Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 331 - 360 of 4916

Full-Text Articles in Technology and Innovation

Report Of The Independent Review Of Freedom Of Speech In Australian Higher Education Providers, Tony Shannon Feb 2023

Report Of The Independent Review Of Freedom Of Speech In Australian Higher Education Providers, Tony Shannon

International Journal for Business Education

This summary does not claim to be preferred in any way to a reading of the complete report with its succinct and simple recommendations, including “A Model Code for the Protection of Freedom of Speech and Academic Freedom in Australian Higher Education Providers”. The review is an important document for all institutions dedicated to teaching, particularly at the tertiary level, in having a shared understanding of freedom of speech within an institution.

The Review involved a two-stage consultation process with universities and other stakeholders between November 2018 and March 2019, and it also considered recent pertinent debates in Canada, New …


Summary Of And Comments On Strengthening Skills: Expert Review Of Australia's Vocational Education And Training System, Steven Joyce Feb 2023

Summary Of And Comments On Strengthening Skills: Expert Review Of Australia's Vocational Education And Training System, Steven Joyce

International Journal for Business Education

The following extracts have been compiled in this order to give a feeling for the total report (168 pages). The order of what follows is quite different from Joyce. It has been summarised this way for the benefit of readers who are not involved in the VET sector on a day-to-day basis. Most of the data are from 2017-2018. The summary is by Tony Shannon; it has no official status. To give perspective to this important report, the summary and comments are in three parts, namely,

  • A general view of Australian Vocational Education & Training
  • Recommendations – road map
  • Some …


Boyer Model Of Scholarship In Practice, Tony Shannon Feb 2023

Boyer Model Of Scholarship In Practice, Tony Shannon

International Journal for Business Education

The four types of scholarship in the Boyer framework are relevant to teaching or training at any level of post-secondary education, both directly in terms of knowledge and indirectly through the impact of enthusiasm [2,9]. This outline is a simplified introduction to the salient features of the system, with some general examples of what each type could mean in practice. The boundaries of the types are fluid and can overlap in theory and in practice [4,6].


Lumina Review Of Learning Frameworks: Tools For Building A Better Educational Experience, Tony Shannon Feb 2023

Lumina Review Of Learning Frameworks: Tools For Building A Better Educational Experience, Tony Shannon

International Journal for Business Education

A reason for summarising this document (Travers et al, 2019) is that the Lumina Foundation in the USA is one of the few educational think-tanks which seems to be aware of the effects on the workplace from the exponentially accelerating growth in soft-computing, especially artificial intelligence, which will be seen in the next fifteen years (cf. Jankowski and Marshall. 2017).


Is Anything Left Of The Debate About The Sources Of Growth In East Asia Thirty Years Later?, Jesus Felipe, John Mccombie Feb 2023

Is Anything Left Of The Debate About The Sources Of Growth In East Asia Thirty Years Later?, Jesus Felipe, John Mccombie

Angelo King Institute for Economic and Business Studies (AKI)

The year 2023 commemorates the 30th anniversary of the publication of the influential, yet controversial, study The East Asian Miracle report by the World Bank (1993). An important part of the report’s analysis was concerned with the sources of growth in East Asia. This was based on the neoclassical decomposition of growth into productivity and factor accumulation. At about the same time, the publication of Alwyn Young’s (1992, 1995) and J-I Kim and Lawrence Lau’s (1994) studies, and Paul Krugman’s (1994) popularization of the “zero total factor productivity growth” thesis, led to a very important debate within the profession, on …


How Did The Tamagotchi Become A Worldwide Phenomenon, Gianna V. Bona Feb 2023

How Did The Tamagotchi Become A Worldwide Phenomenon, Gianna V. Bona

CAFE Symposium 2023

The Tamagotchi is a popular Japanese toy by Bandai Co that pioneered virtual pets and led other companies to develop virtual toys and games that changed how children and consumers interacted with toys.


Knowledge Transfer In Technological Innovation Clusters, Vania Lopes Simoes Fioravanti, Fabricio Stocker, Flavio Macau Feb 2023

Knowledge Transfer In Technological Innovation Clusters, Vania Lopes Simoes Fioravanti, Fabricio Stocker, Flavio Macau

Research outputs 2022 to 2026

Purpose:

The aim of this research is to analyze the knowledge transfer process in technological innovation clusters. The problem of the study addresses how organizations can act in a network to enhance experiences and gains, particularly in the aspect of knowledge management.

