Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation

Journal

Institution
Keyword
Publication Year
Publication

Articles 211 - 240 of 866

Full-Text Articles in Business

Cybersecurity Continuity Risks: Lessons Learned From The Covid-19 Pandemic, Tyler Fezzey, John H. Batchelor, Gerald F. Burch, Randall Reid Jan 2023

Cybersecurity Continuity Risks: Lessons Learned From The Covid-19 Pandemic, Tyler Fezzey, John H. Batchelor, Gerald F. Burch, Randall Reid

Journal of Cybersecurity Education, Research and Practice

The scope and breadth of the COVID-19 pandemic were unprecedented. This is especially true for business continuity and the related area of cybersecurity. Historically, business continuity and cybersecurity are viewed and researched as separate fields. This paper synthesizes the two disciplines as one, thus pointing out the need to address both topics simultaneously. This study identifies blind spots experienced by businesses as they navigated through the difficult time of the pandemic by using data collected during the height of the COVID-19 pandemic. One major shortcoming was that most continuity and cybersecurity plans focused on single-axis threats. The COVID-19 pandemic resulted …


A “Duty To Write” Smart Contracts That Unsophisticated Users Have A “Duty To Read”, Chase Webber Jan 2023

A “Duty To Write” Smart Contracts That Unsophisticated Users Have A “Duty To Read”, Chase Webber

Minnesota Journal of Law, Science & Technology

No abstract provided.


Regulatory Sandboxes Enable Pragmatic Blockchain Regulation, Joshua Durham Jan 2023

Regulatory Sandboxes Enable Pragmatic Blockchain Regulation, Joshua Durham

Washington Journal of Law, Technology & Arts

Since blockchain technology supports digitally-native money, the centralized chokepoints that governments have traditionally targeted to regulate commerce no longer apply to our (digital) property. However, competent regulation furthers basic public policy goals and should enable responsible innovation of this promising technology. This Article discusses pragmatic policies that enable responsible innovation by cultivating regulatory expertise required to write enforceable rules. Responsible innovation is necessary because unlike the early internet, where programmers could manipulate simple colors and text on webpages, these same individuals can now create financial services applications that manipulate actual money—we are faced with an inescapable reality that more is …


“Listen To Me” – A Systematic Literature Review About Learning From Others’ Failure Narrations, Verena Liszt-Rohlf Jan 2023

“Listen To Me” – A Systematic Literature Review About Learning From Others’ Failure Narrations, Verena Liszt-Rohlf

International Journal for Business Education

The dedicated stream of learning from others’ failure has gained increasing attention in entrepreneurship education research and—because of the COVID-19 crisis—among practitioners. The emerging literature on entrepreneurship education addresses this important phenomenon but lacks specific theoretical underpinnings; its new approaches to and empirical inquiry are one-sided. Therefore, a systematic literature review is warranted to provide a more comprehensive view of learning from others’ entrepreneurial failures and to develop a research model. Unprecedentedly, the author explores the type of research streams and gaps that can be included in a research model for entrepreneurship education research in the area of learning from …


Ro Khanna, Dignity In A Digital Age: Making Tech Work For All Of Us (2022), James W. Gentry Jan 2023

Ro Khanna, Dignity In A Digital Age: Making Tech Work For All Of Us (2022), James W. Gentry

Markets, Globalization & Development Review

No abstract provided.


Revisiting Cybersecurity Awareness In The Midst Of Disruptions, Avideh Sadaghiani-Tabrizi Jan 2023

Revisiting Cybersecurity Awareness In The Midst Of Disruptions, Avideh Sadaghiani-Tabrizi

International Journal for Business Education

The awareness of cybersecurity and knowledge about risks from a variety of threats, which present harm or steal private information in internetworking could help in mitigation of vulnerabilities to risks of threats in safeguarding information from malware and bots. Revisiting cybersecurity awareness of every member and evaluation of organization’s posture might help to protect sensitive or private information from a network of computers, working together and forming into botnets. The purpose of the qualitative case study narrative was to explore prospects for integrating cybersecurity education into elementary school children’s curriculum through interviews of elementary schoolteachers, IT experts, and parents to …


