Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems

2021

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 78

Full-Text Articles in Technology and Innovation

Application Of Competitive Intelligence For Insular Territories: Automatic Analysis Of Scientific And Technology Trends To Fight The Negative Effects Of Climate Change, Henri Dou, Pierre Fournie Dec 2021

Application Of Competitive Intelligence For Insular Territories: Automatic Analysis Of Scientific And Technology Trends To Fight The Negative Effects Of Climate Change, Henri Dou, Pierre Fournie

International Journal of Islands Research

Islands are fragile territories because of their geographical position. As a result, climate impacts can have serious consequences, of which some are irreversible. Therefore, it is necessary to allow insular territories to benefit from the latest scientific and technological advances in combating climate effects. The current article shows how to deal with automatic analysis of scientific information on the one hand, but also its applications via patents. We will analyse the latest scientific results as well as their possible applications using patent analysis. We will also focus on experts, laboratories, and leading companies, that are active on the field. The …


A Nation In Crisis... In Three Acts, William D. Senn Dec 2021

A Nation In Crisis... In Three Acts, William D. Senn

Proceedings from the Document Academy

A dramatic, spoken-word performance based on a detailed examination of the text of more than 1.7 million tweets concerning coronavirus and covid that were sent during the hours surrounding the president's declaration of emergency on March 13, 2020 including the transcript of the remarks made at the Rose Garden press conference. The researcher used the Twitter JSON API to retrieve all of the tweets containing the search terms "covid" and "corona" occurring during the timeframe. A text analysis was performed to identify the most frequently occurring n-grams present in the corpus of tweets. Thematic analysis and sentiment analysis were used …


Government Workspace Digitalization And Socioeconomic Development Outcomes In Ghana, Winfred Ofoe Larkotey, John Effah, Richard Boateng Dec 2021

Government Workspace Digitalization And Socioeconomic Development Outcomes In Ghana, Winfred Ofoe Larkotey, John Effah, Richard Boateng

The African Journal of Information Systems

The study sought to understand how the structurational environment shapes socioeconomic outcomes of government workspace digitalization in Ghana based on a qualitative, interpretive case study and the structurational model of technology as a theoretical lens. The findings show how the availability of electronic transactions law, government borrowing, and extendable system design can positively influence socioeconomic outcomes of government workspace digitalization. However, use of multiple system development environments, bureaucracy, a within-country digital divide, and a persistent physical signature and letterhead culture can negatively influence the socioeconomic development goals of government workspace digitalization.


Practice Enterprises In Times Of Distance Learning: The Impact And Consequences Of The Covid-19 Pandemic To The Collaboration Of Practice Enterprises, Theresa Feuchter, Gernot Dreisiebner, Elisabeth Riebenbauer, Ph.D., Michaela Stock Dec 2021

Practice Enterprises In Times Of Distance Learning: The Impact And Consequences Of The Covid-19 Pandemic To The Collaboration Of Practice Enterprises, Theresa Feuchter, Gernot Dreisiebner, Elisabeth Riebenbauer, Ph.D., Michaela Stock

International Journal for Business Education

The aim of this paper is to outline the consequences which arise from the digital transformation of the multidimensional teaching and learning setting of practice enterprises and to discuss how digital collaboration of students can be supported during the COVID-19 pandemic. As an evolutionary moment also in the field of education, one can consider the experiences of COVID-19 as a catalyst for digital transformation and distance learning in education. How digital collaboration can be fostered in times of distance learning is shown by using the example of business simulations such as practice enterprises (PE). While previously this multidimensional teaching and …


Project-Based Pedagogy: The Client's Perspective, Wayne Aho, Wendy Cagle, Jon Marvel, Michael Smith, Edward Wright Dec 2021

Project-Based Pedagogy: The Client's Perspective, Wayne Aho, Wendy Cagle, Jon Marvel, Michael Smith, Edward Wright

International Journal for Business Education

Project-based experiential business education seeks to provide students with lessons that are meaningful, practical, and enduring. While previous research has sought to understand how students and faculty members react to such educational experiences, it is also important to understand the perceptions of the business clients who engage with programs employing project-based education. The aim of this study was to better understand the experiences of business clients with whom students engaged as part of an undergraduate business capstone course. Two hundred fifty-three previous clients were surveyed with a 22.4% response rate. Responses were subjected to content analysis to cluster replies into …


Promoting Employer Desired Competencies Through A Multiphased "Workgroup" Project, Ashly Smith Dec 2021

Promoting Employer Desired Competencies Through A Multiphased "Workgroup" Project, Ashly Smith

