Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 3144

Full-Text Articles in Business

Design Thinking As A Framework For Teaching Packaging Innovation, Javier De La Fuente, Irene Carbonell, Mary Laporte Feb 2019

Design Thinking As A Framework For Teaching Packaging Innovation, Javier De La Fuente, Irene Carbonell, Mary Laporte

Journal of Applied Packaging Research

Students in scientific/technical-oriented disciplines struggle with achieving good levels of innovation when exposed to design problems. Research indicates the need for implementing alternative pedagogical approaches in technical curricula that enhance students’ creative skills. The purpose of this study was to evaluate the implementation of a cross-disciplinary pedagogical approach with a focus on teaching innovation in the field of packaging engineering at a university in the United States. A Design Thinking Project-Based Learning (DTPBL) approach was used to improve the levels of innovation in student work. Its outcomes were compared with those of a Traditional Project-Based Learning (TPBL) approach. The ...


Industry Spotlight: Medical Devices, Evan D. Poff Jan 2019

Industry Spotlight: Medical Devices, Evan D. Poff

Marriott Student Review

Medical devices restore and even redefine health. This Industry Spotlight examines pre-market barriers, medtech business model quirks, current and future developments in the field, and the present-day move to value-based care in the medical device industry.


Improving Vix Futures Forecasts Using Machine Learning Methods, James Hosker, Slobodan Djurdjevic, Hieu Nguyen, Robert Slater Jan 2019

Improving Vix Futures Forecasts Using Machine Learning Methods, James Hosker, Slobodan Djurdjevic, Hieu Nguyen, Robert Slater

SMU Data Science Review

The problem of forecasting market volatility is a difficult task for most fund managers. Volatility forecasts are used for risk management, alpha (risk) trading, and the reduction of trading friction. Improving the forecasts of future market volatility assists fund managers in adding or reducing risk in their portfolios as well as in increasing hedges to protect their portfolios in anticipation of a market sell-off event. Our analysis compares three existing financial models that forecast future market volatility using the Chicago Board Options Exchange Volatility Index (VIX) to six machine/deep learning supervised regression methods. This analysis determines which models provide ...


Automated Trading Systems Statistical And Machine Learning Methods And Hardware Implementation: A Survey, Boming Huang, Yuziang Huan, Li Da Xu, Lirong Zheng, Zhuo Zou Jan 2019

Automated Trading Systems Statistical And Machine Learning Methods And Hardware Implementation: A Survey, Boming Huang, Yuziang Huan, Li Da Xu, Lirong Zheng, Zhuo Zou

Information Technology & Decision Sciences Faculty Publications

Automated trading, which is also known as algorithmic trading, is a method of using a predesigned computer program to submit a large number of trading orders to an exchange. It is substantially a real-time decision-making system which is under the scope of Enterprise Information System (EIS). With the rapid development of telecommunication and computer technology, the mechanisms underlying automated trading systems have become increasingly diversified. Considerable effort has been exerted by both academia and trading firms towards mining potential factors that may generate significantly higher profits. In this paper, we review studies on trading systems built using various methods and ...


The Knowledge Application And Utilization Framework Applied To Defense Cots: A Research Synthesis For Outsourced Innovation, Michael Gravier, Timothy Hawkins Jan 2019

The Knowledge Application And Utilization Framework Applied To Defense Cots: A Research Synthesis For Outsourced Innovation, Michael Gravier, Timothy Hawkins

Marketing Department Journal Articles

Purpose -- Militaries of developing nations face increasing budget pressures, high operations tempo, a blitzing pace of technology, and adversaries that often meet or beat government capabilities using commercial off-the-shelf (COTS) technologies. The adoption of COTS products into defense acquisitions has been offered to help meet these challenges by essentially outsourcing new product development and innovation. This research summarizes extant research to develop a framework for managing the innovative and knowledge flows. Design/Methodology/Approach – A literature review of 62 sources was conducted with the objectives of identifying antecedents (barriers and facilitators) and consequences of COTS adoption. Findings – The DoD COTS ...


An Examination Of The Stock Market's Effect On Economic Inequality, Nicholas Golina Jan 2019

An Examination Of The Stock Market's Effect On Economic Inequality, Nicholas Golina

Williams Honors College, Honors Research Projects

The economic literature on economic inequality has shown that it can negatively impact aggregate demand because it indicates a higher concentration of wealth in the hands of the top 10% as opposed to the poor and middle class, who are more likely to consume. The literature has identified many factors that can lead to increasing inequality. The stock market could be one of those factors since it can either create an upward redistributive effect towards the top 10% or redistributive effect towards the middle class. This paper tested the effect of the stock market on inequality. This study contributes to ...


