Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Engineering

Selected Works

2012

Institution
Keyword
Publication
File Type

Articles 1 - 30 of 91

Full-Text Articles in Business

Virtual Teams And E-Entrepreneurship, Nader Ale Ebrahim Dec 2012

Virtual Teams And E-Entrepreneurship, Nader Ale Ebrahim

Nader Ale Ebrahim

The advent of the virtual teams has facilitated the emergence and formation of new companies within the Net Economy which called e-Entrepreneurship. The terms of e-Entrepreneurship and virtual teams still are new in the scholarly papers. Therefore, this introductory presentation focuses on different aspects of virtual teams and e-entrepreneurship.


Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy Dec 2012

Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy

Dr Deogratias Harorimana

ICT for Poverty Alleviation in Pacific Island Nations: Study of ICTs4D in Fiji There has been a vague and little knowledge on the role or potential of Information and Communications Technologies (ICTs) in relation to addressing poverty in Fiji. This may be probably due to the newness of the technology in the South Pacific Region as a whole but also probably due to the fact that only 9.7% of the current Fiji 931,000 populations are internet users (ITC Figures 2011). This paper reports on finding how ICTs is contributing towards poverty alleviation in Fiji. On the basis of reviewed best …


An Assessment Of The Effects Of Desertification In Yobe State, Nigeria, Jibril Musa Phd Dec 2012

An Assessment Of The Effects Of Desertification In Yobe State, Nigeria, Jibril Musa Phd

Confluence Journal Environmental Studies (CJES), Kogi State University, Nigeria

Desertification is one of the most serious environmental and socio-economic problems of our time. Desertification describes circumstances of land degradation in arid, semi-arid and dry sub-humid regions resulting from the climatic variation and human activities. The fundamental goal of this thesis was to assess the effects of desertification in Yobe State, Nigeria. The present threat of desertification in the sahel has reached an alarming stage where crops cultivation and animal rearing/grazing are no more productive, soil has lost its nutrient/fertility, various infrastructure had given way because of windstorm from the neighbouring Niger Republic and sand dunes had taken over. The …


Using Remote Sensing Data To Improve Rice Production In Kutigi, Niger State, Nigeria, Jibril Musa Phd, M B. Yunusa Dec 2012

Using Remote Sensing Data To Improve Rice Production In Kutigi, Niger State, Nigeria, Jibril Musa Phd, M B. Yunusa

Confluence Journal Environmental Studies (CJES), Kogi State University, Nigeria

This research work looked in the used of Remote Sensing to improve Agricultural production in Kutigi, Niger State. The aim of the study is to use remote sensing to improve rice farming activities in Kutigi, Niger State. It is very important to identify such methods to improve Agricultural production because experts are always interested in new researches and findings to better the standard of living in any environment. In view of this, Remotely-sensed data could be used or employed to elevate most of these agricultural problems in Kutigi through the following objectives: Using Landsat imagery to assess the present landuse …


An Estate Dilemma - Inaccessible Assets Hiding Behind Passwords And Encryption, Douglas J. Henderson Dec 2012

An Estate Dilemma - Inaccessible Assets Hiding Behind Passwords And Encryption, Douglas J. Henderson

DOUGLAS J HENDERSON

Every person living in the modern world holds valuable assets, data, or information in digital mediums. Digital mediums include not only digital hardware storage mediums in personal possession (like external hard drives and internal hard drives within laptop and desktop computers, personal digital assistants, cell phones, and the like), but also those only accessible through a network. Because so much is held in digital mediums, when an individual dies or becomes incapacitated, another person must know how to access the incapacitated person’s digital assets and other important information (this person is known herein as the ‘Responsible Party’). There are potential …


Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg Dec 2012

Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg

Jan Kallberg

La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …


Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …


Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael Dec 2012

Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael

Professor Katina Michael

This special section is dedicated to privacy in the information age. Since the rise of mobile social media in particular and the advent of cloud computing few can dispute that the times have changed. Privacy is now understood in context, and within a framework that is completely different to what it once was. The right to be let alone physically seemingly has been replaced by the right to give away as much information as you want virtually. What safeguards can be introduced into such a society? We cannot claim to wish for privacy as a right if we ourselves do …


Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom Dec 2012

Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom

Professor Katina Michael

Mobile Government Briefing: Provide services anywhere any time: - Transact to enable in-field data collection, request processing, order management, approvals, edits, updates and execute actions. - What are the implications for the incorporation of rich multimedia content on devices to better serve staff and citizens? - Addressing the security challenges of various risks around data access, data transmission, and data storage for BI architecture and mobile devices


Process Construct In The Virtual R&D Teams, Nader Ale Ebrahim, Shamsuddin Ahmed, Salwa Hanim Abdul Rashid, Zahari Taha, Marjan Mohammadjafari Dr Dec 2012

Process Construct In The Virtual R&D Teams, Nader Ale Ebrahim, Shamsuddin Ahmed, Salwa Hanim Abdul Rashid, Zahari Taha, Marjan Mohammadjafari Dr

Nader Ale Ebrahim

literature proves the importance of the process role in the effectiveness of virtual research and development (R&D) teams for new product development (NPD). However, the factors that make process construct in a virtual R&D team are still unclear. The manager of virtual R&D teams for NPD does not know which items of process should be used. To address the gap and answer the question, the study presents a set of factors that make a process construct. The proposed construct modified by finding of the field survey. We empirically examine the relationship between construct, dimensions and its factors by employing the …


The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther Nov 2012

The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther

Jan Kallberg

With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.


Ieee T&S Magazine: Undergoing Transformation, Katina Michael Nov 2012

Ieee T&S Magazine: Undergoing Transformation, Katina Michael

Professor Katina Michael

Our Magazine is in a transformative period, not only because we are ‘Going Green’ in 2013 but because we are experiencing tremendous growth in quality international submissions. This means that we are increasingly appealing to an international audience with transdisciplinary interests. This has not gone unnoticed by the media, nor by our SSIT readership or wider engineering community.


Practical Guide To Write A Phd Thesis, Nader Ale Ebrahim Nov 2012

Practical Guide To Write A Phd Thesis, Nader Ale Ebrahim

Nader Ale Ebrahim

This presentation is a practical guide on how to write a PhD thesis based on personal experiences and existing literature . It is aimed at all PhD students. A thesis writing may be falling into six rules: Identifying the research problem Start thesis writing from a day after registration Writing a Thesis Plan Ask your supervisors: What are their expectations? and maintain regular contact with your supervisors directly/indirectly Expand networking Continuously write/revise and Publish Besides of the six rules, the thesis structure, logical coherence and style are also important. This presentation lead how to consider reader’s expectations during the writing …


Perceptions And Rankings Of Technology Management Competencies, Mark Doggett, Pam Mcgee, Sophia Scott Nov 2012

Perceptions And Rankings Of Technology Management Competencies, Mark Doggett, Pam Mcgee, Sophia Scott

Mark Doggett

2012 Association of Technology, Management, and Applied Engineering (ATMAE) Conference Proceedings In 2010, the ATMAE Management Division set out to define an applicable technology management body of knowledge using a collection of core competencies. The research incorporated existing models, industry opinions, and educator experts. ATMAE members at both the 2010 and 2011 conferences reviewed initial versions of the competency model. In addition, the model was benchmarked against existing literature and research. The researchers found consistency within the initial versions of the competency model. Interested scholars may find the initial model and supporting rationale in the 2011 ATMAE conference proceedings. This …


Glogging Your Every Move, Lisa Wachsmuth, Katina Michael Nov 2012

Glogging Your Every Move, Lisa Wachsmuth, Katina Michael

Professor Katina Michael

"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."

"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.

"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."


Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael Oct 2012

Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael

Associate Professor Katina Michael

This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …


Approach To Conduct An #11;Effective Literature Review, Nader Ale Ebrahim Oct 2012

Approach To Conduct An #11;Effective Literature Review, Nader Ale Ebrahim

Nader Ale Ebrahim

This presentation introduces a guideline for conducting an effective literature review. The target audience is research based postgraduate students, researchers who are constantly struggling with the development of an effective literature review. The proposed guideline follows: 1- Find literature associated with the topic. 2- Search and analyze the literature. 3- Evaluate the paper before reading. 4- Cite literature properly. 5- Make a summary table of reviewed papers. 6- Avoid plagiarism. 7- Write a journal article based on literature review.


