Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation

2016

Institution
Keyword
Publication
Publication Type
File Type

Articles 31 - 60 of 247

Full-Text Articles in Business

Design, Implementation, And Evaluation Of A User Training Program For Integrating Health Information Technology Into Clinical Processes, Ze He Nov 2016

Design, Implementation, And Evaluation Of A User Training Program For Integrating Health Information Technology Into Clinical Processes, Ze He

Doctoral Dissertations

Health information technology (IT) implementation can be costly, and remains a challenging problem with mixed outcomes on patient safety and quality of care. Systems engineering and IT management experts have advocated the use of sociotechnical models to understand the impact of health IT on user and organizational factors. Sociotechnical models suggest the need for user-centered implementation approaches, such as user training and support, and focus on processes to mitigate the negative impact and facilitate optimal IT use during training. The training design and development should also follow systematic processes guided by instructional development models. It should take into account of …


A Matter Of Taste 味關重要 Nov 2016

A Matter Of Taste 味關重要

AMBROSIA 客道 : The Magazine of The International Culinary Institute

Along with Ferran Adria, British chef Heston Blumenthal is the foremost proponent of a scientific approach to cooking that has won him global acclaim for signature dishes like triple cooked chips and white chocolate with caviar, he recently visited Hong Kong where he discovered that the city's local cuisine has much to be admired.

英國大廚Heston Blumenthal是分子廚藝巨匠,與名廚Ferran Adria齊名。他擅於在烹調手法中融入創新的科技元素,其拿手好菜包括三重薯菜(triple cooked chips)和白朱古力配魚子醬(white chocolate with caviar)等。近期,這位創意非凡的廚藝天才造訪香港,並對這座城市的地道美食讚口不絕。


Invitation Strategy For Cutting Edge Industries Through Mncs And Global Talents: The Case Of Singapore, Kim Song Tan Nov 2016

Invitation Strategy For Cutting Edge Industries Through Mncs And Global Talents: The Case Of Singapore, Kim Song Tan

Research Collection School Of Economics

Singapore presents an interesting case of how a country achieves dynamic economic development and innovation through the "invitation" strategy of a business hub. Despite being a small city-state with limited domestic market size and no meaningful hinterland or natural resources to speak of, Singapore has managed to transform its economy dramatically over the past 50 years by leveraging the strengths of other economies. Specifically, it has been able to attract (or "invite") various types of productive resources, including foreign capital, foreign technology and foreign workers (both skilled and unskilled) to make up for what it lacks. This has helped Singapore …


Jitim Volume 25 Issue 3 - Front Page Nov 2016

Jitim Volume 25 Issue 3 - Front Page

Journal of International Technology and Information Management

JITIM volume 25, issue 3


Designing And Evaluating Business Process Models: An Experimental Approach, Yuecheng Martin Yu, Alexander Pelaez, Karl R. Lang Nov 2016

Designing And Evaluating Business Process Models: An Experimental Approach, Yuecheng Martin Yu, Alexander Pelaez, Karl R. Lang

Research Collection School Of Computing and Information Systems

This paper presents an experimental approach to compare the performance of alternative business process designs. We use an example case of an electronic group buying setting to demonstrate how our approach can be applied in practice. More specifically, we chose a standard business process, the sales process as implemented on a group buying platform, to illustrate how a business process may be redesigned in order to better meet the needs of customers. For that purpose, we introduce a social technology feature to support cooperation among buyers in the sales process and then analyze the performance impact of the proposed business …


Informal Institutions And The Geography Of Innovation: An Integrative Perspective, Xuesong Geng, Kenneth G. Huang Nov 2016

Informal Institutions And The Geography Of Innovation: An Integrative Perspective, Xuesong Geng, Kenneth G. Huang

Research Collection Lee Kong Chian School Of Business

Integrating the insights from both institutional theory and economic geography, we develop a new conceptual framework to explain how formal and informal institutions in developing countries influence knowledge exchanges within and across geographical locations, thus affecting entrepreneurs’ and firms’ innovative behaviors and outputs. We suggest that the prevalence of informal institutions in developing countries increases the importance of geographic proximity for knowledge exchanges. At the same time, informal institutions provide alternative channels for maintaining non-local social interactions that facilitate knowledge exchanges among geographically distant firms. Using China as the context, we provide theoretical propositions that illustrate these mechanisms in terms …


Driving Change Oct 2016

Driving Change

SIGNED: The Magazine of The Hong Kong Design Institute

Chelsia Lau is the chief designer for Ford in Shanghai and is behind some of its biggest projects. We speak to the Hongkonger about the changes in automotive design.


