Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation

PDF

2022

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 303

Full-Text Articles in Business

Preferences Of Coffee Farmers For Attributes Of Selected Coffee Technologies In The Philippines, Jayson S. Cabral, Dia Noelle F. Velasco, Mar B. Cruz, Nohreen Ethel P. Manipol, Hannah D. Miranda-Quibot Dec 2022

Preferences Of Coffee Farmers For Attributes Of Selected Coffee Technologies In The Philippines, Jayson S. Cabral, Dia Noelle F. Velasco, Mar B. Cruz, Nohreen Ethel P. Manipol, Hannah D. Miranda-Quibot

Journal of Economics, Management and Agricultural Development

This paper looked into the preferences of 151 coffee farmers for the attributes of selected coffee technologies. The study was done to help guide technology developers in crafting post harvest processing facilities for coffee which their target market will need which can lead to a higher probability of commercialization of new coffee technologies. The study examined the preferences for attributes for coffee dryers, moisture meters, coffee depulpers, and coffee sorters using the Analytic Hierarchy Process (AHP) framework. The results revealed that the quality of the final product is the top priority for coffee farmers when choosing a coffee dryer. Non-destructiveness …


Financial Institutions Continue To Adopt Crypto Despite Industry Turmoil, Andre Beganski Dec 2022

Financial Institutions Continue To Adopt Crypto Despite Industry Turmoil, Andre Beganski

Capstones

Even though this calamitous year has raised doubts about crypto's future, not a single large financial institution has backed away from their forays into digital assets. And despite a period of turmoil that’s seen the market value of all cryptocurrencies crater to under $880 billion from over $3 trillion, many sizable firms continue to view crypto as an emerging sector of finance and technology that’s rife with opportunity.

While financial firms have the potential to foster a widespread perception of cryptocurrencies as a legitimate asset class, their involvement runs counter to the intent of those who pioneered blockchain technology for …


An Analysis Of The Effectiveness Of Virtual Reality In Distance Learning, Rashana Weerasinghe Dec 2022

An Analysis Of The Effectiveness Of Virtual Reality In Distance Learning, Rashana Weerasinghe

Honors Scholar Theses

This study focuses on the applicability of emerging technologies in education. To explore this, our research was conducted through an “Intro To Emerging Technology” course taught by the OPIM Department at the University of Connecticut. The class meets in two modalities: virtual reality environment and video-conferencing platform. Our research explores the learning outcomes produced by the different classroom environments, seeking to better understand the impact of virtual reality in distance learning. The purpose of this is to identify and predict how virtual reality will be integrated into a distance learning environment and understand if it can be used as a …


Competitive Sustainability: The Intersection Of Sustainability And Business Success, Clyde Eiríkur Hull Dec 2022

Competitive Sustainability: The Intersection Of Sustainability And Business Success, Clyde Eiríkur Hull

Articles

Sustainability that beats the competition is different from sustainability that does not. Some who care very much about sustainability may not care at all about business success. However, they should. If businesses were to see that competitive sustainability leads to financial success, they would take it up and abandon nonsustainable practices


Workiva Strategic Audit, Rose Pilakowski Dec 2022

Workiva Strategic Audit, Rose Pilakowski

Honors Theses

Workiva is a software development company that simplifies complex reports for companies in over 180 countries around the world. Within a controlled, secure, audit-ready platform, Workiva customers connect critical business data directly with their source systems. This paper will analyze Workiva to help understand how it utilizes its platform to gain and sustain competitive advantages in the software and accounting environments. After completing an analysis of Workiva and its industry, I found that Workiva currently sits at an advantageous position in relation to its competitors, but still has room to grow in holding the lead above them.


