Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

Missouri University of Science and Technology

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 35

Full-Text Articles in Technology and Innovation

Enhancing Innovation Via The Digital Twin, Nobuyuki Fukawa, Aric Rindfleisch Jan 2023

Enhancing Innovation Via The Digital Twin, Nobuyuki Fukawa, Aric Rindfleisch

Business and Information Technology Faculty Research & Creative Works

A Growing Number of Firms Are Seeking to Leverage Emerging Technologies, Such as Artificial Intelligence (AI) and 3D Printing, to Enhance their Innovation Efforts. These Seemingly Distinct Technologies Are Currently Coalescing into an Encompassing New Technology Called the Digital Twin. This Technology Allows Innovative Firms to Create a Digital Replica of a Physical Entity that Evolves over its Life Cycle. This Article Explores the Implications of the Digital Twin for Innovation Theory and Practice. First, We Examine the Connection between the Digital Twin and Three Related Technologies (I.e., 3D Printing, Big Data, and AI). Second, We Create a Typology of …


Information Systems Analysis And Design: Past Revolutions, Present Challenges, And Future Research Directions, Keng Siau, Carson Woo, Veda C. Storey, Roger H.L. Chiang, Cecil Eng Huang Chua, Jon W. Beard Jan 2022

Information Systems Analysis And Design: Past Revolutions, Present Challenges, And Future Research Directions, Keng Siau, Carson Woo, Veda C. Storey, Roger H.L. Chiang, Cecil Eng Huang Chua, Jon W. Beard

Business and Information Technology Faculty Research & Creative Works

Systems Analysis and Design (SAND) is Undoubtedly a Pillar in the Field of Information Systems (IS). Some Researchers Have Even Claimed that SAND is the Field that Defines the Information Systems Discipline and is the Core of Information Systems. the Past Decades Have Seen the Development of Structured SAND Methodologies and Object-Oriented Methodologies. in the Early 1990s, Key Players in the Field Collaborated to Develop the Unified Modeling Language and the Unified Process. Agile Approaches Followed, as Did Other Dynamic Methods. These Approaches Remain Heavily Employed in the Development of Contemporary Information Systems. at the Same Time, New Approaches Such …


The Impact Of Perceived Manipulation, Motives, And Ethicality In Cause-Related Marketing: A Crm+ Model, Nathan W. Twyman, Sarah M. Stanley, Cassandra C. Elrod, Tamara M. Masters Jan 2022

The Impact Of Perceived Manipulation, Motives, And Ethicality In Cause-Related Marketing: A Crm+ Model, Nathan W. Twyman, Sarah M. Stanley, Cassandra C. Elrod, Tamara M. Masters

Business and Information Technology Faculty Research & Creative Works

We Developed a CRM+ Model using Experimentation and Structural Equation Modeling Analysis. CRM+ Demonstrates Previously Unexplored Interrelationships among Consumer-Perceived Manipulation, Brand Motives, Perceived Ethicality of the Cause-Related Marketing, and Brand Attitude. CRM+ Reveals that Perceived Ethicality of the CRM Has a Significant Positive Effect on Brand Attitude, Though It is Not as Pronounced as the Effect of Perceived Altruistic Motives. Egoistic Motives Decrease Ethicality Perceptions But Has No Direct Effect on Brand Attitude. Altruistic Motive Perceptions Diminish Egoistic Motive Perceptions. CRM+ Suggests Marketing Managers Should Prioritize Emphasizing Altruistic Motives and Ethicality of the Partnership over Downplaying Egoistic Motives.


