Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

Technology and Innovation

Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 236

Full-Text Articles in Business

Comparative Life Cycle Assessment Of Copper Production, Xiaohan Wu Mar 2024

Comparative Life Cycle Assessment Of Copper Production, Xiaohan Wu

Graduate Industrial Research Symposium

Copper demand will surge significantly in the context of global renewable energy technology implementation, but its production is an energy-intensive process. It is crucial to choose the best production method to reduce environmental damage in terms of the enormous copper supply. This research develops a multi-criteria life cycle assessment model for the three main copper production routes- pyrometallurgy, hydrometallurgy, and bioleaching. We complied material and energy flow data to assess each route's life cycle greenhouse gas (GHG) emissions, cost, and resource efficiency. Results indicate bioleaching emits the least GHG emissions (4.09 kg-CO2 eq/kg copper) among the three routes. Hydrometallurgy is …


Towards Assessing Cybersecurity Posture Of Manufacturing Companies: Review And Recommendations, John Del Vecchio, Yair Levy, Ling Wang, Ajoy Kumar Jan 2024

Towards Assessing Cybersecurity Posture Of Manufacturing Companies: Review And Recommendations, John Del Vecchio, Yair Levy, Ling Wang, Ajoy Kumar

KSU Proceedings on Cybersecurity Education, Research and Practice

With the continued changes in the way businesses work, cyber-attack targets are in a constant state of flux between organizations, individuals, as well as various aspects of the supply chain of interconnected goods and services. As one of the 16 critical infrastructure sectors, the manufacturing sector is known for complex integrated Information Systems (ISs) that are incorporated heavily into production operations. Many of these ISs are procured and supported by third parties, also referred to as interconnected entities in the supply chain. Disruptions to manufacturing companies would not only have significant financial losses but would also have economic and safety …


Quantum Computing: Computing Of The Future Made Reality, Janelle Mathis Jan 2024

Quantum Computing: Computing Of The Future Made Reality, Janelle Mathis

KSU Proceedings on Cybersecurity Education, Research and Practice

Abstract—Quantum computing is an emerging new area focused on technology consisting of quantum theory aspects such as electrons, sub-atomic particles, and other materials engineered using quantum mechanics. Through quantum mechanics, these computers can solve problems that classical computers deem too complex. Today the closest computing technology compared to quantum computers are supercomputers, but similarly to classical computers, supercomputers also have faults. With supercomputers, when a problem is deemed too complex, it is due to the classical machinery components within the computer, thus causing a halt in solving the task or problem. In contrast, these problems could be solved with a …


Rfid Key Fobs In Vehicles: Unmasking Vulnerabilities & Strengthening Security, Devon Magda, Bryson R. Payne Jan 2024

Rfid Key Fobs In Vehicles: Unmasking Vulnerabilities & Strengthening Security, Devon Magda, Bryson R. Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

No abstract provided.


The Impact Of Individual Techno-Characteristics On Information Privacy Concerns In The Diffusion Of Mobile Contact Tracing, Jiesen Lin, Dapeng Liu, Lemuria Carter Jan 2024

The Impact Of Individual Techno-Characteristics On Information Privacy Concerns In The Diffusion Of Mobile Contact Tracing, Jiesen Lin, Dapeng Liu, Lemuria Carter

KSU Proceedings on Cybersecurity Education, Research and Practice

In the wake of the global health crisis, mobile contact tracing applications have emerged as important tools in managing disease spread. However, their effectiveness heavily relies on mass adoption, significantly influenced by the public's information privacy concerns. To date, systematic examination of how these privacy concerns relate to the innovation adopter categories in mobile contact tracing remains sparse. Furthermore, the influence of individual techno-characteristics on these concerns is to be explored. This research seeks to fill these gaps. Drawing on the diffusion of innovation theory, we examine the impact of the key techno-characteristics—adopter category, propensity for identification misrepresentation, and exposure …


Exploring Information Privacy Concerns During The Covid-19 Pandemic: A Juxtaposition Of Three Models, Dapeng Liu, Lemuria Carter, Jiesen Lin Jan 2024

Exploring Information Privacy Concerns During The Covid-19 Pandemic: A Juxtaposition Of Three Models, Dapeng Liu, Lemuria Carter, Jiesen Lin

KSU Proceedings on Cybersecurity Education, Research and Practice

Government agencies across the globe utilize mobile applications to interact with constituents. In response to the global pandemic, several nations have employed contact tracing services to manage the spread of COVID-19. Extent literature includes various models that explore information privacy. Several researchers have highlighted the need to compare the effectiveness of diverse information privacy models. To fill this gap, we explore the impact of information privacy concerns on citizens’ willingness to download a federal contact tracing app. In particular, we compare three types of prevalent information privacy concerns: global information privacy concerns (GIPC), concern for information privacy (CFIP), and internet …