A Low-Cost, Low-Power, Scada Testbed Solution For Secure Remote Monitoring, Connor Berger Dec 2022

A Low-Cost, Low-Power, Scada Testbed Solution For Secure Remote Monitoring, Connor Berger

Symposium of Student Scholars

Similar to software application systems adopted by companies and businesses for product logging, payroll, human resources, Supervisory Control and Data Acquisition (SCADA) systems control the distributed processes with multiple components located on different machines that communicate and coordinate actions in order to appear as a single coherent system. SCADA systems severely lack the appropriate security and hack prevention measures. We propose a low cost, low power SCADA testbed solution for secure remote monitoring. The goal of this research is to implement and test the testbed’s security by emulating attack vectors on both hardware components and communication channels to probe the …


Organizing Digital Platforms And Customer Needs For Digital Service Innovation, Gamel O. Wiredu Dec 2022

Organizing Digital Platforms And Customer Needs For Digital Service Innovation, Gamel O. Wiredu

The African Journal of Information Systems

Digital organizations have become highly dependent on digital platforms and customer needs as key resources for digital service innovation. These resources in the competitive environment are making and shaping innovation of digital services because, though external, they remain central to digital organizations’ strategic innovation and competitiveness. Yet, how and why organizing these resources influences digital service innovation is under-explained in the literature. This paper, based on an empirical study and grounded theory methodology, addresses this limitation. It explains that digital service innovation occurs through two complementary types of organizing, namely: foundational knowledge organizing by combining digital platforms and customer needs, …


A Study Of Heart Disease Diagnosis Using Machine Learning And Data Mining, Intisar Ahmed Dec 2022

A Study Of Heart Disease Diagnosis Using Machine Learning And Data Mining, Intisar Ahmed

Electronic Theses, Projects, and Dissertations

Heart disease is the leading cause of death for people around the world today. Diagnosis for various forms of heart disease can be detected with numerous medical tests, however, predicting heart disease without such tests is very difficult. Machine learning can help process medical big data and provide hidden knowledge which otherwise would not be possible with the naked eye. The aim of this project is to explore how machine learning algorithms can be used in predicting heart disease by building an optimized model. The research questions are; 1) What Machine learning algorithms are used in the diagnosis of heart …


Business Information Security Officer (Biso) Responsibilities And Role Development, Kaung Myat Thu, Hudda Siddique Dec 2022

Business Information Security Officer (Biso) Responsibilities And Role Development, Kaung Myat Thu, Hudda Siddique

Publications and Research

In today's interconnected world, the success of enterprises heavily relies on network connectivity and technology. To safeguard sensitive information from cyber threats and ensure business success, the role of Information Security has become critical. This research project focuses on the Business Information Security Officer (BISO) role, studying their responsibilities, strategies, and how they handle threats. We explore the knowledge and skills required for BISOs, including certifications such as ISC² CISSP, ISACA CRISC, CISM, and CompTIA Security+. By contributing to the maturity of the BISO role, this study aims to enhance information security in organizations.


Shaping Ott Movie Consumption Through Immersive Cinema: A Qualitative Investigation Of Consumer Perspectives, Avirupa Basu, Pratap C. Mandal, Ashutosh. B. Murti, Tamas Makany, Tamas Makany Dec 2022

Shaping Ott Movie Consumption Through Immersive Cinema: A Qualitative Investigation Of Consumer Perspectives, Avirupa Basu, Pratap C. Mandal, Ashutosh. B. Murti, Tamas Makany, Tamas Makany

Research Collection Lee Kong Chian School Of Business

Due to the COVID-19 pandemic, the entertainment sector saw a worldwide disruption with restrictions on outdoor activities. Consequently, consumers turned towards video and music streaming services for their entertainment consumption. Several film studios have taken the digital release route on over-the-top (OTT) sites to avoid revenue losses and indefinite delays. However, these non-theatrical OTT film releases need to experiment with different strategies to bring the experiences to par with theatrical ones. This exploratory study aims to provide insights on whether Immersive Cinema can be used to imitate the physical world through digital simulation on OTT platforms to gain credibility in …