Exploring Public Values Implications Of The I-Corps Program, Jan Youtie, Philip Shapira Oct 2016

Exploring Public Values Implications Of The I-Corps Program, Jan Youtie, Philip Shapira

Philip Shapira

This paper examines how the concept of public values can be operationalized in an ongoing public initiative to stimulate innovation in an emerging technology. Our study focuses on Innovation Corps (I-Corps)—a program initiated in 2011 by the National Science Foundation (NSF) to accelerate the process of commercializing science-driven discoveries. The I-Corps method has since spread rapidly across multiple US agencies. Separately, there has also been heightened attention to the early anticipation and mitigation of the implications of emerging science and technology. Drawing on the case of nanotechnology, the paper considers how public values related to nanotechnology commercialization can be integrated …


Implications Of Social Media Use On Instruction And Student Learning: An Exploratory Study, Mayur S. Desai, Lucy Ojode Oct 2016

Implications Of Social Media Use On Instruction And Student Learning: An Exploratory Study, Mayur S. Desai, Lucy Ojode

Southwestern Business Administration Teaching Conference

In this paper we explore the use of social media on the content delivery aspects of instruction and potential impacts on student learning. It is our conjecture that impacts of social media use might depend on factors such as the interface of particular medium and learning style, teaching style and instructor skill, and the demographics of students and their instructors. We propose a framework that links instructor to students through social media. That is, social media becomes a channel though which learning occurs. Classifying multimedia technology as tools and social media as interactive Web 2.0 Internet-based applications, we employ …


Cloud-Based Learning Tools: Supporting The Invisible Learner (Silent Sufferers) With Socioeconomic Challenges, Lynita A. Robinson Emba, Jimmy Johnson Oct 2016

Cloud-Based Learning Tools: Supporting The Invisible Learner (Silent Sufferers) With Socioeconomic Challenges, Lynita A. Robinson Emba, Jimmy Johnson

Southwestern Business Administration Teaching Conference

Today's students are learning at unprecedented speeds. There are a pockets of learners who may be isolated/silent sufferers who face tremendous socioeconomic challenges while seeking higher education. Providing cloud-based technology solutions to strengthen support services and family learning engagement through a series of student family portals will provide the support needed to make student learning opportunities family-based projects or community-based projects successful in graduation completion rates and job placement opportunities.


Architectural Intervention: The Resilient Community Center, Matthew A. Baumgartner Oct 2016

Architectural Intervention: The Resilient Community Center, Matthew A. Baumgartner

ASA Multidisciplinary Research Symposium

In the city of Centralia, Illinois, several issues govern the city’s future, all stemming from the same major problem: the economy. To intervene, this community center proposal aims to encourage economic development and growth in the city, assisting small businesses with starting and expanding in the region.


Utilizing The Technology Acceptance Model To Assess The Employee Adoption Of Information Systems Security Measures, Cynthia M. Jones, Richard V. Mccarthy, Leila Halawi, Bahaudin Mujtaba Oct 2016

Utilizing The Technology Acceptance Model To Assess The Employee Adoption Of Information Systems Security Measures, Cynthia M. Jones, Richard V. Mccarthy, Leila Halawi, Bahaudin Mujtaba

Leila A. Halawi

In this study, the factors that affect employee acceptance of information systems security measures were examined by extending the Technology Acceptance Model. Partial least squares structural equation modeling was applied to examine these factors. 174 valid responses from employees from companies in various industry segments in the United States and Canada were analyzed. The results of the statistical analysis indicate that subjective norm moderated by management support showed the strongest effect on intention to use information systems security measures.


Resource-Based View Of Knowledge Management For Competitive Advantage, Leila A. Halawi, Jay E. Aronson, Richard V. Mccarthy Oct 2016

Resource-Based View Of Knowledge Management For Competitive Advantage, Leila A. Halawi, Jay E. Aronson, Richard V. Mccarthy

Leila A. Halawi

We are not only in a new millennium, but also in a new era: the knowledge era. Sustainable competitive advantage is dependent on building and exploiting core competencies. The resource-based view (RBV) of the firm defines a strategic asset as one that is rare, valuable, imperfectly imitiable and non-substitutable. Knowledge is seen as a strategic asset with the potential to be a source of competitive advantage for an organization. In this paper, we provide a model that examines how and why knowledge management (KM) can be sued to create competitive advantage from the RBV of the firm.


