Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

PDF

Old Dominion University

2022

Keyword
Publication
Publication Type

Articles 1 - 30 of 34

Full-Text Articles in Business

A Call For Research: Ethical Dilemmas Of Autonomous Vehicle Manufacturers, Remy Harwood Dec 2022

A Call For Research: Ethical Dilemmas Of Autonomous Vehicle Manufacturers, Remy Harwood

Cybersecurity Undergraduate Research Showcase

While autonomous vehicles accounted for about 31.4 million vehicles on the road in 2019 (Placek). They have continued to flood the market and have a projected growth to 58 million in just 8 years from now (Placek) As well as a market cap in the billions of dollars. Even the comparatively new AV company Tesla has over 3 times the market cap value of the leading non AV brand Toyota (Market Cap) who are also working toward AVs as well, like their level 2 teammate driver assistance. Following Moore’s Law, as technology continues to improve, their social impact and ethical …


Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon Nov 2022

Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon

Information Technology & Decision Sciences Faculty Publications

Blockchain (BC), as an emerging technology, is revolutionizing Business Process Management (BPM) in multiple ways. The main adoption is to serve as a trusted infrastructure to guarantee the trust of collaborations among multiple partners in trustless environments. Especially, BC enables trust of information by using Distributed Ledger Technology (DLT). With the power of smart contracts, BC enforces the obligations of counterparties that transact in a business process (BP) by programming the contracts as transactions. This paper aims to study the state-of-the-art of BC technologies by (1) exploring its applications in BPM with the focus on how BC provides the trust …


The Impact Of Ethical Hacking Within Small Businesses, Nygia Tribbey Oct 2022

The Impact Of Ethical Hacking Within Small Businesses, Nygia Tribbey

Cybersecurity Undergraduate Research Showcase

The Internet has brought about a new way for businesses to reach their customers. With the help of social media, websites, and email marketing, small businesses have gained a lot of new customers. However, these new online customers have also opened up their businesses to a whole new world of cyber crime. Cyber crime is the illegal use of computers and networks to cause damage or steal information. This type of crime affects small businesses as well as large corporations. Small businesses often find themselves at a disadvantage because they don't have the resources to hire an ethical hacker or …


Looking Through Their Lenses: An Analysis Of Virginia Environmental Nonprofits' Roles And Challenges In Shoreline Management For Coastal Resilience, Taiwo C. Olanrewaju Lasisi Oct 2022

Looking Through Their Lenses: An Analysis Of Virginia Environmental Nonprofits' Roles And Challenges In Shoreline Management For Coastal Resilience, Taiwo C. Olanrewaju Lasisi

School of Public Service Theses & Dissertations

Environmental nonprofit organizations have emerged to attend to the environmental needs of individuals and communities. Some of these needs are usually those that have been neglected, given insufficient attention, or cannot be singularly handled by the government. In advocating for coastal resilience, environmental nonprofits have been identified as actors who address coastal issues like sea-level rise, flooding, and shoreline management.

Shoreline management involves building setbacks and formulating short and long-term defense strategies such as building living shorelines, ripraps, bulkheads, and tree plantings. These strategies formed the basis of coastal defense in coastal zones. Shoreline management is a significant area of …


Smart Manufacturing—Theories, Methods, And Applications, Zhuming Bi, Lida Xu, Puren Ouyang Aug 2022

Smart Manufacturing—Theories, Methods, And Applications, Zhuming Bi, Lida Xu, Puren Ouyang

Information Technology & Decision Sciences Faculty Publications

(First paragraph) Smart manufacturing (SM) distinguishes itself from other system paradigms by introducing ‘smartness’ as a measure to a manufacturing system; however, researchers in different domains have different expectations of system smartness from their own perspectives. In this Special Issue (SI), SM refers to a system paradigm where digital technologies are deployed to enhance system smartness by (1) empowering physical resources in production, (2) utilizing virtual and dynamic assets over the internet to expand system capabilities, (3) supporting data-driven decision making at all domains and levels of businesses, or (4) reconfiguring systems to adapt changes and uncertainties in dynamic environments. …


Predictors Of Email Response: Determinants Of The Intention Of Not Following Security Recommendations, Miguel Angel Toro-Jarrin Aug 2022

Predictors Of Email Response: Determinants Of The Intention Of Not Following Security Recommendations, Miguel Angel Toro-Jarrin