Variations In Climatic Parameters And Food Crop Yields: Implications On Food Security In Benue State, Nigeria., Emmanuel Adamgbe, Fanan Ujoh Oct 2012

Variations In Climatic Parameters And Food Crop Yields: Implications On Food Security In Benue State, Nigeria., Emmanuel Adamgbe, Fanan Ujoh

Confluence Journal Environmental Studies (CJES), Kogi State University, Nigeria

Agricultural production in Nigeria like in other developing countries is highly vulnerable to variations in climatic parameters which may have inverse or direct effect on the performance of food crops. This paper examines the patterns and trends of the variations in the climatic parameters and the implications of such variations on efficient yield rates of some food crops in Benue State using data on climatic variables (rainfall, temperature, sunshine) and the yield of some crops per hectare for 25 years (1986-2010). Data on the climatic variables were collected from the Nigerian Meteorological Agency, AirForce Base, Makurdi while the data on …


Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg Oct 2012

Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg

Jan Kallberg

In releasing the United States Department of Defense’s (DoD) Sustaining U.S. Global Leadership: Priorities for 21st Century Defense and Defense Budget Priorities and Choices in January 2012, President Barack Obama and Secretary of Defense Leon Panetta offered a rationale for the administration’s reductions in defense spending. By stating that the shift in strategic direction is an effort to “put our fiscal house in order” and a response to the 2011 Budget Control Act, which requires DoD to reduce spending by $487 billion between fiscal years 2012 and 2021, the United States’ NATO partners in Europe were given considerable reason for …


How Can Pacific Island Economies Benefits From The Advent Of Ict’S – Review Of Best Practices In Education, Deogratias Harorimana Sr Oct 2012

How Can Pacific Island Economies Benefits From The Advent Of Ict’S – Review Of Best Practices In Education, Deogratias Harorimana Sr

Dr Deogratias Harorimana

This paper explored implementation and use of information and communication technologies in Fiji, in order to gain insight into recent government initiatives to introduce computers and other ICTs for the community of Fiji. The focus of this paper in that it provided the framework for an in-depth exploration of e-learning centers around the country and the benefits from the advent of ICT’s in e-learning community centers in Fiji. Areas concentrated on are outcome of ICT’s in formal education to students and community as a whole in areas of agriculture, health, environment and infrastructure etc. The research sought understanding from the …


Publication Marketing Tools - “Enhancing Research Visibility And Improving Citations”, Nader Ale Ebrahim Oct 2012

Publication Marketing Tools - “Enhancing Research Visibility And Improving Citations”, Nader Ale Ebrahim

Nader Ale Ebrahim

Research needs to be explained clearly to others to colleagues, to educational bodies, and to the public by publications. There are various reasons for publication: 1- Publications help in spreading your knowledge and experience, 2- It gives you an academic profile and raises the profile of your institution, 3- Research publications create income for the University, ….. and 4- Publications strengthen your CV. Publishing a high quality paper in scientific journals is a halfway of receiving citation in the future. The rest of the way is advertising and disseminating the publications by using the proper “Research Tools”. Familiarity with the …


Technical Assistance, Knowledge Gatekeeping And Indigenous Knowledge: Re-Thinking The International Development Practice, Deogratias Harorimana Sr Sep 2012

Technical Assistance, Knowledge Gatekeeping And Indigenous Knowledge: Re-Thinking The International Development Practice, Deogratias Harorimana Sr

Dr Deogratias Harorimana

This paper presents results from a multi-disciplinary conceptual analysis of development theory and practice. It reviews issues raised and proposes a shift in the epistemology of possession towards an epistemology of practice which is guided by the following aspects (1) The consideration of the learning culture of parties involved, (2) the ability and willingness for decontextualisation of the knowledge by the source and (3) the ability to embedded it by recipients (embededness ), (4) the importance that is attached to knowledge of the host country as reflected through (5) Similarity in culture, values, understanding of context and knowledge bases; (6) …


