Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

2020

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 64

Full-Text Articles in Technology and Innovation

Ransomware - A Strategic Threat To Organizations, James Frost, Alan R. Hamlin Dec 2020

Ransomware - A Strategic Threat To Organizations, James Frost, Alan R. Hamlin

Mountain Plains Journal of Business and Technology

Ransomware is a strategic threat to government, business, and academic organizations. It has both short term and long term consequences, requiring strategic planning to create defenses, assess options, and create policies.

The purpose of the study is to answer three questions: What is the strategic risk of cyberattack to organizations? What are the current attitudes and practices of executives who are vulnerable to such threats? What are specific options that organizations should consider to prevent and deal with possible incidents in the future? The article is thus comprised of the following components: A) a history of the development and complexity …


Monetary Impact Of National Exchange Carrier Association Tariffs On Internet Access Cost In Rural Areas, Tim Obermier, Angela K. Hollman Dec 2020

Monetary Impact Of National Exchange Carrier Association Tariffs On Internet Access Cost In Rural Areas, Tim Obermier, Angela K. Hollman

Mountain Plains Journal of Business and Technology

This study examines the monetary impact of tariffs on consumer internet access via a digital subscriber line (DSL). Historically, the Communications Act of 1934 mandated that telephony services be provided to everyone, without exclusion. With the rapid emergence of the internet, the Connect America Fund was recently implemented to ensure equal access to both voice and broadband services. Since many telephony companies have emerged as internet service providers, DSL internet service is often bundled together with a landline telephone, especially in rural areas. This study examines the total cost of such bundled DSL internet service across the classes of cities …


Little Did We Know What We Are Preparing For: Virtual Interviews Before Covid-19, Alina Popa, Scott Kubomoto, Lorra Baldes Nov 2020

Little Did We Know What We Are Preparing For: Virtual Interviews Before Covid-19, Alina Popa, Scott Kubomoto, Lorra Baldes

HCA Healthcare Journal of Medicine

Current circumstances related to the COVID-19 pandemic require residency programs to conduct virtual interviews. We draw upon our experience with virtual interviews from fall 2019, prior to COVID-19, and propose a potential implementation process for virtual interviewing strategies. We also describe potential pitfalls and strategies to mitigate them.


Air Traffic Safety Management: The Significance Of Voluntary Reporting And Data Distribution, Xavier M. Ashley Nov 2020

Air Traffic Safety Management: The Significance Of Voluntary Reporting And Data Distribution, Xavier M. Ashley

Beyond: Undergraduate Research Journal

This study primarily investigated inadequacies identified through the utilization of the Air Traffic Safety Action Program (ATSAP), a Voluntary Safety Reporting Program (VSRP) overseen by the U.S. Federal Aviation Administration (FAA). The primary objective of this research was to ascertain whether the FAA was properly managing the ATSAP and if the program was capable of effectively identifying safety hazards present in the national airspace. To assist in this determination, this study communicated the basic characteristics and significance of safety management and voluntary reporting in aviation. This served to clarify the intended function of the ATSAP and to articulate contributions that …


An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles Nov 2020

An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles

James Madison Undergraduate Research Journal (JMURJ)

A smart city is an interconnection of technological components that store, process, and wirelessly transmit information to enhance the efficiency of applications and the individuals who use those applications. Over the course of the 21st century, it is expected that an overwhelming majority of the world’s population will live in urban areas and that the number of wireless devices will increase. The resulting increase in wireless data transmission means that the privacy of data will be increasingly at risk. This paper uses a holistic problem-solving approach to evaluate the security challenges posed by the technological components that make up a …


Engaging Stakeholder Networks To Support Global Oa Monograph Usage Analytics, Christina Drummond Oct 2020

Engaging Stakeholder Networks To Support Global Oa Monograph Usage Analytics, Christina Drummond

Collaborative Librarianship

Just as COVID-19 brought in-person meetings to a halt, the Open Access eBook Usage (OAeBU) Data Trust transitioned from a two-year stakeholder planning project to a two-year global pilot tasked with developing infrastructure use-cases, software code, sustainability models, and governance mechanisms to better enable the usage and impact analyses of OA monographs. This report introduces the array of stakeholders involved in OA book analytics and summarizes how this data trust effort worked to engage them during the first third of the project. Virtual network building and engagement strategies such as online stakeholder-oriented communities and collaboration tools are discussed alongside traditional …


