Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Data mining (2)
- E-commerce (2)
- Education (2)
- Healthcare (2)
- Lanham Act (2)
-
- Social Media (2)
- Trademark (2)
- Aesthetic-abundance (1)
- Agelasto (1)
- Agile (1)
- Analysis (1)
- Analytics (1)
- Analytics Adoption (1)
- And principal component analysis (PCA) (1)
- Application Software (1)
- Archaeologist (1)
- Archiving (1)
- Area Under Curve (1)
- Arrhythmia Research Tech. (1)
- Assessment (1)
- Assistant (1)
- Association rule (1)
- Auction Method (1)
- Bitcoin (1)
- Bob (1)
- Business Benefits (1)
- Business Education (1)
- Business value creation (1)
- CEO turnover (1)
- Car design (1)
- Publication
-
- Journal of International Technology and Information Management (25)
- Journal of Cybersecurity Education, Research and Practice (4)
- Journal of Intellectual Property Law (3)
- Journal of Undergraduate Research (3)
- Utah Law Review (3)
-
- Colby Magazine (2)
- AMBROSIA 客道 : The Magazine of The International Culinary Institute (1)
- International Journal for Business Education (1)
- Proceedings from the Document Academy (1)
- SIGNED: The Magazine of The Hong Kong Design Institute (1)
- The African Journal of Information Systems (1)
- Undergraduate Economic Review (1)
Articles 1 - 30 of 46
Full-Text Articles in Business
Towards An In-Depth Understanding Of Deep Packet Inspection Using A Suite Of Industrial Control Systems Protocol Packets, Guillermo A. Francia Iii, Xavier P. Francia, Anthony M. Pruitt
Towards An In-Depth Understanding Of Deep Packet Inspection Using A Suite Of Industrial Control Systems Protocol Packets, Guillermo A. Francia Iii, Xavier P. Francia, Anthony M. Pruitt
Journal of Cybersecurity Education, Research and Practice
Industrial control systems (ICS) are increasingly at risk and vulnerable to internal and external threats. These systems are integral part of our nation’s critical infrastructures. Consequently, a successful cyberattack on one of these could present disastrous consequences to human life and property as well. It is imperative that cybersecurity professionals gain a good understanding of these systems particularly in the area of communication protocols. Traditional Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are made to encapsulate some of these ICS protocols which may enable malicious payload to get through the network firewall and thus, gain entry into the …
Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia
Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia
Journal of Cybersecurity Education, Research and Practice
The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …
From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth
From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth
Journal of Cybersecurity Education, Research and Practice
Welcome to the second issue of the Journal of Cybersecurity Education, Research and Practice (JCERP).
A Matter Of Taste 味關重要
AMBROSIA 客道 : The Magazine of The International Culinary Institute
Along with Ferran Adria, British chef Heston Blumenthal is the foremost proponent of a scientific approach to cooking that has won him global acclaim for signature dishes like triple cooked chips and white chocolate with caviar, he recently visited Hong Kong where he discovered that the city's local cuisine has much to be admired.
英國大廚Heston Blumenthal是分子廚藝巨匠,與名廚Ferran Adria齊名。他擅於在烹調手法中融入創新的科技元素,其拿手好菜包括三重薯菜(triple cooked chips)和白朱古力配魚子醬(white chocolate with caviar)等。近期,這位創意非凡的廚藝天才造訪香港,並對這座城市的地道美食讚口不絕。
Jitim Volume 25 Issue 3 - Front Page
Jitim Volume 25 Issue 3 - Front Page
Journal of International Technology and Information Management
JITIM volume 25, issue 3
Driving Change
SIGNED: The Magazine of The Hong Kong Design Institute
Chelsia Lau is the chief designer for Ford in Shanghai and is behind some of its biggest projects. We speak to the Hongkonger about the changes in automotive design.
Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang
Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang
Journal of International Technology and Information Management
With the recent advances in computer technology along with pervasive internet accesses, data analytics is getting more attention than ever before. In addition, research areas on data analysis are diverging and integrating lots of different fields such as a business and social sector. Especially, recent researches focus on the data analysis for a better intelligent decision making and prediction system. This paper analyzes data collected from current IT learners who have already studied various IT subjects to find the IT learners’ learning patterns. The most popular learning patterns are identified through an association rule data mining using an arules package …
Holistic Approach: Paradigm Shift In The Research Agenda For Digitalisation Of Healthcare In Sub-Saharan Africa, Tadeusz K. Bara-Slupski
Holistic Approach: Paradigm Shift In The Research Agenda For Digitalisation Of Healthcare In Sub-Saharan Africa, Tadeusz K. Bara-Slupski
The African Journal of Information Systems
Despite significant resources employed in the digitalisation agenda in the healthcare sector in Sub-Saharan Africa, the transformative impact of information and communication technologies has not been realised. This article makes two contributions towards developing an understanding of this failure. First, it provides a review of a rich body of academic literature and practitioner accounts regarding barriers to digitalisation and organises them using an established framework. Second, recognising the continuing struggle that digitalisation presents, it proposes a paradigmatic shift in thinking about barriers to digitalisation and suggests the existence of a more fundamental barrier related to inappropriate incentives within the international …
The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman
The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman
Journal of International Technology and Information Management
Business analytics, defined as the use of data to make better, more relevant, evidence-based business decisions, has received a great deal of attention in practitioner circles. Organizations have adopted business analytics in an effort to improve revenue, product placement, and customer satisfaction. Professional sports teams are no different. While analytics has been used for over 30 years, the use of analytics by professional sports teams is a relatively new concept. However, it is unclear whether the teams that have adopted analytics are seeing any results. If not, then perhaps analytics is not the right solution. Analyses across the four, major …
A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao
A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao
Journal of International Technology and Information Management
This research studies attitude and readiness of STEM majoring and success with
the data from a survey with a total of 501 viable responses, with respect to STEM
(science, technology, engineering, and mathematics) related majors that are
essential and fundamental to skills relevant to big data business analytics.
Recruiting and keeping students in STEM areas have attracted a large body of
attention in pedagogical studies. An effective way of achieving such a goal is to
show them how rewarding and self-fulfilling STEM careers can be toward
perspective students. One example of the abundance of STEM careers is the rapid
growth …
An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris
An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris
Journal of International Technology and Information Management
The explosive growth and rapid proliferation of smartphones and other mobile
devices that access data over communication networks has necessitated advocating
and implementing security constraints for the purpose of abetting safe computing.
Remote data access using mobile devices is particularly popular among students at
institutions of higher education. To ensure safe harbor for constituents, it is
imperative for colleges and universities to establish, disseminate, and enforce
mobile device security artifacts, where artifacts is defined as policies, procedures,
guidelines or other documented or undocumented protocols. The purpose of this
study is to explore the existence of, specific content of, and the …
Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy
Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy
Journal of International Technology and Information Management
The penetration of the internet, smart-phones and tablets has witnessed tremendous increase in the number of people playing online games in the past few years. Social networking site (SNS) games are a subset of digital games. They are platform based, multiplayer and reveal the real identity of the player. These games are hosted on social networks such as Facebook, where in people play with many other players online. The risks associated with social network gaming are addiction, theft, fraud, loneliness, anxiety, aggression, poor academic performance, cognition distortion etc. This study aims to understand the user motivations to continue to play …
Keeping It Physical: Convergence On A Physicality Requirement For Patentability Of Software-Related Inventions Under The European Patent Convention And United States Law, Kevin Afghani, Duke W. Yee
Keeping It Physical: Convergence On A Physicality Requirement For Patentability Of Software-Related Inventions Under The European Patent Convention And United States Law, Kevin Afghani, Duke W. Yee
Journal of Intellectual Property Law
No abstract provided.
Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa
Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa
Journal of International Technology and Information Management
Facebook is one of the world’s leading social networking sites. It is pervasive in students’ lives and can impact their academic careers in a variety of ways. However, little research exists evaluating the use of Facebook in minority academic settings. An early step in this direction is to gain an understanding of how different student demographic groups use Facebook. An interest in further assessment of Facebook’s role in diverse segments of academia motivates the collection and analysis of Facebook-related data from minority serving institutions such as Historically Black Colleges or Universities (HBCUs) and Hispanic Serving Institutions (HSIs). This study presents …
An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong
An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong
Journal of International Technology and Information Management
Drawn upon upper echelon theory and organizational theory, this research proposes to examine the impact of CEO turnover in IT firms on firm performance in terms of both sustainable accounting performance and market performance. We find that CEO turnover is a significant determinant of firm performance, especially in IT firms. This paper contributes to the IS literature by investigating the CEO turnover impact in IT firms compared to other industries. This study also has practical implications by providing the guideline for IT firms on the CEO turnover policy. Such firms should place additional emphasis on their succession planning efforts.
Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown
Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown
Journal of International Technology and Information Management
Assessment is now at the center of the new business education zeitgeist. This focus is the direct result of feedback from the business community regarding the growing gap between their needs and graduates from many business schools. Recently this divide has fallen under even closer scrutiny because of increasing student debt and the growing controversy over return-on- investment. Today business leaders are looking for web-savvy, problem-solving graduates. To this end, AACSB and regional accrediting bodies are calling for the adoption of comprehensive collaborative learning strategies to better align graduates’ skill sets with the real needs of business. Crowdsourcing, which is …
Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar
Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar
Journal of International Technology and Information Management
The rapid adoption of IT governance (ITG) frameworks in organizations worldwide, along with the subsequent need to select and integrate overlapping ITG frameworks has presented practitioners with challenges in choice and integration of frameworks. In this respect, the purpose of this study was to explore the ITG frameworks integration (ITGFI) challenges faced by organizations worldwide; develop and test a theory-based integrated ITG challenges (IIC) taxonomy model created from extant literature; and validate and compare these with those empirically extracted from three case studies in the United Arab Emirates (UAE). The results present the audience with a taxonomy of a prioritized …
Privacy And The Information Age: A Longitudinal View, Charles E. Downing
Privacy And The Information Age: A Longitudinal View, Charles E. Downing
Journal of International Technology and Information Management
As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? …
Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee
Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee
Journal of International Technology and Information Management
Using the data collected from several universities in China and the United States, which have drastically different piracy rates, economic development stages, income levels, and national cultures, this study aims to identify which demographic factors affect software piracy significantly. Totally, the dataset includes 600 valid responses. Multivariate data analysis, supported by Multivariate Analysis of Variance and Turkey’s test, reveals that among various factors, country difference and gender most significantly influence software piracy. In addition, this study offers recommendations on how to curb software piracy effectively.
Using A Virtual Computing Laboratory To Foster Collaborative Learning For Information Security And Information Technology Education, Abdullah Konak, Michael R. Bartolacci
Using A Virtual Computing Laboratory To Foster Collaborative Learning For Information Security And Information Technology Education, Abdullah Konak, Michael R. Bartolacci
Journal of Cybersecurity Education, Research and Practice
Virtual computer laboratories have been an excellent technological solution to the problem of providing students with hands-on experimentation in information technology fields such as information security in a cost effective and secure manner. A virtual computer laboratory was utilized in this work as a collaborative environment for student learning with the goal of measuring its effect on student learning and attitudes toward laboratory assignments. Experiments were carried out utilizing specially-designed computer-based laboratory activities that included student assessments and surveys upon their completion. The experiments involved both small groups and individual students completing their respective laboratory activities and subsequent assessments/surveys. …
An Alternate Functionality Reality, Harold R. Weinberg
An Alternate Functionality Reality, Harold R. Weinberg
Journal of Intellectual Property Law
The Supreme Court last addressed trade dress law’s functionality doctrine in TrafFix Devices, Inc. v. Marketing Displays, Inc. decided in 2001. This article applies content analysis to data from post-TrafFix functionality cases to provide insights concerning the functionality doctrine. It emphasizes data from cases concerning motions for summary judgment and preliminary injunction. The analysis employs two conceptual constructs: a “useful/aesthetic continuum” and “mixed-character” design features. The article also considers data in light of a “two-bar mandate” and two principles: “useful-scarcity” and “aesthetic-abundance.” It concludes with observations concerning the post-TrafFix functionality doctrine and suggestions for improving its judicial …
Confusion Codified: Why Trademark Remedies Make No Sense, Mark A. Thurmon
Confusion Codified: Why Trademark Remedies Make No Sense, Mark A. Thurmon
Journal of Intellectual Property Law
No abstract provided.
