Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation

2016

Journal

Institution
Keyword
Publication

Articles 1 - 30 of 46

Full-Text Articles in Business

Towards An In-Depth Understanding Of Deep Packet Inspection Using A Suite Of Industrial Control Systems Protocol Packets, Guillermo A. Francia Iii, Xavier P. Francia, Anthony M. Pruitt Dec 2016

Towards An In-Depth Understanding Of Deep Packet Inspection Using A Suite Of Industrial Control Systems Protocol Packets, Guillermo A. Francia Iii, Xavier P. Francia, Anthony M. Pruitt

Journal of Cybersecurity Education, Research and Practice

Industrial control systems (ICS) are increasingly at risk and vulnerable to internal and external threats. These systems are integral part of our nation’s critical infrastructures. Consequently, a successful cyberattack on one of these could present disastrous consequences to human life and property as well. It is imperative that cybersecurity professionals gain a good understanding of these systems particularly in the area of communication protocols. Traditional Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are made to encapsulate some of these ICS protocols which may enable malicious payload to get through the network firewall and thus, gain entry into the …


Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia Dec 2016

Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia

Journal of Cybersecurity Education, Research and Practice

The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …


From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth Dec 2016

From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth

Journal of Cybersecurity Education, Research and Practice

Welcome to the second issue of the Journal of Cybersecurity Education, Research and Practice (JCERP).


A Matter Of Taste 味關重要 Nov 2016

A Matter Of Taste 味關重要

AMBROSIA 客道 : The Magazine of The International Culinary Institute

Along with Ferran Adria, British chef Heston Blumenthal is the foremost proponent of a scientific approach to cooking that has won him global acclaim for signature dishes like triple cooked chips and white chocolate with caviar, he recently visited Hong Kong where he discovered that the city's local cuisine has much to be admired.

英國大廚Heston Blumenthal是分子廚藝巨匠,與名廚Ferran Adria齊名。他擅於在烹調手法中融入創新的科技元素,其拿手好菜包括三重薯菜(triple cooked chips)和白朱古力配魚子醬(white chocolate with caviar)等。近期,這位創意非凡的廚藝天才造訪香港,並對這座城市的地道美食讚口不絕。


Jitim Volume 25 Issue 3 - Front Page Nov 2016

Jitim Volume 25 Issue 3 - Front Page

Journal of International Technology and Information Management

JITIM volume 25, issue 3


Driving Change Oct 2016

Driving Change

SIGNED: The Magazine of The Hong Kong Design Institute

Chelsia Lau is the chief designer for Ford in Shanghai and is behind some of its biggest projects. We speak to the Hongkonger about the changes in automotive design.


Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang Oct 2016

Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang

Journal of International Technology and Information Management

With the recent advances in computer technology along with pervasive internet accesses, data analytics is getting more attention than ever before. In addition, research areas on data analysis are diverging and integrating lots of different fields such as a business and social sector. Especially, recent researches focus on the data analysis for a better intelligent decision making and prediction system. This paper analyzes data collected from current IT learners who have already studied various IT subjects to find the IT learners’ learning patterns. The most popular learning patterns are identified through an association rule data mining using an arules package …


Holistic Approach: Paradigm Shift In The Research Agenda For Digitalisation Of Healthcare In Sub-Saharan Africa, Tadeusz K. Bara-Slupski Oct 2016

Holistic Approach: Paradigm Shift In The Research Agenda For Digitalisation Of Healthcare In Sub-Saharan Africa, Tadeusz K. Bara-Slupski

The African Journal of Information Systems

Despite significant resources employed in the digitalisation agenda in the healthcare sector in Sub-Saharan Africa, the transformative impact of information and communication technologies has not been realised. This article makes two contributions towards developing an understanding of this failure. First, it provides a review of a rich body of academic literature and practitioner accounts regarding barriers to digitalisation and organises them using an established framework. Second, recognising the continuing struggle that digitalisation presents, it proposes a paradigmatic shift in thinking about barriers to digitalisation and suggests the existence of a more fundamental barrier related to inappropriate incentives within the international …