إدارة التقانة بين النظرية والتطبيق: كيف نجحت تلك الدول في نهضتها؟, Bashar Alhaj Ahmad Oct 2020

إدارة التقانة بين النظرية والتطبيق: كيف نجحت تلك الدول في نهضتها؟, Bashar Alhaj Ahmad

Al Jinan الجنان

This research presented one of the modern concepts in administration area called “Technology Management”. This concept refers to the mechanism by which we can transfer one technology from one place to another and gives the ability of applying it following scientific and methodological manner. As a result, this will give the chance for the received country to absorb and assimilate the new technology and to produce similar technologies in advanced phases. In the other side, the research presents many succeed experiments in this field like the Korean, Chinese, and the Malaysian experience. This countries in a very short period could …


A False Sense Of Security: How Congress And The Sec Are Dropping The Ball On Cryptocurrency, Tessa E. Shurr Oct 2020

A False Sense Of Security: How Congress And The Sec Are Dropping The Ball On Cryptocurrency, Tessa E. Shurr

Dickinson Law Review (2017-Present)

Today, companies use blockchain technology and digital assets for a variety of purposes. This Comment analyzes the digital token. If the Securities and Exchange Commission (SEC) views a digital token as a security, then the issuer of the digital token must comply with the registration and extensive disclosure requirements of federal securities laws.

To determine whether a digital asset is a security, the SEC relies on the test that the Supreme Court established in SEC v. W.J. Howey Co. Rather than enforcing a statute or agency rule, the SEC enforces securities laws by applying the Howey test on a fact-intensive …


Fixing Social Media: Toward A Democratic Digital Commons, Michael Kwet Sep 2020

Fixing Social Media: Toward A Democratic Digital Commons, Michael Kwet

Markets, Globalization & Development Review

In the past few years, big Social Media networks like Facebook, Twitter, and YouTube have received intense scrutiny from the intellectual classes. This article critiques the dominant strain of criticism, the neo-Brandeisian School of antitrust, for its narrow focus on “regulated competition” as an appropriate means to “fix social media”. This essay calls for a socialist alternative: a democratic social media commons based on free and open source technology, decentralization, and democratic socialist legal solutions. It reviews how existing solutions like the Fediverse and LibreSocial work, and how they may provide answers for a better way forward.


Creating A Competitive Environment For Defense Aerospace In A Protectionist Multipolar World: A Study Of India And Israel, Shlok Misra, Tanish Jain Sep 2020

Creating A Competitive Environment For Defense Aerospace In A Protectionist Multipolar World: A Study Of India And Israel, Shlok Misra, Tanish Jain

Beyond: Undergraduate Research Journal

The paper studies protectionism in defense aerospace in a multipolar world and analyzes the strategies of two emerging powers: India and Israel. The emergence of protectionism in a multipolar world has left a visible and influential impact in the globally integrated defense industry. As the world has become increasingly multipolar, new military powers have emerged around the world. India and Israel are disparate in terms of their size, wealth, and international relations. There are interesting similarities between them when it comes to their defense strategies. As a result, they also present compelling case studies for understanding protectionism in a multipolar …


Crypto And Blockchain Fundamentals, Mary C. Lacity Aug 2020

Crypto And Blockchain Fundamentals, Mary C. Lacity

Arkansas Law Review

"I believe blockchain will do for trusted transactions what the Internet has done for information." - Ginni Rometty, CEO of IBM Since the 1990s, we have had an "Internet of Information" that allows us to seamlessly share information such as documents, images, emails, and videos over the Internet. While most Internet users do not need to understand the details of the technical protocols operating underneath user-friendly software interfaces, it is helplful to understand how they work at a high-level. With the "Internet of Information," copies of information are routed over the Internet. If a sender emails a friend, the sender …


The Impact Of Autonomous Vehicles, Preston Loveland Aug 2020

The Impact Of Autonomous Vehicles, Preston Loveland

Marriott Student Review

In this article, Preston Loveland delves into the innovations of autonomous vehicles. He outlines the safety, benefits, and public opinion of self-driving cars while inviting the reader to become part of this innovation.


