Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (39)
- Kennesaw State University (31)
- Selected Works (27)
- California State University, San Bernardino (25)
- Kansas State University Libraries (14)
-
- Technological University Dublin (8)
- University of Nebraska - Lincoln (8)
- Missouri University of Science and Technology (7)
- Eastern Michigan University (5)
- Brigham Young University (4)
- Colby College (3)
- Nova Southeastern University (3)
- SJ Quinney College of Law, University of Utah (3)
- University of Arkansas, Fayetteville (3)
- University of Georgia School of Law (3)
- University of Pennsylvania Carey Law School (3)
- De La Salle University (2)
- East Tennessee State University (2)
- La Salle University (2)
- SIT Graduate Institute/SIT Study Abroad (2)
- Salve Regina University (2)
- Texas Southern University (2)
- The University of San Francisco (2)
- Union College (2)
- University of Central Florida (2)
- University of Kentucky (2)
- University of New Hampshire (2)
- Vocational Training Council (2)
- Augsburg University (1)
- Bowling Green State University (1)
- Keyword
-
- Innovation (19)
- Technology (11)
- Entrepreneurship (10)
- STEM (9)
- Collaboration (7)
-
- Information technology (7)
- IMSA (6)
- Illinois Mathematics and Science Academy (6)
- Patents (6)
- Education (5)
- Business (4)
- Digital preservation (4)
- E-commerce (4)
- Singapore (4)
- Social media (4)
- Assessment (3)
- Customer roles (3)
- Digital (3)
- Facebook (3)
- Health information technology (3)
- IN2 (3)
- Innovation Hub (3)
- Instructional strategy (3)
- Internet (3)
- Residential high school (3)
- Technology Acceptance Model (TAM) (3)
- Technology adoption (3)
- Adoption (2)
- Analytics (2)
- Antitrust (2)
- Publication
-
- Journal of International Technology and Information Management (25)
- KSU Proceedings on Cybersecurity Education, Research and Practice (25)
- Central Plains Network for Digital Asset Management (14)
- Research Collection Lee Kong Chian School Of Business (13)
- Research Collection School Of Computing and Information Systems (10)
-
- Perspectives@SMU (9)
- Masters Theses (7)
- Anthony Breitzman (6)
- Honors Theses (5)
- Leila A. Halawi (5)
- Master's Theses and Doctoral Dissertations (5)
- Adam Seth Litwin (4)
- Britta McKenna (4)
- Conference papers (4)
- Journal of Cybersecurity Education, Research and Practice (4)
- Nebraska Innovation Campus Materials (4)
- All Faculty Scholarship (3)
- Articles (3)
- CCE Theses and Dissertations (3)
- Journal of Intellectual Property Law (3)
- Journal of Undergraduate Research (3)
- Utah Law Review (3)
- Business Systems and Analytics Faculty Work (2)
- Colby Magazine (2)
- Doctoral Dissertations (2)
- Independent Study Project (ISP) Collection (2)
- Law Faculty Scholarship (2)
- Philip Shapira (2)
- Research Collection School Of Accountancy (2)
- Southwestern Business Administration Teaching Conference (2)
- Publication Type
- File Type
Articles 31 - 60 of 247
Full-Text Articles in Business
Design, Implementation, And Evaluation Of A User Training Program For Integrating Health Information Technology Into Clinical Processes, Ze He
Doctoral Dissertations
Health information technology (IT) implementation can be costly, and remains a challenging problem with mixed outcomes on patient safety and quality of care. Systems engineering and IT management experts have advocated the use of sociotechnical models to understand the impact of health IT on user and organizational factors. Sociotechnical models suggest the need for user-centered implementation approaches, such as user training and support, and focus on processes to mitigate the negative impact and facilitate optimal IT use during training. The training design and development should also follow systematic processes guided by instructional development models. It should take into account of …
A Matter Of Taste 味關重要
AMBROSIA 客道 : The Magazine of The International Culinary Institute
Along with Ferran Adria, British chef Heston Blumenthal is the foremost proponent of a scientific approach to cooking that has won him global acclaim for signature dishes like triple cooked chips and white chocolate with caviar, he recently visited Hong Kong where he discovered that the city's local cuisine has much to be admired.