Design/methodology/approach:

The study is qualitative, applied through a case study, cross-sectional and multiple sources of evidence – semistructured interviews, nonparticipant observation and analysis of documents and secondary institutional data. The case analyzed was the Technology Park of São José dos Campos, in Brazil, involving private companies, governmental organizations, universities and research institutions.

Findings:

The results reinforce the arguments …


What Kind Of Pedagogies For The 21st Century?, Cynthia Luna Scott Feb 2023

What Kind Of Pedagogies For The 21st Century?, Cynthia Luna Scott

International Journal for Business Education

Since the emergence of a global movement that calls for a new model of learning for the twenty first century, it has been argued that formal education must be transformed to enable new forms of learning that are needed to tackle complex global challenges.


The Futures Of Learning 3: What Kind Of Pedagogies For The 21st Century?, Cynthia Luna Scott Feb 2023

The Futures Of Learning 3: What Kind Of Pedagogies For The 21st Century?, Cynthia Luna Scott

International Journal for Business Education

Since the emergence of a global movement that calls for a new model of learning for the twenty first century, it has been argued that formal education must be transformed to enable new forms of learning that are needed to tackle complex global challenges. Literature on this topic offers compelling arguments for transforming pedagogy to better support acquisition of twenty-first century skills.


Uk Universities Face Their Toughest Test, Andrew Jack Feb 2023

Uk Universities Face Their Toughest Test, Andrew Jack

International Journal for Business Education

The School of Oriental and African Studies seemed a symbol of stability when it celebrated its centenary in 2016 by taking over and renovating the University of London’s imposing Senate House building in central London. It was a bold move to lure the best students. But just three years later its future has become much shakier, with its undergraduate intake down 40 percent and a £7m operating deficit. “The competition is brutal,” says Professor Stephen Hopgood, Soas’s international pro-director. “We are small and specialist, and if undergraduate fees are cut, it’s going to be very hard for an institution of …


Reflective Journals, Tony Shannon Am Feb 2023

Reflective Journals, Tony Shannon Am

International Journal for Business Education

A reflective journal helps to think honestly about one’s actual thinking. This can be uncomfortable at first!


Social Impacts Of Robotics On The Labor And Employment Market, Kelvin Espinal Feb 2023

Social Impacts Of Robotics On The Labor And Employment Market, Kelvin Espinal

Dissertations, Theses, and Capstone Projects

Robotics have been introduced into the workplace to perform tasks that human beings have traditionally fulfilled. Complementing or substituting human labor with robotics eliminates human involvement in functions attributable to hazardous environments, heavy lifting, toxic substances, and repetitive low-level tasks. On the other hand, they are meant to be more efficient and cost-effective, saving money, time, and labor. However, since the introduction of robotics in the workforce, societal opposition has been towards this branch of technology in fear of losing employment, wages, and purpose.

Previous studies have reported an overarching societal fear that adopting robotics in the workplace and industry …


U.S. Energy Information Administration Information Resources, Bert Chapman Jan 2023

U.S. Energy Information Administration Information Resources, Bert Chapman

Libraries Faculty and Staff Presentations

Provides information about the resources produced by U.S. Department of Energy's Energy Information Administration. These resources cover energy statistics for U.S., states, the United States, and foreign countries. They also cover energy products as varied as coal, natural gas, nuclear energy, petroleum, and renewable energy.


Antitrust Interoperability Remedies, Herbert J. Hovenkamp Jan 2023

Antitrust Interoperability Remedies, Herbert J. Hovenkamp

All Faculty Scholarship

Compelled interoperability can be a useful remedy for dominant firms, including large digital platforms, who violate the antitrust laws. They can address competition concerns without interfering unnecessarily with the structures that make digital platforms attractive and that have contributed so much to economic growth.