Software Requirements Management Through The Lenses Of People, Organizational And Technological Dimensions, Fernando Paulo Belfo Sep 2012

Software Requirements Management Through The Lenses Of People, Organizational And Technological Dimensions, Fernando Paulo Belfo

Fernando Paulo Belfo

The inadequate specification of requirements remains being indicated as one of the main reasons for the failure of software development projects. A possible explanation for this failure is that requirements management tends to overvalue the technology side of requirements. However, the requirements management depends on other important issues beyond technology which are sometimes neglected. Good requirements are only assured by the right balance of three dimensions: people, organization and technology. Through the lens of each of these three dimensions, this paper reviews significant literature, identifying some of the key issues and concerns about the management of software requirements, particularly the …


Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael Aug 2012

Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael

Professor Katina Michael

Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.


Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael Aug 2012

Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael

Professor Katina Michael

This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.


The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther Aug 2012

The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther

Jan Kallberg

With the prospect of sequestration looming, the United States may find itself increasingly rely ing on nuclear and cy ber deterrence as an affordable means of guaranteeing national sovereignty and preventing major conflict between the U.S. and potential adversaries in the Asia-Pacific. While earlier defense planning and acquisition were based on economic conditions that no longer ex ist, Congress’s options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense v oters” relative to “social welfare voters,” according to a number of recent public opinion surveys. The simple fact is China’s rise has …


Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg Jul 2012

Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg

Jan Kallberg

Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …


Heuristic Algorithms For Balanced Multi-Way Number Partitioning, Jilian Zhang, Kyriakos Mouratidis, Hwee Hwa Pang Jul 2012

Heuristic Algorithms For Balanced Multi-Way Number Partitioning, Jilian Zhang, Kyriakos Mouratidis, Hwee Hwa Pang

Kyriakos MOURATIDIS

Balanced multi-way number partitioning (BMNP) seeks to split a collection of numbers into subsets with (roughly) the same cardinality and subset sum. The problem is NP-hard, and there are several exact and approximate algorithms for it. However, existing exact algorithms solve only the simpler, balanced two-way number partitioning variant, whereas the most effective approximate algorithm, BLDM, may produce widely varying subset sums. In this paper, we introduce the LRM algorithm that lowers the expected spread in subset sums to one third that of BLDM for uniformly distributed numbers and odd subset cardinalities. We also propose Meld, a novel strategy for …


International Ict Research Collaboration: Experiences And Recommendations, Erich Prem, Emma Barron, Arcot Desai Narasimhalu, Ian Morgan Jul 2012

International Ict Research Collaboration: Experiences And Recommendations, Erich Prem, Emma Barron, Arcot Desai Narasimhalu, Ian Morgan

Arcot Desai NARASIMHALU

This paper presents results of a study into the collaboration experiences of researchers. The focus is on long-distance collaboration in information and communication technologies (ICT) research and technology development, i.e. between the EU on the one side and Australia, Singapore or New Zealand on the other. The aim of the study was to provide useful recommendations for researchers who engage in international collaboration and to improve the quality of international co-operation projects. The emphasis here is on the views and experiences of Europe"s international partners. The paper analysis collaboration motives, challenges, co-operation types and provides recommendations for project initiation, networking, …


An Introduction To The Effective Use Of Research Tools Box, Nader Ale Ebrahim Jul 2012

An Introduction To The Effective Use Of Research Tools Box, Nader Ale Ebrahim

Nader Ale Ebrahim

This presentation is prepared to assist students who seek to reduce the search time by expanding the knowledge of researchers to more effectively use the “Research Tools" that are available through the Net. The presentations objectives 1- To reduce the search time by expanding the knowledge of researchers to more effectively use the "tools" that are available through the Net. 2- To evaluate the types of literature that researchers will encounter. 3- To convert the information on the search for a written document. 4- Help researchers learn how to search and analyze the right journal to submit. 5- To promote …