英國大廚Heston Blumenthal是分子廚藝巨匠,與名廚Ferran Adria齊名。他擅於在烹調手法中融入創新的科技元素,其拿手好菜包括三重薯菜(triple cooked chips)和白朱古力配魚子醬(white chocolate with caviar)等。近期,這位創意非凡的廚藝天才造訪香港,並對這座城市的地道美食讚口不絕。
Invitation Strategy For Cutting Edge Industries Through Mncs And Global Talents: The Case Of Singapore, Kim Song Tan
Invitation Strategy For Cutting Edge Industries Through Mncs And Global Talents: The Case Of Singapore, Kim Song Tan
Research Collection School Of Economics
Singapore presents an interesting case of how a country achieves dynamic economic development and innovation through the "invitation" strategy of a business hub. Despite being a small city-state with limited domestic market size and no meaningful hinterland or natural resources to speak of, Singapore has managed to transform its economy dramatically over the past 50 years by leveraging the strengths of other economies. Specifically, it has been able to attract (or "invite") various types of productive resources, including foreign capital, foreign technology and foreign workers (both skilled and unskilled) to make up for what it lacks. This has helped Singapore …
Jitim Volume 25 Issue 3 - Front Page
Jitim Volume 25 Issue 3 - Front Page
Journal of International Technology and Information Management
JITIM volume 25, issue 3
Designing And Evaluating Business Process Models: An Experimental Approach, Yuecheng Martin Yu, Alexander Pelaez, Karl R. Lang
Designing And Evaluating Business Process Models: An Experimental Approach, Yuecheng Martin Yu, Alexander Pelaez, Karl R. Lang
Research Collection School Of Computing and Information Systems
This paper presents an experimental approach to compare the performance of alternative business process designs. We use an example case of an electronic group buying setting to demonstrate how our approach can be applied in practice. More specifically, we chose a standard business process, the sales process as implemented on a group buying platform, to illustrate how a business process may be redesigned in order to better meet the needs of customers. For that purpose, we introduce a social technology feature to support cooperation among buyers in the sales process and then analyze the performance impact of the proposed business …
Informal Institutions And The Geography Of Innovation: An Integrative Perspective, Xuesong Geng, Kenneth G. Huang
Informal Institutions And The Geography Of Innovation: An Integrative Perspective, Xuesong Geng, Kenneth G. Huang
Research Collection Lee Kong Chian School Of Business
Integrating the insights from both institutional theory and economic geography, we develop a new conceptual framework to explain how formal and informal institutions in developing countries influence knowledge exchanges within and across geographical locations, thus affecting entrepreneurs’ and firms’ innovative behaviors and outputs. We suggest that the prevalence of informal institutions in developing countries increases the importance of geographic proximity for knowledge exchanges. At the same time, informal institutions provide alternative channels for maintaining non-local social interactions that facilitate knowledge exchanges among geographically distant firms. Using China as the context, we provide theoretical propositions that illustrate these mechanisms in terms …
Driving Change
SIGNED: The Magazine of The Hong Kong Design Institute
Chelsia Lau is the chief designer for Ford in Shanghai and is behind some of its biggest projects. We speak to the Hongkonger about the changes in automotive design.