How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim Dec 2023

How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim

Cybersecurity Undergraduate Research Showcase

The powers of OpenAI's groundbreaking AI language model, ChatGPT, startled millions of users when it was released in November. But for many, the tool's ability to further accomplish the goals of evil actors swiftly replaced their initial excitement with significant concerns. ChatGPT gives malicious actors additional ways to possibly compromise sophisticated cybersecurity software. Leaders in a sector that is currently suffering from a 38% global spike in data breaches in 2022 must acknowledge the rising influence of AI and take appropriate action. Cybercriminals are writing more complex and focused business email compromise (BEC) and other phishing emails with the assistance …


Technological Adoption And Changing World Of Work: Case Study Of Services Sector Workforce In Pakistan, Umer Khalid Nov 2023

Technological Adoption And Changing World Of Work: Case Study Of Services Sector Workforce In Pakistan, Umer Khalid

CBER Conference

This study seeks to investigate the impact of technological adoption and the changing world of work on employment dynamics, job quality and wage structure in the context of a developing economy – Pakistan.


The Relationship Between Labor Market Institutions And Innovation In 177 European Regions Over The Period 2000-2015, Gaetano Perone Nov 2023

The Relationship Between Labor Market Institutions And Innovation In 177 European Regions Over The Period 2000-2015, Gaetano Perone

CBER Conference

The main goal of this paper was to investigate the relationship between a set of labor market institutions (LMIs) and innovation (proxied by patent density) in 174 NUT-1 and NUT-2 European regions, over the period 2000-2015. Fixed effects with Driscoll and Kraay's (1998) standard errors (FE-DK), ordinary least squares (OLS), the generalized method of moments estimation of the fixed effects (FE-GMM), and a multilevel model (MLM) were employed.


Developing An Integrative Theoretical Framework For Electronic Business Value Optimisation In Botswana, Meduduetso Tsumake-Tsiang, Adheesh Budree Sep 2023

Developing An Integrative Theoretical Framework For Electronic Business Value Optimisation In Botswana, Meduduetso Tsumake-Tsiang, Adheesh Budree

African Conference on Information Systems and Technology

Organizations are trying to move quickly to adopt remote working policies into their organizations as to attract and retain top talent, reduce office space costs, and increase productivity. As many of these strategies were quickly adopted by South African ICT organizations during the COIVD-19 pandemic, organizations are still somewhat unclear on what their role is with regards to ensuring long term adoption of remote working. Thus, this study explored the role of the organization with regards to a work-from-home strategy. It was found that the organization is responsible for formalizing the chosen strategy, creating supportive policies, and adapting its management …


The Dark Side Of Mobile Money Transfer : A Case Study Of Zimbabwe, Theo Tsokota, Collector Chipfumbu, Melody Maseko Sep 2023

The Dark Side Of Mobile Money Transfer : A Case Study Of Zimbabwe, Theo Tsokota, Collector Chipfumbu, Melody Maseko

African Conference on Information Systems and Technology

Mobile money transfer has been widely presented in the literature and in practice as a way to bring the poor, unbanked and backward communities into the mainstream financial system. The main objective of this paper is to provide insights into how mobile money transfer has contributed to the negative effects on Zimbabwe's economy and its citizens. Using integrative literature this study explores the how mobile money transfers have negatively affected the economy of Zimbabwe and its citizens. The findings show that mobile money, if not properly regulated, can promote money laundering, fraud and financial irregularities, which can harm the entire …


Social Media & Privacy: Understanding Privacy In The Age Of Content Creator Culture, Robert Tagoe, Raphael Amponsah, Emmanuel Awuni Kolog, Eric Afful-Dadzie Sep 2023

Social Media & Privacy: Understanding Privacy In The Age Of Content Creator Culture, Robert Tagoe, Raphael Amponsah, Emmanuel Awuni Kolog, Eric Afful-Dadzie

African Conference on Information Systems and Technology

In today's digital age, content creators are gaining public attention and becoming highly influential. With that increased influence, it is important to acknowledge the privacy concerns within this culture. This interpretive research study seeks to identify and understand the dynamics of privacy within the content creator culture. This research will leverage information from interviews with content creators from various social media platforms such as YouTube, Instagram, Facebook, and TikTok. Using theories to understand the phenomena, theories of privacy calculus, privacy paradox and self-disclosure, will be used to view how content creators define and navigate privacy, strategies employed to control personal …