Key Performance Indicators Detection Based Data Mining, Fatma Abogabal, Shimaa Mohamed Ouf, Amira M. Idrees Ami Jan 2023

Key Performance Indicators Detection Based Data Mining, Fatma Abogabal, Shimaa Mohamed Ouf, Amira M. Idrees Ami

Future Computing and Informatics Journal

One of the most prosperous domains that Data mining accomplished a great progress is Food Security and safety. Some of Data mining techniques studies applied several machine learning algorithms to enhance and traceability of food supply chain safety procedures and some of them applying machine learning methodologies with several feature selection methods for detecting and predicting the most significant key performance indicators affect food safety. In this research we proposed an adaptive data mining model applying nine machine learning algorithms (Naive Bayes, Bayes Net Key -Nearest Neighbor (KNN), Multilayer Perceptron (MLP), Random Forest (RF), Support Vector Machine (SVM), J48, Hoeffding …


Hired By A Machine: Can A New York City Law Enforce Algorithmic Fairness In Hiring Practices?, Lindsey Fuchs Jan 2023

Hired By A Machine: Can A New York City Law Enforce Algorithmic Fairness In Hiring Practices?, Lindsey Fuchs

Fordham Journal of Corporate & Financial Law

Workplace antidiscrimination laws must adapt to address today’s technological realities. If left underregulated, the rapidly expanding role of Artificial Intelligence (“AI”) in hiring practices has the danger of creating new, more obscure modes of discrimination. Companies use these tools to reduce the duration and costs of hiring and potentially attract a larger pool of qualified applicants for their open positions. But how can we guarantee that these hiring tools yield fair outcomes when deployed? These issues are just starting to be addressed at the federal, state, and city levels. This Note tackles whether a new city law can be improved …


Swipe Right Into A Disciplinary Hearing: How The Use Of Dating Apps Could Earn An Attorney More Than A Bad First Date, Zachary S. Aman Jan 2023

Swipe Right Into A Disciplinary Hearing: How The Use Of Dating Apps Could Earn An Attorney More Than A Bad First Date, Zachary S. Aman

Catholic University Journal of Law and Technology

The Model Rules of Professional Conduct seek to police the conduct of attorneys. Each jurisdiction adopts its own rules of professional conduct to apply to the attorneys licensed within it. Notably, the model rules prohibit any sexual relationship between the attorney and client unless that relationship precedes the attorney-client relationship. Traditionally, defining a "sexual relationship" was simple, particularly if the attorney and client engaged in sexual intercourse. The introduction of dating apps, however, has blurred the line.

This article outlines the inherent risks of attorneys using dating apps at a time when most newly-licensed attorneys make up the majority of …


Short-Term Prediction Of Icu Admission For Covid-19 Inpatients, Yoon Sang Lee, Riyaz T. Sikora Jan 2023

Short-Term Prediction Of Icu Admission For Covid-19 Inpatients, Yoon Sang Lee, Riyaz T. Sikora

Journal of International Technology and Information Management

Since the COVID-19 outbreak, many hospitals suffered from a surge of some high-risk inpatients needing to be admitted to the ICU. In this study, we propose a method

predicting the likelihood of COVID-19 inpatients’ admission to the ICU within a time frame of 12 hours. Four steps, the Bayesian Ridge Regression-based missing value imputation, the synthesis of training samples by the combination of two rows (the first and another row) of each patient, customized oversampling, and XGBoost classifier, are used for the proposed method. In the experiment, the AUC-ROC and F-score of our method is compared with those of other …


From Tether To Terra: The Current Stablecoin Ecosystem And The Failure Of Regulators, Mary E. Burke Jan 2023

From Tether To Terra: The Current Stablecoin Ecosystem And The Failure Of Regulators, Mary E. Burke