Exploring Public Values Implications Of The I-Corps Program, Jan Youtie, Philip Shapira
Exploring Public Values Implications Of The I-Corps Program, Jan Youtie, Philip Shapira
Philip Shapira
Implications Of Social Media Use On Instruction And Student Learning: An Exploratory Study, Mayur S. Desai, Lucy Ojode
Implications Of Social Media Use On Instruction And Student Learning: An Exploratory Study, Mayur S. Desai, Lucy Ojode
Southwestern Business Administration Teaching Conference
In this paper we explore the use of social media on the content delivery aspects of instruction and potential impacts on student learning. It is our conjecture that impacts of social media use might depend on factors such as the interface of particular medium and learning style, teaching style and instructor skill, and the demographics of students and their instructors. We propose a framework that links instructor to students through social media. That is, social media becomes a channel though which learning occurs. Classifying multimedia technology as tools and social media as interactive Web 2.0 Internet-based applications, we employ …
Cloud-Based Learning Tools: Supporting The Invisible Learner (Silent Sufferers) With Socioeconomic Challenges, Lynita A. Robinson Emba, Jimmy Johnson
Cloud-Based Learning Tools: Supporting The Invisible Learner (Silent Sufferers) With Socioeconomic Challenges, Lynita A. Robinson Emba, Jimmy Johnson
Southwestern Business Administration Teaching Conference
Today's students are learning at unprecedented speeds. There are a pockets of learners who may be isolated/silent sufferers who face tremendous socioeconomic challenges while seeking higher education. Providing cloud-based technology solutions to strengthen support services and family learning engagement through a series of student family portals will provide the support needed to make student learning opportunities family-based projects or community-based projects successful in graduation completion rates and job placement opportunities.
Architectural Intervention: The Resilient Community Center, Matthew A. Baumgartner
Architectural Intervention: The Resilient Community Center, Matthew A. Baumgartner
ASA Multidisciplinary Research Symposium
In the city of Centralia, Illinois, several issues govern the city’s future, all stemming from the same major problem: the economy. To intervene, this community center proposal aims to encourage economic development and growth in the city, assisting small businesses with starting and expanding in the region.
Utilizing The Technology Acceptance Model To Assess The Employee Adoption Of Information Systems Security Measures, Cynthia M. Jones, Richard V. Mccarthy, Leila Halawi, Bahaudin Mujtaba
Utilizing The Technology Acceptance Model To Assess The Employee Adoption Of Information Systems Security Measures, Cynthia M. Jones, Richard V. Mccarthy, Leila Halawi, Bahaudin Mujtaba
Leila A. Halawi
In this study, the factors that affect employee acceptance of information systems security measures were examined by extending the Technology Acceptance Model. Partial least squares structural equation modeling was applied to examine these factors. 174 valid responses from employees from companies in various industry segments in the United States and Canada were analyzed. The results of the statistical analysis indicate that subjective norm moderated by management support showed the strongest effect on intention to use information systems security measures.
Resource-Based View Of Knowledge Management For Competitive Advantage, Leila A. Halawi, Jay E. Aronson, Richard V. Mccarthy
Resource-Based View Of Knowledge Management For Competitive Advantage, Leila A. Halawi, Jay E. Aronson, Richard V. Mccarthy
Leila A. Halawi
We are not only in a new millennium, but also in a new era: the knowledge era. Sustainable competitive advantage is dependent on building and exploiting core competencies. The resource-based view (RBV) of the firm defines a strategic asset as one that is rare, valuable, imperfectly imitiable and non-substitutable. Knowledge is seen as a strategic asset with the potential to be a source of competitive advantage for an organization. In this paper, we provide a model that examines how and why knowledge management (KM) can be sued to create competitive advantage from the RBV of the firm.
Which Theory Applies: An Analysis Of Information Systems Research, Leila Halawi, Richard Mccarthy
Which Theory Applies: An Analysis Of Information Systems Research, Leila Halawi, Richard Mccarthy
Leila A. Halawi
Research in information systems has rapidly expanded during its relatively brief existence. IT offers organizations a fundamental decision-enhancing environment that extends new opportunities, therefore producing thriving, competitive firms, adding business value and offering valuable products and services to customers. Research within the IT domain has produced several new theories, some of which have been used to help explain and predict end-user use of technologies. We provide a comprehensive overview of the major IT theories and review their theoretical fundamentals.