Preparing Students For Digital Era Careers, Melissa Stange Aug 2020

Preparing Students For Digital Era Careers, Melissa Stange

Inquiry: The Journal of the Virginia Community Colleges

This paper will discuss why technical skills alone will not be enough for students to have successful careers in the digital age. Much of their success will hinge on critical soft skills, such as adaptability, inner strength, holistic thinking, and a collaborative spirit. Examples will be provided for inclusion with a computer science program, but in a way that is easily adaptable to other disciplines.


Specialization: Do Your Job Well Helping Students Who Are Considering A Career In Programming Know How To Invest Their Time., Scott Pulley Jul 2020

Specialization: Do Your Job Well Helping Students Who Are Considering A Career In Programming Know How To Invest Their Time., Scott Pulley

Marriott Student Review

The article examines the effects of specialization on the hiring process for undergraduates studying programming whether in information systems or computer science.


Passing The Baton From Detroit To Berlin: Techno’S Introduction To The Global Scene, Rebekah M. Thomas Jul 2020

Passing The Baton From Detroit To Berlin: Techno’S Introduction To The Global Scene, Rebekah M. Thomas

Backstage Pass

Podcast describing the history and cultural impact of the techno music trend in the 1980s and 1990s.


A Coordinated Communication & Awareness Approach For Information Security Incident Management: An Empirical Study On Ethiopian Organizations, Keshnee Padayachee, Elias Worku Jul 2020

A Coordinated Communication & Awareness Approach For Information Security Incident Management: An Empirical Study On Ethiopian Organizations, Keshnee Padayachee, Elias Worku

The African Journal of Information Systems

The coordination of communication and awareness efforts in the process of Information Security Incident Management (ISIM) has been identified as a critical means of enhancing information security protection in organizations. This paper aims to explore the nuances of organizational information security with respect to the coordination of communication and awareness efforts among organizational stakeholders towards achieving a shared, interactive, and participatory ISIM. According to the findings of the study in the organizations sampled, it has been identified that reporting, communication, and awareness efforts within ISIM were found to be largely uncoordinated. The exploratory findings provided a rationale for the proposal …


Made In The Usa: Technological Corporatism, Infrastructure Regulation, And Dupont 1902-1917, Roman Y. Shemakov Jun 2020

Made In The Usa: Technological Corporatism, Infrastructure Regulation, And Dupont 1902-1917, Roman Y. Shemakov

Swarthmore Undergraduate History Journal

The turn of the twentieth century radically renewed industrial organization across the United States. Early American corporations -- centralized manufacturing hubs with journeymen and apprentices laboring under one roof -- were seldom prepared for the transformations that scientific management and structural reorganization would bring to social relations. At the helm of World War 1, DuPont became the epitome of broader national restructuring. Through a close relationship with American military industries and legislatures, the DuPont brothers came to represent Business as an inseparable component of the State. While labor historiography has primarily focused on organizers’ relationship with regulators, important segments of …


Evaluating And Securing Text-Based Java Code Through Static Code Analysis, Jeong Yang, Young Lee, Amanda Fernandez, Joshua Sanchez Jun 2020

Evaluating And Securing Text-Based Java Code Through Static Code Analysis, Jeong Yang, Young Lee, Amanda Fernandez, Joshua Sanchez

Journal of Cybersecurity Education, Research and Practice

As the cyber security landscape dynamically evolves and security professionals work to keep apace, modern-day educators face the issue of equipping a new generation for this dynamic landscape. With cyber-attacks and vulnerabilities substantially increased over the past years in frequency and severity, it is important to design and build secure software applications from the group up. Therefore, defensive secure coding techniques covering security concepts must be taught from beginning computer science programming courses to exercise building secure applications. Using static analysis, this study thoroughly analyzed Java source code in two textbooks used at a collegiate level, with the goal of …


Malaware Defensive: A Game To Train Users To Combat Malware, Tyler Moon, Tamirat Abegaz, Bryson Payne, Abi Salimi Jun 2020

Malaware Defensive: A Game To Train Users To Combat Malware, Tyler Moon, Tamirat Abegaz, Bryson Payne, Abi Salimi

