Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Journal

Technology

2002

Discipline
Institution
Publication

Articles 1 - 27 of 27

Full-Text Articles in Entire DC Network

Price Bubbles Of New-Technology Ipos, Haim Kedar-Levy Dec 2002

Price Bubbles Of New-Technology Ipos, Haim Kedar-Levy

The Journal of Entrepreneurial Finance

Asset pricing models with atomistic agents typically relax assumptions concerning rationality and/or homogenous information in order to track endogenous bubbles. In this model, identically informed rational agents hold a Perceived Law of Motion (PLM) for a single new technology asset at IPO, yet they differ with respect to risk aversion. By mapping risk preferences to strategies, we use marginal supply and demand functions to solve for the PLM if REE holds. By relaxing the assumption of complete knowledge of agent's tastes and wealth, post-IPO bubbles emerge where the Actual Law of Motion is an amplification (bubble) of the price processes …


Technology Law, J. Douglas Cuthbertson, Glen L. Gross Nov 2002

Technology Law, J. Douglas Cuthbertson, Glen L. Gross

University of Richmond Law Review

No abstract provided.


Quibbles'n Bits: Making A Digital First Sale Doctrine Feasible, Victor F. Calaba Oct 2002

Quibbles'n Bits: Making A Digital First Sale Doctrine Feasible, Victor F. Calaba

Michigan Telecommunications & Technology Law Review

Whereas the first sale doctrine historically permitted the transfer and resale of copyrighted works, license agreements used by software companies and the DMCA's strict rules prohibiting tampering with access control devices frustrate exercise of the first sale doctrine with respect to many forms of digital works[...] This article explores the first sale doctrine as it pertains to digital works and proposes ways to make a digital first sale doctrine feasible. Part II describes the first sale doctrine as it has traditionally been applied to non-digital works. Part III discusses modern technology's impact on the distribution and use of copyrighted material. …


Researching Remedies In Intellectual Property Actions Involving Computer Technology: A Research Guide, Daniel N. Kassabian Oct 2002

Researching Remedies In Intellectual Property Actions Involving Computer Technology: A Research Guide, Daniel N. Kassabian

Michigan Telecommunications & Technology Law Review

The purpose of this research guide is not to answer the question "What remedies are available to an owner of computer related technology whose rights have been infringed?" but to provide a methodology by which a legal practitioner can find the answer to this question. This guide sets forth materials and methods of research that can be used for an inquiry that is broad in scope, such as researching which legal scheme's remedial component best suits a client's technology, but that are also capable of being used for a narrow or limited inquiry, such as looking for specific remedies available …


Technology's Promises, Cisr Jmu Aug 2002

Technology's Promises, Cisr Jmu

The Journal of Conventional Weapons Destruction

Every technology under development makes big promises. Here are five projects that may someday impact the world of mine action.


Festo: A Case Contravening The Convergence Of Doctrine Of Equivalents Jurisprudence In Germany, The United Kingdom, And The United States, Katherine E. White Jun 2002

Festo: A Case Contravening The Convergence Of Doctrine Of Equivalents Jurisprudence In Germany, The United Kingdom, And The United States, Katherine E. White

Michigan Telecommunications & Technology Law Review

Despite differences in patent law jurisprudence in Germany, the United Kingdom and the United States, the fundamental principles underlying each system serve the same basic purpose: to encourage technological innovation and dissemination of knowledge. In granting exclusive patent rights, it is important that the scope of patent protection not be so broad as to remove existing knowledge from the public domain. The scope of protection should strike a balance between granting adequate patent rights while preserving the public's ownership in the public domain or the prior art. To encourage innovation patentees must attain significant exclusive rights, while potential infringers receive …


Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr Jun 2002

Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr

Michigan Telecommunications & Technology Law Review

"Carnivore" entered the online world's collective consciousness in June 2000 when the Federal Bureau of Investigation unveiled the Internet surveillance software program to telecommunications industry specialists. The FBI claims the program allows agents to scan the traffic of an Internet Service Provider (ISP) for messages or commands to or from a criminal suspect and then intercept only those messages, capturing copies of e-mails, web site downloads and other file transfers[...] A central issue in the controversy surrounding Carnivore is whether current law permits the FBI to employ the program in the Internet context. Bureau officials claim statutory authority for deployments …


Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen Jun 2002

Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen

Michigan Telecommunications & Technology Law Review

The goal of this article is to illustrate the issues that arise in the context of computer search and seizures by examining several areas in which the application of Fourth Amendment concepts to computer searches and/or seizures can be problematic. In order to illustrate this point, the article will build on a hypothetical. The hypothetical situation assumes law enforcement officers have lawfully obtained a warrant to search for and seize evidence concerning the commission of one or more crimes. It will also be assumed that computer technology played some role in the commission of these crimes, so computer equipment and …


Information Operations, Information Warfare, And Computer Network Attack: Their Relationship To National Security In The Information Age, Daniel T. Kuehl Jun 2002

Information Operations, Information Warfare, And Computer Network Attack: Their Relationship To National Security In The Information Age, Daniel T. Kuehl

International Law Studies

No abstract provided.