The Reinforcing Effects Of Formal Control Enactment In Complex It Projects, Gloria Hui Wen Liu, Cecil Eng Huang Chua Apr 2020

The Reinforcing Effects Of Formal Control Enactment In Complex It Projects, Gloria Hui Wen Liu, Cecil Eng Huang Chua

Business and Information Technology Faculty Research & Creative Works

Complex IT projects pose particular challenges for the application of control, because of the dynamism and uncertainty involved. Prior studies suggest self-control can complement formal control within complex projects. However, how managers can enact controlee self-control remains an unsolved question. This paper proposes and investigates how enacted formal control unfolds during the course of an IT project and, in particular, how formal control enactment can promote or hinder controlee self-control. We demonstrate through case studies of a control in two wireless communication product development projects that an enabling control style can induce controlees to act to the benefit of both …


Asymmetric Effects Of Cultural Institutes On Trade And Foreign Direct Investment, Donald Lien, Melody Lo, David Bojanic May 2019

Asymmetric Effects Of Cultural Institutes On Trade And Foreign Direct Investment, Donald Lien, Melody Lo, David Bojanic

Business and Information Technology Faculty Research & Creative Works

The Purpose of a Cultural Institute is to Improve International Relations with Other Countries by Promoting Language Familiarity and Cultural Awareness. in Addition, Cultural Institutes Can Provide Additional Business Opportunities that Lead to Positive Economic Side Effects Such as Increases in Trade and Foreign Direct Investment (FDI). in This Study, Gravity Models Were Used to Analyse the Data for the Goethe Institut (Germany), the Cervantes Institute (Spain) and the Confucius Institute (China) to Identify Any Stylised International Patterns of the Documented Economic Effects. the Study Finds Significant Positive Effects on Bilateral Trade and FDI Outflows for All Three Programmes, Along …


Impact Of Framing And Base Size Of Computer Security Risk Information On User Behavior, Xinhui Zhan Jan 2019

Impact Of Framing And Base Size Of Computer Security Risk Information On User Behavior, Xinhui Zhan

Masters Theses

"This research examines the impact of framing and base size of computer security risk information on users' risk perceptions and behavior (i.e., download intention and download decision). It also examines individual differences (i.e., demographic factors, computer security awareness, Internet structural assurance, self-efficacy, and general risk-taking tendencies) associated with users' computer security risk perceptions. This research draws on Prospect Theory, which is a theory in behavioral economics that addresses risky decision-making, to generate hypotheses related to users' decision-making in the computer security context. A 2 x 3 mixed factorial experimental design (N = 178) was conducted to assess the effect of …


Predictive Modeling Of Webpage Aesthetics, Ang Chen Jan 2019

Predictive Modeling Of Webpage Aesthetics, Ang Chen

Masters Theses

"Aesthetics plays a key role in web design. However, most websites have been developed based on designers' inspirations or preferences. While perceptions of aesthetics are intuitive abilities of humankind, the underlying principles for assessing aesthetics are not well understood. In recent years, machine learning methods have shown promising results in image aesthetic assessment. In this research, we used machine learning methods to study and explore the underlying principles of webpage aesthetics"--Abstract, page iii.


Impact Of Probable And Guaranteed Monetary Value On Cybersecurity Behavior Of Users, Santhosh Kumar Ravindran Jan 2018

Impact Of Probable And Guaranteed Monetary Value On Cybersecurity Behavior Of Users, Santhosh Kumar Ravindran

Masters Theses

"This research examines the impact of probable and guaranteed monetary gains and losses on users' cybersecurity behavior. It also examines perceptual outcomes such as threat severity, trust, and fear that are associated with users' cybersecurity behavior. Drawing on Prospect Theory in the behavioral economics and decision-making literature, hypotheses were generated for the research. The hypotheses state that: (i) users are more willing to engage in risky computer security behavior to avoid a loss than to receive a gain, (ii) users exhibit a higher tipping point of expected monetary value to receive a gain than to avoid a loss for engaging …


Classification Of Eeg Signals Of User States In Gaming Using Machine Learning, Chandana Mallapragada Jan 2018

Classification Of Eeg Signals Of User States In Gaming Using Machine Learning, Chandana Mallapragada

Masters Theses

"In this research, brain activity of user states was analyzed using machine learning algorithms. When a user interacts with a computer-based system including playing computer games like Tetris, he or she may experience user states such as boredom, flow, and anxiety. The purpose of this research is to apply machine learning models to Electroencephalogram (EEG) signals of three user states -- boredom, flow and anxiety -- to identify and classify the EEG correlates for these user states. We focus on three research questions: (i) How well do machine learning models like support vector machine, random forests, multinomial logistic regression, and …