Journal of Cybersecurity Education, Research and Practice

Several research findings indicate that basic cyber hygiene can potentially deter the majority of cyber threats. One of the ways cybersecurity professionals can prepare users to ensure proper hygiene is to help them develop their ability to spot the difference between normal and abnormal behavior in a computer system. Malware disrupts the normal behavior of a computer system. The lack of appropriate user training has been one of the main reasons behind the exposure of computer systems to threats, from social engineering to viruses, trojans, and ransomware. Basic knowledge about common behavioral characteristics of malware could help users identify potentially …


J Mich Dent Assoc June 2020 Jun 2020

J Mich Dent Assoc June 2020

The Journal of the Michigan Dental Association

Every month,The Journal of the Michigan Dental Association brings news, information, and features about Michigan dentistry to our state's oral health community and the MDA's 6,200+ members. No publication reaches more Michigan dentists!

In this issue, the reader will find the following original content:

  • A cover story with an interview with the MDA’s 2020-21 president Dr. Stephen Meraw.
  • “Implementing Teledentistry: The Why and How” discusses the background and guidance on this important – and growing – aspect of telehealth.
  • “Key Tips in Communicating Evidence in the Clinical Setting”, another feature in our series of articles focusing on evidence-based dentistry. …


The Substantial Growth Of Shadow Banking, Financial Technology And Digital Currency And Their Respective Roles In Shaping The Next Financial Crisis, Vardhan S. Chulani Mr. May 2020

The Substantial Growth Of Shadow Banking, Financial Technology And Digital Currency And Their Respective Roles In Shaping The Next Financial Crisis, Vardhan S. Chulani Mr.

Undergraduate Economic Review

Based on Goldman Sachs’ model and the state of current affairs, an underlying possibility of a financial crisis occurring in the foreseeable future does exist. This could be due to ongoing trade war and negotiations with different countries, the new policies introduced by political parties and their respective impacts, high amounts of corporate and student debts along with auto loans in the economy, thus indicating signs of excessive leverage and resulting in depressing consumer confidence. International issues such as Brexit, the existing currency and debt crisis with Turkey, and China’s debt bubble could also contribute to the global growth slowdowns. …


Corporate Archives In Silicon Valley: Building And Surviving Amid Constant Change, Paula Jabloner, Anna Mancini May 2020

Corporate Archives In Silicon Valley: Building And Surviving Amid Constant Change, Paula Jabloner, Anna Mancini

Journal of Western Archives

An historical understanding of the phenomenon that is Silicon Valley requires the collection and preservation of original records. With the rapid pace of change in the technology industry, how can archivists and their institutions preserve this corporate history? Two archivists address how they were able to found an archives at Cisco Systems and maintain another at Hewlett-Packard. Two common elements emerged: 1) the formation of a licensed limited company (LLC) as the legal structure for the archival repository, and 2) the use of outsourcing to staff both repositories. Outsourcing via a non-profit, in this case the Computer History Museum, or …


Quirky Patent Coloring Books: An Outreach Project Focused On Changing The Patent Culture One Patent Coloring Book At A Time, Paulina Borrego May 2020

Quirky Patent Coloring Books: An Outreach Project Focused On Changing The Patent Culture One Patent Coloring Book At A Time, Paulina Borrego

Journal of the Patent and Trademark Resource Center Association

No abstract provided.


Issued Patents In A University’S Institutional Repository, Suzanne Reinman, Janet Ahrberg May 2020

Issued Patents In A University’S Institutional Repository, Suzanne Reinman, Janet Ahrberg

Journal of the Patent and Trademark Resource Center Association

Beginning in 2016, patents issued by the U.S. Patent and Trademark Office (USPTO) granted to Oklahoma State University were included in SHAREOK (https://shareok.org/.). The joint institutional repository for the Oklahoma State University Libraries (OSU) and the University of Oklahoma Libraries (OU), SHAREOK serves as the home for the intellectual output of both communities and will ultimately include digital dissertations, faculty publications, digital special collections, open access publications, and open educational resources. Including patents has increased the depth of the collection and allows them to be searched or indexed by date, author, title, and subject/classification. Using DSpace software, the contents of …


Broadening The Patent Experience: The Value Of Piug And Attending The Patent Information Users Group (Piug) Annual Conference, Paulina Borrego, Rachel Knapp May 2020

Broadening The Patent Experience: The Value Of Piug And Attending The Patent Information Users Group (Piug) Annual Conference, Paulina Borrego, Rachel Knapp

Journal of the Patent and Trademark Resource Center Association

No abstract provided.