Given the wide variety of structures and business models for big tech, “interoperability” must be defined broadly. It can realistically include everything from “dynamic” interoperability that requires real time sharing of data and operations, to “static” interoperability which requires portability but not necessarily real time interactions. Also included are the compelled sharing of intellectual property or …


Teaching By Practice: Shaping Secure Coding Mentalities Through Cybersecurity Ctfs, Jazmin Collins, Vitaly Ford Jan 2023

Teaching By Practice: Shaping Secure Coding Mentalities Through Cybersecurity Ctfs, Jazmin Collins, Vitaly Ford

Journal of Cybersecurity Education, Research and Practice

The use of the Capture the Flag (CTF)-style competitions has grown popular in a variety of environments as a method to improve or reinforce cybersecurity techniques. However, while these competitions have shown promise in student engagement, enjoyment, and the teaching of essential workforce cybersecurity concepts, many of these CTF challenges have largely focused on cybersecurity as a general topic. Further, most in-school CTF challenges are designed with technical institutes in mind, prepping only experienced or upper-level students in cybersecurity studies for real-world challenges. Our paper aims to focus on the setting of a liberal arts institute, emphasizing secure coding as …


Lightweight Pairwise Key Distribution Scheme For Iots, Kanwalinderjit Kaur Jan 2023

Lightweight Pairwise Key Distribution Scheme For Iots, Kanwalinderjit Kaur

Journal of Cybersecurity Education, Research and Practice

Embedding a pairwise key distribution approach in IoT systems is challenging as IoT devices have limited resources, such as memory, processing power, and battery life. This paper presents a secure and lightweight approach that is applied to IoT devices that are divided into Voronoi clusters. This proposed algorithm comprises XOR and concatenation operations for interactive authentication between the server and the IoT devices. Predominantly, the authentication is carried out by the server. It is observed that the algorithm is resilient against man-in-the-middle attacks, forward secrecy, Denial of Service (DoS) attacks, and offers mutual authentication. It is also observed that the …


Reinventing Cybersecurity Internships During The Covid-19 Pandemic, Lori L. Sussman Jan 2023

Reinventing Cybersecurity Internships During The Covid-19 Pandemic, Lori L. Sussman

Journal of Cybersecurity Education, Research and Practice

The Cybersecurity Ambassador Program provides professional skills training for emerging cybersecurity professionals remotely. The goal is to reach out to underrepresented populations who may use Federal Work-Study (FWS) or grant sponsored internships to participate. Cybersecurity Ambassadors (CAs) develop skills that will serve them well as cybersecurity workers prepared to do research, lead multidisciplinary, technical teams, and educate stakeholders and community members. CAP also reinforces leadership skills so that the next generation of cybersecurity professionals becomes a sustainable source of management talent for the program and profession. The remote curriculum innovatively builds non-technical professional skills (communications, teamwork, leadership) for cybersecurity research …


Cybersecurity Continuity Risks: Lessons Learned From The Covid-19 Pandemic, Tyler Fezzey, John H. Batchelor, Gerald F. Burch, Randall Reid Jan 2023

Cybersecurity Continuity Risks: Lessons Learned From The Covid-19 Pandemic, Tyler Fezzey, John H. Batchelor, Gerald F. Burch, Randall Reid

Journal of Cybersecurity Education, Research and Practice

The scope and breadth of the COVID-19 pandemic were unprecedented. This is especially true for business continuity and the related area of cybersecurity. Historically, business continuity and cybersecurity are viewed and researched as separate fields. This paper synthesizes the two disciplines as one, thus pointing out the need to address both topics simultaneously. This study identifies blind spots experienced by businesses as they navigated through the difficult time of the pandemic by using data collected during the height of the COVID-19 pandemic. One major shortcoming was that most continuity and cybersecurity plans focused on single-axis threats. The COVID-19 pandemic resulted …


A “Duty To Write” Smart Contracts That Unsophisticated Users Have A “Duty To Read”, Chase Webber Jan 2023

A “Duty To Write” Smart Contracts That Unsophisticated Users Have A “Duty To Read”, Chase Webber

Minnesota Journal of Law, Science & Technology

No abstract provided.