Neural Correlates Of Flow, Boredom, And Anxiety In Gaming: An Electroencephalogram Study, Tejaswini Yelamanchili Jan 2018

Neural Correlates Of Flow, Boredom, And Anxiety In Gaming: An Electroencephalogram Study, Tejaswini Yelamanchili

Masters Theses

"Games are engaging and captivating from a human-computer interaction (HCI) perspective as they can facilitate a highly immersive experience. This research examines the neural correlates of flow, boredom, and anxiety during video gaming. A within-subject experimental study (N = 44) was carried out with the use of electroencephalogram (EEG) to assess the brain activity associated with three states of user experience - flow, boredom, and anxiety - in a controlled gaming environment. A video game, Tetris, was used to induce flow, boredom, and anxiety. A 64 channel EEG headset was used to track changes in activation patterns in the frontal, …


Automated Scientifically Controlled Screening Systems (Ascss), Nathan W. Twyman, Jay F. Nunamaker May 2017

Automated Scientifically Controlled Screening Systems (Ascss), Nathan W. Twyman, Jay F. Nunamaker

Business and Information Technology Faculty Research & Creative Works

The ability to detect when a person is hiding important information has high value in many applications. A new class of systems, termed autonomous scientifically controlled screening systems (ASCSS), is designed to detect individuals' purposely hidden information about target topics of interest. ASCSS represents a systematic synthesis of structured interviewing, orienting theory, defensive response theory, non-invasive psychophysiological measurement, and behavioral measurement. To evaluate and enhance the design principles, an automated screening kiosk (ASK) system was constructed. The ASK system has been used in a physical security screening scenario in which participants constructed and attempted to smuggle a fake improvised explosive …


Extending Time Series Forecasting Methods Using Functional Principal Components Analysis, Isaac Michael Wagner-Muns Jan 2017

Extending Time Series Forecasting Methods Using Functional Principal Components Analysis, Isaac Michael Wagner-Muns

Masters Theses

"Traffic volume forecasts are used by many transportation analysis and management systems to better characterize and react to fluctuating traffic patterns. Most current forecasting methods do not take advantage of the underlying functional characteristics of the time series to make predictions. This paper presents a methodology that uses Functional Principal Components Analysis (FPCA) to create smooth and differentiable daily traffic forecasts. The methodology is validated with a data set of 1,813 days of 15 minute aggregated traffic volume time series. Both the FPCA based forecasts and the associated prediction intervals outperform traditional Seasonal Autoregressive Integrated Moving Average (SARIMA) based methods"--Abstract, …


Specialist Communities In China’S Aerospace Technology And Innovation System: The Cultural Dimension, Alanna Krolikowski Jan 2017

Specialist Communities In China’S Aerospace Technology And Innovation System: The Cultural Dimension, Alanna Krolikowski

History and Political Science Faculty Research & Creative Works

Only two decades ago, China was a marginal player in the global aerospace industry. Today, the pace of China’s space programs is unparalleled and it has joined the sector’s leading ranks. China is the only country after the Soviet Union/Russia and the United States to independently send humans into orbit and a rover to touch down on the Moon. A Chinese station will likely soon be only the only long-term human habitat circling the Earth alongside the International Space Station. Within a decade, China could become only the second country in history to land a person on the Moon’s surface. …


Leveraging Knowledge At Startups, Amruta Anil Ranade Jan 2017

Leveraging Knowledge At Startups, Amruta Anil Ranade

Masters Theses

"Startups contribute to the economy and job creation in the United States. One of the primary assets of startups is tacit knowledge of the employees of the startup. Technical communicators can help startups capture, share, and leverage the tacit knowledge at startups. Technical communicators could benefit from learning how knowledge management initiatives at startups work. The current study is an ethnographic case-study that was conducted at a fast-growing startup in California.

