Emerging Business Models And Regulatory Structures: The Case Of Electric Vehicle Charging And The Smart Grid, Kelly R. Cowan 2017 Portland State University

Technology Planning For Aligning Emerging Business Models And Regulatory Structures: The Case Of Electric Vehicle Charging And The Smart Grid, Kelly R. Cowan

Dissertations and Theses

Smart grid has been described as the Energy Internet: Where Energy Technology meets Information Technology. The incorporation of such technology into vast existing utility infrastructures offers many advantages, including possibilities for new smart appliances, energy management systems, better integration of renewable energy, value added services, and new business models, both for supply- and demand-side management. Smart grid also replaces aging utility technologies that are becoming increasingly unreliable, as the average ages for many critical components in utility systems now exceed their original design lives. However, while smart grid offers the promise of revolutionizing utility delivery systems, many questions remain about …


An Integrative Model Of Managing Software Security During Information Systems Development, Vijay Raghavan, Xiaoni Zhang 2017 Northern Kentucky University

An Integrative Model Of Managing Software Security During Information Systems Development, Vijay Raghavan, Xiaoni Zhang

Journal of International Technology and Information Management

This study investigates the critical relationship between organizational system development policies, procedures and processes and the resulting security quality of the systems developed. We draw from a general software quality model to provide a theoretical foundation for testing this relationship. We used paper-based survey as well as online surveys to collect data from software developers and project managers. Our results revealed a significant relationship between management support and security policies and development process control. We also found significant relationships between development-process control and security quality, attitude and security quality, and the interaction between value congruence and commitment to provide security …


Recognizing Linguistic Cues To Align Financial Coaching Strategies With The Transtheoretical Model Of Change, Lucy M. Delgadillo 2017 Utah State University

Recognizing Linguistic Cues To Align Financial Coaching Strategies With The Transtheoretical Model Of Change, Lucy M. Delgadillo

Applied Sciences, Technology and Education Faculty Publications

Financial coaching is more effective if a finance professional understands where a client is in the process of change. This article presents five mini scenarios exemplifying the stages of change as they apply to clients receiving financial coaching as well as a sampling of coaching strategies useful for helping clients move through those stages. In particular, the focus of each mini scenario is language used by clients that can provide clues about the stage of change the client is in. Financial management Extension professionals can use the information presented to recognize linguistic cues related to stages of change and align …


Effect Of A Ubiquitous Moral Cue On Ethical Leadership, Moral Disengagement And Goal Difficulty: Real-World Outcomes Of A Novel Behavioural Intervention By Mobile Application Technology, Boon Heon TAN 2017 Singapore Management University

Effect Of A Ubiquitous Moral Cue On Ethical Leadership, Moral Disengagement And Goal Difficulty: Real-World Outcomes Of A Novel Behavioural Intervention By Mobile Application Technology, Boon Heon Tan

Dissertations and Theses Collection (Open Access)

Firms invest significant resources in their ethical infrastructure to influence the ethical decision-making of employees. The advent of mobile technology has extended the frontier of interventions that may discourage unethical behaviour, through the use of ubiquitously-present mobile-based moral cues. I conducted a prospective, randomized field experiment, to study how a ubiquitous moral cue may positively enhance ethical decision-making. Sales professionals working in a pharmaceutical firm in China were assigned randomly by teams to either receive, or not, a mobile application from their firm’s compliance department. Over six months, participants completed three cross-sectional surveys, and were randomly monitored by an independent …


Blockchain Technology: An Analysis Of Potential Applications And Uses, Jeffrey Kogon 2017 Honors College, Pace University

Blockchain Technology: An Analysis Of Potential Applications And Uses, Jeffrey Kogon

Honors College Theses

This paper will focus on explaining what blockchain technology is, the fundamentals of how it works, and applications of it. By utilizing sophisticated cryptography, a distributed network, a specified order of events the technology is able to create a ledger that cannot be altered due to its existence on many computers that able to detect if the data has been changed or tampered with. To help illustrate the uses of blockchain technology the technical explanation is complemented with real and hypothetical ways that the technology it being used. The use of blockchain technology originated with financial application and has expanded …


Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr 2017 University of East London

Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr

Journal of International Technology and Information Management

The discovery of useful or worthwhile process models must be performed with due regards to the transformation that needs to be achieved. The blend of the data representations (i.e data mining) and process modelling methods, often allied to the field of Process Mining (PM), has proven to be effective in the process analysis of the event logs readily available in many organisations information systems. Moreover, the Process Discovery has been lately seen as the most important and most visible intellectual challenge related to the process mining. The method involves automatic construction of process models from event logs about any domain …


Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim 2017 Yeungnam University

Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim

Journal of International Technology and Information Management

The principal objective of this paper was to propose and verify a digital content valuing model, which is expected to perform a significant role in future research, and provide novel and practical implications. For the efficacy of a model for the evaluation of digital content value, this study reviewed digital content value and categorized it into intrinsic, interaction, and business value. Based on the research model, we attempted to identify and assess the effects of intrinsic digital content value on digital content interaction value, and to characterize the relationship between digital content interaction value and digital content business value. Consequently, …


Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele 2017 Adeleke University, Ede

Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele

Journal of International Technology and Information Management

This paper provides an overview of the current state of privacy and data protection policies and regulations in Nigeria. The paper contends that the extant legal regime in Nigeria is patently inadequate to effectively protect individuals against abuse resulting from the processing of their personal data. The view is based on the critical analysis of the current legal regime in Nigeria vis-à-vis the review of some vital data privacy issues. The paper makes some recommendations for the reform of the law.


Digital Commons powered by bepress