Which Theory Applies: An Analysis Of Information Systems Research, Leila Halawi, Richard Mccarthy Oct 2016

Which Theory Applies: An Analysis Of Information Systems Research, Leila Halawi, Richard Mccarthy

Leila A. Halawi

Research in information systems has rapidly expanded during its relatively brief existence. IT offers organizations a fundamental decision-enhancing environment that extends new opportunities, therefore producing thriving, competitive firms, adding business value and offering valuable products and services to customers. Research within the IT domain has produced several new theories, some of which have been used to help explain and predict end-user use of technologies. We provide a comprehensive overview of the major IT theories and review their theoretical fundamentals.


The Relationship Of E-Commerce Readiness To Technology Acceptance: The Case Of Barbados, Jude E. Edwards, Leila A. Halawi, Richard Mccarthy Oct 2016

The Relationship Of E-Commerce Readiness To Technology Acceptance: The Case Of Barbados, Jude E. Edwards, Leila A. Halawi, Richard Mccarthy

Leila A. Halawi

This is an exploratory study that examines the relationship between selected components of ecommerce readiness and dimensions of Davis’ (1989) Technology Acceptance Model. Building upon the notion that there exists some linkage between ecommerce readiness and technology Acceptance, this study seeks to examine these linkages in e-businesses within Barbados. Three relationships are proposed – a relationship between technology acceptance and the existing e-Readiness infrastructure, a relationship between technology acceptance and current telecommunications access, and a relationship between technology acceptance and education. The results of this study demonstrated that there are strong relationships between e-commerce readiness components and various technology acceptance …


Promoting Innovation And High-Tech Entrepreneurship In Historically Black Colleges And Universities: An Exploratory Research, Bivek Adhikari, Alexis Bliese, Elon Davis, Leila Halawi Oct 2016

Promoting Innovation And High-Tech Entrepreneurship In Historically Black Colleges And Universities: An Exploratory Research, Bivek Adhikari, Alexis Bliese, Elon Davis, Leila Halawi

Leila A. Halawi

This study explores the current state of innovation and high-tech entrepreneurial initiatives in Historically Black Colleges and Universities (HBCUs). Previous research showed that institutions’ environment, faculty empowerment, organizational trust, early stage capital, innovation centers and innovative teaching practice had a major effect to support innovation and foster tech-entrepreneurship. We present our conceptual model. The final section explains the current state of research and implications for future research are discussed.


Transdisciplinary Collaborative Learning: Design, Practices, And Experience With Telepresence, Robotics, And Makerspaces, Nick Swayne, Kevin Giovanetti Ph.D., Fred Briggs, Patrice Ludwig Ph.D., Sean Ronan Mccarthy Ph.D., Michele Estes Ph.D., Audrey J. Burnett, Juhong Christie Liu Ph.D. Oct 2016

Transdisciplinary Collaborative Learning: Design, Practices, And Experience With Telepresence, Robotics, And Makerspaces, Nick Swayne, Kevin Giovanetti Ph.D., Fred Briggs, Patrice Ludwig Ph.D., Sean Ronan Mccarthy Ph.D., Michele Estes Ph.D., Audrey J. Burnett, Juhong Christie Liu Ph.D.

Libraries

Using a variety of media and case studies, the panel address the adoption and use of technologies such as robotics, telepresence, and makerspaces for trans-disciplinary learning that has initiated significant grassroots change within the institution. The analysis of teaching and learning strategies shows promise of supporting deep learning for students, a scholarship of teaching and learning for faculty, and conceptualization of a change agent. A vision for the future will be explored with audience.