The data for the study was collected through observations, informal and semi-structured formal interviews with participants, and feedback from customers of the startup. The collected data was analyzed based …


Impact Of Framing And Priming On Users' Behavior In Cybersecurity, Kavya Sharma Jan 2017

Impact Of Framing And Priming On Users' Behavior In Cybersecurity, Kavya Sharma

Masters Theses

"This research examines the impact of framing and priming on users' behavior (i.e., action) in a cybersecurity setting. It also examines perceptual outcomes (i.e., confidence, perceived severity, perceived susceptibility, trust, and fear) associated with the users' cybersecurity action. The research draws on prospect theory in the behavioral economics literature and instance-based learning theory in the education literature to generate the hypotheses for the research. A between-subject experimental design (N=129) was used. The results suggest that priming users to cybersecurity risks reduces their risk-taking behavior associated with cybersecurity whereas negative framing of messages associated with cybersecurity has no significant effect on …


Sentiment Analytics: Lexicons Construction And Analysis, Bo Yuan Jan 2017

Sentiment Analytics: Lexicons Construction And Analysis, Bo Yuan

Masters Theses

"With the increasing amount of text data, sentiment analysis (SA) is becoming more and more important. An automated approach is needed to parse the online reviews and comments, and analyze their sentiments. Since lexicon is the most important component in SA, enhancing the quality of lexicons will improve the efficiency and accuracy of sentiment analysis. In this research, the effect of coupling a general lexicon with a specialized lexicon (for a specific domain) and its impact on sentiment analysis was presented. Two special domains and one general domain were studied. The two special domains are the petroleum domain and the …


Using Eye-Tracking To Understand User Behavior In Deception Detection System Interaction, Prashanth Kumar Lakkapragada Jan 2016

Using Eye-Tracking To Understand User Behavior In Deception Detection System Interaction, Prashanth Kumar Lakkapragada

Masters Theses

"This research presents the analysis of data collected using eye-tracking devices on user interaction with a deception detection system. The differences between two groups of subjects, namely Innocent and Guilty, were compared, where Innocent subjects did not carry any explosive and hence, had nothing to hide in declaring objects that they were carrying whereas Guilty subjects had to lie to deceive the system. The results indicate that there is no significant difference in pupil dilation between the Innocent and Guilty subjects. However, the amount of fixations on the empty spaces of slides containing an explosive image can be used to …


Understanding User Experience In Gaming, Sri Chaitanya Sanaboina Jan 2016

Understanding User Experience In Gaming, Sri Chaitanya Sanaboina

Masters Theses

"This research examines the effect of virtual reality gaming versus desktop based gaming on spatial presence, social presence, and intention to play. It draws on cognitive theory of presence, social presence theory, and theory of reasoned action to generate the research hypotheses and explain the observed phenomenon. A within-subject experimental design (N=53) was used to evaluate the effects of virtual reality versus desktop based gaming. The results suggest that both spatial presence and social presence were significantly enhanced in the virtual reality gaming environment while intention to play was significantly greater in the desktop based gaming environment"--Abstract, page iii.


Bridging The Gap Between Supply Chain And Consumer Experience, Cui Zou Jan 2016

Bridging The Gap Between Supply Chain And Consumer Experience, Cui Zou

Masters Theses

Many researchers agree that supply chain management is at the root of addressing customer values and increasing customer satisfaction. However, in reality the route to accomplishing these goals is not so clearly defined. The studies herein attempt to shed some insight on a special perspective to bridge the gap between supply chain and customer experience. The ideas behind these studies explore the notion that customer experience can be impacted by a vast spectrum of factors from suppliers to even the specific mobile commerce (m-commerce) tools they use.

To gain insight into the supplier dimension of the supply chain, a survey …


Factors Influencing The Adoption Of Smart Wearable Devices, Apurva Adapa Jan 2016

Factors Influencing The Adoption Of Smart Wearable Devices, Apurva Adapa

Masters Theses

"This study aims to examine the factors and issues in adoption of smart wearable devices. Wearable devices have many functions to offer which make them very useful in our daily lives. However, factors influencing the adoption of these devices are not well understood. This research explores the inhibiting and contributing factors influencing the adoption of wearable devices by employing the laddering approach. Qualitative data were collected through in-depth interviews using the laddering technique in order to understand these factors. Wearable devices that were examined include the Smart Glass (Google Glass) and the Smart Watch (Sony Smart Watch 3). After the …