Organizational Readiness Assessment For Fraud Detection And Prevention: Case Of Airlines Sector And Electronic Payment, Sultan Ayed Alghamdi Jan 2023

Organizational Readiness Assessment For Fraud Detection And Prevention: Case Of Airlines Sector And Electronic Payment, Sultan Ayed Alghamdi

Dissertations and Theses

Payment processing systems have advanced significantly in the airline business. Because e-payments are easy, they have captured the attention of many companies in the aviation industry and are quickly becoming the dominant means of payment. However, as technology advances, fraud grows at a comparable rate. Over the years, there has been a surge in payment fraud incidents in the airline sector, reducing the platform's trustworthiness. Despite attempts to eliminate e-payment fraud, decision-makers lack the technical expertise required to use the finest fraud detection and prevention assessments; this research recognizes the lack of an established decision model as a hurdle and …


Regulatory Sandboxes Enable Pragmatic Blockchain Regulation, Joshua Durham Jan 2023

Regulatory Sandboxes Enable Pragmatic Blockchain Regulation, Joshua Durham

Washington Journal of Law, Technology & Arts

Since blockchain technology supports digitally-native money, the centralized chokepoints that governments have traditionally targeted to regulate commerce no longer apply to our (digital) property. However, competent regulation furthers basic public policy goals and should enable responsible innovation of this promising technology. This Article discusses pragmatic policies that enable responsible innovation by cultivating regulatory expertise required to write enforceable rules. Responsible innovation is necessary because unlike the early internet, where programmers could manipulate simple colors and text on webpages, these same individuals can now create financial services applications that manipulate actual money—we are faced with an inescapable reality that more is …


Finding Forensic Evidence In The Operating System's Graphical User Interface, Edward X. Wilson Mr. Jan 2023

Finding Forensic Evidence In The Operating System's Graphical User Interface, Edward X. Wilson Mr.

LSU Master's Theses

A branch of cyber security known as memory forensics focuses on extracting meaningful evidence from system memory. This analysis is often referred to as volatile memory analysis, and is generally performed on memory captures acquired from target systems. Inside of a memory capture is the complete state of a system under investigation, including the contents of currently running as well as previously executed applications. Analysis of this data can reveal a significant amount of activity that occurred on a system since the last reboot. For this research, the Windows operating system is targeted. In particular, the graphical user interface component …


“Listen To Me” – A Systematic Literature Review About Learning From Others’ Failure Narrations, Verena Liszt-Rohlf Jan 2023

“Listen To Me” – A Systematic Literature Review About Learning From Others’ Failure Narrations, Verena Liszt-Rohlf

International Journal for Business Education

The dedicated stream of learning from others’ failure has gained increasing attention in entrepreneurship education research and—because of the COVID-19 crisis—among practitioners. The emerging literature on entrepreneurship education addresses this important phenomenon but lacks specific theoretical underpinnings; its new approaches to and empirical inquiry are one-sided. Therefore, a systematic literature review is warranted to provide a more comprehensive view of learning from others’ entrepreneurial failures and to develop a research model. Unprecedentedly, the author explores the type of research streams and gaps that can be included in a research model for entrepreneurship education research in the area of learning from …


Ro Khanna, Dignity In A Digital Age: Making Tech Work For All Of Us (2022), James W. Gentry Jan 2023

Ro Khanna, Dignity In A Digital Age: Making Tech Work For All Of Us (2022), James W. Gentry

Markets, Globalization & Development Review

No abstract provided.


What Is Missing In Data Governance? Regulation, Board Oversight, And A New Role For Accountants, Christopher Hill, Bria I. James, Najib Sahyoun Jan 2023

What Is Missing In Data Governance? Regulation, Board Oversight, And A New Role For Accountants, Christopher Hill, Bria I. James, Najib Sahyoun

Posters-at-the-Capitol

By 2025, the world will produce 163 Zettabytes (ZB) of data on an annual basis. Data is displacing oil as the most productive commodity. However, poor data quality costs the U.S. economy $3.1 trillion annually. Data must be properly managed through data governance. A strong data governance program does not only maximize the value of the data resulting in optimal decision making, but also minimizes risks of data breaches, lawsuits, and reputational costs. In our research, we conducted a content analysis of the data governance literature by considering both professional and academic literature.

Our results showed that the U.S. does …


Revisiting Cybersecurity Awareness In The Midst Of Disruptions, Avideh Sadaghiani-Tabrizi Jan 2023

Revisiting Cybersecurity Awareness In The Midst Of Disruptions, Avideh Sadaghiani-Tabrizi

International Journal for Business Education

The awareness of cybersecurity and knowledge about risks from a variety of threats, which present harm or steal private information in internetworking could help in mitigation of vulnerabilities to risks of threats in safeguarding information from malware and bots. Revisiting cybersecurity awareness of every member and evaluation of organization’s posture might help to protect sensitive or private information from a network of computers, working together and forming into botnets. The purpose of the qualitative case study narrative was to explore prospects for integrating cybersecurity education into elementary school children’s curriculum through interviews of elementary schoolteachers, IT experts, and parents to …