The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman Oct 2016

The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman

Journal of International Technology and Information Management

Business analytics, defined as the use of data to make better, more relevant, evidence-based business decisions, has received a great deal of attention in practitioner circles. Organizations have adopted business analytics in an effort to improve revenue, product placement, and customer satisfaction. Professional sports teams are no different. While analytics has been used for over 30 years, the use of analytics by professional sports teams is a relatively new concept. However, it is unclear whether the teams that have adopted analytics are seeing any results. If not, then perhaps analytics is not the right solution. Analyses across the four, major …


A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao Oct 2016

A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao

Journal of International Technology and Information Management

This research studies attitude and readiness of STEM majoring and success with

the data from a survey with a total of 501 viable responses, with respect to STEM

(science, technology, engineering, and mathematics) related majors that are

essential and fundamental to skills relevant to big data business analytics.

Recruiting and keeping students in STEM areas have attracted a large body of

attention in pedagogical studies. An effective way of achieving such a goal is to

show them how rewarding and self-fulfilling STEM careers can be toward

perspective students. One example of the abundance of STEM careers is the rapid

growth …


An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris Oct 2016

An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris

Journal of International Technology and Information Management

The explosive growth and rapid proliferation of smartphones and other mobile

devices that access data over communication networks has necessitated advocating

and implementing security constraints for the purpose of abetting safe computing.

Remote data access using mobile devices is particularly popular among students at

institutions of higher education. To ensure safe harbor for constituents, it is

imperative for colleges and universities to establish, disseminate, and enforce

mobile device security artifacts, where artifacts is defined as policies, procedures,

guidelines or other documented or undocumented protocols. The purpose of this

study is to explore the existence of, specific content of, and the …


Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy Oct 2016

Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy

Journal of International Technology and Information Management

The penetration of the internet, smart-phones and tablets has witnessed tremendous increase in the number of people playing online games in the past few years. Social networking site (SNS) games are a subset of digital games. They are platform based, multiplayer and reveal the real identity of the player. These games are hosted on social networks such as Facebook, where in people play with many other players online. The risks associated with social network gaming are addiction, theft, fraud, loneliness, anxiety, aggression, poor academic performance, cognition distortion etc. This study aims to understand the user motivations to continue to play …


Keeping It Physical: Convergence On A Physicality Requirement For Patentability Of Software-Related Inventions Under The European Patent Convention And United States Law, Kevin Afghani, Duke W. Yee Sep 2016

Keeping It Physical: Convergence On A Physicality Requirement For Patentability Of Software-Related Inventions Under The European Patent Convention And United States Law, Kevin Afghani, Duke W. Yee

Journal of Intellectual Property Law

No abstract provided.


Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa Jul 2016

Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa

Journal of International Technology and Information Management

Facebook is one of the world’s leading social networking sites. It is pervasive in students’ lives and can impact their academic careers in a variety of ways. However, little research exists evaluating the use of Facebook in minority academic settings. An early step in this direction is to gain an understanding of how different student demographic groups use Facebook. An interest in further assessment of Facebook’s role in diverse segments of academia motivates the collection and analysis of Facebook-related data from minority serving institutions such as Historically Black Colleges or Universities (HBCUs) and Hispanic Serving Institutions (HSIs). This study presents …


An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong Jul 2016

An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong

Journal of International Technology and Information Management

Drawn upon upper echelon theory and organizational theory, this research proposes to examine the impact of CEO turnover in IT firms on firm performance in terms of both sustainable accounting performance and market performance. We find that CEO turnover is a significant determinant of firm performance, especially in IT firms. This paper contributes to the IS literature by investigating the CEO turnover impact in IT firms compared to other industries. This study also has practical implications by providing the guideline for IT firms on the CEO turnover policy. Such firms should place additional emphasis on their succession planning efforts.


Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown Jul 2016

Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown

Journal of International Technology and Information Management

Assessment is now at the center of the new business education zeitgeist. This focus is the direct result of feedback from the business community regarding the growing gap between their needs and graduates from many business schools. Recently this divide has fallen under even closer scrutiny because of increasing student debt and the growing controversy over return-on- investment. Today business leaders are looking for web-savvy, problem-solving graduates. To this end, AACSB and regional accrediting bodies are calling for the adoption of comprehensive collaborative learning strategies to better align graduates’ skill sets with the real needs of business. Crowdsourcing, which is …


Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar Jul 2016

Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar

Journal of International Technology and Information Management

The rapid adoption of IT governance (ITG) frameworks in organizations worldwide, along with the subsequent need to select and integrate overlapping ITG frameworks has presented practitioners with challenges in choice and integration of frameworks. In this respect, the purpose of this study was to explore the ITG frameworks integration (ITGFI) challenges faced by organizations worldwide; develop and test a theory-based integrated ITG challenges (IIC) taxonomy model created from extant literature; and validate and compare these with those empirically extracted from three case studies in the United Arab Emirates (UAE). The results present the audience with a taxonomy of a prioritized …


Privacy And The Information Age: A Longitudinal View, Charles E. Downing Jul 2016

Privacy And The Information Age: A Longitudinal View, Charles E. Downing

Journal of International Technology and Information Management

As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? …


Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee Jul 2016

Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee

Journal of International Technology and Information Management

Using the data collected from several universities in China and the United States, which have drastically different piracy rates, economic development stages, income levels, and national cultures, this study aims to identify which demographic factors affect software piracy significantly. Totally, the dataset includes 600 valid responses. Multivariate data analysis, supported by Multivariate Analysis of Variance and Turkey’s test, reveals that among various factors, country difference and gender most significantly influence software piracy. In addition, this study offers recommendations on how to curb software piracy effectively.


Using A Virtual Computing Laboratory To Foster Collaborative Learning For Information Security And Information Technology Education, Abdullah Konak, Michael R. Bartolacci Jun 2016

Using A Virtual Computing Laboratory To Foster Collaborative Learning For Information Security And Information Technology Education, Abdullah Konak, Michael R. Bartolacci

Journal of Cybersecurity Education, Research and Practice

Virtual computer laboratories have been an excellent technological solution to the problem of providing students with hands-on experimentation in information technology fields such as information security in a cost effective and secure manner. A virtual computer laboratory was utilized in this work as a collaborative environment for student learning with the goal of measuring its effect on student learning and attitudes toward laboratory assignments. Experiments were carried out utilizing specially-designed computer-based laboratory activities that included student assessments and surveys upon their completion. The experiments involved both small groups and individual students completing their respective laboratory activities and subsequent assessments/surveys. …


An Alternate Functionality Reality, Harold R. Weinberg Jun 2016

An Alternate Functionality Reality, Harold R. Weinberg

Journal of Intellectual Property Law

The Supreme Court last addressed trade dress law’s functionality doctrine in TrafFix Devices, Inc. v. Marketing Displays, Inc. decided in 2001. This article applies content analysis to data from post-TrafFix functionality cases to provide insights concerning the functionality doctrine. It emphasizes data from cases concerning motions for summary judgment and preliminary injunction. The analysis employs two conceptual constructs: a “useful/aesthetic continuum” and “mixed-character” design features. The article also considers data in light of a “two-bar mandate” and two principles: “useful-scarcity” and “aesthetic-abundance.” It concludes with observations concerning the post-TrafFix functionality doctrine and suggestions for improving its judicial …


Confusion Codified: Why Trademark Remedies Make No Sense, Mark A. Thurmon Jun 2016

Confusion Codified: Why Trademark Remedies Make No Sense, Mark A. Thurmon

Journal of Intellectual Property Law

No abstract provided.