The Relationship Of E-Commerce Readiness To Technology Acceptance: The Case Of Barbados, Jude E. Edwards, Leila A. Halawi, Richard Mccarthy
The Relationship Of E-Commerce Readiness To Technology Acceptance: The Case Of Barbados, Jude E. Edwards, Leila A. Halawi, Richard Mccarthy
Leila A. Halawi
This is an exploratory study that examines the relationship between selected components of ecommerce readiness and dimensions of Davis’ (1989) Technology Acceptance Model. Building upon the notion that there exists some linkage between ecommerce readiness and technology Acceptance, this study seeks to examine these linkages in e-businesses within Barbados. Three relationships are proposed – a relationship between technology acceptance and the existing e-Readiness infrastructure, a relationship between technology acceptance and current telecommunications access, and a relationship between technology acceptance and education. The results of this study demonstrated that there are strong relationships between e-commerce readiness components and various technology acceptance …
Promoting Innovation And High-Tech Entrepreneurship In Historically Black Colleges And Universities: An Exploratory Research, Bivek Adhikari, Alexis Bliese, Elon Davis, Leila Halawi
Promoting Innovation And High-Tech Entrepreneurship In Historically Black Colleges And Universities: An Exploratory Research, Bivek Adhikari, Alexis Bliese, Elon Davis, Leila Halawi
Leila A. Halawi
This study explores the current state of innovation and high-tech entrepreneurial initiatives in Historically Black Colleges and Universities (HBCUs). Previous research showed that institutions’ environment, faculty empowerment, organizational trust, early stage capital, innovation centers and innovative teaching practice had a major effect to support innovation and foster tech-entrepreneurship. We present our conceptual model. The final section explains the current state of research and implications for future research are discussed.
Transdisciplinary Collaborative Learning: Design, Practices, And Experience With Telepresence, Robotics, And Makerspaces, Nick Swayne, Kevin Giovanetti Ph.D., Fred Briggs, Patrice Ludwig Ph.D., Sean Ronan Mccarthy Ph.D., Michele Estes Ph.D., Audrey J. Burnett, Juhong Christie Liu Ph.D.
Transdisciplinary Collaborative Learning: Design, Practices, And Experience With Telepresence, Robotics, And Makerspaces, Nick Swayne, Kevin Giovanetti Ph.D., Fred Briggs, Patrice Ludwig Ph.D., Sean Ronan Mccarthy Ph.D., Michele Estes Ph.D., Audrey J. Burnett, Juhong Christie Liu Ph.D.
Libraries
Using a variety of media and case studies, the panel address the adoption and use of technologies such as robotics, telepresence, and makerspaces for trans-disciplinary learning that has initiated significant grassroots change within the institution. The analysis of teaching and learning strategies shows promise of supporting deep learning for students, a scholarship of teaching and learning for faculty, and conceptualization of a change agent. A vision for the future will be explored with audience.
Publishing Makerspace: A New Approach To Scholarly Publishing, Sylvia K. Miller, David Phillips, Courtney Berger, Marjorie Fowler, Rebecca Kennison, John D. Martin Iii, John Mcleod, Chelcie Rowell
Publishing Makerspace: A New Approach To Scholarly Publishing, Sylvia K. Miller, David Phillips, Courtney Berger, Marjorie Fowler, Rebecca Kennison, John D. Martin Iii, John Mcleod, Chelcie Rowell
Charleston Library Conference
This article describes the concept of the Publishing Makerspace, which is a publishing environment that is reconfigured as a place where all the components of a scholarly project—books and e‐books, virtual and physical exhibits, visualizations, live performance and film—can be integrated using a collaborative process. This place enables the creation of a multimodal publishing environment that fully integrates digital content with manuscripts and “traditional” scholarly content. Starting with an overview of the history of the team that devised this approach and its membership, the article describes the problem that the authors have identified with current approaches to multimodal publishing and …
Integrate Text Mining Into Computer And Information Security Education, Hongmei Chi, Ezhil Kalaimannan, Dominique Hubbard
Integrate Text Mining Into Computer And Information Security Education, Hongmei Chi, Ezhil Kalaimannan, Dominique Hubbard
KSU Proceedings on Cybersecurity Education, Research and Practice