Digital Transformation Of Smes Through Social Media, Georgette Eugenia Otoo, Raphael Amponsah, Eric Afful-Dadzie, Emmanuel Awuni Kolog Sep 2023

Digital Transformation Of Smes Through Social Media, Georgette Eugenia Otoo, Raphael Amponsah, Eric Afful-Dadzie, Emmanuel Awuni Kolog

African Conference on Information Systems and Technology

This research paper explores the strategic integration of social media platforms by Small and Medium-sized Enterprises (SMEs) in Low- and Middle-Income Countries (LMICs) beyond marketing. Drawing from Resource-Based View and Dynamic Capabilities theories, the study investigates how social media enhances management, coordination, and control functions. Through five diverse case studies from Ghana, findings reveal SMEs’ innovative use of platforms like Instagram, WhatsApp, Slack, and Trello. These platforms foster efficient internal communication, customer engagement, project management, and talent acquisition. Challenges such as technical expertise and dynamic digital landscapes are identified.


Internet Of Things Affordance For Open Educational Resources In A Comprehensive Open Distance E-Learning, Lancelord Mncube Sep 2023

Internet Of Things Affordance For Open Educational Resources In A Comprehensive Open Distance E-Learning, Lancelord Mncube

African Conference on Information Systems and Technology

The Internet of Things (IoT) space has dual dimensions of affordance to support open educational resources (OER). The duality of affordance has little or not been well articulated in relation to OER, particularly in a Comprehensive open distance e-learning (CODEL) institution. Such an institution is a mega open distance in South Africa and beyond the continent to accommodate students globally and rely on information and communication technology (ICT) in the provision of tuition. In the CODEL institution, there is a recognizable shift as the institution encourages the appropriation of OER and phasing out the prescription of the prescribed textbooks. The …


Adoption Of Ict To Support Rural Small-Holder Farmers : A Systematic Review, Abdus Salaam Seat, Shaun Pather Sep 2023

Adoption Of Ict To Support Rural Small-Holder Farmers : A Systematic Review, Abdus Salaam Seat, Shaun Pather

African Conference on Information Systems and Technology

Access to Information and Communication Technologies (ICTs) are slowly becoming more available to rural communities given a number of innovative approaches over recent years such as the implementation of Community Networks (CNs). Consequently, ICTs are able to become more meaningful in support of livelihoods of these communities, such as in agriculture production. Potential benefits to smallholder farmers include increase yields and reduced effort. However, there is very little evidence of smallholder farmers integrating ICTs into their livelihood activity. In this paper a Systematic Literature Review is used to explore the challenges faced in this sector. A total of 83 articles …


Information Technology Decision Makers’ Readiness For Artificial Intelligence Governance In Institutions Of Higher Education In South Africa, John Mangundu Sep 2023

Information Technology Decision Makers’ Readiness For Artificial Intelligence Governance In Institutions Of Higher Education In South Africa, John Mangundu

African Conference on Information Systems and Technology

Artificial intelligence (AI) can enhance the educational experience for academics and students. However, research has inadequately examined AI ethics and governance, particularly in the higher education sector of developing economies such as South Africa. AI governance ensures that envisioned AI benefits are realized while reducing AI risks. Against this backdrop of huge research deficit, the current study reports on a qualitative exploratory study that investigates the state of readiness for AI governance and AI governance maturity in South African higher education institutions. Informed by the combination of the TOE framework, the traditional IT governance model and the adapted IT governance …


Managing E-Mindful Tourism Experiences: A Co-Creation Approach, Uglješa Stankov Jun 2023

Managing E-Mindful Tourism Experiences: A Co-Creation Approach, Uglješa Stankov

ITSA 2022 Gran Canaria - 9th Biennial Conference: Corporate Entrepreneurship and Global Tourism Strategies After Covid 19

No abstract provided.


Can Digital Marketing On Instagram Help To Promote Sustainable Travel? Abstract, Jacques Bulchand-Gidumal Professor, Armin Brysch Professor Jun 2023

Can Digital Marketing On Instagram Help To Promote Sustainable Travel? Abstract, Jacques Bulchand-Gidumal Professor, Armin Brysch Professor

ITSA 2022 Gran Canaria - 9th Biennial Conference: Corporate Entrepreneurship and Global Tourism Strategies After Covid 19

The contribution of digitalization and digital platforms to tourism sustainability is a timely topic. In this research we analyze if a digital platform such as Instagram could contribute and be used as a tool to promote sustainability by destinations and by travelers. To this aim, we implement a methodology comprised of four steps: identifying the most recognized sustainable destinations in the world (i.e. Slovenia, New Zealand and Costa Rica), downloading and analyzing the last posts from the official accounts of the DMOs of these destinations, identifying the most frequently used hashtags related to sustainable tourism (#ecoturismo, #ecotourism, #sustainabletravel, #ecotravel and …


Finding The Invisible At-Risk Player - Using Technology To Help Identify Customers Spending Beyond Affordable Limits, Tony Schellinck Dr. May 2023

Finding The Invisible At-Risk Player - Using Technology To Help Identify Customers Spending Beyond Affordable Limits, Tony Schellinck Dr.