Nature Tech: A Nascent Ecosystem, Simon J.D. Schillebeeckx Dec 2022

Nature Tech: A Nascent Ecosystem, Simon J.D. Schillebeeckx

Research Collection Lee Kong Chian School Of Business

When people talk about climate tech, they tend to mean carbon tech. It’s all carbon tunnel vision: Carbon footprint, carbon equivalent, carbon credit, carbon compensation, carbon emission reductions, carbon offsets, decarbonization and so on. By extension, the entire debate about energy transition, energy transformation, clean power and green energy is similarly a debate that is largely held within the carbon tunnel. Make no mistake about it. These are important topics to address. The energy transition will not only prevent catastrophic climate change but have massive benefits for human health by tackling fossil-fuel induced air pollution at the source.As the above …


Insights On Factors Influencing Startup Failure In The Hospitality Industry, Shivangi Khurania Dec 2022

Insights On Factors Influencing Startup Failure In The Hospitality Industry, Shivangi Khurania

UNLV Theses, Dissertations, Professional Papers, and Capstones

Hospitality businesses and innovative startups have faced extremely high failure rates. The author provides insights on the factors that impact startup failure in the hospitality industry after performing a deep analysis on innovation frameworks such as the diffusion of innovation theory, the theory of disruptive innovation, and the ten types of innovation framework. Not only that, the author also provides insights based on their own personal experience and knowledge gained through education at the University of Las Vegas, Nevada. The research explored in this paper revealed that startup failure is not based on one factor alone and how leaders in …


Unveiling The Process Of Collaborative Learning Through The Use Of Digital Whiteboard Historical Action Logs, Hua Leong Fwa Dec 2022

Unveiling The Process Of Collaborative Learning Through The Use Of Digital Whiteboard Historical Action Logs, Hua Leong Fwa

Research Collection School Of Computing and Information Systems

The Covid-19 pandemic has forced many educational institutions to transit from face-to-face to online delivery of lessons. Precluded from meeting face-to-face in a classroom due to pandemic curbs, a digital whiteboard affords both teacher and learners to be collaborating and completing a task from home instead. In this paper, we first used a survey to assess learner’s acceptance and use of digital whiteboard. We next web-scraped and visualized historical action logs recorded by the digital whiteboarding tool to uncover the process of problem-solving between and within the teams. This is significant as social-loafing and free-riding are typically difficult to detect …


Managment Principles And Practices Of Integrating Quality In The Project Life Cycle, Elvis Shyta Dec 2022

Managment Principles And Practices Of Integrating Quality In The Project Life Cycle, Elvis Shyta

School of Professional Studies

No abstract provided.


Case Study: National Employment Service Implementation Project Analysis, Manish Kumar, Muzaffar Kosimov, Sanjay Chauhan, Zainab Idowu Dec 2022

Case Study: National Employment Service Implementation Project Analysis, Manish Kumar, Muzaffar Kosimov, Sanjay Chauhan, Zainab Idowu

School of Professional Studies

No abstract provided.


Instructional Systems Design And The Diffusion And Adoption Of Technology: (Volume 1), Miguel Ramlatchan (Author & Editor), Mark Parsons (Author), Meghan Soldani (Author), Josie Joswick Mendoza (Author), Maria Satre (Author), Brittany Spitz (Author), Jasmine Bundy (Author), Amanda Kline (Author) Nov 2022

Instructional Systems Design And The Diffusion And Adoption Of Technology: (Volume 1), Miguel Ramlatchan (Author & Editor), Mark Parsons (Author), Meghan Soldani (Author), Josie Joswick Mendoza (Author), Maria Satre (Author), Brittany Spitz (Author), Jasmine Bundy (Author), Amanda Kline (Author)