International Journal for Business Education

Employers and business leaders have long been advocating for the importance of career readiness skills like critical thinking/problem solving, information literacy, teamwork/collaboration, professionalism/work ethic, and oral/written communication (NACE, 2019; Partnership, 2008). While faculty and students see value in projects that develop these skills, such projects can be some of the most challenging to incorporate effectively into business courses (Chapman et al., 2010; Detmering & Johnson, 2012; Lee et al., 2016; Marks & O’Connor, 2013). This article reports on a multi-phase group project that aims to strengthen a selection of these employer-desired skills while ameliorating student concerns about the research process …


Cultivating Financial Literacy Through Secondary School Economics Education: Access To Powerful Knowledge, Emanuel Mizzi Dec 2021

Cultivating Financial Literacy Through Secondary School Economics Education: Access To Powerful Knowledge, Emanuel Mizzi

International Journal for Business Education

‘Powerful knowledge’ is disciplinary knowledge that when learned, empowers students to make decisions in a way that will influence their lives in a positive way (Young, 2008). In this paper, the researcher employs this construct to explore the financial literacy education arising from studying secondary school economics. It emerges from the author’s research aimed at exploring teaching and learning in secondary school Maltese economics classrooms. The underlying conceptual framework for this study is critical realism. The study design consisted of interviewing and observing 14 economics teachers, together with four focus groups interviews with students. Data were analyzed by employing thematic …


Internships As Clinical Rotations In Business: Enhancing Access And Options, Faye W. Gilbert, Jason Harkins, Pankaj Agrrawal, Taylor Ashley Dec 2021

Internships As Clinical Rotations In Business: Enhancing Access And Options, Faye W. Gilbert, Jason Harkins, Pankaj Agrrawal, Taylor Ashley

International Journal for Business Education

Internships are high impact practices that offer work experiences and provide advantages for participating undergraduate students and for the talent acquisition efforts of firms. While research consistently documents the benefits of internships as a transformative experience, access and outcomes may vary for students and for underserved populations. Limitations of internships can include lack of access to enough positions as well as inadequate interactions between undergraduate students, firms, and faculty members in business programs. The purpose of this article is to describe an approach to enhancing access to internships on a larger scale with greater variety. Protocols found in clinical rotations …


Cyber Security Vulnerability Assessment In Learning Management Systems, Mohammad Rabie Dec 2021

Cyber Security Vulnerability Assessment In Learning Management Systems, Mohammad Rabie

Electronic Theses, Projects, and Dissertations

With online learning becoming in high demand to deliver training and education during the COVID-19 pandemic, cybercriminals have more opportunities to take advantage of vulnerable Learning Management Systems to steal information like training materials, and students' private information, or they try to make easy money by deploying ransomware. Regardless of the cybercriminal motivation, the compromised system has consequences on the organization that affects it financially, legally, and reputationally. This requires the organization to invest in choosing the most secure LMS and apply the required security controls to avoid such consequences that may cost them much more than expected.

This project …


Phishing For All Ages, Rachana Vann Dec 2021

Phishing For All Ages, Rachana Vann

Electronic Theses, Projects, and Dissertations

Since the start of the pandemic in 2020 and the increase in teleworking, we have witnessed a subsequent increase in cyber-attacks. This project focused on the tools and techniques a teleworker should use to stay safe from online predators. An online predator or hacker is defined as someone who uses the internet to get access to proprietary information or seek a ransom. This project sought to introduce tools and techniques that would help people of all ages to stay safe online. The questions asked were: What techniques do online predators use to lure their unsuspecting victims? On the American Generation …


Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim Dec 2021

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim

Electronic Theses, Projects, and Dissertations

Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …


Stimulating Intrapreneurial Intentions With Digital Business Training In The Vet Sector: The Potential Of Massive Open Online Courses, Christian Friedl Dec 2021

Stimulating Intrapreneurial Intentions With Digital Business Training In The Vet Sector: The Potential Of Massive Open Online Courses, Christian Friedl

International Journal for Business Education

It has become imperative to stimulate and support employees to behave entrepreneurially within organizations (intrapreneurship). However, little is known about how digital, massive, and scalable business education and training formats such as massive open online course (MOOCs) can contribute to vocational and educational training (VET) in general, and to nurture intrapreneurial behavior and corresponding intentions in specific. Therefore, the purpose of this paper is to explore the potential effect of a MOOC on intrapreneurial intentions of learners.
Data were acquired from 412 employees taking a MOOC on intrapreneurship for constructs embedded in the theory of planned behavior, tailored to the …


Signature Pedagogy For Entrepreneurship Education: An Emerging Perspective, Ashley Gess, Eleonora Brivio, Gianluca De Leo Dec 2021