Engineering Management & Systems Engineering Theses & Dissertations

Organizations and government leaders are concerned about cyber incidents. For some time, researchers have studied what motivates people to act in ways that put the confidentiality, integrity, and availability of information in organizations at risk. Still, several areas remained unexplored, including the role of employees’ evaluation of the organizational systems and the role of value orientation at work as precursors of secure and insecure actions in relation to information technologies (information security [IS] action). The objective of this research project was to examine how the evaluations of formal and informal security norms are associated with the intention to follow them …


Module 3: Technology Foresight And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar Jan 2022

Module 3: Technology Foresight And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar

Developing Technology Foresight: Case Study of AI in InsurTech

Instructional Module 3 for course, Developing Technology Foresight: Case Study of AI in InsurTech.


Insurtech And Distribution, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar Jan 2022

Insurtech And Distribution, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar

Developing Technology Foresight: Case Study of AI in InsurTech

Questions regarding InsurTech and distribution.


Cyber Threat On The High Seas. A Growing Threat To Infrastructure, James Cummins Jan 2022

Cyber Threat On The High Seas. A Growing Threat To Infrastructure, James Cummins

Cybersecurity Undergraduate Research Showcase

In a growing digital and cloud-connected world, all aspects of our lives are becoming interconnected. All these interconnections breed a possibility for ever-increasing cybersecurity threats. The oceans are not impervious to these attacks. In this research paper, we address the following questions.

What threats do commercial ships face today?

What actions are necessary to mitigate these threats?


All-Inclusive Coral Reef Restoration: How The Tourism Sector Can Boost Restoration Efforts In The Caribbean, Macarena Blanco-Pimentel, Nicolas R. Evensen, Camilo Cortés-Useche, Johanna Calle-Triviño, Daniel J. Barshis, Victor Galván, Erika Harms, Megan K. Morikawa Jan 2022

All-Inclusive Coral Reef Restoration: How The Tourism Sector Can Boost Restoration Efforts In The Caribbean, Macarena Blanco-Pimentel, Nicolas R. Evensen, Camilo Cortés-Useche, Johanna Calle-Triviño, Daniel J. Barshis, Victor Galván, Erika Harms, Megan K. Morikawa

Biological Sciences Faculty Publications

Following a strong decline in the health of Caribbean coral reefs in the 1970s, disease outbreaks, overfishing, and warming events have continued to push these reefs towards a point of no return. As such, researchers and stakeholders have turned their attention to restoration practices to overcome coral recovery bottlenecks on Caribbean reefs. However, successful restoration faces many challenges, including economical and logistical feasibility, long-term stability, and biological and ecological factors yet to fully understand. The tourism sector has the potential to enhance and scale restoration efforts in the Caribbean, beyond simple financial contributions. Its strengths include long-term presence in several …


Development Of A Framework To Support Informed Shipbuilding Based On Supply Chain Disruptions, Katherine Smith, Rafael Diaz, Yuzhong Shen Jan 2022

Development Of A Framework To Support Informed Shipbuilding Based On Supply Chain Disruptions, Katherine Smith, Rafael Diaz, Yuzhong Shen

VMASC Publications

In addition to stresses induced by the Covid-19 pandemic, supply chains worldwide have been growing more complex while facing a continuous onslaught of disruptions. This paper presents an analysis and extension of a graph based model for modeling and simulating the effects of such disruptions. The graph based model combines a Bayesian network approach for simulating risks with a network dependency analysis approach for simulating the propagation of disruptions through the network over time. The initial analysis provides evidence supporting extension to for using a multi-layered approach allowing for the inclusion of cyclic features in supply chain models. Initial results …


Cybersecurity In Fintech Companies, Efstratios Zouros Jan 2022

Cybersecurity In Fintech Companies, Efstratios Zouros

Cybersecurity Undergraduate Research Showcase

Have you recently accessed your bank account online? Have you accessed any financial instrument through your computer or your mobile device? If you are reading this, chances are you have. Every time you utilize those services, you ultimately put your trust in the financial institutions that offer them. You trust that they can securely keep your private information, while also keeping your savings safe. Ultimately, there is a certain dependability and trust in financial institutions that have been present on earth before most of us.


Fake Review Detection, Michael Husk, Faryaneh Poursardar (Mentor) Jan 2022

Fake Review Detection, Michael Husk, Faryaneh Poursardar (Mentor)

Computer & Information Science: Research Experiences for Undergraduates in Disinformation Detection and Analytics

No abstract provided.