International Conference on Gambling & Risk Taking

Abstract:

This session will highlight the value of a new EGM Affordability Model specifically adapted for changes in play due to COVID-19. Affordability of play has become a critical regulatory priority that is gaining greater traction worldwide as a gaming provider responsibility. The research presented here can inform a more sophisticated approach that is easy to operationalize, does not require a burden of proof on operators, and simultaneously yields greater results in identifying players spending beyond their abilities. The authors conducted research from 2014-2020, interviewing 10,500 regular electronic machine gamblers in land-based casinos in three countries administering the PGSI and …


Exploring The Effects Of Gamblification On Esports Betting, Cecilia Diaz Dr, Violet Justine Mtonga Dr May 2023

Exploring The Effects Of Gamblification On Esports Betting, Cecilia Diaz Dr, Violet Justine Mtonga Dr

International Conference on Gambling & Risk Taking

Abstract:

There is a growing trend of gambling/betting organisations attempting to secure a position in the fast-growing and profitable sector of Esports by becoming an inherent part of the sports culture and its community of fans. This alignment is raising concerns due to the community lifestyle and consumption of experience intrinsic in sports/Esports (Gordon, Gurrieri, & Chapman, 2015).

Diffusion of gambling in society is triggered by digital/technological disruption on gambling and changing consumer behaviour and cultural trends. This environment offers innovative opportunities to experience gambling and “gambling-like” experiences online (King et al., 2010) with the extra incentive of ease of …


Rg Smart Gambling Machines: A Prevention Model To Respond To Risky Play In Real Time, Tracy Schrans May 2023

Rg Smart Gambling Machines: A Prevention Model To Respond To Risky Play In Real Time, Tracy Schrans

International Conference on Gambling & Risk Taking

Abstract:

In collaboration with industry, public health, and regulators, Focal Research developed an effective modelling process using player data and technology to identify and assist customers at-risk of having problems with their gambling. The system was originally designed using account-based player data to accurately assess play patterns. Complex algorithms scan the player data stored in an operator’s member data system, alerting operators to play behaviours typically observed among those scoring 8 or higher on the Problem Gambling Severity Index. During a live trial, the system was found to help staff interact with at-risk customers leading to measurable improvement in outcomes …


Even Flow : Using Microsoft Flows To Streamline Library Acquisitions Work, Carissa Thatcher May 2023

Even Flow : Using Microsoft Flows To Streamline Library Acquisitions Work, Carissa Thatcher

OVGTSL 2023: Ongoing Challenges, Creative Solutions

Have you seen the Power Automate icon in Microsoft 365 and wondered what that does? Or maybe you've heard about this thing called Flow but not sure what the big deal is? Would you like to up your acquisitions game, but not sure where to start? We'll kick off this session with Microsoft Power Automate and Flow basics such as naming conventions, expressions and variables. Then move on to the fun stuff, demonstrating how you can streamline your acquisitions processes through Microsoft Power Automate by harnessing the power of automating emails, populating SharePoint spreadsheets from a form, and how to …


Improving Network Security For High Schools In Carolina, Southeastern, And South Central Conference, Eden Sampson Apr 2023

Improving Network Security For High Schools In Carolina, Southeastern, And South Central Conference, Eden Sampson

Campus Research Day

Cybersecurity is a very important factor that is often overlooked until one becomes a victim of hackers and viruses. One of the main institutions that are caught off guard by cyber issues are high schools. Adventist high schools often fall into this issue as well. It is very dangerous because of the sensitive information handled on school networks as well as the financial loss that cyber security attacks may cause. Moreover, just a few Adventist high schools have IT staff who are qualified to protect the school from cyberattacks or to help with recovery. Therefore, our contribution is to create …


Sustainable Small House Project, Mollie Jo George Mar 2023

Sustainable Small House Project, Mollie Jo George

UNO Student Research and Creative Activity Fair

The Sustainable Small House Project was developed in cooperation with UNO/UNL Engineering, UNO Gerontology, and Metro Community College. This project merges both sustainable living with the small house movement to promote aging-in-place for older adults. This presentation describes the journey of Dr. Bing Chen as he envisioned the Sustainable Small House Project to its development and finally to implementation at its current location--west of Baxter Arena or adjacent to the UNO ballfield.