Distance Learning Faculty & Staff Books

Instructional designers, instructional systems designers, and other educational technologists are, by their nature, innovators. These professionals apply and extend the applied science of learning, systems, communication, and instructional design theory to help students learn. Technology in some capacity is used to make the connections between subject matter experts, teachers, instructors, and their learners. It is common for instructional designers to seek new tools, techniques, and innovations for the improvement of learning, access, quality, and student satisfaction. However, the adoption and diffusion of new educational technology and innovation is a complex process that depends on many variables. Understanding these processes and …


Digital Research Proficiency In Information And Communication Technology Skills Employed By Secretarial Staff And Business Teachers In Day-To-Day Administration And Training In Secondary Schools, Honesta Chidiebere Anorue, Ogenyi Ochehe, Maureen Anayo Madu Nov 2022

Digital Research Proficiency In Information And Communication Technology Skills Employed By Secretarial Staff And Business Teachers In Day-To-Day Administration And Training In Secondary Schools, Honesta Chidiebere Anorue, Ogenyi Ochehe, Maureen Anayo Madu

Library Philosophy and Practice (e-journal)

Not only does Information and Communication Technology (ICT) have the potential to increase the efficacy and efficiency of teaching and learning, it also has the potential to lessen administrative obligations. This study investigates the extent to which secretarial staff and business teachers use of digital research proficiency in information and communication technology skills in their day-to-day interactions in secondary schools in Benue State. Specifically, a descriptive survey research approach was used for this investigation.The study tested four hypotheses and answered four research questions at 0. 05 level of significance. The study's population was 53 respondents that comprised 38 business teachers …


Science, Technology, Engineering, And Mathematics (Stem) Project-Based Learning (Pbl) Education: A New Mexico Case Study For Equity And Inclusion, Kimberly A. Scheerer Nov 2022

Science, Technology, Engineering, And Mathematics (Stem) Project-Based Learning (Pbl) Education: A New Mexico Case Study For Equity And Inclusion, Kimberly A. Scheerer

Teacher Education, Educational Leadership & Policy ETDs

This research addresses how student participation in Science, Technology, Engineering, and Mathematics (STEM) project-based learning (PBL) education activities encourages underrepresented minority student achievement in STEM career field trajectories. Seven New Mexico high school counselors and 12 STEM organization personnel were interviewed during this study. Their responses represent the nuanced professional voices where New Mexico public education intersects with STEM student interest and cultural influence.

For students, STEM PBL can foster deep integration across educational disciplines and enhance STEM career trajectory interest and readiness. STEM education converged with PBL methodologies has the ability to leverage community support while broadening student networks. …


Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss Nov 2022

Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss

KSU Proceedings on Cybersecurity Education, Research and Practice

Water quality refers to measurable water characteristics, including chemical, biological, physical, and radiological characteristics usually relative to human needs. Dumping waste and untreated sewage is the reason for water pollution and several diseases to the living hood. The quality of water can also have a significant impact on animals and plant ecosystems. Therefore, keeping track of water quality is a substantial national interest. Much research has been done for measuring water quality using sensors to prevent water pollution. In summary, those systems are built based on online and reagent-free water monitoring SCADA systems in wired networks. However, centralized servers, transmission …


Cybercrime In The Developing World, David A. Ghelerter, John E. Wilson, Noah L. Welch, John-David Rusk Nov 2022

Cybercrime In The Developing World, David A. Ghelerter, John E. Wilson, Noah L. Welch, John-David Rusk

KSU Proceedings on Cybersecurity Education, Research and Practice

This paper attempts to discover the reasons behind the increase in cybercrime in developing nations over the past two decades. It discusses many examples and cases of projects to increase internet access in developing countries and how they enabled cybercrime. This paper examines how nations where many cybercrimes occurred, did not have the necessary resources or neglected to react appropriately. The other primary focus is how cybercrimes are not viewed the same as other crimes in many of these countries and how this perception allows cybercriminals to do as they please with no stigma from their neighbors. It concludes that …