Trends In Fashion Law: Striking The Proper Balance Between Protecting The Art Form And Sustaining A Thriving Online Market, Elisabeth Johnson Dec 2018

Trends In Fashion Law: Striking The Proper Balance Between Protecting The Art Form And Sustaining A Thriving Online Market, Elisabeth Johnson

The Journal of Business, Entrepreneurship & the Law

No abstract provided.


Integrating Machine Learning In Law: A Precis Of Best Practices For Initial Law Firm Adoption, J. Mark Phillips Dec 2018

Integrating Machine Learning In Law: A Precis Of Best Practices For Initial Law Firm Adoption, J. Mark Phillips

The Journal of Business, Entrepreneurship & the Law

Much of the mystery surrounding machine learning lays not just in how it functions, but in how it is applied. This is especially true in the field of law, where the implementation of artificial intelligence has lagged other fields. This précis distills best practices of machine learning implementation and applies them succinctly to the unique environment of law. Guiding principles and considerations are provided for the technology team, the nature of law firm data, and the commitment level of the adopting law firm.


The Infinite Legal Acumen Of An Artificial Mind: How Machine Learning Can Permanently Capture Legal Expertise And Optimize The Law Firm Pyramid, J. Mark Phillips Dec 2018

The Infinite Legal Acumen Of An Artificial Mind: How Machine Learning Can Permanently Capture Legal Expertise And Optimize The Law Firm Pyramid, J. Mark Phillips

The Journal of Business, Entrepreneurship & the Law

As the legal industry gradually integrates artificial intelligence (AI) into its practice, the underlying technology continues to advance at a fever pitch. Machine learning platforms arguably represent the pinnacle of AI development, and this technology currently augments and replicates intelligent human tasks in ways never before conceived. The business applications of machine learning are bearing fruit across a spectrum of industries and professions. Yet despite machine learning’s demonstrated promise, its forays into the legal industry have been uneven. In fact, the most advanced forms of machine learning have been relegated primarily to lower-level attorney tasks such as e-discovery, due-diligence ...


Curb Your Enthusiasm: The Real Implications Of Blockchain In The Legal Industry, Justin Evans Dec 2018

Curb Your Enthusiasm: The Real Implications Of Blockchain In The Legal Industry, Justin Evans

The Journal of Business, Entrepreneurship & the Law

No abstract provided.


Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He Dec 2018

Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He

Journal of International Technology and Information Management

This research explores the weekly crude oil price data from U.S. Energy Information Administration over the time period 2009 - 2017 to test the forecasting accuracy by comparing time series models such as simple exponential smoothing (SES), moving average (MA), and autoregressive integrated moving average (ARIMA) against machine learning support vector regression (SVR) models. The main purpose of this research is to determine which model provides the best forecasting results for crude oil prices in light of the importance of crude oil price forecasting and its implications to the economy. While SVR is often considered the best forecasting model in ...


The Relationship Between Organizational Resources And Green It/S Adoption: A Rbv Approach, Lutfus Sayeed, Alberto Onetti Dec 2018

The Relationship Between Organizational Resources And Green It/S Adoption: A Rbv Approach, Lutfus Sayeed, Alberto Onetti

Journal of International Technology and Information Management

ABSTRACT

The objective of the present study was to empirically explore the impact of the implementation of Green IT/S measures on organizational resources in the US and European firms. The study examined the influence of reconfiguration of resources within a firm while adopting various Green IT/S practices and technologies. Green IT/S implementation requires resource commitment from organizations (Bose and Luo, 2011). What are these resources and how do they affect the extent of Green IT/S measures adopted by businesses? Resource Based View (RBV) of the firm was used as the theoretical framework of the study. The ...


Using Sas™ Software To Enhance Pedagogy For Text Mining And Sentiment Analysis Using Social Media (Twitter™) Data, Ramesh Subramanian, Danielle Cote Dec 2018

Using Sas™ Software To Enhance Pedagogy For Text Mining And Sentiment Analysis Using Social Media (Twitter™) Data, Ramesh Subramanian, Danielle Cote

Journal of International Technology and Information Management

This pedagogical paper describes how a graduate course in Text Mining was developed and taught in a fully online format at Quinnipiac University. The software used was SAS™ Enterprise Miner. This paper discusses the design, software used and the methodology followed in the course. A critical component of the course required the students to delve deep into social media data by completing a detailed project on analyzing sentiment analysis using large files of social media data. A sample report of this project, which was a key deliverable for the course, is described at length in this paper.


Discussion Of The Potential Of Blockchain In Finance, Andrew Kincaid Dec 2018

Discussion Of The Potential Of Blockchain In Finance, Andrew Kincaid

Finance Undergraduate Honors Theses

This paper analyzes the current application of blockchain technology to demonstrate its disruptive potential has across different financial industries. This paper analyzes the potential difficulties that blockchain technology must face and overcome to realize this potential. Blockchain is currently in a stage in its development where there has not been enough research done to provide empirical answers to its benefits or added costs; however, there have been many early innovations that have helped propel blockchain forward. Blockchain in corporate finance is primarily used in corporate governance where blockchain has the ability to increase transparency and reduce possible corruption. Blockchain has ...