From a gerontological lens, the project focuses on principles of universal design which allows for aging-in-place, fall-detection and prevention using smart technologies such as Nobi, and voice-activated technologies …


Railroads And First Responders: A Gis Link, Jeremy Kramer Mar 2023

Railroads And First Responders: A Gis Link, Jeremy Kramer

Purdue Road School

The Louisville & Indiana Railroad (L&I) was awarded a $300,000 Consolidated Rail and Safety Improvements Program (CRISI) Grant to develop a geographic information mobile application linking L&I dispatch and first responders to aid communication and response during railroad incidents. This is an important development in promoting safety at rail-highway intersections.


How To Not Save The World From Covid-19: The Dire Consequences Of Giving Away The Vaccine Formula [Poster], Tristen Prouse Mar 2023

How To Not Save The World From Covid-19: The Dire Consequences Of Giving Away The Vaccine Formula [Poster], Tristen Prouse

Research in the Capitol

The debate over giving away the COVID-19 vaccine formula is a political hot topic. Violating intellectual property law (patents) to give away the vaccine is a tempting option for aiding other countries in the current global health crisis. In actuality, many problems exist with this proposed solution, including violating intellectual property law, disincentivizing innovation, undermining confidence in vaccine safety, harming America’s geopolitical objectives, and inefficiencies. The United States can and should aid the world in obtaining vaccines, but it should not do so by waiving patent law and giving away the vaccine formulas.


What Is Missing In Data Governance? Regulation, Board Oversight, And A New Role For Accountants, Christopher Hill, Bria I. James, Najib Sahyoun Jan 2023

What Is Missing In Data Governance? Regulation, Board Oversight, And A New Role For Accountants, Christopher Hill, Bria I. James, Najib Sahyoun

Posters-at-the-Capitol

By 2025, the world will produce 163 Zettabytes (ZB) of data on an annual basis. Data is displacing oil as the most productive commodity. However, poor data quality costs the U.S. economy $3.1 trillion annually. Data must be properly managed through data governance. A strong data governance program does not only maximize the value of the data resulting in optimal decision making, but also minimizes risks of data breaches, lawsuits, and reputational costs. In our research, we conducted a content analysis of the data governance literature by considering both professional and academic literature.

Our results showed that the U.S. does …


Underrepresented Adult Learners And The Enduring Pursuit Of Workplace Readiness: Achieving Postponed Career Aspirations & Dreams Through Enhanced Self-Efficacy, Patrick Guilbaud, T. Christa Guilbaud Jan 2023

Underrepresented Adult Learners And The Enduring Pursuit Of Workplace Readiness: Achieving Postponed Career Aspirations & Dreams Through Enhanced Self-Efficacy, Patrick Guilbaud, T. Christa Guilbaud

Adult Education Research Conference

Hands-on learning experiences support workplace readiness. This paper presents preliminary results of a study that examines impacts of a technology-based experiential learning activity on career aspirations of underrepresented adult learners.


A Low-Cost, Low-Power, Scada Testbed Solution For Secure Remote Monitoring, Connor Berger Dec 2022

A Low-Cost, Low-Power, Scada Testbed Solution For Secure Remote Monitoring, Connor Berger

Symposium of Student Scholars

Similar to software application systems adopted by companies and businesses for product logging, payroll, human resources, Supervisory Control and Data Acquisition (SCADA) systems control the distributed processes with multiple components located on different machines that communicate and coordinate actions in order to appear as a single coherent system. SCADA systems severely lack the appropriate security and hack prevention measures. We propose a low cost, low power SCADA testbed solution for secure remote monitoring. The goal of this research is to implement and test the testbed’s security by emulating attack vectors on both hardware components and communication channels to probe the …


Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss Nov 2022

Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss

KSU Proceedings on Cybersecurity Education, Research and Practice

Water quality refers to measurable water characteristics, including chemical, biological, physical, and radiological characteristics usually relative to human needs. Dumping waste and untreated sewage is the reason for water pollution and several diseases to the living hood. The quality of water can also have a significant impact on animals and plant ecosystems. Therefore, keeping track of water quality is a substantial national interest. Much research has been done for measuring water quality using sensors to prevent water pollution. In summary, those systems are built based on online and reagent-free water monitoring SCADA systems in wired networks. However, centralized servers, transmission …