Module 1: Introduction To Technology Foresight, Risk Management, And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar Jan 2022

Module 1: Introduction To Technology Foresight, Risk Management, And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar

Developing Technology Foresight: Case Study of AI in InsurTech

Instructional Module 1 for course, Developing Technology Foresight: Case Study of AI in InsurTech.


Module 2: Case Studies Of Ai And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar Jan 2022

Module 2: Case Studies Of Ai And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar

Developing Technology Foresight: Case Study of AI in InsurTech

Instructional Module 2 for course, Developing Technology Foresight: Case Study of AI in InsurTech.


Introduction To The Course, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar Jan 2022

Introduction To The Course, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar

Developing Technology Foresight: Case Study of AI in InsurTech

This PDF document describes the course, Developing Technology Foresight: Case Study of AI in InsurTech, and includes learning outcomes and a course outline.


Insurtech And Underwriting, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar Jan 2022

Insurtech And Underwriting, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar

Developing Technology Foresight: Case Study of AI in InsurTech

Questions regarding InsurTech and underwriting work.


Insurtech And Actuarial, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar Jan 2022

Insurtech And Actuarial, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar

Developing Technology Foresight: Case Study of AI in InsurTech

Questions regarding InsurTech and actuarial work.


Insurtech And Claims, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar Jan 2022

Insurtech And Claims, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar

Developing Technology Foresight: Case Study of AI in InsurTech

Questions related to InsurTech and claims.


Customer Gaze Estimation In Retail Using Deep Learning, Shashimal Senarath, Primesh Pathirana, Dulani Meedeniya, Sampath Jayarathna Jan 2022

Customer Gaze Estimation In Retail Using Deep Learning, Shashimal Senarath, Primesh Pathirana, Dulani Meedeniya, Sampath Jayarathna

Computer Science Faculty Publications

At present, intelligent computing applications are widely used in different domains, including retail stores. The analysis of customer behaviour has become crucial for the benefit of both customers and retailers. In this regard, the concept of remote gaze estimation using deep learning has shown promising results in analyzing customer behaviour in retail due to its scalability, robustness, low cost, and uninterrupted nature. This study presents a three-stage, three-attention-based deep convolutional neural network for remote gaze estimation in retail using image data. In the first stage, we design a mechanism to estimate the 3D gaze of the subject using image data …


Ready Raider One: Exploring The Misuse Of Cloud Gaming Services, Guannan Liu, Daiping Liu, Shuai Hao, Xing Gao, Kun Sun, Haining Wang Jan 2022

Ready Raider One: Exploring The Misuse Of Cloud Gaming Services, Guannan Liu, Daiping Liu, Shuai Hao, Xing Gao, Kun Sun, Haining Wang

Computer Science Faculty Publications

Cloud gaming has become an emerging computing paradigm in recent years, allowing computer games to offload complex graphics and logic computation to the cloud. To deliver a smooth and high-quality gaming experience, cloud gaming services have invested abundant computing resources in the cloud, including adequate CPUs, top-tier GPUs, and high-bandwidth Internet connections. Unfortunately, the abundant computing resources offered by cloud gaming are vulnerable to misuse and exploitation for malicious purposes. In this paper, we present an in-depth study on security vulnerabilities in cloud gaming services. Specifically, we reveal that adversaries can purposely inject malicious programs/URLs into the cloud gaming services …


Estimating Efforts For Various Activities In Agile Software Development: An Empirical Study, Lan Cao Jan 2022

Estimating Efforts For Various Activities In Agile Software Development: An Empirical Study, Lan Cao

Information Technology & Decision Sciences Faculty Publications

Effort estimation is an important practice in agile software development. The agile community believes that developers’ estimates get more accurate over time due to the cumulative effect of learning from short and frequent feedback. However, there is no empirical evidence of an improvement in estimation accuracy over time, nor have prior studies examined effort estimation in different development activities, which are associated with substantial costs. This study fills the knowledge gap in the field of software estimation in agile software development by investigating estimations across time and different development activities based on data collected from a large agile project. This …