Full Volume 76: Computer Network Attack And International Law Jun 2002

Full Volume 76: Computer Network Attack And International Law

International Law Studies

No abstract provided.


Emerging Technologies And Exponential Change: Implications For Army Transformation, Kip P. Nygren May 2002

Emerging Technologies And Exponential Change: Implications For Army Transformation, Kip P. Nygren

The US Army War College Quarterly: Parameters

No abstract provided.


The Effects Of Technology On Our Humanity, D. Keith Shurtleff May 2002

The Effects Of Technology On Our Humanity, D. Keith Shurtleff

The US Army War College Quarterly: Parameters

No abstract provided.


Mine Action Technology Now And In The Future: Is It Realistic To Expect Great Leaps Forward In Technology?, Håvard Bach Apr 2002

Mine Action Technology Now And In The Future: Is It Realistic To Expect Great Leaps Forward In Technology?, Håvard Bach

The Journal of Conventional Weapons Destruction

In order to realistically predict the future of demining techniques and technologies, past and present technology must first be examined and critiqued.


National Mine Action: Problems And Predictions, Vernon Joynt Apr 2002

National Mine Action: Problems And Predictions, Vernon Joynt

The Journal of Conventional Weapons Destruction

I recently received an e-mail with real good bait on the line so I would commit to sticking my neck in the noose once more. The questions included: Will technology ever improve speed and safety in Humanitarian Demining (HD)? What is the comparative efficiency among commercial, military and NGO clearance? Will dogs be more or less integrated into HD programs? When will land use priorities determine clearance priorities? Is "donor fatigue" a reality? If so, how do we fix it? These questions are right in the middle of my current pet struggle to give technology its rightful role and place …


Technology And Its Use In The Mine Field, Geoff Coley Apr 2002

Technology And Its Use In The Mine Field, Geoff Coley

The Journal of Conventional Weapons Destruction

Canadian Center for Mine Action Technologies (CCMAT) outlines a cycle of development and testing which should help more useful technologies make it to mine fields. In this article, three products are introduced that successfully follow this cycle.


It’S Time To Upgrade: Tests And Administration Procedures For The New Millennium, Michael Russell Apr 2002

It’S Time To Upgrade: Tests And Administration Procedures For The New Millennium, Michael Russell

Essays in Education

Increasing use of computers in schools has led to a mis-alignment between the way some students develop skill and knowledge and how they are tested. This paper reviews past research that demonstrates that paper-based tests that require students to produce written responses underestimate the achievement of students who are accustomed to writing on computer. The paper then explores how learning that occurs through other instructional uses of computers is not adequately captured by current testing practices. The paper argues that new approaches should be explored to better measure student learning.


The Impact Of Information Technology Outsourcing On Firm Profitability Measures, G. Dwayne Whitten, T Selwyn Ellis, K. Michael Casey Jan 2002

The Impact Of Information Technology Outsourcing On Firm Profitability Measures, G. Dwayne Whitten, T Selwyn Ellis, K. Michael Casey

Journal of International Information Management

Some researchers have concluded that outsourcing of information technology (IT) provides benefits to firms including cost advantages, economies of scale and allowing more of a focus on core competencies. This paper attempts to determine if these benefits actually exist by comparing three financial measures, return on equity (ROE), return on assets (ROA) and profit margin, affirms that have varying levels of outsourcing. To empirically test for the existence of a difference between firms that outsource differing amounts of IT spending, data from 104 companies was gathered. Analysis of variance was selected as the primary statistical tool to test the relationship …


Why Is Middle Management In Conflict With Erp?, Rainer A. Sommer Jan 2002

Why Is Middle Management In Conflict With Erp?, Rainer A. Sommer

Journal of International Information Management

Popular Enterprise Resource Planning (ERP) system implementation methods focus on process requirements, system transition, user interface, help desk, and training issues. This research suggests that unless high-level management places equal emphasis on "people oriented" factors (especially at the middle management level) many ERP implementation projects are in jeopardy. Without the commitment of middle management and a proactive change management function, project planning and milestone development can easily become bogged down by political trivialities, which can stall the implementation cycle of a project. The research focuses on two ERP implementations. In both cases middle management served as the unit of analysis.