Older Adults And The Authenticity Of Emails.Docx, Premankit Sannd, David M. Cook Nov 2018

Older Adults And The Authenticity Of Emails.Docx, Premankit Sannd, David M. Cook

Dr. David M Cook

Despite the variety of global research on the identification and proliferation of ransomware and other online scams, there is still a relative vacuum of research with respect to the problem of digitally and socially engineered deception in the form of ransomware on an individual. This is particularly problematic for older cohorts, where life experience in many endeavours sits alongside novice understanding and experience in the use of online technology. This paper examines the indicators that characterize authenticity and deception within ransomware and phishing. A survey of older Australian people over the age of 65 reveals markers and patterns that assist ...


Cost Benefit Analysis Of Led Vs Florescent Lighting, Kurtis Clark, Phillip Humphrey Nov 2018

Cost Benefit Analysis Of Led Vs Florescent Lighting, Kurtis Clark, Phillip Humphrey

Student Research

Over the last few years, the state of Oklahoma has been looking at ways to reduce expenses to address concerns about a budget deficit. There have been efforts made to reduce expenses due to the use of energy. It has been said, when the lights are on, work is getting done. Running lights is therefore the cost of doing business. Our research examines the question, “is there a way to provide better lighting while operating at a lower cost.” This research examines the current lighting at Southwestern State University, primarily fluorescent lighting (FL), and a cost benefit analysis of switching ...


Thailand Vts: An Analysis Of Its Capabilities To Enhance The Safety And Efficiency Of Navigation, Theeratch Amphanthongpaphakul Nov 2018

Thailand Vts: An Analysis Of Its Capabilities To Enhance The Safety And Efficiency Of Navigation, Theeratch Amphanthongpaphakul

World Maritime University Dissertations

No abstract provided.


Enhancing Safety Of Navigation By Incorporation Of Additional Data By Automatic Identification System, Rishi Mondal Nov 2018

Enhancing Safety Of Navigation By Incorporation Of Additional Data By Automatic Identification System, Rishi Mondal

World Maritime University Dissertations

No abstract provided.


Impact Of Maritime Autonomous Surface Ships (Mass) On Vts Operations, Jia Chyuan Chong Nov 2018

Impact Of Maritime Autonomous Surface Ships (Mass) On Vts Operations, Jia Chyuan Chong

World Maritime University Dissertations

No abstract provided.


Integrate Use Of Drones And Qr Codes As Complementary Components For Monitoring, Control And Surveillance Systems For Artisanal Fishing Vessels In Peru, Eduardo Israel Zamora Chung Nov 2018

Integrate Use Of Drones And Qr Codes As Complementary Components For Monitoring, Control And Surveillance Systems For Artisanal Fishing Vessels In Peru, Eduardo Israel Zamora Chung

World Maritime University Dissertations

No abstract provided.


Cultural Transformation In The Digital World, Singapore Management University Nov 2018

Cultural Transformation In The Digital World, Singapore Management University

Executive Education

The context of businesses across the world is fast changing – more specifically, Digitalisation has had a growing and increasingly disruptive impact across industry sectors and regions. Companies in the APAC region, like many others across the world, are grappling with the digital wave and its implications for their own structures, strategies and people. It appears that many are struggling to cope with the phenomenon, only a few have been able to embrace it fully, and almost none have been able to get ahead of it, proactively. Although much has been written and said about Digitalisation in the Asian context, our ...


Many Hands: The Effect Of The Prior Inventor-Intermediaries Relationship On Academic Licensing, Young-Choon Kim, Mooweon Rhee, Reddi Kotha Nov 2018

Many Hands: The Effect Of The Prior Inventor-Intermediaries Relationship On Academic Licensing, Young-Choon Kim, Mooweon Rhee, Reddi Kotha

Research Collection Lee Kong Chian School Of Business

We study the role of the relationship among inventors and intermediaries in the licensing of university inventions. We suggest that a prior inventor-intermediaries relationship positively influences licensing rates through selective retention of higher quality relationships and mutual learning in the relationship, enabling intermediaries to reduce both information asymmetry and search costs between inventors and potential licensees. We argue that the influence of a prior inventor-intermediaries relationship on licensing is especially important before intellectual property protection is attained and can be substituted by the buyer-side contacts of inventors and intermediaries. We test these predictions using 919 inventions from the technology transfer ...


Law School News Tim Baxter '83 Elected Chair Of Rwu Board Of Trustees 10/29/2018, Edward Fitzpartick Oct 2018

Law School News Tim Baxter '83 Elected Chair Of Rwu Board Of Trustees 10/29/2018, Edward Fitzpartick

Life of the Law School (1993- )

No abstract provided.