The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He Jan 2022

The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He

Information Technology & Decision Sciences Faculty Publications

This paper identifies opportunities for potential theoretical and practical improvements in employees' awareness of cybersecurity and their motivational behavior to protect themselves and their organizations from cyberattacks using the protection motivation theory. In addition, it contributes to the literature by examining additional variables and mediators besides the core constructs of the Protection Motivation Model (PMT). This article uses empirical data and structural equation modeling to test the antecedents and mediators of employees' cybersecurity motivational behavior. The study offers theoretical and pragmatic guidance for cybersecurity programs. First, the model developed in this study can partially explain how people may change their …


Understanding The Effectivity And Increased Reliance Of Credit Risk Machine Learning Models In Banking, Grishma Baruah Jan 2022

Understanding The Effectivity And Increased Reliance Of Credit Risk Machine Learning Models In Banking, Grishma Baruah

Cybersecurity Undergraduate Research Showcase

Credit risk analysis and making accurate investment and lending decisions has been a challenge for the financial industry for many years, as can be seen with the 2008 financial crisis. However, with the rise of machine learning models and predictive analytics, there has been a shift to increased reliance on technology for determining credit risk. This transition to machine learning comes with both advantages, such as potentially eliminating human error and assumptions from lending decisions, and disadvantages, such as time constraints, data usage inabilities, and lack of understanding nuances in machine learning models. In this paper, I look at four …


Modeling Joint Survival Probabilities Of Runs Scored And Balls Faced In Limited Overs Cricket Using Copulas, Lochana K. Palayangoda, Hasika W. Senevirathne, Ananda B. Manage Jan 2022

Modeling Joint Survival Probabilities Of Runs Scored And Balls Faced In Limited Overs Cricket Using Copulas, Lochana K. Palayangoda, Hasika W. Senevirathne, Ananda B. Manage

Mathematics & Statistics Faculty Publications

In limited overs cricket, the goal of a batsman is to score a maximum number of runs within a limited number of balls. Therefore, the number of runs scored and the number of balls faced are the two key statistics used to evaluate the performance of a batsman. In cricket, as the batsmen play as pairs, having longer partnerships is also key to building strong innings. Moreover, having a steady opening partnership is extremely important as a team aims to build such a stronger innings. In this study, we have shown a way to evaluate the performance of opening partnerships …


Climate Change And Cop26: Are Digital Technologies And Information Management Part Of The Problem Or The Solution? An Editorial Reflection And Call To Action, Yogesh K. Dwivedi, Laurie Hughes, Arpan Kumar Kar, Abdullah M. Baabdullah, Purva Grover, Roba Abbas, Daniela Andreini, Iyad Abumoghli, Yves Barlette, Deborah Bunker, Leona Chandra Kruse, Ioanna Constantiou, Robert M. Davison, Rahul De', Rameshwar Dubey, Henry Fenby-Taylor, Babita Gupta, Wu He, Mitsuru Kodama, Matti Mäntymäki, Bhimaraya Metri, Katina Michael, Johan Olaisen, Niki Panteli, Samuli Pekkola, Rohit Nishant, Ramakrishnan Raman, Nripendra P. Rana, Frantz Rowe, Suprateek Sarker, Brenda Scholtz, Maung Sein, Jeel Dharmeshkumar Shah, Thompson S.H. Teo, Manoj Kumar Tiwari, Morten Thanning Vendelø, Michael Wade Jan 2022

Climate Change And Cop26: Are Digital Technologies And Information Management Part Of The Problem Or The Solution? An Editorial Reflection And Call To Action, Yogesh K. Dwivedi, Laurie Hughes, Arpan Kumar Kar, Abdullah M. Baabdullah, Purva Grover, Roba Abbas, Daniela Andreini, Iyad Abumoghli, Yves Barlette, Deborah Bunker, Leona Chandra Kruse, Ioanna Constantiou, Robert M. Davison, Rahul De', Rameshwar Dubey, Henry Fenby-Taylor, Babita Gupta, Wu He, Mitsuru Kodama, Matti Mäntymäki, Bhimaraya Metri, Katina Michael, Johan Olaisen, Niki Panteli, Samuli Pekkola, Rohit Nishant, Ramakrishnan Raman, Nripendra P. Rana, Frantz Rowe, Suprateek Sarker, Brenda Scholtz, Maung Sein, Jeel Dharmeshkumar Shah, Thompson S.H. Teo, Manoj Kumar Tiwari, Morten Thanning Vendelø, Michael Wade