Publishing Makerspace: A New Approach To Scholarly Publishing, Sylvia K. Miller, David Phillips, Courtney Berger, Marjorie Fowler, Rebecca Kennison, John D. Martin Iii, John Mcleod, Chelcie Rowell Oct 2016

Publishing Makerspace: A New Approach To Scholarly Publishing, Sylvia K. Miller, David Phillips, Courtney Berger, Marjorie Fowler, Rebecca Kennison, John D. Martin Iii, John Mcleod, Chelcie Rowell

Charleston Library Conference

This article describes the concept of the Publishing Makerspace, which is a publishing environment that is reconfigured as a place where all the components of a scholarly project—books and e‐books, virtual and physical exhibits, visualizations, live performance and film—can be integrated using a collaborative process. This place enables the creation of a multimodal publishing environment that fully integrates digital content with manuscripts and “traditional” scholarly content. Starting with an overview of the history of the team that devised this approach and its membership, the article describes the problem that the authors have identified with current approaches to multimodal publishing and …


Integrate Text Mining Into Computer And Information Security Education, Hongmei Chi, Ezhil Kalaimannan, Dominique Hubbard Oct 2016

Integrate Text Mining Into Computer And Information Security Education, Hongmei Chi, Ezhil Kalaimannan, Dominique Hubbard

KSU Proceedings on Cybersecurity Education, Research and Practice

Insider threats has become a significant challenge to organization, due to the employees varying levels of access to the internal network. This will intern bypass the external security measures that have been put in place to protect the organization’s resources. Computer-mediated communication (CMC) is a form of communication over virtual spaces where users cannot see each other. CMC includes email and communication over social networks, amongst others. This paper focuses on the design and implementation of exercise modules, which can be integrated into cybersecurity courses. The main objectives of the paper include how to teach and integrate the CMC learning …


Cover Text Steganography: N-Gram And Entropy-Based Approach, Sara M. Rico-Larmer Oct 2016

Cover Text Steganography: N-Gram And Entropy-Based Approach, Sara M. Rico-Larmer

KSU Proceedings on Cybersecurity Education, Research and Practice

Steganography is an ancient technique for hiding a secret message within ordinary looking messages or objects (e.g., images), also known as cover messages. Among various techniques, hiding text data in plain text file is a challenging task due to lack of redundant information. This paper proposes two new approaches to embed a secret message in a cover text document. The two approaches are n-gram and entropy metric-based generation of stego text. We provide examples of encoding secret messages in a cover text document followed by an initial evaluation of how well stego texts look close to the plain …


Hands-On Labs Demonstrating Html5 Security Concerns, Mounika Vanamala Oct 2016

Hands-On Labs Demonstrating Html5 Security Concerns, Mounika Vanamala

KSU Proceedings on Cybersecurity Education, Research and Practice

The research is focused on the new features added in HTML5 standard that have strong implications towards the overall information security of a system that uses this implementation.A Hands-on Lab is developed to demonstrate how Web Storage and the Geo-location API of HTML5 can affect the privacy of the user.


“Not All Friends Are Equal”: Friendship Classification For Defending Against Social Engineering Attacks, Munene W. Kanampiu, Mohd Anwar Oct 2016

“Not All Friends Are Equal”: Friendship Classification For Defending Against Social Engineering Attacks, Munene W. Kanampiu, Mohd Anwar

KSU Proceedings on Cybersecurity Education, Research and Practice

Social engineering is a serious security threat to Online Social Networks (OSNs). Identity theft, impersonation, phishing, and deception are some of the social engineering-based attacks that exploit vulnerabilities of interpersonal relationships of online users. As a result, relationships in OSNs need to be thoroughly examined. In this vein, we propose a relationship categorization model to evaluate relationship strength based on graph-theoretic properties and social network analysis (SNA) methods. For example, in Facebook, users may be categorized into close-neighbors, distant-neighbors, celebrities (influential by admiration), authority (influential by power), and loners. Close-neighbors category will help identify a set of trustworthy actors while …


Smart City Security, Shawn Ralko, Sathish Kumar Oct 2016

Smart City Security, Shawn Ralko, Sathish Kumar

KSU Proceedings on Cybersecurity Education, Research and Practice

With rapid growth of technology involved and the implementation of the smart city concept, it is becoming vital to identify and implement security controls for their secure operation. Smart city security is essential for a city to incorporate the technologies into smart city cyber infrastructure and to improve the conditions of life for its citizens. In this paper, we have discussed the growth of smart city concept, their security issues. We also discuss the security solutions that needs to be implemented to keep the smart city cyber infrastructure secure. We have also pointed out the recommendations on the open issues …


Combining The Extended Risk Analysis Model And The Attack Response Model To Introduce Risk Analysis, Randall Reid Oct 2016

Combining The Extended Risk Analysis Model And The Attack Response Model To Introduce Risk Analysis, Randall Reid

KSU Proceedings on Cybersecurity Education, Research and Practice

This paper uses the Extended Risk Analysis Model to introduce risk analysis in a classroom setting. The four responses to an attack, avoidance, transference, mitigation, and acceptance are overlaid on the Extended Risk Analysis Model to aid in the visualization of their relationship. It then expands and updates the cyber insurance portion of the Extended Risk Analysis Model.