Yik Yak Posts: A Discourse Analysis, Snehal Ravindra Shirke Jan 2016

Yik Yak Posts: A Discourse Analysis, Snehal Ravindra Shirke

Masters Theses

"Anonymity and geolocation create a unique environment for users to communicate with each other. Discourse analysis was conducted to study the posts made on Yik Yak, an anonymous social networking mobile application to understand the communication patterns on an anonymous platform and the posts about taboo topics. The posts were analyzed specifically for patterns on taboo topics and how students interact on the anonymous platform on a particular campus (Missouri S&T campus). Student research assistants coded the collected posts into the pre-defined taboo categories namely sexual activity, non-sexual bodily functions, sexual orientation, mental/emotional health, and "other" taboo topics. I found …


Effect Of Cooperation On Players' Immersion And Enjoyment, Lakshmi Sushma Daggubati Jan 2016

Effect Of Cooperation On Players' Immersion And Enjoyment, Lakshmi Sushma Daggubati

Masters Theses

"This research examines the effect of cooperative versus non-cooperative game play on immersion and enjoyment in online games. It draws on the self-determination theory to generate the research hypotheses and explain the observed phenomenon. A within-subject experimental design (N=38) was used to evaluate the effects of cooperative versus non-cooperative game play on enjoyment and immersion by having participants play in a manipulated game mode in a controlled gaming environment. The participants' subjective responses were assessed to understand their user experience in cooperative and non-cooperative gaming environments. The results suggest that both immersion and enjoyment were significantly enhanced in cooperative game …


Effect Of Timing And Source Of Online Product Recommendations: An Eye-Tracking Study, Qing Zeng Jan 2016

Effect Of Timing And Source Of Online Product Recommendations: An Eye-Tracking Study, Qing Zeng

Masters Theses

"Online retail business has become an emerging market for almost all business owners. Online recommender systems provide better services to the consumers as well as assist consumers with their decision making processes. In this study, a controlled lab experiment was conducted to assess the effect of recommendation timing (early, mid, and late) and recommendation source (expert reviews vs. consumer reviews) on e-commerce users' interest and attention. Eye-tracking data was extracted from the experiment and analyzed. The results suggest that users show more interest in recommendation based on consumer reviews than recommendation based on expert reviews. Earlier recommendations do not receive …


Whose Talk Is Walked? It Decentralizability, Vendor Versus Adopter Discourse, And The Diffusion Of Social Media Versus Big Data, Shaila Miranda, Inchan Kim, Dawei David Wang Dec 2015

Whose Talk Is Walked? It Decentralizability, Vendor Versus Adopter Discourse, And The Diffusion Of Social Media Versus Big Data, Shaila Miranda, Inchan Kim, Dawei David Wang

Business and Information Technology Faculty Research & Creative Works

Discourse plays a central role in organizing vision and computerization movement perspectives on IT innovation diffusion. While we know that different actors within a community contribute to the discourse, we know relatively little about the roles different actors play in diffusing different types of IT innovations. Our study investigates vendor versus adopter roles in social media and big data diffusion. We conceptualize the difference between the two IT innovations in terms of their decentralizability, i.e., extent to which decision rights pertinent to adoption of an organizational innovation can be decentralized. Based on this concept, we hypothesized: (1) adopters would contribute …


Demographic Impacts On Environmentally Friendly Purchase Behaviors, Caroline Fisher, Shristy Bashyal, Bonnie Bachman Sep 2012

Demographic Impacts On Environmentally Friendly Purchase Behaviors, Caroline Fisher, Shristy Bashyal, Bonnie Bachman

Business and Information Technology Faculty Research & Creative Works

Researchers have continued to study green consumer demographics with mixed results. The relevant literature since 1998 (the last review) was summarized to determine what demographics seemed to impact environmental purchasing. The greatest consistency was found for gender with women more likely to exhibit green behaviors. This research article analyzed survey responses to determine the environmentally friendly behaviors of consumers and their relationships to demographics. Several demographics were found to be related to a number of specific environmentally friendly behaviors, more than in prior research. The authors concluded that using specific behaviors, in contrast to general statements or attitudes, may be …