Microtransactions And Gambling In The Video Game Industry, Christopher L. Antepenko, Samuel R. Rickey, Angel L. Hibbets, John-David Rusk Nov 2022

Microtransactions And Gambling In The Video Game Industry, Christopher L. Antepenko, Samuel R. Rickey, Angel L. Hibbets, John-David Rusk

KSU Proceedings on Cybersecurity Education, Research and Practice

The beginning of the 21st century has had a drastic effect on the video game industry. The advent of almost universal Internet access, the release of inexpensive broadband-enabled consoles, and the availability of mobile gaming have led to game developers and publishers heavily relying on premium in-game currencies, exclusive paid items, and loot boxes to subsidize or even replace profits from traditional video game business models. By 2020, in-game purchases made up a market of $92.6B worldwide and, in the US, experienced growth of over 30%.[1] In this highly lucrative market, the legal and ethical landscape is constantly bubbling with …


Social Media Platforms And Responsibility For Disinformation, Matt T. Figlia, Brandon M. Henschen, Joseph T. Sims, John-David Rusk Nov 2022

Social Media Platforms And Responsibility For Disinformation, Matt T. Figlia, Brandon M. Henschen, Joseph T. Sims, John-David Rusk

KSU Proceedings on Cybersecurity Education, Research and Practice

Researchers are paying closer attention to the rise of disinformation on social media platforms and what responsibility, if any, the companies that control these platforms have for false information being spread on their websites. In this paper, we highlight the recent growth in concern regarding online disinformation, discuss other works regarding the use of social media as a tool for spreading disinformation, and discuss how coordinated disinformation campaigns on social media platforms are used to spread propaganda and lies about current political events. We also evaluate the reactions of social media platforms in combatting disinformation and the difficulty in policing …


Towards Assessing Organizational Cybersecurity Risks Via Remote Workers’ Cyberslacking And Their Computer Security Posture, Ariel Luna, Yair Levy, Gregory Simco, Wei Li Nov 2022

Towards Assessing Organizational Cybersecurity Risks Via Remote Workers’ Cyberslacking And Their Computer Security Posture, Ariel Luna, Yair Levy, Gregory Simco, Wei Li

KSU Proceedings on Cybersecurity Education, Research and Practice

Cyberslacking is conducted by employees who are using their companies’ equipment and network for personal purposes instead of performing their work duties during work hours. Cyberslacking has a significant adverse effect on overall employee productivity, however, recently, due to COVID19 pandemic move to remote working also pose a cybersecurity risk to organizations networks and infrastructure. In this work-in-progress research study, we are developing, validating, and will empirically test taxonomy to assess an organization’s remote workers’ risk level of cybersecurity threats. This study includes a three-phased developmental approach in developing the Remote Worker Cyberslacking Security Risk Taxonomy. With feedback from cybersecurity …


Nids In Airgapped Lans--Does It Matter?, Winston Messer Nov 2022

Nids In Airgapped Lans--Does It Matter?, Winston Messer

KSU Proceedings on Cybersecurity Education, Research and Practice

This paper presents an assessment of the methods and benefits of adding network intrusion detection systems (NIDS) to certain high-security airgapped isolated local area networks. The proposed network architecture was empirically tested via a series of simulated network attacks on a virtualized network. The results show an improvement of double the chances of an analyst receiving a specific, appropriately-severe alert when NIDS is implemented alongside host-based measures when compared to host-based measures alone. Further, the inclusion of NIDS increased the likelihood of the analyst receiving a high-severity alert in response to the simulated attack attempt by four times when compared …


What You See Is Not What You Know: Deepfake Image Manipulation, Cathryn Allen, Bryson Payne, Tamirat Abegaz, Chuck Robertson Nov 2022

What You See Is Not What You Know: Deepfake Image Manipulation, Cathryn Allen, Bryson Payne, Tamirat Abegaz, Chuck Robertson