Fordham Journal of Corporate & Financial Law

The Tether controversy and Terra crash have placed stablecoins in the regulatory spotlight. Stablecoins are often portrayed as posing systemic risks to financial markets, with some pundits labelling them “the villain of the finance world.” Global regulatory bodies, namely the International Monetary Fund (IMF) and the Bank of International Settlement (BIS), and political leaders, including the Biden Administration, have all called for stablecoin regulation. These officials allege that stablecoins’ structure, combined with their exponential growth, pose a unique risk to global markets. Before the May 2022 Terra crash, government reports superficially treated stablecoins by exclusively focusing on asset-backed coins. Post …


Exploring Financial Data Protection And Civil Liberties In An Evolved Digital Age, Amanda Lindner Jan 2023

Exploring Financial Data Protection And Civil Liberties In An Evolved Digital Age, Amanda Lindner

Fordham Journal of Corporate & Financial Law

There is no comprehensive financial privacy law that can protect consumers from a company’s collection sharing and selling of consumer data. The most recent federal financial privacy law, the Gramm-Leach-Bliley Act (“GLBA”), was enacted by Congress over 20 years ago. Vast technological and financial changes have occurred since 1999, and financial privacy law is due for an upgrade.

As a result, loopholes exist where companies can share financial data without being subject to laws or regulations. Additionally, federal financial privacy related laws provide little to no recourse for consumers to self-remediate with litigation, also known as a private right of …


New Frontiers In Technology: Can Traditional Intellectual Property Rights Laws Be Adapted And Applied To Nfts?, Mariyah S. Wakhariya Jan 2023

New Frontiers In Technology: Can Traditional Intellectual Property Rights Laws Be Adapted And Applied To Nfts?, Mariyah S. Wakhariya

Catholic University Journal of Law and Technology

A decade ago, ‘NFTs’ were rarely heard of or known to anyone, unless they worked in or kept up with the tech world. However, they are not new - they have been around for almost two decades. Their popularity has grown over the past few years. ‘NFT’ stands for ‘non-fungible token’. An NFT is a digital file with a unique identity that is verified on a blockchain and is therefore not interchangeable - i.e., a kind of crypto asset, like an authentication certificate for digital artifacts. In theory, NFTs can represent almost any real or intangible property. These days, it …


The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky Jan 2023

The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky

Journal of International Technology and Information Management

This paper focuses primarily on the need to monitor the risks arising from the dual-use of Artificial Intelligence (AI). Dual-use AI technology capability makes it applicable for defense systems and consequently may pose significant security risks, both intentional and unintentional, with the national and international scope of effects. While domestic use of AI remains the prerogative of individual countries, the unregulated and nonmonitored use of AI with international implications presents a specific concern. An international organization tasked with monitoring potential threats of AI activities could help defuse AI-associated risks and promote global cooperation in developing and deploying AI technology. The …


Learning Outcomes And Learner Satisfaction: The Mediating Roles Of Self-Regulated Learning And Dialogues, Sean Eom, Nicholas Jeremy Ashill Jan 2023

Learning Outcomes And Learner Satisfaction: The Mediating Roles Of Self-Regulated Learning And Dialogues, Sean Eom, Nicholas Jeremy Ashill

Journal of International Technology and Information Management

The interdependent learning process is regarded as a crucial part of e-learning success, but it has been largely ignored in e-learning empirical research. Grounded in constructivist and social constructivist theory, we present and test an e-learning success model consisting of eight e-learning critical success factors (CSF) derived from constructivist and social constructivist models. Three hundred seventy-two on-line students from a Midwestern university in the United States participated in the survey. The data collected from the survey was used to examine the partial least squares structural equation model. The results highlight the importance of self-regulated learning and dialogical processes to explain …


Digital Collectibles: Exploring Non-Fungible Tokens (Nfts) Through Twitter Messages, Peter Haried, James Murray Jan 2023

Digital Collectibles: Exploring Non-Fungible Tokens (Nfts) Through Twitter Messages, Peter Haried, James Murray