Automated Human Screening For Detecting Concealed Knowledge, Nathan W. Twyman Jan 2012

Automated Human Screening For Detecting Concealed Knowledge, Nathan W. Twyman

Business and Information Technology Faculty Research & Creative Works

Screening individuals for concealed knowledge has traditionally been the purview of professional interrogators investigating a crime. But the ability to detect when a person is hiding important information would be of high value to many other fields and functions. This dissertation proposes design principles for and reports on an implementation and empirical evaluation of a non-invasive, automated system for human screening. The screening system design (termed an automated screening kiosk or ASK) is patterned after a standard interviewing method called the Concealed Information Test (CIT), which is built on theories explaining psychophysiological and behavioral effects of human orienting and defensive …


Hospitality Marketing Mix And Service Marketing Principles, David Bojanic Nov 2009

Hospitality Marketing Mix And Service Marketing Principles, David Bojanic

Business and Information Technology Faculty Research & Creative Works

The Concept of Marketing is based on the Premise that Firms Should Determine Consumer Wants and Needs Before Designing Products and Services. This Consumer-Orientation Results in Greater Demand for a Firm's Products and Services and Higher Levels of Customer Satisfaction after the Purchase. Marriott International Followed This Approach in Developing their Courtyard and Residence Inns Hotels. for Example, the Courtyard Concept is Supposed to Attract Business Travelers and Transient Customers Who Do Not Really Like Staying at Hotels (Wind Et Al, 1992; Hart, 1986). the Researchers Recruited Individuals for Focus Groups Representing These Two Market Segments to Determine the Hotel …


Nanofibrous Articles, Gene Kim, Bonnie Bachman, Stephen O. Bozzone Jan 2007

Nanofibrous Articles, Gene Kim, Bonnie Bachman, Stephen O. Bozzone

Economics Faculty Research & Creative Works

Nanofibrous articles can be manufactured by a process that includes preparation of a surface of a substrate to provide an adhesion mechanism for securing the nanofibers to the surface. The nanofibers can be dispersed in an area near the substrate for the purpose of being adhered to the surface. If an ordered arrangement of nanofibers is required, an electric field can be provided in the area where the nanofibers are dispersed to selectively control an ordering of the nanofibers as they are adhered to the surface by the adhesion mechanism.


Method And Apparatus For Solder-Less Attachment Of An Electronic Device To A Textile Circuit, James A. Zollo, Bonnie Bachman, Alan R. Beatty, Stephen O. Bozzpme, Nitin B. Desai, Ronald J. Kelley, Rami C. Levy Apr 2006

Method And Apparatus For Solder-Less Attachment Of An Electronic Device To A Textile Circuit, James A. Zollo, Bonnie Bachman, Alan R. Beatty, Stephen O. Bozzpme, Nitin B. Desai, Ronald J. Kelley, Rami C. Levy

Economics Faculty Research & Creative Works

A method and apparatus form electrical connections between electronic circuits and conductive threads (102, 104, 106, 108) that are interwoven into textile material (130). Electronic circuits (128), such as semiconductor dies, are connected to a carrier (132) and electrical connections (136) are made to conductive connection areas (110, 112, 114, 116) on the carrier (132). Conductive stitching (202, 204, 206, 208) provides electrical contacts for both the conductive connection areas (110, 112, 114, 116) on the carrier (132) and the conductive threads (102, 104, 106, 108) that are interwoven into the textile material (130). Optionally, a thin, flexible substrate material …


Method And System For Electronically Generating Random Answers, Stephen O. Bozzone, Bonnie Bachman Dec 2005

Method And System For Electronically Generating Random Answers, Stephen O. Bozzone, Bonnie Bachman

Economics Faculty Research & Creative Works

The invention concerns a method (300) and system (110) for electronically generating random responses in a portable electronic device (110). The method includes the steps of detecting (316) motion of the portable electronic device, in response to the detecting step, generating (318) the random response and outputting (320) the random response to a user of the portable electronic device. The method can further include the steps of prompting (312) the user to ask a question and following a predetermined time period after prompting the user to ask the question, prompting (314) the user to shake the portable electronic device. The …