Insider threats has become a significant challenge to organization, due to the employees varying levels of access to the internal network. This will intern bypass the external security measures that have been put in place to protect the organization’s resources. Computer-mediated communication (CMC) is a form of communication over virtual spaces where users cannot see each other. CMC includes email and communication over social networks, amongst others. This paper focuses on the design and implementation of exercise modules, which can be integrated into cybersecurity courses. The main objectives of the paper include how to teach and integrate the CMC learning …
Cover Text Steganography: N-Gram And Entropy-Based Approach, Sara M. Rico-Larmer
Cover Text Steganography: N-Gram And Entropy-Based Approach, Sara M. Rico-Larmer
KSU Proceedings on Cybersecurity Education, Research and Practice
Steganography is an ancient technique for hiding a secret message within ordinary looking messages or objects (e.g., images), also known as cover messages. Among various techniques, hiding text data in plain text file is a challenging task due to lack of redundant information. This paper proposes two new approaches to embed a secret message in a cover text document. The two approaches are n-gram and entropy metric-based generation of stego text. We provide examples of encoding secret messages in a cover text document followed by an initial evaluation of how well stego texts look close to the plain …
Hands-On Labs Demonstrating Html5 Security Concerns, Mounika Vanamala
Hands-On Labs Demonstrating Html5 Security Concerns, Mounika Vanamala
KSU Proceedings on Cybersecurity Education, Research and Practice
The research is focused on the new features added in HTML5 standard that have strong implications towards the overall information security of a system that uses this implementation.A Hands-on Lab is developed to demonstrate how Web Storage and the Geo-location API of HTML5 can affect the privacy of the user.
“Not All Friends Are Equal”: Friendship Classification For Defending Against Social Engineering Attacks, Munene W. Kanampiu, Mohd Anwar
“Not All Friends Are Equal”: Friendship Classification For Defending Against Social Engineering Attacks, Munene W. Kanampiu, Mohd Anwar
KSU Proceedings on Cybersecurity Education, Research and Practice
Social engineering is a serious security threat to Online Social Networks (OSNs). Identity theft, impersonation, phishing, and deception are some of the social engineering-based attacks that exploit vulnerabilities of interpersonal relationships of online users. As a result, relationships in OSNs need to be thoroughly examined. In this vein, we propose a relationship categorization model to evaluate relationship strength based on graph-theoretic properties and social network analysis (SNA) methods. For example, in Facebook, users may be categorized into close-neighbors, distant-neighbors, celebrities (influential by admiration), authority (influential by power), and loners. Close-neighbors category will help identify a set of trustworthy actors while …
Smart City Security, Shawn Ralko, Sathish Kumar
Smart City Security, Shawn Ralko, Sathish Kumar
KSU Proceedings on Cybersecurity Education, Research and Practice
With rapid growth of technology involved and the implementation of the smart city concept, it is becoming vital to identify and implement security controls for their secure operation. Smart city security is essential for a city to incorporate the technologies into smart city cyber infrastructure and to improve the conditions of life for its citizens. In this paper, we have discussed the growth of smart city concept, their security issues. We also discuss the security solutions that needs to be implemented to keep the smart city cyber infrastructure secure. We have also pointed out the recommendations on the open issues …
Combining The Extended Risk Analysis Model And The Attack Response Model To Introduce Risk Analysis, Randall Reid
Combining The Extended Risk Analysis Model And The Attack Response Model To Introduce Risk Analysis, Randall Reid
KSU Proceedings on Cybersecurity Education, Research and Practice
This paper uses the Extended Risk Analysis Model to introduce risk analysis in a classroom setting. The four responses to an attack, avoidance, transference, mitigation, and acceptance are overlaid on the Extended Risk Analysis Model to aid in the visualization of their relationship. It then expands and updates the cyber insurance portion of the Extended Risk Analysis Model.