Curious Medical Patents Coloring Book, Paulina Borrego Oct 2018

Curious Medical Patents Coloring Book, Paulina Borrego

Paulina Borrego

Coloring book containing a selected page from twelve different U.S. patents pertaining to the theme of curious medical inventions.


Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley Oct 2018

Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to examine the outcomes of using a Learning Management System (LMS) course as a framework for mapping the Centers of Academic Excellence in Cyber Defense (CAE-CD) 2019 Knowledge Units (KU) to college courses. The experience shared herein will be useful to faculty who are interested in performing the mapping and applying for CAE-CDE designation.


Towards A Development Of Predictive Models For Healthcare Hipaa Security Rule Violation Fines, Jim Furstenberg, Yair Levy Oct 2018

Towards A Development Of Predictive Models For Healthcare Hipaa Security Rule Violation Fines, Jim Furstenberg, Yair Levy

KSU Proceedings on Cybersecurity Education, Research and Practice

The Health Insurance Portability and Accountability Act’s (HIPAA) Security Rule (SR) mandate provides a national standard for the protection of electronic protected health information (ePHI). The SR’s standards provide healthcare covered entities (CEs’) flexibility in how to meet the standards because the SR regulators realized that all health care organizations are not the same. However, the SR requires CEs’ to implement reasonable and appropriate safeguards, as well as security controls that protect the confidentiality, integrity, and availability (CIA) of their ePHI data. However, compliance with the HIPAA SR mandates are confusing, complicated, and can be costly to CEs ...


Hijacking Wireless Communications Using Wifi Pineapple Nano As A Rogue Access Point, Shawn J. Witemyre, Tamirat T. Abegaz, Bryson R. Payne, Ash Mady Oct 2018

Hijacking Wireless Communications Using Wifi Pineapple Nano As A Rogue Access Point, Shawn J. Witemyre, Tamirat T. Abegaz, Bryson R. Payne, Ash Mady

KSU Proceedings on Cybersecurity Education, Research and Practice

Wireless access points are an effective solution for building scalable, flexible, mobile networks. The problem with these access points is often the lack of security. Users regularly connect to wireless access points without thinking about whether they are genuine or malicious. Moreover, users are not aware of the types of attacks that can come from “rogue” access points set up by attackers and what information can be captured by them. Attackers use this advantage to gain access to users’ confidential information. The objective of this study is to examine the effectiveness of the WiFi Pineapple NANO used as a rogue ...


Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley Oct 2018

Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to discuss a curriculum design that employs Kolb’s Experiential Learning Theory stages and Kolb’s Learning Styles in four consecutive class sessions. The challenge each class is to present students with perplexing and often frustrating network problems that someday might be encountered on the job. By using Kolb’s theory, students address those problems from the perspective of each learning style, while passing through each phase of the learning cycle. As a result, students gain stronger cognitive thinking skills and hands-on troubleshooting skills in preparation for work as network administrators or cybersecurity ...


Capturing The Existential Cyber Security Threats From The Sub-Saharan Africa Zone Through Literature Database, Samuel B. Olatunbosun, Nathanial J. Edwards, Cytyra D. Martineau Oct 2018

Capturing The Existential Cyber Security Threats From The Sub-Saharan Africa Zone Through Literature Database, Samuel B. Olatunbosun, Nathanial J. Edwards, Cytyra D. Martineau

KSU Proceedings on Cybersecurity Education, Research and Practice

Abstract - The Internet brought about the phenomenon known as Cyber-space which is boundless in nature. It is one of the fastest-growing areas of technical infrastructure development over the past decade. Its growth has afforded everyone the opportunity to carry out one or more transactions for personal benefits. The African continent; often branded as ‘backward’ by the Western press has been able to make substantial inroads into the works of Information and Computer Technology (ICT). This rapid transition by Africans into ICT power has thus opened up the opportunities for Cybercriminal perpetrators to seek and target victims worldwide including America for ...


Using Project Management Knowledge And Practice To Address Digital Forensic Investigation Challenges, Steven S. Presley, Jeffrey P. Landry, Michael Black Oct 2018

Using Project Management Knowledge And Practice To Address Digital Forensic Investigation Challenges, Steven S. Presley, Jeffrey P. Landry, Michael Black

KSU Proceedings on Cybersecurity Education, Research and Practice

The management of digital forensics investigations represents a unique challenge. The field is relatively new, and combines the technical challenges of Information Systems with the legal challenges of forensics investigations. The challenges for the Digital Forensics Investigators and the organizations they support are many. This research effort examines the characteristics and challenges of Digital Forensics Investigations and compares them with the features and knowledge areas of project management. The goal was to determine if project management knowledge, as defined in a common body of knowledge, would be helpful in addressing digital forensics investigation challenges identified in the literature. The results ...