KSU Proceedings on Cybersecurity Education, Research and Practice

Research indicates that deceitful videos tend to spread rapidly online and influence people’s opinions and ideas. Because of this, video misinformation via deepfake video manipulation poses a significant online threat. This study aims to discover what factors can influence viewers’ capability of distinguishing deepfake videos from genuine video footage. This work focuses on exploring deepfake videos’ potential use for deception and misinformation by exploring people’s ability to determine whether videos are deepfakes in a survey consisting of deepfake videos and original unedited videos. The participants viewed a set of four videos and were asked to judge whether the videos shown …


Editors' Preface, Michael E. Whitman, Herbert J. Mattord, Hossain Shahriar Nov 2022

Editors' Preface, Michael E. Whitman, Herbert J. Mattord, Hossain Shahriar

KSU Proceedings on Cybersecurity Education, Research and Practice

Since 2004, Kennesaw State University, Georgia, has hosted an academic conference. Over the years, the event has brought together hundreds of faculty and students from throughout the U.S., sharing research into pedagogical efforts and instructional innovations. Initially, the conference was named the Information Security Curriculum Development conference and served as KSU’s contribution to engage our colleagues in growing security education from its infancy. It was paired with KSU’s inaugural security education journal, the Information Security Education Journal. In 2016, the event was rebranded as the Conference on Cybersecurity Education, Research, and Practice to reflect both an expansion of topics suitable …


Introducing A Model For How Knowledge-Driven Agile Innovation Can Drive Digital Transformation In Firms, Lipika Bhattacharya, Clarence Goh, Gary Pan Nov 2022

Introducing A Model For How Knowledge-Driven Agile Innovation Can Drive Digital Transformation In Firms, Lipika Bhattacharya, Clarence Goh, Gary Pan

Research Collection School Of Accountancy

Digital transformation often arises from the distribution of tasks among interdisciplinary teams of experts. One important factor that determines the success of digital transformation relates to an organization’s ability to innovate in an agile manner. In this article, we identify key drivers of digital transformation, which include organizational agility, knowledge management and innovation. Another crucial aspect of knowledge management relates to the coordination of knowledge. It is important for organizations to focus on knowledge coordination because the lack of coordination can dissuade them from meeting the demands for flexibility and speed during digital transformation, thereby negating the potential benefits from …


2021 Ijbe V2 Front Matter, Tamra Connor Oct 2022

2021 Ijbe V2 Front Matter, Tamra Connor

International Journal for Business Education

  1. Editorial Board
  2. Letter from International President
  3. SIEC-ISBE International


Business Model Innovation In Marine Engine Maintanance, Dofilia Sinangui Kaloia Oct 2022

Business Model Innovation In Marine Engine Maintanance, Dofilia Sinangui Kaloia

World Maritime University Dissertations

No abstract provided.


Sharing Economy Of Online Food Delivery: Revealing The Underlying Attributes Of The Customer Experience Through Semantic Network Analysis, Hepinda Fajari Nuharini, Mustika Sufiati Purwanegara Oct 2022

Sharing Economy Of Online Food Delivery: Revealing The Underlying Attributes Of The Customer Experience Through Semantic Network Analysis, Hepinda Fajari Nuharini, Mustika Sufiati Purwanegara

The South East Asian Journal of Management

Research Aims: This study aimed to reveal the underlying attributes of the customer experience in the sharing economy of online food delivery (OFD).

Design/Methodology/Approach: After collecting 45,116 reviews from the Google Play store, a semantic network analysis was conducted. Python programming language and text mining were utilised to extract keywords from online reviews, a frequency analysis was performed, and a CONvergence of iterated CORrelations (CONCOR) analysis was conducted using Ucinet 6.0.

Research Findings: The keywords ‘food,’ ‘order,’ ‘driver,’ and ‘application’ had the highest frequency and centrality. Customer experience attributes were classified into four clusters: ‘Delivery Procedure’, ‘OFD Platform’, ‘Payment Process’ …