Journal of International Technology and Information Management

The growing popularity of non-fungible tokens (NFTs) has created a new digital collectibles asset class and market. NFTs are unique digital tokens built on blockchain technology that can represent anything from art, property rights, certificates of authentication to sports collectibles. The use of blockchain provides the framework for digital ownership and brings the notion of scarcity to the digital NFT asset class. With the emerging NFT market and growing consumer base little work has investigated the factors behind NFT interest and participation. Using a dataset of 26,444 tweets on NBA Top Shot, one of the largest and most popular NFT …


Asia Pacific Perspectives Vol. 18 No 1. 2023, University Of San Francisco Jan 2023

Asia Pacific Perspectives Vol. 18 No 1. 2023, University Of San Francisco

Asia Pacific Perspectives

Contents:

Articles

Urban Youth on the Margins: Inequality in China’s Sent Down Youth Movement by Sanjiao Tang

Chinese Firms in the Belt and Road Initiative: A Cross-Sectoral Study of BRI Activities in Kenya by Yabo Wu

Book Review

W. Puck Brecher. Animal Care in Japanese Tradition: A Short History by James Stone Lunde



The Intention To Use Mobile Banking As A Financial Technology Service Among Islamic Bank Users, Ratna Juwita, Adam Darma Kusumah, Tiara Syahrani Aqila, Hanan Tsabitah, Muhammad Farhan Syauqi Jan 2023

The Intention To Use Mobile Banking As A Financial Technology Service Among Islamic Bank Users, Ratna Juwita, Adam Darma Kusumah, Tiara Syahrani Aqila, Hanan Tsabitah, Muhammad Farhan Syauqi

Indonesian Capital Market Review

The development of Financial Technology (FinTech) in Islamic banks has not brought increasing us- ers. Therefore, it is necessary to determine which factors influence intention to use FinTech from the demand side or the customers’ side. For this study, we chose mobile banking as our research object, considering that the largest digital transactions in Islamic banks come from mobile banking. Mobile banking also provides banks various benefits to banks such as increased long-term profitability, cus- tomer loyalty, and financial inclusion. The objective of this study is to observe the determinant factor by using the theory of planned behavior (TPB) and …


Determinants Of Continuance Intention To Use Mobile Wallets Technology In The Post Pandemic Era: Moderating Role Of Perceived Trust, Shailja Tripathi Jan 2023

Determinants Of Continuance Intention To Use Mobile Wallets Technology In The Post Pandemic Era: Moderating Role Of Perceived Trust, Shailja Tripathi

Journal of International Technology and Information Management

The Covid-19 pandemic amplified the volume and importance of mobile payments using digital wallets and placed a basis for their continued adoption. The objective of the study is to formulate and test a comprehensive model by integration of the technology acceptance model (TAM) and expectation confirmation model (ECM) with the addition of three constructs, namely perceived trust, perceived risk, and subjective norm, to identify the determinants of continuance intention to use mobile wallets. Questionnaire-based survey method was used to gather the data from 550 users having experience using mobile wallets for more than six months. The data were analyzed using …


Blockchain In The Food Industry: Integrating Machine Learning In A Systematic Literature Review, Juan M. Gómez, Omar H. Fares, Myuri Mohan, Seung Hwan Lee Jan 2023

Blockchain In The Food Industry: Integrating Machine Learning In A Systematic Literature Review, Juan M. Gómez, Omar H. Fares, Myuri Mohan, Seung Hwan Lee

Journal of International Technology and Information Management

This study provides a systematic literature review of blockchain technology in the food industry with a supply chain lens. We identify primary and sub-themes, discuss implications and applications in terms of delivering value and propose literature-informed future research directions. This review uncovered three primary themes: a) Value Creation; b) Supply Chain Digitization; and c) Transformation. It demonstrates that digitalizing food networks with blockchain technology may benefit from increased stakeholder involvement and data visibility to gain competitive advantage. Beyond the theoretical contributions, this research provides a methodological contribution by demonstrating the uses of machine learning techniques to perform systematic literature reviews.