Signature Pedagogy For Entrepreneurship Education: An Emerging Perspective, Ashley Gess, Eleonora Brivio, Gianluca De Leo

International Journal for Business Education

Entrepreneurial ways of thinking and doing intersect with the knowledge and skills that a global citizen needs to thrive. There is a robust body of scholarship that identifies core entrepreneurial skills however there is a dearth of evidence addressing how to successfully teach entrepreneurship. Using the lens of experiential learning, this qualitative study examines the surface, deep, and implicit structures of professional entrepreneurial culture toward revealing a meaningful, authentic pedagogical approach for entrepreneurship education. In order to achieve this outcome, researchers utilized a semi-structured comparable multiple-case study design to engage 19 incubated entrepreneurs in focus group interviews. A replication strategy …


Capabilities Information Technology And Knowledge Sharing : A Bibliometric Perspective, Ilham I. M, Anis Eliyana, Tri Siwi Agustina Nov 2021

Capabilities Information Technology And Knowledge Sharing : A Bibliometric Perspective, Ilham I. M, Anis Eliyana, Tri Siwi Agustina

Library Philosophy and Practice (e-journal)

This study was conducted with the aim of determining various bibliometric characteristics of documents published in the Scopus database. The information starts from the type of access, year, author, subject area, document type, publication stage, source title, keyword, affiliation, funding sponsor, country, source type, and language. Capabilities Information Technology and Knowledge Sharing are defined as the use of information technology capabilities and information technology management processes between business units by using the capabilities of resources together. Research on Information Technology Capabilities and Knowledge Sharing by providing a big picture that is visualized from year to year. This study aims to …


Social Media And Public Discourse Participation In Restrictive Environments, Jobany J. Rico Nov 2021

Social Media And Public Discourse Participation In Restrictive Environments, Jobany J. Rico

FIU Electronic Theses and Dissertations

This dissertation investigates citizens' use of social media to participate in public discourse (i.e., access, share, and comment on socio-political content) in restrictive environments: societies ruled by a hegemonic government where users face economic and infrastructure barriers to using digital technologies. Theoretical propositions are built inductively from an interpretive case study of how Cuban citizens use Twitter to participate in socio-political conversations. The case study resulted in the identification of nine affordances (i.e., action potentials) for participating in public discourse that Cubans perceive on Twitter. The findings also showed that the identified affordances enabled Cubans to achieve citizen goals: positive …


Emotional Analysis Of Learning Cybersecurity With Games Using Iot, Maria Valero, Md Jobair Hossain, Shahriar Sobhan Oct 2021

Emotional Analysis Of Learning Cybersecurity With Games Using Iot, Maria Valero, Md Jobair Hossain, Shahriar Sobhan

KSU Proceedings on Cybersecurity Education, Research and Practice

The constant rise of cyber-attacks poses an increasing demand for more qualified people with cybersecurity knowledge. Games have emerged as a well-fitted technology to engage users in learning processes. In this paper, we analyze the emotional parameters of people while learning cybersecurity through computer games. The data are gathered using a non-invasive Brain-Computer Interface (BCI) to study the signals directly from the users’ brains. We analyze six performance metrics (engagement, focus, excitement, stress, relaxation, and interest) of 12 users while playing computer games to measure the effectiveness of the games to attract the attention of the participants. Results show participants …


Resilience Vs. Prevention. Which Is The Better Cybersecurity Practice?, Frank Katz Oct 2021

Resilience Vs. Prevention. Which Is The Better Cybersecurity Practice?, Frank Katz

KSU Proceedings on Cybersecurity Education, Research and Practice

Students in multiple cohorts of our 3000 level Fundamentals of Information Systems Security course were given a discussion question where they had to either agree or disagree with the premise that given all the constant threats to our systems, we should dedicate more of our efforts to quickly repairing the damage of an attack rather than dedicate more of our time and energies to preventing such attacks. They were required to give their reasoning and provide sources to back up their analysis of his comment.