Health It Security: An Examination Of Modern Challenges In Maintaining Hipaa And Hitech Compliance, Andrew S. Miller, Bryson R. Payne
Health It Security: An Examination Of Modern Challenges In Maintaining Hipaa And Hitech Compliance, Andrew S. Miller, Bryson R. Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
This work describes an undergraduate honors research project into some of the challenges modern healthcare providers face in maintaining compliance with the Health Insurance Portability and Accountability Act (HIPAA) and HITECH (Health Information Technology for Economic and Clinical Health) Act. An overview of the pertinent sections of both the HIPAA and HITECH Acts regarding health information security is provided, along with a discussion of traditionally weak points in information security, including: people susceptible to social engineering, software that is not or cannot be regularly updated, and targeted attacks (including advanced persistent threats, or APTs). Further, the paper examines potential violations …
Investigating Information Security Policy Characteristics: Do Quality, Enforcement And Compliance Reduce Organizational Fraud?, Dennis T. Brown
Investigating Information Security Policy Characteristics: Do Quality, Enforcement And Compliance Reduce Organizational Fraud?, Dennis T. Brown
KSU Proceedings on Cybersecurity Education, Research and Practice
Occupational fraud, the use of one’s occupation for personal enrichment through the deliberate misuse or misapplication of the organization’s resources or assets, is a growing concern for all organizations. While the typical organization loses at least 5% of annual revenues to fraud, current methods of detection and prevention are not fully adequate to reduce increasing occurrences. Although information systems are making life easier, they are increasingly being used to perpetrate fraudulent activities, and internal employee security threat is responsible for more information compromise than external threats.
The purpose of this research is to examine how information security policy quality and …
Individuals' Concern About Information Privacy In Ar Mobile Games, Dapeng Liu
Individuals' Concern About Information Privacy In Ar Mobile Games, Dapeng Liu
KSU Proceedings on Cybersecurity Education, Research and Practice
Augmented Reality (AR) proves to be an attractive technology in mobile games. While AR techniques energize mobile games, the privacy issue is raised to be discussed. Employing social media analytics (SMA) techniques, this research makes efforts to examines Twitter postings of “PokemonGo” case and explores individuals’ attitudes toward privacy in AR games. In this research, we examine what are the privacy concerns of individuals in AR games and what are the individuals’ sentiments toward privacy. In the interesting case of PokemonGo, this paper suggests that individuals’ concerns about privacy are emphasized on six dimensions - collection, improper access, unauthorized secondary …
Semi-Supervised Deep Neural Network For Network Intrusion Detection, Mutahir Nadeem, Ochaun Marshall, Sarbjit Singh, Xing Fang, Xiaohong Yuan
Semi-Supervised Deep Neural Network For Network Intrusion Detection, Mutahir Nadeem, Ochaun Marshall, Sarbjit Singh, Xing Fang, Xiaohong Yuan
KSU Proceedings on Cybersecurity Education, Research and Practice
Network security is of vital importance for corporations and institutions. In order to protect valuable computer systems, network data needs to be analyzed so that possible network intrusions can be detected. Supervised machine learning methods achieve high accuracy at classifying network data as normal or malicious, but they require the availability of fully labeled data. The recently developed ladder network, which combines neural networks with unsupervised learning, shows promise in achieving a high accuracy while only requiring a small number of labeled examples. We applied the ladder network to classifying network data using the Third International Knowledge Discovery and Data …
Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia
Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia
KSU Proceedings on Cybersecurity Education, Research and Practice
The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …
User Privacy Suffers At The Hands Of Access Controls, Chad N. Hoye
User Privacy Suffers At The Hands Of Access Controls, Chad N. Hoye
KSU Proceedings on Cybersecurity Education, Research and Practice
With advancements in personal hand held devices, smaller more mobile computers, tablets, and the world’s population connected with social media the threat to the user’s privacy has been diminished. I will look at how access control policies have opened the proverbial door to user’s privacy being attacked and threatened. You will see examples of how users have to divulge personal information to get better service and even be monitored while at work to prevent intrusions in to the company.