Acceptance Of Interoperable Electronic Health Record (Ehrs) Systems: A Tanzanian E-Health Perspective, Emmanuel Mbwambo, Herman Mandari Jan 2023

Acceptance Of Interoperable Electronic Health Record (Ehrs) Systems: A Tanzanian E-Health Perspective, Emmanuel Mbwambo, Herman Mandari

Journal of International Technology and Information Management

The study assessed factors that influence the acceptance of interoperable electronic Health Records (EHRs) Systems in Tanzania Public Hospitals. The study applied a hybrid model that combined the Technology Acceptance Model (TAM) and Technology-Organization-Environment (TOE). Snowball sampling technique was applied and a total of 340 questionnaires were distributed to selected clinics, polyclinics and hospitals, of which 261 (77%) received questionnaires were considered to be valid and reliable for subsequent data analysis. IBM SPSS software version 27.0 was employed for data analysis. Findings indicated that relative advantage, compatibility, management support, organizational competency, training and education, perceived ease of use, perceived usefulness, …


Analysis Of The Impact Of Vaccinations On Pandemic Metrics In The New York Metropolitan Area, Oredola A. Soluade, Heechang Shin, Robert Richardson Jan 2023

Analysis Of The Impact Of Vaccinations On Pandemic Metrics In The New York Metropolitan Area, Oredola A. Soluade, Heechang Shin, Robert Richardson

Journal of International Technology and Information Management

This study evaluates the relationship between pandemic cases and vaccination usage, ICU bed utilization, hospitalizations, and deaths in the New York City metropolitan area. The study includes variables for the lockdown period and confirmed infections. The evaluation addresses three periods: (1) before vaccinations, (2) after vaccinations, and (3) the lockdown period. In addition, the number of vaccines per day for the manufacturers (Pfizer, Moderna, and Johnson & Johnson) are included in the study. Comparisons with New Jersey and Connecticut are used to validate that New York statistics are consistent with other states. The results provide a general model of the …


Preferences Of Coffee Farmers For Attributes Of Selected Coffee Technologies In The Philippines, Jayson S. Cabral, Dia Noelle F. Velasco, Mar B. Cruz, Nohreen Ethel P. Manipol, Hannah D. Miranda-Quibot Dec 2022

Preferences Of Coffee Farmers For Attributes Of Selected Coffee Technologies In The Philippines, Jayson S. Cabral, Dia Noelle F. Velasco, Mar B. Cruz, Nohreen Ethel P. Manipol, Hannah D. Miranda-Quibot

Journal of Economics, Management and Agricultural Development

This paper looked into the preferences of 151 coffee farmers for the attributes of selected coffee technologies. The study was done to help guide technology developers in crafting post harvest processing facilities for coffee which their target market will need which can lead to a higher probability of commercialization of new coffee technologies. The study examined the preferences for attributes for coffee dryers, moisture meters, coffee depulpers, and coffee sorters using the Analytic Hierarchy Process (AHP) framework. The results revealed that the quality of the final product is the top priority for coffee farmers when choosing a coffee dryer. Non-destructiveness …


Organizing Digital Platforms And Customer Needs For Digital Service Innovation, Gamel O. Wiredu Dec 2022

Organizing Digital Platforms And Customer Needs For Digital Service Innovation, Gamel O. Wiredu

The African Journal of Information Systems

Digital organizations have become highly dependent on digital platforms and customer needs as key resources for digital service innovation. These resources in the competitive environment are making and shaping innovation of digital services because, though external, they remain central to digital organizations’ strategic innovation and competitiveness. Yet, how and why organizing these resources influences digital service innovation is under-explained in the literature. This paper, based on an empirical study and grounded theory methodology, addresses this limitation. It explains that digital service innovation occurs through two complementary types of organizing, namely: foundational knowledge organizing by combining digital platforms and customer needs, …