Sovereign Immunity Issues For Tech Transfer Programs At State Universities, Agnes Gambill May 2020

Sovereign Immunity Issues For Tech Transfer Programs At State Universities, Agnes Gambill

Journal of the Patent and Trademark Resource Center Association

Technology transfer is the process of transforming research and ideas into viable commercial opportunities. Notable examples of tech transfer include Google, artificial intelligence, life-saving vaccines, and renewable energy technology. Universities and colleges play an important role in the technology transfer process, ranging from brokering commercial partnerships, negotiating license agreements, and protecting intellectual property. Valuable patents are often at stake, and as a result, universities should anticipate litigation risks. State universities, in particular, face new and unusual challenges as a result of their status as state entities. Under the 11th Amendment, state universities, as an arm of the state, can claim …


Piug: Patent Information Users Group, Inc.: A History Of The International Society For Patent Information Professionals, Barbara J. Hampton May 2020

Piug: Patent Information Users Group, Inc.: A History Of The International Society For Patent Information Professionals, Barbara J. Hampton

Journal of the Patent and Trademark Resource Center Association

Efforts to view and analyze patents began soon after the first patents were filed in the novel system founded in the U.S. Constitution. In the succeeding 200 plus years, classification and indexing tools have evolved from paper to digital, with searching demanding ever-higher skills. Answering the need of patent researchers and analysts for advocacy, scholarship, and professional education, leading searchers founded the Patent Information Users Group, Inc., now the pre-eminent professional organization for patent searchers in the United States. It offers formal coursework for prospective patent searchers, colloquia, and conferences where novice searchers can master their craft. Searchers, who often …


Patent And Trademark Resource Center Websites: A Content Analysis, Jared Hoppenfeld May 2020

Patent And Trademark Resource Center Websites: A Content Analysis, Jared Hoppenfeld

Journal of the Patent and Trademark Resource Center Association

Patent and Trademark Resource Centers (PTRCs) serve as an off-site connection to the United States Patent and Trademark Office (USPTO). Approximately 85 PTRCs exist to assist inventors, entrepreneurs, and researchers by providing facilities, resources, and expertise. Most of these libraries also have a website which, in addition to USPTO webpages, serves as a gateway to the world of patent and trademark research. These websites provide access to various resources while also functioning as an outreach tool to the public.

This study included a content analysis of 79 websites belonging to PTRC libraries. After a literature review of other website studies, …


Startups And Investors And Trolls, Oh My!: How Commercialization Patents Can Benefit Startup Innovation, Robert Chou May 2020

Startups And Investors And Trolls, Oh My!: How Commercialization Patents Can Benefit Startup Innovation, Robert Chou

Northwestern Journal of Technology and Intellectual Property

Venture-backed startups play a crucial role in innovation and advancing our technology. However, the development of secondary markets for patents and the proliferation of patent assertion entities starting in the early twenty-first century has made the patent ecosystem a difficult environment for startups to navigate. Startups face challenges that their more established counterparts do not. First, startups must rely heavily on external sources of funding and, as a result, many decide to file for patents early in their lifecycle to signal their value to potential investors. Second, patent assertion entities threaten startups with patent infringement suits at a disproportionately high …


Change Management Over Financial Information: A Multi-Criteria Evaluation Of System Change Controls Using Desirability Functions, Angel R. Otero, Christian Sonnenberg, Ivonne Delgado-Perez Apr 2020

Change Management Over Financial Information: A Multi-Criteria Evaluation Of System Change Controls Using Desirability Functions, Angel R. Otero, Christian Sonnenberg, Ivonne Delgado-Perez

Communications of the IIMA

The increasing complexity of information technology, attacks on confidential information, and the passing of new laws and regulations have shifted the focus around internal controls in organizations. Particularly, general information technology controls related to change management (i.e., system change controls) are critical in ensuring the integrity, completeness, and reliability of financial information. The literature points to various evaluation methods for these controls to determine which ones to implement. However, these methods do not necessarily consider relevant organization constraints, preventing the inclusion of required controls or the exclusion of unnecessary controls. This paper proposes a novel approach, using Desirability Functions, for …