Health It Security: An Examination Of Modern Challenges In Maintaining Hipaa And Hitech Compliance, Andrew S. Miller, Bryson R. Payne Oct 2016

Health It Security: An Examination Of Modern Challenges In Maintaining Hipaa And Hitech Compliance, Andrew S. Miller, Bryson R. Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

This work describes an undergraduate honors research project into some of the challenges modern healthcare providers face in maintaining compliance with the Health Insurance Portability and Accountability Act (HIPAA) and HITECH (Health Information Technology for Economic and Clinical Health) Act. An overview of the pertinent sections of both the HIPAA and HITECH Acts regarding health information security is provided, along with a discussion of traditionally weak points in information security, including: people susceptible to social engineering, software that is not or cannot be regularly updated, and targeted attacks (including advanced persistent threats, or APTs). Further, the paper examines potential violations …


Investigating Information Security Policy Characteristics: Do Quality, Enforcement And Compliance Reduce Organizational Fraud?, Dennis T. Brown Oct 2016

Investigating Information Security Policy Characteristics: Do Quality, Enforcement And Compliance Reduce Organizational Fraud?, Dennis T. Brown

KSU Proceedings on Cybersecurity Education, Research and Practice

Occupational fraud, the use of one’s occupation for personal enrichment through the deliberate misuse or misapplication of the organization’s resources or assets, is a growing concern for all organizations. While the typical organization loses at least 5% of annual revenues to fraud, current methods of detection and prevention are not fully adequate to reduce increasing occurrences. Although information systems are making life easier, they are increasingly being used to perpetrate fraudulent activities, and internal employee security threat is responsible for more information compromise than external threats.

The purpose of this research is to examine how information security policy quality and …


Individuals' Concern About Information Privacy In Ar Mobile Games, Dapeng Liu Oct 2016

Individuals' Concern About Information Privacy In Ar Mobile Games, Dapeng Liu

KSU Proceedings on Cybersecurity Education, Research and Practice

Augmented Reality (AR) proves to be an attractive technology in mobile games. While AR techniques energize mobile games, the privacy issue is raised to be discussed. Employing social media analytics (SMA) techniques, this research makes efforts to examines Twitter postings of “PokemonGo” case and explores individuals’ attitudes toward privacy in AR games. In this research, we examine what are the privacy concerns of individuals in AR games and what are the individuals’ sentiments toward privacy. In the interesting case of PokemonGo, this paper suggests that individuals’ concerns about privacy are emphasized on six dimensions - collection, improper access, unauthorized secondary …


Semi-Supervised Deep Neural Network For Network Intrusion Detection, Mutahir Nadeem, Ochaun Marshall, Sarbjit Singh, Xing Fang, Xiaohong Yuan Oct 2016

Semi-Supervised Deep Neural Network For Network Intrusion Detection, Mutahir Nadeem, Ochaun Marshall, Sarbjit Singh, Xing Fang, Xiaohong Yuan

KSU Proceedings on Cybersecurity Education, Research and Practice

Network security is of vital importance for corporations and institutions. In order to protect valuable computer systems, network data needs to be analyzed so that possible network intrusions can be detected. Supervised machine learning methods achieve high accuracy at classifying network data as normal or malicious, but they require the availability of fully labeled data. The recently developed ladder network, which combines neural networks with unsupervised learning, shows promise in achieving a high accuracy while only requiring a small number of labeled examples. We applied the ladder network to classifying network data using the Third International Knowledge Discovery and Data …


Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia Oct 2016

Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia

KSU Proceedings on Cybersecurity Education, Research and Practice

The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …


User Privacy Suffers At The Hands Of Access Controls, Chad N. Hoye Oct 2016

User Privacy Suffers At The Hands Of Access Controls, Chad N. Hoye

KSU Proceedings on Cybersecurity Education, Research and Practice

With advancements in personal hand held devices, smaller more mobile computers, tablets, and the world’s population connected with social media the threat to the user’s privacy has been diminished. I will look at how access control policies have opened the proverbial door to user’s privacy being attacked and threatened. You will see examples of how users have to divulge personal information to get better service and even be monitored while at work to prevent intrusions in to the company.