Key Performance Indicators Detection Based Data Mining, Fatma Abogabal, Shimaa Mohamed Ouf, Amira M. Idrees Ami Jan 2023

Key Performance Indicators Detection Based Data Mining, Fatma Abogabal, Shimaa Mohamed Ouf, Amira M. Idrees Ami

Future Computing and Informatics Journal

One of the most prosperous domains that Data mining accomplished a great progress is Food Security and safety. Some of Data mining techniques studies applied several machine learning algorithms to enhance and traceability of food supply chain safety procedures and some of them applying machine learning methodologies with several feature selection methods for detecting and predicting the most significant key performance indicators affect food safety. In this research we proposed an adaptive data mining model applying nine machine learning algorithms (Naive Bayes, Bayes Net Key -Nearest Neighbor (KNN), Multilayer Perceptron (MLP), Random Forest (RF), Support Vector Machine (SVM), J48, Hoeffding …


Enabling An Equitable Energy Transition Through Inclusive Research, Michael Ash, Erin Baker, Mark Tuominen, Dhandapani Venkataraman, Matthew Burke, S. Castellanos, M. Cha, Gabe Chan, D. Djokic, J.C. Ford, Anna P. Goldstein, David Hsu, Matt Lacker, C. Miller, D. Nock, A.P. Ravikumar, Allison Bates, Anna Stefanopoulou, E Grubert, D.M Kammen, M. Pastor, S.Z, Attari, S. Carley, D.L Clark, D. Dean-Ryan, U. Kosar, Kerry Bowie, Tina Johnson Jan 2023

Enabling An Equitable Energy Transition Through Inclusive Research, Michael Ash, Erin Baker, Mark Tuominen, Dhandapani Venkataraman, Matthew Burke, S. Castellanos, M. Cha, Gabe Chan, D. Djokic, J.C. Ford, Anna P. Goldstein, David Hsu, Matt Lacker, C. Miller, D. Nock, A.P. Ravikumar, Allison Bates, Anna Stefanopoulou, E Grubert, D.M Kammen, M. Pastor, S.Z, Attari, S. Carley, D.L Clark, D. Dean-Ryan, U. Kosar, Kerry Bowie, Tina Johnson

ETI Publications

Comprehensive and meaningful inclusion of marginalized communities within the research enterprise will be critical to ensuring an equitable, technology-informed, clean energy transition. We provide five key action items for government agencies and philanthropic institutions to operationalize the commitment to an equitable energy transition.


From Tether To Terra: The Current Stablecoin Ecosystem And The Failure Of Regulators, Mary E. Burke Jan 2023

From Tether To Terra: The Current Stablecoin Ecosystem And The Failure Of Regulators, Mary E. Burke

Fordham Journal of Corporate & Financial Law

The Tether controversy and Terra crash have placed stablecoins in the regulatory spotlight. Stablecoins are often portrayed as posing systemic risks to financial markets, with some pundits labelling them “the villain of the finance world.” Global regulatory bodies, namely the International Monetary Fund (IMF) and the Bank of International Settlement (BIS), and political leaders, including the Biden Administration, have all called for stablecoin regulation. These officials allege that stablecoins’ structure, combined with their exponential growth, pose a unique risk to global markets. Before the May 2022 Terra crash, government reports superficially treated stablecoins by exclusively focusing on asset-backed coins. Post …


Hired By A Machine: Can A New York City Law Enforce Algorithmic Fairness In Hiring Practices?, Lindsey Fuchs Jan 2023

Hired By A Machine: Can A New York City Law Enforce Algorithmic Fairness In Hiring Practices?, Lindsey Fuchs

Fordham Journal of Corporate & Financial Law

Workplace antidiscrimination laws must adapt to address today’s technological realities. If left underregulated, the rapidly expanding role of Artificial Intelligence (“AI”) in hiring practices has the danger of creating new, more obscure modes of discrimination. Companies use these tools to reduce the duration and costs of hiring and potentially attract a larger pool of qualified applicants for their open positions. But how can we guarantee that these hiring tools yield fair outcomes when deployed? These issues are just starting to be addressed at the federal, state, and city levels. This Note tackles whether a new city law can be improved …