Information Technology & Decision Sciences Faculty Publications

The UN COP26 2021 conference on climate change offers the chance for world leaders to take action and make urgent and meaningful commitments to reducing emissions and limit global temperatures to 1.5 °C above pre-industrial levels by 2050. Whilst the political aspects and subsequent ramifications of these fundamental and critical decisions cannot be underestimated, there exists a technical perspective where digital and IS technology has a role to play in the monitoring of potential solutions, but also an integral element of climate change solutions. We explore these aspects in this editorial article, offering a comprehensive opinion based insight to a …


Why Do Family Members Reject Ai In Health Care? Competing Effects Of Emotions, Eun Hee Park, Karl Werder, Lan Cao, Balasubramaniam Ramesh Jan 2022

Why Do Family Members Reject Ai In Health Care? Competing Effects Of Emotions, Eun Hee Park, Karl Werder, Lan Cao, Balasubramaniam Ramesh

Information Technology & Decision Sciences Faculty Publications

Artificial intelligence (AI) enables continuous monitoring of patients’ health, thus improving the quality of their health care. However, prior studies suggest that individuals resist such innovative technology. In contrast to prior studies that investigate individuals’ decisions for themselves, we focus on family members’ rejection of AI monitoring, as family members play a significant role in health care decisions. Our research investigates competing effects of emotions toward the rejection of AI monitoring for health care. Based on two scenario-based experiments, our study reveals that emotions play a decisive role in family members’ decision making on behalf of their parents. We find …


The State Of The Art Of Information Integration In Space Applications, Zhuming Bi, K. L. Yung, Andrew W.H. Ip., Yuk Ming Tang, Chris W.J. Zhang, Li Da Xu Jan 2022

The State Of The Art Of Information Integration In Space Applications, Zhuming Bi, K. L. Yung, Andrew W.H. Ip., Yuk Ming Tang, Chris W.J. Zhang, Li Da Xu

Information Technology & Decision Sciences Faculty Publications

This paper aims to present a comprehensive survey on information integration (II) in space informatics. With an ever-increasing scale and dynamics of complex space systems, II has become essential in dealing with the complexity, changes, dynamics, and uncertainties of space systems. The applications of space II (SII) require addressing some distinctive functional requirements (FRs) of heterogeneity, networking, communication, security, latency, and resilience; while limited works are available to examine recent advances of SII thoroughly. This survey helps to gain the understanding of the state of the art of SII in sense that (1) technical drivers for SII are discussed and …


Exploring Blockchain Adoption Supply Chains: Opportunities And Challenges, Adrian V. Gheorghe, Omer F. Keskin, Farinaz Sabz Ali Pour Jan 2022

Exploring Blockchain Adoption Supply Chains: Opportunities And Challenges, Adrian V. Gheorghe, Omer F. Keskin, Farinaz Sabz Ali Pour

Engineering Management & Systems Engineering Faculty Publications

In modern supply chains, acquisition often occurs with the involvement of a network of organizations. The resilience, efficiency, and effectiveness of supply networks are crucial for the viability of acquisition. Disruptions in the supply chain require adequate communication infrastructure to ensure resilience. However, supply networks do not have a shared information technology infrastructure that ensures effective communication. Therefore decision-makers seek new methodologies for supply chain management resilience. Blockchain technology offers new decentralization and service delegation methods that can transform supply chains and result in a more flexible, efficient, and effective supply chain. This report presents a framework for the application …


The Online Ordering Behaviors Among Participants In The Oklahoma Women, Infants, And Children Program: A Cross-Sectional Analysis, Qi Zhang, Kayoung Park, Junzhou Zhang, Chuanyi Tang Jan 2022

The Online Ordering Behaviors Among Participants In The Oklahoma Women, Infants, And Children Program: A Cross-Sectional Analysis, Qi Zhang, Kayoung Park, Junzhou Zhang, Chuanyi Tang

Community & Environmental Health Faculty Publications

The Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) is a nutrition assistance program in the United States (U.S.). Participants in the program redeem their prescribed food benefits in WIC-authorized grocery stores. Online ordering is an innovative method being pilot-tested in some stores to facilitate WIC participants' food benefit redemption, which has become especially important in the COVID-19 pandemic. The present research aimed to examine the online ordering (OO) behaviors among 726 WIC households who adopted WIC OO in a grocery chain, XYZ (anonymous) store, in Oklahoma (OK). These households represented approximately 5% of WIC households who redeemed …