This paper will describe and explain the concept of cyber resiliency. It will then evaluate …


Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne Oct 2021

Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

Everyone knows what package shipping is, but not everyone knows what warshipping is. Corporate mailrooms are rarely considered as part of the cybersecurity attack surface of most organizations, but they offer physical access to millions of uninspected packages daily. UPS shipped 5.5 billion items last year, with their daily average being 21.9 million items and operating through 1,800 locations in 2020. FedEx shipped 6.5 million packages daily and operates 2,150 locations. The United States Postal Service delivered 143 billion pieces of mail in 2019. Increasingly the world’s consumers are relying on e-commerce, and during the recent COVID-19 pandemic, package deliveries …


Towards Assessing Password Workarounds And Perceived Risk To Data Breaches For Organizational Cybersecurity Risk Management Taxonomy, Michael J. Rooney, Yair Levy, Wei Li, Ajoy Kumar Oct 2021

Towards Assessing Password Workarounds And Perceived Risk To Data Breaches For Organizational Cybersecurity Risk Management Taxonomy, Michael J. Rooney, Yair Levy, Wei Li, Ajoy Kumar

KSU Proceedings on Cybersecurity Education, Research and Practice

Cybersecurity involves a broad range of techniques, including cyber-physical, managerial, and technical, while authentication provides a layer of protection for Information Systems (IS) against data breaches. The recent COVID-19 pandemic brought a tsunami of data breach incidents worldwide. Authentication serves as a mechanism for IS against unauthorized access utilizing various defense techniques, with the most popular and frequently used technique being passwords. However, the dramatic increase of user accounts over the past few decades has exposed the realization that technological measures alone cannot ensure high level of IS security; this leaves the end-users holding a critical role in protecting their …


Analyzing Robotics Software Vulnerabilities, Hossain Shahriar, Md Jobair Hossain Faruk, Shahriar Sobhan, Mohammad Nazim Oct 2021

Analyzing Robotics Software Vulnerabilities, Hossain Shahriar, Md Jobair Hossain Faruk, Shahriar Sobhan, Mohammad Nazim

KSU Proceedings on Cybersecurity Education, Research and Practice

Robots are widely used in our day-to-day life in various domains. For example, eldercare robots, such as CareO-Bots [1]are used to perform household tasks and provide mobility assistance [2]. Amazon uses manufacturing robots to accomplish manufacturing labor activities, such as welding and assembling equipment [2]. According to the International Data Corporation, spending on robotics is expected to reach USD 241.4 billion by the end of 2023 [4].

However, malicious users can exploit security vulnerabilities in hardware and software components of robotics systems to conduct security attacks and cause malfunction, i.e., deviate robots from their expected behaviors. Security attacks on robots …


Medication Bottle With Anti - Tampering Features, Bahar Aliakbarian, Muhammad Rabnawaz, Susan E. Selke, Krystal Cheng, Arun Ross, Austin Cozzo, Anurag Chowdhury, Ali Tamayol, Carina Russell, Prem Chahal Oct 2021

Medication Bottle With Anti - Tampering Features, Bahar Aliakbarian, Muhammad Rabnawaz, Susan E. Selke, Krystal Cheng, Arun Ross, Austin Cozzo, Anurag Chowdhury, Ali Tamayol, Carina Russell, Prem Chahal

Department of Supply Chain Management and Analytics: Faculty and Staff Publications

A medication bottle includes an outer container wall, an inner container wall and a fluid, such as an aversive liquid, located between the walls. In another aspect, the fluid is located within separate compartments or channels located between the walls where the walls contact or are secured to each other. A further aspect provides a removeable cap including multiple sensors, at least one of which is a biometric sensor.


Managing And Securing Endpoints: A Solution For A Telework Environment, David Adame Aug 2021

Managing And Securing Endpoints: A Solution For A Telework Environment, David Adame

Electronic Theses, Projects, and Dissertations

This project introduces a business problem in which a water utility company – known as H2O District – was forced to discover and implement a solution that would enable the IT Department to effectively manage and secure their endpoints in a telework environment. Typically, an endpoint is defined as any device that is physically connected to a network. For the purposes of this project, the endpoints that the IT Department was concerned with consisted of Windows 10 PC’s, Laptops, and Apple iOS devices that employees use to access company resources while working outside of the corporate network. To properly manage …


Advances In Global Services And Retail Management: Volume 2, Cihan Cobanoglu, Valentina Della Corte Aug 2021

Advances In Global Services And Retail Management: Volume 2, Cihan Cobanoglu, Valentina Della Corte

University of South Florida (USF) M3 Publishing

This is the second volume of the Advances in Global Services and Retail Management Book Series. This volume has the following parts:

  • Part 1: Hospitality and Tourism
  • Part 2: Marketing, E-marketing, and Consumer Behavior
  • Part 3: Management
  • Part 4: Human Resources Management
  • Part 5: Retail Management
  • Part 6: Economics
  • Part 7: Accounting and Finance
  • Part 8: Sustainability and Environmental Issues
  • Part 9: Information Technology

ISBN: 978-1-955833-03-5

Hospitality and Tourism


Proceedings Of The Global Conference On Services Management: Volume 2, Cihan Cobanoglu, Valentina Della Corte Aug 2021

Proceedings Of The Global Conference On Services Management: Volume 2, Cihan Cobanoglu, Valentina Della Corte

University of South Florida (USF) M3 Publishing

This is the second volume of the Global Conference on Services Management Proceedings Series.