2016 Ijbe Front Matter, Tamra Connor
2016 Ijbe Front Matter, Tamra Connor
International Journal for Business Education
- Editorial Board
- President's Letter
- SIEC-ISBE International
Network Of Sensing Environment (N.O.S.E.), Kuo-Chih Lo, Derek Hansen
Network Of Sensing Environment (N.O.S.E.), Kuo-Chih Lo, Derek Hansen
Journal of Undergraduate Research
About two years ago, there is a huge explosion that killed many people, most of them are fire fighters, in Kaohsiung City, Taiwan R.O.C. Therefore I come up with the sensor new work idea, aka N.O.S.E Project. This project is formed by sensor combo network. Any sensors that can turn the environment into data can be consider as part of the network.
Designing Consumer Furniture For A Positive Mental Well-Being, Nichole Cross, David Morgan
Designing Consumer Furniture For A Positive Mental Well-Being, Nichole Cross, David Morgan
Journal of Undergraduate Research
Currently there are several common considerations to factor in when designing furniture for the consumer market such as ergonomics, color trends, manufacturability, materials, regulatory standards, shipping costs, economic forecasts, etc. The objective of this exploration was to research the psychological effects of design elements, such as color and texture, for the purposes of applying lessons learned to the design of furniture that contributes to a positive emotional state.
Natural Movement As Input To A Virtual World, Kyle Bryant, Derek Hansen
Natural Movement As Input To A Virtual World, Kyle Bryant, Derek Hansen
Journal of Undergraduate Research
With Facebook’s recent acquisition of Oculus Rift, the virtual reality (VR) craze has left the den of nerds and tech enthusiasts and gone mainstream. Sony, Steam, and other big name companies’ pledges to develop their own VR platforms have further confirmed the coming of VR to every-home USA. However, this dream may still be far off, with each company’s desires to create its own usually costly and complex solution. All of these companies are not only currently lacking VR experiences to demonstrate, but those that do currently exist require the user to move and interact in the game using a …
Flying Past, Present, And Future, Gerry Boyle
Flying Past, Present, And Future, Gerry Boyle
Colby Magazine
The story is about Peter Agelasto ’96 and his groundbreaking digital-archiving work for Bob Dylan and others. Peter Agelasto thinks like an archaeologist to help Bob Dylan and others preserve their legacies.
From The Classroom To The Bigs: Dan Meyer's Analytical Skills Are In Demand In Major League Baseball, Gerry Boyle
From The Classroom To The Bigs: Dan Meyer's Analytical Skills Are In Demand In Major League Baseball, Gerry Boyle
Colby Magazine
No abstract provided.
Exploring Economic And Social Factors That Increase Economic And Well-Being Measurements Of Developing And Developed Countries, Kofi D. Boadu
Exploring Economic And Social Factors That Increase Economic And Well-Being Measurements Of Developing And Developed Countries, Kofi D. Boadu
Undergraduate Economic Review
The historical growth paths of developed and developing countries reveal the challenges that developing countries face in traveling the road from poverty to prosperity. Based on economic development literature, economic theory, and ordinary least squares (OLS) regression method, this research considers whether or not, and to what extent globalization characteristics, foreign direct investment levels (FDI), secondary school enrollment rates, information communication technology (ICT) as a percentage of trade imports, and happiness levels of 103 developing and developed countries, impact their GDP per capita levels. This paper will also take a look at alternative ways of viewing and measuring economic success.
Digital Engagement: Personality Is The Context Of The Text, Diane C. Spencer-Scarr
Digital Engagement: Personality Is The Context Of The Text, Diane C. Spencer-Scarr
Proceedings from the Document Academy
This paper examines digital-technology as a tool and an environment with the individuals’ personality at the intersection of the two: Its impact on social memory and the unbound document. With the ubiquitous embedding of digital networked technology in society and the emergence of the unbounded document, humans increasingly obtain information by grasping snippets of decontextualized text sourced through non-human entities from globally dispersed databases that have stripped out context. Then in a Kafkian way humans’ have to build from the middle to make sense of the information snippets. The paper explores how the inherent nature of the individual can be …