A Structural Equation Model Of Information Systems Development And Supply Chain Management, Chinho Lin, Bertram Tan, Shofang Chang Jan 2002

A Structural Equation Model Of Information Systems Development And Supply Chain Management, Chinho Lin, Bertram Tan, Shofang Chang

Journal of International Information Management

This paper employees structural equation modeling to analyze the effects of information system development and supply chain management on manufacturing objective and organizational performance. Survey data of middle managers from Taiwan s computer and electronics industries was used to test the relationships between the constructs in the model. In general, the survey results supported the proposed structural equation model. It is observed that information system development facilitates supply chain management practice and manufacturing objective attainment. In addition, there are significant relationships between supply chain management and manufacturing objective, as well as between manufacturing objective and organizational performance. However, the impacts …


Jad Can Get Better, Evan W. Duggan, Cherian S. Thachenkary Jan 2002

Jad Can Get Better, Evan W. Duggan, Cherian S. Thachenkary

Journal of International Information Management

Interviewing and other conventional approaches failed to produce the user-developer understanding required to establish high-quality systems requirements for software development. .Joint Application Development (JAD) was introduced in the late 1970s, and has been widely used to alleviate this problem. But JAD s success has been critically dependent on the excellence of facilitation to deflect many of the relational problems that are typically experienced with the freely interacting group structure used to conduct JAD sessions. While the use of JAD is pervasive, excellent facilitators are scarce, which hampers or even precludes some JAD efforts. In this article we recommend a solution …


A Multivariate Probit Analysis Of Selected Factors Influencing Electronic Commerce Adoption In Organizations, Adeyemi A. Adekoya, Ago K.M. Quaye, Ephrem Eyob Jan 2002

A Multivariate Probit Analysis Of Selected Factors Influencing Electronic Commerce Adoption In Organizations, Adeyemi A. Adekoya, Ago K.M. Quaye, Ephrem Eyob

Journal of International Information Management

This study investigates factors leading to the "go/no go" decision on organizational innovations, with particular reference to Electronic Commerce (E-Commerce). The goal is to explore important antecedents promoting the adoption of technological innovations and to extend the frontiers of knowledge in this area, by integrating two major research paradigms - basic and applied. Randomly selected organizations in the IT area participated in the study. Variables pertaining to organizations. Information Technology, and users of the technology were assessed and analyzed using an omnibus instrument and probit analysis respectively. This study provides a tentative elucidation of contemporary unresolved issues, and also broadens …


Understanding Web Page Anatomy, Antony Coulson, C.E. Tapie Rohm, Pat Mcinturff, Jake Zhu, James Stanger Jan 2002

Understanding Web Page Anatomy, Antony Coulson, C.E. Tapie Rohm, Pat Mcinturff, Jake Zhu, James Stanger

Journal of International Information Management

The rapid evolution of information technology over the past several decades has opened many new and unique modes of communication. Clearly, the web is one such technology. However, it is quite possible that a fascination with the technology per se can hinder participants from one of its main functions—effective communication. The following essay explores a return to the basics of designing an effective web-based communication strategy. The key components of this strategy are: 1) consistent look and feel, 2) conceptual consistency, and 3) positive attention.


The "Art" Of Procreation: Why Assisted Reproduction Technology Allows For The Preservation Of Female Prisoners' Right To Procreate, Sarah L. Dunn Jan 2002

The "Art" Of Procreation: Why Assisted Reproduction Technology Allows For The Preservation Of Female Prisoners' Right To Procreate, Sarah L. Dunn

Fordham Law Review

No abstract provided.


Online Standardization And The Integration Of Text And Machine, Margaret Jane Radin Jan 2002

Online Standardization And The Integration Of Text And Machine, Margaret Jane Radin

Fordham Law Review

No abstract provided.


The Modern Athlete: Natural Athletic Ability Or Technology At Its Best, Erin E. Floyd Jan 2002

The Modern Athlete: Natural Athletic Ability Or Technology At Its Best, Erin E. Floyd

Jeffrey S. Moorad Sports Law Journal

No abstract provided.


Technology Attitudes In The Classroom, Sherry A. Fleming Jan 2002

Technology Attitudes In The Classroom, Sherry A. Fleming

The Corinthian

The purpose of this study was to examine student attitudes toward technology in the economics classroom in a magnet high school in Augusta, Georgia over a period of a semester. A survey was used to measure attitudes towards computer use, any changes at the end of the semester, and any differences by gender. Structured observations were notated in a teacher log once a week to note any differences in aggressiveness towards computer use by gender. The results indicate that although males scored higher on attitude surveys, there were no significant differences between gender.


Marketing, Protection And Enforcement Of Ncaa Marks, Scott A. Bearby Jan 2002

Marketing, Protection And Enforcement Of Ncaa Marks, Scott A. Bearby

Marquette Sports Law Review

No abstract provided.