ISSN: 2641-5062


Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, Chunsheng Xin Jul 2021

Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, Chunsheng Xin

Journal of Cybersecurity Education, Research and Practice

Throughout the Internet, many chatbots have been deployed by various organizations to answer questions asked by customers. In recent years, we have been running cybersecurity summer camps for youth. Due to COVID-19, our in-person camp has been changed to virtual camps. As a result, we decided to develop a chatbot to reduce the number of emails, phone calls, as well as the human burden for answering the same or similar questions again and again based on questions we received from previous camps. This paper introduces our practical experience to implement an AI-powered chatbot for middle and high school cybersecurity camps …


Secure Coding In Five Steps, Mini Zeng, Feng Zhu Jul 2021

Secure Coding In Five Steps, Mini Zeng, Feng Zhu

Journal of Cybersecurity Education, Research and Practice

Software vulnerabilities have become a severe cybersecurity issue. There are numerous resources of industry best practices available, but it is still challenging to effectively teach secure coding practices. The resources are not designed for classroom usage because the amount of information is overwhelming for students. There are efforts in academia to introduce secure coding components into computer science curriculum, but a big gap between industry best practices and workforce skills still exists. Unlike many existing efforts, we focus on both the big picture of secure coding and hands-on projects. To achieve these two goals, we present five learning steps that …


Observations, Evaluations, And Recommendations For Deterlab From An Educational Perspective, Ahmed Ibrahim, Vitaly Ford Jul 2021

Observations, Evaluations, And Recommendations For Deterlab From An Educational Perspective, Ahmed Ibrahim, Vitaly Ford

Journal of Cybersecurity Education, Research and Practice

DETERLab is a cluster environment that provides a set of virtual machines that can be used by researchers and teachers to run cybersecurity experiments and competitions, and where it is possible to deploy different network configurations to research attack and defense mechanisms in the cyber world. While we were working to develop a pathway for producing more usable and effective cybersecurity educational resources by investigating and examining several projects, we examined DETERLab as a prospective platform to use in the classroom. Throughout our experimentation, we faced challenges that we decided to document in order to help other educators use the …


Contingency Planning Amidst A Pandemic, Natalie C. Belford Jul 2021

Contingency Planning Amidst A Pandemic, Natalie C. Belford

Journal of Cybersecurity Education, Research and Practice

Proper prior planning prevents pitifully poor performance: The purpose of this research is to address mitigation approaches - disaster recovery, contingency planning, and business continuity planning - and their benefits as they relate to university operations during a worldwide pandemic predicated by the novel coronavirus (COVID-19). The most relevant approach pertaining to the University’s needs and its response to the coronavirus pandemic will be determined and evaluated in detail.


An Organization’S Ability To Improve Outsourcing Outcomes In Information Technology Outsourcing Initiatives By Increasing Organizational Knowledge: A Case Study, John Michael Mello Jun 2021

An Organization’S Ability To Improve Outsourcing Outcomes In Information Technology Outsourcing Initiatives By Increasing Organizational Knowledge: A Case Study, John Michael Mello

Electronic Theses and Dissertations

The problem addressed in this study was the literature gap regarding how internal organizational knowledge can be increased effectively within outsourcing projects. The study was a qualitative social constructionist case study composed of senior technology leaders. The purpose this study addressed was to understand the current structure of technical outsourcing contracts and how future contracts could be structured to address the problem of this study. The research incorporated how a reconceptualized absorptive capacity model, sociocognitive theory, and digital leadership mindsets could improve knowledge transfer outcomes between a vendor and client. Research shows that increasing an organization’s knowledge during an outsourcing …


Detecting Dirty Data Using Sql: Rigorous House Insurance Case, Daniel Street, James G. Lawson Jun 2021

Detecting Dirty Data Using Sql: Rigorous House Insurance Case, Daniel Street, James G. Lawson

Faculty Journal Articles

Proficiency with data analytics is an increasingly important skill within in the accounting profession. However, successful data analysis requires clean source data (i.e., source data without errors) in order to draw reliable conclusions. Although users often assume clean source data, this assumption is frequently incorrect. Therefore, identifying and remediating “dirty data” is a prerequisite to effective data analysis. You, an accountant working at a firm that specializes in data analytics, have been hired by Rigorous House Insurance to analyze the company’s claim insurance data. In addition to investigating specific issues mentioned by the company’s controller, you are tasked with identifying …