2016 Ijbe Front Matter, Tamra Connor Apr 2016

2016 Ijbe Front Matter, Tamra Connor

International Journal for Business Education

  1. Editorial Board
  2. President's Letter
  3. SIEC-ISBE International


Network Of Sensing Environment (N.O.S.E.), Kuo-Chih Lo, Derek Hansen Feb 2016

Network Of Sensing Environment (N.O.S.E.), Kuo-Chih Lo, Derek Hansen

Journal of Undergraduate Research

About two years ago, there is a huge explosion that killed many people, most of them are fire fighters, in Kaohsiung City, Taiwan R.O.C. Therefore I come up with the sensor new work idea, aka N.O.S.E Project. This project is formed by sensor combo network. Any sensors that can turn the environment into data can be consider as part of the network.


Designing Consumer Furniture For A Positive Mental Well-Being, Nichole Cross, David Morgan Jan 2016

Designing Consumer Furniture For A Positive Mental Well-Being, Nichole Cross, David Morgan

Journal of Undergraduate Research

Currently there are several common considerations to factor in when designing furniture for the consumer market such as ergonomics, color trends, manufacturability, materials, regulatory standards, shipping costs, economic forecasts, etc. The objective of this exploration was to research the psychological effects of design elements, such as color and texture, for the purposes of applying lessons learned to the design of furniture that contributes to a positive emotional state.


Natural Movement As Input To A Virtual World, Kyle Bryant, Derek Hansen Jan 2016

Natural Movement As Input To A Virtual World, Kyle Bryant, Derek Hansen

Journal of Undergraduate Research

With Facebook’s recent acquisition of Oculus Rift, the virtual reality (VR) craze has left the den of nerds and tech enthusiasts and gone mainstream. Sony, Steam, and other big name companies’ pledges to develop their own VR platforms have further confirmed the coming of VR to every-home USA. However, this dream may still be far off, with each company’s desires to create its own usually costly and complex solution. All of these companies are not only currently lacking VR experiences to demonstrate, but those that do currently exist require the user to move and interact in the game using a …


Flying Past, Present, And Future, Gerry Boyle Jan 2016

Flying Past, Present, And Future, Gerry Boyle

Colby Magazine

The story is about Peter Agelasto ’96 and his groundbreaking digital-archiving work for Bob Dylan and others. Peter Agelasto thinks like an archaeologist to help Bob Dylan and others preserve their legacies.


From The Classroom To The Bigs: Dan Meyer's Analytical Skills Are In Demand In Major League Baseball, Gerry Boyle Jan 2016

From The Classroom To The Bigs: Dan Meyer's Analytical Skills Are In Demand In Major League Baseball, Gerry Boyle

Colby Magazine

No abstract provided.


Exploring Economic And Social Factors That Increase Economic And Well-Being Measurements Of Developing And Developed Countries, Kofi D. Boadu Jan 2016

Exploring Economic And Social Factors That Increase Economic And Well-Being Measurements Of Developing And Developed Countries, Kofi D. Boadu

Undergraduate Economic Review

The historical growth paths of developed and developing countries reveal the challenges that developing countries face in traveling the road from poverty to prosperity. Based on economic development literature, economic theory, and ordinary least squares (OLS) regression method, this research considers whether or not, and to what extent globalization characteristics, foreign direct investment levels (FDI), secondary school enrollment rates, information communication technology (ICT) as a percentage of trade imports, and happiness levels of 103 developing and developed countries, impact their GDP per capita levels. This paper will also take a look at alternative ways of viewing and measuring economic success.


Digital Engagement: Personality Is The Context Of The Text, Diane C. Spencer-Scarr Jan 2016

Digital Engagement: Personality Is The Context Of The Text, Diane C. Spencer-Scarr

Proceedings from the Document Academy

This paper examines digital-technology as a tool and an environment with the individuals’ personality at the intersection of the two: Its impact on social memory and the unbound document. With the ubiquitous embedding of digital networked technology in society and the emergence of the unbounded document, humans increasingly obtain information by grasping snippets of decontextualized text sourced through non-human entities from globally dispersed databases that have stripped out context. Then in a Kafkian way humans’ have to build from the middle to make sense of the information snippets. The paper explores how the inherent nature of the individual can be …