2021 Ijbe V2 Front Matter, Tamra Connor Oct 2022

2021 Ijbe V2 Front Matter, Tamra Connor

International Journal for Business Education

  1. Editorial Board
  2. Letter from International President
  3. SIEC-ISBE International


Sharing Economy Of Online Food Delivery: Revealing The Underlying Attributes Of The Customer Experience Through Semantic Network Analysis, Hepinda Fajari Nuharini, Mustika Sufiati Purwanegara Oct 2022

Sharing Economy Of Online Food Delivery: Revealing The Underlying Attributes Of The Customer Experience Through Semantic Network Analysis, Hepinda Fajari Nuharini, Mustika Sufiati Purwanegara

The South East Asian Journal of Management

Research Aims: This study aimed to reveal the underlying attributes of the customer experience in the sharing economy of online food delivery (OFD).

Design/Methodology/Approach: After collecting 45,116 reviews from the Google Play store, a semantic network analysis was conducted. Python programming language and text mining were utilised to extract keywords from online reviews, a frequency analysis was performed, and a CONvergence of iterated CORrelations (CONCOR) analysis was conducted using Ucinet 6.0.

Research Findings: The keywords ‘food,’ ‘order,’ ‘driver,’ and ‘application’ had the highest frequency and centrality. Customer experience attributes were classified into four clusters: ‘Delivery Procedure’, ‘OFD Platform’, ‘Payment Process’ …


Vertical Partnerships Between Oem And First Tier: Lessons From Automotive Component Companies In Greater Jakarta-Indonesia, Donny Oktavian Syah, Rambat Lupiyoadi, Embun Suryani Oct 2022

Vertical Partnerships Between Oem And First Tier: Lessons From Automotive Component Companies In Greater Jakarta-Indonesia, Donny Oktavian Syah, Rambat Lupiyoadi, Embun Suryani

The South East Asian Journal of Management

Research Aims: This research aimed to investigate vertical partnerships between Original Equipment Manufacturers (OEMs) and first-tier automotive component firms based on the relationships between technology transfer, technical exchange, government role and supplier performance in the Greater Jakarta area.

Design/Methodology/Approach: A total of 65 respondent firms participated, comprising 6 OEMs and 59 first-tier firms. The research included site visits and interviews with companies based on questionnaires completed by representative individuals from middle management upward with responsibility for assessing product quality (purposive sampling). The questionnaire results were measured using Partial Least Squares Path Modelling (PLS-PM).

Research Findings: The results highlighted significant relationships …


What Has Changed For Top Mba Schools Within A Decade In Terms Of Mindfulness?, Dr. Damla Aktan, Asst. Prof. Nilgün Gürkaynak Oct 2022

What Has Changed For Top Mba Schools Within A Decade In Terms Of Mindfulness?, Dr. Damla Aktan, Asst. Prof. Nilgün Gürkaynak

International Journal for Business Education

The concepts of “mindful consumption” and “sustainability” became indispensable parts of both academia and business life. Based upon an initial research conducted in 2012, this research aims to understand and compare the change within a decade in MBA curricula in terms of mindfulness content inclusion as well as sustainability and ecological orientation. The results compare the evolution of the integration of concepts to curricula since 2012 through the official websites of the top 100 MBA schools of the Financial Times Global Ranking in both 2012 and 2022. The study aims to summarize how the concepts of sustainability, mindful consumption and …


Proceedings Of The Project Management Innovation Annual Conference, Tom Wise Oct 2022

Proceedings Of The Project Management Innovation Annual Conference, Tom Wise

Beyond the Project Horizon: Journal of the Center for Project Management Innovation

The Project Management Innovation Conference brings together professionals, leaders, visionaries, researchers, and students to engage in the topics related to the future of project management. Attendees represent all fields and industries, including government, corporate, and private. Attendee demographics include practitioners, front-line staff, and executive management.


Principles Of Information Security, Alison Hedrick Oct 2022

Principles Of Information Security, Alison Hedrick

KSU Distinguished Course Repository

An introduction to the various technical and administrative aspects of Information Security and Assurance. This course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features.